IOC Report
rN9D2S747U.txt

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
rN9D2S747U.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\4B397a.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\P3z54.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\3G94w.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\x7W52.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\1L26f6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\2k1905.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rN9D2S747U.exe
"C:\Users\user\Desktop\rN9D2S747U.exe"
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\P3z54.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\P3z54.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\x7W52.exe
C:\Users\user\AppData\Local\Temp\IXP001.TMP\x7W52.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\1L26f6.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\1L26f6.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\2k1905.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\2k1905.exe
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\3G94w.exe
C:\Users\user\AppData\Local\Temp\IXP001.TMP\3G94w.exe
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\"
malicious

URLs

Name
IP
Malicious
https://steamcommunity.com/my/wishlist/
unknown
http://127.0.0.1:27
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://player.vimeo.com
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=xihOpMrg
unknown
https://checkout.steampowere
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
https://steamloopback.host
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://debonairnukk.xyz:443/api
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=Eq36AUaEgab8&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=9RV1KkrS040q&l=english&_c
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=J1-T6FXbrr0Z&a
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=cMt-H-zOgNUp&l=english&am
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=PCCoCNLxwF4M&am
unknown
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://checkout.steamp
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://store.steampowered.com/legal/
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/steam_share_image.jpg
unknown
https://awake-weaves.cyou:443/api
unknown
https://community.fastly.steamstatic.com/
unknown
https://steam.tv/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://steamcommunity.com/profiles/76561199724331900
23.204.10.89
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=ewPC
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
unknown
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://rec./
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://wrathful-jammy.cyou:443/api
unknown
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.google.c
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://www.gstatic.cn/recaptch
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://cdn.fa
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
unknown
https://diffuculttan.xyz:443/api
unknown
https://help.steampowered.com/
unknown
https://sordid-snaked.cyou:443/apiC
unknown
https://api.steampowered.com/
unknown
http://127.0.0.1:27/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;X-Frame-OptionsSAMEORIGINPersistent-AuthWWW-AuthenticateVarysteamCou
unknown
https://tacitglibbr.biz:443/api
unknown
https://store.steampowered.com/;
unknown
https://steambroadcast.akamai
unknown
https://store.steampowered.com/about/
unknown
https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
unknown
There are 86 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
diffuculttan.xyz
unknown
malicious
effecterectz.xyz
unknown
malicious
tacitglibbr.biz
unknown
malicious
immureprech.biz
unknown
malicious
deafeninggeh.biz
unknown
malicious
debonairnukk.xyz
unknown
malicious
steamcommunity.com
23.204.10.89
sordid-snaked.cyou
unknown
awake-weaves.cyou
unknown
wrathful-jammy.cyou
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
23.204.10.89
steamcommunity.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup2

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1A1000
unkown
page execute and read and write
malicious
771000
unkown
page execute and read and write
malicious
A61000
unkown
page execute and read and write
malicious
4E50000
direct allocation
page read and write
malicious
4F60000
direct allocation
page read and write
malicious
771000
unkown
page execute and read and write
malicious
4FF0000
direct allocation
page read and write
malicious
4A30000
direct allocation
page read and write
malicious
99C000
unkown
page execute and read and write
369F000
stack
page read and write
3B6E000
stack
page read and write
51F4000
heap
page read and write
6CFC000
stack
page read and write
6A8E000
heap
page read and write
307E000
stack
page read and write
3E9E000
stack
page read and write
967000
unkown
page execute and read and write
13E2000
heap
page read and write
133E000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
A63000
unkown
page execute and write copy
352E000
stack
page read and write
492E000
stack
page read and write
4FB0000
trusted library allocation
page read and write
419000
unkown
page execute and read and write
5AC000
unkown
page execute and write copy
2EEE000
stack
page read and write
4B70000
heap
page read and write
4930000
direct allocation
page execute and read and write
810000
heap
page read and write
4360000
heap
page read and write
1660000
direct allocation
page read and write
10A4000
heap
page read and write
2CDE000
stack
page read and write
45DF000
stack
page read and write
4AE1000
heap
