IOC Report
UolJwovI8c.exe

loading gif

Files

File Path
Type
Category
Malicious
UolJwovI8c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Qjsync.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ekxwihvmv
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\idrccptxisabu
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\js3250.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\nsldap32v50.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\nsldappr32v50.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\nspr4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\plc4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\plds4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\smime3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\ssl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\xpcom_compat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GZManage\xpcom_core.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{0F54F10E-6020-4B59-907E-73F350F6C1A3}\.cr\UolJwovI8c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\Trombone.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\js3250.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\nsldap32v50.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\nsldappr32v50.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\nspr4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\plc4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\plds4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\smime3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\ssl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\thunderbird.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\xpcom_compat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\xpcom_core.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\18a45226
data
dropped
C:\Users\user\AppData\Local\Temp\Amatol_20241202012405.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\b9304be
data
dropped
C:\Users\user\AppData\Local\Temp\dicxrxnwre
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Dec 2 05:24:16 2024, mtime=Mon Dec 2 05:24:16 2024, atime=Thu Nov 28 12:29:44 2024, length=8504936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\eec6af15
data
dropped
C:\Users\user\AppData\Roaming\GZManage\noubls
data
dropped
C:\Users\user\AppData\Roaming\GZManage\uwibrk
data
dropped
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (483), with CRLF line terminators
dropped
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\noubls
data
dropped
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\uwibrk
data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\Temp\{0F54F10E-6020-4B59-907E-73F350F6C1A3}\.cr\UolJwovI8c.exe
"C:\Windows\Temp\{0F54F10E-6020-4B59-907E-73F350F6C1A3}\.cr\UolJwovI8c.exe" -burn.clean.room="C:\Users\user\Desktop\UolJwovI8c.exe" -burn.filehandle.attached=684 -burn.filehandle.self=512
malicious
C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\thunderbird.exe
"C:\Windows\Temp\{F45F8542-2D1F-4FB1-B66C-A4C0420B90F3}\.ba\thunderbird.exe"
malicious
C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe
C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\Qjsync.exe
C:\Users\user\AppData\Local\Temp\Qjsync.exe
malicious
C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe
"C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe
"C:\Users\user\AppData\Roaming\GZManage\thunderbird.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\Qjsync.exe
C:\Users\user\AppData\Local\Temp\Qjsync.exe
malicious
C:\Users\user\Desktop\UolJwovI8c.exe
"C:\Users\user\Desktop\UolJwovI8c.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://amenstilo.website/courtney_ryley_cooper_biography.html?jobjbyy11iib4wpr=h3593GdmUsLiBsC%2FsjqNL9WLjcuO1JIs5YlYwsq2r0v2XtuOfeIISqlAWv5gAlx740W1uYA%2FAE%2FbB%2BPI3Lm%2FUw%3D%3D
104.21.74.149
malicious
http://home.netscape.com/NC-rdf#StatusText
unknown
http://www.vmware.com/0
unknown
http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
unknown
http://www.softwareok.com/?Freeware/Find.Same.Images.OK
unknown
http://home.netscape.com/NC-rdf#CharsetDetector
unknown
https://amenstilo.website:443H
unknown
http://home.netscape.com/NC-rdf#persist
unknown
http://home.netscape.com/NC-rdf#extension
unknown
http://www.mozilla.com0
unknown
http://home.netscape.com/NC-rdf#DownloadFlaggedMessageshttp://home.netscape.com/NC-rdf#MarkAllMessag
unknown
http://home.netscape.com/NC-rdf#PageTitleSMTP
unknown
http://home.netscape.com/NC-rdf#IsDefaultServer
unknown
http://home.netscape.com/NC-rdf#Name
unknown
http://home.netscape.com/NC-rdf#value
unknown
http://home.netscape.com/NC-rdf#Modify
unknown
http://home.netscape.com/NC-rdf#alwaysAsk
unknown
http://schemas.xmlsoap.org/soap/encoding/anyTypeFailure
unknown
http://home.netscape.com/NC-rdf#IconURL
unknown
http://home.netscape.com/NC-rdf#SpecialFolder
unknown
http://home.netscape.com/NC-rdf#CanGetIncomingMessages
unknown
http://home.netscape.com/NC-rdf#IsWriteable
unknown
http://home.netscape.com/NC-rdf#Junk
unknown
http://home.netscape.com/NC-rdf#Synchronize
unknown
http://home.netscape.com/NC-rdf#Enabledfilter;filterName=filterName=MsgBiffinserting
unknown
http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
unknown
http://home.netscape.com/NC-rdf#EmptyTrash
unknown
http://www.softwareok.de
unknown
https://amenstilo.website:443/courtney_ryley_cooper_biography.html?jobjbyy11iib4wpr=h3593GdmUsLiBsC%
unknown
http://home.netscape.com/NC-rdf#
unknown
http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
unknown
http://home.netscape.com/NC-rdf#DeleteCardshttp://home.netscape.com/NC-rdf#DirTreeNameSorthttp://hom
unknown
http://www.softwareok.com/?Download=Find.Same.Images.OK
unknown
http://home.netscape.com/NC-rdf#IEFavoriteFolder
unknown
http://crl.thawte.com/ThawtePremiumServerCA.crl0
unknown
http://home.netscape.com/NC-rdf#SupportsFilters
unknown
https://amenstilo.website/Q-
unknown
https://amenstilo.website:443
unknown
http://home.netscape.com/NC-rdf#CanSubscribe
unknown
http://home.netscape.com/NC-rdf#DeleteCards
unknown
http://home.netscape.com/NC-rdf#NoSelect
unknown
http://home.netscape.com/NC-rdf#PageTitleFakeAccount
unknown
http://home.netscape.com/NC-rdf#CanCompact
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://home.netscape.com/NC-rdf#CanCreateSubfolders
unknown
http://www.softwareok.de/?Download=Find.Same.Images.OK
unknown
http://home.netscape.com/NC-rdf#ImapShared
unknown
http://home.netscape.com/NC-rdf#FolderTreeSimpleName
unknown
http://home.netscape.com/NC-rdf#handleInternal
unknown
http://home.netscape.com/NC-rdf#InVFEditSearchScope
unknown
http://home.netscape.com/NC-rdf#TotalUnreadMessages
unknown
http://home.netscape.com/NC-rdf#Server
unknown
http://home.netscape.com/NC-rdf#IsDeferred
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://home.netscape.com/NC-rdf#Namehttp://home.netscape.com/NC-rdf#Checkedhttp://home.netscape.com/
