IOC Report
So7a8eQerR.exe

loading gif

Files

File Path
Type
Category
Malicious
So7a8eQerR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\37664d9843.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\586ef238b2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\CBFIIEHJDB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\BAFCGIJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CAAKKFHCFIECAAAKEGCF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\CAFIEBKKJJDAKFHIDBFH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFCBFBGDBKJKECAAKKFHDBFHII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGHCBAAEHCFIDGDHJEHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBGIDGCAFCBKECAAKJJKJEHDGC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECBGCGCGIEGCBFHIIEBF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\FCBAEHCAEGDHJKFHJKFIJKJEGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\GCGHCBKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCAAEGIJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HDGCAAFB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIDAFHDHCBGDGCBGCGII
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIDAFHDHCBGDGCBGCGIIEHIDBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JKFHIIEHIEGDHJJJKFIIIIDGID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KEHDBAEGIIIEBGCAAFHIDHDBFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\So7a8eQerR.exe
"C:\Users\user\Desktop\So7a8eQerR.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\37664d9843.exe
"C:\Users\user\AppData\Local\Temp\1000006001\37664d9843.exe"
malicious
C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe
"C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000006001\586ef238b2.exe
"C:\Users\user\AppData\Local\Temp\1000006001\586ef238b2.exe"
malicious
C:\Users\user\AppData\Local\Temp\CBFIIEHJDB.exe
"C:\Users\user\AppData\Local\Temp\CBFIIEHJDB.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\CFCBKKKJJJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\CBFIIEHJDB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\AAFIIJDAAA.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.30/69934896f997d5bb/softokn3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/freebl3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.30/69934896f997d5bb/nss3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/sqlite3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.30/69934896f997d5bb/vcruntime140.dll
85.28.47.30
malicious
http://85.28.47.30/
unknown
malicious
http://85.28.47.30/920475a59bac849d.php
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/msvcp140.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/mozglue.dll
85.28.47.30
malicious
http://85.28.47.30
unknown
malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://77.91.77.82/Hun4Ko/index.phpQ
unknown
http://85.28.47.30/69934896f997d5bb/softokn3.dllVr7
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://85.28.47.30/69934896f997d5bb/freebl3.dll=
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dllk
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://77.91.77.82/Hun4Ko/index.phpT9x-%
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dlls
unknown
http://77.91.77.82/Hun4Ko/index.phpIR
unknown
http://77.91.77.82/Hun4Ko/index.php(9
unknown
http://77.91.77.82/Hun4Ko/index.phpR&
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://77.91.77.82/Hun4Ko/index.phpmespace
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dll;W
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://77.91.77.82/Hun4Ko/index.php=
unknown
http://85.28.47.30/69934896f997d5bb/sqlite3.dllK
unknown
http://85.28.47.30/69934896f997d5bb/vcruntime140.dll3
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://85.28.47.30/920475a59bac849d.phpW
unknown
http://www.sqlite.org/copyright.html.
unknown
https://cdn.epnacl
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.82/Hun4Ko/index.php3693405117-2476756634-1002
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dllzW
unknown
http://85.28.47.30/69934896f997d5bb/msvcp140.dll.s/
unknown
http://77.91.77.81/stealc/random.exe
77.91.77.81
http://77.91.77.81/cost/go.exeData
unknown
http://77.91.77.81/cost/go.exe00
unknown
http://77.91.77.81/mine/amadka.exea
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpGRJ
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://77.91.77.82/Hun4Ko/index.phpkR&
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://85.28.47.30/69934896f997d5bb/softokn3.dllq
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://77.91.77.82/Hun4Ko/index.phpaR(
unknown
https://cdn.ep
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.81/stealc/random.exeH
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://85.28.47.30/69934896f997d5bb/msvcp140.dllvs
unknown
http://77.91.77.82/Hun4Ko/index.php3R~
unknown
https://support.mozilla.org
unknown
http://77.91.77.81/mine/amadka.exe.phpefoxx
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 66 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.30
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
5C1000
unkown
page execute and read and write
malicious
CE1000
unkown
page execute and read and write
malicious
5120000
direct allocation
page read and write
malicious
51D0000
direct allocation
page read and write
malicious
51F0000
direct allocation
page read and write
malicious
1745000
heap
page read and write
malicious
201000
unkown
page execute and read and write
malicious
48D0000
direct allocation
page read and write
malicious
251000
unkown
page execute and read and write
malicious
5C1000
unkown
page execute and read and write
malicious
5110000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
5C1000
unkown
page execute and read and write
malicious
951000
unkown
page execute and read and write
malicious
AA1000
unkown
page execute and read and write
malicious
1EDE000
heap
page read and write
malicious
7EE40000
direct allocation
page execute and read and write
FA4000
heap
page read and write
3F0E000
stack
page read and write
1D7D0000
heap
page read and write
3F0E000
stack
page read and write
1CD01000
heap
page read and write
4430000
heap
page read and write
22DAD000
heap
page read and write
4D41000
heap
page read and write
1430000
direct allocation
page read and write
143D000
heap
page read and write
5380000
direct allocation
page execute and read and write
300F000
stack
page read and write
4901000
heap
page read and write
1204000
heap
page read and write
58E000
stack
page read and write
2FB0000
direct allocation
page read and write
13FC000
stack
page read and write
4C91000
heap
page read and write
5360000
direct allocation
page execute and read and write
4C91000
heap
page read and write
1430000
direct allocation
page read and write
1550000
heap
page read and write
8C2000
unkown
page execute and write copy
4B0E000
stack
page read and write
2387D000
heap
page read and write
434F000
stack
page read and write
54AC000
stack
page read and write
1440000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4C91000
heap
page read and write
2650000
heap
page read and write
545000
heap
page read and write
877E000
stack
page read and write
1430000
direct allocation
page read and write
3674000
direct allocation
page execute and read and write
3CDE000
stack
page read and write
3A1F000
stack
page read and write
3DCE000
stack
page read and write
39CF000
stack
page read and write
22DAD000
heap
page read and write
4C91000
heap
page read and write
4D41000
heap
page read and write
23860000
heap
page read and write
5380000
direct allocation
page execute and read and write
5BCD000
stack
page read and write
400F000
stack
page read and write
3C0E000
stack
page read and write
