IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\0244247334.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000007001\06f6d9547f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\CFBAKEHIEB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFBGHDGCFHIDBGDGIIIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FCFBGIDAEHCFIDGCBGIIEBKKKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GHCGDAFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GHDBKFHIJKJKECAAAECA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEBGIIJDGHCBGCBFIEGDHDHCF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIDHJKFBGIIJJKFIJDBGCBGHID
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJEHIDHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDHCBAEHJJJKKFIDGHJECAFIDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KKECFIEBGCAKJKECGCFI
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 19:21:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 19:21:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 19:21:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 19:21:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 19:21:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 118
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 119
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 120
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 121
ASCII text, with very long lines (574)
downloaded
Chrome Cache Entry: 122
ASCII text, with very long lines (1694)
downloaded
Chrome Cache Entry: 123
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 124
ASCII text, with very long lines (2362)
downloaded
Chrome Cache Entry: 125
HTML document, ASCII text, with very long lines (687)
downloaded
Chrome Cache Entry: 126
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 127
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 128
ASCII text, with very long lines (4478)
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (1192)
downloaded
Chrome Cache Entry: 130
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 131
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 132
ASCII text, with very long lines (44533)
downloaded
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\CFBAKEHIEB.exe
"C:\Users\user\AppData\Local\Temp\CFBAKEHIEB.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\0244247334.exe
"C:\Users\user\AppData\Local\Temp\1000006001\0244247334.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000007001\06f6d9547f.exe
"C:\Users\user\AppData\Local\Temp\1000007001\06f6d9547f.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\CFBAKEHIEB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\DAFHIDGIJK.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1920,i,10516001789053394369,8976321614446210453,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5504 --field-trial-handle=1920,i,10516001789053394369,8976321614446210453,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1920,i,10516001789053394369,8976321614446210453,262144 /prefetch:8
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.30/69934896f997d5bb/softokn3.dll
85.28.47.30
malicious
http://77.91.77.81/stealc/random.exe-
unknown
malicious
http://85.28.47.30/69934896f997d5bb/freebl3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.30/69934896f997d5bb/nss3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php/
unknown
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.30/
unknown
malicious
http://85.28.47.30/69934896f997d5bb/msvcp140.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/mozglue.dll
85.28.47.30
malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.30/69934896f997d5bb/sqlite3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.30/69934896f997d5bb/vcruntime140.dll
85.28.47.30
malicious
85.28.47.30/920475a59bac849d.php
malicious
http://85.28.47.30/920475a59bac849d.php
85.28.47.30
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpF
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://77.91.77.82/Hun4Ko/index.phpiLqa8
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.youtube.com/accountK%DYW
unknown
https://play.google.com/work/enroll?identifier=
unknown
https://policies.google.com/terms/service-specific
unknown
https://g.co/recover
unknown
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
http://85.28.47.30/69934896f997d5bb/mozglue.dllX
unknown
https://policies.google.com/technologies/cookies
unknown
http://77.91.77.82/Hun4Ko/index.php/QLIa
unknown
https://policies.google.com/terms
unknown
http://77.91.77.82/Hun4Ko/index.phpU
unknown
https://www.google.com
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dllll
unknown
http://77.91.77.82/Hun4Ko/index.php2
unknown
http://85.28.47.30/69934896f997d5bb/mozglue.dlll
unknown
https://www.youtube.com/t/terms?chromeless=1&hl=
unknown
http://77.91.77.82/Hun4Ko/index.php(
unknown
http://77.91.77.81/mine/amadka.exe-Disposition:
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://77.91.77.81/cost/go.exepData
unknown
https://youtube.com/t/terms?gl=
unknown
http://85.28.47.30/920475a59bac849d.phpd
unknown
https://www.google.com/intl/
unknown
https://apis.google.com/js/api.js
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://77.91.77.82/Hun4Ko/index.php$
unknown
http://85.28.47.30/69934896f997d5bb/softokn3.dllx
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/account
216.58.206.46
https://www.google.com/favicon.ico
172.217.16.196
http://77.91.77.81/mine/amadka.exeT
unknown
http://77.91.77.81/well/random.exeL
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://policies.google.com/privacy
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://77.91.77.82/Hun4Ko/index.phpfLI
unknown
http://85.28.47.30I
unknown
http://77.91.77.82/0
unknown
http://77.91.77.82/Hun4Ko/index.phpuLma6
unknown
http://77.91.77.82/ot%
unknown
https://play.google/intl/
unknown
https://families.google.com/intl/
unknown
http://77.91.77.81/cost/go.exe
unknown
http://85.28.47.30N?
unknown
https://policies.google.com/technologies/location-data
unknown
http://77.91.77.81/well/random.exe
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.youtube.com/accounts$
unknown
http://85.28.47.30/ia
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://77.91.77.82/Hun4Ko/index.phplF~nj
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://77.91.77.81/well/random.exen
unknown
http://85.28.47.30/69934896f997d5bb/msvcp140.dllX
unknown
https://support.google.com/accounts?p=new-si-ui
unknown
http://www.sqlite.org/copyright.html.
