IOC Report
8SxJ9aYfJ1.exe

loading gif

Files

File Path
Type
Category
Malicious
8SxJ9aYfJ1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8SxJ9aYfJ1.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpE0B6.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TwkYThKVQVaYn.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mxryp3y.5al.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a00tl3fx.jqt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ewl4kpeb.24q.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_omi1c0qo.fry.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qw1jfzpe.bhr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qwr5gksb.tgx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmzwvhig.00d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0i5n4z3.fh4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s822635O8R95
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpF632.tmp
XML 1.0 document, ASCII text
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8SxJ9aYfJ1.exe
"C:\Users\user\Desktop\8SxJ9aYfJ1.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\8SxJ9aYfJ1.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TwkYThKVQVaYn" /XML "C:\Users\user\AppData\Local\Temp\tmpE0B6.tmp"
malicious
C:\Users\user\Desktop\8SxJ9aYfJ1.exe
"C:\Users\user\Desktop\8SxJ9aYfJ1.exe"
malicious
C:\Users\user\Desktop\8SxJ9aYfJ1.exe
"C:\Users\user\Desktop\8SxJ9aYfJ1.exe"
malicious
C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe
C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TwkYThKVQVaYn" /XML "C:\Users\user\AppData\Local\Temp\tmpF632.tmp"
malicious
C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe
"C:\Users\user\AppData\Roaming\TwkYThKVQVaYn.exe"
malicious
C:\Program Files (x86)\nWGrPwDLcexWRjyXAiZXJOGIpHAbuRyhSSsaRGQtzRcqRvMUSLaXPTDTNbyHHpZuxfDVDXqgjhsd\sbJGUdSMCgtLQJ.exe
"C:\Program Files (x86)\nWGrPwDLcexWRjyXAiZXJOGIpHAbuRyhSSsaRGQtzRcqRvMUSLaXPTDTNbyHHpZuxfDVDXqgjhsd\sbJGUdSMCgtLQJ.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
"C:\Windows\SysWOW64\findstr.exe"
malicious
C:\Program Files (x86)\nWGrPwDLcexWRjyXAiZXJOGIpHAbuRyhSSsaRGQtzRcqRvMUSLaXPTDTNbyHHpZuxfDVDXqgjhsd\sbJGUdSMCgtLQJ.exe
"C:\Program Files (x86)\nWGrPwDLcexWRjyXAiZXJOGIpHAbuRyhSSsaRGQtzRcqRvMUSLaXPTDTNbyHHpZuxfDVDXqgjhsd\sbJGUdSMCgtLQJ.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
"C:\Windows\SysWOW64\findstr.exe"
malicious
C:\Program Files (x86)\nWGrPwDLcexWRjyXAiZXJOGIpHAbuRyhSSsaRGQtzRcqRvMUSLaXPTDTNbyHHpZuxfDVDXqgjhsd\sbJGUdSMCgtLQJ.exe
"C:\Program Files (x86)\nWGrPwDLcexWRjyXAiZXJOGIpHAbuRyhSSsaRGQtzRcqRvMUSLaXPTDTNbyHHpZuxfDVDXqgjhsd\sbJGUdSMCgtLQJ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.tcfreal.top/sg27/
203.161.50.128
https://htmlcodex.com
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
http://www.dkimhub.com/5egn/?9Fjx=LS7e07ng+gHNsyJARIPtuVi+lEkqNBJQ2ublElNdV5gzbr2xH6h/El6SaWwjRr8Uba16H88ExuT+84ut878T3wBrsvgB0imO00p96tUlW1EzL/ongopUwV5X18HPxTdgNiqUy4Q=&h20PB=Ilr0H
3.33.130.190
https://duckduckgo.com/ac/?q=
unknown
https://cdn.jsdelivr.net/npm/bootstrap
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
http://www.michaelstutorgroup.com/7w90/
84.32.84.178
http://www.zocalo-fuk.com/iczo/?h20PB=Ilr0H&9Fjx=JY7jtaSJ5x5vzidknG2ksTpeyXyaG7X3ywH460gVL7Ewt7sZ57bb2J66wgBGIrGl5fwva+984CsI5kCUEaeHAKxito/MplmCBaK67oIqKDsPwPbc7aid6ru9XlM638WWQIDRvms=
157.7.107.37
https://track.uc.cn/collect
unknown
http://www.hermandadcoyotes.com/gx7l/
188.95.113.62
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.michaelstutorgroup.com/7w90/?h20PB=Ilr0H&9Fjx=LhHpT0ljoQdAbtFlhTdeffbRPZ2ExzZlgOFaGkCDeg
unknown
https://lolipop.jp/
unknown
https://pepabo.com/
unknown
https://www.google.com/recaptcha/api.js?hl=en
unknown
https://hm.baidu.com/hm.js?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.loangoatworld.com/8y3s/?9Fjx=m+e1HwtEOOeM4G5OXbOM1l1mMhEELbDuBR7SzEsfX5sQt5Y/60pxewufhKo1oWdPn8Rq+iGyekpfb4U1GvT2jbL6nhhjvrxd94xSxVO4NFUPY0kg0texG8HyL5tYcYoZK9KCXOc=&h20PB=Ilr0H
3.33.130.190
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
http://www.forthelement.com/eswm/
3.33.130.190
http://www.michaelstutorgroup.com/7w90/?h20PB=Ilr0H&9Fjx=LhHpT0ljoQdAbtFlhTdeffbRPZ2ExzZlgOFaGkCDeg3jH9QMg622Z6S/PpXr7Dw5Hrqt15Rk+HZEJRRYk4+G8611O/TYHNVjD8KHzBwMH6yNIySy4kYDr0sQvZqeQkDTLiMYeJ4=
84.32.84.178
http://www.miquwawa.com/tqql/?h20PB=Ilr0H&9Fjx=u0XZF227Y/r9f3hknYKw3A/OKyua8wzaE5MpTM9c21roNqnsj5Gisp9VcwCWuR5N2hVTeUiUKYj3c1cP+6QCcj3wzwE0gmMNT1PJlFHdnkMlbksrXDYRbbL33cvAUMoN8r+Pi3M=
95.169.27.235
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
http://www.artistcalculator.com
unknown
http://www.zocalo-fuk.com/iczo/
157.7.107.37
http://www.artistcalculator.com/pf6m/?9Fjx=bj2jTCh2dAa0W37Ors9MIV8y6VuL4TB52i9XdK5qnE1eDYGuKlwknV9AdIGtnY1bTK6+aXD2gMPFTRYJsf/RVFQwT4yLxuuIQKRkes7NkFHq0brUctiaXa3KGHH0n3cgm+LnNOk=&h20PB=Ilr0H
162.241.216.26
http://www.dkimhub.com/5egn/
3.33.130.190
https://support.lolipop.jp/hc/ja/articles/360049132953
unknown
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
http://tempuri.org/dxsss.xsd
unknown
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.10.0/css/all.min.css
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://minne.com/?utm_source=lolipop&utm_medium=banner&utm_campaign=synergy&utm_content=404
unknown
http://assets.lolipop.jp/img/bnr/bnr_lolipop_ad_001.gif
unknown
https://code.jquery.com/jquery-3.4.1.min.js
unknown
http://www.noghteyab.com/f97t/
51.89.93.192
http://www.ngkwnq.xyz/d35k/
35.241.41.54
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.desakedungpeluk.com/8vum/
