IOC Report
mDHwap5GlV.exe

loading gif

Files

File Path
Type
Category
Malicious
mDHwap5GlV.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\decrypted_app_1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2voyaqct.rei.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fwhry1nm.cbd.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\mDHwap5GlV.exe
"C:\Users\user\Desktop\mDHwap5GlV.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\"
malicious
C:\Users\user\AppData\Local\Temp\decrypted_app_1.exe
"C:\Users\user\AppData\Local\Temp\decrypted_app_1.exe"
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\pipanel.exe
"C:\Users\user\AppData\Local\Temp\decrypted_app_1.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://seat-tabooz.cyou/api
172.67.178.191
malicious
http://html4/loose.dtd
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://github.com/mono/linker/issues/1731
unknown
https://ipinfo.io/missingauth
unknown
http://194.15.46.236:8397/notify-launchH
unknown
https://github.com/mono/linker/issues/2025
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/mono/linker/pull/2125.
unknown
https://aka.ms/dotnet/info
unknown
https://seat-tabooz.cyou/apibu
unknown
https://api.ipify.org;Error
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.newtonsoft.com/json
unknown
https://aka.ms/dotnet/app-launch-failed
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://.css
unknown
https://aka.ms/dotnet/sdk-not-foundFailed
unknown
https://seat-tabooz.cyou:443/apiT
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://seat-tabooz.cyou/e7
unknown
https://github.com/dotnet/runtime
unknown
https://seat-tabooz.cyou/_
unknown
https://api.ipify.org
unknown
http://www.faststone.org/FSCTutorial.htmU
unknown
https://aka.ms/dotnet-warnings/
unknown
https://seat-tabooz.cyou/g
unknown
http://194.15.46.236:8397/notify-launch
194.15.46.236
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://ipinfo.io:443/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://aka.ms/nativeaot-compatibility
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://github.com/dotnet/runtime/issues/71847
unknown
https://seat-tabooz.cyou/rG
unknown
https://aka.ms/binaryformatter
unknown
https://seat-tabooz.cyou/s
unknown
https://github.com/mono/linker/pull/649
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://aka.ms/dotnet-core-applaunch?Description:
unknown
http://.jpg
unknown
https://seat-tabooz.cyou:443/api2o4p.default-release/key4.dbPK
unknown
http://194.15.46.236:8397
unknown
http://api.ipify.org:443/
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
https://seat-tabooz.cyou/api$
unknown
https://api.ipify.org/
172.67.74.152
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/
unknown
https://github.com/mono/linker/issues/1416.
unknown
http://www.faststone.org/FSCTutorial.htm
unknown
https://www.faststone.org/order.htmU
unknown
https://aka.ms/dotnet-illink/com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://www.faststone.org/
unknown
https://aka.ms/dotnet/downloadInstall
unknown
https://seat-tabooz.cyou/
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ipinfo.io/8.46.123.75/json
34.117.59.81
http://james.newtonking.com/projects/json
unknown
http://194.15.46.236:8397/
unknown
http://www.faststone.org/U
unknown
https://github.com/mono/linker/issues/378
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://seat-tabooz.cyou/apig
unknown
https://github.com/dotnet/linker/issues/2392
unknown
https://seat-tabooz.cyou:443/api
unknown
https://ipinfo.io/
unknown
https://aka.ms/pscore6lBdq
unknown
https://github.com/mono/linker/issues/1989
unknown
https://github.com/mono/linker/issues/1906.
unknown
https://support.microsof
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://seat-tabooz.cyou/apis
unknown
http://194.15.46.236:8397/software/AI-Setup
unknown
https://aka.ms/GlobalizationInvariantMode
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://www.faststone.org/order.htm
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://aka.ms/dotnet-illink/nativehost
unknown
https://aka.ms/dotnet/download
unknown
There are 82 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
seat-tabooz.cyou
172.67.178.191
malicious
ipinfo.io
34.117.59.81
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
172.67.178.191
seat-tabooz.cyou
United States
malicious
34.117.59.81
ipinfo.io
United States
194.15.46.236
unknown
unknown
172.67.74.152
api.ipify.org
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
33FD000
heap
page read and write
536F000
trusted library allocation
page read and write
E8F2000
direct allocation
page execute read
3291000
heap
page read and write
6F50000
heap
page read and write
14D0000
trusted library allocation
page read and write
D608000
direct allocation
page execute read
9AAA000
direct allocation
page execute read
323B000
heap
page read and write
E702000
direct allocation
page execute read
534D000
trusted library allocation
page read and write
E3FE000
stack
page read and write
3738000
direct allocation
page execute read
5351000
trusted library allocation
page read and write
3300000
direct allocation
page read and write
327D000
heap
page read and write
E270000
unkown
page readonly
5350000
trusted library allocation
page read and write
4FA1000
direct allocation
page read and write
4958000
trusted library allocation
page read and write
DCEA000
direct allocation
page execute read
33B8000
heap
page read and write
30FD000
stack
page read and write
9CF2000
direct allocation
page execute read
AA4E000
direct allocation
page execute read
E6E0000
direct allocation
page execute read
373C000
direct allocation
page execute read
32A6000
heap
page read and write
CD69000
unkown
page write copy
C5B1000
heap
page read and write
C5A1000
heap
page read and write
FC5000
unkown
page read and write
539D000
trusted library allocation
page read and write
DE58000
direct allocation
page execute read
70CE000
stack
page read and write
ECA4000
direct allocation
page execute read
11C0000
heap
page read and write
6D9D000
stack
page read and write
32C0000
heap
page read and write
C4B0000
heap
page read and write
3281000
heap
page read and write
5351000
trusted library allocation
page read and write
4967000
trusted library allocation
page read and write
3220000
direct allocation
page read and write
334D000
heap
page read and write
5358000
trusted library allocation
page read and write
32C7000
heap
page read and write
E721000
unkown
page execute read
DE72000
direct allocation
page execute read
E37D000
direct allocation
page read and write
3080000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
D051000
direct allocation
page readonly
D5FC000
direct allocation
page execute read
C81D000
direct allocation
page read and write
ECAF000
direct allocation
page read and write
32A5000
heap
page read and write
AA28000
direct allocation
page execute read
75A0000
trusted library allocation
page read and write
D5F8000
direct allocation
page execute read
E8FD000
direct allocation
page read and write
538D000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
C716000
heap
page read and write
4FD3000
direct allocation
page read and write
5358000
trusted library allocation
page read and write
33C5000
heap
page read and write
DE79000
direct allocation
page read and write
14F0000
trusted library allocation
page read and write
5359000
trusted library allocation
page read and write
AA2E000
direct allocation
page execute read
E2F4000
direct allocation
page execute read
C4D7000
heap
page read and write
4F86000
direct allocation
page execute read
5378000
trusted library allocation
page read and write
32B3000
heap
page read and write
373B000
direct allocation
page read and write
33DE000
heap
page read and write
C6AD000
heap
page read and write
4FC5000
direct allocation
page read and write
A6BF000
unkown
page read and write
C7F4000
direct allocation
page execute read
C67D000
heap
page read and write
7304000
heap
page read and write
538D000
trusted library allocation
page read and write
C5B8000
heap
page read and write
9AA2000
direct allocation
page execute read
3080000
trusted library allocation
page read and write
D28E000
stack
page read and write
AA26000
direct allocation
page execute read
E8F4000
direct allocation
page execute read
9ACE000
direct allocation
page execute read
E700000
direct allocation
page execute read
5351000
trusted library allocation
page read and write
4FA7000
direct allocation
page read and write
988D000
direct allocation
page read and write
72F9000
heap
page read and write
E8FB000
direct allocation
page read and write
4FCC000
direct allocation
page execute read
481E000
stack
page read and write
DE55000
direct allocation
page read and write
5398000
trusted library allocation
page read and write
CDAA000
unkown
page readonly
C716000
heap
page read and write
325C000
direct allocation
page execute read
4F84000
direct allocation
page execute read
3289000
heap
page read and write
C5A6000
heap
page read and write
C7FC000
direct allocation
page execute read
334D000
heap
page read and write
C7AD000
direct allocation
page read and write
3298000
heap
page read and write
7FD0000
trusted library allocation
page read and write
DF50000
direct allocation
page execute read
C495000
direct allocation
page read and write
4F50000
direct allocation
page read and write
DCE6000
direct allocation
page execute read
31BE000
stack
page read and write
5362000
trusted library allocation
page read and write
2BEF000
stack
page read and write
5361000
trusted library allocation
page read and write
9CFC000
direct allocation
page execute read
CE4E000
direct allocation
page execute read
5361000
trusted library allocation
page read and write
CE8E000
stack
page read and write
152E000
heap
page read and write
E869000
direct allocation
page read and write
E6ED000
