IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\JDGCFBAFBF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFBAAFHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CAFHIJDHDGDBFHIEHDGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBAEBFII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FCAAAAFBKFIECAAKECGCAAKJEC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHDBKFHIJKJKECAAAECA
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\HIJJDGDHDGDAKFIECFIJEGDHII
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JEHDHIEGIIIDHIDHDHJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEHDHIEGIIIDHIDHDHJJKJKJJD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJJEGCGDGHCBFHIDHDAAFBGCFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\JDGCFBAFBF.exe
"C:\Users\user\AppData\Local\Temp\JDGCFBAFBF.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\JDGCFBAFBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\HIJJDGDHDG.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.30/69934896f997d5bb/softokn3.dll
85.28.47.30
malicious
http://77.91.77.81/mine/amadka.exe.phpefoxrefox
unknown
malicious
http://85.28.47.30/69934896f997d5bb/freebl3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.30/69934896f997d5bb/nss3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/sqlite3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/vcruntime140.dll
85.28.47.30
malicious
http://77.91.77.82/
unknown
malicious
85.28.47.30/920475a59bac849d.php
malicious
http://85.28.47.30/920475a59bac849d.php
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/msvcp140.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/mozglue.dll
85.28.47.30
malicious
http://85.28.47.30
unknown
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.82/Hun4Ko/index.phpO
unknown
http://77.91.77.82/Hun4Ko/index.php4ZL
unknown
http://77.91.77.81/mine/amadka.exeOpera
unknown
http://77.91.77.82/Hun4Ko/index.phpVZ.
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://85.28.47.30k
unknown
http://85.28.47.30/69934896f997d5bb/freebl3.dll;
unknown
http://85.28.47.30/69934896f997d5bb/softokn3.dll7
unknown
http://77.91.77.82/Hun4Ko/index.php3
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://77.91.77.82/Hun4Ko/index.php#ZC
unknown
http://77.91.77.82/Hun4Ko/index.php9
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://www.sqlite.org/copyright.html.
unknown
http://85.28.47.30/69934896f997d5bb/mozglue.dllw
unknown
http://77.91.77.82/Hun4Ko/index.php8#
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.82/Hun4Ko/index.phpS?w
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://85.28.47.30/69934896f997d5bb/sqlite3.dllc
unknown
http://upx.sf.net
unknown
http://85.28.47.30/69934896f997d5bb/vcruntime140.dllV
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://support.mozilla.org
unknown
http://77.91.77.82/Hun4Ko/index.php~
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 49 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.30
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9E1000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page read and write
malicious
E11000
unkown
page execute and read and write
malicious
921000
unkown
page execute and read and write
malicious
51D0000
direct allocation
page read and write
malicious
4E90000
direct allocation
page read and write
malicious
9E1000
unkown
page execute and read and write
malicious
9E1000
unkown
page execute and read and write
malicious
1B26000
heap
page read and write
malicious
4A00000
direct allocation
page read and write
malicious
9E1000
unkown
page execute and read and write
malicious
4EC0000
direct allocation
page read and write
malicious
584000
heap
page read and write
7E1E000
stack
page read and write
3970000
direct allocation
page execute and read and write
4A41000
heap
page read and write
584000
heap
page read and write
13FE000
stack
page read and write
FB4000
heap
page read and write
1C44000
heap
page read and write
453F000
stack
page read and write
7EC80000
direct allocation
page execute and read and write
6D025000
unkown
page readonly
1490000
heap
page read and write
3A3E000
stack
page read and write
5E1E000
stack
page read and write
23484000
heap
page read and write
1394000
heap
page read and write
3ECF000
stack
page read and write
4441000
heap
page read and write
2DAF000
stack
page read and write
28C0000
direct allocation
page read and write
3A7D000
stack
page read and write
CF5000
unkown
page execute and write copy
4A60000
direct allocation
page execute and read and write
443F000
stack
page read and write
9E0000
unkown
page read and write
2C7F000
stack
page read and write
3DEF000
stack
page read and write
B5C000
unkown
page execute and read and write
14A0000
direct allocation
page read and write
23466000
heap
page read and write
86E000
stack
page read and write
FB4000
heap
page read and write
36AE000
stack
page read and write
1D3F1000
heap
page read and write
715000
heap
page read and write
1374000
heap
page read and write
38EF000
stack
page read and write
14B6000
heap
page read and write
23480000
heap
page read and write
398E000
stack
page read and write
5030000
direct allocation
page execute and read and write
694000
heap
page read and write
3638B000
stack
page read and write
B57000
unkown
page execute and read and write
2F759000
heap
page read and write
23499000
heap
page read and write
DE0000
direct allocation
page read and write
384E000
stack
page read and write
3B4E000
stack
page read and write
1394000
heap
page read and write
14C5000
heap
page read and write
4441000
heap
page read and write
9E0000
unkown
page read and write
5340000
direct allocation
page execute and read and write
1C3E000
heap
page read and write
81AD000
heap
page read and write
4441000
heap
page read and write
4B80000
direct allocation
page execute and read and write
79C000
heap
page read and write
317F000
stack
page read and write
7AE000
heap
page read and write
4D4F000
stack
page read and write
9CE000
stack
page read and write
3F7E000
stack
page read and write
1370000
direct allocation
page read and write
3D70000