5120000
direct allocation
page read and write
1380000
heap
page read and write
116D000
stack
page read and write
521B000
stack
page read and write
5280000
direct allocation
page execute and read and write
1384000
heap
page read and write
22D9F000
heap
page read and write
490E000
stack
page read and write
D04000
unkown
page execute and write copy
4C91000
heap
page read and write
13A0000
direct allocation
page read and write
1413000
heap
page read and write
35BE000
stack
page read and write
2020000
heap
page read and write
2387A000
heap
page read and write
1384000
heap
page read and write
F05000
unkown
page execute and read and write
5C1000
unkown
page execute and write copy
248000
unkown
page execute and read and write
43C000
unkown
page execute and read and write
142F000
heap
page read and write
34A000
unkown
page execute and read and write
487E000
stack
page read and write
6C050000
unkown
page readonly
3C9F000
stack
page read and write
2A1E000
stack
page read and write
2386F000
heap
page read and write
510000
unkown
page execute and read and write
4D41000
heap
page read and write
2386A000
heap
page read and write
4C91000
heap
page read and write
19D0000
heap
page read and write
2FEF000
stack
page read and write
4B4F000
stack
page read and write
3BCF000
stack
page read and write
66C0000
heap
page read and write
5120000
direct allocation
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
23856000
heap
page read and write
4D41000
heap
page read and write
4901000
heap
page read and write
C10000
unkown
page execute and read and write
531F000
stack
page read and write
4C91000
heap
page read and write
53B0000
direct allocation
page execute and read and write
118A000
heap
page read and write
4A60000
direct allocation
page execute and read and write
951000
unkown
page execute and write copy
9B9000
unkown
page read and write
3630000
direct allocation
page execute and read and write
1430000
direct allocation
page read and write
5310000
direct allocation
page execute and read and write
1384000
heap
page read and write
4C91000
heap
page read and write
1453000
heap
page read and write
4901000
heap
page read and write
13A0000
direct allocation
page read and write
1384000
heap
page read and write
1DFC000
stack
page read and write
1F1A000
heap
page read and write
350E000
stack
page read and write
364E000
stack
page read and write
13EE000
heap
page read and write
420F000
stack
page read and write
3080C000
stack
page read and write
4C91000
heap
page read and write
AA1000
unkown
page execute and write copy
3FBE000
stack
page read and write
365F000
stack
page read and write
4420000
direct allocation
page read and write
D86000
unkown
page execute and read and write
5370000
direct allocation
page execute and read and write
378E000
stack
page read and write
490E000
stack
page read and write
43CE000
stack
page read and write
4C91000
heap
page read and write
4D41000
heap
page read and write
460E000
stack
page read and write
3D50000
direct allocation
page execute and read and write
5C1000
unkown
page execute and write copy
B0B000
unkown
page execute and read and write
23846000
heap
page read and write
5310000
direct allocation
page execute and read and write
4880000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
439D000
stack
page read and write
143E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
3D8F000
stack
page read and write
3BFE000
stack
page read and write
4C91000
heap
page read and write
23840000
heap
page read and write
13EC000
heap
page read and write
2387D000
heap
page read and write
514E000
stack
page read and write
7070000
heap
page read and write
4D3F000
stack
page read and write
2387D000
heap
page read and write
5C0000
unkown
page readonly
172A000
heap
page read and write
1384000
heap
page read and write
23858000
heap
page read and write
328E000
stack
page read and write
1430000
direct allocation
page read and write
16F0000
direct allocation
page execute and read and write
1384000
heap
page read and write
1DF3000
stack
page read and write
47CE000
stack
page read and write
53E0000
direct allocation
page execute and read and write
37DE000
stack
page read and write
4D41000
heap
page read and write
A9E000
stack
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
4870000
heap
page read and write
442E000
stack
page read and write
28EAD000
heap
page read and write
3F7F000
stack
page read and write
FA4000
heap
page read and write
22DAD000
heap
page read and write
5C0000
unkown
page read and write
3FE0000
heap
page read and write
383E000
stack
page read and write
22D9F000
heap
page read and write
23860000
heap
page read and write
1427000
heap
page read and write
2059000
heap
page read and write
FA4000
heap
page read and write
49BE000
stack
page read and write
52A0000
direct allocation
page execute and read and write
357F000
stack
page read and write
554E000
stack
page read and write
2EE0000
direct allocation
page read and write
4D41000
heap
page read and write
FE0000
heap
page read and write
4D50000
direct allocation
page read and write
4D50000
direct allocation
page read and write
1066000
unkown
page execute and read and write
4C91000
heap
page read and write
2B27000
heap
page read and write
2387D000
heap
page read and write
4EDF000
stack
page read and write
352E000
stack
page read and write
4D41000
heap
page read and write
34AC000
heap
page read and write
414F000
stack
page read and write
438E000
stack
page read and write
23860000
heap
page read and write
1445000
heap
page read and write
22DAD000
heap
page read and write
4C91000
heap
page read and write
22D90000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4D50000
direct allocation
page read and write
45BF000
stack
page read and write
388F000
stack
page read and write
1C66F000
stack
page read and write
E9B000
stack
page read and write
30C4D000
stack
page read and write
4D41000
heap
page read and write
3FCE000
stack
page read and write
4C91000
heap
page read and write
4A60000
direct allocation
page execute and read and write
4F40000
direct allocation
page execute and read and write
629000
unkown
page read and write
53A0000
direct allocation
page execute and read and write
2EDF000
stack
page read and write
4420000
direct allocation
page read and write
13F8000
stack
page read and write
FA4000
heap
page read and write
7A4000
unkown
page execute and read and write
41DE000
stack
page read and write
F4C000
stack
page read and write
88EC000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
B09000
unkown
page read and write
2F90000
heap
page read and write
48F0000
direct allocation
page read and write
341E000
stack
page read and write
389E000
stack
page read and write
F34000
unkown
page execute and read and write
1720000
heap
page read and write
23944000
heap
page read and write
5280000
direct allocation
page execute and read and write
3A7F000
stack
page read and write
3F8F000
stack
page read and write
CE0000
unkown
page readonly
1384000
heap
page read and write
4B8E000
stack
page read and write
36CF000
stack
page read and write
29BC1000
heap
page read and write
144A000
heap
page read and write
23875000
heap
page read and write
4C91000
heap
page read and write
3F5E000
stack
page read and write
4D41000
heap
page read and write
2EE0000
direct allocation
page read and write
4AA0000
direct allocation
page execute and read and write
C43000
unkown
page execute and read and write
2387D000
heap
page read and write
4C91000
heap
page read and write
470F000
stack
page read and write
1384000
heap
page read and write
393E000
stack
page read and write
43CF000
stack
page read and write
22D90000
heap
page read and write
4A90000
direct allocation
page execute and read and write
320E000
stack
page read and write
48F0000