direct allocation
page read and write
7161000
heap
page read and write
11F4000
heap
page read and write
3291000
heap
page read and write
3281000
heap
page read and write
D521000
unkown
page execute read
5361000
trusted library allocation
page read and write
D4B1000
direct allocation
page read and write
4F30000
direct allocation
page execute read
C601000
heap
page read and write
53A8000
trusted library allocation
page read and write
31F5000
heap
page read and write
ECA7000
direct allocation
page read and write
C618000
heap
page read and write
AA29000
direct allocation
page read and write
FEE000
unkown
page readonly
3383000
heap
page read and write
4FD6000
direct allocation
page execute read
4F66000
direct allocation
page execute read
DE73000
direct allocation
page read and write
32BE000
heap
page read and write
C800000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
32FF000
direct allocation
page read and write
CE28000
unkown
page read and write
3402000
heap
page read and write
E1C1000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
C4C2000
heap
page read and write
45BE000
stack
page read and write
AA44000
direct allocation
page execute read
5358000
trusted library allocation
page read and write
A358000
unkown
page readonly
539D000
trusted library allocation
page read and write
AA5B000
direct allocation
page read and write
74BE000
stack
page read and write
D605000
direct allocation
page read and write
CA13000
direct allocation
page readonly
D60F000
direct allocation
page read and write
5371000
trusted library allocation
page read and write
C4DD000
heap
page read and write
D480000
unkown
page readonly
9CB1000
unkown
page readonly
9A95000
direct allocation
page read and write
A6C7000
unkown
page write copy
52F2000
direct allocation
page read and write
9A94000
direct allocation
page execute read
5340000
trusted library allocation
page read and write
E866000
direct allocation
page execute read
3287000
heap
page read and write
32AA000
heap
page read and write
54ED000
trusted library allocation
page read and write
4933000
trusted library allocation
page read and write
6B92000
direct allocation
page read and write
9AC2000
direct allocation
page execute read
9AA5000
direct allocation
page read and write
C7F6000
direct allocation
page execute read
C618000
heap
page read and write
5395000
trusted library allocation
page read and write
C492000
direct allocation
page execute read
DF58000
direct allocation
page execute read
2D1A000
heap
page read and write
33D9000
heap
page read and write
5341000
trusted library allocation
page read and write
DE7F000
direct allocation
page read and write
DE50000
direct allocation
page execute read
C529000
heap
page read and write
9895000
direct allocation
page read and write
49F7000
trusted library allocation
page read and write
31C0000
direct allocation
page execute read
DD78000
direct allocation
page readonly
4F8A000
direct allocation
page execute read
EA7F000
stack
page read and write
535F000
trusted library allocation
page read and write
9D0D000
direct allocation
page read and write
CE4A000
direct allocation
page execute read
9C75000
direct allocation
page read and write
C81E000
direct allocation
page execute read
9C7B000
direct allocation
page read and write
55B5000
trusted library allocation
page read and write
C5CF000
heap
page read and write
4F80000
direct allocation
page execute read
E843000
direct allocation
page read and write
9B8B000
unkown
page read and write
7300000
heap
page read and write
D60A000
direct allocation
page execute read
AA51000
direct allocation
page read and write
747E000
stack
page read and write
D5B0000
unkown
page readonly
32BF000
heap
page read and write
373F000
direct allocation
page read and write
3200000
heap
page read and write
C7FA000
direct allocation
page execute read
E2F6000
direct allocation
page execute read
ECA5000
direct allocation
page read and write
AA59000
direct allocation
page read and write
72BD000
heap
page read and write
327E000
direct allocation
page execute and read and write
5361000
trusted library allocation
page read and write
C7D3000
direct allocation
page read and write
9886000
direct allocation
page execute read
5395000
trusted library allocation
page read and write
CDF0000
unkown
page readonly
C7A6000
direct allocation
page execute read
CE2A000
direct allocation
page readonly
9CF7000
direct allocation
page read and write
D5E6000
direct allocation
page readonly
A6B4000
unkown
page read and write
32A7000
heap
page read and write
C53D000
heap
page read and write
27C0000
heap
page read and write
2748000
stack
page read and write
492C000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
C7D2000
direct allocation
page execute read
C52A000
heap
page read and write
31DA000
direct allocation
page execute read
DE74000
direct allocation
page execute read
4F3B000
direct allocation
page read and write
4FAD000
direct allocation
page read and write
2AE0000
heap
page read and write
535F000
trusted library allocation
page read and write
C716000
heap
page read and write
DE76000
direct allocation
page execute read
D5F6000
direct allocation
page execute read
C6AD000
heap
page read and write
32B4000
heap
page read and write
49EC000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
11F4000
heap
page read and write
5352000
trusted library allocation
page read and write
4F34000
direct allocation
page execute read
9AA6000
direct allocation
page execute read
DCE9000
direct allocation
page read and write
C7A3000
direct allocation
page read and write
3289000
heap
page read and write
D60D000
direct allocation
page read and write
321E000
stack
page read and write
DF5E000
direct allocation
page execute read
E8FC000
direct allocation
page execute read
5361000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
DD40000
unkown
page readonly
539E000
trusted library allocation
page read and write
DCEF000
direct allocation
page read and write
E1DF000
direct allocation
page read and write
AA45000
direct allocation
page read and write
D40E000
stack
page read and write
373E000
direct allocation
page execute read
AA2B000
direct allocation
page read and write
328B000
heap
page read and write
321A000
heap
page read and write
C4D2000
heap
page read and write
CD75000
direct allocation
page readonly
2C62000
trusted library allocation
page read and write
D554000
unkown
page read and write
5351000
trusted library allocation
page read and write
C7FE000
direct allocation
page execute read
9C7C000
direct allocation
page execute read
328F000
heap
page read and write
E78E000
stack
page read and write
DCEC000
direct allocation
page execute read
988A000
direct allocation
page execute read
C60A000
heap
page read and write
DCF0000
unkown
page readonly
E735000
unkown
page read and write
328B000
heap
page read and write
3001000
direct allocation
page execute and read and write
5376000
trusted library allocation
page read and write
D5FD000
direct allocation
page read and write
3234000
direct allocation
page read and write
9BC000
stack
page read and write
CE29000
unkown
page write copy
11F4000
heap
page read and write
270C000
stack
page read and write
5345000
trusted library allocation
page read and write
4945000
trusted library allocation
page read and write
AA4A000
direct allocation
page execute read
E1CA000
direct allocation
page execute read
E2FD000
direct allocation
page read and write
80A0000
heap
page read and write
4FAA000
direct allocation
page execute read
E70C000
direct allocation
page execute read
C77D000
heap
page read and write
5351000
trusted library allocation
page read and write
11B0000
heap
page read and write
32F0000
direct allocation
page execute read
989A000
direct allocation
page execute read
2FD0000
remote allocation
page read and write
328F000
heap
page read and write
D4D0000
unkown
page readonly
5361000
trusted library allocation
page read and write
5359000
trusted library allocation
page read and write
3291000
heap
page read and write
C753000
heap
page read and write
CBB1000
unkown
page readonly
CBE1000
unkown
page execute read
DF55000
direct allocation
page read and write
4F61000
direct allocation
page read and write
3293000
heap
page read and write
32C2000
heap
page read and write
5361000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
329E000
heap
page read and write
4EF4000
direct allocation
page execute read
329E000
heap
page read and write
C7FF000
direct allocation
page read and write
E703000
direct allocation
page read and write
4FE0000
heap
page execute and read and write
C588000
heap
page read and write
2FE7000
heap
page read and write
DF54000
direct allocation
page execute read
8D1B000
unkown
page readonly
9AAD000
direct allocation
page read and write
E1C3000
direct allocation
page read and write
31D7000
heap
page read and write
52D6000
direct allocation
page read and write
6D1E000
stack
page read and write
FC0000
unkown
page readonly
2FD0000
remote allocation
page read and write
DEF0000
unkown
page readonly
C5B6000
heap
page read and write
DF51000
direct allocation
page read and write
9D10000
unkown
page readonly
5388000
trusted library allocation
page read and write
8030000
trusted library allocation
page execute and read and write
DCED000
direct allocation
page read and write
A740000
unkown
page readonly
E375000
direct allocation
page read and write
4FC1000
direct allocation
page read and write
9A96000
direct allocation
page execute read
E408000
heap
page read and write
DF5A000
direct allocation
page execute read
C81B000
direct allocation
page read and write
C5F7000
heap
page read and write
E2F7000
direct allocation
page read and write
32BE000
stack
page read and write
C518000
heap
page read and write
534B000
trusted library allocation
page read and write
33DE000
heap
page read and write
6E9E000
stack
page read and write
4FC4000