202.52.146.180
http://www.hermandadcoyotes.com/gx7l/?9Fjx=a7hzNdnkeS27kktwRLGSx8yR2sA6hGpGYEa4s+kW8/8nhO4qbMwiGFPThwQr7Jt1vJRCiF4mQ47wrk5EK+BQCUwjbLnD+Licdnqi1ONE6USu+A5nC085uF77bSHLzlvxtDSsS9g=&h20PB=Ilr0H
188.95.113.62
https://cdn.jsdelivr.net/npm/bootstrap-icons
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
http://www.artistcalculator.com/pf6m/
162.241.216.26
http://miquwawa.com/tqql/?h20PB=Ilr0H&9Fjx=u0XZF227Y/r9f3hknYKw3A/OKyua8wzaE5MpTM9c21roNqnsj5Gisp9Vc
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.xyz-store.xyz/ixgj/?9Fjx=/Zj6VqX56ByDodokLRjPKDm3Pwn2S1h1h7pQZ2SgqDdN9OrisfEzogZ++nqPS1/BV9/5rcururFkQ+JMtWq084ODcNTM6ri6BugJHEDlWjTEcfv6bdNq3ciQP3N1zgfhFVTfb+g=&h20PB=Ilr0H
172.191.244.62
http://www.xyz-store.xyz/ixgj/
172.191.244.62
http://www.tcfreal.top/sg27/?9Fjx=cpYt0YSQq6qumPKnLg+mC8LQzbjhCfVjUwEln5zritMpGV/+kM1tERFpp4gfmVNp46bstuO0H+g7H2/quwpl6ls6SEGImodBdGoSGHjCZU2G7An66QSlhEKUMH7zQGocUjr8wdY=&h20PB=Ilr0H
203.161.50.128
http://www.loangoatworld.com/8y3s/
3.33.130.190
http://js.ad-stir.com/js/adstir.js?20130527
unknown
http://www.desakedungpeluk.com/8vum/?9Fjx=mMAT0VmYBXrn84GDY3jN9eT5aVT33QlPc8t3UynAD89QghEERF9j2st9BPanxmMeaSIDnLSTLKjuqvUky6NP4LhFqV3UnyKctbAktMQsAL9RdihXFK7EH5ocxuixaBnvMu0t3gQ=&h20PB=Ilr0H
202.52.146.180
https://htmlcodex.com/credit-removal
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://static.minne.com/files/banner/minne_600x500
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.loangoatworld.com
unknown
malicious
www.forthelement.com
unknown
malicious
www.miquwawa.com
unknown
malicious
www.dkimhub.com
unknown
malicious
www.hermandadcoyotes.com
unknown
malicious
www.xyz-store.xyz
unknown
malicious
www.desakedungpeluk.com
unknown
malicious
www.artistcalculator.com
unknown
malicious
206.23.85.13.in-addr.arpa
unknown
malicious
www.michaelstutorgroup.com
unknown
malicious
www.ngkwnq.xyz
35.241.41.54
www.tcfreal.top
203.161.50.128
hermandadcoyotes.com
188.95.113.62
www.michaelstutorgroup.com.cdn.hstgr.net
84.32.84.178
desakedungpeluk.com
202.52.146.180
miquwawa.com
95.169.27.235
artistcalculator.com
162.241.216.26
www.exporationgenius.sbs
188.114.97.3
www.noghteyab.com
51.89.93.192
www.zocalo-fuk.com
157.7.107.37
redirect.3dns.box
172.191.244.62
dkimhub.com
3.33.130.190
loangoatworld.com
3.33.130.190
forthelement.com
3.33.130.190
There are 14 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
203.161.50.128
www.tcfreal.top
Malaysia
172.191.244.62
redirect.3dns.box
United States
51.89.93.192
www.noghteyab.com
France
188.114.97.3
www.exporationgenius.sbs
European Union
202.52.146.180
desakedungpeluk.com
Indonesia
188.95.113.62
hermandadcoyotes.com
Spain
157.7.107.37
www.zocalo-fuk.com
Japan
35.241.41.54
www.ngkwnq.xyz
United States
95.169.27.235
miquwawa.com
Canada
3.33.130.190
dkimhub.com
United States
84.32.84.178
www.michaelstutorgroup.com.cdn.hstgr.net
Lithuania
162.241.216.26
artistcalculator.com
United States
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DE0000
unkown
page execute and read and write
malicious
14F0000
unclassified section
page execute and read and write
malicious
EB0000
system
page execute and read and write
malicious
3030000
trusted library allocation
page read and write
malicious
2EA0000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5200000
system
page execute and read and write
malicious
1950000
unclassified section
page execute and read and write
malicious
DD0000
trusted library allocation
page read and write
malicious
930000
system
page execute and read and write
malicious
14A0000
unclassified section
page execute and read and write
malicious
E31000
heap
page read and write
30BF000
heap
page read and write
E31000
heap
page read and write
6E3F000
stack
page read and write
2532000
trusted library allocation
page read and write
33F0000
heap
page read and write
E31000
heap
page read and write
1157000
direct allocation
page execute and read and write
E31000
heap
page read and write
D44000
heap
page read and write
E31000
heap
page read and write
2AF2000
unkown
page read and write
1470000
unkown
page readonly
E31000
heap
page read and write
E31000
heap
page read and write
2BD7DB8C000
heap
page read and write
42D000
remote allocation
page execute and read and write
24E3000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
2BD7F816000
trusted library allocation
page read and write
E31000
heap
page read and write
1120000
heap
page read and write
27A0000
heap
page execute and read and write
16E000
unkown
page readonly
26C0000
trusted library allocation
page execute and read and write
FA0000
heap
page read and write
1050000
unkown
page readonly
15B0000
heap
page read and write
32D8000
heap
page read and write
7DEF000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
3116000
heap
page read and write
E31000
heap
page read and write
4E40000
trusted library allocation
page execute and read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
D20000
unkown
page readonly
2BD7DB9F000
heap
page read and write
2CE0000
unkown
page readonly
B9E000
stack
page read and write
506B000
stack
page read and write
3BF1000
direct allocation
page execute and read and write
E31000
heap
page read and write
363D000
direct allocation
page execute and read and write
9F7C000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
2DCC000
unkown
page read and write
2BD7F9C4000
trusted library allocation
page read and write
2870000
heap
page read and write
3E0A4000
system
page read and write
314E000
heap
page read and write
9F2E000
stack
page read and write
E31000
heap
page read and write