direct allocation
page read and write
2386D000
heap
page read and write
61ED4000
direct allocation
page readonly
22D8D000
heap
page read and write
6E4000
unkown
page execute and read and write
1384000
heap
page read and write
23854000
heap
page read and write
61E01000
direct allocation
page execute read
3D4E000
stack
page read and write
3ECF000
stack
page read and write
5E8E000
stack
page read and write
22D88000
heap
page read and write
30A4B000
stack
page read and write
22D76000
heap
page read and write
FD0000
heap
page read and write
4000000
heap
page read and write
4A4E000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
22D90000
heap
page read and write
3FDF000
stack
page read and write
DA3000
unkown
page execute and write copy
4D41000
heap
page read and write
66C5000
heap
page read and write
1420000
heap
page read and write
4420000
direct allocation
page read and write
61E01000
direct allocation
page execute read
4C91000
heap
page read and write
4C91000
heap
page read and write
9B2000
unkown
page execute and read and write
2C9E000
stack
page read and write
4D41000
heap
page read and write
48CF000
stack
page read and write
4420000
direct allocation
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
110F000
stack
page read and write
468E000
stack
page read and write
48F0000
direct allocation
page read and write
384E000
stack
page read and write
1204000
heap
page read and write
4D50000
direct allocation
page read and write
22D8D000
heap
page read and write
23860000
heap
page read and write
22D8D000
heap
page read and write
2FB0000
direct allocation
page read and write
52B0000
direct allocation
page execute and read and write
2385D000
heap
page read and write
143C000
heap
page read and write
5320000
direct allocation
page execute and read and write
694E000
stack
page read and write
4C91000
heap
page read and write
16B9000
unkown
page execute and write copy
397E000
stack
page read and write
1384000
heap
page read and write
5360000
direct allocation
page execute and read and write
344F000
stack
page read and write
41DF000
stack
page read and write
880000
unkown
page execute and read and write
7F820000
direct allocation
page execute and read and write
C84000
unkown
page execute and read and write
23853000
heap
page read and write
51D0000
direct allocation
page read and write
2FB0000
direct allocation
page read and write
23860000
heap
page read and write
4C91000
heap
page read and write
3CAE000
stack
page read and write
3FC3000
heap
page read and write
5370000
direct allocation
page execute and read and write
680E000
stack
page read and write
4C91000
heap
page read and write
22DAD000
heap
page read and write
22D88000
heap
page read and write
3E3F000
stack
page read and write
2386F000
heap
page read and write
289F000
stack
page read and write
4C91000
heap
page read and write
14F3000
heap
page read and write
4C91000
heap
page read and write
48F0000
direct allocation
page read and write
4C91000
heap
page read and write
3A0E000
stack
page read and write
23853000
heap
page read and write
4D90000
direct allocation
page read and write
61EB4000
direct allocation
page read and write
2C2F000
stack
page read and write
4420000
direct allocation
page read and write
13A0000
direct allocation
page read and write
4C91000
heap
page read and write
380F000
stack
page read and write
448F000
stack
page read and write
5410000
direct allocation
page execute and read and write
4D50000
direct allocation
page read and write
2630000
heap
page read and write
22D9F000
heap
page read and write
362F000
stack
page read and write
3E0C000
heap
page read and write
374F000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4D41000
heap
page read and write
6C0E2000
unkown
page readonly
4FB0000
direct allocation
page execute and read and write
E50000
heap
page read and write
1384000
heap
page read and write
13A0000
direct allocation
page read and write
4C91000
heap
page read and write
239E000
stack
page read and write
5120000
direct allocation
page read and write
6C2D5000
unkown
page readonly
2387D000
heap
page read and write
22D88000
heap
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
62B000
unkown
page execute and read and write
4C91000
heap
page read and write
53F0000
direct allocation
page execute and read and write
F36000
unkown
page execute and write copy
4A0F000
stack
page read and write
2FB0000
direct allocation
page read and write
250000
unkown
page readonly
526F000
stack
page read and write
468E000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4C91000
heap
page read and write
14B8000
heap
page read and write
22D9F000
heap
page read and write
200000
unkown
page readonly
59E000
heap
page read and write
3D40000
heap
page read and write
1430000
direct allocation
page read and write
42EE000
stack
page read and write
450F000
stack
page read and write
134E000
heap
page read and write
4C91000
heap
page read and write
4900000
heap
page read and write
5250000
direct allocation
page execute and read and write
1CA6D000
stack
page read and write
312F000
stack
page read and write
4D41000
heap
page read and write
1390000
heap
page read and write
16BC000
unkown
page execute and read and write
3663000
direct allocation
page execute and read and write
1384000
heap
page read and write
48F0000
direct allocation
page read and write
4D41000
heap
page read and write
34B0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
8C2000
unkown
page execute and read and write
34CF000
stack
page read and write
3620000
heap
page read and write
141B000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
52B0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
23860000
heap
page read and write
48F0000
direct allocation
page read and write
2076000
heap
page read and write
6C2D5000
unkown
page readonly
2B20000
heap
page read and write
4A70000
direct allocation
page execute and read and write
11D0000
heap
page read and write
41B4000
direct allocation
page execute and read and write
450F000
stack
page read and write
137E000
heap
page read and write
262E000
stack
page read and write
4C91000
heap
page read and write
39EF000
stack
page read and write
4D41000
heap
page read and write
51F0000
direct allocation
page read and write
933000
unkown
page execute and read and write
4A80000
direct allocation
page execute and read and write
1204000
heap
page read and write
2F8F000
stack
page read and write
106C000
stack
page read and write
4D41000
heap
page read and write
35CE000
stack
page read and write
D93000
unkown
page execute and read and write
4A0F000
stack
page read and write
1799000
heap
page read and write
1160000
heap
page read and write
A56000
unkown
page execute and write copy
22DAD000
heap
page read and write
629000
unkown
page write copy
464F000
stack
page read and write
DA2000
unkown
page execute and write copy
61ED3000
direct allocation
page read and write
107B000
stack
page read and write
177E000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
2FC0000
heap
page read and write
14B0000
heap
page read and write
478F000
stack
page read and write
1710000
heap
page read and write
1384000
heap
page read and write
C53000
unkown
page execute and write copy
4C91000
heap
page read and write
1384000
heap
page read and write
23858000
heap
page read and write
6C2CE000
unkown
page read and write
2078000
heap
page read and write
4D41000
heap
page read and write
1502000
heap
page read and write
1150000
heap
page read and write
3FF0000
heap
page read and write
2387D000
heap
page read and write
5CCC000
stack
page read and write
553000
unkown
page execute and write copy
622000
unkown
page execute and read and write
431E000
stack
page read and write
4C91000
heap
page read and write
1204000
heap