direct allocation
page execute read
9B00000
direct allocation
page read and write
4F87000
direct allocation
page read and write
3209000
direct allocation
page execute and read and write
C75D000
heap
page read and write
5921000
trusted library allocation
page read and write
11F0000
heap
page read and write
DD73000
unkown
page read and write
31DF000
direct allocation
page read and write
4570000
heap
page read and write
5361000
trusted library allocation
page read and write
CBBF000
unkown
page readonly
DD74000
unkown
page write copy
C498000
direct allocation
page execute read
E6EF000
direct allocation
page read and write
31DC000
direct allocation
page execute read
E881000
direct allocation
page read and write
946000
stack
page read and write
C7DB000
direct allocation
page read and write
3291000
heap
page read and write
C7E0000
unkown
page readonly
31DB000
direct allocation
page read and write
9B8E000
direct allocation
page readonly
88EA000
unkown
page readonly
4FD8000
direct allocation
page execute read
9AA7000
direct allocation
page read and write
3310000
heap
page read and write
AA2C000
direct allocation
page execute read
9AC8000
direct allocation
page execute read
3295000
heap
page read and write
4F38000
direct allocation
page execute read
4FAC000
direct allocation
page execute read
348F000
stack
page read and write
C49C000
direct allocation
page execute read
E379000
direct allocation
page read and write
C8A0000
unkown
page readonly
6E5B000
stack
page read and write
3394000
heap
page read and write
373D000
direct allocation
page read and write
4F6E000
direct allocation
page execute read
E1C5000
direct allocation
page read and write
3294000
heap
page read and write
4F6B000
direct allocation
page read and write
C817000
direct allocation
page read and write
5390000
trusted library allocation
page read and write
D4B6000
direct allocation
page execute read
9AC1000
direct allocation
page read and write
4CB6000
trusted library allocation
page read and write
4F6D000
direct allocation
page read and write
DE7A000
direct allocation
page execute read
E1D1000
direct allocation
page read and write
E720000
unkown
page readonly
DE53000
direct allocation
page read and write
2CA0000
heap
page readonly
7590000
trusted library allocation
page read and write
9D0A000
direct allocation
page execute read
D520000
unkown
page readonly
C5A0000
heap
page read and write
7270000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
9885000
direct allocation
page read and write
DCE2000
direct allocation
page execute read
5364000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
9F0000
unkown
page readonly
9894000
direct allocation
page execute read
961000
unkown
page execute read
5385000
trusted library allocation
page read and write
C491000
direct allocation
page read and write
3217000
heap
page read and write
CBB3000
unkown
page readonly
AA21000
direct allocation
page read and write
DF56000
direct allocation
page execute read
534B000
trusted library allocation
page read and write
E8F0000
direct allocation
page execute read
E1C0000
direct allocation
page execute read
9AAE000
direct allocation
page execute read
D43B000
direct allocation
page readonly
9A9E000
direct allocation
page execute read
DD80000
unkown
page readonly
9C90000
unkown
page readonly
5351000
trusted library allocation
page read and write
5525000
trusted library allocation
page read and write
32C2000
heap
page read and write
9D07000
direct allocation
page read and write
DE7D000
direct allocation
page read and write
C7AC000
direct allocation
page execute read
A926000
direct allocation
page readonly
F62000
unkown
page read and write
5365000
trusted library allocation
page read and write
E6EC000
direct allocation
page execute read
2B6F000
unkown
page read and write
C497000
direct allocation
page read and write
E70E000
direct allocation
page execute read
32B6000
heap
page read and write
C57C000
heap
page read and write
E706000
direct allocation
page execute read
9D03000
direct allocation
page read and write
FCB000
unkown
page read and write
3383000
heap
page read and write
534B000
trusted library allocation
page read and write
4FC7000
direct allocation
page read and write
E8E8000
direct allocation
page read and write
C490000
direct allocation
page execute read
DF5F000
direct allocation
page read and write
333A000
heap
page read and write
CE4F000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
C4B6000
heap
page read and write
9D0B000
direct allocation
page read and write
30D0000
heap
page read and write
C4D1000
heap
page read and write
C5CF000
heap
page read and write
4F90000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
A6C5000
unkown
page read and write
DE59000
direct allocation
page read and write
6DDA000
stack
page read and write
5361000
trusted library allocation
page read and write
E7E0000
direct allocation
page execute read
9BA0000
unkown
page readonly
324A000
direct allocation
page execute read
ECAA000
direct allocation
page execute read
C7F7000
direct allocation
page read and write
D4BA000
direct allocation
page execute read
4FAE000
direct allocation
page execute read
53C1000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
9AA0000
direct allocation
page execute read
C4F4000
heap
page read and write
4F85000
direct allocation
page read and write
5371000
trusted library allocation
page read and write
C66E000
heap
page read and write
336B000
heap
page read and write
4EF6000
direct allocation
page execute read
5359000
trusted library allocation
page read and write
728D000
heap
page read and write
DE71000
direct allocation
page read and write
4EF7000
direct allocation
page read and write
4A00000
trusted library allocation
page read and write
32FA000
direct allocation
page execute read
E1C8000
direct allocation
page execute read
7550000
trusted library allocation
page read and write
4FA6000
direct allocation
page execute read
E6E9000
direct allocation
page read and write
D5F7000
direct allocation
page read and write
73FE000
stack
page read and write
E6EE000
direct allocation
page execute read
9AB0000
unkown
page readonly
53AF000
trusted library allocation
page read and write
4F33000
direct allocation
page read and write
E37A000
direct allocation
page execute read
AA49000
direct allocation
page read and write
4EF8000
direct allocation
page execute read
C7C0000
direct allocation
page read and write
D43A000
unkown
page read and write
3281000
heap
page read and write
4F00000
direct allocation
page execute read
D603000
direct allocation
page read and write
C67D000
heap
page read and write
3364000
heap
page read and write
C4D9000
heap
page read and write
5375000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
30E0000
direct allocation
page execute and read and write
2CDB000
heap
page read and write
E1DC000
direct allocation
page execute read
32BF000
heap
page read and write
4FD7000
direct allocation
page read and write
4FA0000
direct allocation
page execute read
9C78000
direct allocation
page execute read
4FD9000
direct allocation
page read and write
DE5C000
direct allocation
page execute read
7FB0000
heap
page read and write
C494000
direct allocation
page execute read
3287000
heap
page read and write
3080000
trusted library allocation
page read and write
CE30000
direct allocation
page read and write
C7F1000
direct allocation
page read and write
D5B1000
unkown
page execute read
C526000
heap
page read and write
DE5E000
direct allocation
page execute read
D070000
heap
page read and write
EC5F000
stack
page read and write
32BD000
heap
page read and write
AA25000
direct allocation
page read and write
152A000
heap
page read and write
E8F7000
direct allocation
page read and write
D4BE000
direct allocation
page execute read
C5A1000
heap
page read and write
C4C1000
heap
page read and write
9AF4000
direct allocation
page readonly
1B300000
remote allocation
page read and write
5341000
trusted library allocation
page read and write
AA22000
direct allocation
page execute read
100B1000
direct allocation
page read and write
D4BF000
direct allocation
page read and write
C60A000
heap
page read and write
A35F000
unkown
page readonly
DE78000
direct allocation
page execute read
E6E4000
direct allocation
page execute read
7316000
heap
page read and write
5341000
trusted library allocation
page read and write
C68E000
heap
page read and write
E708000
direct allocation
page execute read
3281000
heap
page read and write
C7D8000
direct allocation
page execute read
4F69000
direct allocation
page read and write
C7A8000
direct allocation
page execute read
F3C000
unkown
page read and write
32AA000
heap
page read and write
4F3C000
direct allocation
page execute read
32B9000
heap
page read and write
ECAB000
direct allocation
page read and write
14D0000
direct allocation
page read and write
E2FC000
direct allocation
page execute read
4F10000
direct allocation
page read and write
E70A000
direct allocation
page execute read
C75D000
heap
page read and write
5378000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
539D000
trusted library allocation
page read and write
E7F0000
unkown
page readonly
3080000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
DE57000
direct allocation
page read and write
9C77000
direct allocation
page read and write
32BD000
heap
page read and write
FF3000
unkown
page readonly
960000
unkown
page readonly
321B000
heap
page read and write
730F000
heap
page read and write
9C7E000
direct allocation
page execute read
E1D4000
direct allocation
page execute read
C4DD000
heap
page read and write
C7A5000
direct allocation
page read and write
31D6000
direct allocation
page execute read
C5E0000
heap
page read and write
9ACF000
direct allocation
page read and write
DD91000
direct allocation
page read and write
C753000
heap
page read and write
3402000
heap
page read and write
DFDD000