direct allocation
page execute and read and write
E94000
unkown
page execute and write copy
6CE41000
unkown
page execute read
3D74000
direct allocation
page execute and read and write
367F000
stack
page read and write
5340000
direct allocation
page execute and read and write
33CE000
stack
page read and write
2837000
heap
page read and write
440E000
stack
page read and write
2349E000
heap
page read and write
5340000
direct allocation
page execute and read and write
23480000
heap
page read and write
694000
heap
page read and write
1394000
heap
page read and write
61E00000
direct allocation
page execute and read and write
23477000
heap
page read and write
1C2C000
heap
page read and write
32BF000
stack
page read and write
1394000
heap
page read and write
4441000
heap
page read and write
4A90000
direct allocation
page execute and read and write
61ECD000
direct allocation
page readonly
14C0000
heap
page read and write
E11000
unkown
page execute and write copy
1370000
direct allocation
page read and write
4441000
heap
page read and write
4A30000
direct allocation
page execute and read and write
23473000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
5080000
direct allocation
page execute and read and write
1BAB000
heap
page read and write
464F000
stack
page read and write
12E2000
unkown
page execute and write copy
4441000
heap
page read and write
4A41000
heap
page read and write
23490000
heap
page read and write
374F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
307E000
stack
page read and write
5000000
direct allocation
page execute and read and write
1394000
heap
page read and write
1394000
heap
page read and write
1374000
heap
page read and write
2FCF000
stack
page read and write
4441000
heap
page read and write
F90000
heap
page read and write
6D01F000
unkown
page write copy
4EFB000
stack
page read and write
4441000
heap
page read and write
1370000
direct allocation
page read and write
4441000
heap
page read and write
584000
heap
page read and write
4441000
heap
page read and write
1125000
unkown
page execute and write copy
680000
heap
page read and write
23465000
heap
page read and write
1327000
heap
page read and write
5380000
direct allocation
page execute and read and write
12C0000
direct allocation
page read and write
3AD000
stack
page read and write
4A41000
heap
page read and write
2F751000
heap
page read and write
42CE000
stack
page read and write
38FF000
stack
page read and write
1374000
heap
page read and write
4B70000
direct allocation
page execute and read and write
403E000
stack
page read and write
4A41000
heap
page read and write
407D000
stack
page read and write
4A41000
heap
page read and write
14A0000
direct allocation
page read and write
A4B000
unkown
page execute and read and write
4441000
heap
page read and write
1320000
heap
page read and write
7A7000
heap
page read and write
2349F000
heap
page read and write
584000
heap
page read and write
14DE000
stack
page read and write
4A41000
heap
page read and write
5040000
direct allocation
page execute and read and write
584000
heap
page read and write
4441000
heap
page read and write
3658C000
stack
page read and write
49F0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
1D0000
heap
page read and write
E72000
unkown
page execute and read and write
4AD0000
direct allocation
page execute and read and write
8A0000
heap
page read and write
584000
heap
page read and write
5010000
direct allocation
page execute and read and write
4441000
heap
page read and write
2ECE000
stack
page read and write
3D74000
direct allocation
page execute and read and write
B5C000
unkown
page execute and write copy
50C0000
direct allocation
page execute and read and write
3F63000
heap
page read and write
CF4000
unkown
page execute and read and write
404E000
stack
page read and write
1374000
heap
page read and write
74C000
heap
page read and write
370E000
stack
page read and write
3A8F000
stack
page read and write
530F000
stack
page read and write
14E0000
direct allocation
page read and write
1374000
heap
page read and write
3E2E000
stack
page read and write
378E000
stack
page read and write
23466000
heap
page read and write
9E0000
unkown
page read and write
5050000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
E10000
unkown
page readonly
2830000
heap
page read and write
36BE000
stack
page read and write
584000
heap
page read and write
23498000
heap
page read and write
2DEE000
stack
page read and write
34CF000
stack
page read and write
772000
heap
page read and write
720000
heap
page read and write
1420000
heap
page read and write
42BF000
stack
page read and write
23485000
heap
page read and write
49CE000
stack
page read and write
3B3E000
stack
page read and write
2347A000
heap
page read and write
4441000
heap
page read and write
4A40000
direct allocation
page execute and read and write
15B000
stack
page read and write
5020000
direct allocation
page execute and read and write
23476000
heap
page read and write
7B1000
heap
page read and write
343E000
stack
page read and write
783000
heap
page read and write
4A00000
heap
page read and write
23498000
heap
page read and write
53B0000
direct allocation
page execute and read and write
140E000
stack
page read and write
1A3E000
stack
page read and write
4A30000
direct allocation
page execute and read and write
12C0000
direct allocation
page read and write
353F000
stack
page read and write
47FE000
stack
page read and write
1400000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
443E000
stack
page read and write
773000
heap
page read and write
21CE000
stack
page read and write
3D74000
direct allocation
page execute and read and write
4441000
heap
page read and write
4441000
heap
page read and write
300E000
stack
page read and write
14A0000
direct allocation
page read and write
3B3F000
stack
page read and write
410E000
stack
page read and write
4A30000
direct allocation
page execute and read and write
2E8F000
stack
page read and write
10E2000
unkown
page execute and read and write
4B3F000
stack
page read and write
4A41000
heap
page read and write
1374000