unknown
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
unknown
http://85.28.47.30/920475a59bac849d.php06001
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://policies.google.com/privacy/google-partners
unknown
http://77.91.77.81/cost/go.exe00
unknown
http://upx.sf.net
unknown
https://policies.google.com/privacy/additional
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
216.58.206.46
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://policies.google.com/privacy/additional/embedded?gl=kr
unknown
https://policies.google.com/terms/location/embedded
unknown
http://77.91.77.81/stealc/random.exe506
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
216.58.206.46
www3.l.google.com
142.250.181.238
play.google.com
216.58.206.46
www.google.com
172.217.16.196
accounts.youtube.com
unknown
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
85.28.47.30
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
77.91.77.81
unknown
Russian Federation
malicious
216.58.206.46
youtube-ui.l.google.com
United States
142.250.181.238
www3.l.google.com
United States
239.255.255.250
unknown
Reserved
172.217.16.196
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7B1000
unkown
page execute and read and write
malicious
641000
unkown
page execute and read and write
malicious
18F5000
heap
page read and write
malicious
49D0000
direct allocation
page read and write
malicious
1AE5000
heap
page read and write
malicious
641000
unkown
page execute and read and write
malicious
371000
unkown
page execute and read and write
malicious
721000
unkown
page execute and read and write
malicious
4C30000
direct allocation
page read and write
malicious
4E20000
direct allocation
page read and write
malicious
641000
unkown
page execute and read and write
malicious
4E10000
direct allocation
page read and write
malicious
172F000
heap
page read and write
3D59000
heap
page read and write
3F1E000
stack
page read and write
14D7000
heap
page read and write
17CF000
heap
page read and write
3803000
heap
page read and write
16B5000
heap
page read and write
2B30000
direct allocation
page read and write
15BC000
heap
page read and write
23486000
heap
page read and write
1967000
heap
page read and write
2897000
heap
page read and write
4640000
trusted library allocation
page read and write
1521000
heap
page read and write
399E000
stack
page read and write
47B1000
heap
page read and write
4530000
direct allocation
page read and write
3D10000
heap
page read and write
4E81000
direct allocation
page read and write
375F000
stack
page read and write
7ED50000
direct allocation
page execute and read and write
47B1000
heap
page read and write
110A000
heap
page read and write
365E000
stack
page read and write
4970000
direct allocation
page read and write
2E1F000
stack
page read and write
49A1000
heap
page read and write
18A1000
heap
page read and write
F84000
heap
page read and write
18A0000
heap
page read and write
16EF000
heap
page read and write
995000
heap
page read and write
361F000
stack
page read and write
4981000
heap
page read and write
2F75F000
heap
page read and write
32AE000
stack
page read and write
47B1000
heap
page read and write
607E000
stack
page read and write
341F000
stack
page read and write
4F5F000
stack
page read and write
4154000
heap
page read and write
E98000
heap
page read and write
10C0000
direct allocation
page read and write
17F8000
heap
page read and write
2C1F000
stack
page read and write
3BF9000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
4981000
heap
page read and write
3BE4000
direct allocation
page execute and read and write
3F9F000
stack
page read and write
1568000
heap
page read and write
171A000
heap
page read and write
2BDE000
stack
page read and write
F84000
heap
page read and write
47B1000
heap
page read and write
2B30000
direct allocation
page read and write
3FED000
stack
page read and write
1518000
heap
page read and write
F84000
heap
page read and write
3D20000
heap
page read and write
16D8000
heap
page read and write
1DDE000
stack
page read and write
18C0000
heap
page read and write
1B1C000
heap
page read and write
192C000
heap
page read and write
331F000
stack
page read and write
E4A000
heap
page read and write
9EE000
stack
page read and write
10CE000
stack
page read and write
10F0000
heap
page read and write
3C59000
heap
page read and write
46EF000
stack
page read and write
3B0A000
heap
page read and write
3FAD000
stack
page read and write
2B57000
heap
page read and write
345F000
stack
page read and write
23486000
heap
page read and write
F84000
heap
page read and write
3C1B000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
15C5000
heap
page read and write
2E1E000
stack
page read and write
F70000
heap
page read and write
47B1000
heap
page read and write
12FF000
stack
page read and write
3C9A000
heap
page read and write
3EDF000
stack
page read and write
496F000
stack
page read and write
3AF0000
heap
page read and write
452F000
stack
page read and write
641000
unkown
page execute and write copy
1596000
heap
page read and write
3D1E000
stack
page read and write
1698000
heap
page read and write
3E5E000
stack
page read and write
2F9E000
stack
page read and write
3A1E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
1C5B000
heap
page read and write
640000
unkown
page readonly
1621000
heap
page read and write
47B1000
heap
page read and write
3B55000
heap
page read and write
160D000
heap
page read and write
1832000
heap
page read and write
23486000
heap
page read and write
61ED0000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
B8C000
stack
page read and write
3BA9000
heap
page read and write
182F000
heap
page read and write
E99000
heap
page read and write
2F6AE000
stack
page read and write
1778000
heap
page read and write
1074000
heap
page read and write
3D9000
unkown
page read and write
F20000
heap
page read and write
2348E000
heap
page read and write
1675000
heap
page read and write
F84000
heap
page read and write
3D09000
heap
page read and write
3D39000
heap
page read and write
164F000
heap
page read and write
466F000
stack
page read and write
95A000
unkown
page execute and write copy
40DF000
stack
page read and write
4970000
direct allocation
page read and write
34DF000
stack
page read and write
4520000
heap
page read and write
646000
unkown
page execute and read and write
3DE4000
direct allocation
page execute and read and write
33AF000
stack
page read and write
345E000
stack
page read and write
23558000
heap
page read and write
168B000
heap
page read and write
1BAC000
heap
page read and write
36A000
stack
page read and write
548F000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
2F6B0000
trusted library allocation
page read and write
F84000
heap
page read and write
3BE4000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
3C32000
heap
page read and write
4540000
heap
page read and write
186E000
heap
page read and write
1808000
heap
page read and write
62F0000
heap
page read and write
EFD000
stack
page read and write
1FDE000
stack
page read and write
3DE0000
direct allocation
page execute and read and write
2B50000
direct allocation
page read and write
15AE000
heap
page read and write
316E000
stack
page read and write
EEA000
heap
page read and write
F84000
heap
page read and write
158B000
heap
page read and write
471F000
stack
page read and write
15FD000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1680000
heap
page read and write
18DA000
heap
page read and write
916000
unkown
page execute and read and write
2870000
heap
page read and write