5150000
heap
page read and write
1110000
unkown
page readonly
2850000
trusted library allocation
page read and write
716E000
stack
page read and write
D10000
heap
page read and write
2DCC000
unkown
page read and write
E31000
heap
page read and write
DE0000
unkown
page readonly
E31000
heap
page read and write
3E44000
unkown
page read and write
250A000
trusted library allocation
page execute and read and write
2CDF000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
940000
unkown
page readonly
2A18000
trusted library allocation
page read and write
2C90000
unkown
page read and write
C10000
heap
page read and write
E31000
heap
page read and write
3189000
heap
page read and write
D20000
heap
page read and write
E31000
heap
page read and write
30C0000
heap
page read and write
BC0000
heap
page read and write
C70000
unkown
page readonly
2500000
trusted library allocation
page read and write
B5C000
stack
page read and write
2610000
heap
page read and write
D80000
unkown
page read and write
2DD0000
unkown
page read and write
1230000
heap
page read and write
3346000
unkown
page read and write
1279000
direct allocation
page execute and read and write
E31000
heap
page read and write
6E5E000
stack
page read and write
2BD7F460000
trusted library allocation
page read and write
2F6C000
heap
page read and write
A43E000
stack
page read and write
967E000
stack
page read and write
4E32000
trusted library allocation
page read and write
16E000
unkown
page readonly
6A50000
trusted library allocation
page read and write
2BD7F9BE000
trusted library allocation
page read and write
AA5000
heap
page read and write
1470000
unkown
page readonly
5020000
trusted library allocation
page read and write
E31000
heap
page read and write
2BD7DBA2000
heap
page read and write
99E000
stack
page read and write
99FD000
stack
page read and write
9D3E000
stack
page read and write
7DEC000
heap
page read and write
2517000
trusted library allocation
page execute and read and write
D44000
heap
page read and write
E31000
heap
page read and write
BD0000
heap
page read and write
2550000
trusted library allocation
page read and write
2BA0000
unkown
page readonly
E31000
heap
page read and write
E31000
heap
page read and write
1051000
system
page execute and read and write
A57B000
stack
page read and write
25F3000
heap
page read and write
A67C000
stack
page read and write
5D0000
heap
page read and write
2600000
trusted library allocation
page read and write
2503000
trusted library allocation
page execute and read and write
E31000
heap
page read and write
7050000
trusted library allocation
page read and write
35B1000
heap
page read and write
E31000
heap
page read and write
2881000
trusted library allocation
page read and write
E31000
heap
page read and write
7D80000
heap
page read and write
7D98000
heap
page read and write
1050000
unkown
page readonly
E31000
heap
page read and write
E31000
heap
page read and write
1200000
unkown
page read and write
E31000
heap
page read and write
EA8000
heap
page read and write
5263000
system
page execute and read and write
4E80000
trusted library allocation
page execute and read and write
D5E000
stack
page read and write
E31000
heap
page read and write
4D86000
trusted library allocation
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
175000
unkown
page read and write
E31000
heap
page read and write
37B9000
trusted library allocation
page read and write
2BD7F9A6000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
37E1000
direct allocation
page execute and read and write
4D81000
trusted library allocation
page read and write
E31000
heap
page read and write
30C0000
heap
page read and write
9B0000
heap
page read and write
E31000
heap
page read and write
4E53000
heap
page read and write
69C0000
heap
page read and write
251D000
trusted library allocation
page execute and read and write
C05000
heap
page read and write
11A0000
unkown
page read and write
4168000
unkown
page read and write
9DF0000
heap
page read and write
3136000
heap
page read and write
B1E000
heap
page read and write
160000
unkown
page readonly
5400000
trusted library allocation
page execute and read and write
2CA0000
heap
page read and write
3120000
heap
page read and write
314C000
unkown
page execute and read and write
E31000
heap
page read and write
10A0000
unkown
page readonly
E31000
heap
page read and write
7DC4000
heap
page read and write
E31000
heap
page read and write
DB0000
heap
page read and write
21BD000
unclassified section
page execute and read and write
E31000
heap
page read and write
B10000
heap
page read and write
1729000
direct allocation
page execute and read and write
E31000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
6E9E000
stack
page read and write
136E000
stack
page read and write
2C0C000
unkown
page read and write
312A000
heap
page read and write
4D92000
trusted library allocation
page read and write
33F8000
heap
page read and write
11D6000
direct allocation
page execute and read and write
999000
stack
page read and write
274D000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
E31000
heap
page read and write
955000
heap
page read and write
2BB4000
heap
page read and write
9DED000
stack
page read and write
7568000
heap
page read and write
2874000
heap
page read and write
1401000
direct allocation
page execute and read and write
6E00000
trusted library allocation
page read and write
542C000
unkown
page read and write
E31000
heap
page read and write
10FC000
stack
page read and write
A16E000
stack
page read and write
3DD6C000
system
page read and write