stack
page read and write
D5FA000
direct allocation
page execute read
989D000
direct allocation
page read and write
4F63000
direct allocation
page read and write
9B10000
direct allocation
page read and write
CE4C000
direct allocation
page execute read
C830000
unkown
page readonly
C814000
direct allocation
page execute read
832C000
stack
page read and write
AA4D000
direct allocation
page read and write
ECA3000
direct allocation
page read and write
32D0000
heap
page read and write
32B3000
heap
page read and write
C753000
heap
page read and write
CDF1000
unkown
page execute read
4F8E000
direct allocation
page execute read
4910000
heap
page execute and read and write
C4CA000
heap
page read and write
32AA000
heap
page read and write
5361000
trusted library allocation
page read and write
9371000
unkown
page execute read
3287000
heap
page read and write
CE4B000
direct allocation
page read and write
536A000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
4890000
heap
page execute and read and write
31D0000
heap
page read and write
3732000
direct allocation
page execute read
ECAC000
direct allocation
page execute read
C5BA000
heap
page read and write
7FC0000
trusted library allocation
page execute and read and write
72E7000
heap
page read and write
320000
heap
page read and write
5352000
trusted library allocation
page read and write
32BE000
heap
page read and write
5346000
trusted library allocation
page read and write
9EAC000
unkown
page readonly
3287000
heap
page read and write
313E000
stack
page read and write
32F9000
direct allocation
page read and write
C75D000
heap
page read and write
32A7000
heap
page read and write
C8A1000
unkown
page execute read
539D000
trusted library allocation
page read and write
4FA3000
direct allocation
page read and write
AA4C000
direct allocation
page execute read
32C8000
heap
page read and write
7178000
direct allocation
page read and write
9888000
direct allocation
page execute read
328C000
heap
page read and write
33D3000
heap
page read and write
2CB8000
heap
page read and write
3350000
heap
page read and write
315000
heap
page read and write
C4E5000
heap
page read and write
E1CD000
direct allocation
page read and write
731D000
heap
page read and write
32C2000
heap
page read and write
72A1000
heap
page read and write
5379000
trusted library allocation
page read and write
989F000
direct allocation
page read and write
7312000
heap
page read and write
33AC000
heap
page read and write
4EEF000
stack
page read and write
1B300000
remote allocation
page read and write
2C5A000
trusted library allocation
page execute and read and write
E2FA000
direct allocation
page execute read
9A99000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
C7BF000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
AA2A000
direct allocation
page execute read
AA46000
direct allocation
page execute read
9A90000
direct allocation
page execute read
E70B000
direct allocation
page read and write
32BF000
heap
page read and write
DED0000
direct allocation
page read and write
2CB0000
heap
page read and write
9882000
direct allocation
page execute read
327D000
heap
page read and write
E8F5000
direct allocation
page read and write
C57C000
heap
page read and write
5398000
trusted library allocation
page read and write
516F000
stack
page read and write
4710000
heap
page read and write
5347000
trusted library allocation
page read and write
333D000
heap
page read and write
989E000
direct allocation
page execute read
3289000
heap
page read and write
E2DF000
unkown
page write copy
4F32000
direct allocation
page execute read
DE52000
direct allocation
page execute read
4FCB000
direct allocation
page read and write
C496000
direct allocation
page execute read
C7F3000
direct allocation
page read and write
E8F1000
direct allocation
page read and write
2F10000
heap
page read and write
4FDB000
direct allocation
page read and write
535C000
trusted library allocation
page read and write
3290000
heap
page read and write
5277000
trusted library allocation
page read and write
E863000
direct allocation
page read and write
5395000
trusted library allocation
page read and write
E883000
direct allocation
page read and write
E1E0000
unkown
page readonly
9899000
direct allocation
page read and write
4FD2000
direct allocation
page execute read
5377000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
4EFF000
direct allocation
page read and write
C716000
heap
page read and write
CE42000
direct allocation
page execute read
C4FE000
heap
page read and write
5351000
trusted library allocation
page read and write
C7DC000
direct allocation
page execute read
33F5000
heap
page read and write
9A97000
direct allocation
page read and write
F62000
unkown
page write copy
4900000
trusted library allocation
page read and write
32BE000
heap
page read and write
4FDC000
direct allocation
page execute read
AA50000
direct allocation
page execute read
32C2000
heap
page read and write
547D000
trusted library allocation
page read and write
DE51000
direct allocation
page read and write
C55D000
heap
page read and write
D4A1000
direct allocation
page readonly
AA55000
direct allocation
page read and write
45FF000
stack
page read and write
C480000
direct allocation
page read and write
E8E0000
direct allocation
page read and write
11F4000
heap
page read and write
2C40000
trusted library allocation
page read and write
E6E7000
direct allocation
page read and write
4FAB000
direct allocation
page read and write
4FC9000
direct allocation
page read and write
33AC000
heap
page read and write
9C80000
direct allocation
page read and write
302B000
direct allocation
page execute and read and write
C8EC000
unkown
page read and write
D604000
direct allocation
page execute read
9CF1000
direct allocation
page read and write
9840000
direct allocation
page read and write
5F57000
trusted library allocation
page read and write
4FA8000
direct allocation
page execute read
535A000
trusted library allocation
page read and write
9848000
direct allocation
page read and write
4F89000
direct allocation
page read and write
E8FE000
direct allocation
page execute read
A3E1000
unkown
page execute read
2C30000
trusted library allocation
page read and write
4955000
trusted library allocation
page read and write
C81C000
direct allocation
page execute read
D5FB000
direct allocation
page read and write
32A5000
heap
page read and write
4A03000
trusted library allocation
page read and write
9AAB000
direct allocation
page read and write
A35A000
unkown
page readonly
C784000
heap
page read and write
2C33000
trusted library allocation
page execute and read and write
C75D000
heap
page read and write
C63D000
heap
page read and write
DE70000
direct allocation
page execute read
9AF3000
unkown
page write copy
4EF3000
direct allocation
page read and write
E2DD000
unkown
page read and write
3298000
heap
page read and write
336A000
heap
page read and write
C5E0000
heap
page read and write
358F000
stack
page read and write
81AE000
stack
page read and write
3288000
heap
page read and write
3394000
heap
page read and write
C7F0000
direct allocation
page execute read
2EC0000
remote allocation
page execute and read and write
3275000
heap
page read and write
9B20000
unkown
page readonly
9887000
direct allocation
page read and write
9AC7000
direct allocation
page read and write
E363000
unkown
page read and write
5341000
trusted library allocation
page read and write
8DC0000
unkown
page readonly
C4FE000
heap
page read and write
4EFC000
direct allocation
page execute read
3080000
trusted library allocation
page read and write
32C7000
heap
page read and write
4FDD000
direct allocation
page read and write
4F81000
direct allocation
page read and write
9C71000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
33E5000
heap
page read and write
5379000
trusted library allocation
page read and write
A820000
unkown
page readonly
534F000
trusted library allocation
page read and write
AA10000
unkown
page read and write
E1CE000
direct allocation
page execute read
AA43000
direct allocation
page read and write
17FF000
unkown
page read and write
D5F1000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
4F68000
direct allocation
page execute read
3736000
direct allocation
page execute read
FE4000
unkown
page readonly
32C2000
heap
page read and write
4F64000
direct allocation
page execute read
1B300000
remote allocation
page read and write
475E000
stack
page read and write
9A91000
direct allocation
page read and write
CDA0000
unkown
page readonly
5351000
trusted library allocation
page read and write
A070000
unkown
page readonly
75C0000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
DE54000
direct allocation
page execute read
5351000
trusted library allocation
page read and write
DCE5000
direct allocation
page read and write
9CF3000
direct allocation
page read and write
AA57000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
C7D1000
direct allocation
page read and write
2C50000
trusted library allocation
page read and write
9C73000
direct allocation
page read and write
D4BD000
direct allocation
page read and write
9C7A000
direct allocation
page execute read
3288000
heap
page read and write
551D000
trusted library allocation
page read and write
E705000
direct allocation
page read and write
3338000
heap
page read and write
E865000
direct allocation
page read and write
E1D9000
direct allocation
page read and write
C716000
heap
page read and write
C7A4000
direct allocation
page execute read
5346000
trusted library allocation
page read and write
C5B1000
heap
page read and write
9CD6000
direct allocation
page read and write
961000
unkown
page execute read
32AA000
heap
page read and write
2D39000
heap
page read and write
4B34000
trusted library allocation
page read and write
4895000
heap
page execute and read and write
9A9D000