359F000
stack
page read and write
14E4000
heap
page read and write
23464000
heap
page read and write
157F000
heap
page read and write
3D00000
heap
page read and write
3C3D000
heap
page read and write
34EF000
stack
page read and write
1960000
heap
page read and write
45AF000
stack
page read and write
472E000
stack
page read and write
F84000
heap
page read and write
47B1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
435F000
stack
page read and write
29AE000
stack
page read and write
E99000
heap
page read and write
103E000
stack
page read and write
1C27000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
1B43000
heap
page read and write
39D0000
heap
page read and write
F84000
heap
page read and write
62BF000
stack
page read and write
3BE4000
direct allocation
page execute and read and write
E50000
heap
page read and write
18EE000
stack
page read and write
305F000
stack
page read and write
1CAFF000
stack
page read and write
2346D000
heap
page read and write
49D0000
direct allocation
page read and write
2F1F000
stack
page read and write
E88000
heap
page read and write
5040000
direct allocation
page execute and read and write
F84000
heap
page read and write
1B48000
heap
page read and write
16DF000
heap
page read and write
4530000
direct allocation
page read and write
47B1000
heap
page read and write
1074000
heap
page read and write
1BD1000
heap
page read and write
126B000
stack
page read and write
14DD000
heap
page read and write
2D6F000
stack
page read and write
23481000
heap
page read and write
449F000
stack
page read and write
5C10000
heap
page read and write
370000
unkown
page read and write
5020000
direct allocation
page execute and read and write
1776000
heap
page read and write
1CB3D000
stack
page read and write
4B30000
direct allocation
page execute and read and write
2346B000
heap
page read and write
EAF000
heap
page read and write
325F000
stack
page read and write
689000
unkown
page execute and read and write
3A2E000
stack
page read and write
1677000
heap
page read and write
805C000
stack
page read and write
16C0000
heap
page read and write
16BF000
heap
page read and write
F84000
heap
page read and write
362F000
stack
page read and write
1828000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
EE7000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
7DEC000
stack
page read and write
721000
unkown
page execute and write copy
AA6000
unkown
page execute and read and write
3950000
heap
page read and write
4530000
direct allocation
page read and write
4B60000
direct allocation
page execute and read and write
18A0000
heap
page read and write
1815000
heap
page read and write
47B1000
heap
page read and write
3BA0000
direct allocation
page execute and read and write
451F000
stack
page read and write
15BC000
heap
page read and write
5000000
direct allocation
page execute and read and write
1576000
heap
page read and write
42EE000
stack
page read and write
18A0000
heap
page read and write
47B1000
heap
page read and write
4B60000
direct allocation
page execute and read and write
1656000
heap
page read and write
38DE000
stack
page read and write
1965000
heap
page read and write
3A50000
heap
page read and write
6A2000
unkown
page execute and read and write
2348F000
heap
page read and write
45A0000
heap
page read and write
3DA6000
heap
page read and write
DCB000
stack
page read and write
482F000
stack
page read and write
17BD000
heap
page read and write
572E000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
3DE4000
direct allocation
page execute and read and write
6A2000
unkown
page execute and read and write
1074000
heap
page read and write
4B60000
direct allocation
page execute and read and write
3A9F000
stack
page read and write
3D1F000
stack
page read and write
3DD4000
direct allocation
page execute and read and write
312F000
stack
page read and write
15FD000
heap
page read and write
68A000
unkown
page execute and write copy
128E000
stack
page read and write
1810000
heap
page read and write
3C01000
heap
page read and write
6A9000
unkown
page write copy
3B6D000
heap
page read and write
3D63000
heap
page read and write
155F000
heap
page read and write
15FD000
heap
page read and write
56EF000
stack
page read and write
1765000
heap
page read and write
182F000
heap
page read and write
942000
unkown
page execute and read and write
3B5E000
stack
page read and write
6920000
heap
page read and write
1C7EF000
stack
page read and write
3B15000
heap
page read and write
1737000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
158D000
heap
page read and write
110E000
heap
page read and write
82A0000
heap
page read and write
F80000
heap
page read and write
16BF000
heap
page read and write
3C59000
heap
page read and write
16F0000
heap
page read and write
E99000
heap
page read and write
720000
unkown
page readonly
5B2F000
stack
page read and write
603F000
stack
page read and write
371E000
stack
page read and write
3970000
heap
page read and write
5010000
direct allocation
page execute and read and write
47B1000
heap
page read and write
EB1000
heap
page read and write
F84000
heap
page read and write
3DED000
heap
page read and write
47B1000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4C6B000
stack
page read and write
B36000
unkown
page execute and read and write
6C5DE000
unkown
page read and write
3B4B000
heap
page read and write
E7E000
heap
page read and write
23470000
heap
page read and write
1100000
heap
page read and write
3BE5000
heap
page read and write
4970000
direct allocation
page read and write
156E000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
47B1000
heap
page read and write
23480000
heap
page read and write
15BB000
heap
page read and write
1855000
heap
page read and write
1D3A0000
trusted library allocation
page read and write
16B0000
heap
page read and write
4C91000
direct allocation
page read and write
3820000
direct allocation
page execute and read and write
2B30000
direct allocation
page read and write
2346E000
heap
page read and write
302E000
stack
page read and write
1CD3C000
stack
page read and write
2346F000
heap
page read and write
F84000
heap
page read and write
41AE000
stack
page read and write
1852000
heap
page read and write
1800000
heap
page read and write
1ACA000
heap
page read and write
395F000
stack
page read and write
47B1000
heap
page read and write
47B1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
6A1000
unkown
page execute read
6AB000
unkown
page execute and read and write
4F5B000
stack
page read and write
381E000
stack
page read and write
4530000
direct allocation
page read and write
23487000
heap
page read and write
15E4000
heap
page read and write
365CB000
stack
page read and write
7B1000
unkown
page execute and write copy
3BE4000
direct allocation
page execute and read and write
23466000
heap
page read and write
1626000
heap
page read and write
4530000
direct allocation
page read and write
82BC000
heap
page read and write
23481000
heap
page read and write
997000
heap
page read and write
1627000
heap
page read and write
10C0000
direct allocation
page read and write
E86000
heap
page read and write
3D2B000
heap
page read and write
6C7CF000
unkown
page write copy
1BDA000
heap
page read and write
7B0000
unkown
page readonly
3D4D000
heap
page read and write
47B1000
heap
page read and write
3C9B000
heap
page read and write
E6F000
heap
page read and write
1617000
heap
page read and write
1627000
heap
page read and write
F84000
heap
page read and write
45EE000
stack
page read and write
1C47E000
stack
