IOC Report
FNLJD8Q3.exe

loading gif

Files

File Path
Type
Category
Malicious
FNLJD8Q3.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\zmoh4\2djmo8
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\zmoh4\bsriec
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\zmoh4\fctr1d
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\zmoh4\gdbi5pppz
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\zmoh4\glf379
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\zmoh4\iwlf3o
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\zmoh4\jwbsjm
SQLite 3.x database, last written using SQLite version 3046000, file counter 6, database pages 41, 1st free page 29, free pages 1, cookie 0x25, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\zmoh4\l6xlf3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\zmoh4\r9zmglf3e
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\zmoh4\s00z58
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\zmoh4\vs0hvs
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\json[1].json
JSON data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (1437)
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 79
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (3234)
downloaded
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FNLJD8Q3.exe
"C:\Users\user\Desktop\FNLJD8Q3.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2380,i,12614543058951041071,778037290261149111,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2472 /prefetch:3
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\zmoh4" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 11

URLs

Name
IP
Malicious
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://t.me/g_etcontentdqu220Mozilla/5.0
unknown
https://goto.google.com/sme-bugs2e
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://ingereck.net
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://mail.google.com/chat/download?usp=chrome_defaultfault
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.youtube.com/:
unknown
https://beaconmax.com
unknown
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
unknown
https://mail.google.com/mail/:
unknown
https://trkkn.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico0A
unknown
https://support.google.com/chrome?p=desktop_tab_groups
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e175
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
https://docs.google.com/document/:
unknown
https://mail.google.com/chat/download?usp=chrome_default
unknown
https://www.google.com/tools/feedback/chrome/__submit
unknown
https://mail.google.com/chat/
unknown
https://steamcommunity.com/profiles/76561199832267488
https://mail.google.com/mail/J
unknown
https://calendar.google.com
unknown
http://unisolated.invalid/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://mail.google.com/chat/:
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://www.google.com/chrome/tips/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20161
unknown
https://drive.google.com/?lfhs=2
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.184.196
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
https://finn.no
unknown
https://verve.com
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://www.google.com/chrome/browser-tools/
unknown
https://www.youtube.com/J
unknown
https://docs.google.com/forms/u/0/create?usp=chrome_actions
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://appsflyer.com
unknown
https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
unknown
https://support.google.com/chromebook?p=app_intent
unknown
https://chromewebstore.google.com/category/themes
unknown
https://chrome.google.com/webstore
unknown
https://dailymail.co.uk
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://sitescout.com
unknown
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://gemini.google.com/glic
unknown
https://support.google.com/chrome/answer/96817
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://myaccount.google.com/shielded-email?utm_source=chrome
unknown
https://myaccount.google.com/shielded-email?utm_source=chrome2B
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com/.well-known/protected-auction/v1/public-k
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.google.com/chrome/#safe
unknown
https://adsmeasurement.com
unknown
https://www.google.com/chrome/browser-features/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com/.well-known/protected-auction/v1/public-k
unknown
https://aqfer.com
unknown
https://azubiyo.de
unknown
https://getcapi.co
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
https://gokwik.co
unknown
https://google-ohttp-relay-join.fastly-edge.com/2J
unknown
https://t.me/g_etcontent)
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://weborama-tech.ru
unknown
https://chromewebstore.google.com/
unknown
https://chromewebstore.google.com/category/extensions
unknown
https://www.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://gemini.google.com/app?q=
unknown
https://gemini.google.com/glic/intro?