heap
page read and write
4441000
heap
page read and write
A42000
unkown
page execute and read and write
3F3F000
stack
page read and write
3A0E000
stack
page read and write
314E000
stack
page read and write
7B0000
heap
page read and write
28E0000
heap
page read and write
4441000
heap
page read and write
1370000
direct allocation
page read and write
434F000
stack
page read and write
2B3F000
stack
page read and write
61BF000
stack
page read and write
78D000
heap
page read and write
7BA2000
heap
page read and write
4441000
heap
page read and write
456F000
stack
page read and write
584000
heap
page read and write
29EF000
stack
page read and write
584000
heap
page read and write
5E75000
heap
page read and write
584000
heap
page read and write
DE0000
direct allocation
page read and write
428F000
stack
page read and write
4A41000
heap
page read and write
365CB000
stack
page read and write
CDE000
unkown
page execute and read and write
438E000
stack
page read and write
1C24000
heap
page read and write
4441000
heap
page read and write
3F8F000
stack
page read and write
81A9000
heap
page read and write
4A11000
heap
page read and write
1374000
heap
page read and write
5010000
direct allocation
page execute and read and write
400F000
stack
page read and write
FB4000
heap
page read and write
E00000
direct allocation
page read and write
4A41000
heap
page read and write
12E7000
heap
page read and write
4A41000
heap
page read and write
DE0000
direct allocation
page read and write
4D51000
heap
page read and write
4441000
heap
page read and write
580000
heap
page read and write
6C0000
heap
page read and write
4441000
heap
page read and write
2349F000
heap
page read and write
4A41000
heap
page read and write
1D3E0000
heap
page read and write
23566000
heap
page read and write
2CAE000
stack
page read and write
4A41000
heap
page read and write
E79000
unkown
page write copy
5231000
direct allocation
page read and write
45CF000
stack
page read and write
85D000
stack
page read and write
694000
heap
page read and write
5070000
direct allocation
page execute and read and write
9E1000
unkown
page execute and write copy
40BD000
stack
page read and write
33EF000
stack
page read and write
4441000
heap
page read and write
A42000
unkown
page execute and read and write
490E000
stack
page read and write
2B6E000
stack
page read and write
4D51000
heap
page read and write
454E000
stack
page read and write
281E000
stack
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
2347A000
heap
page read and write
4A10000
heap
page read and write
356E000
stack
page read and write
8C0000
heap
page read and write
1A7D000
stack
page read and write
37EE000
stack
page read and write
41FE000
stack
page read and write
1D1BE000
stack
page read and write
E92000
unkown
page execute and read and write
2F740000
heap
page read and write
584000
heap
page read and write
694000
heap
page read and write
A4B000
unkown
page execute and read and write
1374000
heap
page read and write
12ED000
heap
page read and write
6CE2E000
unkown
page read and write
9E0000
unkown
page readonly
5030000
direct allocation
page execute and read and write
4A41000
heap
page read and write
132E000
stack
page read and write
4A41000
heap
page read and write
23479000
heap
page read and write
23480000
heap
page read and write
23486000
heap
page read and write
5010000
direct allocation
page execute and read and write
3D0F000
stack
page read and write
41AF000
stack
page read and write
BD0000
unkown
page execute and read and write
CF4000
unkown
page execute and read and write
4441000
heap
page read and write
23490000
heap
page read and write
944000
unkown
page execute and write copy
39CF000
stack
page read and write
4441000
heap
page read and write
498F000
stack
page read and write
4E80000
heap
page read and write
694000
heap
page read and write
4C0F000
stack
page read and write
584000
heap
page read and write
310F000
stack
page read and write
3CEE000
stack
page read and write
CE6000
unkown
page execute and read and write
79A000
heap
page read and write
2347F000
heap
page read and write
4670000
trusted library allocation
page read and write
41EE000
stack
page read and write
BD0000
unkown
page execute and read and write
CB2000
unkown
page execute and read and write
4441000
heap
page read and write
CF5000
unkown
page execute and write copy
3F5E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
2F3E000
stack
page read and write
2348F000
heap
page read and write
1374000
heap
page read and write
30E0000
direct allocation
page read and write
2347D000
heap
page read and write
367E000
stack
page read and write
23485000
heap
page read and write
360F000
stack
page read and write
1CD7F000
stack
page read and write
3C7F000
stack
page read and write
14A0000
direct allocation
page read and write
4C20000
direct allocation
page execute and read and write
4B40000
trusted library allocation
page read and write
2A2E000
stack
page read and write
3A6E000
stack
page read and write
4A41000
heap
page read and write
920000
unkown
page readonly
1374000
heap
page read and write
23476000
heap
page read and write
2348C000
heap
page read and write
4A41000
heap
page read and write
79C000
heap
page read and write
48FF000
stack
page read and write
584000
heap
page read and write
E10000
unkown
page read and write
12C0000
direct allocation
page read and write
28C0000
direct allocation
page read and write
2349F000
heap
page read and write
2DBF000
stack
page read and write
A49000
unkown
page read and write
3D74000
direct allocation
page execute and read and write
4441000
heap
page read and write
4441000
heap
page read and write
3B0F000
stack
page read and write
1370000
direct allocation
page read and write
46BE000
stack
page read and write
3DFE000
stack
page read and write
393E000
stack
page read and write
4441000
heap
page read and write
4FFF000
stack
page read and write
D35000
unkown
page execute and read and write
FB4000
heap
page read and write
14F0000
heap
page read and write
417F000
stack
page read and write
14A0000
direct allocation
page read and write
584000
heap
page read and write