page read and write
23481000
heap
page read and write
41DF000
stack
page read and write
379E000
stack
page read and write
B8C000
stack
page read and write
F84000
heap
page read and write
36DE000
stack
page read and write
F84000
heap
page read and write
3C4F000
heap
page read and write
159A000
heap
page read and write
1A60000
heap
page read and write
351E000
stack
page read and write
15C0000
heap
page read and write
3BF7000
heap
page read and write
311F000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
4970000
direct allocation
page read and write
3F5F000
stack
page read and write
182F000
heap
page read and write
1CFED000
stack
page read and write
23464000
heap
page read and write
F84000
heap
page read and write
23455000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
17D9000
heap
page read and write
1B51000
heap
page read and write
3780000
direct allocation
page execute and read and write
18A8000
heap
page read and write
1614000
heap
page read and write
37EE000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4BA0000
direct allocation
page execute and read and write
2346A000
heap
page read and write
F44000
heap
page read and write
3A50000
heap
page read and write
4140000
heap
page read and write
2B30000
direct allocation
page read and write
171A000
heap
page read and write
B35000
unkown
page execute and read and write
1656000
heap
page read and write
23461000
heap
page read and write
352E000
stack
page read and write
151D000
heap
page read and write
18A7000
heap
page read and write
54DD000
stack
page read and write
4E30000
direct allocation
page execute and read and write
339F000
stack
page read and write
3BEE000
direct allocation
page execute and read and write
16CF000
heap
page read and write
455F000
stack
page read and write
10C0000
direct allocation
page read and write
6A0000
unkown
page readonly
2EDE000
stack
page read and write
AF8000
unkown
page execute and read and write
F84000
heap
page read and write
16E2000
heap
page read and write
151C000
heap
page read and write
2B1E000
stack
page read and write
3C6F000
stack
page read and write
47B1000
heap
page read and write
15BD000
heap
page read and write
2D5F000
stack
page read and write
4E10000
direct allocation
page read and write
309F000
stack
page read and write
82BE000
heap
page read and write
2CDF000
stack
page read and write
1CAD000
stack
page read and write
385E000
stack
page read and write
366E000
stack
page read and write
4981000
heap
page read and write
1890000
heap
page read and write
20AF000
stack
page read and write
157C000
heap
page read and write
389F000
stack
page read and write
52AE000
stack
page read and write
E24000
heap
page read and write
3C5A000
heap
page read and write
47B0000
heap
page read and write
15A3000
heap
page read and write
1808000
heap
page read and write
46AE000
stack
page read and write
16EF000
heap
page read and write
367CD000
stack
page read and write
18DE000
heap
page read and write
14B0000
heap
page read and write
4B60000
direct allocation
page execute and read and write
61EB4000
direct allocation
page read and write
159B000
heap
page read and write
E8F000
heap
page read and write
1808000
heap
page read and write
3CAE000
stack
page read and write
1D06D000
stack
page read and write
3BE0000
direct allocation
page execute and read and write
F44000
heap
page read and write
441E000
stack
page read and write
1EBE000
stack
page read and write
10C0000
direct allocation
page read and write
916000
unkown
page execute and read and write
2348F000
heap
page read and write
1764000
heap
page read and write
18AE000
heap
page read and write
47B1000
heap
page read and write
3B10000
heap
page read and write
6A2000
unkown
page execute and read and write
F44000
heap
page read and write
38EE000
stack
page read and write
2D1E000
stack
page read and write
17BA000
heap
page read and write
1D2A1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
2C5E000
stack
page read and write
47AF000
stack
page read and write
3E5F000
stack
page read and write
49A1000
heap
page read and write
F44000
heap
page read and write
2150000
heap
page read and write
459F000
stack
page read and write
D3E000
stack
page read and write
F84000
heap
page read and write
F44000
heap
page read and write
47B1000
heap
page read and write
76C000
unkown
page read and write
1D2A1000
heap
page read and write
1505000
heap
page read and write
23470000
heap
page read and write
17A4000
heap
page read and write
2EAF000
stack
page read and write
47B1000
heap
page read and write
E68000
heap
page read and write
23480000
heap
page read and write
47B1000
heap
page read and write
1737000
heap
page read and write
F84000
heap
page read and write
4013000
heap
page read and write
4D0B000
stack
page read and write
2348F000
heap
page read and write
157C000
heap
page read and write
4970000
direct allocation
page read and write
36DF000
stack
page read and write
1833000
heap
page read and write
E20000
heap
page read and write
2348F000
heap
page read and write
17A4000
heap
page read and write
6910000
heap
page read and write
E9A000
heap
page read and write
405E000
stack
page read and write
FCF000
stack
page read and write
2EEE000
stack
page read and write
125F000
stack
page read and write
3D10000
heap
page read and write
774000
unkown
page readonly
839000
unkown
page execute and read and write
3BFA000
heap
page read and write
15A3000
heap
page read and write
10E0000
direct allocation
page read and write
415F000
stack
page read and write
47B6000
heap
page read and write
391F000
stack
page read and write
F44000
heap
page read and write
856000
unkown
page execute and read and write
3D8F000
heap
page read and write
189E000
stack
page read and write
47B1000
heap
page read and write
942000
unkown
page execute and read and write
4F80000
direct allocation
page execute and read and write
10C0000
direct allocation
page read and write
47B1000
heap
page read and write
3BDE000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
F84000
heap
page read and write
6A9000
unkown
page read and write
47B1000
heap
page read and write
157A000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
3D2000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
409F000
stack
page read and write
F84000
heap
page read and write
3CD6000
heap
page read and write
E9A000
heap
page read and write
2B30000
direct allocation
page read and write
4530000
direct allocation
page read and write
47B1000
heap
page read and write
10EE000
unkown
page execute and write copy
1D26D000
stack
page read and write
F44000
heap
page read and write
18AC000
heap
page read and write
3BAE000
heap
page read and write
744000
unkown
page execute and write copy
95C000
unkown
page execute and read and write
49A0000
heap
page read and write
4970000
direct allocation
page read and write
3960000
heap
page read and write
3A9E000
stack
page read and write
4B90000
direct allocation
page execute and read and write
4A31000
direct allocation
page read and write
14E0000
heap
page read and write
369F000
stack
page read and write
BC5000
unkown
page execute and read and write
3ACE000
stack
page read and write
3DAF000
stack
page read and write
15B0000
heap
page read and write
15BE000
heap
page read and write
51DF000
stack
page read and write
47B1000
heap
page read and write
F44000
heap
page read and write
3C9A000
heap
page read and write
117E000
unkown
page execute and write copy
163B000
stack
page read and write
1D3AA000
heap
page read and write
2B2E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
3D2B000
heap
page read and write