unknown
https://clients6.google.com
unknown
http://google.com/
unknown
https://tangooserver.com
unknown
https://mail.google.com/mail/installwebapp?usp=chrome_default
unknown
https://tailtarget.com
unknown
https://web.telegram.org
unknown
https://t.me/g_etcontent
149.154.167.99
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
t.p.formaxprime.co.uk
78.47.63.132
malicious
plus.l.google.com
142.250.186.174
play.google.com
142.250.185.110
t.me
149.154.167.99
www.google.com
142.250.184.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
78.47.63.132
t.p.formaxprime.co.uk
Germany
malicious
142.250.184.196
www.google.com
United States
142.250.186.174
plus.l.google.com
United States
149.154.167.99
t.me
United Kingdom
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
85C01001000
direct allocation
page read and write
1CC562F8000
heap
page read and write
11B0000
stack
page read and write
85C017C4000
direct allocation
page read and write
5517000
heap
page read and write
1CC56B51000
unclassified section
page read and write
11AC000
stack
page read and write
858004CC000
direct allocation
page read and write
1CC57D91000
heap
page read and write
1CC4E950000
heap
page read and write
1CC523C7000
heap
page read and write
1CC561BA000
heap
page read and write
1CC565A0000
unclassified section
page read and write
85C00424000
direct allocation
page read and write
85C018F4000
direct allocation
page read and write
1CC566E1000
unclassified section
page read and write
85C001D8000
direct allocation
page read and write
85C002B8000
direct allocation
page read and write
85C014E4000
direct allocation
page read and write
85C01C04000
direct allocation
page read and write
85C01974000
direct allocation
page read and write
85C005A4000
direct allocation
page read and write
1CC5627A000
heap
page read and write
85C011C8000
direct allocation
page read and write
85800168000
direct allocation
page read and write
81597FE000
unkown
page readonly
85C01884000
direct allocation
page read and write
1CC4E88D000
heap
page read and write
8157FFB000
stack
page read and write
85C00CF8000
direct allocation
page read and write
85C012BC000
direct allocation
page read and write
1CC56847000
unclassified section
page read and write
4337000
heap
page read and write
85C01D64000
direct allocation
page read and write
3F4A000
heap
page read and write
85C009AC000
direct allocation
page read and write
85800666000
direct allocation
page read and write
85C00DEC000
direct allocation
page read and write
85C019D0000
direct allocation
page read and write
390F000
stack
page read and write
85C00218000
direct allocation
page read and write
430C000
heap
page read and write
1CC57E31000
heap
page read and write
85C01DA8000
direct allocation
page read and write
85C01004000
direct allocation
page read and write
40D7000
heap
page read and write
85C003B8000
direct allocation
page read and write
1CC522F0000
heap
page read and write
1CC51E5D000
heap
page read and write
1CC53E02000
trusted library allocation
page read and write
1CC57D95000
heap
page read and write
85C01E1C000
direct allocation
page read and write
8161FFB000
stack
page read and write
4600000B4000
direct allocation
page read and write
1CC56660000
unclassified section
page read and write
81397FE000
unkown
page readonly
46000008C000
direct allocation
page read and write
85800044000
direct allocation
page read and write
85C00C20000
direct allocation
page read and write
85C00601000
direct allocation
page read and write
4313000
heap
page read and write
85C016D0000
direct allocation
page read and write
85C0072C000
direct allocation
page read and write
8580046C000
direct allocation
page read and write
85C00858000
direct allocation
page read and write
1CC56215000
heap
page read and write
40A6000
heap
page read and write
40B1000
heap
page read and write
1CC5620E000
heap
page read and write
85C00214000
direct allocation
page read and write
85C00430000
direct allocation
page read and write
3C40000
heap
page read and write
1CC561A9000
heap
page read and write
8580007B000
direct allocation
page read and write
1CC523D6000
heap
page read and write
4FCE000
heap
page read and write
1CC56304000
heap
page read and write
85C0161C000
direct allocation
page read and write
85C00588000
direct allocation
page read and write
1CC56196000
heap
page read and write
85C01764000
direct allocation
page read and write
85800401000
direct allocation
page read and write
813DFFC000
stack
page read and write
4E44000
heap
page read and write
1CC52397000
heap
page read and write
858000C7000
direct allocation
page read and write
655000044000
direct allocation
page read and write
4600000B4000
direct allocation
page read and write
1CC544F7000
unclassified section
page read and write
1CC57D71000
heap
page read and write
814F7FE000
unkown
page readonly
85C01928000
direct allocation
page read and write
1CC4E923000
heap
page read and write
460000098000
direct allocation
page read and write
813EFFB000
stack
page read and write
81567FE000
unkown
page readonly
1CC56304000
heap
page read and write
85C01234000
direct allocation
page read and write
85C01EFA000
direct allocation
page read and write
1CC54310000
unclassified section
page read and write
85C01690000
direct allocation
page read and write
4B1A5FF000
stack
page read and write
85C00248000
direct allocation
page read and write
85C00C7C000
direct allocation
page read and write
85800224000
direct allocation
page read and write
85C01EC8000