page read and write
A26000
unkown
page execute and read and write
4AF2000
heap
page read and write
367F000
stack
page read and write
770000
unkown
page read and write
10FD000
stack
page read and write
1660000
direct allocation
page read and write
7D9000
unkown
page write copy
4BD0000
direct allocation
page execute and read and write
4321000
heap
page read and write
34C000
unkown
page readonly
1638B7C0000
heap
page read and write
C8A000
unkown
page readonly
C30000
heap
page read and write
5160000
direct allocation
page execute and read and write
A40000
unkown
page execute and read and write
4AE1000
heap
page read and write
1A1000
unkown
page execute and write copy
12A4000
heap
page read and write
897C000
stack
page read and write
C40000
direct allocation
page read and write
C40000
direct allocation
page read and write
49B0000
direct allocation
page read and write
DB4000
heap
page read and write
1E6951C000
stack
page read and write
40BE000
stack
page read and write
13BE000
stack
page read and write
4AE1000
heap
page read and write
12A4000
heap
page read and write
173000
unkown
page execute and read and write
5040000
direct allocation
page execute and read and write
3A9E000
stack
page read and write
4AE1000
heap
page read and write
27DE000
stack
page read and write
6760000
heap
page read and write
345F000
stack
page read and write
4AE1000
heap
page read and write
9DD000
unkown
page execute and read and write
4AE1000
heap
page read and write
A87000
unkown
page execute and write copy
2F3E000
stack
page read and write
D76000
unkown
page execute and write copy
8AE000
stack
page read and write
421F000
stack
page read and write
131000
unkown
page execute and write copy
52FF000
stack
page read and write
2BFD000
stack
page read and write
956000
heap
page read and write
11F5000
heap
page read and write
D60000
unkown
page execute and write copy
2B1C000
stack
page read and write
B3E000
stack
page read and write
AC2000
unkown
page execute and read and write
9DD000
unkown
page execute and read and write
CBB000
heap
page read and write
F50000
direct allocation
page read and write
F70000
heap
page read and write
771000
unkown
page execute and write copy
11E0000
direct allocation
page read and write
49B0000
direct allocation
page read and write
341000
unkown
page execute read
4F50000
remote allocation
page read and write
569000
unkown
page execute and read and write
3540000
heap
page read and write
D10000
heap
page read and write
F50000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
395E000
stack
page read and write
930000
heap
page read and write
4AE1000
heap
page read and write
137E000
stack
page read and write
2E9C000
stack
page read and write
4321000
heap
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
5030000
direct allocation
page execute and read and write
2F9E000
stack
page read and write
3F9E000
stack
page read and write
4AE1000
heap
page read and write
3DD000
unkown
page execute and read and write
4AE1000
heap
page read and write
2EAE000
stack
page read and write
4A6E000
stack
page read and write
1458000
heap
page read and write
5050000
direct allocation
page execute and read and write
4321000
heap
page read and write
4B71000
heap
page read and write
6A80000
heap
page read and write
4AE1000
heap
page read and write
348000
unkown
page read and write
C88000
unkown
page read and write
5170000
direct allocation
page execute and read and write
37AE000
stack
page read and write
51E0000
direct allocation
page execute and read and write
341F000
stack
page read and write
67AF000
stack
page read and write
12A4000
heap
page read and write
1432000
heap
page read and write
C40000
direct allocation
page read and write
9D6000
unkown
page execute and write copy
44DE000
stack
page read and write
963000
heap
page read and write
113A000
stack
page read and write
509E000
stack
page read and write
4AE1000
heap
page read and write
145D000
heap
page read and write
4A1FECC000
stack
page read and write
C50000
heap
page read and write
C9A000
heap
page read and write
291E000
stack
page read and write
267C000
stack
page read and write
30A3000
heap
page read and write
4AE1000
heap
page read and write
1660000
direct allocation
page read and write
3E5E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
C61000
unkown
page execute and read and write
279F000
stack
page read and write
D30000
unkown
page execute and read and write
48EF000
stack
page read and write
4920000
direct allocation
page execute and read and write
A86000
unkown
page execute and write copy
C8C000
unkown
page execute and read and write
AC9000
unkown
page write copy
2EF0000
heap
page read and write
462E000
stack
page read and write
130000
unkown
page readonly
A87000
unkown
page execute and write copy
1660000
direct allocation
page read and write
DB4000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
1458000
heap
page read and write
345E000
stack
page read and write
2F27000
heap
page read and write
1415000
heap
page read and write
A70000
unkown
page execute and write copy
3D1F000
stack
page read and write
3EC000
unkown
page execute and read and write
512F000
stack
page read and write
A71000
unkown
page execute and write copy
C30000
heap
page read and write
4B6D000
stack
page read and write
F50000
direct allocation
page read and write
1476000
heap
page read and write
51F0000
direct allocation
page execute and read and write
F50000
direct allocation
page read and write
4930000
direct allocation
page execute and read and write
2ADC000
stack
page read and write
31DF000
stack
page read and write
D14000
unkown
page execute and write copy
4321000
heap
page read and write
12A4000
heap
page read and write