23481000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
124F000
stack
page read and write
23470000
heap
page read and write
2170000
heap
page read and write
23456000
heap
page read and write
3C59000
heap
page read and write
16EF000
heap
page read and write
640000
unkown
page readonly
3DCE000
stack
page read and write
2348F000
heap
page read and write
411E000
stack
page read and write
2E5E000
stack
page read and write
5EF0000
heap
page read and write
F84000
heap
page read and write
2176000
heap
page read and write
1862000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
157A000
heap
page read and write
421F000
stack
page read and write
47B1000
heap
page read and write
419E000
stack
page read and write
14B8000
heap
page read and write
2B4F000
stack
page read and write
431F000
stack
page read and write
1601000
heap
page read and write
1838000
stack
page read and write
381F000
stack
page read and write
FD0000
heap
page read and write
14FD000
heap
page read and write
182F000
heap
page read and write
67B000
unkown
page execute and read and write
3D46000
heap
page read and write
47B1000
heap
page read and write
309E000
stack
page read and write
15A5000
heap
page read and write
B00000
heap
page read and write
23464000
heap
page read and write
2ADF000
stack
page read and write
1890000
heap
page read and write
16F9000
heap
page read and write
30DE000
stack
page read and write
335E000
stack
page read and write
3BF8000
heap
page read and write
3B6D000
heap
page read and write
3A5C000
heap
page read and write
F84000
heap
page read and write
15BA000
heap
page read and write
16F9000
heap
page read and write
1BCC000
heap
page read and write
39EF000
stack
page read and write
5B6B000
stack
page read and write
108F000
stack
page read and write
4541000
heap
page read and write
4D20000
heap
page read and write
672000
unkown
page execute and read and write
2B60000
heap
page read and write
165B000
heap
page read and write
15C0000
heap
page read and write
47B1000
heap
page read and write
395E000
stack
page read and write
3D12000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
3DA6000
heap
page read and write
47B1000
heap
page read and write
2B9F000
stack
page read and write
F44000
heap
page read and write
47B1000
heap
page read and write
4A80000
trusted library allocation
page read and write
1B4D000
heap
page read and write
104A000
heap
page read and write
49A1000
heap
page read and write
23481000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
3D1C000
heap
page read and write
1C4A000
heap
page read and write
233B2000
heap
page read and write
E90000
heap
page read and write
15D1000
heap
page read and write
4980000
heap
page read and write
1BDD000
heap
page read and write
3F1E000
stack
page read and write
E96000
heap
page read and write
3CBB000
heap
page read and write
641000
unkown
page execute and write copy
1074000
heap
page read and write
4970000
direct allocation
page read and write
48B0000
trusted library allocation
page read and write
47B1000
heap
page read and write
E89000
heap
page read and write
1D2A0000
heap
page read and write
1B51000
heap
page read and write
16DF000
heap
page read and write
15DA000
heap
page read and write
5EF6000
heap
page read and write
421E000
stack
page read and write
E49000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1852000
heap
page read and write
15B0000
heap
page read and write
3810000
heap
page read and write
5040000
direct allocation
page execute and read and write
1776000
heap
page read and write
3E9E000
stack
page read and write
1522000
heap
page read and write
1C67E000
stack
page read and write
1D290000
heap
page read and write
1074000
heap
page read and write
1586000
heap
page read and write
F84000
heap
page read and write
1AC0000
heap
page read and write
23311000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
3C59000
heap
page read and write
47B1000
heap
page read and write
40DE000
stack
page read and write
61ED4000
direct allocation
page readonly
3DB7000
heap
page read and write
3B39000
heap
page read and write
1D1BF000
stack
page read and write
5FA0000
heap
page read and write
2B30000
direct allocation
page read and write
45DF000
stack
page read and write
4F5F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
2FEF000
stack
page read and write
461E000
stack
page read and write
61BE000
stack
page read and write
839000
unkown
page execute and read and write
4981000
heap
page read and write
6A9000
unkown
page read and write
39E0000
direct allocation
page execute and read and write
F84000
heap
page read and write
32DF000
stack
page read and write
1CDED000
stack
page read and write
CFE000
stack
page read and write
5020000
direct allocation
page execute and read and write
4FB0000
direct allocation
page execute and read and write
3C2B000
heap
page read and write
1568000
heap
page read and write
47D0000
heap
page read and write
499F000
stack
page read and write
815C000
stack
page read and write
6C5CD000
unkown
page readonly
3B6F000
heap
page read and write
720000
unkown
page readonly
641000
unkown
page execute and write copy
4DB0000
direct allocation
page execute and read and write
3B01000
heap
page read and write
42AF000
stack
page read and write
E9A000
heap
page read and write
2348B000
heap
page read and write
3D50000
heap
page read and write
7B1000
unkown
page execute and read and write
3BE4000
direct allocation
page execute and read and write
35DE000
stack
page read and write
4530000
direct allocation
page read and write
485F000
stack
page read and write
2346B000
heap
page read and write
F84000
heap
page read and write
16EF000
heap
page read and write
49A1000
heap
page read and write
6A9000
unkown
page read and write
103B000
heap
page read and write
47B1000
heap
page read and write
5F6C000
stack
page read and write
1621000
heap
page read and write
44DE000
stack
page read and write
31DE000
stack
page read and write
1630000
heap
page read and write
10C0000
direct allocation
page read and write
4AA0000
trusted library allocation
page read and write
23481000
heap
page read and write
3638B000
stack
page read and write
AF8000
unkown
page execute and read and write
F84000
heap
page read and write
1B3D000
heap
page read and write
5DD000
stack
page read and write
3B5E000
heap
page read and write
6A9000
unkown
page write copy
3924000
heap
page read and write
6C5E2000
unkown
page readonly
1614000
heap
page read and write
3BDC000
heap
page read and write
73C000
unkown
page readonly
3AF4000
heap
page read and write
1644000
heap
page read and write
171A000
heap
page read and write
16EE000
heap
page read and write
4E5E000
stack
page read and write
14E4000
heap
page read and write
173A000
heap
page read and write
3C18000
heap
page read and write
402F000
stack
page read and write
E9A000
heap
page read and write
18D0000
heap
page read and write
4B70000
direct allocation
page execute and read and write
95A000
unkown
page execute and write copy
15BB000
heap
page read and write
3D00000
heap
page read and write
20BE000
stack
page read and write
47B1000
heap
page read and write
47B1000
heap
page read and write
47B1000
heap
page read and write
157C000
heap
page read and write
2DDF000
stack
page read and write
3BD3000
direct allocation
page execute and read and write
10C0000
direct allocation
page read and write
38AF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
AF8000
unkown
page execute and read and write
23470000
heap
page read and write
47B1000
heap
page read and write
17F7000
stack
page read and write
3CA3000
heap
page read and write