unknown
http://home.netscape.com/NC-rdf#MarkAllMessagesRead
unknown
http://home.netscape.com/NC-rdf#description
unknown
http://home.netscape.com/NC-rdf#attribute
unknown
http://home.netscape.com/NC-rdf#Move
unknown
https://amenstilo.website/N
unknown
http://home.netscape.com/NC-rdf#CompactAll
unknown
http://home.netscape.com/NC-rdf#Content-Length
unknown
http://home.netscape.com/NC-rdf#IsSessionDefaultServerNC:smtpservershttp://home.netscape.com/NC-rdf#
unknown
http://home.netscape.com/NC-rdf#NewFolder
unknown
http://www.symauth.com/rpa00
unknown
http://home.netscape.com/NC-rdf#CopyFolder
unknown
https://amenstilo.website/A-$
unknown
https://amenstilo.website/(O
unknown
http://www.info-zip.org/
unknown
http://home.netscape.com/NC-rdf#SyncDisabled
unknown
http://home.netscape.com/NC-rdf#HasUnreadMessages
unknown
http://home.netscape.com/NC-rdf#IsMailList
unknown
http://home.netscape.com/NC-rdf#PageTitleDiskSpace
unknown
https://amenstilo.website/J
unknown
http://home.netscape.com/NC-rdf#DirName
unknown
http://home.netscape.com/NC-rdf#SubfoldersHaveUnreadMessages
unknown
http://home.netscape.com/NC-rdf#DirTreeNameSort
unknown
http://home.netscape.com/NC-rdf#PageTitle
unknown
https://amenstilo.website/F
unknown
http://home.netscape.com/NC-rdf#Subscribablehttp://home.netscape.com/NC-rdf#Subscribedhttp://home.ne
unknown
http://appsyndication.org/2006/appsyn
unknown
https://amenstilo.website/
unknown
http://home.netscape.com/NC-rdf#CanFileMessages
unknown
http://crl.thawte.com/ThawteCodeSigningCA.crl02
unknown
http://home.netscape.com/NC-rdf#CanRename
unknown
http://home.netscape.com/NC-rdf#GetNewMessages
unknown
http://home.netscape.com/NC-rdf#fileExtensions
unknown
http://home.netscape.com/NC-rdf#CanSearchMessages
unknown
http://home.netscape.com/NC-rdf#LeafName
unknown
http://home.netscape.com/NC-rdf#PageTitleMain
unknown
http://home.netscape.com/NC-rdf#PageTitleAddressing
unknown
http://home.netscape.com/NC-rdf#DownloadState
unknown
http://home.netscape.com/NC-rdf#CanCreateFoldersOnServer
unknown
http://home.netscape.com/NC-rdf#Identity
unknown
http://home.netscape.com/NC-rdf#Name?sort=true
unknown
http://home.netscape.com/NC-rdf#FolderSize
unknown
http://home.netscape.com/NC-rdf#prettyNamehttp://home.netscape.com/NC-rdf#alwaysAskhttp://home.netsc
unknown
http://home.netscape.com/NC-rdf#DownloadFlaggedMessages
unknown
http://home.netscape.com/NC-rdf#Enabled
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
amenstilo.website
104.21.74.149
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
104.21.74.149
amenstilo.website
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3460000
unkown
page read and write
malicious
3E1D000
heap
page read and write
malicious
26AB000
unkown
page read and write
malicious
517C000
trusted library allocation
page read and write
malicious
53D7000
trusted library allocation
page read and write
malicious
3EB8000
heap
page read and write
malicious
275C000
unkown
page read and write
malicious
3EA5000
heap
page read and write
malicious
3E3E000
heap
page read and write
malicious
5753000
trusted library allocation
page read and write
malicious
9350000
unkown
page read and write
2DE4000
unkown
page read and write
60351000
unkown
page execute read
37ED000
direct allocation
page read and write
29EB000
heap
page read and write
6032C000
unkown
page write copy
50E000
heap
page read and write
5CD1000
unkown
page read and write
60307000
unkown
page write copy
3C18000
unkown
page read and write
30B4000
unkown
page read and write
E30000
heap
page read and write
4F7000
heap
page read and write
401000
unkown
page execute read
FCC000
stack
page read and write
5390000
unkown
page read and write
60190000
unkown
page write copy
A3C000
unkown
page readonly
601E1000
unkown
page execute read
601D2000
unkown
page write copy
4955000
unkown
page read and write
381D000
direct allocation
page read and write
5CD1000
unkown
page read and write
4AE5000
unkown
page read and write
2DE4000
unkown
page read and write
6012F000
unkown
page readonly
30F3000
heap
page read and write
5CD1000
unkown
page read and write
4625000
unkown
page read and write
401000
unkown
page execute read
DEE000
stack
page read and write
4E2000
heap
page read and write
F6F000
stack
page read and write
2DE4000
unkown
page read and write
2DE4000
unkown
page read and write
60171000
unkown
page execute read
4C15000
unkown
page read and write
478C000
unkown
page read and write
400000
unkown
page readonly
7FC6000
direct allocation
page read and write
60293000
unkown
page readonly
400000
unkown
page readonly
2261000
heap
page read and write
3965000
trusted library allocation
page read and write
1250000
heap
page read and write
A45000
heap
page read and write
2DE4000
unkown
page read and write
2E97000
direct allocation
page read and write
29C0000
heap
page read and write
602A2000
unkown
page readonly
601E1000
unkown
page execute read
6D8F000
unkown
page read and write
600D1000
unkown
page execute read
140000000
unkown
page readonly
60171000
unkown
page execute read
6B9E000
unkown
page read and write
9340000
unkown
page read and write
DC0000
heap
page read and write
3810000
heap
page read and write
5A71000
unkown
page read and write
602A4000
unkown
page readonly
30B4000
unkown
page read and write
C70000
heap
page read and write
29A0000
unkown
page readonly
2DE4000
unkown
page read and write
794E000
stack
page read and write
396E000
trusted library allocation
page read and write
4BB5000
unkown
page read and write
3C09000
heap
page read and write
36F0000
heap
page read and write
57D000
unkown
page readonly
502D000
unkown
page read and write
602B1000
unkown
page execute read
510000
heap
page read and write
1248000
heap
page read and write
7FF6CCC21000
unkown
page read and write
6140000
direct allocation
page read and write
5CD1000
unkown
page read and write
36D4000
direct allocation
page read and write
562C000
unkown
page read and write
B9E000
unkown
page write copy
401000
unkown
page execute read
287E000
heap
page read and write
5CD1000
unkown
page read and write
5CD1000
unkown
page read and write
815000
direct allocation
page read and write
7E5000
direct allocation
page read and write
30B4000
unkown
page read and write
DBE000
stack
page read and write
603B5000
unkown
page readonly
60192000
unkown
page readonly
30B4000
unkown
page read and write
7FF6A8921000
unkown
page read and write
5CD1000
unkown
page read and write
3716000
heap
page read and write
602B0000
unkown
page readonly
960000
heap
page read and write
230F000
stack
page read and write
463D000
trusted library allocation
page read and write
30B4000
unkown
page read and write
30B4000
unkown
page read and write
2DE4000
unkown
page read and write
60370000
unkown
page readonly
4E2000
heap
page read and write
3420000
heap
page read and write