2F748000
heap
page read and write
28C0000
direct allocation
page read and write
1C32000
heap
page read and write
47CE000
stack
page read and write
3A2F000
stack
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
2EBF000
stack
page read and write
1394000
heap
page read and write
E94000
unkown
page execute and write copy
3D8F000
stack
page read and write
407E000
stack
page read and write
DE0000
direct allocation
page read and write
F9F000
stack
page read and write
3107000
heap
page read and write
3D63000
direct allocation
page execute and read and write
4441000
heap
page read and write
A49000
unkown
page write copy
4EF1000
direct allocation
page read and write
1BBF000
heap
page read and write
6CDA0000
unkown
page readonly
4441000
heap
page read and write
4450000
heap
page read and write
968000
unkown
page execute and read and write
4A41000
heap
page read and write
584000
heap
page read and write
49FF000
stack
page read and write
1374000
heap
page read and write
61E01000
direct allocation
page execute read
2349F000
heap
page read and write
149F000
stack
page read and write
4A41000
heap
page read and write
50A0000
direct allocation
page execute and read and write
1FCE000
stack
page read and write
4C30000
heap
page read and write
27DF000
stack
page read and write
3C30000
direct allocation
page execute and read and write
4441000
heap
page read and write
460E000
stack
page read and write
B57000
unkown
page execute and write copy
3B7E000
stack
page read and write
61EB7000
direct allocation
page readonly
23480000
heap
page read and write
32EE000
stack
page read and write
44CE000
stack
page read and write
2F6B0000
trusted library allocation
page read and write
1374000
heap
page read and write
2349F000
heap
page read and write
880000
heap
page read and write
23491000
heap
page read and write
584000
heap
page read and write
23471000
heap
page read and write
40BE000
stack
page read and write
E94000
unkown
page execute and write copy
1370000
direct allocation
page read and write
584000
heap
page read and write
4441000
heap
page read and write
784000
heap
page read and write
2349D000
heap
page read and write
4A41000
heap
page read and write
694000
heap
page read and write
60BE000
stack
page read and write
3ACE000
stack
page read and write
12DF000
unkown
page execute and write copy
23485000
heap
page read and write
4A41000
heap
page read and write
A49000
unkown
page write copy
694000
heap
page read and write
1460000
heap
page read and write
4921000
direct allocation
page read and write
690000
heap
page read and write
12C0000
direct allocation
page read and write
599D000
stack
page read and write
50D0000
direct allocation
page execute and read and write
23482000
heap
page read and write
328E000
stack
page read and write
5E70000
heap
page read and write
6CDA1000
unkown
page execute read
4A41000
heap
page read and write
12C2000
unkown
page execute and read and write
5F7F000
stack
page read and write
14A0000
direct allocation
page read and write
E94000
unkown
page execute and write copy
4A41000
heap
page read and write
40AE000
stack
page read and write
1374000
heap
page read and write
4A41000
heap
page read and write
14A0000
direct allocation
page read and write
5320000
direct allocation
page execute and read and write
E92000
unkown
page execute and read and write
28C0000
direct allocation
page read and write
772000
heap
page read and write
367CD000
stack
page read and write
1B5E000
heap
page read and write
1394000
heap
page read and write
2EFF000
stack
page read and write
584000
heap
page read and write
424E000
stack
page read and write
4A61000
direct allocation
page read and write
4B80000
direct allocation
page execute and read and write
1394000
heap
page read and write
DE0000
direct allocation
page read and write
4441000
heap
page read and write
694000
heap
page read and write
14A0000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
1394000
heap
page read and write
448E000
stack
page read and write
4571000
heap
page read and write
CF4000
unkown
page execute and write copy
4441000
heap
page read and write
3B6F000
stack
page read and write
12E2000
unkown
page execute and read and write
CA6000
unkown
page execute and read and write
A49000
unkown
page read and write
BD0000
unkown
page execute and read and write
7F1E000
stack
page read and write
5010000
direct allocation
page execute and read and write
41BE000
stack
page read and write
1374000
heap
page read and write
34FF000
stack
page read and write
5370000
direct allocation
page execute and read and write
694000
heap
page read and write
14CB000
heap
page read and write
694000
heap
page read and write
DE0000
direct allocation
page read and write
FB4000
heap
page read and write
1374000
heap
page read and write
23480000
heap
page read and write
4A41000
heap
page read and write
2CBE000
stack
page read and write
2349F000
heap
page read and write
32AF000
stack
page read and write
67E000
stack
page read and write
CF4000
unkown
page execute and read and write
40CF000
stack
page read and write
1D4FE000
heap
page read and write
19F8000
stack
page read and write
2F74E000
heap
page read and write
23473000
heap
page read and write
1374000
heap
page read and write
585D000
stack
page read and write
75C000
stack
page read and write
4B60000
direct allocation
page execute and read and write
28C0000
direct allocation
page read and write
36CF000
stack
page read and write
23499000
heap
page read and write
4540000
trusted library allocation
page read and write
4A41000
heap
page read and write
414F000
stack
page read and write
4A41000
heap
page read and write
2347F000
heap
page read and write
9D0000
heap
page read and write
4441000
heap
page read and write
1B00000
heap
page read and write
1394000
heap
page read and write
4441000
heap
page read and write
6CE32000
unkown
page readonly
23491000
heap
page read and write
4B50000
direct allocation
page execute and read and write
344F000
stack
page read and write
30BF000
stack
page read and write
23480000
heap
page read and write
4441000
heap
page read and write
377F000
stack
page read and write