2BD7F440000
heap
page read and write
290E000
trusted library allocation
page read and write
3105000
heap
page read and write
DF0000
heap
page read and write
38A9000
trusted library allocation
page read and write
E20000
heap
page read and write
1750000
unkown
page readonly
527C000
system
page execute and read and write
E31000
heap
page read and write
2530000
trusted library allocation
page read and write
C01000
heap
page read and write
348B000
heap
page read and write
3BEC000
unclassified section
page read and write
A53F000
stack
page read and write
DF0000
heap
page read and write
7DBF000
heap
page read and write
2854000
trusted library allocation
page read and write
920000
unkown
page readonly
4DE0000
heap
page execute and read and write
E31000
heap
page read and write
4BB4000
unclassified section
page read and write
2C64000
heap
page read and write
295C000
trusted library allocation
page read and write
C20000
heap
page read and write
2BD7F700000
trusted library allocation
page read and write
2FDF000
unkown
page read and write
24F0000
trusted library allocation
page read and write
E31000
heap
page read and write
D10000
heap
page read and write
2504000
trusted library allocation
page read and write
312A000
heap
page read and write
B00000
heap
page read and write
177000
unkown
page readonly
B38000
heap
page read and write
2BD7F814000
trusted library allocation
page read and write
E31000
heap
page read and write
319D000
heap
page read and write
E31000
heap
page read and write
7DB000
stack
page read and write
2BD7F901000
trusted library allocation
page read and write
E31000
heap
page read and write
2BD7DB50000
heap
page read and write
1100000
unkown
page readonly
7DE6000
heap
page read and write
1600000
direct allocation
page execute and read and write
24FD000
trusted library allocation
page execute and read and write
33FA000
heap
page read and write
5150000
trusted library allocation
page read and write
253B000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
BA0000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
317F000
heap
page read and write
177000
unkown
page readonly
50D000
stack
page read and write
7D8B000
heap
page read and write
5B0000
heap
page read and write
6870000
heap
page read and write
9FBE000
stack
page read and write
E31000
heap
page read and write
11D0000
direct allocation
page execute and read and write
A53000
heap
page read and write
4D64000
trusted library allocation
page read and write
3639000
direct allocation
page execute and read and write
271E000
stack
page read and write
E31000
heap
page read and write
6970000
trusted library section
page read and write
D44000
heap
page read and write
6D3F000
stack
page read and write
E31000
heap
page read and write
2506000
trusted library allocation
page execute and read and write
D17000
heap
page read and write
10FC000
stack
page read and write
E31000
heap
page read and write
46FE000
unclassified section
page read and write
E31000
heap
page read and write
940000
heap
page read and write
E31000
heap
page read and write
3B3C000
unclassified section
page read and write
7F8B0000
trusted library allocation
page execute and read and write
2C90000
unkown
page read and write
E31000
heap
page read and write
28FE000
stack
page read and write
AF0000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
EBF000
heap
page read and write
E31000
heap
page read and write
2880000
unkown
page read and write
11F0000
heap
page read and write
1040000
system
page execute and read and write
E31000
heap
page read and write
2BD7DB40000
heap
page read and write
1120000
heap
page read and write
528B000
system
page execute and read and write
2BD7DAA5000
system
page execute and read and write
1020000
heap
page read and write
11C7000
heap
page read and write
E31000
heap
page read and write
6BF0000
trusted library allocation
page read and write
C00000
heap
page read and write
179E000
direct allocation
page execute and read and write
6AD0000
heap
page read and write
1238000
heap
page read and write
25E0000
trusted library allocation
page execute and read and write
6A70000
trusted library allocation
page execute and read and write
4CA0000
heap
page execute and read and write
6F9E000
stack
page read and write
E31000
heap
page read and write
4E5B000
stack
page read and write
40B6000
unclassified section
page read and write
2840000
unkown
page read and write
7583000
heap
page read and write
B83000
heap
page read and write
1180000
unkown
page read and write
94B000
heap
page read and write
139E000
stack
page read and write
FEF000
stack
page read and write
31BE000
unkown
page execute and read and write
16E000
unkown
page readonly
1080000
heap
page read and write
5288000
system
page execute and read and write
4CF0000
heap
page read and write
E31000
heap
page read and write
3179000
heap
page read and write
32F0000
trusted library allocation
page read and write
27DF000
stack
page read and write
301C000
heap
page read and write
2526000
trusted library allocation
page execute and read and write
E31000
heap
page read and write
E31000
heap
page read and write
A06E000
stack
page read and write
4D02000
trusted library allocation
page read and write
398E000
trusted library allocation
page read and write
364D000
unkown
page execute and read and write
37D9000
trusted library allocation
page read and write
3C62000
direct allocation
page execute and read and write
18CD000
direct allocation
page execute and read and write
A0BE000
stack
page read and write
5170000
heap
page read and write
D30000
unkown
page readonly
E31000