601B1000
unkown
page execute read
D64000
heap
page read and write
600D1000
unkown
page execute read
5CD1000
unkown
page read and write
4480000
trusted library allocation
page read and write
5A71000
unkown
page read and write
6428000
unkown
page read and write
30B4000
unkown
page read and write
602A0000
unkown
page readonly
60293000
unkown
page readonly
C24000
unkown
page readonly
DE8000
heap
page read and write
601D2000
unkown
page write copy
149E000
heap
page read and write
17E0000
heap
page read and write
36A0000
direct allocation
page read and write
48BE000
unkown
page read and write
2DE4000
unkown
page read and write
7D78000
unkown
page read and write
4A2E000
unkown
page read and write
3C2E000
unkown
page read and write
2DE0000
heap
page read and write
463E000
trusted library allocation
page read and write
7E3000
direct allocation
page read and write
5FA000
unkown
page write copy
60234000
unkown
page write copy
2DE4000
unkown
page read and write
5F90000
unkown
page read and write
34FE000
heap
page read and write
C24000
unkown
page readonly
4E0000
heap
page read and write
10000000
unkown
page readonly
601A3000
unkown
page readonly
29B0000
unkown
page readonly
6E11000
unkown
page read and write
2DE4000
unkown
page read and write
A40000
heap
page read and write
5A70000
unkown
page read and write
30B4000
unkown
page read and write
50B000
heap
page read and write
396C000
trusted library allocation
page read and write
9350000
unkown
page read and write
4BBE000
unkown
page read and write
463000
heap
page read and write
30B4000
unkown
page read and write
602A2000
unkown
page readonly
775B000
stack
page read and write
140000000
unkown
page readonly
63D0000
unkown
page read and write
50C000
heap
page read and write
2DE4000
unkown
page read and write
1E4000
heap
page read and write
30B4000
unkown
page read and write
3211000
heap
page read and write
60310000
unkown
page readonly
3210000
unkown
page read and write
603B5000
unkown
page readonly
30B4000
unkown
page read and write
6030C000
unkown
page readonly
2875000
heap
page read and write
47C000
heap
page read and write
4A8000
heap
page read and write
3709000
direct allocation
page read and write
10CF000
stack
page read and write
30B4000
unkown
page read and write
498D000
unkown
page read and write
5CD1000
unkown
page read and write
1468000
heap
page read and write
30B0000
heap
page read and write
30B4000
unkown
page read and write
5218000
unkown
page read and write
508000
heap
page read and write
601A4000
unkown
page write copy
2DE4000
unkown
page read and write
600D0000
unkown
page readonly
30F2000
heap
page read and write
60290000
unkown
page readonly
4FE000
heap
page read and write
600D0000
unkown
page readonly
4FA000
heap
page read and write
60328000
unkown
page readonly
6018C000
unkown
page readonly
2EFA000
stack
page read and write
30B4000
unkown
page read and write
31C0000
unkown
page read and write
DE2000
heap
page read and write
30B4000
unkown
page read and write
4D8D000
unkown
page read and write
1460000
heap
page read and write
3D00000
trusted library allocation
page read and write
3464000
unkown
page read and write
19D000
stack
page read and write
6032C000
unkown
page write copy
601CB000
unkown
page readonly
47C000
heap
page read and write
5CD1000
unkown
page read and write
60224000
unkown
page readonly
2DE4000
unkown
page read and write
1401E0000
unkown
page readonly
60171000
unkown
page execute read
D20000
heap
page read and write
1E4000
heap
page read and write
179E000
stack
page read and write
4859000
unkown
page read and write
C74000
heap
page read and write
3963000
trusted library allocation
page read and write
491000
heap
page read and write
36F0000
unkown
page read and write
30B4000
unkown
page read and write
5FD000
unkown
page readonly
619B000
unkown
page read and write
7D7B000
unkown
page read and write
5CD1000
unkown
page read and write
4E2000
heap
page read and write
2DE7000
direct allocation
page read and write
5BA2000
unkown
page read and write
C74000
heap
page read and write
60234000
unkown
page write copy
4B8E000
unkown
page read and write
2496000
heap
page read and write
603D4000
unkown
page readonly
33EF000
stack
page read and write
603D1000
unkown
page write copy
602D0000
unkown
page readonly
719F000
unkown
page read and write
4246000
heap
page read and write
7D72000
unkown
page read and write
2DE4000
unkown
page read and write
4AD000
heap
page read and write
5CD1000
unkown
page read and write
3E10000
unkown
page read and write
1401E0000
unkown
page readonly
60291000
unkown
page execute read
418F000
unkown
page read and write
590000
unkown
page readonly
60310000
unkown
page readonly
19D000
stack
page read and write
6814000
unkown
page read and write
892C000
unkown
page read and write
5E00000
unkown
page read and write
3214000
unkown
page read and write
1A0000
heap
page read and write
5EB0000
heap
page read and write
4123000
heap
page read and write
60290000
unkown
page readonly
69A7000
unkown
page read and write
30B4000
unkown
page read and write
585E000
direct allocation
page read and write
60328000
unkown
page readonly
60361000
unkown
page write copy
4DC000
heap
page read and write
510000
unkown
page readonly
60137000
unkown
page write copy
5CD1000
unkown
page read and write
5CD1000
unkown
page read and write
60170000
unkown
page readonly
3490000
heap
page read and write
5588000
unkown
page read and write
60295000
unkown
page readonly
30B4000
unkown
page read and write
47C000
heap
page read and write
2816000
heap
page read and write
491000
heap
page read and write
44F000
direct allocation
page read and write
602D1000
unkown
page execute read
5CD1000
unkown
page read and write
400000
unkown
page readonly
6018C000
unkown
page readonly
3244000
unkown
page read and write
30B4000
unkown
page read and write
C24000
unkown
page readonly
4F9000
heap
page read and write
5CD1000
unkown
page read and write
6030C000
unkown
page readonly
147C000
heap
page read and write
7FF6CCC83000
unkown
page read and write
4E2000
heap
page read and write
2DE4000
unkown
page read and write
C74000
heap
page read and write
5A1C000
unkown
page read and write
8E36000
unkown
page read and write
62A0000
unkown
page read and write
30B4000
unkown
page read and write
D64000
heap
page read and write
2CFA000
stack
page read and write
4ED000
heap
page read and write
4F4000
heap
page read and write
5820000
unkown
page read and write
57A000
unkown
page read and write
1401F4000
unkown
page readonly
461E000
trusted library allocation
page read and write
31B0000
heap
page read and write
602D1000
unkown
page execute read
9341000
unkown
page read and write
7B5E000
stack
page read and write
60371000
unkown
page execute read
57A4000
unkown
page read and write
30F0000
heap
page read and write
7D80000
unkown
page read and write
5ABE000
direct allocation
page read and write
1E4000
heap
