IOC Report
AdobeUpdaterV131.exe

loading gif

Files

File Path
Type
Category
Malicious
AdobeUpdaterV131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\7-Zip\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\xRp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_xRp.exe_7882c768d6c31dccd748b5c295fd1acde18b92a0_315f04a9_21d8cb95-f6f1-4f8d-abf3-a62910f17152\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3632.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Jul 24 21:01:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37BA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37FA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k2[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k2[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k3[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k4[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k5[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\0be11806.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\20336E8A.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\31A724C6.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\32335A13.exe
ASCII text
modified
C:\Users\user\AppData\Local\Temp\36C52F46.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\38070A7E.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\45FF0997.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\64EA12EF.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AdobeUpdaterV131.exe
"C:\Users\user\Desktop\AdobeUpdaterV131.exe"
malicious
C:\Users\user\AppData\Local\Temp\xRp.exe
C:\Users\user\AppData\Local\Temp\xRp.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\xRp.exe
C:\Users\user\AppData\Local\Temp\xRp.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1776
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ddos.dnsnb8.net:799/cj//k1.rarUa
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k1.rars
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarC:
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k2.rar8
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarcC:
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.raryY
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rarXY$$m
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar7
unknown
malicious
http://ddos.dnsnb8.net/v
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarcag$
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarq
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar1b
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarFSXY$$m
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rars
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarsC:
unknown
malicious
http://ddos.dnsnb8.net/
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarU
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarS
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarhg
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarMp
unknown
malicious
https://t.me/RiseProSUPPORTFs
unknown
http://www.scintilla.org/scite.rng
unknown
http://www.activestate.comHolger
unknown
http://www.baanboard.comBrendon
unknown
https://www.smartsharesystems.com/
unknown
http://www.scintilla.org
unknown
http://ddos.dnsnb8.net:799/cj//k4.rarsC:
unknown
http://www.develop.com
unknown
http://www.spaceblue.com
unknown
http://www.baanboard.com
unknown
http://www.develop.comDeepak
unknown
https://t.me/RiseProSUPPORTF/
unknown
http://ddos.dnsnb8.net:799/cj//k5.rar?Y
unknown
http://www.rftp.comJosiah
unknown
http://www.activestate.com
unknown
http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWSASendWs2_32.dll
unknown
http://upx.sf.net
unknown
http://www.rftp.com
unknown
https://t.me/RiseProSUPPORT
unknown
http://ddos.dnsnb8.net:799/cj//k4.rar)X
unknown
http://www.spaceblue.comMathias
unknown
https://www.smartsharesystems.com/Morten
unknown
http://ddos.dnsnb8.net:799/cj//k5.rar
44.221.84.105
http://www.lua.org
unknown
http://ddos.dnsnb8.net:799/cj//k4.rar
44.221.84.105
http://www.winimage.com/zLibDll
unknown
http://ddos.dnsnb8.net:799/cj//k5.rarC:
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ddos.dnsnb8.net
44.221.84.105

IPs

IP
Domain
Country
Malicious
44.221.84.105
ddos.dnsnb8.net
United States
193.233.132.62
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
ProgramId
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
FileId
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
LowerCaseLongPath
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
LongPathHash
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
Name
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
OriginalFileName
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
Publisher
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
Version
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
BinFileVersion
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
BinaryType
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
ProductName
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
ProductVersion
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
LinkDate
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
BinProductVersion
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
AppxPackageFullName
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
AppxPackageRelativeId
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
Size
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