28FE000
stack
page read and write
166A3180000
heap
page read and write
34EF000
stack
page read and write
771000
unkown
page execute and write copy
37BF000
stack
page read and write
381F000
stack
page read and write
944000
unkown
page execute and write copy
49B0000
direct allocation
page read and write
475E000
stack
page read and write
10A4000
heap
page read and write
46A0000
trusted library allocation
page read and write
CE7000
unkown
page execute and write copy
4B71000
heap
page read and write
D53000
unkown
page execute and write copy
41A000
unkown
page execute and write copy
2C7F000
stack
page read and write
C40000
direct allocation
page read and write
45A1000
heap
page read and write
355F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
29FF000
stack
page read and write
12A4000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
10A4000
heap
page read and write
4AE1000
heap
page read and write
4B71000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
953000
heap
page read and write
47F2000
direct allocation
page read and write
110E000
stack
page read and write
449E000
stack
page read and write
48EF000
stack
page read and write
182000
unkown
page write copy
9EE000
unkown
page execute and read and write
99D000
unkown
page execute and write copy
36DE000
stack
page read and write
51A0000
direct allocation
page execute and read and write
4321000
heap
page read and write
335E000
stack
page read and write
45EF000
stack
page read and write
13D0000
heap
page read and write
323F000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
CB6000
unkown
page execute and write copy
770000
unkown
page readonly
359F000
stack
page read and write
C8B000
unkown
page execute and write copy
12A4000
heap
page read and write
49C1000
heap
page read and write
2E5E000
stack
page read and write
9C6000
unkown
page execute and write copy
459F000
stack
page read and write
4AE1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
99A000
unkown
page execute and write copy
4F8F000
stack
page read and write
4930000
direct allocation
page execute and read and write
C40000
direct allocation
page read and write
145D000
heap
page read and write
D67000
unkown
page execute and write copy
416F000
stack
page read and write
49B0000
direct allocation
page read and write
31BE000
stack
page read and write
1660000
direct allocation
page read and write
13D0000
heap
page read and write
2B80000
heap
page read and write
165E000
stack
page read and write
7E7000
unkown
page execute and write copy
1450000
heap
page read and write
166A3425000
heap
page read and write
3D1E000
stack
page read and write
ACB000
unkown
page execute and read and write
103B000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
2CBE000
stack
page read and write
65A0000
heap
page read and write
F50000
direct allocation
page read and write
425E000
stack
page read and write
166A4B40000
heap
page read and write
31FE000
stack
page read and write
13DB000
heap
page read and write
4AE1000
heap
page read and write
C72000
unkown
page execute and write copy
435F000
stack
page read and write
11E0000
direct allocation
page read and write
12A4000
heap
page read and write
2EC0000
heap
page read and write
4AE1000
heap
page read and write
4321000
heap
page read and write
49B0000
direct allocation
page read and write
1432000
heap
page read and write
41BF000
stack
page read and write
A5F000
unkown
page execute and write copy
9E1000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
C80000
unkown
page readonly
50E0000
direct allocation
page execute and read and write
4321000
heap
page read and write
4A6E000
stack
page read and write
9D6000
unkown
page execute and write copy
4321000
heap
page read and write
38AF000
stack
page read and write
140E000
heap
page read and write
319F000
stack
page read and write
A40000
unkown
page execute and read and write
4F60000
direct allocation
page read and write
4930000
direct allocation
page execute and read and write
89D8000
heap
page read and write
84A000
unkown
page readonly
800000
heap
page read and write
4AE1000
heap
page read and write
4CEE000
stack
page read and write
A80000
heap
page read and write
4FC1000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
8CC000
stack
page read and write
9EA000
unkown
page execute and write copy
7D9000
unkown
page write copy
4AE1000
heap
page read and write
520F000
stack
page read and write
49B0000
direct allocation
page read and write
4AE1000
heap
page read and write
349E000
stack
page read and write
12A4000
heap
page read and write
144A000
heap
page read and write
4AE1000
heap
page read and write
3555000
heap
page read and write
693000
unkown
page execute and write copy
321E000
stack
page read and write
4AE1000
heap
page read and write
5160000
direct allocation
page execute and read and write
37FE000
stack
page read and write
4BFA000
heap
page read and write
65A6000
heap
page read and write
1410000
heap
page read and write
82F000
unkown
page execute and read and write
D19000
heap
page read and write
9FF000
unkown
page execute and write copy
9CA000
unkown
page execute and read and write
12A4000
heap
page read and write
83C000
stack
page read and write
1451000
heap
page read and write
4AE1000
heap
page read and write
2EAE000
stack
page read and write
36DF000
stack
page read and write
1250000
heap
page read and write
CEA000
unkown
page execute and read and write
4AE1000
heap
page read and write
A86000
unkown
page execute and read and write
68AF000
stack
page read and write
40DE000
stack
page read and write
3ADE000
stack
page read and write
407F000
stack
page read and write
47B0000
direct allocation
page read and write
1458000
heap