page read and write
50B000
heap
page read and write
DB0000
unkown
page read and write
E3E000
heap
page read and write
3150000
heap
page read and write
3220000
unkown
page readonly
60310000
unkown
page readonly
225F000
stack
page read and write
23D9000
heap
page read and write
1340000
heap
page read and write
41C000
direct allocation
page read and write
3210000
direct allocation
page read and write
2BEB000
stack
page read and write
5CD1000
unkown
page read and write
2DE4000
unkown
page read and write
60BF000
stack
page read and write
505000
heap
page read and write
50C000
heap
page read and write
603D3000
unkown
page read and write
1200000
heap
page read and write
482B000
unkown
page read and write
6388000
unkown
page read and write
7FF6A8988000
unkown
page readonly
601A5000
unkown
page readonly
4E7000
heap
page read and write
10078000
unkown
page readonly
600D0000
unkown
page readonly
60234000
unkown
page write copy
698C000
unkown
page read and write
49E0000
unkown
page read and write
602D0000
unkown
page readonly
3172000
heap
page read and write
5CD1000
unkown
page read and write
60351000
unkown
page execute read
30B4000
unkown
page read and write
5998000
unkown
page read and write
6013E000
unkown
page readonly
E9E000
heap
page read and write
7EE000
direct allocation
page read and write
3967000
trusted library allocation
page read and write
C40000
heap
page read and write
60328000
unkown
page readonly
C50000
heap
page read and write
1790000
heap
page read and write
30F3000
heap
page read and write
349F000
stack
page read and write
280F000
stack
page read and write
31EF000
stack
page read and write
30B5000
unkown
page read and write
2F40000
unkown
page readonly
4A0000
heap
page read and write
14AC000
heap
page read and write
5CD1000
unkown
page read and write
4B75000
unkown
page read and write
601D4000
unkown
page readonly
30B4000
unkown
page read and write
6030C000
unkown
page readonly
5CD1000
unkown
page read and write
2DE4000
unkown
page read and write
4A70000
unkown
page read and write
45CD000
trusted library allocation
page read and write
49E1000
unkown
page read and write
FCF000
stack
page read and write
639A000
unkown
page read and write
463000
heap
page read and write
379F000
heap
page read and write
60370000
unkown
page readonly
D70000
heap
page read and write
463000
heap
page read and write
6023000
unkown
page read and write
602D0000
unkown
page readonly
6222000
unkown
page read and write
508000
heap
page read and write
400000
unkown
page readonly
3190000
heap
page read and write
5CD1000
unkown
page read and write
603D1000
unkown
page write copy
50B000
heap
page read and write
510000
unkown
page readonly
C74000
heap
page read and write
D60000
heap
page read and write
1E4000
heap
page read and write
124E000
heap
page read and write
30B4000
unkown
page read and write
37BF000
direct allocation
page read and write
5CD1000
unkown
page read and write
1E4000
heap
page read and write
2DE4000
unkown
page read and write
7D70000
unkown
page read and write
5CD1000
unkown
page read and write
5DB000
unkown
page readonly
60350000
unkown
page readonly
5CD1000
unkown
page read and write
5CD1000
unkown
page read and write
C24000
unkown
page readonly
4614000
unkown
page read and write
30B5000
unkown
page read and write
19C000
stack
page read and write
497000
heap
page read and write
5920000
direct allocation
page read and write
602B1000
unkown
page execute read
60301000
unkown
page readonly
2F46000
heap
page read and write
125D000
heap
page read and write
60224000
unkown
page readonly
5CD1000
unkown
page read and write
5FF0000
direct allocation
page read and write
601E1000
unkown
page execute read
57A000
unkown
page write copy
30B4000
unkown
page read and write
462D000
trusted library allocation
page read and write
2DE4000
unkown
page read and write
4E0000
heap
page read and write
4272000
heap
page read and write
60361000
unkown
page write copy
5CD1000
unkown
page read and write
E02000
heap
page read and write
1700000
trusted library allocation
page read and write
165E000
stack
page read and write
55B000
unkown
page readonly
3900000
trusted library allocation
page read and write
3250000
unkown
page readonly
D30000
heap
page read and write
601CB000
unkown
page readonly
124E000
heap
page read and write
E5A000
heap
page read and write
149C000
heap
page read and write
30B4000
unkown
page read and write
31B1000
heap
page read and write
2D76000
direct allocation
page read and write
60290000
unkown
page readonly
281F000
heap
page read and write
539F000
unkown
page read and write
682F000
unkown
page read and write
30B4000
unkown
page read and write
48C6000
unkown
page read and write
5CD1000
unkown
page read and write
60234000
unkown
page write copy
845000
direct allocation
page read and write
601A3000
unkown
page readonly
14AC000
heap
page read and write
1485000
heap
page read and write
5DB000
unkown
page readonly
45A9000
trusted library allocation
page read and write
60192000
unkown
page readonly
60362000
unkown
page readonly
602C8000
unkown
page readonly
8D0000
remote allocation
page read and write
3D90000
unkown
page read and write
17E9000
heap
page read and write
2E06000
direct allocation
page read and write
6040000
unkown
page read and write
30B4000
unkown
page read and write
DE0000
heap
page read and write
9C000
stack
page read and write
5CD1000
unkown
page read and write
60170000
unkown
page readonly
2DE4000
unkown
page read and write
602C8000
unkown
page readonly
1020000
unkown
page read and write
6041000
unkown
page read and write
31E6000
heap
page read and write
1E0000
heap
page read and write
36C0000
unkown
page read and write
3460000
heap
page read and write
3BA7000
unkown
page read and write
603B5000
unkown
page readonly
369F000
stack
page read and write
DEE000
stack
page read and write
60294000
unkown
page read and write
7FD8000
direct allocation
page read and write
5227000
unkown
page read and write
3730000
direct allocation
page read and write
1390000
heap
page read and write
D64000
heap
page read and write
1210000
heap
page read and write
2E2E000
unkown
page read and write
2DE4000
unkown
page read and write
5E2E000
stack
page read and write
1401F4000
unkown
page readonly
60311000
unkown
page execute read
60192000
unkown
page readonly
2BF0000
direct allocation
page read and write
4BA6000
unkown
page read and write
1E4000
heap
page read and write
7D72000
unkown
page read and write
812F000
direct allocation
page read and write
2DE4000
unkown
page read and write
5CD1000
unkown
page read and write
60371000
unkown
page execute read
808F000
direct allocation
page read and write
60311000
unkown
page execute read
5DB9000
direct allocation
page read and write
3210000
heap
page read and write
60190000
unkown
page write copy
602A1000
unkown
page execute read
36B2000
direct allocation
page read and write
1C0000
heap