DE0000
direct allocation
page read and write
4A11000
heap
page read and write
720000
heap
page read and write
61EB4000
direct allocation
page read and write
1B0A000
heap
page read and write
1116000
unkown
page execute and read and write
28C0000
direct allocation
page read and write
4441000
heap
page read and write
23480000
heap
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
23499000
heap
page read and write
110E000
unkown
page execute and read and write
12C0000
direct allocation
page read and write
23491000
heap
page read and write
4A41000
heap
page read and write
1310000
heap
page read and write
4441000
heap
page read and write
759000
heap
page read and write
FDF000
stack
page read and write
5050000
direct allocation
page execute and read and write
484F000
stack
page read and write
520E000
stack
page read and write
584000
heap
page read and write
A49000
unkown
page read and write
E92000
unkown
page execute and read and write
4A41000
heap
page read and write
4441000
heap
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
4A41000
heap
page read and write
72D000
heap
page read and write
CB2000
unkown
page execute and read and write
4A30000
direct allocation
page execute and read and write
3D4E000
stack
page read and write
7A2000
heap
page read and write
F2C000
stack
page read and write
4441000
heap
page read and write
584000
heap
page read and write
4C4E000
stack
page read and write
23484000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
584000
heap
page read and write
23480000
heap
page read and write
4441000
heap
page read and write
4A0F000
stack
page read and write
38BF000
stack
page read and write
4A40000
heap
page read and write
2349F000
heap
page read and write
30E0000
direct allocation
page read and write
CB2000
unkown
page execute and read and write
1BAE000
heap
page read and write
4441000
heap
page read and write
808C000
stack
page read and write
2DFE000
stack
page read and write
2347F000
heap
page read and write
2347A000
heap
page read and write
4441000
heap
page read and write
305F000
stack
page read and write
1AC7000
heap
page read and write
2B2F000
stack
page read and write
14A3000
heap
page read and write
1000000
unkown
page execute and read and write
4441000
heap
page read and write
4441000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
7B0000
heap
page read and write
1374000
heap
page read and write
4A10000
direct allocation
page execute and read and write
1C0000
heap
page read and write
4A3E000
stack
page read and write
4441000
heap
page read and write
785000
heap
page read and write
4ACF000
stack
page read and write
1374000
heap
page read and write
3CAE000
stack
page read and write
9BE000
stack
page read and write
2349F000
heap
page read and write
17BF000
stack
page read and write
4ECE000
stack
page read and write
CF4000
unkown
page execute and write copy
3F3E000
stack
page read and write
584000
heap
page read and write
3C20000
heap
page read and write
14A0000
direct allocation
page read and write
3D7E000
direct allocation
page execute and read and write
4441000
heap
page read and write
5360000
direct allocation
page execute and read and write
61E0000
heap
page read and write
23477000
heap
page read and write
5000000
direct allocation
page execute and read and write
4D51000
heap
page read and write
818C000
stack
page read and write
FF0000
heap
page read and write
28C0000
direct allocation
page read and write
478F000
stack
page read and write
3C8E000
stack
page read and write
2349F000
heap
page read and write
4441000
heap
page read and write
7DDC000
stack
page read and write
72F000
heap
page read and write
1CB9000
heap
page read and write
418E000
stack
page read and write
584000
heap
page read and write
1370000
direct allocation
page read and write
584000
heap
page read and write
5350000
direct allocation
page execute and read and write
6800000
heap
page read and write
12FF000
stack
page read and write
1374000
heap
page read and write
14E0000
direct allocation
page read and write
1AC7000
heap
page read and write
1489000
heap
page read and write
4A50000
heap
page read and write
4C10000
direct allocation
page execute and read and write
28C0000
direct allocation
page read and write
28BE000
stack
page read and write
3F6E000
stack
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
1D3F0000
heap
page read and write
584000
heap
page read and write
4B80000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
467F000
stack
page read and write
4A41000
heap
page read and write
28C0000
direct allocation
page read and write
4441000
heap
page read and write
54AE000
stack
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
14A0000
direct allocation
page read and write
23479000
heap
page read and write
12C0000
direct allocation
page read and write
4FE0000
direct allocation
page execute and read and write
4441000
heap
page read and write
30E0000
direct allocation
page read and write
4441000
heap
page read and write
5030000
direct allocation
page execute and read and write
694000
heap
page read and write
DE0000
direct allocation
page read and write
584000
heap
page read and write
5010000
direct allocation
page execute and read and write
23476000
heap
page read and write
12C0000
direct allocation
page read and write
142E000
heap
page read and write
403F000
stack
page read and write
6BE000
stack
page read and write
1042000
unkown
page execute and read and write
7AF000
heap
page read and write
4A41000
heap
page read and write
CF4000
unkown
page execute and read and write
CB2000
unkown
page execute and read and write
2C6F000
stack
page read and write
EDE000
stack
page read and write
1394000
heap
page read and write
4441000
heap
page read and write
33BF000
stack
page read and write
1370000
direct allocation
page read and write
4441000
heap
page read and write
4440000
heap
page read and write
1AE0000
heap
page read and write
4B80000
direct allocation
page execute and read and write
2F4AE000
stack
page read and write
4441000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
CE6000
unkown
page execute and read and write
1C77F000