page read and write
4950000
direct allocation
page execute and read and write
9A0000
heap
page read and write
4AE1000
heap
page read and write
32BF000
stack
page read and write
466F000
stack
page read and write
3CAE000
stack
page read and write
3DAF000
stack
page read and write
309E000
stack
page read and write
DB4000
heap
page read and write
C84000
unkown
page execute and read and write
4321000
heap
page read and write
12A4000
heap
page read and write
302000
unkown
page execute and read and write
12A4000
heap
page read and write
47AF000
stack
page read and write
3A3F000
stack
page read and write
391F000
stack
page read and write
166A3188000
heap
page read and write
3BDF000
stack
page read and write
4EBE000
heap
page read and write
305F000
stack
page read and write
89E6000
heap
page read and write
4930000
direct allocation
page execute and read and write
419000
unkown
page execute and write copy
1638B7C5000
heap
page read and write
182000
unkown
page write copy
47EE000
stack
page read and write
2E6F000
stack
page read and write
DB4000
heap
page read and write
456E000
stack
page read and write
38FF000
stack
page read and write
38EE000
stack
page read and write
2B7E000
stack
page read and write
321E000
stack
page read and write
89C0000
heap
page read and write
3F7E000
stack
page read and write
F50000
direct allocation
page read and write
12A4000
heap
page read and write
942000
unkown
page execute and read and write
4AE1000
heap
page read and write
3FDD000
stack
page read and write
32DF000
stack
page read and write
3BDE000
stack
page read and write
4AE1000
heap
page read and write
12A4000
heap
page read and write
4A20000
direct allocation
page read and write
49C1000
heap
page read and write
770000
unkown
page read and write
130000
unkown
page read and write
28BF000
stack
page read and write
10A4000
heap
page read and write
1432000
heap
page read and write
4321000
heap
page read and write
9CC000
stack
page read and write
4ADF000
stack
page read and write
5110000
direct allocation
page execute and read and write
7DB000
unkown
page execute and write copy
2CDF000
stack
page read and write
3A2E000
stack
page read and write
49B0000
direct allocation
page read and write
489E000
stack
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
4AE1000
heap
page read and write
3D5E000
stack
page read and write
13A3000
heap
page read and write
2A3E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
C40000
direct allocation
page read and write
A77000
unkown
page execute and write copy
253E000
stack
page read and write
CC6000
unkown
page execute and write copy
2BDF000
stack
page read and write
45A1000
heap
page read and write
84A000
unkown
page readonly
116E000
stack
page read and write
5180000
direct allocation
page execute and read and write
317F000
stack
page read and write
1638B480000
heap
page read and write
C40000
direct allocation
page read and write
5190000
direct allocation
page execute and read and write
1390000
heap
page read and write
4AE1000
heap
page read and write
942000
unkown
page execute and read and write
117A000
heap
page read and write
5000000
direct allocation
page execute and read and write
7D2000
unkown
page execute and read and write
4AE1000
heap
page read and write
12A4000
heap
page read and write
898D000
heap
page read and write
3EEF000
stack
page read and write
848000
unkown
page read and write
1660000
direct allocation
page read and write
DB4000
heap
page read and write
4A2027F000
stack
page read and write
10A4000
heap
page read and write
411E000
stack
page read and write
348000
unkown
page write copy
4AE1000
heap
page read and write
C80000
unkown
page readonly
967000
unkown
page execute and read and write
840000
unkown
page readonly
4E2E000
stack
page read and write
993000
unkown
page execute and write copy
2F1F000
stack
page read and write
357E000
stack
page read and write
435F000
stack
page read and write
A61000
unkown
page execute and write copy
C40000
direct allocation
page read and write
1451000
heap
page read and write
12A4000
heap
page read and write
41FE000
stack
page read and write
2F5F000
stack
page read and write
3E5F000
stack
page read and write
2E3E000
stack
page read and write
1170000
heap
page read and write
34C000
unkown
page readonly
2EF0000
heap
page read and write
5120000
direct allocation
page execute and read and write
11F0000
heap
page read and write
12A0000
heap
page read and write
12A4000
heap
page read and write
4AE1000
heap
page read and write
CD1000
unkown
page execute and read and write
5200000
direct allocation
page execute and read and write
4CAC000
stack
page read and write
4E50000
direct allocation
page read and write
4AE0000
heap
page read and write
49AF000
stack
page read and write
9FA000
unkown
page execute and read and write
4AE1000
heap
page read and write
11E0000
direct allocation
page read and write
12A4000
heap
page read and write
461E000
stack
page read and write
ACB000
unkown
page execute and write copy
40DF000
stack
page read and write
10A4000
heap
page read and write
349E000
stack
page read and write
34A000
unkown
page readonly
982000
unkown
page execute and write copy
C40000
direct allocation
page read and write
486F000
stack
page read and write
2FF0000
heap
page read and write
7DB000
unkown
page execute and write copy
69AF000
stack
page read and write
3D1F000
stack
page read and write
11D0000
heap
page read and write
472F000
stack
page read and write
848000
unkown
page write copy
30A0000
heap
page read and write
4AE1000
heap
page read and write
12A4000
heap
page read and write
4AE1000
heap
page read and write
5170000
direct allocation
page execute and read and write