page read and write
7D85000
unkown
page read and write
2DE4000
unkown
page read and write
600D0000
unkown
page readonly
785F000
stack
page read and write
3244000
unkown
page read and write
5CD1000
unkown
page read and write
3110000
heap
page read and write
50C000
heap
page read and write
602B1000
unkown
page execute read
30B4000
unkown
page read and write
603D1000
unkown
page write copy
5CD1000
unkown
page read and write
EFF000
stack
page read and write
601A3000
unkown
page readonly
30B4000
unkown
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
506000
heap
page read and write
1E4000
heap
page read and write
148000
stack
page read and write
3F99000
unkown
page read and write
42C9000
heap
page read and write
30B4000
unkown
page read and write
60307000
unkown
page write copy
5CD1000
unkown
page read and write
8097000
direct allocation
page read and write
5022000
heap
page read and write
34E0000
heap
page read and write
D50000
unkown
page read and write
30B4000
unkown
page read and write
7D7C000
unkown
page read and write
B9E000
unkown
page write copy
60238000
unkown
page readonly
3737000
heap
page read and write
427000
direct allocation
page read and write
5A2A000
unkown
page read and write
41BD000
heap
page read and write
49F0000
unkown
page read and write
6032E000
unkown
page readonly
C50000
heap
page read and write
6035B000
unkown
page readonly
601B0000
unkown
page readonly
5CD1000
unkown
page read and write
37A0000
direct allocation
page read and write
7FF6A8690000
unkown
page readonly
30B4000
unkown
page read and write
601B0000
unkown
page readonly
591000
unkown
page execute read
31DA000
heap
page read and write
3110000
heap
page read and write
6210000
unkown
page read and write
5E30000
unkown
page read and write
381B000
direct allocation
page read and write
30B4000
unkown
page read and write
134E000
stack
page read and write
7B6B000
stack
page read and write
601A1000
unkown
page execute read
30B0000
heap
page read and write
42E0000
heap
page read and write
407000
direct allocation
page read and write
602C2000
unkown
page readonly
809F000
direct allocation
page read and write
497000
heap
page read and write
1401F4000
unkown
page readonly
2FEA000
stack
page read and write
508000
heap
page read and write
4B2E000
unkown
page read and write
60310000
unkown
page readonly
5616000
unkown
page read and write
3968000
trusted library allocation
page read and write
5CD0000
unkown
page read and write
60301000
unkown
page readonly
4392000
unkown
page read and write
7D82000
unkown
page read and write
602D0000
unkown
page readonly
3254000
heap
page read and write
401000
unkown
page execute read
414F000
heap
page read and write
2DE4000
unkown
page read and write
5CD1000
unkown
page read and write
6A1C000
unkown
page read and write
2DE4000
unkown
page read and write
601B0000
unkown
page readonly
603D4000
unkown
page readonly
463000
heap
page read and write
4FA3000
unkown
page read and write
5197000
unkown
page read and write
7FF6A8691000
unkown
page execute read
30B4000
unkown
page read and write
60171000
unkown
page execute read
2880000
heap
page read and write
60361000
unkown
page write copy
9C000
stack
page read and write
1E4000
heap
page read and write
2EF0000
heap
page read and write
5CD1000
unkown
page read and write
2DE4000
unkown
page read and write
6018C000
unkown
page readonly
5CD1000
unkown
page read and write
1008F000
unkown
page readonly
5CD1000
unkown
page read and write
149C000
heap
page read and write
5CD1000
unkown
page read and write
506000
heap
page read and write
D64000
heap
page read and write
2DE4000
unkown
page read and write
3380000
heap
page read and write
5CD1000
unkown
page read and write
D64000
heap
page read and write
7FF6CC990000
unkown
page readonly
8067000
direct allocation
page read and write
3BF8000
heap
page read and write
601A0000
unkown
page readonly
2DE4000
unkown
page read and write
140001000
unkown
page execute read
30F3000
heap
page read and write
60170000
unkown
page readonly
7DE000
stack
page read and write
2DE4000
unkown
page read and write
5CD1000
unkown
page read and write
338C000
heap
page read and write
14AC000
heap
page read and write
602A0000
unkown
page readonly
60350000
unkown
page readonly
601A5000
unkown
page readonly
4FA000
heap
page read and write
5CD1000
unkown
page read and write
2DE4000
unkown
page read and write
3960000
trusted library allocation
page read and write
600D1000
unkown
page execute read
5A49000
direct allocation
page read and write
E60000
heap
page read and write
30B4000
unkown
page read and write
108C000
stack
page read and write
3DA6000
unkown
page read and write
60301000
unkown
page readonly
602D1000
unkown
page execute read
84A000
direct allocation
page read and write
5CD1000
unkown
page read and write
140156000
unkown
page readonly
603B5000
unkown
page readonly
295C000
stack
page read and write
140000000
unkown
page readonly
DA0000
heap
page read and write
5CD1000
unkown
page read and write
30B4000
unkown
page read and write
3090000
heap
page read and write
31EF000
unkown
page read and write
C24000
unkown
page readonly
2F50000
heap
page read and write
401000
unkown
page execute read
324C000
heap
page read and write
5C1D000
unkown
page read and write
30F2000
heap
page read and write
2DE4000
unkown
page read and write
E3A000
heap
page read and write
3550000
heap
page read and write
7D7B000
unkown
page read and write
7FF6CCBF5000
unkown
page read and write
6013E000
unkown
page readonly
140000000
unkown
page readonly
140001000
unkown
page execute read
10089000
unkown
page write copy
1218000
heap
page read and write
60307000
unkown
page write copy
329C000
heap
page read and write
401000
unkown
page execute read
491000
heap
page read and write
5BED000
unkown
page read and write
5DBD000
direct allocation
page read and write
36BF000
unkown
page read and write
3800000
direct allocation
page read and write
601A0000
unkown
page readonly
60307000
unkown
page write copy
86E0000
unkown
page read and write
6032E000
unkown
page readonly
4639000
trusted library allocation
page read and write
1401C7000
unkown
page readonly
602C8000
unkown
page readonly
60295000
unkown
page readonly
5CD1000
unkown
page read and write
2EEC000
stack
page read and write
601E0000
unkown
page readonly
231E000
heap
page read and write
17A0000
heap
page read and write
5A4D000
direct allocation
page read and write
5424000
unkown
page read and write
4AC000
heap
page read and write
7FF6CCC88000
unkown
page readonly
3F88000
unkown
page read and write
60350000
unkown
page readonly
3C1C000
heap
page read and write
3240000
heap
page read and write
506000
heap
page read and write
831000
direct allocation
page read and write
A3C000
unkown
page readonly
7960000
remote allocation
page read and write
6E23000
unkown
page read and write
30B4000
unkown
page read and write
3B81000
heap
page read and write