direct allocation
page read and write
334D000
heap
page read and write
988E000
direct allocation
page execute read
E1B0000
direct allocation
page read and write
A045000
unkown
page write copy
C810000
direct allocation
page execute read
C505000
heap
page read and write
9C60000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
CE40000
direct allocation
page execute read
E371000
direct allocation
page read and write
536F000
trusted library allocation
page read and write
E860000
direct allocation
page execute read
535F000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
C4A0000
heap
page read and write
9AC0000
direct allocation
page execute read
5351000
trusted library allocation
page read and write
DE7C000
direct allocation
page execute read
C7DE000
direct allocation
page execute read
4FD1000
direct allocation
page read and write
9890000
direct allocation
page execute read
5171000
direct allocation
page read and write
C62E000
heap
page read and write
9893000
direct allocation
page read and write
E810000
unkown
page readonly
49A0000
trusted library allocation
page read and write
D5E4000
unkown
page write copy
3383000
heap
page read and write
C820000
direct allocation
page execute read
31D5000
direct allocation
page read and write
9AA4000
direct allocation
page execute read
E370000
direct allocation
page execute read
C7DD000
direct allocation
page read and write
E1C4000
direct allocation
page execute read
5372000
trusted library allocation
page read and write
DD32000
unkown
page readonly
E510000
direct allocation
page read and write
E86F000
direct allocation
page read and write
AA40000
direct allocation
page execute read
32BE000
heap
page read and write
C753000
heap
page read and write
D606000
direct allocation
page execute read
708E000
stack
page read and write
C7D9000
direct allocation
page read and write
31F5000
heap
page read and write
DCE3000
direct allocation
page read and write
CE47000
direct allocation
page read and write
336D000
heap
page read and write
CBE0000
unkown
page readonly
C54D000
heap
page read and write
9AA9000
direct allocation
page read and write
52E7000
direct allocation
page read and write
32A6000
heap
page read and write
AA4B000
direct allocation
page read and write
52FE000
direct allocation
page read and write
F3C000
unkown
page write copy
ECA0000
direct allocation
page execute read
E830000
direct allocation
page read and write
9AA8000
direct allocation
page execute read
534D000
trusted library allocation
page read and write
3299000
heap
page read and write
4FC3000
direct allocation
page read and write
C755000
heap
page read and write
C69D000
heap
page read and write
5358000
trusted library allocation
page read and write
328F000
heap
page read and write
DE5D000
direct allocation
page read and write
3299000
heap
page read and write
C7D5000
direct allocation
page read and write
C4C2000
heap
page read and write
32BE000
heap
page read and write
7171000
direct allocation
page read and write
AA30000
direct allocation
page read and write
9C7D000
direct allocation
page read and write
E701000
direct allocation
page read and write
E1D2000
direct allocation
page execute read
549D000
trusted library allocation
page read and write
C7DA000
direct allocation
page execute read
4F6A000
direct allocation
page execute read
9C72000
direct allocation
page execute read
14D0000
trusted library allocation
page read and write
4F8C000
direct allocation
page execute read
C4CA000
heap
page read and write
9D06000
direct allocation
page execute read
5359000
trusted library allocation
page read and write
9D0C000
direct allocation
page execute read
DF9E000
stack
page read and write
D4B5000
direct allocation
page read and write
2FAD000
stack
page read and write
780000
heap
page read and write
3299000
heap
page read and write
9ACC000
direct allocation
page execute read
E2FF000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
C7FD000
direct allocation
page read and write
AA12000
unkown
page write copy
E709000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
523F000
stack
page read and write
E6E1000
direct allocation
page read and write
2D0D000
heap
page read and write
3224000
heap
page read and write
4680000
trusted library allocation
page execute and read and write
32B6000
heap
page read and write
5386000
trusted library allocation
page read and write
CE41000
direct allocation
page read and write
32A4000
heap
page read and write
5358000
trusted library allocation
page read and write
31D9000
direct allocation
page read and write
DE75000
direct allocation
page read and write
DCEE000
direct allocation
page execute read
C4C1000
heap
page read and write
E376000
direct allocation
page execute read
C753000
heap
page read and write
3280000
heap
page read and write
D607000
direct allocation
page read and write
7CC000
stack
page read and write
4EF2000
direct allocation
page execute read
5344000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
C58C000
heap
page read and write
9889000
direct allocation
page read and write
14D0000
trusted library allocation
page read and write
3180000
heap
page read and write
D560000
unkown
page readonly
E2F5000
direct allocation
page read and write
3224000
heap
page read and write
E8B0000
unclassified section
page read and write
6B71000
direct allocation
page read and write
31D0000
direct allocation
page execute read
5361000
trusted library allocation
page read and write
2FD0000
remote allocation
page read and write
E83000
unkown
page readonly
7520000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
3289000
heap
page read and write
5360000
trusted library allocation
page read and write
4F8F000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
C81F000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
DCE8000
direct allocation
page execute read
2BF0000
heap
page read and write
E377000
direct allocation
page read and write
A840000
unkown
page readonly
AA5D000
direct allocation
page read and write
DF57000
direct allocation
page read and write
4F83000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
D24F000
stack
page read and write
C815000
direct allocation
page read and write
2C70000
heap
page read and write
C519000
heap
page read and write
5351000
trusted library allocation
page read and write
2E9B000
stack
page read and write
CE46000
direct allocation
page execute read
4F35000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
C811000
direct allocation
page read and write
9AA1000
direct allocation
page read and write
E37E000
direct allocation
page execute read
4EFD000
direct allocation
page read and write
9ACA000
direct allocation
page execute read
E6E3000
direct allocation
page read and write
539C000
trusted library allocation
page read and write
E8F6000
direct allocation
page execute read
3295000
heap
page read and write
3285000
heap
page read and write
E1CB000
direct allocation
page read and write
75B0000
trusted library allocation
page read and write
4FA5000
direct allocation
page read and write
334E000
heap
page read and write
32A4000
heap
page read and write
E1DB000
direct allocation
page read and write
320D000
direct allocation
page execute and read and write
535C000
trusted library allocation
page read and write
51AF000
stack
page read and write
DECE000
stack
page read and write
C4A2000
heap
page read and write
32C2000
heap
page read and write
535D000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
7500000
trusted library allocation
page execute and read and write
535F000
trusted library allocation
page read and write
E19E000
stack
page read and write
E2F0000
direct allocation
page execute read
3080000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
DD9D000
direct allocation
page read and write
9AC6000
direct allocation
page execute read
2AC000
stack
page read and write
535F000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
E840000
direct allocation
page execute read
4FDA000
direct allocation
page execute read
2C49000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
ECAE000
direct allocation
page execute read
4FDE000
direct allocation
page execute read
47DE000
stack
page read and write
3200000
heap
page read and write
6CDB000
stack
page read and write
5348000
trusted library allocation
page read and write
4FC6000
direct allocation
page execute read
3366000
heap
page read and write
479E000
stack
page read and write
985B000
direct allocation
page read and write
3286000
heap
page read and write
E70D000
direct allocation
page read and write
C7AA000
direct allocation
page execute read
4FA9000
direct allocation
page read and write
4F82000
direct allocation
page execute read
32B9000
heap
page read and write
3383000
heap
page read and write
4FAF000
direct allocation
page read and write
5380000
trusted library allocation
page read and write
E882000
direct allocation
page execute read
C55D000
heap
page read and write
4FA4000
direct allocation
page execute read
777000
stack
page read and write
98C0000
direct allocation
page read and write
E6E2000
direct allocation
page execute read
5357000
trusted library allocation
page read and write
E364000
unkown
page write copy
AA48000
direct allocation
page execute read
C7A1000
direct allocation
page read and write
3080000
trusted library allocation
page read and write
C81A000
direct allocation
page execute read
53A3000
trusted library allocation
page read and write
4984000
trusted library allocation
page read and write
33F1000
heap
page read and write
9CFA000
direct allocation
page execute read
97EF000
direct allocation
page readonly
11F4000
heap
page read and write
E811000
unkown
page execute read
E880000
direct allocation
page execute read
E890000
direct allocation
page execute read
9896000
direct allocation
page execute read
5350000
trusted library allocation
page read and write
710E000
stack
page read and write