stack
page read and write
1374000
heap
page read and write
3CBE000
stack
page read and write
12C4000
unkown
page execute and write copy
3B7F000
stack
page read and write
293F000
stack
page read and write
4A30000
direct allocation
page execute and read and write
1D17C000
stack
page read and write
6CE1D000
unkown
page readonly
47BF000
stack
page read and write
589D000
stack
page read and write
4A41000
heap
page read and write
1374000
heap
page read and write
1C28000
heap
page read and write
42FF000
stack
page read and write
3F2F000
stack
page read and write
FB0000
heap
page read and write
4A41000
heap
page read and write
1370000
direct allocation
page read and write
DE0000
direct allocation
page read and write
3CFE000
stack
page read and write
37AF000
stack
page read and write
1AC5000
heap
page read and write
14A0000
direct allocation
page read and write
380F000
stack
page read and write
19F3000
stack
page read and write
5030000
direct allocation
page execute and read and write
12C0000
direct allocation
page read and write
584000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
37BE000
stack
page read and write
3DBF000
stack
page read and write
7BA000
heap
page read and write
4441000
heap
page read and write
584000
heap
page read and write
28C0000
direct allocation
page read and write
6D020000
unkown
page read and write
E00000
direct allocation
page read and write
584000
heap
page read and write
787000
heap
page read and write
12C0000
direct allocation
page read and write
4E50000
trusted library allocation
page read and write
1370000
direct allocation
page read and write
4441000
heap
page read and write
70C000
heap
page read and write
CDE000
unkown
page execute and read and write
4A41000
heap
page read and write
584000
heap
page read and write
28E7000
heap
page read and write
79A000
heap
page read and write
4A41000
heap
page read and write
BD0000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
352F000
stack
page read and write
A4B000
unkown
page execute and read and write
4441000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
3E3E000
stack
page read and write
33FF000
stack
page read and write
7A7000
heap
page read and write
3C4F000
stack
page read and write
3C0E000
stack
page read and write
4FCF000
stack
page read and write
127E000
stack
page read and write
4441000
heap
page read and write
9DE000
stack
page read and write
32FE000
stack
page read and write
5340000
direct allocation
page execute and read and write
57E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
9C6000
unkown
page execute and read and write
1370000
direct allocation
page read and write
12C0000
direct allocation
page read and write
FB4000
heap
page read and write
12C0000
direct allocation
page read and write
584000
heap
page read and write
5310000
direct allocation
page execute and read and write
5090000
direct allocation
page execute and read and write
450F000
stack
page read and write
35CE000
stack
page read and write
23491000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
493E000
stack
page read and write
150A000
heap
page read and write
72D000
heap
page read and write
1D3BD000
stack
page read and write
694000
heap
page read and write
4A41000
heap
page read and write
5030000
direct allocation
page execute and read and write
89A000
heap
page read and write
73C000
stack
page read and write
2F2E000
stack
page read and write
1394000
heap
page read and write
4441000
heap
page read and write
584000
heap
page read and write
144E000
stack
page read and write
FD0000
heap
page read and write
4441000
heap
page read and write
4A41000
heap
page read and write
3A90000
heap
page read and write
3FAE000
stack
page read and write
23465000
heap
page read and write
4F21000
direct allocation
page read and write
4571000
heap
page read and write
3B60000
heap
page read and write
4441000
heap
page read and write
12C0000
direct allocation
page read and write
4441000
heap
page read and write
D9C000
stack
page read and write
E00000
direct allocation
page read and write
9E0000
unkown
page readonly
1CB7E000
stack
page read and write
2347A000
heap
page read and write
4460000
heap
page read and write
607F000
stack
page read and write
48CF000
stack
page read and write
FB4000
heap
page read and write
9A0000
heap
page read and write
3D74000
direct allocation
page execute and read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
468E000
stack
page read and write
3D74000
direct allocation
page execute and read and write
4441000
heap
page read and write
6CE40000
unkown
page readonly
584000
heap
page read and write
DE0000
direct allocation
page read and write
3D74000
direct allocation
page execute and read and write
348E000
stack
page read and write
31BE000
stack
page read and write
7B0000
heap
page read and write
1400000
direct allocation
page read and write
4441000
heap
page read and write
E79000
unkown
page read and write
12FD000
stack
page read and write
4B80000
direct allocation
page execute and read and write
302F000
stack
page read and write
1374000
heap
page read and write
23473000
heap
page read and write
3DCE000
stack
page read and write
680E000
heap
page read and write
48FE000
stack
page read and write
4A41000
heap
page read and write
4A70000
direct allocation
page execute and read and write
442F000
stack
page read and write
4A41000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4A41000
heap
page read and write
FB4000
heap
page read and write
55AF000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
1390000
heap
page read and write
70B000
heap
page read and write
1374000
heap
page read and write
303F000
stack
page read and write
4441000
heap
page read and write
1B0E000
heap
page read and write
4A41000
heap
page read and write
14A0000
direct allocation
page read and write
1AC0000
heap
page read and write
5060000
direct allocation
page execute and read and write
3BAE000
stack
page read and write
50A0000
direct allocation
page execute and read and write
1374000
heap
page read and write
2347A000
heap
page read and write
6810000
heap
page read and write
3CBF000
stack
page read and write