direct allocation
page read and write
85C016A4000
direct allocation
page read and write
1CC523D6000
heap
page read and write
85C00214000
direct allocation
page read and write
1CC5625A000
heap
page read and write
85C00B04000
direct allocation
page read and write
8160FFC000
stack
page read and write
1CC562D4000
heap
page read and write
85C0036C000
direct allocation
page read and write
1CC561A3000
heap
page read and write
40B8000
heap
page read and write
46000006C000
direct allocation
page read and write
85C01DF4000
direct allocation
page read and write
7FF67CF3B000
unkown
page readonly
85C01CC8000
direct allocation
page read and write
1CC562CA000
heap
page read and write
47CC000
stack
page read and write
85800490000
direct allocation
page read and write
1CC4F262000
unkown
page readonly
4600000D0000
direct allocation
page read and write
1CC523DC000
heap
page read and write
85C01E01000
direct allocation
page read and write
85C01464000
direct allocation
page read and write
85C0005E000
direct allocation
page read and write
85C01084000
direct allocation
page read and write
85C01C30000
direct allocation
page read and write
85C01204000
direct allocation
page read and write
1CC5624B000
heap
page read and write
85C01A98000
direct allocation
page read and write
85C013D8000
direct allocation
page read and write
1CC56304000
heap
page read and write
8147FFE000
stack
page read and write
85C00FF4000
direct allocation
page read and write
1CC4E86B000
heap
page read and write
1CC54527000
unclassified section
page read and write
4600000DC000
direct allocation
page read and write
1CC57DE0000
heap
page read and write
85C01601000
direct allocation
page read and write
8144FF9000
stack
page read and write
81467FE000
unkown
page readonly
813AFFE000
stack
page read and write
85C01338000
direct allocation
page read and write
85C00244000
direct allocation
page read and write
85C00548000
direct allocation
page read and write
65500002C000
direct allocation
page read and write
85C013D8000
direct allocation
page read and write
85C00EC0000
direct allocation
page read and write
85C00558000
direct allocation
page read and write
85C01804000
direct allocation
page read and write
815C7FE000
unkown
page readonly
3F56000
heap
page read and write
440B000
heap
page read and write
85C019ED000
direct allocation
page read and write
85C01EBD000
direct allocation
page read and write
85C01EF0000
direct allocation
page read and write
1CC56304000
heap
page read and write
85C01870000
direct allocation
page read and write
1CC5238E000
heap
page read and write
1CC561BC000
heap
page read and write
380E000
stack
page read and write
85C00F0C000
direct allocation
page read and write
85800168000
direct allocation
page read and write
85C00A8C000
direct allocation
page read and write
1CC54510000
unclassified section
page read and write
85C0023C000
direct allocation
page read and write
1CC56180000
heap
page read and write
1CC57D95000
heap
page read and write
4176000
heap
page read and write
85C01ED5000
direct allocation
page read and write
2E8C000
stack
page read and write
85C002F8000
direct allocation
page read and write
1CC582E0000
unkown
page readonly
85C00E04000
direct allocation
page read and write
1CC58179000
heap
page read and write
40E0000
heap
page read and write
1CC562E1000
heap
page read and write
31A0000
heap
page read and write
65500007C000
direct allocation
page read and write
8580057C000
direct allocation
page read and write
1CC523D9000
heap
page read and write
1CC562FB000
heap
page read and write
655000104000
direct allocation
page read and write
85C015E8000
direct allocation
page read and write
432E000
heap
page read and write
8146FFB000
stack
page read and write
85C01034000
direct allocation
page read and write
1CC51E43000
heap
page read and write
8580048C000
direct allocation
page read and write
1CC5623F000
heap
page read and write
85C01394000
direct allocation
page read and write
85800528000
direct allocation
page read and write
85800414000
direct allocation
page read and write
85C009EC000
direct allocation
page read and write
85800524000
direct allocation
page read and write
85C00A04000
direct allocation
page read and write
1CC562B5000
heap
page read and write
3F34000
heap
page read and write
85C00088000
direct allocation
page read and write
1CC5234F000
heap
page read and write
85C01030000
direct allocation
page read and write
ABC000
heap
page read and write
246667A0000
heap
page read and write
85C005B4000
direct allocation
page read and write
8580043C000
direct allocation
page read and write
85C00520000
direct allocation
page read and write
1CC5619D000
heap
page read and write
815AFFE000
stack
page read and write
460000080000
direct allocation
page read and write
85C002F0000
direct allocation
page read and write
85C01DAC000
direct allocation
page read and write
1CC57DE0000
heap
page read and write
81487FE000
unkown
page readonly
1CC5625A000
heap
page read and write
85C00D40000
direct allocation
page read and write
1CC57D95000
heap
page read and write
814DFFE000
stack
page read and write
AD2000
heap
page read and write
81657FE000
unkown
page readonly
85C01CC4000
direct allocation
page read and write
85C010B4000
direct allocation
page read and write
85C01A01000
direct allocation
page read and write
1CC56199000
heap
page read and write
460000004000
direct allocation
page read and write
85C01C88000
direct allocation
page read and write
85C00C70000
direct allocation
page read and write