page read and write
1DF8000
stack
page read and write
8AC000
unkown
page execute and read and write
1F91000
heap
page read and write
4D50000
heap
page read and write
1436000
heap
page read and write
22DAD000
heap
page read and write
324F000
stack
page read and write
4C91000
heap
page read and write
FB0000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
454E000
stack
page read and write
3330000
direct allocation
page execute and read and write
4C4E000
stack
page read and write
629000
unkown
page read and write
8C2000
unkown
page execute and read and write
347F000
stack
page read and write
1413000
heap
page read and write
2C6E000
stack
page read and write
4D41000
heap
page read and write
46AE000
stack
page read and write
23856000
heap
page read and write
5D8D000
stack
page read and write
61EB7000
direct allocation
page readonly
370E000
stack
page read and write
FA4000
heap
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
5504000
heap
page read and write
15AF000
stack
page read and write
134A000
heap
page read and write
615000
unkown
page execute and read and write
418E000
stack
page read and write
18C7000
heap
page read and write
326F000
stack
page read and write
2EAF000
stack
page read and write
2FB0000
direct allocation
page read and write
2F47000
heap
page read and write
23875000
heap
page read and write
F6C000
stack
page read and write
13F1000
heap
page read and write
4C91000
heap
page read and write
5350000
direct allocation
page execute and read and write
4901000
heap
page read and write
143D000
heap
page read and write
1CCF0000
heap
page read and write
314E000
stack
page read and write
22D9F000
heap
page read and write
AEC000
stack
page read and write
4C91000
heap
page read and write
61ED4000
direct allocation
page readonly
433F000
stack
page read and write
147E000
stack
page read and write
1430000
direct allocation
page read and write
418E000
stack
page read and write
424E000
stack
page read and write
4420000
direct allocation
page read and write
13A0000
direct allocation
page read and write
1452000
heap
page read and write
4D60000
heap
page read and write
1D55E000
stack
page read and write
3F4E000
stack
page read and write
2385D000
heap
page read and write
1426000
heap
page read and write
2387D000
heap
page read and write
3DB0000
heap
page read and write
41B4000
direct allocation
page execute and read and write
1452000
heap
page read and write
4D41000
heap
page read and write
40BF000
stack
page read and write
1D8E0000
heap
page read and write
22D70000
heap
page read and write
2387D000
heap
page read and write
1427000
heap
page read and write
4AFE000
stack
page read and write
1360000
heap
page read and write
52C0000
direct allocation
page execute and read and write
13DE000
stack
page read and write
4D41000
heap
page read and write
1384000
heap
page read and write
400F000
stack
page read and write
4C91000
heap
page read and write
172E000
heap
page read and write
4D61000
heap
page read and write
4C91000
heap
page read and write
4070000
direct allocation
page execute and read and write
409E000
stack
page read and write
2FB0000
direct allocation
page read and write
B02000
unkown
page execute and read and write
6C0CD000
unkown
page readonly
62B000
unkown
page execute and read and write
1204000
heap
page read and write
1417000
heap
page read and write
4C3E000
stack
page read and write
2387D000
heap
page read and write
863C000
stack
page read and write
20A0000
heap
page read and write
4D41000
heap
page read and write
4420000
direct allocation
page read and write
5C0000
unkown
page readonly
2E8E000
stack
page read and write
3F1F000
stack
page read and write
4D41000
heap
page read and write
4F20000
direct allocation
page execute and read and write
305E000
stack
page read and write
DE6000
unkown
page execute and write copy
19E0000
heap
page read and write
8C2000
unkown
page execute and read and write
4C91000
heap
page read and write
3B4E000
stack
page read and write
1413000
heap
page read and write
23856000
heap
page read and write
348E000
stack
page read and write
524F000
stack
page read and write
279E000
stack
page read and write
5C1000
unkown
page execute and write copy
5360000
direct allocation
page execute and read and write
379F000
stack
page read and write
44CE000
stack
page read and write
466F000
stack
page read and write
3ACE000
stack
page read and write
143C000
heap
page read and write
13A0000
direct allocation
page read and write
3F2E000
stack
page read and write
5280000
direct allocation
page execute and read and write
2386F000
heap
page read and write
4F20000
direct allocation
page execute and read and write
61E00000
direct allocation
page execute and read and write
4D41000
heap
page read and write
149F000
heap
page read and write
7A4000
unkown
page execute and read and write
D8C000
unkown
page execute and read and write
560E000
stack
page read and write
4D41000
heap
page read and write
28EB5000
heap
page read and write
4F90000
direct allocation
page execute and read and write
2EEE000
stack
page read and write
3664000
direct allocation
page execute and read and write
22D8C000
heap
page read and write
22DAD000
heap
page read and write
22D9F000
heap
page read and write
315F000
stack
page read and write
3B6E000
stack
page read and write
441E000
stack
page read and write
FA4000
heap
page read and write
523E000
stack
page read and write
3C4F000
stack
page read and write
156E000
stack
page read and write
690F000
stack
page read and write
1F0000
heap
page read and write
1384000
heap
page read and write
706E000
heap
page read and write
4C91000
heap
page read and write
4D41000
heap
page read and write
3674000
direct allocation
page execute and read and write
22D90000
heap
page read and write
4C91000
heap
page read and write
45FE000
stack
page read and write
CE1000
unkown
page execute and write copy
12E5000
heap
page read and write
197B000
stack
page read and write
62B000
unkown
page execute and read and write
4C91000
heap
page read and write
414F000
stack
page read and write
22D9F000
heap
page read and write
1B1E000
stack
page read and write
4F70000
direct allocation
page execute and read and write
22D83000
heap
page read and write
5300000
direct allocation
page execute and read and write
C52000
unkown
page execute and read and write
48F0000
direct allocation
page read and write
29BBE000
heap
page read and write
2F8E000
stack
page read and write
22DA5000
heap
page read and write
629000
unkown
page read and write
F9E000
stack
page read and write
4C91000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
52A0000
direct allocation
page execute and read and write
4F20000
direct allocation
page execute and read and write
51A0000
trusted library allocation
page read and write
1204000
heap
page read and write
3ECF000
stack
page read and write
1384000
heap
page read and write
1555000
heap
page read and write
4D90000
direct allocation
page read and write
12E0000
heap
page read and write
3B5F000
stack
page read and write
58CF000
stack
page read and write
3E4F000
stack
page read and write
4D41000
heap
page read and write
61EB7000
direct allocation
page readonly
394F000
stack
page read and write
23846000
heap
page read and write
22D86000
heap
page read and write
629000
unkown
page write copy
118E000
heap
page read and write
238D5000
heap
page read and write
1540000
heap
page read and write
4D41000
heap
page read and write
4D50000
direct allocation
page read and write
7060000
heap
page read and write
4C91000
heap
page read and write
1E7E000
stack
page read and write
48F0000
direct allocation
page read and write
1D11F000
stack
page read and write
143D000
heap
page read and write
22D94000
heap
page read and write
4D41000
heap
page read and write
8AC000
unkown