Language
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\GTplus
Time
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5C1000
unkown
page execute and read and write
malicious
4D20000
direct allocation
page read and write
malicious
4EA0000
direct allocation
page read and write
malicious
621000
unkown
page execute and read and write
malicious
4E80000
direct allocation
page read and write
malicious
AB1000
unkown
page execute and read and write
malicious
5C1000
unkown
page execute and read and write
malicious
5370000
direct allocation
page read and write
malicious
4C90000
direct allocation
page read and write
malicious
AB1000
unkown
page execute and read and write
malicious
756000
unkown
page read and write
4D1D000
stack
page read and write
4E4000
unkown
page read and write
116F000
heap
page read and write
EA8000
unkown
page execute and write copy
39BF000
stack
page read and write
1367000
heap
page read and write
FF4000
heap
page read and write
116A000
heap
page read and write
1050000
unkown
page execute and read and write
48AF000
stack
page read and write
FF4000
heap
page read and write
54BF000
stack
page read and write
5500000
direct allocation
page execute and read and write
387F000
stack
page read and write
9A0000
unkown
page execute and read and write
1220000
heap
page read and write
1044000
heap
page read and write
2C3C000
stack
page read and write
3FEF000
stack
page read and write
2FDE000
stack
page read and write
91E000
heap
page read and write
898000
heap
page read and write
14A3000
heap
page read and write
2C90000
direct allocation
page read and write
11BF000
heap
page read and write
FF4000
heap
page read and write
11F0000
heap
page read and write
B5D000
unkown
page execute and write copy
336F000
stack
page read and write
48A1000
heap
page read and write
1044000
heap
page read and write
4EA0000
direct allocation
page read and write
4D0000
heap
page read and write
3C1F000
stack
page read and write
2700000
heap
page read and write
4E1000
unkown
page execute read
462F000
stack
page read and write
FF4000
heap
page read and write
2BFE000
stack
page read and write
29B0000
direct allocation
page read and write
1424000
heap
page read and write
55C0000
direct allocation
page execute and read and write
1044000
heap
page read and write
451E000
stack
page read and write
3140000
direct allocation
page read and write
308E000
stack
page read and write
5030000
direct allocation
page execute and read and write
4DE0000
direct allocation
page execute and read and write
9B7000
unkown
page execute and write copy
4EF0000
direct allocation
page execute and read and write
2C70000
heap
page read and write
544E000
stack
page read and write
4EF1000
heap
page read and write
1490000
heap
page read and write
4DCF000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
3EAF000
stack
page read and write
B60000
direct allocation
page read and write
4D80000
trusted library allocation
page read and write
33BE000
stack
page read and write
850000
heap
page read and write
5030000
direct allocation
page execute and read and write
898000
heap
page read and write
90F000
heap
page read and write
2EBE000
stack
page read and write
5010000
direct allocation
page execute and read and write
FF4000
heap
page read and write
2D1F000
stack
page read and write
1044000
heap
page read and write
E30000
unkown
page readonly
1044000
heap
page read and write
4EF0000
heap
page read and write
5D0000
heap
page read and write
4B10000
trusted library allocation
page read and write
2C50000
direct allocation
page read and write
4EB0000
direct allocation
page execute and read and write
3DBE000
stack
page read and write
4A2E000
stack
page read and write
39FE000
stack
page read and write
380E000
stack
page read and write
F60000
heap
page read and write
2C90000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
1424000
heap
page read and write
E30000
unkown
page readonly
55A0000
direct allocation
page execute and read and write
2C90000
direct allocation
page read and write
475F000
stack
page read and write
2AC4000
heap
page read and write
1424000
heap
page read and write
54D0000
heap
page read and write
EA8000
unkown
page execute and write copy
2C50000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
30EF000
stack
page read and write
4E80000
direct allocation
page read and write
115D000
heap
page read and write
1044000
heap
page read and write
335F000
stack
page read and write
FF4000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
2D7F000
stack
page read and write
34EE000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
48A1000
heap
page read and write
858000
heap
page read and write
2568000
stack
page read and write
3EFE000
stack
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
322F000
stack
page read and write
7A0000
heap
page read and write
1044000
heap
page read and write
1044000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
12E0000
direct allocation
page read and write
BC1000
unkown
page execute and write copy
4EF1000
heap
page read and write
372F000
stack
page read and write
1163000
heap
page read and write
1424000
heap
page read and write
5370000
direct allocation
page read and write
1424000
heap
page read and write
1044000
heap
page read and write
5010000
direct allocation
page execute and read and write
4A01000
heap
page read and write
5500000
direct allocation
page execute and read and write
8CE000
heap