85C00784000
direct allocation
page read and write
85C01490000
direct allocation
page read and write
43A3000
heap
page read and write
85C01DE4000
direct allocation
page read and write
2FD0000
heap
page read and write
1CC56304000
heap
page read and write
1CC57DE0000
heap
page read and write
1CC523E4000
heap
page read and write
8142FFC000
stack
page read and write
1CC56304000
heap
page read and write
858004BC000
direct allocation
page read and write
85C006CC000
direct allocation
page read and write
1CC562D1000
heap
page read and write
85C00804000
direct allocation
page read and write
85C011D8000
direct allocation
page read and write
1CC5684D000
unclassified section
page read and write
85C00514000
direct allocation
page read and write
1CC56356000
heap
page read and write
813CFFB000
stack
page read and write
43AB000
heap
page read and write
8150FFC000
stack
page read and write
858000B8000
direct allocation
page read and write
85C01DF8000
direct allocation
page read and write
1CC523BE000
heap
page read and write
1CC56807000
unclassified section
page read and write
4911000
heap
page read and write
85800230000
direct allocation
page read and write
1CC56F81000
unclassified section
page read and write
85C01DC4000
direct allocation
page read and write
434F000
heap
page read and write
1CC52324000
heap
page read and write
85C010F4000
direct allocation
page read and write
85800666000
direct allocation
page read and write
85C004B0000
direct allocation
page read and write
85C001A0000
direct allocation
page read and write
1CC54D83000
heap
page read and write
1CC5619C000
heap
page read and write
1CC56F70000
unclassified section
page read and write
8166FFE000
stack
page read and write
85C00304000
direct allocation
page read and write
6550000DC000
direct allocation
page read and write
814D7FE000
unkown
page readonly
85C012EC000
direct allocation
page read and write
815CFFD000
stack
page read and write
85800144000
direct allocation
page read and write
7FF67CF3B000
unkown
page readonly
85C01328000
direct allocation
page read and write
1CC545B7000
unclassified section
page read and write
85C00B60000
direct allocation
page read and write
4363000
heap
page read and write
2FC0000
heap
page read and write
49B8000
heap
page read and write
85C01D84000
direct allocation
page read and write
7FFC81B81000
unkown
page execute read
433A000
heap
page read and write
8155FFC000
stack
page read and write
460000001000
direct allocation
page read and write
85C0079C000
direct allocation
page read and write
2ECC000
stack
page read and write
85C01D58000
direct allocation
page read and write
81617FE000
unkown
page readonly
85800604000
direct allocation
page read and write
81507FE000
unkown
page readonly
4085000
heap
page read and write
85C00690000
direct allocation
page read and write
2F7E000
stack
page read and write
1CC57DE3000
heap
page read and write
54F5000
heap
page read and write
85C007A8000
direct allocation
page read and write
85C01E88000
direct allocation
page read and write
1CC563C0000
unclassified section
page read and write
6550000D4000
direct allocation
page read and write
85800498000
direct allocation
page read and write
85C0007D000
direct allocation
page read and write
85C01994000
direct allocation
page read and write
815E7FE000
unkown
page readonly
858001F4000
direct allocation
page read and write
1CC5623F000
heap
page read and write
18CF000
stack
page read and write
6550000C8000
direct allocation
page read and write
85C00E94000
direct allocation
page read and write
85C0190C000
direct allocation
page read and write
858000F0000
direct allocation
page read and write
1CC523D6000
heap
page read and write
1CC563D7000
unclassified section
page read and write
85C0015C000
direct allocation
page read and write
85C00178000
direct allocation
page read and write
85C01700000
direct allocation
page read and write
858000E8000
direct allocation
page read and write
85C01348000
direct allocation
page read and write
1CC57DE0000
heap
page read and write
1CC57D71000
heap
page read and write
4306000
heap
page read and write
85C013B0000
direct allocation
page read and write
4170000
heap
page read and write
85800544000
direct allocation
page read and write
85C0022C000
direct allocation
page read and write
85C01E38000
direct allocation
page read and write
85C005B4000
direct allocation
page read and write
8139FFE000
stack
page read and write
85C0021C000
direct allocation
page read and write
85C00900000
direct allocation
page read and write
1CC56304000
heap
page read and write
85C00A01000
direct allocation
page read and write
4948000
heap
page read and write
8168FFE000
stack
page read and write
85C00270000
direct allocation
page read and write
85C0131C000
direct allocation
page read and write
85C0037C000
direct allocation
page read and write
85C008D8000
direct allocation
page read and write
4123000
heap
page read and write
1CC54B20000
unclassified section
page read and write
85C00548000
direct allocation
page read and write
1CC56B40000
unclassified section
page read and write
85C00598000
direct allocation
page read and write
85C0184C000
direct allocation
page read and write
85C004A6000
direct allocation
page read and write
85C00238000
direct allocation
page read and write
4116000
heap
page read and write
1CC562E5000
heap
page read and write
8580011C000
direct allocation
page read and write
85C016FA000
direct allocation
page read and write
3E90000
heap
page read and write
15B9000
heap
page read and write