4330000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
123E000
stack
page read and write
1060000
heap
page read and write
499F000
stack
page read and write
4E8E000
stack
page read and write
2E1F000
stack
page read and write
409F000
stack
page read and write
984000
unkown
page execute and read and write
CBE000
heap
page read and write
94F000
heap
page read and write
9FB000
unkown
page execute and write copy
48AE000
stack
page read and write
3DFF000
stack
page read and write
4AE1000
heap
page read and write
362F000
stack
page read and write
84C000
unkown
page readonly
11E0000
direct allocation
page read and write
CDE000
unkown
page execute and read and write
49B0000
direct allocation
page read and write
1638D140000
heap
page read and write
841000
unkown
page execute read
4FD0000
direct allocation
page execute and read and write
89D1000
heap
page read and write
137E000
stack
page read and write
1A0000
unkown
page readonly
5190000
heap
page read and write
42FF000
stack
page read and write
653000
unkown
page execute and read and write
33FF000
stack
page read and write
4900000
direct allocation
page execute and read and write
95B000
unkown
page execute and read and write
D65000
unkown
page execute and read and write
5020000
direct allocation
page execute and read and write
50EE000
stack
page read and write
5060000
direct allocation
page execute and read and write
9CA000
unkown
page execute and read and write
1455000
heap
page read and write
4F50000
remote allocation
page read and write
1638B4A0000
heap
page read and write
1660000
direct allocation
page read and write
11E0000
direct allocation
page read and write
EE0000
heap
page read and write
A61000
unkown
page execute and write copy
A60000
unkown
page read and write
8EE000
stack
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
6A90000
heap
page read and write
376F000
stack
page read and write
10A4000
heap
page read and write
331F000
stack
page read and write
1183000
heap
page read and write
DB0000
heap
page read and write
144A000
heap
page read and write
3F9F000
stack
page read and write
11E0000
direct allocation
page read and write
10A4000
heap
page read and write
65A5000
heap
page read and write
47B0000
direct allocation
page read and write
2E9F000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
C1F000
stack
page read and write
F60000
heap
page read and write
9DE000
unkown
page execute and write copy
11E0000
direct allocation
page read and write
DD0000
heap
page read and write
3ADE000
stack
page read and write
CCE000
heap
page read and write
5160000
direct allocation
page execute and read and write
12A4000
heap
page read and write
402F000
stack
page read and write
9E1000
unkown
page execute and read and write
133F000
stack
page read and write
692000
unkown
page execute and write copy
DA0000
heap
page read and write
2E5C000
stack
page read and write
C34000
unkown
page execute and write copy
435E000
stack
page read and write
96B000
heap
page read and write
A26000
unkown
page execute and read and write
309F000
stack
page read and write
7D9000
unkown
page write copy
34C000
unkown
page readonly
4AE1000
heap
page read and write
50C0000
direct allocation
page execute and read and write
51F0000
heap
page read and write
33EE000
stack
page read and write
DB4000
heap
page read and write
12A4000
heap
page read and write
D16000
unkown
page execute and read and write
166A30A0000
heap
page read and write
166A2FA0000
heap
page read and write
9F7000
unkown
page execute and write copy
2C9F000
stack
page read and write
34A000
unkown
page readonly
4A1FF4F000
stack
page read and write
140F000
heap
page read and write
4AE1000
heap
page read and write
431F000
stack
page read and write
4AE1000
heap
page read and write
4321000
heap
page read and write
4AE1000
heap
page read and write
371E000
stack
page read and write
31BE000
stack
page read and write
263F000
stack
page read and write
32AE000
stack
page read and write
4A6E000
stack
page read and write
6FD0000
heap
page read and write
3F3F000
stack
page read and write
3FDE000
stack
page read and write
69D0000
heap
page read and write
49B0000
direct allocation
page read and write
4F60000
direct allocation
page read and write
31DF000
stack
page read and write
DB4000
heap
page read and write
2B5F000
stack
page read and write
4760000
trusted library allocation
page read and write
C83000
unkown
page execute and write copy
CD3000
heap
page read and write
DB4000
heap
page read and write
166A3080000
heap
page read and write
2D1E000
stack
page read and write
AD0000
heap
page read and write
439E000
stack
page read and write
4AE1000
heap
page read and write
341000
unkown
page execute read
4BA0000
direct allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
DB4000
heap
page read and write
CD5000
heap
page read and write
4AE1000
heap
page read and write
F50000
direct allocation
page read and write
2DBF000
stack
page read and write
399E000
stack
page read and write
7D9000
unkown
page write copy
1680000
heap
page read and write
C60000
unkown
page execute and write copy
D51000
unkown
page execute and write copy
9B0000
unkown
page execute and read and write
4DEE000
stack
page read and write
41DF000
stack
page read and write
99D000
unkown
page execute and write copy
A5F000
unkown
page execute and write copy
10A4000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
EE7000
heap
page read and write
331E000
stack
page read and write
A24000
unkown
page execute and write copy
49B0000
direct allocation
page read and write
50A7000
heap
page read and write
D76000
unkown
page execute and read and write
C81000
unkown
page execute read
984000
unkown
page execute and read and write