page read and write
54F0000
direct allocation
page execute and read and write
2FBF000
stack
page read and write
104C000
unkown
page execute and read and write
35DF000
stack
page read and write
D6B000
unkown
page execute and read and write
F70000
heap
page read and write
4C70000
trusted library allocation
page read and write
8C6000
heap
page read and write
2AEF000
stack
page read and write
790000
heap
page read and write
5010000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
BD6000
heap
page read and write
2C90000
direct allocation
page read and write
31CE000
stack
page read and write
BD7000
heap
page read and write
1424000
heap
page read and write
386F000
stack
page read and write
8E8000
heap
page read and write
962000
unkown
page execute and read and write
4EF1000
heap
page read and write
FF4000
heap
page read and write
E52000
unkown
page execute and read and write
330E000
stack
page read and write
2FFE000
stack
page read and write
3B2E000
stack
page read and write
5010000
direct allocation
page execute and read and write
358E000
stack
page read and write
3140000
direct allocation
page read and write
29B0000
direct allocation
page read and write
5D5000
heap
page read and write
5CD000
stack
page read and write
B60000
unkown
page execute and write copy
4D20000
direct allocation
page read and write
133E000
stack
page read and write
2C50000
direct allocation
page read and write
B60000
unkown
page execute and read and write
4D6C000
stack
page read and write
1424000
heap
page read and write
12E0000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
2C40000
heap
page read and write
3EEE000
stack
page read and write
311E000
stack
page read and write
4FE0000
heap
page read and write
33D0000
heap
page read and write
49EF000
stack
page read and write
50A0000
direct allocation
page execute and read and write
EFD000
stack
page read and write
BC0000
unkown
page execute and write copy
F80000
heap
page read and write
476F000
stack
page read and write
22EA000
stack
page read and write
8E9000
heap
page read and write
125F000
heap
page read and write
4E90000
direct allocation
page execute and read and write
1424000
heap
page read and write
2EAE000
stack
page read and write
371F000
stack
page read and write
3E4E000
stack
page read and write
4A11000
heap
page read and write
FF4000
heap
page read and write
452D000
stack
page read and write
4811000
heap
page read and write
5550000
direct allocation
page execute and read and write
4EA0000
direct allocation
page read and write
1044000
heap
page read and write
4A01000
heap
page read and write
1050000
unkown
page execute and write copy
5370000
direct allocation
page read and write
8E8000
heap
page read and write
340F000
stack
page read and write
48A1000
heap
page read and write
90E000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
5159000
heap
page read and write
5010000
direct allocation
page execute and read and write
336E000
stack
page read and write
304F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
3140000
direct allocation
page read and write
4E40000
direct allocation
page execute and read and write
412F000
stack
page read and write
FF4000
heap
page read and write
12E0000
direct allocation
page read and write
354F000
stack
page read and write
2EF0000
heap
page read and write
3D6F000
stack
page read and write
A17000
unkown
page execute and write copy
3160000
heap
page read and write
3140000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
33AE000
stack
page read and write
302D000
stack
page read and write
FF4000
heap
page read and write
55F0000
direct allocation
page execute and read and write
4EB0000
direct allocation
page execute and read and write
7AB000
heap
page read and write
3E9F000
stack
page read and write
4CCB000
stack
page read and write
411F000
stack
page read and write
5C0000
unkown
page read and write
9C2000
unkown
page execute and read and write
4F10000
direct allocation
page execute and read and write
6F2000
unkown
page execute and read and write
4E80000
direct allocation
page read and write
75C000
unkown
page execute and read and write
489F000
stack
page read and write
69A000
stack
page read and write
3140000
direct allocation
page read and write
BFC000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
11AD000
heap
page read and write
312C000
stack
page read and write
52BE000
stack
page read and write
5520000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
11B7000
heap
page read and write
149B000
heap
page read and write
2E9E000
stack
page read and write
310E000
stack
page read and write
361E000
stack
page read and write
300E000
unkown
page read and write
12E0000
direct allocation
page read and write
3FFF000
stack
page read and write
3B8F000
stack
page read and write
5030000
direct allocation
page execute and read and write
913000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
430F000
stack
page read and write
48A1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
BDC000
heap
page read and write
313E000
stack
page read and write
3BCE000
stack
page read and write
1044000
heap
page read and write
E33000
unkown
page write copy
8A4000
heap
page read and write
5010000
direct allocation
page execute and read and write
FF4000
heap
page read and write
9B7000
unkown
page execute and read and write
3A4F000
stack
page read and write
970000
heap
page read and write
5370000
direct allocation
page read and write
A17000
unkown