heap
page read and write
2BD7DA50000
system
page execute and read and write
930000
unkown
page readonly
5090000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
161000
unkown
page execute read
1230000
heap
page read and write
6C3E000
stack
page read and write
E31000
heap
page read and write
2E78000
unkown
page read and write
B52000
heap
page read and write
13BF000
stack
page read and write
160000
unkown
page readonly
4FA000
stack
page read and write
98FD000
stack
page read and write
7E80000
trusted library allocation
page read and write
E31000
heap
page read and write
4D60000
trusted library allocation
page read and write
B30000
heap
page read and write
456C000
unclassified section
page read and write
E31000
heap
page read and write
4A1C000
stack
page read and write
2C60000
heap
page read and write
7550000
heap
page read and write
4E60000
heap
page read and write
D40000
heap
page read and write
6BE0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
C6B000
heap
page read and write
E31000
heap
page read and write
7D90000
heap
page read and write
B47000
heap
page read and write
2882000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
E31000
heap
page read and write
50A5000
heap
page read and write
D0F000
stack
page read and write
11C0000
heap
page read and write
4248000
unclassified section
page read and write
161000
unkown
page execute read
28C1000
trusted library allocation
page read and write
EA0000
heap
page read and write
7DFC000
heap
page read and write
1030000
unkown
page readonly
E31000
heap
page read and write
2785000
trusted library allocation
page read and write
177000
unkown
page readonly
3123000
heap
page read and write
3018000
heap
page read and write
744E000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
37DD000
direct allocation
page execute and read and write
C60000
unkown
page readonly
E31000
heap
page read and write
9E1000
heap
page read and write
2DCE000
unkown
page read and write
1020000
heap
page read and write
F30000
heap
page read and write
4DD0000
trusted library allocation
page read and write
E31000
heap
page read and write
2850000
unkown
page read and write
2BD7F460000
trusted library allocation
page read and write
330E000
stack
page read and write
6ABE000
stack
page read and write
E31000
heap
page read and write
3BE8000
unclassified section
page read and write
E31000
heap
page read and write
161000
unkown
page execute read
2A00000
unkown
page readonly
A0FE000
stack
page read and write
214B000
unclassified section
page execute and read and write
2752000
trusted library allocation
page read and write
2512000
trusted library allocation
page read and write
3DCBE000
system
page read and write
30B0000
heap
page read and write
2746000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
E31000
heap
page read and write
1060000
heap
page read and write
3165000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
37FC000
unkown
page read and write
18C6000
direct allocation
page execute and read and write
4D46000
unclassified section
page read and write
E31000
heap
page read and write
F7E000
stack
page read and write
E31000
heap
page read and write
D71000
unkown
page readonly
1150000
direct allocation
page execute and read and write
30B5000
heap
page read and write
177000
unkown
page readonly
11A8000
heap
page read and write
6AE5000
heap
page read and write
E31000
heap
page read and write
3136000
heap
page read and write
3120000
heap
page read and write
B85000
heap
page read and write
E31000
heap
page read and write
6CFE000
stack
page read and write
24D0000
trusted library allocation
page read and write
E589BFE000
stack
page read and write
4E20000
heap
page read and write
1040000
unkown
page readonly
1238000
heap
page read and write
2E7C000
unkown
page read and write
E31000
heap
page read and write
EAF000
unkown
page read and write
2522000
trusted library allocation
page read and write
172D000
direct allocation
page execute and read and write
E31000
heap
page read and write
4FF0000
trusted library allocation
page read and write
46C000
unkown
page readonly
4D00000
trusted library allocation
page read and write
17BE000
unclassified section
page execute and read and write
2870000
heap
page read and write
2BD7DB77000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
390B000
heap
page read and write
3111000
heap
page read and write
2FE0000
heap
page read and write
E31000
heap
page read and write
161000
unkown
page execute read
ADE000
stack
page read and write
37B1000
trusted library allocation
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
24F0000
trusted library allocation
page read and write
5140000
heap
page read and write
24F3000
trusted library allocation
page read and write
7DDD000
heap
page read and write
9A0000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
C80000
unkown
page readonly
1211000
unkown
page readonly
3DD68000
system
page read and write
6DC000
stack
page read and write
177000
unkown
page readonly
A40000
heap
page read and write
7E02000
heap
page read and write
35A0000
heap
page read and write
9E7C000
stack
page read and write
DB6000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
A1FE000
stack
page read and write
389A000
heap
page read and write
937000
stack
page read and write
47B8000
trusted library allocation
page read and write
E31000
heap
page read and write
507F000
trusted library section
page readonly
9BFE000
stack
page read and write
3250000
trusted library allocation
page execute and read and write
1030000
unkown
page readonly
E7D000
stack
page read and write