4910000
direct allocation
page execute and read and write
1432000
heap
page read and write
12EE000
stack
page read and write
C40000
direct allocation
page read and write
4AE1000
heap
page read and write
1110000
heap
page read and write
335E000
stack
page read and write
C8C000
unkown
page readonly
5070000
direct allocation
page execute and read and write
C32000
unkown
page execute and read and write
3E5F000
stack
page read and write
9FA000
unkown
page execute and read and write
1117000
heap
page read and write
841000
unkown
page execute read
5160000
direct allocation
page execute and read and write
6E3E000
stack
page read and write
371E000
stack
page read and write
C81000
unkown
page execute read
6764000
heap
page read and write
10A0000
heap
page read and write
12A4000
heap
page read and write
4321000
heap
page read and write
5180000
direct allocation
page execute and read and write
366E000
stack
page read and write
95B000
unkown
page execute and read and write
F50000
direct allocation
page read and write
1170000
heap
page read and write
993000
unkown
page execute and write copy
4321000
heap
page read and write
9FE000
unkown
page execute and read and write
1473000
heap
page read and write
1660000
direct allocation
page read and write
381F000
stack
page read and write
385E000
stack
page read and write
12A4000
heap
page read and write
865000
heap
page read and write
42AF000
stack
page read and write
4321000
heap
page read and write
421F000
stack
page read and write
7BA0000
trusted library allocation
page read and write
359E000
stack
page read and write
47AE000
stack
page read and write
770000
unkown
page readonly
31DE000
stack
page read and write
1638B540000
heap
page read and write
4BAE000
stack
page read and write
4F20000
trusted library allocation
page read and write
4A1FFCF000
stack
page read and write
9B0000
unkown
page execute and read and write
340000
unkown
page readonly
4F9E000
stack
page read and write
7E7000
unkown
page execute and write copy
4AE1000
heap
page read and write
471F000
stack
page read and write
3A9F000
stack
page read and write
46AE000
stack
page read and write
1660000
direct allocation
page read and write
970000
unkown
page execute and write copy
30DE000
stack
page read and write
DB4000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
A70000
unkown
page execute and read and write
37DF000
stack
page read and write
C40000
direct allocation
page read and write
4AE1000
heap
page read and write
445F000
stack
page read and write
F50000
direct allocation
page read and write
49C1000
heap
page read and write
4AE1000
heap
page read and write
5140000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
3D5E000
stack
page read and write
359F000
stack
page read and write
C40000
direct allocation
page read and write
3E3E000
stack
page read and write
9DE000
unkown
page execute and write copy
1660000
direct allocation
page read and write
CBA000
unkown
page execute and read and write
A70000
unkown
page execute and write copy
A61000
unkown
page execute and write copy
145C000
heap
page read and write
3D8000
unkown
page execute and read and write
34A000
unkown
page readonly
6F3F000
stack
page read and write
41AE000
stack
page read and write
395F000
stack
page read and write
1E6987F000
stack
page read and write
45A0000
heap
page read and write
4300000
heap
page read and write
4EB9000
heap
page read and write
CE4000
heap
page read and write
45A1000
heap
page read and write
971000
unkown
page execute and read and write
2A1F000
stack
page read and write
4B6F000
stack
page read and write
A86000
unkown
page execute and write copy
944000
unkown
page execute and write copy
3080000
heap
page read and write
4AE1000
heap
page read and write
CCD000
unkown
page execute and read and write
CFC000
stack
page read and write
4E00000
trusted library allocation
page read and write
13F1000
heap
page read and write
28DF000
stack
page read and write
49DE000
stack
page read and write
4AE1000
heap
page read and write
95A000
heap
page read and write
F9A000
heap
page read and write
3CFE000
stack
page read and write
47B0000
direct allocation
page read and write
4AE1000
heap
page read and write
5130000
direct allocation
page execute and read and write
11E0000
direct allocation
page read and write
D77000
unkown
page execute and write copy
CF7000
unkown
page execute and read and write
DFC000
stack
page read and write
36BE000
stack
page read and write
12A4000
heap
page read and write
35DE000
stack
page read and write
99A000
unkown
page execute and write copy
5051000
direct allocation
page read and write
C40000
direct allocation
page read and write
B1E000
stack
page read and write
3B9F000
stack
page read and write
40C000
unkown
page execute and read and write
3C1E000
stack
page read and write
309F000
stack
page read and write
11E0000
direct allocation
page read and write
4321000
heap
page read and write
CCE000
unkown
page execute and write copy
3C6F000
stack
page read and write
CEE000
unkown
page execute and read and write
50E0000
direct allocation
page execute and read and write
F67000
heap
page read and write
967000
unkown
page execute and write copy
140C000
heap
page read and write
9EA000
unkown
page execute and write copy
4AE1000
heap
page read and write
4B80000
direct allocation
page execute and read and write
449F000
stack
page read and write
DB4000
heap
page read and write
CA0000
unkown
page execute and read and write
13E8000
heap
page read and write
4EC7000
heap
page read and write
50E0000
direct allocation
page execute and read and write
F90000
heap
page read and write
4AE1000
heap
page read and write
6DFC000
stack
page read and write
4A20000