page execute and read and write
402E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
3F8E000
stack
page read and write
5140000
direct allocation
page execute and read and write
11ED000
stack
page read and write
417E000
stack
page read and write
399F000
stack
page read and write
520000
direct allocation
page read and write
111E000
heap
page read and write
4F40000
direct allocation
page execute and read and write
35EF000
stack
page read and write
2B8C000
stack
page read and write
4C8E000
stack
page read and write
1163000
heap
page read and write
33DB000
stack
page read and write
924000
heap
page read and write
44EF000
stack
page read and write
12E0000
direct allocation
page read and write
3EAF000
stack
page read and write
F5C000
stack
page read and write
54A000
stack
page read and write
104D000
unkown
page execute and write copy
1424000
heap
page read and write
5632000
heap
page read and write
470E000
stack
page read and write
4811000
heap
page read and write
1420000
heap
page read and write
B5C000
unkown
page execute and read and write
620000
unkown
page readonly
4E8E000
stack
page read and write
3140000
direct allocation
page read and write
5610000
direct allocation
page execute and read and write
3D5F000
stack
page read and write
E36000
unkown
page execute and read and write
B5C000
unkown
page execute and read and write
12F0000
heap
page read and write
375E000
stack
page read and write
2DAE000
stack
page read and write
4E80000
direct allocation
page execute and read and write
3140000
direct allocation
page read and write
325E000
stack
page read and write
4F00000
direct allocation
page execute and read and write
3C6E000
stack
page read and write
29D7000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
12E0000
direct allocation
page read and write
3C2F000
stack
page read and write
29B0000
direct allocation
page read and write
43AF000
stack
page read and write
33AE000
stack
page read and write
5580000
direct allocation
page execute and read and write
B60000
direct allocation
page read and write
3030000
heap
page read and write
4DEE000
stack
page read and write
4E60000
direct allocation
page execute and read and write
4B2F000
stack
page read and write
1151000
heap
page read and write
34DE000
stack
page read and write
4FD4000
heap
page read and write
5510000
direct allocation
page execute and read and write
55B0000
direct allocation
page execute and read and write
318F000
stack
page read and write
5020000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
4FA0000
direct allocation
page execute and read and write
E99000
unkown
page execute and read and write
BBC000
unkown
page execute and read and write
E33000
unkown
page readonly
5030000
direct allocation
page execute and read and write
326D000
stack
page read and write
5080000
direct allocation
page execute and read and write
6FC000
unkown
page execute and read and write
4810000
heap
page read and write
49EF000
stack
page read and write
115B000
heap
page read and write
5050000
direct allocation
page execute and read and write
2F0F000
stack
page read and write
1165000
heap
page read and write
1424000
heap
page read and write
4F70000
direct allocation
page execute and read and write
530E000
stack
page read and write
BD0000
heap
page read and write
550000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
3DAE000
stack
page read and write
35FF000
stack
page read and write
4E6000
unkown
page execute and read and write
E34000
unkown
page read and write
48A1000
heap
page read and write
1044000
heap
page read and write
4A01000
heap
page read and write
83E000
stack
page read and write
1424000
heap
page read and write
10EC000
stack
page read and write
434E000
stack
page read and write
8E6000
heap
page read and write
3D6F000
stack
page read and write
29D0000
heap
page read and write
29B0000
direct allocation
page read and write
377E000
stack
page read and write
B61000
unkown
page execute and write copy
756000
unkown
page write copy
5010000
direct allocation
page execute and read and write
1424000
heap
page read and write
3C3F000
stack
page read and write
2BDF000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
4A11000
heap
page read and write
2DAF000
stack
page read and write
38AE000
stack
page read and write
36CE000
stack
page read and write
BE2000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
34EE000
stack
page read and write
521C000
heap
page read and write
47BE000
stack
page read and write
EA7000
unkown
page execute and read and write
48A0000
heap
page read and write
1424000
heap
page read and write
4C6F000
stack
page read and write
5080000
direct allocation
page execute and read and write
4CAE000
stack
page read and write
5070000
direct allocation
page execute and read and write
3F4F000
stack
page read and write
1177000
heap
page read and write
BDA000
heap
page read and write
5500000
direct allocation
page execute and read and write
65D000
stack
page read and write
5090000
direct allocation
page execute and read and write
43BF000
stack
page read and write
1424000
heap
page read and write
479E000
stack
page read and write
4D20000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
2E9A000
stack
page read and write
2C4C000
stack
page read and write
5030000
direct allocation
page execute and read and write
2C50000
direct allocation
page read and write
4A11000
heap
page read and write
2EAF000
stack
page read and write
363E000
stack