601A1000
unkown
page execute read
602C7000
unkown
page write copy
5A71000
unkown
page read and write
501F000
unkown
page read and write
60311000
unkown
page execute read
6189000
unkown
page read and write
30B4000
unkown
page read and write
A3C000
unkown
page readonly
601A0000
unkown
page readonly
31BE000
unkown
page read and write
41A6000
heap
page read and write
30B4000
unkown
page read and write
7480000
unkown
page read and write
2DE4000
unkown
page read and write
30B4000
unkown
page read and write
401000
unkown
page execute read
C74000
heap
page read and write
30B4000
unkown
page read and write
2877000
heap
page read and write
1740000
unkown
page read and write
7E7000
direct allocation
page read and write
60350000
unkown
page readonly
5CD1000
unkown
page read and write
4E2B000
unkown
page read and write
8D0000
remote allocation
page read and write
65A0000
unkown
page read and write
D64000
heap
page read and write
509000
heap
page read and write
6C17000
unkown
page read and write
5CD1000
unkown
page read and write
1970000
heap
page read and write
51F000
heap
page read and write
30B4000
unkown
page read and write
60361000
unkown
page write copy
4E0000
heap
page read and write
30B4000
unkown
page read and write
601D4000
unkown
page readonly
2D62000
direct allocation
page read and write
5A80000
unkown
page read and write
459E000
unkown
page read and write
C24000
unkown
page readonly
14AB000
heap
page read and write
60FE000
stack
page read and write
36F4000
unkown
page read and write
A3C000
unkown
page readonly
7FF6CC991000
unkown
page execute read
1401C7000
unkown
page readonly
4F7000
heap
page read and write
4FA000
heap
page read and write
602C7000
unkown
page write copy
446000
direct allocation
page read and write
4029000
unkown
page read and write
31F0000
unkown
page read and write
4815000
unkown
page read and write
1496000
heap
page read and write
3BA2000
heap
page read and write
B9E000
unkown
page write copy
3244000
unkown
page read and write
A30000
unkown
page read and write
7D75000
unkown
page read and write
30B4000
unkown
page read and write
7FF6A898A000
unkown
page read and write
4D3000
heap
page read and write
5410000
unkown
page read and write
4F4000
heap
page read and write
602A2000
unkown
page readonly
44A0000
trusted library allocation
page read and write
6011000
unkown
page read and write
601B1000
unkown
page execute read
41A1000
unkown
page read and write
4A60000
unkown
page read and write
3440000
trusted library allocation
page read and write
2DE4000
unkown
page read and write
30B4000
unkown
page read and write
7FDF000
direct allocation
page read and write
D8E000
stack
page read and write
4D9D000
unkown
page read and write
3210000
heap
page read and write
60294000
unkown
page read and write
166E000
stack
page read and write
29D0000
unkown
page read and write
2DE4000
unkown
page read and write
30B4000
unkown
page read and write
50E000
heap
page read and write
5145000
heap
page read and write
5E2E000
direct allocation
page read and write
603D3000
unkown
page read and write
3510000
heap
page read and write
27EB000
heap
page read and write
6A26000
unkown
page read and write
601A0000
unkown
page readonly
343F000
unkown
page read and write
140001000
unkown
page execute read
30B4000
unkown
page read and write
86DD000
stack
page read and write
3810000
unkown
page read and write
603D3000
unkown
page read and write
3790000
heap
page execute read
309F000
stack
page read and write
86F000
stack
page read and write
7D5B000
stack
page read and write
5CD1000
unkown
page read and write
7D7A000
unkown
page read and write
A3C000
unkown
page readonly
306E000
unkown
page read and write
50A000
heap
page read and write
482000
heap
page read and write
C74000
heap
page read and write
2F30000
unkown
page readonly
4C25000
unkown
page read and write
4DD1000
heap
page read and write
3964000
trusted library allocation
page read and write
405000
direct allocation
page read and write
400000
unkown
page readonly
601A3000
unkown
page readonly
60238000
unkown
page readonly
3795000
heap
page read and write
5CD1000
unkown
page read and write
449000
heap
page read and write
60293000
unkown
page readonly
578E000
unkown
page read and write
57D000
unkown
page readonly
396B000
trusted library allocation
page read and write
1E4000
heap
page read and write
396D000
trusted library allocation
page read and write
29F0000
direct allocation
page read and write
331B000
heap
page read and write
602A0000
unkown
page readonly
602C7000
unkown
page write copy
5812000
unkown
page read and write
17D0000
heap
page read and write
1C0000
heap
page read and write
40E000
direct allocation
page read and write
60137000
unkown
page write copy
6032E000
unkown
page readonly
60190000
unkown
page write copy
497000
heap
page read and write
5FBF000
unkown
page read and write
7027000
unkown
page read and write
10001000
unkown
page execute read
5C26000
unkown
page read and write
5CD1000
unkown
page read and write
602A1000
unkown
page execute read
156E000
stack
page read and write
6013E000
unkown
page readonly
4E19000
unkown
page read and write
5CD1000
unkown
page read and write
679F000
unkown
page read and write
30B4000
unkown
page read and write
60293000
unkown
page readonly
1401F4000
unkown
page readonly
46AE000
trusted library allocation
page read and write
602A4000
unkown
page readonly
602D1000
unkown
page execute read
3810000
heap
page read and write
601D4000
unkown
page readonly
3590000
heap
page read and write
101F000
stack
page read and write
8D0000
remote allocation
page read and write
5CD1000
unkown
page read and write
60370000
unkown
page readonly
30AE000
unkown
page read and write
5FD000
unkown
page readonly
30B4000
unkown
page read and write
602A1000
unkown
page execute read
E9A000
heap
page read and write
6030C000
unkown
page readonly
398D000
unkown
page read and write
2DE4000
unkown
page read and write
3244000
unkown
page read and write
F1F000
stack
page read and write
140156000
unkown
page readonly
6619000
unkown
page read and write
1E4000
heap
page read and write
469E000
trusted library allocation
page read and write
3244000
unkown
page read and write
602B0000
unkown
page readonly
61FF000
stack
page read and write
5CD1000
unkown
page read and write
3A2F000
unkown
page read and write
601CB000
unkown
page readonly
4EF4000
heap
page read and write
601D2000
unkown
page write copy
6012F000
unkown
page readonly
5CD1000
unkown
page read and write
3961000
trusted library allocation
page read and write
7FF6A891E000
unkown
page read and write
60362000
unkown
page readonly
602A4000
unkown
page readonly
2CA0000
direct allocation
page read and write
4FA000
heap
page read and write
30B4000
unkown
page read and write
60291000
unkown
page execute read
3815000
unkown
page read and write
1E4000
heap
page read and write
5CD1000
unkown
page read and write
5CD1000
unkown