C7AF000
direct allocation
page read and write
E2F3000
direct allocation
page read and write
31E7000
heap
page read and write
C4C5000
heap
page read and write
D558000
direct allocation
page readonly
C50B000
heap
page read and write
4FCD000
direct allocation
page read and write
C7A7000
direct allocation
page read and write
9A98000
direct allocation
page execute read
32A4000
heap
page read and write
E868000
direct allocation
page execute read
4FC2000
direct allocation
page execute read
3080000
trusted library allocation
page read and write
100D3000
direct allocation
page read and write
E1DE000
direct allocation
page execute read
33CA000
heap
page read and write
5372000
trusted library allocation
page read and write
E6EA000
direct allocation
page execute read
329E000
heap
page read and write
2AE5000
heap
page read and write
50AD000
stack
page read and write
C7D0000
direct allocation
page execute read
9A92000
direct allocation
page execute read
DB4E000
stack
page read and write
5361000
trusted library allocation
page read and write
463C000
stack
page read and write
2F20000
heap
page read and write
9CB6000
unkown
page readonly
A056000
direct allocation
page readonly
E6EB000
direct allocation
page read and write
32A9000
heap
page read and write
DE77000
direct allocation
page read and write
DE7E000
direct allocation
page execute read
DF5D000
direct allocation
page read and write
C60A000
heap
page read and write
331E000
heap
page read and write
9CF6000
direct allocation
page execute read
C49D000
direct allocation
page read and write
2BAE000
stack
page read and write
E2F2000
direct allocation
page execute read
DE46000
direct allocation
page readonly
D4B8000
direct allocation
page execute read
32FB000
direct allocation
page read and write
C5EC000
heap
page read and write
A03E000
unkown
page read and write
9D01000
direct allocation
page read and write
6EDB000
stack
page read and write
AA53000
direct allocation
page read and write
52CA000
direct allocation
page read and write
3737000
direct allocation
page read and write
32F7000
direct allocation
page read and write
DD41000
unkown
page execute read
C5A1000
heap
page read and write
535F000
trusted library allocation
page read and write
9CF4000
direct allocation
page execute read
9CFE000
direct allocation
page execute read
3080000
trusted library allocation
page read and write
9D02000
direct allocation
page execute read
D60C000
direct allocation
page execute read
D5F3000
direct allocation
page read and write
14D0000
trusted library allocation
page read and write
E1D8000
direct allocation
page execute read
E86A000
direct allocation
page execute read
AA4F000
direct allocation
page read and write
E2FB000
direct allocation
page read and write
D4A0000
unkown
page write copy
32F2000
direct allocation
page execute read
C5F9000
heap
page read and write
5388000
trusted library allocation
page read and write
DE60000
unkown
page readonly
2C3D000
trusted library allocation
page execute and read and write
989B000
direct allocation
page read and write
32B3000
heap
page read and write
327D000
heap
page read and write
D040000
unkown
page readonly
3352000
heap
page read and write
3734000
direct allocation
page execute read
E8F9000
direct allocation
page read and write
4F31000
direct allocation
page read and write
3240000
direct allocation
page read and write
C4E5000
heap
page read and write
D60E000
direct allocation
page execute read
33C5000
heap
page read and write
7297000
heap
page read and write
AA52000
direct allocation
page execute read
5360000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
4F70000
direct allocation
page read and write
E870000
direct allocation
page read and write
7560000
trusted library allocation
page read and write
E1D6000
direct allocation
page execute read
AA56000
direct allocation
page execute read
C8EE000
unkown
page write copy
5361000
trusted library allocation
page read and write
72C5000
heap
page read and write
ECA1000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
32A6000
heap
page read and write
C991000
unkown
page execute read
5350000
trusted library allocation
page read and write
5441000
heap
page read and write
A3E0000
unkown
page readonly
CE43000
direct allocation
page read and write
ECA6000
direct allocation
page execute read
E842000
direct allocation
page execute read
9C74000
direct allocation
page execute read
32BE000
heap
page read and write
328B000
heap
page read and write
32C7000
heap
page read and write
AA27000
direct allocation
page read and write
C5F9000
heap
page read and write
4EF9000
direct allocation
page read and write
32B3000
heap
page read and write
D49F000
unkown
page read and write
3295000
heap
page read and write
AA24000
direct allocation
page execute read
E86C000
direct allocation
page execute read
5361000
trusted library allocation
page read and write
A702000
direct allocation
page readonly
4F3F000
direct allocation
page read and write
CE49000
direct allocation
page read and write
E1CC000
direct allocation
page execute read
4FC0000
direct allocation
page execute read
7291000
heap
page read and write
FEE000
unkown
page readonly
D481000
unkown
page execute read
717A000
direct allocation
page read and write
5371000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
3720000
direct allocation
page execute read
5341000
trusted library allocation
page read and write
9A9F000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
E1C9000
direct allocation
page read and write
5949000
trusted library allocation
page read and write
9CF9000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
9D05000
direct allocation
page read and write
11F4000
heap
page read and write
DE42000
unkown
page read and write
16FE000
stack
page read and write
9A9B000
direct allocation
page read and write
9ACB000
direct allocation
page read and write
3289000
heap
page read and write
31EC000
heap
page read and write
98B0000
direct allocation
page read and write
C5B8000
heap
page read and write
4F40000
direct allocation
page read and write
3757000
heap
page read and write
7510000
trusted library allocation
page read and write
CD90000
direct allocation
page read and write
53B9000
trusted library allocation
page read and write
DEE0000
unkown
page readonly
4DF6000
trusted library allocation
page read and write
CE48000
direct allocation
page execute read
4F6C000
direct allocation
page execute read
4EF0000
direct allocation
page execute read
8D25000
unkown
page readonly
DCE4000
direct allocation
page execute read
960000
unkown
page readonly
C470000
direct allocation
page read and write
333E000
heap
page read and write
C816000
direct allocation
page execute read
D5FF000
direct allocation
page read and write
3402000
heap
page read and write
4FDF000
direct allocation
page read and write
4C51000
trusted library allocation
page read and write
E8FF000
direct allocation
page read and write
3270000
heap
page read and write
5366000
trusted library allocation
page read and write
E15F000
unkown
page read and write
14D0000
trusted library allocation
page read and write
DCD0000
direct allocation
page read and write
53A1000
trusted library allocation
page read and write
E2F8000
direct allocation
page execute read
F6B1000
direct allocation
page read and write
D555000
unkown
page write copy
4C17000
trusted library allocation
page read and write
AA54000
direct allocation
page execute read
E867000
direct allocation
page read and write
5345000
trusted library allocation
page read and write
ECAD000
direct allocation
page read and write
DCE7000
direct allocation
page read and write
30A2000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
D4B0000
direct allocation
page execute read
C7A0000
direct allocation
page execute read
5352000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
3281000
heap
page read and write
5377000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
A930000
unkown
page readonly
7288000
heap
page read and write
E8F3000
direct allocation
page read and write
E374000
direct allocation
page execute read
D60B000
direct allocation
page read and write
3275000
heap
page read and write
E500000
direct allocation
page read and write
14D0000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
AA47000
direct allocation
page read and write
E1A0000
direct allocation
page read and write
E737000
direct allocation
page readonly
9D09000
direct allocation
page read and write
310000
heap
page read and write
535F000
trusted library allocation
page read and write
4F65000
direct allocation
page read and write
33D9000
heap
page read and write
32B4000
heap
page read and write
5361000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
33CA000
heap
page read and write
DF5C000
direct allocation
page execute read
3294000
heap
page read and write
49EF000
trusted library allocation
page read and write
FE4000
unkown
page readonly
33FD000
heap
page read and write
9F1000
unkown
page execute read
3399000
heap
page read and write
14D0000
trusted library allocation
page read and write
C606000
heap
page read and write
DE7B000
direct allocation
page read and write
9898000
direct allocation
page execute read
73BE000
stack
page read and write
9A9C000
direct allocation
page execute read
9AAF000
direct allocation
page read and write
A9B1000
unkown
page execute read
DE44000
unkown
page write copy
4921000
trusted library allocation
page read and write
9884000
direct allocation
page execute read
C505000
heap
page read and write
E351000
unkown
page execute read
31D8000
direct allocation
page execute read
32BE000
heap
page read and write
324D000
direct allocation
page execute read
31EC000
heap
page read and write
DCCE000
stack
page read and write
5351000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
C4FE000
heap
page read and write
5361000
trusted library allocation
page read and write
E1D3000