page read and write
41CF000
stack
page read and write
FF4000
heap
page read and write
BFC000
stack
page read and write
591E000
stack
page read and write
8E8000
heap
page read and write
EA7000
unkown
page execute and write copy
2C6E000
stack
page read and write
30FF000
stack
page read and write
5060000
direct allocation
page execute and read and write
385F000
stack
page read and write
2C50000
direct allocation
page read and write
29B0000
direct allocation
page read and write
9A9000
unkown
page execute and read and write
29B0000
direct allocation
page read and write
35EF000
stack
page read and write
5050000
direct allocation
page execute and read and write
1424000
heap
page read and write
B60000
direct allocation
page read and write
29B0000
direct allocation
page read and write
4ECB000
stack
page read and write
42BE000
stack
page read and write
34FE000
stack
page read and write
4E6F000
stack
page read and write
401E000
stack
page read and write
9B8000
unkown
page execute and write copy
5120000
direct allocation
page execute and read and write
1044000
heap
page read and write
1257000
heap
page read and write
477F000
stack
page read and write
312E000
stack
page read and write
412F000
stack
page read and write
29AE000
stack
page read and write
2B20000
heap
page read and write
4E10000
direct allocation
page execute and read and write
48A1000
heap
page read and write
830000
heap
page read and write
318B000
heap
page read and write
BD0000
heap
page read and write
AB1000
unkown
page execute and write copy
34BF000
stack
page read and write
37CF000
stack
page read and write
8DB000
unkown
page execute and read and write
4B6E000
stack
page read and write
87B000
unkown
page execute and read and write
2C50000
direct allocation
page read and write
29EE000
stack
page read and write
1030000
heap
page read and write
8DF000
heap
page read and write
990000
heap
page read and write
2F8F000
stack
page read and write
109E000
stack
page read and write
2C2F000
stack
page read and write
5212000
heap
page read and write
12DE000
stack
page read and write
3E0F000
stack
page read and write
3010000
heap
page read and write
5090000
direct allocation
page execute and read and write
376E000
stack
page read and write
373F000
stack
page read and write
48A1000
heap
page read and write
362E000
stack
page read and write
3A8E000
stack
page read and write
34AF000
stack
page read and write
1044000
heap
page read and write
4E10000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
4DAF000
stack
page read and write
394E000
stack
page read and write
4E3000
unkown
page write copy
2C90000
direct allocation
page read and write
376E000
stack
page read and write
2D5E000
stack
page read and write
8FD000
heap
page read and write
50D0000
direct allocation
page execute and read and write
2C0F000
stack
page read and write
47AE000
stack
page read and write
4E6000
unkown
page execute and write copy
4EB0000
direct allocation
page execute and read and write
820000
heap
page read and write
39AF000
stack
page read and write
322E000
stack
page read and write
5540000
direct allocation
page execute and read and write
FF4000
heap
page read and write
3FEF000
stack
page read and write
5010000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
A18000
unkown
page execute and write copy
EA7000
unkown
page execute and read and write
5530000
direct allocation
page execute and read and write
38AE000
stack
page read and write
3C6E000
stack
page read and write
1130000
heap
page read and write
5100000
direct allocation
page execute and read and write
1044000
heap
page read and write
B60000
unkown
page execute and write copy
34AF000
stack
page read and write
2C50000
direct allocation
page read and write
2C50000
direct allocation
page read and write
30DF000
stack
page read and write
145A000
heap
page read and write
BB0000
heap
page read and write
E31000
unkown
page execute read
5010000
direct allocation
page execute and read and write
9EF000
stack
page read and write
2AC0000
heap
page read and write
4E0000
unkown
page readonly
4FF0000
direct allocation
page execute and read and write
5500000
direct allocation
page execute and read and write
4E3000
unkown
page readonly
BE6000
unkown
page read and write
90F000
heap
page read and write
54E0000
direct allocation
page execute and read and write
5500000
direct allocation
page execute and read and write
111A000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
4F25000
heap
page read and write
104D000
unkown
page execute and write copy
1044000
heap
page read and write
BE2000
unkown
page execute and read and write
29AE000
stack
page read and write
4F50000
direct allocation
page execute and read and write
91D000
heap
page read and write
1044000
heap
page read and write
29B0000
direct allocation
page read and write
4EB0000
direct allocation
page execute and read and write
4B00000
trusted library allocation
page read and write
E90000
unkown
page execute and read and write
4A01000
heap
page read and write
30CE000
stack
page read and write
5030000
direct allocation
page execute and read and write
4EEF000
stack
page read and write
5500000
direct allocation
page execute and read and write
408F000
stack
page read and write
39DE000
stack
page read and write
42AE000
stack
page read and write
2C1B000
stack
page read and write
467E000
stack
page read and write
BE6000
unkown
page write copy
2C90000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