page execute and read and write
50D0000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
2FB0000
direct allocation
page read and write
3E8E000
stack
page read and write
1384000
heap
page read and write
4DDE000
stack
page read and write
1CE06000
heap
page read and write
1CAAE000
stack
page read and write
330F000
stack
page read and write
5251000
direct allocation
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
33AF000
stack
page read and write
1488000
heap
page read and write
28DE000
stack
page read and write
300C000
stack
page read and write
52B0000
direct allocation
page execute and read and write
4D61000
heap
page read and write
1D7E1000
heap
page read and write
4420000
direct allocation
page read and write
1384000
heap
page read and write
4420000
direct allocation
page read and write
3170000
heap
page read and write
41B4000
direct allocation
page execute and read and write
6C2CE000
unkown
page read and write
8B3000
unkown
page execute and read and write
500000
heap
page read and write
38EE000
stack
page read and write
2386F000
heap
page read and write
338F000
stack
page read and write
440E000
stack
page read and write
2386A000
heap
page read and write
28E10000
trusted library allocation
page read and write
1384000
heap
page read and write
2385D000
heap
page read and write
3B0F000
stack
page read and write
F30000
heap
page read and write
4C91000
heap
page read and write
4D41000
heap
page read and write
8B3000
unkown
page execute and read and write
1384000
heap
page read and write
30CE000
stack
page read and write
1436000
heap
page read and write
170F000
stack
page read and write
4901000
heap
page read and write
329F000
stack
page read and write
1384000
heap
page read and write
474E000
stack
page read and write
5360000
direct allocation
page execute and read and write
2385D000
heap
page read and write
483F000
stack
page read and write
FA4000
heap
page read and write
3177000
heap
page read and write
351F000
stack
page read and write
4D41000
heap
page read and write
41B0000
direct allocation
page execute and read and write
1F96000
heap
page read and write
4C91000
heap
page read and write
5360000
direct allocation
page execute and read and write
114E000
stack
page read and write
10F5000
unkown
page execute and read and write
18A7000
heap
page read and write
142F000
heap
page read and write
4C91000
heap
page read and write
13A0000
direct allocation
page read and write
39EE000
stack
page read and write
41B4000
direct allocation
page execute and read and write
324F000
stack
page read and write
60A0000
heap
page read and write
2C5F000
stack
page read and write
4C91000
heap
page read and write
3A0E000
stack
page read and write
13D0000
heap
page read and write
52B0000
direct allocation
page execute and read and write
22D90000
heap
page read and write
22D9F000
heap
page read and write
1384000
heap
page read and write
22DAD000
heap
page read and write
1445000
heap
page read and write
23858000
heap
page read and write
4C91000
heap
page read and write
48D0000
direct allocation
page read and write
2385C000
heap
page read and write
13A0000
direct allocation
page read and write
374F000
stack
page read and write
1204000
heap
page read and write
22D9F000
heap
page read and write
5400000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
4420000
direct allocation
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
F17000
unkown
page execute and write copy
2990E000
stack
page read and write
5260000
direct allocation
page execute and read and write
51F0000
direct allocation
page read and write
4170000
direct allocation
page execute and read and write
1CCAF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
2041000
heap
page read and write
29BB0000
heap
page read and write
FA4000
heap
page read and write
454E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
22DAD000
heap
page read and write
2FAFB000
stack
page read and write
A56000
unkown
page execute and write copy
131E000
stack
page read and write
33DF000
stack
page read and write
41FF000
stack
page read and write
4C91000
heap
page read and write
51D0000
direct allocation
page read and write
13A0000
direct allocation
page read and write
4D41000
heap
page read and write
564E000
stack
page read and write
1D75C000
stack
page read and write
48EF000
stack
page read and write
8C3000
unkown
page execute and write copy
4DF1000
direct allocation
page read and write
6C0CD000
unkown
page readonly
4D41000
heap
page read and write
EF0000
heap
page read and write
53B0000
direct allocation
page execute and read and write
33CE000
stack
page read and write
2FB0000
direct allocation
page read and write
1557000
heap
page read and write
22D89000
heap
page read and write
4D41000
heap
page read and write
2387D000
heap
page read and write
2F30000
heap
page read and write
1F2C000
heap
page read and write
4420000
direct allocation
page read and write
A54000
unkown
page execute and read and write
13B0000
heap
page read and write
4D50000
direct allocation
page read and write
4C91000
heap
page read and write
2385E000
heap
page read and write
21C000
unkown
page execute and write copy
2F40000
heap
page read and write
552000
unkown
page execute and read and write
2FB0000
direct allocation
page read and write
61ED3000
direct allocation
page read and write
FA4000
heap
page read and write
3E10000
direct allocation
page execute and read and write
2B2000
unkown
page execute and read and write
4D41000
heap
page read and write
3CFF000
stack
page read and write
43DE000
stack
page read and write
41B4000
direct allocation
page execute and read and write
4F20000
direct allocation
page execute and read and write
1384000
heap
page read and write
4C0F000
stack
page read and write
5380000
direct allocation
page execute and read and write
1EDA000
heap
page read and write
360F000
stack
page read and write
89EC000
stack
page read and write
4A1F000
stack
page read and write
4D4F000
stack
page read and write
366E000
stack
page read and write
3DFE000
stack
page read and write
22DA5000
heap
page read and write
1384000
heap
page read and write
A56000
unkown
page execute and write copy
1CE00000
trusted library allocation
page read and write
4D50000
direct allocation
page read and write
4C91000
heap
page read and write
2DAE000
stack
page read and write
5330000
direct allocation
page execute and read and write
3A5E000
stack
page read and write
42AF000
stack
page read and write
543000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
A54000
unkown
page execute and read and write
41B4000
direct allocation
page execute and read and write
310F000
stack
page read and write
34A0000
heap
page read and write
52E0000
direct allocation
page execute and read and write
1445000
heap
page read and write
142E000
heap
page read and write
2055000
heap
page read and write
5350000
direct allocation
page execute and read and write
4A50000
direct allocation
page execute and read and write
14C0000
heap
page read and write
29DF000
stack
page read and write
22D84000
heap
page read and write
6A4F000
stack
page read and write
3A10000
heap
page read and write
2386F000
heap
page read and write
3C8E000
stack
page read and write
1384000
heap
page read and write
428F000
stack
page read and write
4C91000
heap
page read and write
629000
unkown
page write copy
184C000
heap
page read and write
52E0000
direct allocation
page execute and read and write
2386F000
heap
page read and write
4C91000
heap
page read and write
33CE000
stack
page read and write
4431000
heap
page read and write
3B0F000
stack
page read and write
3674000
direct allocation
page execute and read and write
550B000
stack
page read and write
4D41000
heap
page read and write
1F47000
heap
page read and write
2385F000