957000
unkown
page execute and write copy
47B1000
heap
page read and write
4970000
direct allocation
page read and write
76C000
unkown
page write copy
15B0000
heap
page read and write
3CDF000
stack
page read and write
15A3000
heap
page read and write
172F000
heap
page read and write
5000000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
43DF000
stack
page read and write
331E000
stack
page read and write
18AD000
heap
page read and write
4E00000
direct allocation
page execute and read and write
3DED000
stack
page read and write
61E00000
direct allocation
page execute and read and write
23481000
heap
page read and write
1BC9000
heap
page read and write
94B000
unkown
page execute and read and write
F84000
heap
page read and write
3BDF000
stack
page read and write
3B20000
heap
page read and write
1ACE000
heap
page read and write
4B1F000
stack
page read and write
2B50000
heap
page read and write
23463000
heap
page read and write
2AAF000
stack
page read and write
E55000
heap
page read and write
1074000
heap
page read and write
957000
unkown
page execute and read and write
2348B000
heap
page read and write
4DBC000
stack
page read and write
EAF000
heap
page read and write
DDA000
heap
page read and write
E9C000
heap
page read and write
116E000
stack
page read and write
1CFBE000
stack
page read and write
F84000
heap
page read and write
192E000
stack
page read and write
47B1000
heap
page read and write
23470000
heap
page read and write
3C5E000
stack
page read and write
15C1000
heap
page read and write
16E9000
heap
page read and write
F84000
heap
page read and write
3DC0000
heap
page read and write
2B30000
direct allocation
page read and write
1838000
heap
page read and write
489E000
stack
page read and write
15CF000
heap
page read and write
2D9E000
stack
page read and write
10BE000
stack
page read and write
3FDD000
stack
page read and write
3D41000
heap
page read and write
4B60000
direct allocation
page execute and read and write
6A0000
unkown
page readonly
16DF000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
1726000
heap
page read and write
F84000
heap
page read and write
3D73000
heap
page read and write
4530000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
3BEE000
direct allocation
page execute and read and write
188F000
heap
page read and write
43AF000
stack
page read and write
23456000
heap
page read and write
4B40000
direct allocation
page execute and read and write
E96000
heap
page read and write
1C5F000
heap
page read and write
15D0000
heap
page read and write
401F000
stack
page read and write
3D64000
heap
page read and write
14F0000
heap
page read and write
959000
unkown
page execute and read and write
3C00000
heap
page read and write
445F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
1949000
heap
page read and write
4530000
direct allocation
page read and write
E31000
heap
page read and write
1517000
heap
page read and write
3A5F000
stack
page read and write
23468000
heap
page read and write
26B000
stack
page read and write
1074000
heap
page read and write
2346E000
heap
page read and write
BF0000
heap
page read and write
1470000
heap
page read and write
29DE000
stack
page read and write
1561000
heap
page read and write
17C6000
heap
page read and write
BF0000
heap
page read and write
47B1000
heap
page read and write
6AB000
unkown
page execute and read and write
3800000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
5EF5000
heap
page read and write
95A000
unkown
page execute and write copy
14E4000
heap
page read and write
774000
unkown
page readonly
47B1000
heap
page read and write
173F000
heap
page read and write
2AEC000
stack
page read and write
18A0000
heap
page read and write
2348F000
heap
page read and write
4A1E000
stack
page read and write
3DD3000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
1919000
heap
page read and write
521E000
stack
page read and write
47B1000
heap
page read and write
10E0000
direct allocation
page read and write
890000
heap
page read and write
23468000
heap
page read and write
3D95000
heap
page read and write
1074000
heap
page read and write
3A3E000
stack
page read and write
E30000
heap
page read and write
4530000
direct allocation
page read and write
425E000
stack
page read and write
916000
unkown
page execute and read and write
509F000
stack
page read and write
1618000
heap
page read and write
301E000
stack
page read and write
3DE0000
heap
page read and write
1074000
heap
page read and write
1D9E000
stack
page read and write
17BA000
heap
page read and write
640000
unkown
page readonly
23456000
heap
page read and write
151D000
heap
page read and write
150C000
heap
page read and write
B1C000
unkown
page execute and read and write
3A60000
direct allocation
page execute and read and write
E6F000
heap
page read and write
329E000
stack
page read and write
4541000
heap
page read and write
4010000
heap
page read and write
1621000
heap
page read and write
47C0000
heap
page read and write
3BA9000
heap
page read and write
13AB000
stack
page read and write
47B1000
heap
page read and write
395E000
stack
page read and write
2FDF000
stack
page read and write
47B1000
heap
page read and write
F84000
heap
page read and write
1BC7000
heap
page read and write
47B1000
heap
page read and write
3D4D000
heap
page read and write
3D9000
unkown
page write copy
1809000
heap
page read and write
47B1000
heap
page read and write
E00000
heap
page read and write
47B1000
heap
page read and write
640000
unkown
page read and write
2B50000
direct allocation
page read and write
16FA000
heap
page read and write
299F000
stack
page read and write
23468000
heap
page read and write
2F757000
heap
page read and write
47B1000
heap
page read and write
2B6D000
heap
page read and write
10C0000
direct allocation
page read and write
E98000
heap
page read and write
2346B000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
186D000
heap
page read and write
E2B000
heap
page read and write
47B1000
heap
page read and write
2348B000
heap
page read and write
4BF0000
heap
page read and write
15AC000
heap
page read and write
4E5E000
stack
page read and write
187D000
heap
page read and write
23481000
heap
page read and write
6C78F000
unkown
page readonly
1074000
heap
page read and write
E16000
heap
page read and write
47B1000
heap
page read and write
174A000
heap
page read and write
531F000
stack
page read and write
EAF000
heap
page read and write
17CF000
heap
page read and write
94B000
unkown
page execute and read and write
10F7000
heap
page read and write
1751000
heap
page read and write
F84000
heap
page read and write
185B000
heap
page read and write
376F000
stack
page read and write
171B000
heap
page read and write
1074000
heap
page read and write
449E000
stack
page read and write
4D24000
heap
page read and write
1074000
heap
page read and write
47B1000
heap
page read and write
569000
unkown
page execute and read and write
F84000
heap
page read and write
1737000
heap
page read and write
6C7D5000
unkown
page readonly
319F000
stack
page read and write
D8E000
stack
page read and write
429F000
stack
page read and write
5010000
direct allocation
page execute and read and write
82BC000
heap
page read and write
3BD4000
direct allocation
page execute and read and write
1789000
heap
page read and write
117E000
unkown
page execute and read and write
15BF000
heap
page read and write
E65000
heap
page read and write
117B000
unkown
page execute and write copy
4F9E000
stack
page read and write
3F9E000
stack
page read and write
762000
unkown
page readonly
5F3E000
stack