85C00F98000
direct allocation
page read and write
1CC57DD3000
heap
page read and write
1CC561ED000
heap
page read and write
11BB000
stack
page read and write
8580049C000
direct allocation
page read and write
858004B8000
direct allocation
page read and write
7FF67CF11000
unkown
page execute read
3092000
heap
page read and write
4917000
heap
page read and write
85C009C0000
direct allocation
page read and write
85C01EE0000
direct allocation
page read and write
1CC562F4000
heap
page read and write
85C00304000
direct allocation
page read and write
85C01D3C000
direct allocation
page read and write
85800098000
direct allocation
page read and write
858005AC000
direct allocation
page read and write
1CC562C1000
heap
page read and write
3ED1000
heap
page read and write
4E79000
heap
page read and write
4600000B4000
direct allocation
page read and write
3FE0000
heap
page read and write
85C00264000
direct allocation
page read and write
655000001000
direct allocation
page read and write
1CC54A91000
unclassified section
page read and write
460000044000
direct allocation
page read and write
85C01401000
direct allocation
page read and write
1CC523BA000
heap
page read and write
1CC56262000
heap
page read and write
85C00558000
direct allocation
page read and write
85800568000
direct allocation
page read and write
85C01754000
direct allocation
page read and write
858000FA000
direct allocation
page read and write
1CC57D95000
heap
page read and write
1CC51E20000
heap
page read and write
85C00948000
direct allocation
page read and write
1508000
heap
page read and write
85C00920000
direct allocation
page read and write
1CC561A3000
heap
page read and write
4600000B8000
direct allocation
page read and write
85C00D9C000
direct allocation
page read and write
85C0112C000
direct allocation
page read and write
1CC57DE3000
heap
page read and write
24666780000
heap
page read and write
1CC57DE0000
heap
page read and write
1CC5625B000
heap
page read and write
85C01D74000
direct allocation
page read and write
1CC51E44000
heap
page read and write
1CC56304000
heap
page read and write
1CC52391000
heap
page read and write
85C0004C000
direct allocation
page read and write
1CC57D95000
heap
page read and write
85800018000
direct allocation
page read and write
85800248000
direct allocation
page read and write
1CC54A00000
unclassified section
page read and write
1430000
heap
page read and write
1CC523B2000
heap
page read and write
4600000A8000
direct allocation
page read and write
85C003DC000
direct allocation
page read and write
1CC563DD000
unclassified section
page read and write
85C010D0000
direct allocation
page read and write
42FF000
heap
page read and write
3FC4000
heap
page read and write
858000B0000
direct allocation
page read and write
550D000
heap
page read and write
85C00D80000
direct allocation
page read and write
147E000
stack
page read and write
85C00A78000
direct allocation
page read and write
1CC523C7000
heap
page read and write
81677FE000
unkown
page readonly
1CC57381000
unclassified section
page read and write
1CC56252000
heap
page read and write
10BB000
stack
page read and write
1420000
heap
page read and write
85C01DA4000
direct allocation
page read and write
85C018A0000
direct allocation
page read and write
85C004A4000
direct allocation
page read and write
1CC567F7000
unclassified section
page read and write
81637FE000
unkown
page readonly
1CC562E5000
heap
page read and write
85C011C8000
direct allocation
page read and write
1CC56304000
heap
page read and write
85C00E58000
direct allocation
page read and write
24666700000
heap
page read and write
85C01CB4000
direct allocation
page read and write
1CC56304000
heap
page read and write
85800540000
direct allocation
page read and write
8152FFC000
stack
page read and write
1CC51E53000
heap
page read and write
1CC567D7000
unclassified section
page read and write
85C01368000
direct allocation
page read and write
85C001B5000
direct allocation
page read and write
85C00FD8000
direct allocation
page read and write
4360000
heap
page read and write
85C006AC000
direct allocation
page read and write
85C00E79000
direct allocation
page read and write
85C0014C000
direct allocation
page read and write
1CC5627A000
heap
page read and write
85C0164B000
direct allocation
page read and write
1CC56387000
unclassified section
page read and write
1CC562CE000
heap
page read and write
4600000F0000
direct allocation
page read and write
85C01520000
direct allocation
page read and write
655000018000
direct allocation
page read and write
85C01E04000
direct allocation
page read and write
1CC57C70000
unkown
page read and write
85C01D60000
direct allocation
page read and write
A30000
heap
page read and write
1CC56890000
unclassified section
page read and write
85C00B74000
direct allocation
page read and write
1CC523BE000
heap
page read and write
85C01DC0000
direct allocation
page read and write
85C019D0000
direct allocation
page read and write
1CC5234C000
heap
page read and write
8580002C000
direct allocation
page read and write
85800508000
direct allocation
page read and write
858004A0000
direct allocation
page read and write
1CC521A0000
trusted library section
page read and write
85C01638000
direct allocation
page read and write
85C0009C000
direct allocation
page read and write
1CC562E5000
heap
page read and write
1CC51E5A000
heap
page read and write
8145FFE000
stack
page read and write
85C00604000
direct allocation
page read and write