4A00000
heap
page read and write
402E000
stack
page read and write
912000
heap
page read and write
6F6000
unkown
page read and write
FF4000
heap
page read and write
326E000
stack
page read and write
114B000
heap
page read and write
339E000
stack
page read and write
5590000
direct allocation
page execute and read and write
465E000
stack
page read and write
6F6000
unkown
page read and write
1424000
heap
page read and write
5CE000
stack
page read and write
5130000
direct allocation
page execute and read and write
362E000
stack
page read and write
A09000
unkown
page execute and read and write
89B000
heap
page read and write
4FD1000
direct allocation
page read and write
B60000
unkown
page execute and read and write
12E0000
direct allocation
page read and write
A00000
unkown
page execute and read and write
49F0000
heap
page read and write
326F000
stack
page read and write
1051000
unkown
page execute and write copy
349F000
stack
page read and write
3D9E000
stack
page read and write
9B7000
unkown
page execute and read and write
3140000
direct allocation
page read and write
6F6000
unkown
page write copy
3140000
direct allocation
page read and write
125F000
heap
page read and write
1040000
heap
page read and write
5C0000
unkown
page read and write
2B2E000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
E5C000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
FF4000
heap
page read and write
426F000
stack
page read and write
461F000
stack
page read and write
145D000
heap
page read and write
FF4000
heap
page read and write
55E0000
direct allocation
page execute and read and write
E90000
unkown
page execute and read and write
86A000
heap
page read and write
12E0000
direct allocation
page read and write
536E000
stack
page read and write
3130000
heap
page read and write
8E5000
heap
page read and write
2E5D000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4E0000
unkown
page readonly
43DE000
stack
page read and write
132F000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
E31000
unkown
page execute and write copy
4DC1000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
4D20000
direct allocation
page read and write
344E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
476F000
stack
page read and write
5030000
direct allocation
page execute and read and write
3D7F000
stack
page read and write
F60000
heap
page read and write
87B000
unkown
page execute and read and write
4FF0000
trusted library allocation
page read and write
9AE000
stack
page read and write
860000
heap
page read and write
8DA000
heap
page read and write
5500000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
47AE000
stack
page read and write
32AD000
stack
page read and write
512A000
heap
page read and write
1044000
heap
page read and write
429E000
stack
page read and write
520000
direct allocation
page read and write
FF4000
heap
page read and write
1424000
heap
page read and write
403E000
stack
page read and write
48AF000
stack
page read and write
962000
unkown
page execute and read and write
2C50000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
8C6000
heap
page read and write
5C0000
unkown
page readonly
5560000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
B5F000
stack
page read and write
2C90000
direct allocation
page read and write
4CC000
stack
page read and write
3AFF000
stack
page read and write
36C000
stack
page read and write
3EEE000
stack
page read and write
580000
heap
page read and write
3140000
direct allocation
page read and write
BEC000
unkown
page execute and read and write
840000
direct allocation
page read and write
4FC0000
direct allocation
page execute and read and write
372F000
stack
page read and write
8B5000
heap
page read and write
8FD000
heap
page read and write
4E51000
direct allocation
page read and write
4EB0000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
115E000
stack
page read and write
43EE000
stack
page read and write
2C50000
direct allocation
page read and write
5110000
direct allocation
page execute and read and write
29B0000
direct allocation
page read and write
312E000
stack
page read and write
3AEF000
stack
page read and write
6F2000
unkown
page execute and read and write
1044000
heap
page read and write
1560000
heap
page read and write
1424000
heap
page read and write
5600000
direct allocation
page execute and read and write
1044000
heap
page read and write
BE6000
unkown
page read and write
462F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
2C8E000
stack
page read and write
2C90000
direct allocation
page read and write
4A01000
heap
page read and write
FD0000
heap
page read and write
452E000
stack
page read and write
4E80000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
3AEF000
stack
page read and write
2C90000
direct allocation
page read and write
5C1000
unkown
page execute and write copy
5030000
direct allocation
page execute and read and write
4A01000
heap
page read and write
9B8000
unkown
page execute and write copy
30DF000
stack
page read and write
4C0000
heap
page read and write
1350000
direct allocation
page read and write
2C90000
direct allocation
page read and write
87D000
heap
page read and write
5060000
direct allocation
page execute and read and write
1044000
heap
page read and write
1044000
heap
page read and write
5070000
direct allocation
page execute and read and write
54A1000
direct allocation
page read and write
46C000
stack