heap
page read and write
4F30000
direct allocation
page execute and read and write
440E000
stack
page read and write
1200000
heap
page read and write
6C0F0000
unkown
page readonly
2D6F000
stack
page read and write
4C91000
heap
page read and write
1384000
heap
page read and write
1F7F000
heap
page read and write
434000
unkown
page execute and read and write
437000
unkown
page execute and write copy
3BBF000
stack
page read and write
4C91000
heap
page read and write
4D61000
heap
page read and write
2386C000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
48CF000
stack
page read and write
364E000
stack
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
4D41000
heap
page read and write
6C051000
unkown
page execute read
23860000
heap
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
1417000
heap
page read and write
22D9D000
heap
page read and write
5400000
direct allocation
page execute and read and write
22DAA000
heap
page read and write
308F000
stack
page read and write
22D8A000
heap
page read and write
419F000
stack
page read and write
3674000
direct allocation
page execute and read and write
4C91000
heap
page read and write
48F0000
direct allocation
page read and write
334E000
stack
page read and write
1F84000
heap
page read and write
385E000
stack
page read and write
4C91000
heap
page read and write
1430000
direct allocation
page read and write
5180000
trusted library allocation
page read and write
1089000
unkown
page execute and read and write
5C0000
unkown
page read and write
6C2D0000
unkown
page read and write
35EE000
stack
page read and write
22D88000
heap
page read and write
47CE000
stack
page read and write
5A8D000
stack
page read and write
5390000
direct allocation
page execute and read and write
61EB4000
direct allocation
page read and write
2B1F000
stack
page read and write
FA4000
heap
page read and write
1430000
direct allocation
page read and write
4C91000
heap
page read and write
4D50000
direct allocation
page read and write
4C91000
heap
page read and write
1504000
heap
page read and write
2B9000
unkown
page read and write
F17000
unkown
page execute and read and write
3DCE000
stack
page read and write
1384000
heap
page read and write
48D0000
direct allocation
page read and write
1340000
heap
page read and write
29BC9000
heap
page read and write
38CE000
stack
page read and write
441F000
stack
page read and write
6C28F000
unkown
page readonly
FA4000
heap
page read and write
491E000
stack
page read and write
4C91000
heap
page read and write
3674000
direct allocation
page execute and read and write
4C91000
heap
page read and write
22DAD000
heap
page read and write
4ACF000
stack
page read and write
2387D000
heap
page read and write
23859000
heap
page read and write
28EAF000
heap
page read and write
4D50000
direct allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
32AE000
stack
page read and write
1F8A000
heap
page read and write
484F000
stack
page read and write
1384000
heap
page read and write
3B9E000
stack
page read and write
22D83000
heap
page read and write
BDC000
unkown
page execute and write copy
22DAD000
heap
page read and write
52F0000
direct allocation
page execute and read and write
FA4000
heap
page read and write
5280000
direct allocation
page execute and read and write
376F000
stack
page read and write
66C6000
heap
page read and write
8C2000
unkown
page execute and write copy
4CA1000
heap
page read and write
41AE000
stack
page read and write
5231000
direct allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
61E00000
direct allocation
page execute and read and write
FA4000
heap
page read and write
437000
unkown
page execute and read and write
2FB0000
direct allocation
page read and write
36FE000
stack
page read and write
143D000
heap
page read and write
25DF000
stack
page read and write
4441000
heap
page read and write
2B1F000
stack
page read and write
5290000
direct allocation
page execute and read and write
4D40000
heap
page read and write
1384000
heap
page read and write
3D90000
heap
page read and write
22D76000
heap
page read and write
8C3000
unkown
page execute and write copy
416F000
stack
page read and write
2FB0000
direct allocation
page read and write
41BE000
direct allocation
page execute and read and write
18C000
stack
page read and write
45CF000
stack
page read and write
6C0F1000
unkown
page execute read
880000
unkown
page execute and read and write
CE0000
unkown
page readonly
3DDF000
stack
page read and write
3D3E000
stack
page read and write
57CE000
stack
page read and write
5C0000
unkown
page readonly
42DF000
stack
page read and write
37AE000
stack
page read and write
4D41000
heap
page read and write
13F3000
stack
page read and write
154E000
stack
page read and write
51F0000
direct allocation
page read and write
1D1E000
stack
page read and write
350E000
stack
page read and write
13D1000
heap
page read and write
5B8D000
stack
page read and write
164E000
stack
page read and write
4D41000
heap
page read and write
52B0000
direct allocation
page execute and read and write
3C6F000
stack
page read and write
BDC000
unkown
page execute and read and write
15AD000
stack
page read and write
1EA0000
heap
page read and write
4D41000
heap
page read and write
22DA5000
heap
page read and write
4C91000
heap
page read and write
464F000
stack
page read and write
13C2000
heap
page read and write
5A3F000
stack
page read and write
533F000
stack
page read and write
1384000
heap
page read and write
4D50000
direct allocation
page read and write
22D86000
heap
page read and write
4931000
direct allocation
page read and write
41A3000
direct allocation
page execute and read and write
404E000
stack
page read and write
251000
unkown
page execute and write copy
C3C000
unkown
page execute and read and write
314E000
stack
page read and write
2385A000
heap
page read and write
51D0000
direct allocation
page read and write
BED000
stack
page read and write
358F000
stack
page read and write
1430000
direct allocation
page read and write
4D41000
heap
page read and write
18BB000
heap
page read and write
22D8E000
heap
page read and write
41A4000
direct allocation
page execute and read and write
880000
unkown
page execute and read and write
4C91000
heap
page read and write
478F000
stack
page read and write
4C8F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
22D8A000
heap
page read and write
4D41000
heap
page read and write
3DEE000
stack
page read and write
950000
unkown
page read and write
1C26F000
stack
page read and write
1204000
heap
page read and write
950000
unkown
page readonly
1384000
heap
page read and write
5180000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
405F000
stack
page read and write
2F07000
heap
page read and write
53D0000
direct allocation
page execute and read and write
AA0000
unkown
page readonly
6C050000
unkown
page readonly
867E000
stack
page read and write
41B4000
direct allocation
page execute and read and write
16BC000
unkown
page execute and write copy
23847000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
66AE000
stack
page read and write
D28000
unkown
page execute and read and write
369E000
stack
page read and write
5340000
direct allocation
page execute and read and write
151A000
heap
page read and write
301F000
stack
page read and write
33EE000
stack
page read and write
6C051000
unkown
page execute read
259E000
stack
page read and write
56C000
unkown
page execute and read and write
1514000
heap
page read and write
4B4F000
stack
page read and write
1430000
direct allocation
page read and write
4BFF000
stack
page read and write
18CB000
heap
page read and write
4C91000
heap
page read and write
1204000
heap
page read and write
22D86000
heap
page read and write
47AF000
stack
page read and write