page read and write
6C2F000
unkown
page read and write
601CB000
unkown
page readonly
602A2000
unkown
page readonly
3BD7000
heap
page read and write
2DE4000
unkown
page read and write
602A4000
unkown
page readonly
30B4000
unkown
page read and write
4510000
trusted library allocation
page read and write
3244000
unkown
page read and write
30B4000
unkown
page read and write
2F20000
unkown
page readonly
140156000
unkown
page readonly
5E9E000
stack
page read and write
C40000
heap
page read and write
50D000
heap
page read and write
7960000
remote allocation
page read and write
602C2000
unkown
page readonly
4FD000
heap
page read and write
601A4000
unkown
page write copy
60301000
unkown
page readonly
4E0000
heap
page read and write
17E6000
heap
page read and write
38BB000
heap
page read and write
400000
unkown
page readonly
3260000
heap
page read and write
601E0000
unkown
page readonly
30B4000
unkown
page read and write
602C2000
unkown
page readonly
57ED000
direct allocation
page read and write
30B4000
unkown
page read and write
55B000
unkown
page readonly
4FA000
heap
page read and write
D7E000
stack
page read and write
1E4000
heap
page read and write
60238000
unkown
page readonly
602A0000
unkown
page readonly
5CD1000
unkown
page read and write
5B94000
unkown
page read and write
601E0000
unkown
page readonly
603D3000
unkown
page read and write
400000
unkown
page readonly
601B0000
unkown
page readonly
B9E000
unkown
page write copy
3962000
trusted library allocation
page read and write
3171000
heap
page read and write
60137000
unkown
page write copy
6F9B000
unkown
page read and write
30B4000
unkown
page read and write
60290000
unkown
page readonly
565000
heap
page read and write
60294000
unkown
page read and write
401000
unkown
page execute read
7FF6CCC07000
unkown
page readonly
C74000
heap
page read and write
7FF6CCC1E000
unkown
page read and write
7A5D000
stack
page read and write
3240000
heap
page read and write
B9E000
unkown
page write copy
6013E000
unkown
page readonly
30F3000
heap
page read and write
1401A9000
unkown
page write copy
38F0000
heap
page read and write
5CD1000
unkown
page read and write
30B4000
unkown
page read and write
35EF000
stack
page read and write
603D4000
unkown
page readonly
6041000
unkown
page read and write
2DE4000
unkown
page read and write
355E000
heap
page read and write
148000
stack
page read and write
50B000
heap
page read and write
5CD1000
unkown
page read and write
482000
heap
page read and write
30B4000
unkown
page read and write
125D000
heap
page read and write
3969000
trusted library allocation
page read and write
B9E000
unkown
page write copy
3A1E000
stack
page read and write
60192000
unkown
page readonly
30B4000
unkown
page read and write
30ED000
unkown
page read and write
5CD1000
unkown
page read and write
7FF6A88F5000
unkown
page read and write
4FE000
heap
page read and write
602B0000
unkown
page readonly
2E6E000
unkown
page read and write
3B89000
unkown
page read and write
403000
direct allocation
page read and write
45F000
heap
page read and write
2DE4000
unkown
page read and write
598A000
unkown
page read and write
5133000
trusted library allocation
page read and write
51A5000
unkown
page read and write
7FBF000
stack
page read and write
4EC000
heap
page read and write
30B4000
unkown
page read and write
2E26000
direct allocation
page read and write
3464000
unkown
page read and write
5CD1000
unkown
page read and write
5CD1000
unkown
page read and write
C24000
unkown
page readonly
2DE4000
unkown
page read and write
5CEE000
unkown
page read and write
441000
direct allocation
page read and write
538E000
trusted library allocation
page read and write
4017000
unkown
page read and write
30B4000
unkown
page read and write
34FC000
heap
page read and write
1E0000
heap
page read and write
602C8000
unkown
page readonly
6DA7000
unkown
page read and write
601A4000
unkown
page write copy
8018000
direct allocation
page read and write
396A000
trusted library allocation
page read and write
602B0000
unkown
page readonly
30B4000
unkown
page read and write
4F3000
heap
page read and write
60294000
unkown
page read and write
601D4000
unkown
page readonly
601A5000
unkown
page readonly
138E000
stack
page read and write
2DE4000
unkown
page read and write
60224000
unkown
page readonly
A3C000
unkown
page readonly
4592000
unkown
page read and write
30B4000
unkown
page read and write
2DE4000
unkown
page read and write
329F000
stack
page read and write
602B1000
unkown
page execute read
B9E000
unkown
page write copy
C74000
heap
page read and write
30B4000
unkown
page read and write
601B1000
unkown
page execute read
30B4000
unkown
page read and write
1E4000
heap
page read and write
60371000
unkown
page execute read
7FC0000
direct allocation
page read and write
5E5E000
unkown
page read and write
601A1000
unkown
page execute read
190000
heap
page read and write
2E12000
direct allocation
page read and write
3440000
unkown
page read and write
5CD1000
unkown
page read and write
30B4000
unkown
page read and write
355C000
heap
page read and write
149E000
heap
page read and write
421A000
unkown
page read and write
D64000
heap
page read and write
5E18000
unkown
page read and write
D6E000
stack
page read and write
491000
heap
page read and write
591000
unkown
page execute read
60362000
unkown
page readonly
2DE4000
unkown
page read and write
2DE4000
unkown
page read and write
4E0000
heap
page read and write
27F4000
heap
page read and write
29E0000
heap
page read and write
602C7000
unkown
page write copy
50B000
heap
page read and write
E90000
heap
page read and write
6032E000
unkown
page readonly
16E8000
stack
page read and write
4AD000
heap
page read and write
6791000
unkown
page read and write
60351000
unkown
page execute read
5CD1000
unkown
page read and write
559C000
unkown
page read and write
4854000
unkown
page read and write
1496000
heap
page read and write
30B4000
unkown
page read and write
3211000
heap
page read and write
5FA000
unkown
page read and write
479D000
unkown
page read and write
5CD1000
unkown
page read and write
F3E000
stack
page read and write
11F0000
heap
page read and write
5FCF000
stack
page read and write
5CD1000
unkown
page read and write
6591000
unkown
page read and write
60291000
unkown
page execute read
8920000
unkown
page read and write
31D0000
heap
page read and write
DA0000
heap
page read and write
1750000
heap
page read and write
30B4000
unkown
page read and write
5CD1000
unkown
page read and write
60238000
unkown
page readonly
57E9000
direct allocation
page read and write
DC8000
heap
page read and write
34F0000
heap
page read and write
5CD1000
unkown
page read and write
3E21000
unkown
page read and write
30B4000
unkown
page read and write
3A11000
unkown
page read and write
807000
direct allocation
page read and write
3C5F000
heap
page read and write
7FC000
direct allocation
page read and write