2F6AF000
stack
page read and write
5E76000
heap
page read and write
4A41000
heap
page read and write
1374000
heap
page read and write
3B70000
heap
page read and write
1C97F000
stack
page read and write
584000
heap
page read and write
4441000
heap
page read and write
148E000
stack
page read and write
364E000
stack
page read and write
49F0000
direct allocation
page read and write
694000
heap
page read and write
1374000
heap
page read and write
4A41000
heap
page read and write
E92000
unkown
page execute and read and write
4A41000
heap
page read and write
42FE000
stack
page read and write
F9F000
stack
page read and write
23480000
heap
page read and write
4571000
heap
page read and write
14E6000
heap
page read and write
53D000
stack
page read and write
357E000
stack
page read and write
51DB000
stack
page read and write
921000
unkown
page execute and write copy
584000
heap
page read and write
28C0000
direct allocation
page read and write
A4B000
unkown
page execute and read and write
46EF000
stack
page read and write
CDE000
unkown
page execute and read and write
3E4F000
stack
page read and write
9E0000
unkown
page readonly
420F000
stack
page read and write
3E8E000
stack
page read and write
2347F000
heap
page read and write
4B0E000
stack
page read and write
4A41000
heap
page read and write
316F000
stack
page read and write
72E000
heap
page read and write
4B80000
direct allocation
page execute and read and write
4441000
heap
page read and write
CF5000
unkown
page execute and write copy
4A41000
heap
page read and write
503C000
stack
page read and write
61ED0000
direct allocation
page read and write
23490000
heap
page read and write
61ED4000
direct allocation
page readonly
584000
heap
page read and write
4441000
heap
page read and write
575D000
stack
page read and write
FE0000
heap
page read and write
13BE000
stack
page read and write
DE0000
direct allocation
page read and write
5070000
direct allocation
page execute and read and write
4A47000
heap
page read and write
610000
heap
page read and write
1374000
heap
page read and write
4B10000
trusted library allocation
page read and write
CDE000
unkown
page execute and read and write
4FA000
stack
page read and write
4C00000
direct allocation
page execute and read and write
83D000
stack
page read and write
309E000
stack
page read and write
14E0000
direct allocation
page read and write
5E5E000
stack
page read and write
3DFF000
stack
page read and write
4A41000
heap
page read and write
1400000
direct allocation
page read and write
715000
heap
page read and write
2348F000
heap
page read and write
23477000
heap
page read and write
23478000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4441000
heap
page read and write
3FCE000
stack
page read and write
78E000
heap
page read and write
28C0000
direct allocation
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
23497000
heap
page read and write
320F000
stack
page read and write
2A3F000
stack
page read and write
6DA000
heap
page read and write
A42000
unkown
page execute and read and write
28C0000
direct allocation
page read and write
1370000
heap
page read and write
53D0000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
CF4000
unkown
page execute and write copy
783000
heap
page read and write
7BA0000
heap
page read and write
2B7E000
stack
page read and write
136E000
stack
page read and write
584000
heap
page read and write
4A41000
heap
page read and write
A49000
unkown
page read and write
142A000
heap
page read and write
1374000
heap
page read and write
1370000
direct allocation
page read and write
23496000
heap
page read and write
4A41000
heap
page read and write
49F0000
direct allocation
page read and write
5330000
direct allocation
page execute and read and write
4A41000
heap
page read and write
31BF000
stack
page read and write
4A11000
heap
page read and write
287F000
stack
page read and write
4A41000
heap
page read and write
3BBE000
stack
page read and write
561E000
stack
page read and write
FB4000
heap
page read and write
15F0000
heap
page read and write
584000
heap
page read and write
4A60000
heap
page read and write
5020000
direct allocation
page execute and read and write
338F000
stack
page read and write
E7B000
unkown
page execute and read and write
FDE000
stack
page read and write
5340000
direct allocation
page execute and read and write
88B000
heap
page read and write
8CE000
stack
page read and write
1374000
heap
page read and write
4441000
heap
page read and write
4A41000
heap
page read and write
5090000
direct allocation
page execute and read and write
4A41000
heap
page read and write
30DE000
stack
page read and write
4441000
heap
page read and write
3D7E000
direct allocation
page execute and read and write
2348F000
heap
page read and write
C8C000
unkown
page execute and read and write
324F000
stack
page read and write
446E000
stack
page read and write
9E0000
unkown
page readonly
694000
heap
page read and write
23466000
heap
page read and write
FB4000
heap
page read and write
12BC000
stack
page read and write
39FF000
stack
page read and write
5040000
direct allocation
page execute and read and write
CE6000
unkown
page execute and read and write
2AC000
stack
page read and write
2349F000
heap
page read and write
1374000
heap
page read and write
1370000
direct allocation
page read and write
4441000
heap
page read and write
FB4000
heap
page read and write
41BF000
stack
page read and write
6D01E000
unkown
page read and write
23466000
heap
page read and write
432E000
stack
page read and write
3D30000
direct allocation
page execute and read and write
277E000
stack
page read and write
FB4000
heap
page read and write
1374000
heap
page read and write
43CF000
stack
page read and write
4570000
heap
page read and write
3D64000
direct allocation
page execute and read and write
3AA0000
heap
page read and write
B45000
unkown
page execute and read and write
4441000
heap
page read and write
37FE000
stack
page read and write
1370000
direct allocation
page read and write
9E1000
unkown
page execute and write copy
1BB3000
heap
page read and write
2348C000
heap