3674000
direct allocation
page execute and read and write
4C91000
heap
page read and write
3670000
direct allocation
page execute and read and write
4C91000
heap
page read and write
142F000
heap
page read and write
1436000
heap
page read and write
137A000
heap
page read and write
4F20000
direct allocation
page execute and read and write
4FD000
stack
page read and write
398E000
stack
page read and write
2386F000
heap
page read and write
6C0F0000
unkown
page readonly
13B6000
heap
page read and write
23875000
heap
page read and write
44AD000
stack
page read and write
30AF000
stack
page read and write
11E0000
heap
page read and write
404E000
stack
page read and write
40CF000
stack
page read and write
2000000
heap
page read and write
22D90000
heap
page read and write
8B3000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
2FB0000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
1417000
heap
page read and write
1CB1F000
stack
page read and write
1370000
heap
page read and write
1204000
heap
page read and write
488E000
stack
page read and write
BD9000
unkown
page execute and write copy
13F9000
heap
page read and write
CFC000
unkown
page execute and write copy
47EE000
stack
page read and write
22DA5000
heap
page read and write
7070000
heap
page read and write
1436000
heap
page read and write
367E000
direct allocation
page execute and read and write
4D41000
heap
page read and write
13A0000
direct allocation
page read and write
3E1E000
stack
page read and write
4C91000
heap
page read and write
23859000
heap
page read and write
347E000
stack
page read and write
1C86C000
stack
page read and write
4C91000
heap
page read and write
1204000
heap
page read and write
35F0000
heap
page read and write
187A000
heap
page read and write
42CE000
stack
page read and write
5A9000
unkown
page execute and read and write
E2A000
unkown
page execute and read and write
12FD000
stack
page read and write
3FC0000
heap
page read and write
337F000
stack
page read and write
133E000
stack
page read and write
1E3D000
stack
page read and write
2387D000
heap
page read and write
2A6000
unkown
page execute and read and write
61ECC000
direct allocation
page read and write
1204000
heap
page read and write
4C91000
heap
page read and write
22D86000
heap
page read and write
23860000
heap
page read and write
388F000
stack
page read and write
338F000
stack
page read and write
23858000
heap
page read and write
1433000
heap
page read and write
2EE0000
direct allocation
page read and write
4C91000
heap
page read and write
1384000
heap
page read and write
48F0000
direct allocation
page read and write
275F000
stack
page read and write
4A4E000
stack
page read and write
22D8E000
heap
page read and write
F1C000
unkown
page execute and write copy
12FD000
stack
page read and write
540000
heap
page read and write
4D41000
heap
page read and write
38AF000
stack
page read and write
593E000
stack
page read and write
316E000
stack
page read and write
22D76000
heap
page read and write
316E000
stack
page read and write
22E03000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1436000
heap
page read and write
586000
unkown
page execute and read and write
40FE000
stack
page read and write
9B9000
unkown
page write copy
30A0C000
stack
page read and write
4ABF000
stack
page read and write
22D8D000
heap
page read and write
201000
unkown
page execute and write copy
1D51D000
stack
page read and write
66B0000
heap
page read and write
6C2CF000
unkown
page write copy
3D0F000
stack
page read and write
4B8E000
stack
page read and write
4D41000
heap
page read and write
498F000
stack
page read and write
5500000
heap
page read and write
2BB000
unkown
page execute and read and write
5380000
direct allocation
page execute and read and write
302E000
stack
page read and write
6C2CF000
unkown
page write copy
2657000
heap
page read and write
4C90000
heap
page read and write
5390000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
29BB8000
heap
page read and write
FEE000
stack
page read and write
53A0000
direct allocation
page execute and read and write
425000
unkown
page execute and read and write
117A000
stack
page read and write
1426000
heap
page read and write
398E000
stack
page read and write
1204000
heap
page read and write
28EBB000
heap
page read and write
16AE000
stack
page read and write
1430000
direct allocation
page read and write
1384000
heap
page read and write
4D41000
heap
page read and write
1180000
heap
page read and write
2B9000
unkown
page write copy
250000
unkown
page read and write
59A000
heap
page read and write
23864000
heap
page read and write
89F1000
heap
page read and write
622000
unkown
page execute and read and write
1893000
heap
page read and write
447F000
stack
page read and write
4D50000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
DE4000
unkown
page execute and read and write
327F000
stack
page read and write
3E00000
heap
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
3A2E000
stack
page read and write
552000
unkown
page execute and write copy
4D41000
heap
page read and write
1384000
heap
page read and write
5300000
direct allocation
page execute and read and write
2E8E000
stack
page read and write
37FF000
stack
page read and write
4A30000
direct allocation
page execute and read and write
3DAF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
FA0000
heap
page read and write
1845000
heap
page read and write
1CD01000
heap
page read and write
85F000
stack
page read and write
312E000
stack
page read and write
2386F000
heap
page read and write
2B5E000
stack
page read and write
2387D000
heap
page read and write
22D89000
heap
page read and write
4D41000
heap
page read and write
4C91000
heap
page read and write
48F0000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
6E6000
unkown
page execute and write copy
53C0000
direct allocation
page execute and read and write
1713000
heap
page read and write
4D41000
heap
page read and write
22D8F000
heap
page read and write
6C0DE000
unkown
page read and write
4C91000
heap
page read and write
5280000
direct allocation
page execute and read and write
1430000
direct allocation
page read and write
4F80000
direct allocation
page execute and read and write
2FCFC000
stack
page read and write
4A60000
direct allocation
page execute and read and write
2FF3D000
stack
page read and write
2FB0000
direct allocation
page read and write
4D41000
heap
page read and write
378E000
stack
page read and write
13A0000
direct allocation
page read and write
5330000
direct allocation
page execute and read and write
B09000
unkown
page write copy
1204000
heap
page read and write
13B7000
heap
page read and write
1445000
heap
page read and write
1EA7000
heap
page read and write
4F00000
direct allocation
page execute and read and write
1CD1F000
stack
page read and write
41BE000
direct allocation
page execute and read and write
5171000
direct allocation
page read and write
4C91000
heap
page read and write
2F1E000
stack
page read and write
2385A000
heap
page read and write
23846000
heap
page read and write
4F10000
direct allocation
page execute and read and write
49CE000
stack
page read and write
4F20000
direct allocation
page execute and read and write
4D41000
heap
page read and write
4A8F000
stack
page read and write
5360000
direct allocation
page execute and read and write
2FC7000
heap
page read and write
28EB7000
heap
page read and write
3EEF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
43EF000
stack
page read and write
67CF000
stack
page read and write
183F000
heap
page read and write
22D9C000
heap
page read and write
52D0000
direct allocation
page execute and read and write
473E000
stack
page read and write
13A0000
direct allocation
page read and write
4D41000