7D60000
unkown
page read and write
601A5000
unkown
page readonly
60351000
unkown
page execute read
315B000
heap
page read and write
601E1000
unkown
page execute read
60137000
unkown
page write copy
1401A9000
unkown
page write copy
3244000
unkown
page read and write
A3C000
unkown
page readonly
4629000
trusted library allocation
page read and write
3211000
heap
page read and write
60362000
unkown
page readonly
4832000
unkown
page read and write
3244000
unkown
page read and write
5D2D000
stack
page read and write
4228000
unkown
page read and write
4A16000
unkown
page read and write
5CD1000
unkown
page read and write
410000
heap
page read and write
1250000
heap
page read and write
602A1000
unkown
page execute read
145E000
stack
page read and write
30B4000
unkown
page read and write
964000
heap
page read and write
4E0000
heap
page read and write
6419000
unkown
page read and write
56C0000
direct allocation
page read and write
5D9E000
unkown
page read and write
2DE4000
unkown
page read and write
B9E000
unkown
page write copy
601A1000
unkown
page execute read
5CD1000
unkown
page read and write
1E4000
heap
page read and write
30B5000
unkown
page read and write
147E000
heap
page read and write
45F000
heap
page read and write
49A3000
unkown
page read and write
1008A000
unkown
page read and write
6032C000
unkown
page write copy
6627000
unkown
page read and write
603D4000
unkown
page readonly
6012F000
unkown
page readonly
5CD1000
unkown
page read and write
6035B000
unkown
page readonly
1E4000
heap
page read and write
5CD1000
unkown
page read and write
5F98000
unkown
page read and write
60291000
unkown
page execute read
30B4000
unkown
page read and write
416000
heap
page read and write
2EFC000
heap
page read and write
36F4000
unkown
page read and write
774B000
stack
page read and write
60311000
unkown
page execute read
511000
unkown
page execute read
6018C000
unkown
page readonly
3230000
unkown
page readonly
3191000
heap
page read and write
601E0000
unkown
page readonly
118B000
stack
page read and write
6035B000
unkown
page readonly
1401A9000
unkown
page write copy
DAE000
stack
page read and write
2713000
unkown
page read and write
401000
unkown
page execute read
505000
heap
page read and write
5CD1000
unkown
page read and write
30F3000
heap
page read and write
3244000
unkown
page read and write
D64000
heap
page read and write
54CC000
heap
page read and write
36F0000
heap
page read and write
60295000
unkown
page readonly
140001000
unkown
page execute read
33CC000
stack
page read and write
5D95000
unkown
page read and write
5ECE000
stack
page read and write
2990000
unkown
page readonly
45C9000
trusted library allocation
page read and write
60370000
unkown
page readonly
2662000
unkown
page read and write
7FF6CCC8A000
unkown
page read and write
441A000
unkown
page read and write
7960000
remote allocation
page read and write
A3C000
unkown
page readonly
43A0000
unkown
page read and write
601D2000
unkown
page write copy
30B4000
unkown
page read and write
5CD1000
unkown
page read and write
4F9000
heap
page read and write
2DE4000
unkown
page read and write
5CD1000
unkown
page read and write
6035B000
unkown
page readonly
337E000
unkown
page read and write
140156000
unkown
page readonly
6B94000
unkown
page read and write
60170000
unkown
page readonly
400000
unkown
page readonly
1401E0000
unkown
page readonly
35BE000
unkown
page read and write
3211000
heap
page read and write
10C0000
heap
page read and write
38B0000
heap
page read and write
36A0000
heap
page read and write
601A4000
unkown
page write copy
3150000
heap
page read and write
5CD1000
unkown
page read and write
30B4000
unkown
page read and write
7FF6A8907000
unkown
page readonly
60224000
unkown
page readonly
600D1000
unkown
page execute read
401000
unkown
page execute read
12FB000
stack
page read and write
3450000
unkown
page read and write
1A0000
heap
page read and write
1401A9000
unkown
page write copy
6F89000
unkown
page read and write
60371000
unkown
page execute read
2FEF000
stack
page read and write
4426000
unkown
page read and write
60328000
unkown
page readonly
1E4000
heap
page read and write
2DE4000
unkown
page read and write
1E4000
heap
page read and write
EBA000
heap
page read and write
3800000
heap
page execute read
497000
heap
page read and write
603D1000
unkown
page write copy
4F91000
unkown
page read and write
30B4000
unkown
page read and write
2F05000
heap
page read and write
30B4000
unkown
page read and write
148C000
heap
page read and write
7FF6A8984000
unkown
page read and write
149C000
heap
page read and write
3C72000
heap
page read and write
60295000
unkown
page readonly
103F000
stack
page read and write
41C000
heap
page read and write
1401C7000
unkown
page readonly
37EE000
stack
page read and write
4F7000
heap
page read and write
32BD000
heap
page read and write
30F3000
heap
page read and write
401000
unkown
page execute read
1401C7000
unkown
page readonly
1401E0000
unkown
page readonly
2DE4000
unkown
page read and write
1237000
heap
page read and write
1E4000
heap
page read and write
5CD1000
unkown
page read and write
4F4000
heap
page read and write
30B4000
unkown
page read and write
5C90000
direct allocation
page read and write
6012F000
unkown
page readonly
53A9000
heap
page read and write
754D000
stack
page read and write
502000
heap
page read and write
169D000
stack
page read and write
563000
heap
page read and write
1320000
heap
page read and write
7D66000
unkown
page read and write
9C000
stack
page read and write
45AD000
trusted library allocation
page read and write
601B1000
unkown
page execute read
6032C000
unkown
page write copy
5CD1000
unkown
page read and write
7EB0000
heap
page read and write
8088000
direct allocation
page read and write
4B6C000
unkown
page read and write
3214000
unkown
page read and write
48CD000
unkown
page read and write
47F000
heap
page read and write
401000
unkown
page execute read
3244000
unkown
page read and write
570A000
trusted library allocation
page read and write
511000
unkown
page execute read
190000
heap
page read and write
5CD1000
unkown
page read and write
30B4000
unkown
page read and write
7D7B000
unkown
page read and write
784F000
stack
page read and write
30D0000
heap
page read and write
357F000
unkown
page read and write
60190000
unkown
page write copy
4FA000
heap
page read and write
950000
unkown
page read and write
3191000
heap
page read and write
5E20000
unkown
page read and write
2D56000
direct allocation
page read and write
4500000
trusted library allocation
page read and write
C24000
unkown
page readonly
4E2000
heap
page read and write
3313000
heap
page read and write
30B4000
unkown
page read and write
590000
unkown
page readonly
602C2000
unkown
page readonly
C50000
heap
page read and write
3966000
trusted library allocation
page read and write
There are 1297 hidden memdumps, click here to show them.