5537000
heap
page read and write
4600000EC000
direct allocation
page read and write
1CC54A80000
unclassified section
page read and write
81437FE000
unkown
page readonly
49E0000
heap
page read and write
24666730000
heap
page read and write
81497FE000
unkown
page readonly
815A7FE000
unkown
page readonly
1CC4E883000
heap
page read and write
85C00968000
direct allocation
page read and write
7FF67CF4D000
unkown
page readonly
7FF67CF48000
unkown
page readonly
1CC56304000
heap
page read and write
85C00B1C000
direct allocation
page read and write
85C00680000
direct allocation
page read and write
85C0013C000
direct allocation
page read and write
85C00310000
direct allocation
page read and write
85C00E38000
direct allocation
page read and write
85C003B8000
direct allocation
page read and write
85C019B0000
direct allocation
page read and write
1CC57DE0000
heap
page read and write
85C01E34000
direct allocation
page read and write
1CC523B2000
heap
page read and write
85C0198C000
direct allocation
page read and write
85C001BC000
direct allocation
page read and write
396E000
stack
page read and write
30FE000
stack
page read and write
85C00120000
direct allocation
page read and write
85C001DB000
direct allocation
page read and write
4600000A8000
direct allocation
page read and write
8580066C000
direct allocation
page read and write
85C000EC000
direct allocation
page read and write
85C01D04000
direct allocation
page read and write
85C01464000
direct allocation
page read and write
8159FFB000
stack
page read and write
1CC4E740000
heap
page readonly
85C00520000
direct allocation
page read and write
85C019DC000
direct allocation
page read and write
1CC56304000
heap
page read and write
81447FE000
unkown
page readonly
85800448000
direct allocation
page read and write
42F9000
heap
page read and write
8580047C000
direct allocation
page read and write
1CC57D95000
heap
page read and write
85C00530000
direct allocation
page read and write
85C01300000
direct allocation
page read and write
85C01D6C000
direct allocation
page read and write
4043000
heap
page read and write
85C0119C000
direct allocation
page read and write
85C01160000
direct allocation
page read and write
85800428000
direct allocation
page read and write
85C00CE8000
direct allocation
page read and write
85C011B8000
direct allocation
page read and write
85800664000
direct allocation
page read and write
85C00558000
direct allocation
page read and write
4600000A8000
direct allocation
page read and write
85C01440000
direct allocation
page read and write
85C01D70000
direct allocation
page read and write
1CC56252000
heap
page read and write
5019000
heap
page read and write
1CC52370000
heap
page read and write
6550000C8000
direct allocation
page read and write
7FD000
stack
page read and write
85C015B4000
direct allocation
page read and write
85C012E8000
direct allocation
page read and write
85C016B8000
direct allocation
page read and write
1CC56304000
heap
page read and write
81517FE000
unkown
page readonly
85C01578000
direct allocation
page read and write
85C007D0000
direct allocation
page read and write
85C002F8000
direct allocation
page read and write
85800601000
direct allocation
page read and write
4326000
heap
page read and write
1CC56185000
heap
page read and write
85C011D8000
direct allocation
page read and write
85C0031C000
direct allocation
page read and write
85C01578000
direct allocation
page read and write
85C015DC000
direct allocation
page read and write
18D0000
heap
page read and write
85C00258000
direct allocation
page read and write
85C0016C000
direct allocation
page read and write
85C000F4000
direct allocation
page read and write
4F0E000
heap
page read and write
1CC52391000
heap
page read and write
1CC57D95000
heap
page read and write
85C00E84000
direct allocation
page read and write
85C00E58000
direct allocation
page read and write
85C0191C000
direct allocation
page read and write
4968000
heap
page read and write
85C00664000
direct allocation
page read and write
4BD0000
heap
page read and write
42D0000
heap
page read and write
1CC5627A000
heap
page read and write
4930000
heap
page read and write
1435000
heap
page read and write
85C016DC000
direct allocation
page read and write
85C01CDC000
direct allocation
page read and write
85C00414000
direct allocation
page read and write
85C0164D000
direct allocation
page read and write
85800668000
direct allocation
page read and write
1CC54630000
unclassified section
page read and write
8580003C000
direct allocation
page read and write
8138FFE000
stack
page read and write
85800514000
direct allocation
page read and write
1564000
heap
page read and write
85C00004000
direct allocation
page read and write
85C01C9C000
direct allocation
page read and write
1CC561F2000
heap
page read and write
1CC4E610000
heap
page read and write
85C01D48000
direct allocation
page read and write
85C01D80000
direct allocation
page read and write
358B000
stack
page read and write
85800530000
direct allocation
page read and write
85C00801000
direct allocation
page read and write
655000048000
direct allocation
page read and write
85C01EB9000
direct allocation
page read and write
3FA8000
heap
page read and write
49F0000
heap
page read and write
85C00250000
direct allocation
page read and write
85800204000
direct allocation
page read and write
815F7FE000
unkown
page readonly
85C0069C000
direct allocation
page read and write
85C002F0000
direct allocation
page read and write
85C01A40000