page read and write
6C551000
unkown
page execute read
3F5E000
stack
page read and write
2F75D000
heap
page read and write
2348F000
heap
page read and write
3BFC000
heap
page read and write
23481000
heap
page read and write
3C59000
heap
page read and write
E8F000
heap
page read and write
3EEF000
stack
page read and write
3BF9000
heap
page read and write
286F000
stack
page read and write
3C9E000
stack
page read and write
3CFE000
stack
page read and write
159A000
heap
page read and write
4B69000
stack
page read and write
E96000
heap
page read and write
416F000
stack
page read and write
349E000
stack
page read and write
691E000
heap
page read and write
47B1000
heap
page read and write
1518000
heap
page read and write
1CF7E000
stack
page read and write
47B1000
heap
page read and write
3D23000
heap
page read and write
997000
heap
page read and write
50DE000
stack
page read and write
158B000
heap
page read and write
1681000
heap
page read and write
15C4000
heap
page read and write
DDE000
heap
page read and write
3EDE000
stack
page read and write
1801000
heap
page read and write
780000
unkown
page execute and read and write
6A1000
unkown
page execute read
164C000
heap
page read and write
4E71000
direct allocation
page read and write
7EFB0000
direct allocation
page execute and read and write
15B3000
heap
page read and write
1622000
heap
page read and write
1737000
heap
page read and write
1475000
heap
page read and write
6AB000
unkown
page execute and read and write
1751000
heap
page read and write
18A0000
heap
page read and write
4970000
direct allocation
page read and write
140E000
stack
page read and write
7F8000
unkown
page execute and read and write
6920000
heap
page read and write
3BDC000
heap
page read and write
7CC000
unkown
page execute and write copy
DD0000
heap
page read and write
990000
heap
page read and write
3DEE000
direct allocation
page execute and read and write
47B1000
heap
page read and write
3BE4000
direct allocation
page execute and read and write
191B000
heap
page read and write
2B6B000
heap
page read and write
1681000
heap
page read and write
2346E000
heap
page read and write
689000
unkown
page execute and write copy
1896000
heap
page read and write
6911000
heap
page read and write
9EC000
unkown
page execute and write copy
4970000
direct allocation
page read and write
144E000
stack
page read and write
16CD000
heap
page read and write
183C000
stack
page read and write
1C4A000
heap
page read and write
3B1F000
heap
page read and write
1070000
heap
page read and write
82BA000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
82BA000
heap
page read and write
1850000
heap
page read and write
3B1F000
stack
page read and write
17FC000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
3BFC000
heap
page read and write
6C7CE000
unkown
page read and write
2F74F000
heap
page read and write
47B1000
heap
page read and write
16DF000
heap
page read and write
23470000
heap
page read and write
819E000
stack
page read and write
1621000
heap
page read and write
3C50000
heap
page read and write
4970000
direct allocation
page read and write
3D85000
heap
page read and write
828000
unkown
page execute and read and write
1B24000
heap
page read and write
95C000
unkown
page execute and write copy
43EF000
stack
page read and write
33EE000
stack
page read and write
3CCC000
heap
page read and write
F84000
heap
page read and write
127F000
stack
page read and write
3B00000
heap
page read and write
182F000
heap
page read and write
37DF000
stack
page read and write
4970000
direct allocation
page read and write
23468000
heap
page read and write
4F80000
direct allocation
page execute and read and write
126F000
stack
page read and write
1CD7E000
stack
page read and write
F44000
heap
page read and write
3D23000
heap
page read and write
AFA000
unkown
page execute and write copy
640000
unkown
page read and write
959000
unkown
page execute and write copy
47B1000
heap
page read and write
171E000
heap
page read and write
1627000
heap
page read and write
1CBEF000
stack
page read and write
E90000
heap
page read and write
F84000
heap
page read and write
73C000
unkown
page execute and write copy
4B80000
direct allocation
page execute and read and write
15FD000
heap
page read and write
4530000
direct allocation
page read and write
3B4C000
heap
page read and write
1BE3000
heap
page read and write
1967000
heap
page read and write
3BA2000
heap
page read and write
829E000
stack
page read and write
3D8E000
heap
page read and write
942000
unkown
page execute and read and write
1C87000
heap
page read and write
15B0000
heap
page read and write
2B9E000
stack
page read and write
3DE4000
direct allocation
page execute and read and write
2B30000
direct allocation
page read and write
F84000
heap
page read and write
406E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
326F000
stack
page read and write
61E01000
direct allocation
page execute read
1621000
heap
page read and write
3CA0000
heap
page read and write
16C2000
heap
page read and write
1C6BE000
stack
page read and write
42DE000
stack
page read and write
1C8FE000
stack
page read and write
370000
unkown
page readonly
F40000
heap
page read and write
2346E000
heap
page read and write
2348E000
heap
page read and write
3DEE000
direct allocation
page execute and read and write
1074000
heap
page read and write
15E9000
heap
page read and write
10C0000
direct allocation
page read and write
31DF000
stack
page read and write
F84000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
EDA000
unkown
page execute and read and write
47B1000
heap
page read and write
617F000
stack
page read and write
1C27000
heap
page read and write
8FA000
unkown
page execute and read and write
2348F000
heap
page read and write
1520000
heap
page read and write
2B30000
direct allocation
page read and write
12F0000
heap
page read and write
2346B000
heap
page read and write
10C0000
direct allocation
page read and write
16B0000
heap
page read and write
1573000
heap
page read and write
6A9000
unkown
page write copy
15BB000
heap
page read and write
4184000
heap
page read and write
4E10000
direct allocation
page execute and read and write
9E7000
unkown
page execute and write copy
2B30000
direct allocation
page read and write
E9A000
heap
page read and write
3D9F000
stack
page read and write
F84000
heap
page read and write
2890000
heap
page read and write
1681000
heap
page read and write
2C6F000
stack
page read and write
4DC000
stack
page read and write
47B1000
heap
page read and write
14ED000
heap
page read and write
47B1000
heap
page read and write
4D90000
direct allocation
page execute and read and write
47B1000
heap
page read and write
15C8000
heap
page read and write
1682000
heap
page read and write
37AE000
stack
page read and write
3DA0000
direct allocation
page execute and read and write
47B1000
heap
page read and write
47B1000
heap
page read and write
1862000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
3B60000
direct allocation
page execute and read and write
F44000
heap
page read and write
6C5F1000
unkown
page execute read
945000
unkown
page execute and read and write
4D6F000
stack
page read and write
4F70000
direct allocation
page execute and read and write
17BA000
heap
page read and write
1C5EF000
stack
page read and write
2CDE000
stack
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
47B1000
heap
page read and write
F84000
heap
page read and write
3C1E000
stack
page read and write
1BAC000
heap
page read and write
1560000
heap
page read and write
3B2F000
stack
page read and write