direct allocation
page read and write
4EA1000
heap
page read and write
59C000
stack
page read and write
49B0000
direct allocation
page read and write
994000
unkown
page execute and read and write
27BE000
stack
page read and write
3F9F000
stack
page read and write
3F2E000
stack
page read and write
184000
unkown
page execute and read and write
50F0000
direct allocation
page execute and read and write
3CBF000
stack
page read and write
960000
heap
page read and write
406E000
stack
page read and write
4321000
heap
page read and write
44AF000
stack
page read and write
A70000
unkown
page execute and read and write
887C000
stack
page read and write
9FF000
unkown
page execute and write copy
331F000
stack
page read and write
5010000
direct allocation
page execute and read and write
502E000
stack
page read and write
353F000
stack
page read and write
1449000
heap
page read and write
4AE1000
heap
page read and write
F50000
direct allocation
page read and write
F50000
direct allocation
page read and write
4AE1000
heap
page read and write
4321000
heap
page read and write
A86000
unkown
page execute and read and write
140F000
heap
page read and write
2DFE000
stack
page read and write
7DB000
unkown
page execute and read and write
43AE000
stack
page read and write
2E1E000
stack
page read and write
692000
unkown
page execute and read and write
302F000
stack
page read and write
CCD000
heap
page read and write
308A000
heap
page read and write
3BBE000
stack
page read and write
4FB0000
heap
page read and write
4AE1000
heap
page read and write
AD7000
unkown
page execute and write copy
4B71000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
5150000
direct allocation
page execute and read and write
5160000
direct allocation
page execute and read and write
425E000
stack
page read and write
D67000
unkown
page execute and write copy
C4B000
unkown
page execute and read and write
CEB000
unkown
page execute and write copy
13F3000
heap
page read and write
49B0000
direct allocation
page read and write
2B3F000
stack
page read and write
2F10000
direct allocation
page read and write
2F9F000
stack
page read and write
493D000
stack
page read and write
89C3000
heap
page read and write
11E0000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
9F7000
unkown
page execute and write copy
1660000
direct allocation
page read and write
4AE1000
heap
page read and write
3A7E000
stack
page read and write
CDA000
unkown
page execute and write copy
84C000
unkown
page readonly
4FE0000
direct allocation
page execute and read and write
3C1E000
stack
page read and write
A63000
unkown
page execute and write copy
C74000
unkown
page execute and read and write
4AE1000
heap
page read and write
452F000
stack
page read and write
4B71000
heap
page read and write
10A4000
heap
page read and write
92E000
stack
page read and write
654E000
stack
page read and write
5160000
direct allocation
page execute and read and write
860000
heap
page read and write
967000
unkown
page execute and write copy
968000
heap
page read and write
43EF000
stack
page read and write
1419000
heap
page read and write
A71000
unkown
page execute and write copy
3559000
heap
page read and write
3BDF000
stack
page read and write
2FF0000
heap
page read and write
421E000
stack
page read and write
4AE1000
heap
page read and write
3520000
heap
page read and write
5AB000
unkown
page execute and read and write
40DF000
stack
page read and write
476E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
F50000
direct allocation
page read and write
30DE000
stack
page read and write
1458000
heap
page read and write
6BC0000
heap
page read and write
509F000
stack
page read and write
A24000
unkown
page execute and write copy
5150000
direct allocation
page execute and read and write
10A4000
heap
page read and write
AC9000
unkown
page write copy
11E0000
direct allocation
page read and write
970000
unkown
page execute and write copy
C5A000
heap
page read and write
4AE1000
heap
page read and write
277F000
stack
page read and write
4AE1000
heap
page read and write
343E000
stack
page read and write
1380000
heap
page read and write
12A4000
heap
page read and write
1638B547000
heap
page read and write
39EF000
stack
page read and write
51B0000
direct allocation
page execute and read and write
1660000
direct allocation
page read and write
4AE1000
heap
page read and write
12A4000
heap
page read and write
3DEE000
stack
page read and write
A77000
unkown
page execute and write copy
395F000
stack
page read and write
3CDE000
stack
page read and write
3F5F000
stack
page read and write
684000
unkown
page execute and read and write
4DEE000
heap
page read and write
11E0000
direct allocation
page read and write
3A5F000
stack
page read and write
44EE000
stack
page read and write
4AE1000
heap
page read and write
510E000
stack
page read and write
5130000
direct allocation
page execute and read and write
166A3420000
heap
page read and write
F50000
direct allocation
page read and write
C57000
unkown
page execute and write copy
4AE1000
heap
page read and write
4AE1000
heap
page read and write
3B7F000
stack
page read and write
840000
unkown
page readonly
12A4000
heap
page read and write
12A4000
heap
page read and write
15CF000
stack
page read and write
982000
unkown
page execute and write copy
6A90000
heap
page read and write
48AF000
stack
page read and write
C8C000
unkown
page readonly
4B6F000
stack
page read and write
36DF000
stack
page read and write
7D2000
unkown
page execute and read and write
3550000
heap
page read and write
A60000
unkown
page readonly
9EE000
unkown
page execute and read and write
12A4000
heap
page read and write
1449000
heap
page read and write
C8D000