direct allocation
page read and write
E2E3000
direct allocation
page readonly
E1C7000
direct allocation
page read and write
3270000
heap
page read and write
32C2000
heap
page read and write
E1D0000
direct allocation
page execute read
32FC000
direct allocation
page execute read
5398000
trusted library allocation
page read and write
FD5000
unkown
page readonly
C57C000
heap
page read and write
989C000
direct allocation
page execute read
E37B000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
D602000
direct allocation
page execute read
C818000
direct allocation
page execute read
E83000
unkown
page readonly
9EAF000
unkown
page readonly
5346000
trusted library allocation
page read and write
32FE000
direct allocation
page execute read
DE5B000
direct allocation
page read and write
32C2000
heap
page read and write
E3BD000
stack
page read and write
4F8D000
direct allocation
page read and write
3233000
direct allocation
page execute read
3394000
heap
page read and write
EAC0000
heap
page read and write
ECA8000
direct allocation
page execute read
32AA000
heap
page read and write
3372000
heap
page read and write
4F37000
direct allocation
page read and write
D5F5000
direct allocation
page read and write
9B60000
unkown
page readonly
9EE1000
unkown
page execute read
9B61000
unkown
page execute read
3286000
heap
page read and write
2B2E000
unkown
page read and write
988C000
direct allocation
page execute read
32B3000
heap
page read and write
32A3000
heap
page read and write
CD64000
unkown
page read and write
CA20000
unkown
page readonly
32FD000
direct allocation
page read and write
2C90000
trusted library allocation
page read and write
C51D000
heap
page read and write
5373000
trusted library allocation
page read and write
4FCE000
direct allocation
page execute read
D430000
unkown
page readonly
3275000
heap
page read and write
E710000
direct allocation
page read and write
D5FE000
direct allocation
page execute read
D410000
unkown
page readonly
9CFB000
direct allocation
page read and write
72EB000
heap
page read and write
9D04000
direct allocation
page execute read
C509000
heap
page read and write
75D0000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
E1D7000
direct allocation
page read and write
CE4D000
direct allocation
page read and write
D609000
direct allocation
page read and write
32A4000
heap
page read and write
331A000
heap
page read and write
CE44000
direct allocation
page execute read
5359000
trusted library allocation
page read and write
E823000
unkown
page read and write
3280000
heap
page read and write
53A5000
trusted library allocation
page read and write
51BD000
direct allocation
page read and write
C4B1000
heap
page read and write
DE80000
direct allocation
page execute read
E70F000
direct allocation
page read and write
373A000
direct allocation
page execute read
5361000
trusted library allocation
page read and write
C505000
heap
page read and write
5367000
trusted library allocation
page read and write
3285000
heap
page read and write
C618000
heap
page read and write
C4D9000
heap
page read and write
6C9D000
stack
page read and write
53B4000
trusted library allocation
page read and write
31D1000
direct allocation
page read and write
DE5A000
direct allocation
page execute read
C518000
heap
page read and write
C53D000
heap
page read and write
31DD000
direct allocation
page read and write
9AD1000
unkown
page execute read
E736000
unkown
page write copy
4AC4000
trusted library allocation
page read and write
183E000
stack
page read and write
C8F3000
direct allocation
page readonly
32A7000
heap
page read and write
5A42000
trusted library allocation
page read and write
9A9A000
direct allocation
page execute read
C819000
direct allocation
page read and write
C4F4000
heap
page read and write
DE5F000
direct allocation
page read and write
A841000
unkown
page execute read
5330000
heap
page read and write
3252000
direct allocation
page execute read
32B3000
heap
page read and write
9CD0000
direct allocation
page read and write
4FD0000
direct allocation
page execute read
4690000
trusted library allocation
page read and write
DE00000
unkown
page readonly
743E000
stack
page read and write
C900000
unkown
page readonly
46EE000
stack
page read and write
4EFC000
direct allocation
page read and write
32AA000
heap
page read and write
E350000
unkown
page readonly
9CF5000
direct allocation
page read and write
5465000
trusted library allocation
page read and write
CA0A000
unkown
page read and write
E8FA000
direct allocation
page execute read
3735000
direct allocation
page read and write
E850000
direct allocation
page read and write
32F5000
direct allocation
page read and write
9AAC000
direct allocation
page execute read
5370000
trusted library allocation
page read and write
3731000
direct allocation
page read and write
D4B9000
direct allocation
page read and write
988B000
direct allocation
page read and write
C4D7000
heap
page read and write
C4D2000
heap
page read and write
E1C2000
direct allocation
page execute read
AA5F000
direct allocation
page read and write
9D40000
unkown
page readonly
4EFE000
direct allocation
page execute read
E2FE000
direct allocation
page execute read
E1DA000
direct allocation
page execute read
2C60000
trusted library allocation
page read and write
4FC8000
direct allocation
page execute read
E6E6000
direct allocation
page execute read
714E000
stack
page read and write
8D2B000
unkown
page readonly
5361000
trusted library allocation
page read and write
AA23000
direct allocation
page read and write
33F5000
heap
page read and write
C7F9000
direct allocation
page read and write
4EAD000
stack
page read and write
9AC9000
direct allocation
page read and write
C7AB000
direct allocation
page read and write
2C65000
trusted library allocation
page execute and read and write
E37C000
direct allocation
page execute read
3362000
heap
page read and write
11F4000
heap
page read and write
E372000
direct allocation
page execute read
E862000
direct allocation
page execute read
7280000
heap
page read and write
9D08000
direct allocation
page execute read
E373000
direct allocation
page read and write
9C79000
direct allocation
page read and write
ECA9000
direct allocation
page read and write
5346000
trusted library allocation
page read and write
52B4000
direct allocation
page read and write
329F000
heap
page read and write
5374000
trusted library allocation
page read and write
9EE0000
unkown
page readonly
DDA0000
direct allocation
page read and write
D4B7000
direct allocation
page read and write
4F3A000
direct allocation
page execute read
5345000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
9D0F000
direct allocation
page read and write
33DE000
heap
page read and write
31D3000
direct allocation
page read and write
11F4000
heap
page read and write
CE45000
direct allocation
page read and write
3399000
heap
page read and write
31DE000
direct allocation
page execute read
D5F4000
direct allocation
page execute read
32C7000
heap
page read and write
FF3000
unkown
page readonly
1670000
direct allocation
page execute and read and write
31D7000
direct allocation
page read and write
E37F000
direct allocation
page read and write
C60A000
heap
page read and write
4FCA000
direct allocation
page execute read
9881000
direct allocation
page read and write
9897000
direct allocation
page read and write
9880000
direct allocation
page execute read
9C76000
direct allocation
page execute read
C508000
heap
page read and write
4EF5000
direct allocation
page read and write
323D000
direct allocation
page execute read
5388000
trusted library allocation
page read and write
D440000
unkown
page readonly
4F8B000
direct allocation
page read and write
C493000
direct allocation
page read and write
D5F9000
direct allocation
page read and write
31D2000
direct allocation
page execute read
E6A0000
unkown
page readonly
52EE000
direct allocation
page read and write
51FE000
stack
page read and write
DCE1000
direct allocation
page read and write
5390000
trusted library allocation
page read and write
3730000
direct allocation
page execute read
C990000
unkown
page readonly
5440000
heap
page read and write
9CE0000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
E378000
direct allocation
page execute read
9ACD000
direct allocation
page read and write
AA19000
direct allocation
page readonly
9CFF000
direct allocation
page read and write
3289000
heap
page read and write
D00C000
stack
page read and write
DDB0000
unkown
page readonly
C71E000
heap
page read and write
7570000
trusted library allocation
page read and write
32F4000
direct allocation
page execute read
3740000
direct allocation
page read and write
E86B000
direct allocation
page read and write
11F4000
heap
page read and write
C7F8000
direct allocation
page execute read
C577000
heap
page read and write
E86D000
direct allocation
page read and write
32F8000
direct allocation
page execute read
5341000
trusted library allocation
page read and write
D4BC000
direct allocation
page execute read
7FF0000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
4EF1000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
33E5000
heap
page read and write
D98D000
stack
page read and write
5351000
trusted library allocation
page read and write
E7CE000
stack
page read and write
D4B4000
direct allocation
page execute read
D4B3000
direct allocation
page read and write
3297000
heap
page read and write
C7D4000
direct allocation
page execute read
9CFD000
direct allocation
page read and write
8DC1000
unkown
page execute read
5346000
trusted library allocation
page read and write
AA5C000
direct allocation
page execute read
EAD0000
direct allocation
page read and write
52F4000
direct allocation
page read and write
52EA000
direct allocation
page read and write
E2F1000
direct allocation
page read and write
DB0D000
stack
page read and write