2E9F000
stack
page read and write
33DE000
stack
page read and write
F44000
heap
page read and write
181D000
heap
page read and write
10E0000
direct allocation
page read and write
2B30000
direct allocation
page read and write
10C0000
direct allocation
page read and write
3D8F000
heap
page read and write
3DEB000
heap
page read and write
7EEC000
stack
page read and write
1690000
heap
page read and write
1074000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
3DB000
unkown
page execute and read and write
1864000
heap
page read and write
2B67000
heap
page read and write
23463000
heap
page read and write
3BDC000
heap
page read and write
47B1000
heap
page read and write
16BF000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
6C5F0000
unkown
page readonly
10C0000
direct allocation
page read and write
1BC4000
heap
page read and write
151D000
heap
page read and write
770000
unkown
page write copy
A8C000
unkown
page execute and read and write
58DD000
stack
page read and write
3D10000
heap
page read and write
3D19000
heap
page read and write
47B1000
heap
page read and write
9E7000
unkown
page execute and read and write
EFD000
stack
page read and write
3B6E000
stack
page read and write
1060000
heap
page read and write
F84000
heap
page read and write
47B1000
heap
page read and write
47B1000
heap
page read and write
4541000
heap
page read and write
F44000
heap
page read and write
4530000
direct allocation
page read and write
47B1000
heap
page read and write
1518000
heap
page read and write
23466000
heap
page read and write
E4A000
unkown
page execute and read and write
3DC0000
heap
page read and write
47B1000
heap
page read and write
3F2E000
stack
page read and write
1839000
heap
page read and write
3BE4000
direct allocation
page execute and read and write
EB2000
heap
page read and write
1777000
heap
page read and write
4175000
heap
page read and write
47B1000
heap
page read and write
3C3C000
heap
page read and write
2B30000
direct allocation
page read and write
486E000
stack
page read and write
6C550000
unkown
page readonly
171A000
heap
page read and write
3C32000
heap
page read and write
2DAE000
stack
page read and write
11CE000
stack
page read and write
4D3E000
stack
page read and write
4530000
direct allocation
page read and write
49D0000
direct allocation
page read and write
3B30000
heap
page read and write
157D000
heap
page read and write
997000
heap
page read and write
23468000
heap
page read and write
2F4AE000
stack
page read and write
3B88000
heap
page read and write
2F757000
heap
page read and write
17A6000
heap
page read and write
4EAE000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
1820000
heap
page read and write
1074000
heap
page read and write
10EB000
unkown
page execute and write copy
1A70000
direct allocation
page execute and read and write
55DD000
stack
page read and write
3D00000
heap
page read and write
3DEC000
heap
page read and write
49D0000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
1810000
heap
page read and write
371000
unkown
page execute and write copy
4B60000
direct allocation
page execute and read and write
82A000
unkown
page execute and write copy
3B0A000
heap
page read and write
E8F000
heap
page read and write
5030000
direct allocation
page execute and read and write
F84000
heap
page read and write
AFA000
unkown
page execute and write copy
970000
heap
page read and write
E96000
heap
page read and write
16BF000
heap
page read and write
9EC000
unkown
page execute and read and write
1450000
heap
page read and write
475F000
stack
page read and write
2346E000
heap
page read and write
959000
unkown
page execute and write copy
1C5D000
heap
page read and write
359E000
stack
page read and write
23481000
heap
page read and write
1814000
heap
page read and write
6C7D0000
unkown
page read and write
3C3E000
heap
page read and write
561E000
stack
page read and write
1030000
heap
page read and write
159A000
heap
page read and write
39DF000
stack
page read and write
2B30000
direct allocation
page read and write
4FA0000
direct allocation
page execute and read and write
1763000
heap
page read and write
17F8000
heap
page read and write
23467000
heap
page read and write
4530000
direct allocation
page read and write
3D32000
heap
page read and write
1C8BF000
stack
page read and write
15BB000
heap
page read and write
F5E000
stack
page read and write
16DF000
heap
page read and write
538E000
stack
page read and write
959000
unkown
page execute and read and write
10C0000
direct allocation
page read and write
959000
unkown
page execute and read and write
AFA000
unkown
page execute and write copy
7B0000
unkown
page readonly
475E000
stack
page read and write
3DDE000
stack
page read and write
315E000
stack
page read and write
78C000
unkown
page execute and read and write
7CB0000
heap
page read and write
3D59000
heap
page read and write
435E000
stack
page read and write
14E3000
heap
page read and write
1570000
heap
page read and write
155E000
heap
page read and write
16F9000
heap
page read and write
3BEE000
heap
page read and write
1814000
heap
page read and write
640000
unkown
page read and write
E96000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
571C000
stack
page read and write
1586000
heap
page read and write
1C9EF000
stack
page read and write
186B000
heap
page read and write
57DD000
stack
page read and write
47B1000
heap
page read and write
762000
unkown
page readonly
3B0C000
heap
page read and write
1C43F000
stack
page read and write
442E000
stack
page read and write
14E4000
heap
page read and write
73C000
unkown
page readonly
61ECD000
direct allocation
page readonly
1730000
heap
page read and write
3C9E000
stack
page read and write
3D73000
heap
page read and write
F44000
heap
page read and write
2A4E000
stack
page read and write
4E50000
direct allocation
page execute and read and write
355F000
stack
page read and write
4970000
direct allocation
page read and write
2B50000
direct allocation
page read and write
F84000
heap
page read and write
16BF000
heap
page read and write
10EE000
unkown
page execute and read and write
839000
unkown
page execute and read and write
2C9F000
stack
page read and write
321E000
stack
page read and write
2F5E000
stack
page read and write
F44000
heap
page read and write
23475000
heap
page read and write
47B1000
heap
page read and write
61ED3000
direct allocation
page read and write
7D4000
unkown
page execute and write copy
156B000
heap
page read and write
E89000
stack
page read and write
4F70000
direct allocation
page execute and read and write
439E000
stack
page read and write
3B9F000
stack
page read and write
9D5000
unkown
page execute and read and write
2F5F000
stack
page read and write
3658C000
stack
page read and write
1852000
heap
page read and write
1832000
stack
page read and write
47B1000
heap
page read and write
3B55000
heap
page read and write
E6F000
heap
page read and write
47B1000
heap
page read and write
3ADE000
stack
page read and write
52EE000
stack
page read and write
456E000
stack
page read and write
2B30000
direct allocation
page read and write
10C0000
direct allocation
page read and write
23463000
heap
page read and write
47B1000
heap
page read and write
2346A000
heap
page read and write
3D5E000
stack
page read and write
E48000
heap
page read and write
94B000
unkown
page execute and read and write
4970000
direct allocation
page read and write
959000
unkown
page execute and write copy
4DF0000
direct allocation
page execute and read and write
There are 1438 hidden memdumps, click here to show them.