direct allocation
page read and write
85C01D88000
direct allocation
page read and write
1CC52343000
heap
page read and write
4415000
heap
page read and write
4F59000
heap
page read and write
1CC57D95000
heap
page read and write
8580045C000
direct allocation
page read and write
8158FFD000
stack
page read and write
85C00934000
direct allocation
page read and write
1CC56304000
heap
page read and write
85C01D24000
direct allocation
page read and write
1CC57DE7000
heap
page read and write
4B1A4FF000
stack
page read and write
8149FFE000
stack
page read and write
85C004A4000
direct allocation
page read and write
85C01D50000
direct allocation
page read and write
1CC5625B000
heap
page read and write
85C01474000
direct allocation
page read and write
1CC562B9000
heap
page read and write
85C00984000
direct allocation
page read and write
85C00E7E000
direct allocation
page read and write
8580020C000
direct allocation
page read and write
85C001CC000
direct allocation
page read and write
4000000
heap
page read and write
6550000D4000
direct allocation
page read and write
85C013D0000
direct allocation
page read and write
85C0146B000
direct allocation
page read and write
1CC5682D000
unclassified section
page read and write
85C00A10000
direct allocation
page read and write
85C01280000
direct allocation
page read and write
85C01AA4000
direct allocation
page read and write
1CC4E830000
heap
page read and write
85C00A04000
direct allocation
page read and write
85C003B4000
direct allocation
page read and write
85C00268000
direct allocation
page read and write
1CC57DE0000
heap
page read and write
1CC5619B000
heap
page read and write
85C00674000
direct allocation
page read and write
85C00530000
direct allocation
page read and write
6550000F7000
direct allocation
page read and write
85800100000
direct allocation
page read and write
81687FE000
unkown
page readonly
1CC56275000
heap
page read and write
85C0173C000
direct allocation
page read and write
1CC56304000
heap
page read and write
85C00390000
direct allocation
page read and write
8580007C000
direct allocation
page read and write
1CC57D70000
heap
page read and write
85C00680000
direct allocation
page read and write
1CC568C0000
unkown
page readonly
AB0000
heap
page read and write
85C01480000
direct allocation
page read and write
85C011E8000
direct allocation
page read and write
81577FE000
unkown
page readonly
814FFFE000
stack
page read and write
1CC56304000
heap
page read and write
1CC51E5D000
heap
page read and write
85C00F88000
direct allocation
page read and write
4600000B4000
direct allocation
page read and write
85800050000
direct allocation
page read and write
1CC52480000
unclassified section
page read and write
4005000
heap
page read and write
408D000
heap
page read and write
417E000
heap
page read and write
54ED000
heap
page read and write
81537FE000
unkown
page readonly
8136FFF000
unkown
page read and write
85C01864000
direct allocation
page read and write
85C00C30000
direct allocation
page read and write
65500006C000
direct allocation
page read and write
85C01A12000
direct allocation
page read and write
85C01490000
direct allocation
page read and write
85C00390000
direct allocation
page read and write
40FE000
heap
page read and write
85800150000
direct allocation
page read and write
1CC56827000
unclassified section
page read and write
85800218000
direct allocation
page read and write
85C017A8000
direct allocation
page read and write
1CC562D1000
heap
page read and write
85C01130000
direct allocation
page read and write
814AFFB000
stack
page read and write
344E000
stack
page read and write
85C01660000
direct allocation
page read and write
85C00C04000
direct allocation
page read and write
85C01DD0000
direct allocation
page read and write
1CC5627A000
heap
page read and write
1CC57D95000
heap
page read and write
1CC4E790000
trusted library section
page readonly
3F13000
heap
page read and write
42D2000
heap
page read and write
85C01D4C000
direct allocation
page read and write
85C01404000
direct allocation
page read and write
1CC56252000
heap
page read and write
4E99000
heap
page read and write
85C009C8000
direct allocation
page read and write
8167FFD000
stack
page read and write
1CC56181000
heap
page read and write
85C002F8000
direct allocation
page read and write
1CC4E750000
trusted library allocation
page read and write
85C0026C000
direct allocation
page read and write
40F5000
heap
page read and write
431D000
heap
page read and write
85C0025C000
direct allocation
page read and write
85C01604000
direct allocation
page read and write
85C00B6C000
direct allocation
page read and write
85C0013C000
direct allocation
page read and write
85C00BF4000
direct allocation
page read and write
858000E2000
direct allocation
page read and write
1CC565B0000
unclassified section
page read and write
655000110000
direct allocation
page read and write
1CC56304000
heap
page read and write
85C01994000
direct allocation
page read and write
85C00DB4000
direct allocation
page read and write
85C013C0000
direct allocation
page read and write
85C01CB0000
direct allocation
page read and write
1CC56199000
heap
page read and write
85C008B8000
direct allocation
page read and write
85800594000
direct allocation
page read and write
4126000
heap
page read and write
1CC50E40000
unkown
page read and write
4600000C0000
direct allocation
page read and write
85C00B50000
direct allocation
page read and write
5562000
heap
page read and write