1180000
unkown
page read and write
950000
heap
page read and write
E31000
heap
page read and write
2BD7F800000
trusted library allocation
page read and write
A2AF000
stack
page read and write
175000
unkown
page read and write
2510000
trusted library allocation
page read and write
F3E000
stack
page read and write
52DF000
system
page execute and read and write
36D6000
heap
page read and write
494C000
stack
page read and write
9AA000
stack
page read and write
2BD7F80F000
trusted library allocation
page read and write
33AE000
stack
page read and write
E588BFB000
stack
page read and write
E31000
heap
page read and write
34C0000
heap
page read and write
4D6B000
trusted library allocation
page read and write
E31000
heap
page read and write
7DF9000
heap
page read and write
2BD7DAA2000
system
page execute and read and write
D40000
unkown
page readonly
E6E000
unkown
page read and write
3400000
heap
page read and write
BC8000
heap
page read and write
2BD7F9CE000
trusted library allocation
page read and write
A02E000
stack
page read and write
940000
unkown
page readonly
CEA000
stack
page read and write
251B000
trusted library allocation
page execute and read and write
3DCBC000
system
page read and write
3C0000
unkown
page readonly
2BB2000
unkown
page read and write
4E90000
trusted library allocation
page read and write
2CE0000
unkown
page readonly
4E30000
trusted library allocation
page read and write
7DF3000
heap
page read and write
3896000
heap
page read and write
30BE000
heap
page read and write
4DA0000
trusted library allocation
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
DB0000
heap
page read and write
7053000
trusted library allocation
page read and write
2BA0000
unkown
page readonly
1260000
heap
page read and write
843F000
stack
page read and write
3D9E2000
system
page read and write
E31000
heap
page read and write
259E000
stack
page read and write
30B8000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
2BD7F460000
trusted library allocation
page read and write
33F5000
heap
page read and write
2DCE000
unkown
page read and write
E31000
heap
page read and write
117E000
stack
page read and write
31B0000
trusted library allocation
page read and write
C70000
unkown
page readonly
3F24000
unclassified section
page read and write
28B0000
heap
page read and write
25DB000
stack
page read and write
E31000
heap
page read and write
24B0000
heap
page read and write
1220000
unkown
page read and write
E31000
heap
page read and write
B54000
heap
page read and write
7D95000
heap
page read and write
336D000
stack
page read and write
36AE000
direct allocation
page execute and read and write
6350000
trusted library allocation
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
11C8000
heap
page read and write
11A0000
unkown
page read and write
9E3E000
stack
page read and write
E31000
heap
page read and write
29FF000
stack
page read and write
177000
unkown
page readonly
2C60000
heap
page read and write
161000
unkown
page execute read
4A22000
unclassified section
page read and write
DEC000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
5F7000
stack
page read and write
2874000
heap
page read and write
1801000
unkown
page readonly
D20000
heap
page read and write
7DA4000
heap
page read and write
E31000
heap
page read and write
BA7000
heap
page read and write
160000
unkown
page readonly
2DD0000
unkown
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
24E4000
trusted library allocation
page read and write
E31000
heap
page read and write
69C0000
trusted library section
page read and write
5070000
trusted library section
page readonly
2BD7F821000
trusted library allocation
page read and write
10A0000
unkown
page readonly
A90000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
2E78000
unkown
page read and write
3B3E000
unclassified section
page read and write
24ED000
trusted library allocation
page execute and read and write
E31000
heap
page read and write
141D000
direct allocation
page execute and read and write
32F0000
trusted library allocation
page read and write
31B5000
heap
page read and write
161000
unkown
page execute read
920000
unkown
page readonly
32D0000
trusted library allocation
page read and write
5300000
heap
page read and write
E31000
heap
page read and write
3852000
direct allocation
page execute and read and write
6F72000
trusted library allocation
page read and write
3862000
unclassified section
page read and write
E31000
heap
page read and write
BF0000
heap
page read and write
83FE000
stack
page read and write
D40000
unkown
page readonly
A8E000
stack
page read and write
273E000
trusted library allocation
page read and write
8F8000
stack
page read and write
4EA0000
heap
page read and write
2C70000
unkown
page readonly
E31000
heap
page read and write
3141000
heap
page read and write
2DB0000
unkown
page readonly
DA0000
unkown
page readonly
E31000
heap
page read and write
2BB4000
heap
page read and write
7D72000
heap
page read and write
E31000
heap
page read and write
3340000
heap
page read and write
11C8000
heap
page read and write
7DC9000
heap
page read and write
30BA000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
6B20000
heap
page read and write
397C000
unclassified section
page read and write
50B0000
heap
page read and write
977E000
stack
page read and write
C60000
heap
page read and write
E31000
heap
page read and write
DAA000
stack
page read and write
28B0000
heap
page read and write
FFA000
direct allocation
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
175000
unkown
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