unkown
page execute and write copy
33AF000
stack
page read and write
2F5E000
stack
page read and write
658E000
stack
page read and write
4AE1000
heap
page read and write
F50000
direct allocation
page read and write
2DDF000
stack
page read and write
4E50000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
7DB000
unkown
page execute and read and write
4321000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
393E000
stack
page read and write
4EEE000
stack
page read and write
385E000
stack
page read and write
2FD0000
heap
page read and write
4AE1000
heap
page read and write
CA7000
heap
page read and write
9C6000
unkown
page execute and write copy
4AE1000
heap
page read and write
340000
unkown
page readonly
C8B000
heap
page read and write
326F000
stack
page read and write
67C000
unkown
page execute and read and write
1638B470000
heap
page read and write
2EFF000
stack
page read and write
9FB000
unkown
page execute and write copy
303F000
stack
page read and write
CEF000
unkown
page execute and write copy
4AE1000
heap
page read and write
979000
heap
page read and write
971000
unkown
page execute and read and write
50B5000
heap
page read and write
4A2F000
stack
page read and write
994000
unkown
page execute and read and write
4321000
heap
page read and write
3A9F000
stack
page read and write
316E000
stack
page read and write
32F0000
heap
page read and write
4AE1000
heap
page read and write
A77000
unkown
page execute and write copy
35DE000
stack
page read and write
4320000
heap
page read and write
4F50000
remote allocation
page read and write
4AE1000
heap
page read and write
A07000
unkown
page execute and read and write
A77000
unkown
page execute and write copy
9FE000
unkown
page execute and read and write
4B90000
direct allocation
page execute and read and write
2F10000
direct allocation
page read and write
2B90000
heap
page read and write
1687000
heap
page read and write
49B0000
direct allocation
page read and write
C9F000
heap
page read and write
12A4000
heap
page read and write
A07000
unkown
page execute and read and write
4F2F000
stack
page read and write
50E0000
direct allocation
page execute and read and write
1473000
heap
page read and write
403000
unkown
page execute and read and write
345F000
stack
page read and write
131000
unkown
page execute and read and write
485F000
stack
page read and write
3B2F000
stack
page read and write
2B9E000
stack
page read and write
4321000
heap
page read and write
1660000
direct allocation
page read and write
1E6959F000
stack
page read and write
4321000
heap
page read and write
4F9E000
stack
page read and write
2FD0000
heap
page read and write
32FE000
stack
page read and write
FA4000
heap
page read and write
49C0000
heap
page read and write
4AE1000
heap
page read and write
4F9E000
heap
page read and write
4A20000
direct allocation
page read and write
4EB1000
direct allocation
page read and write
C8A000
unkown
page readonly
99C000
unkown
page execute and read and write
2F20000
heap
page read and write
2A5E000
stack
page read and write
4AE1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
497C000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
C63000
heap
page read and write
381E000
stack
page read and write
DB4000
heap
page read and write
1A0000
unkown
page read and write
CE5000
heap
page read and write
A75000
unkown
page execute and read and write
D4F000
unkown
page execute and write copy
12A4000
heap
page read and write
399E000
stack
page read and write
2FF3000
heap
page read and write
142E000
heap
page read and write
5140000
direct allocation
page execute and read and write
2D9F000
stack
page read and write
2E60000
heap
page read and write
411E000
stack
page read and write
11E0000
direct allocation
page read and write
6A81000
heap
page read and write
49B0000
direct allocation
page read and write
47EE000
stack
page read and write
A75000
unkown
page execute and read and write
3E1F000
stack
page read and write
312F000
stack
page read and write
4AE1000
heap
page read and write
11E0000
direct allocation
page read and write
4FA0000
direct allocation
page execute and read and write
D61000
unkown
page execute and write copy
4930000
direct allocation
page execute and read and write
830000
unkown
page execute and write copy
3EA000
unkown
page write copy
956000
heap
page read and write
D60000
unkown
page execute and read and write
442E000
stack
page read and write
4AE1000
heap
page read and write
3E9E000
stack
page read and write
D1E000
heap
page read and write
4EB2000
heap
page read and write
DB4000
heap
page read and write
13F3000
heap
page read and write
5160000
direct allocation
page execute and read and write
3EA000
unkown
page read and write
4F2F000
stack
page read and write
4960000
direct allocation
page execute and read and write
C88000
unkown
page write copy
4AE1000
heap
page read and write
42EE000
stack
page read and write
2FDA000
heap
page read and write
12A4000
heap
page read and write
93C000
stack
page read and write
4940000
direct allocation
page execute and read and write
304D000
stack
page read and write
1660000
direct allocation
page read and write
C57000
unkown
page execute and read and write
D9E000
stack
page read and write
12A4000
heap
page read and write
D3C000
stack
page read and write
1070000
heap
page read and write
C40000
direct allocation
page read and write
93B000
heap
page read and write
AD5000
heap
page read and write
4EA4000
heap
page read and write
650E000
stack
page read and write
4AE1000
heap
page read and write
559000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4B71000
heap
page read and write
There are 1100 hidden memdumps, click here to show them.