heap
page read and write
1000000
heap
page read and write
3C8E000
stack
page read and write
38DF000
stack
page read and write
4C91000
heap
page read and write
89F0000
heap
page read and write
4C91000
heap
page read and write
355E000
stack
page read and write
8C3000
unkown
page execute and write copy
42CE000
stack
page read and write
497F000
stack
page read and write
2FB0000
direct allocation
page read and write
1557000
heap
page read and write
4D41000
heap
page read and write
DA2000
unkown
page execute and read and write
1C06F000
stack
page read and write
13A0000
direct allocation
page read and write
4C91000
heap
page read and write
1EA5000
heap
page read and write
61ECC000
direct allocation
page read and write
168E000
stack
page read and write
13A0000
direct allocation
page read and write
3C4F000
stack
page read and write
1384000
heap
page read and write
44C0000
heap
page read and write
319E000
stack
page read and write
4901000
heap
page read and write
22D90000
heap
page read and write
3B2F000
stack
page read and write
391E000
stack
page read and write
7061000
heap
page read and write
FE0000
heap
page read and write
4D41000
heap
page read and write
446E000
stack
page read and write
1CF1E000
stack
page read and write
22D77000
heap
page read and write
AA0000
unkown
page read and write
1005000
heap
page read and write
4A40000
direct allocation
page execute and read and write
FA4000
heap
page read and write
1D31D000
stack
page read and write
410E000
stack
page read and write
22D89000
heap
page read and write
4C91000
heap
page read and write
1833000
heap
page read and write
52B9000
stack
page read and write
178F000
stack
page read and write
402F000
stack
page read and write
34CF000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1ED0000
heap
page read and write
22D83000
heap
page read and write
4432000
heap
page read and write
4C8F000
stack
page read and write
43C000
unkown
page execute and write copy
29B20000
trusted library allocation
page read and write
1320000
heap
page read and write
4420000
direct allocation
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
1384000
heap
page read and write
F1C000
unkown
page execute and read and write
4D50000
direct allocation
page read and write
4D41000
heap
page read and write
14D0000
heap
page read and write
5380000
direct allocation
page execute and read and write
22D94000
heap
page read and write
38DE000
stack
page read and write
FF0000
heap
page read and write
4C91000
heap
page read and write
136E000
stack
page read and write
12C0000
heap
page read and write
48D0000
direct allocation
page read and write
16AF000
stack
page read and write
4420000
direct allocation
page read and write
4D41000
heap
page read and write
29B0E000
stack
page read and write
5181000
direct allocation
page read and write
23864000
heap
page read and write
B34000
unkown
page execute and read and write
2385E000
heap
page read and write
61ED0000
direct allocation
page read and write
22DAD000
heap
page read and write
200000
unkown
page readonly
34EF000
stack
page read and write
23853000
heap
page read and write
48F0000
direct allocation
page read and write
406E000
stack
page read and write
D60000
unkown
page execute and read and write
4C91000
heap
page read and write
3674000
direct allocation
page execute and read and write
4420000
direct allocation
page read and write
4C8F000
stack
page read and write
4D41000
heap
page read and write
853B000
stack
page read and write
22DAD000
heap
page read and write
545B000
stack
page read and write
4C91000
heap
page read and write
536C000
stack
page read and write
423E000
stack
page read and write
2386F000
heap
page read and write
2DDE000
stack
page read and write
36BF000
stack
page read and write
6C0DE000
unkown
page read and write
30EE000
stack
page read and write
3D8F000
stack
page read and write
5380000
direct allocation
page execute and read and write
4D40000
trusted library allocation
page read and write
393F000
stack
page read and write
4D60000
heap
page read and write
9BB000
unkown
page execute and read and write
23860000
heap
page read and write
8AC000
unkown
page execute and read and write
1EA7000
heap
page read and write
61ECD000
direct allocation
page readonly
4D48000
heap
page read and write
32DE000
stack
page read and write
C52000
unkown
page execute and write copy
22D77000
heap
page read and write
6C0F1000
unkown
page execute read
437E000
stack
page read and write
22D90000
heap
page read and write
1384000
heap
page read and write
A54000
unkown
page execute and read and write
48F0000
direct allocation
page read and write
4C91000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
133E000
stack
page read and write
516E000
stack
page read and write
452F000
stack
page read and write
3A8F000
stack
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
4D41000
heap
page read and write
1430000
direct allocation
page read and write
53F0000
direct allocation
page execute and read and write
61ECD000
direct allocation
page readonly
22D90000
heap
page read and write
2FD3B000
stack
page read and write
104C000
unkown
page execute and read and write
6C28F000
unkown
page readonly
1D7E1000
heap
page read and write
622000
unkown
page execute and read and write
360F000
stack
page read and write
7A4000
unkown
page execute and read and write
1C46F000
stack
page read and write
1CD00000
heap
page read and write
8400000
heap
page read and write
4C91000
heap
page read and write
4A60000
direct allocation
page execute and read and write
39CF000
stack
page read and write
4C91000
heap
page read and write
3ABE000
stack
page read and write
6C0E2000
unkown
page readonly
428F000
stack
page read and write
4C91000
heap
page read and write
1413000
unkown
page execute and read and write
5280000
direct allocation
page execute and read and write
31CF000
stack
page read and write
3B4E000
stack
page read and write
1426000
heap
page read and write
4D41000
heap
page read and write
38CE000
stack
page read and write
50D0000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
1D7E0000
heap
page read and write
5270000
direct allocation
page execute and read and write
48F0000
direct allocation
page read and write
52B0000
direct allocation
page execute and read and write
23847000
heap
page read and write
367E000
direct allocation
page execute and read and write
2F00000
heap
page read and write
310F000
stack
page read and write
2ECE000
stack
page read and write
44BE000
stack
page read and write
3E7E000
stack
page read and write
4C90000
heap
page read and write
8C2000
unkown
page execute and write copy
4C91000
heap
page read and write
52F0000
direct allocation
page execute and read and write
590000
heap
page read and write
4D90000
direct allocation
page read and write
22E77000
heap
page read and write
5C0000
unkown
page read and write
23856000
heap
page read and write
3FAE000
stack
page read and write
4C91000
heap
page read and write
46FF000
stack
page read and write
4D50000
direct allocation
page read and write
6C2D0000
unkown
page read and write
53C000
unkown
page execute and read and write
224000
unkown
page execute and write copy
1D8E0000
trusted library allocation
page read and write
23875000
heap
page read and write
FA4000
heap
page read and write
2D9F000
stack
page read and write
23859000
heap
page read and write
4D41000
heap
page read and write
328E000
stack
page read and write
1838000
heap
page read and write
4C91000
heap
page read and write
2023000
heap
page read and write
4C91000
heap
page read and write
456E000
stack
page read and write
5350000
direct allocation
page execute and read and write
1204000
heap
page read and write
4C91000
heap
page read and write
There are 1530 hidden memdumps, click here to show them.