174C000
unclassified section
page execute and read and write
D20000
unkown
page readonly
E31000
heap
page read and write
2510000
trusted library allocation
page read and write
E31000
heap
page read and write
2BD7F610000
heap
page read and write
D0F000
stack
page read and write
35B0000
heap
page read and write
1948000
direct allocation
page execute and read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
757F000
heap
page read and write
2840000
unkown
page read and write
E31000
heap
page read and write
4D8D000
trusted library allocation
page read and write
35DB000
unkown
page execute and read and write
11C0000
heap
page read and write
7790000
trusted library section
page read and write
2520000
trusted library allocation
page read and write
11A0000
heap
page read and write
E31000
heap
page read and write
4DA5000
trusted library allocation
page read and write
DE0000
unkown
page readonly
272B000
trusted library allocation
page read and write
149F000
stack
page read and write
1211000
unkown
page readonly
2500000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
A6BE000
stack
page read and write
2C5E000
stack
page read and write
E31000
heap
page read and write
13C0000
unkown
page readonly
160000
unkown
page readonly
E31000
heap
page read and write
4FF2000
trusted library allocation
page read and write
295A000
trusted library allocation
page read and write
E31000
heap
page read and write
B10000
heap
page read and write
376D000
heap
page read and write
E31000
heap
page read and write
C30000
heap
page read and write
A7F000
unkown
page read and write
3362000
heap
page read and write
7590000
heap
page read and write
CF0000
heap
page read and write
E31000
heap
page read and write
27B1000
trusted library allocation
page read and write
90E000
unkown
page read and write
3400000
heap
page read and write
1100000
unkown
page readonly
2BD7DB70000
heap
page read and write
3344000
heap
page read and write
D00000
unkown
page readonly
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
2BD7F803000
trusted library allocation
page read and write
7D86000
heap
page read and write
6BBF000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
4D7E000
trusted library allocation
page read and write
E31000
heap
page read and write
A80000
heap
page read and write
1273000
direct allocation
page execute and read and write
754E000
stack
page read and write
768E000
stack
page read and write
9AA000
heap
page read and write
3889000
trusted library allocation
page read and write
2BD0000
heap
page read and write
E31000
heap
page read and write
933C000
trusted library allocation
page read and write
9F0000
unkown
page readonly
E31000
heap
page read and write
1751000
unkown
page readonly
E31000
heap
page read and write
D10000
heap
page read and write
A7BE000
stack
page read and write
9E0000
unkown
page readonly
D60000
unkown
page read and write
256E000
stack
page read and write
C60000
unkown
page readonly
EEF000
stack
page read and write
50A0000
heap
page read and write
E31000
heap
page read and write
1416000
direct allocation
page execute and read and write
E31000
heap
page read and write
940000
heap
page read and write
9DF000
heap
page read and write
7D81000
heap
page read and write
DAA000
stack
page read and write
9A00000
heap
page read and write
E31000
heap
page read and write
3147000
heap
page read and write
7DFF000
heap
page read and write
C0E000
stack
page read and write
4ED8000
unclassified section
page read and write
2537000
trusted library allocation
page execute and read and write
366A000
unkown
page read and write
E31000
heap
page read and write
C80000
unkown
page readonly
E31000
heap
page read and write
4DF0000
trusted library allocation
page read and write
2F6E000
heap
page read and write
4CB0000
trusted library allocation
page read and write
1060000
heap
page read and write
E31000
heap
page read and write
B07000
heap
page read and write
E31000
heap
page read and write
2780000
trusted library allocation
page read and write
109F000
stack
page read and write
34D8000
unkown
page read and write
16E000
unkown
page readonly
9A0000
heap
page read and write
B4A000
unkown
page read and write
9F0000
unkown
page readonly
250D000
trusted library allocation
page execute and read and write
E31000
heap
page read and write
C20000
heap
page read and write
E31000
heap
page read and write
3510000
direct allocation
page execute and read and write
2AF2000
unkown
page read and write
E31000
heap
page read and write
175000
unkown
page read and write
4E70000
heap
page read and write
73E0000
trusted library allocation
page execute and read and write
175000
unkown
page read and write
5310000
heap
page read and write
4E15000
heap
page read and write
E31000
heap
page read and write
18B1000
direct allocation
page execute and read and write
1200000
unkown
page read and write
2840000
trusted library allocation
page read and write
B18000
heap
page read and write
E5893FE000
stack
page read and write
D50000
trusted library allocation
page read and write
AA0000
heap
page read and write
1212000
direct allocation
page execute and read and write
778E000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
1110000
unkown
page readonly
43DA000
unclassified section
page read and write
FF0000
direct allocation
page read and write
16E000
unkown
page readonly
E31000
heap
page read and write
1176000
direct allocation
page execute and read and write
160000
unkown
page readonly
6BFE000
stack
page read and write
3DAA2000
system
page read and write
2BD0000
heap
page read and write
2BD7DBA2000
heap