page read and write
334E000
stack
page read and write
43FF000
stack
page read and write
392E000
stack
page read and write
23490000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
6D0000
heap
page read and write
5060000
direct allocation
page execute and read and write
14FB000
heap
page read and write
4A41000
heap
page read and write
433E000
stack
page read and write
4A41000
heap
page read and write
9E1000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
CF4000
unkown
page execute and write copy
783000
heap
page read and write
CF5000
unkown
page execute and write copy
920000
unkown
page readonly
4D51000
heap
page read and write
388F000
stack
page read and write
1C87000
heap
page read and write
407F000
stack
page read and write
12E0000
heap
page read and write
DE0000
direct allocation
page read and write
1C3B000
heap
page read and write
584000
heap
page read and write
1374000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4571000
heap
page read and write
A49000
unkown
page write copy
470F000
stack
page read and write
3F60000
heap
page read and write
4441000
heap
page read and write
4A41000
heap
page read and write
7A0000
heap
page read and write
9E0000
unkown
page read and write
8190000
heap
page read and write
4441000
heap
page read and write
7CDB000
stack
page read and write
4A41000
heap
page read and write
23487000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4D50000
heap
page read and write
394F000
stack
page read and write
4A41000
heap
page read and write
3A3F000
stack
page read and write
4441000
heap
page read and write
1394000
heap
page read and write
584000
heap
page read and write
4A41000
heap
page read and write
A6A000
unkown
page execute and read and write
53E0000
direct allocation
page execute and read and write
584000
heap
page read and write
FB4000
heap
page read and write
4A20000
direct allocation
page execute and read and write
4A41000
heap
page read and write
53A0000
direct allocation
page execute and read and write
3FEE000
stack
page read and write
14A0000
direct allocation
page read and write
42EF000
stack
page read and write
1374000
heap
page read and write
32BF000
stack
page read and write
363F000
stack
page read and write
1AF0000
direct allocation
page execute and read and write
3A9C000
heap
page read and write
4441000
heap
page read and write
4A3F000
stack
page read and write
1374000
heap
page read and write
1394000
heap
page read and write
9E1000
unkown
page execute and write copy
1124000
unkown
page execute and write copy
158B000
stack
page read and write
306E000
stack
page read and write
1CF7D000
stack
page read and write
FB4000
heap
page read and write
584000
heap
page read and write
23480000
heap
page read and write
4A41000
heap
page read and write
61ECC000
direct allocation
page read and write
A49000
unkown
page write copy
DDE000
stack
page read and write
1124000
unkown
page execute and read and write
4A41000
heap
page read and write
3100000
heap
page read and write
12C0000
direct allocation
page read and write
3EFF000
stack
page read and write
6DE000
heap
page read and write
23491000
heap
page read and write
342E000
stack
page read and write
4441000
heap
page read and write
5030000
direct allocation
page execute and read and write
16BE000
stack
page read and write
3F0E000
stack
page read and write
33FE000
stack
page read and write
3BCF000
stack
page read and write
1B77000
heap
page read and write
12C0000
direct allocation
page read and write
1D3F1000
heap
page read and write
A42000
unkown
page execute and read and write
15E0000
heap
page read and write
6810000
heap
page read and write
1CBA000
heap
page read and write
DE0000
direct allocation
page read and write
6CFDF000
unkown
page readonly
4441000
heap
page read and write
23474000
heap
page read and write
4A41000
heap
page read and write
584000
heap
page read and write
457E000
stack
page read and write
1C73000
heap
page read and write
23480000
heap
page read and write
28C0000
direct allocation
page read and write
4A41000
heap
page read and write
93C000
unkown
page execute and write copy
353E000
stack
page read and write
366F000
stack
page read and write
694000
heap
page read and write
406F000
stack
page read and write
571F000
stack
page read and write
61ED3000
direct allocation
page read and write
3AFE000
stack
page read and write
2349C000
heap
page read and write
474E000
stack
page read and write
31AE000
stack
page read and write
350E000
stack
page read and write
2349F000
heap
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
1C2A000
heap
page read and write
4441000
heap
page read and write
6801000
heap
page read and write
7A0000
heap
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
4A00000
direct allocation
page execute and read and write
48EF000
stack
page read and write
2349A000
heap
page read and write
1D4F0000
trusted library allocation
page read and write
1BC5000
heap
page read and write
81A7000
heap
page read and write
4120000
heap
page read and write
38CE000
stack
page read and write
14DC000
heap
page read and write
4A11000
heap
page read and write
4A41000
heap
page read and write
1BB8000
heap
page read and write
2FBF000
stack
page read and write
CE6000
unkown
page execute and read and write
4C34000
heap
page read and write
14A0000
direct allocation
page read and write
1374000
heap
page read and write
FB4000
heap
page read and write
74E000
heap
page read and write
1C9A000
heap
page read and write
751000
heap
page read and write
50B0000
direct allocation
page execute and read and write
330F000
stack
page read and write
4A41000
heap
page read and write
584000
heap
page read and write
23492000
heap
page read and write
4441000
heap
page read and write
488E000
stack
page read and write
2349E000
heap
page read and write
584000
heap
page read and write
358F000
stack
page read and write
37BF000
stack
page read and write
136E000
stack
page read and write
DE0000
direct allocation
page read and write
4441000
heap
page read and write
38FE000
stack
page read and write
4455000
heap
page read and write
There are 1235 hidden memdumps, click here to show them.