page read and write
413F000
stack
page read and write
2C90000
direct allocation
page read and write
130F000
stack
page read and write
4910000
trusted library allocation
page read and write
416E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
420E000
stack
page read and write
2C50000
direct allocation
page read and write
2C50000
direct allocation
page read and write
4EA0000
direct allocation
page read and write
FF4000
heap
page read and write
4EF1000
heap
page read and write
B60000
direct allocation
page read and write
AB0000
unkown
page readonly
4FB0000
direct allocation
page execute and read and write
104C000
unkown
page execute and read and write
4EB0000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
3167000
heap
page read and write
49A0000
trusted library allocation
page read and write
122A000
heap
page read and write
49FF000
stack
page read and write
74E000
unkown
page read and write
4E90000
direct allocation
page execute and read and write
360C000
stack
page read and write
11BF000
heap
page read and write
4EF1000
heap
page read and write
2FEE000
stack
page read and write
1050000
unkown
page execute and read and write
48A1000
heap
page read and write
620000
unkown
page read and write
FF0000
heap
page read and write
39EE000
stack
page read and write
1177000
heap
page read and write
2C0E000
stack
page read and write
1160000
heap
page read and write
12E0000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
FF4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
12E0000
direct allocation
page read and write
8CE000
heap
page read and write
BBD000
unkown
page execute and write copy
2FEF000
stack
page read and write
3B2E000
stack
page read and write
32CF000
stack
page read and write
2CA7000
heap
page read and write
3180000
heap
page read and write
4FCF000
stack
page read and write
3D0E000
stack
page read and write
416E000
stack
page read and write
3040000
heap
page read and write
316B000
stack
page read and write
9A9000
unkown
page execute and read and write
43AF000
stack
page read and write
4F20000
direct allocation
page execute and read and write
4E1E000
stack
page read and write
5010000
direct allocation
page execute and read and write
F86000
heap
page read and write
89B000
heap
page read and write
810000
heap
page read and write
4CA0000
heap
page read and write
8DA000
heap
page read and write
6FC000
unkown
page execute and read and write
FF4000
heap
page read and write
5100000
direct allocation
page execute and read and write
3C7E000
stack
page read and write
1424000
heap
page read and write
E36000
unkown
page execute and write copy
129B000
stack
page read and write
520F000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
30EE000
stack
page read and write
EFD000
stack
page read and write
232E000
stack
page read and write
5C1000
unkown
page execute and write copy
2C50000
direct allocation
page read and write
40CE000
stack
page read and write
1640000
heap
page read and write
466E000
stack
page read and write
9B7000
unkown
page execute and write copy
4EEB000
stack
page read and write
2C77000
heap
page read and write
2F9F000
stack
page read and write
5500000
direct allocation
page execute and read and write
55D0000
direct allocation
page execute and read and write
2D4E000
stack
page read and write
E52000
unkown
page execute and read and write
5C0000
unkown
page readonly
4A01000
heap
page read and write
2EEE000
stack
page read and write
BAE000
stack
page read and write
48A1000
heap
page read and write
29B0000
direct allocation
page read and write
2C50000
direct allocation
page read and write
312E000
stack
page read and write
3C5E000
stack
page read and write
3ADF000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1044000
heap
page read and write
1424000
heap
page read and write
2C90000
direct allocation
page read and write
1044000
heap
page read and write
12E0000
direct allocation
page read and write
4E70000
direct allocation
page execute and read and write
6C0000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
1044000
heap
page read and write
4EF1000
heap
page read and write
4A10000
heap
page read and write
5040000
direct allocation
page execute and read and write
5620000
direct allocation
page execute and read and write
510000
direct allocation
page read and write
541E000
stack
page read and write
2C0E000
stack
page read and write
48A1000
heap
page read and write
44FF000
stack
page read and write
124D000
heap
page read and write
2D6F000
stack
page read and write
53BC000
stack
page read and write
2710000
heap
page read and write
46CF000
stack
page read and write
BE6000
unkown
page write copy
4E1000
unkown
page execute and write copy
1450000
heap
page read and write
29B0000
direct allocation
page read and write
FF4000
heap
page read and write
752000
unkown
page execute and read and write
439F000
stack
page read and write
48BF000
stack
page read and write
117D000
heap
page read and write
390F000
stack
page read and write
44DF000
stack
page read and write
AB1000
unkown
page execute and write copy
3DAE000
stack
page read and write
2F4E000
stack
page read and write
520000
direct allocation
page read and write
8E1000
heap
page read and write
B61000
unkown
page execute and write copy
39EE000
stack
page read and write
48A1000
heap
page read and write
48A1000
heap
page read and write
2FDE000
stack
page read and write
3B1E000
stack
page read and write
912000
heap
page read and write