page read and write
398E000
unkown
page read and write
146F000
stack
page read and write
104A000
system
page execute and read and write
3BED000
direct allocation
page execute and read and write
E31000
heap
page read and write
E31000
heap
page read and write
175000
unkown
page read and write
E31000
heap
page read and write
2670000
trusted library allocation
page read and write
687E000
heap
page read and write
CF7000
heap
page read and write
30CC000
heap
page read and write
DA0000
unkown
page readonly
2502000
trusted library allocation
page read and write
E3D000
stack
page read and write
6980000
trusted library allocation
page read and write
160000
unkown
page readonly
2860000
trusted library allocation
page read and write
E31000
heap
page read and write
1430000
unkown
page readonly
2820000
heap
page read and write
9AA000
stack
page read and write
26D0000
heap
page read and write
E31000
heap
page read and write
9AE000
heap
page read and write
860000
heap
page read and write
1431000
unkown
page readonly
A39000
heap
page read and write
E31000
heap
page read and write
1220000
unkown
page read and write
3151000
heap
page read and write
E31000
heap
page read and write
3183000
heap
page read and write
252A000
trusted library allocation
page execute and read and write
3CB2000
unkown
page read and write
3ABE000
direct allocation
page execute and read and write
AEE000
stack
page read and write
54A000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
98BE000
stack
page read and write
A1AE000
stack
page read and write
6D3E000
stack
page read and write
5080000
heap
page read and write
E31000
heap
page read and write
7D70000
trusted library allocation
page read and write
106A000
system
page execute and read and write
513E000
stack
page read and write
7DB9000
heap
page read and write
3A49000
direct allocation
page execute and read and write
3A4D000
direct allocation
page execute and read and write
2F9E000
unkown
page read and write
1040000
unkown
page readonly
D00000
unkown
page readonly
24E0000
trusted library allocation
page read and write
26BE000
stack
page read and write
97BE000
stack
page read and write
2C70000
unkown
page readonly
2BD7DB9B000
heap
page read and write
D5E000
stack
page read and write
E31000
heap
page read and write
1191000
unkown
page readonly
3158000
heap
page read and write
3500000
heap
page read and write
14A0000
direct allocation
page read and write
E31000
heap
page read and write
2CA0000
heap
page read and write
3922000
unclassified section
page read and write
4E50000
heap
page read and write
2DAF000
stack
page read and write
4DB0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
3C2000
unkown
page readonly
2741000
trusted library allocation
page read and write
35B1000
heap
page read and write
3123000
heap
page read and write
E31000
heap
page read and write
930000
unkown
page readonly
2513000
trusted library allocation
page read and write
E31000
heap
page read and write
CFC000
stack
page read and write
4E00000
trusted library section
page readonly
D80000
unkown
page read and write
3881000
trusted library allocation
page read and write
532C000
unkown
page read and write
9CEE000
stack
page read and write
CFC000
stack
page read and write
E31000
heap
page read and write
A74000
heap
page read and write
CEA000
stack
page read and write
9E0000
unkown
page readonly
35B3000
heap
page read and write
6B0F000
heap
page read and write
48DE000
stack
page read and write
95D000
stack
page read and write
E31000
heap
page read and write
16E000
unkown
page readonly
D30000
unkown
page readonly
4D10000
trusted library allocation
page execute and read and write
EA8000
heap
page read and write
69CE000
heap
page read and write
D60000
unkown
page read and write
E31000
heap
page read and write
2DB0000
unkown
page readonly
1191000
unkown
page readonly
4E10000
heap
page read and write
E31000
heap
page read and write
13C0000
unkown
page readonly
25F0000
heap
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
348F000
heap
page read and write
7F450000
trusted library allocation
page execute and read and write
2E7C000
unkown
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
2760000
trusted library allocation
page read and write
2870000
heap
page execute and read and write
266F000
stack
page read and write
BC0000
heap
page read and write
8BB000
stack
page read and write
3920000
direct allocation
page execute and read and write
E58A3FF000
stack
page read and write
EFA000
stack
page read and write
2720000
trusted library allocation
page read and write
5140000
trusted library allocation
page execute and read and write
2B9E000
stack
page read and write
83A000
stack
page read and write
1801000
unkown
page readonly
2BB0000
heap
page read and write
526C000
system
page execute and read and write
E30000
heap
page read and write
31B4000
unkown
page read and write
52FE000
stack
page read and write
281C000
stack
page read and write
E31000
heap
page read and write
3FD6000
unkown
page read and write
2856000
trusted library allocation
page read and write
338F000
stack
page read and write
2A00000
unkown
page readonly
38E4000
trusted library allocation
page read and write
E31000
heap
page read and write
109F000
stack
page read and write
E31000
heap
page read and write
E31000
heap
page read and write
2C64000
heap
page read and write
2770000
trusted library allocation
page read and write
D71000
unkown
page readonly
33FF000
heap
page read and write
DEC000
stack
page read and write
E31000
heap
page read and write
There are 979 hidden memdumps, click here to show them.