1CC57D71000
heap
page read and write
8164FFD000
stack
page read and write
1CC523B2000
heap
page read and write
85C013C8000
direct allocation
page read and write
8144FFD000
stack
page read and write
814CFFE000
stack
page read and write
85800001000
direct allocation
page read and write
85C0033C000
direct allocation
page read and write
1CC544FD000
unclassified section
page read and write
416D000
heap
page read and write
1CC523CB000
heap
page read and write
5502000
heap
page read and write
1CC562D4000
heap
page read and write
40E8000
heap
page read and write
1CC52390000
heap
page read and write
1CC4E920000
heap
page read and write
1CC56304000
heap
page read and write
AD4000
heap
page read and write
85C00C98000
direct allocation
page read and write
1CC56257000
heap
page read and write
858004F4000
direct allocation
page read and write
85800141000
direct allocation
page read and write
1CC562FB000
heap
page read and write
1CC56287000
heap
page read and write
85C01820000
direct allocation
page read and write
446B000
heap
page read and write
858004C8000
direct allocation
page read and write
1500000
heap
page read and write
85C018BC000
direct allocation
page read and write
1CC4E8F0000
heap
page read and write
1CC57D71000
heap
page read and write
815FFFD000
stack
page read and write
85C003B8000
direct allocation
page read and write
85C004FC000
direct allocation
page read and write
1CC5627A000
heap
page read and write
4EA4000
heap
page read and write
6550000C8000
direct allocation
page read and write
1CC4E955000
heap
page read and write
85C0013C000
direct allocation
page read and write
1CC567FD000
unclassified section
page read and write
85C01819000
direct allocation
page read and write
85C004A4000
direct allocation
page read and write
1CC523BA000
heap
page read and write
1CC562C5000
heap
page read and write
85C007A5000
direct allocation
page read and write
1CC51240000
unkown
page readonly
85800434000
direct allocation
page read and write
85C0031C000
direct allocation
page read and write
85C011C8000
direct allocation
page read and write
37CD000
stack
page read and write
858000F8000
direct allocation
page read and write
4600000E8000
direct allocation
page read and write
1CC562D1000
heap
page read and write
3F81000
heap
page read and write
1CC562B9000
heap
page read and write
1CC562D4000
heap
page read and write
85C0024C000
direct allocation
page read and write
1CC57DE3000
heap
page read and write
85C01D54000
direct allocation
page read and write
1CC57E3A000
heap
page read and write
85C00364000
direct allocation
page read and write
85C00278000
direct allocation
page read and write
85C006BC000
direct allocation
page read and write
1CC5625B000
heap
page read and write
1CC54A10000
unclassified section
page read and write
85C015B4000
direct allocation
page read and write
3F30000
heap
page read and write
1CC562E1000
heap
page read and write
448D000
heap
page read and write
85C00D8C000
direct allocation
page read and write
85C0158C000
direct allocation
page read and write
5557000
heap
page read and write
8151FFC000
stack
page read and write
1CC54647000
unclassified section
page read and write
8141FFC000
stack
page read and write
85800664000
direct allocation
page read and write
85C01578000
direct allocation
page read and write
85C01084000
direct allocation
page read and write
36CE000
stack
page read and write
85C0180C000
direct allocation
page read and write
85C000E5000
direct allocation
page read and write
1CC57D91000
heap
page read and write
85800184000
direct allocation
page read and write
14DE000
stack
page read and write
1CC523DC000
heap
page read and write
4896000
heap
page read and write
552D000
heap
page read and write
655000008000
direct allocation
page read and write
85C017D0000
direct allocation
page read and write
85C01655000
direct allocation
page read and write
85C018F4000
direct allocation
page read and write
85C01EDC000
direct allocation
page read and write
1CC52383000
heap
page read and write
85C016F4000
direct allocation
page read and write
460000098000
direct allocation
page read and write
85C01874000
direct allocation
page read and write
85C0082C000
direct allocation
page read and write
1CC5464A000
unclassified section
page read and write
85C018FC000
direct allocation
page read and write
85C0027C000
direct allocation
page read and write
85C018CC000
direct allocation
page read and write
85C01264000
direct allocation
page read and write
85C00A50000
direct allocation
page read and write
858000EC000
direct allocation
page read and write
1CC51E51000
heap
page read and write
85C00328000
direct allocation
page read and write
81697FE000
unkown
page readonly
85C01628000
direct allocation
page read and write
85C01E20000
direct allocation
page read and write
1CC4E7E3000
heap
page read and write
85C01657000
direct allocation
page read and write
410F000
heap
page read and write
85C011AC000
direct allocation
page read and write
85C000E0000
direct allocation
page read and write
1CC549B0000
unclassified section
page read and write
460000098000
direct allocation
page read and write
85C00B38000
direct allocation
page read and write
85C01E24000
direct allocation
page read and write
85800554000
direct allocation
page read and write
1CC5629A000
heap
page read and write
858004AC000
direct allocation
page read and write
813A7FE000
unkown
page readonly
85C01D68000
direct allocation
page read and write
81547FE000
unkown
page readonly
4F39000
heap
page read and write