5500000
direct allocation
page execute and read and write
1424000
heap
page read and write
2E0F000
stack
page read and write
1050000
unkown
page execute and write copy
4E30000
direct allocation
page execute and read and write
386F000
stack
page read and write
246F000
stack
page read and write
9A0000
unkown
page execute and read and write
2360000
heap
page read and write
1350000
direct allocation
page read and write
4A01000
heap
page read and write
337F000
stack
page read and write
42AE000
stack
page read and write
4FB1000
direct allocation
page read and write
466E000
stack
page read and write
2E4F000
stack
page read and write
2E5F000
stack
page read and write
34DD000
stack
page read and write
444F000
stack
page read and write
5570000
direct allocation
page execute and read and write
43FE000
stack
page read and write
3B3E000
stack
page read and write
FC0000
heap
page read and write
1424000
heap
page read and write
48EE000
stack
page read and write
BEC000
unkown
page execute and read and write
4F00000
direct allocation
page execute and read and write
29B0000
direct allocation
page read and write
3140000
direct allocation
page read and write
840000
direct allocation
page read and write
14A3000
heap
page read and write
48FE000
stack
page read and write
39AF000
stack
page read and write
5A9000
stack
page read and write
2CA0000
heap
page read and write
1360000
heap
page read and write
2FAF000
stack
page read and write
5030000
direct allocation
page execute and read and write
AB0000
unkown
page read and write
458F000
stack
page read and write
427F000
stack
page read and write
1120000
heap
page read and write
12E0000
direct allocation
page read and write
3140000
direct allocation
page read and write
4E80000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
1051000
unkown
page execute and write copy
336F000
stack
page read and write
12E0000
direct allocation
page read and write
2C90000
direct allocation
page read and write
3C2F000
stack
page read and write
425F000
stack
page read and write
389E000
stack
page read and write
321F000
stack
page read and write
2D0F000
stack
page read and write
415E000
stack
page read and write
AB0000
unkown
page readonly
FF4000
heap
page read and write
3FDF000
stack
page read and write
327E000
stack
page read and write
6F6000
unkown
page write copy
50C0000
direct allocation
page execute and read and write
700000
heap
page read and write
463F000
stack
page read and write
5500000
direct allocation
page execute and read and write
480F000
stack
page read and write
4AB000
stack
page read and write
FF4000
heap
page read and write
4FEF000
stack
page read and write
78F000
unkown
page read and write
5010000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
F70000
heap
page read and write
AB0000
unkown
page read and write
4F30000
direct allocation
page execute and read and write
BC0000
unkown
page execute and read and write
520000
direct allocation
page read and write
2364000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
1350000
direct allocation
page read and write
4E7E000
stack
page read and write
1044000
heap
page read and write
50E0000
direct allocation
page execute and read and write
1044000
heap
page read and write
54D0000
direct allocation
page execute and read and write
323F000
stack
page read and write
33AF000
stack
page read and write
621000
unkown
page execute and write copy
A5D000
stack
page read and write
448E000
stack
page read and write
FDE000
stack
page read and write
560000
heap
page read and write
FF4000
heap
page read and write
2E7F000
stack
page read and write
44EF000
stack
page read and write
48A1000
heap
page read and write
585000
heap
page read and write
1110000
heap
page read and write
48EE000
stack
page read and write
86B000
heap
page read and write
4811000
heap
page read and write
3EBF000
stack
page read and write
FF4000
heap
page read and write
1044000
heap
page read and write
50B0000
direct allocation
page execute and read and write
1044000
heap
page read and write
43EE000
stack
page read and write
38BE000
stack
page read and write
EA7000
unkown
page execute and write copy
12E0000
direct allocation
page read and write
1044000
heap
page read and write
1200000
heap
page read and write
308F000
unkown
page read and write
E99000
unkown
page execute and read and write
326C000
stack
page read and write
D6B000
unkown
page execute and read and write
453E000
stack
page read and write
1138000
heap
page read and write
24DF000
stack
page read and write
898000
heap
page read and write
3140000
direct allocation
page read and write
368F000
stack
page read and write
426F000
stack
page read and write
4EF1000
heap
page read and write
3EDE000
stack
page read and write
5500000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
5110000
direct allocation
page execute and read and write
B5D000
unkown
page execute and write copy
2C90000
direct allocation
page read and write
4811000
heap
page read and write
3140000
direct allocation
page read and write
907000
heap
page read and write
3CCF000
stack
page read and write
5500000
direct allocation
page execute and read and write
2E8E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
29B0000
direct allocation
page read and write
995000
heap
page read and write
29B0000
direct allocation
page read and write
45CE000
stack
page read and write
48A1000
heap
page read and write
There are 996 hidden memdumps, click here to show them.