3287000
heap
page read and write
3217000
heap
page read and write
11F4000
heap
page read and write
AA41000
direct allocation
page read and write
5361000
trusted library allocation
page read and write
4EFA000
direct allocation
page execute read
5358000
trusted library allocation
page read and write
F69000
unkown
page readonly
E271000
unkown
page execute read
3280000
heap
page read and write
32BF000
heap
page read and write
D010000
unkown
page readonly
C4FE000
heap
page read and write
6D5E000
stack
page read and write
AA20000
direct allocation
page execute read
3750000
heap
page read and write
C7AE000
direct allocation
page execute read
5350000
trusted library allocation
page read and write
D041000
unkown
page execute read
D431000
unkown
page execute read
C4D1000
heap
page read and write
7FE0000
trusted library allocation
page read and write
333B000
heap
page read and write
8330000
unkown
page readonly
154C000
heap
page read and write
C716000
heap
page read and write
33AC000
heap
page read and write
E6F0000
direct allocation
page execute read
5361000
trusted library allocation
page read and write
9D00000
direct allocation
page execute read
9892000
direct allocation
page execute read
C49F000
direct allocation
page read and write
E69F000
stack
page read and write
E707000
direct allocation
page read and write
AA5E000
direct allocation
page execute read
539D000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
9AF2000
unkown
page read and write
9883000
direct allocation
page read and write
D0CE000
stack
page read and write
32C7000
heap
page read and write
5351000
trusted library allocation
page read and write
FD5000
unkown
page readonly
E6E5000
direct allocation
page read and write
A365000
unkown
page readonly
C5E7000
heap
page read and write
9CF8000
direct allocation
page execute read
4F39000
direct allocation
page read and write
C4C2000
heap
page read and write
4A29000
trusted library allocation
page read and write
DE56000
direct allocation
page execute read
4F60000
direct allocation
page execute read
C7B0000
direct allocation
page read and write
4F67000
direct allocation
page read and write
5987000
trusted library allocation
page read and write
9C70000
direct allocation
page execute read
A91B000
unkown
page read and write
7540000
trusted library allocation
page read and write
DF52000
direct allocation
page execute read
D060000
unkown
page readonly
C5C3000
heap
page read and write
14F0000
trusted library allocation
page read and write
8BC000
stack
page read and write
31CE000
stack
page read and write
C618000
heap
page read and write
ECA2000
direct allocation
page execute read
9A93000
direct allocation
page read and write
D4B2000
direct allocation
page execute read
32A9000
heap
page read and write
1620000
direct allocation
page read and write
3030000
direct allocation
page execute and read and write
4F6F000
direct allocation
page read and write
33CF000
heap
page read and write
C79C000
heap
page read and write
C7A2000
direct allocation
page execute read
E300000
unkown
page readonly
4FAE000
stack
page read and write
C4FE000
heap
page read and write
9AC4000
direct allocation
page execute read
C49E000
direct allocation
page execute read
E704000
direct allocation
page execute read
C813000
direct allocation
page read and write
2FE5000
heap
page read and write
ECB1000
direct allocation
page read and write
9CF0000
direct allocation
page execute read
E2F9000
direct allocation
page read and write
C812000
direct allocation
page execute read
C7D7000
direct allocation
page read and write
2D11000
heap
page read and write
D5E3000
unkown
page read and write
C7A9000
direct allocation
page read and write
C7F5000
direct allocation
page read and write
C4BE000
heap
page read and write
3230000
direct allocation
page read and write
D4BB000
direct allocation
page read and write
D4C0000
direct allocation
page read and write
3274000
heap
page read and write
2C20000
trusted library allocation
page read and write
E1CF000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
32F1000
direct allocation
page read and write
53A9000
trusted library allocation
page read and write
9AA3000
direct allocation
page read and write
31D4000
direct allocation
page execute read
FBC000
unkown
page write copy
457000
remote allocation
page execute and read and write
C7D6000
direct allocation
page execute read
329E000
heap
page read and write
C7FB000
direct allocation
page read and write
979D000
unkown
page read and write
9A87000
stack
page read and write
D5F0000
direct allocation
page execute read
E320000
unkown
page readonly
5361000
trusted library allocation
page read and write
C7F2000
direct allocation
page execute read
9891000
direct allocation
page read and write
3356000
heap
page read and write
DF53000
direct allocation
page read and write
D5F2000
direct allocation
page execute read
AA2F000
direct allocation
page read and write
2F50000
heap
page read and write
5361000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
3299000
heap
page read and write
9AD0000
unkown
page readonly
32C7000
heap
page read and write
32AF000
heap
page read and write
9B8C000
unkown
page write copy
DF5B000
direct allocation
page read and write
97B3000
unkown
page write copy
9D0E000
direct allocation
page execute read
9AC5000
direct allocation
page read and write
5351000
trusted library allocation
page read and write
C61E000
heap
page read and write
C64E000
heap
page read and write
53C5000
trusted library allocation
page read and write
1000000
unkown
page readonly
C499000
direct allocation
page read and write
27D0000
heap
page read and write
AA42000
direct allocation
page execute read
3295000
heap
page read and write
3224000
heap
page read and write
A9B0000
unkown
page readonly
7260000
heap
page execute and read and write
9CA8000
unkown
page readonly
14D0000
trusted library allocation
page read and write
E841000
direct allocation
page read and write
5391000
trusted library allocation
page read and write
9AC3000
direct allocation
page read and write
A6BB000
unkown
page read and write
3283000
heap
page read and write
537C000
trusted library allocation
page read and write
E1C6000
direct allocation
page execute read
990E000
stack
page read and write
5371000
trusted library allocation
page read and write
C56D000
heap
page read and write
3402000
heap
page read and write
E1D5000
direct allocation
page read and write
4F3D000
direct allocation
page read and write
FBC000
unkown
page read and write
3355000
heap
page read and write
3733000
direct allocation
page read and write
4F62000
direct allocation
page execute read
E8F8000
direct allocation
page execute read
4F36000
direct allocation
page execute read
14F0000
trusted library allocation
page read and write
AA58000
direct allocation
page execute read
3739000
direct allocation
page read and write
9C7F000
direct allocation
page read and write
9C50000
direct allocation
page read and write
C74E000
heap
page read and write
E1DD000
direct allocation
page read and write
E6E8000
direct allocation
page execute read
E365000
direct allocation
page readonly
FCD000
unkown
page read and write
D600000
direct allocation
page execute read
C49A000
direct allocation
page execute read
14D0000
trusted library allocation
page read and write
C75D000
heap
page read and write
6E1D000
stack
page read and write
A6B9000
unkown
page read and write
7580000
trusted library allocation
page read and write
E86E000
direct allocation
page execute read
3399000
heap
page read and write
4F88000
direct allocation
page execute read
3298000
heap
page read and write
5361000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
AA2D000
direct allocation
page read and write
32F3000
direct allocation
page read and write
72F6000
heap
page read and write
1520000
heap
page read and write
74FD000
stack
page read and write
E861000
direct allocation
page read and write
32F6000
direct allocation
page execute read
DF59000
direct allocation
page read and write
4FD5000
direct allocation
page read and write
329D000
heap
page read and write
DCEB000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
3244000
direct allocation
page read and write
4FD4000
direct allocation
page execute read
DE01000
unkown
page execute read
467E000
stack
page read and write
33D4000
heap
page read and write
5345000
trusted library allocation
page read and write
2E5B000
stack
page read and write
D601000
direct allocation
page read and write
9B90000
direct allocation
page read and write
C7DF000
direct allocation
page read and write
32C0000
heap
page readonly
4FA2000
direct allocation
page execute read
11F4000
heap
page read and write
2FE0000
heap
page read and write
4F3E000
direct allocation
page execute read
5348000
trusted library allocation
page read and write
DCE0000
direct allocation
page execute read
E864000
direct allocation
page execute read
C63D000
heap
page read and write
A91F000
unkown
page write copy
C518000
heap
page read and write
2CE7000
heap
page read and write
485E000
stack
page read and write
988F000
direct allocation
page read and write
C4C5000
heap
page read and write
E824000
direct allocation
page readonly
32C7000
heap
page read and write
C49B000
direct allocation
page read and write
53A3000
trusted library allocation
page read and write
32C7000
heap
page read and write
4EFB000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
C4B2000
heap
page read and write
5361000
trusted library allocation
page read and write
AA5A000
direct allocation
page execute read
5446000
trusted library allocation
page read and write
D050000
unkown
page read and write
CA0D000
unkown
page write copy
4FB0000
direct allocation
page read and write
3281000
heap
page read and write
6171000
direct allocation
page read and write
4FCF000
direct allocation
page read and write
There are 1817 hidden memdumps, click here to show them.