IOC Report
SwitchAutoSetup_v0.7.0.3.exe

loading gif

Files

File Path
Type
Category
Malicious
SwitchAutoSetup_v0.7.0.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\GitLab.UI.exe (copy)
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\blocked-file-util.exe (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\bzip2recover.exe (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-CDLA5.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-FJU40.tmp
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-GTHAH.tmp
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-J3R4N.tmp
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-JL3NL.tmp
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-MMEK3.tmp
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-P0TS2.tmp
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\is-T2KNG.tmp
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\kvno.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\p11-kit.exe (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\pkcs1-conv.exe (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\tclsh86.exe (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\bin\wish86.exe (copy)
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\is-2NH1K.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\is-547IQ.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\is-QSQJJ.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\libopencore-amrnb.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\glxbs\0zuaie
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\glxbs\2djmo8
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\2ny5p8
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\3wtj5f
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\glxbs\6fcb1v
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\79h47yuk6
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\glxbs\89r1ng
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\glxbs\aa1ng4
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\aa1ng4wba
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\glxbs\as26fu
SQLite 3.x database, last written using SQLite version 3046000, file counter 6, database pages 41, 1st free page 29, free pages 1, cookie 0x25, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\glxbs\bsriec
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\d2dba1
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\glxbs\f3wl6x
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\fcbimy
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\glxbs\l6xlf3
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\ppzus2
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\sr90zu
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\tjeukx
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\usrqq1
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\v3e3wl
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\vs0hvs
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\glxbs\wlfk6f
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\ProgramData\glxbs\y5fc2v
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-2P8JE.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-2P8JE.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-2P8JE.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-7PC5R.tmp\SwitchAutoSetup_v0.7.0.3.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-H7329.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-H7329.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-H7329.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-P16Q6.tmp\SwitchAutoSetup_v0.7.0.3.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\IETAG.DLL (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (4268)
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 98
ASCII text
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (65531)
downloaded
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SwitchAutoSetup_v0.7.0.3.exe
"C:\Users\user\Desktop\SwitchAutoSetup_v0.7.0.3.exe"
malicious
C:\Users\user\Desktop\SwitchAutoSetup_v0.7.0.3.exe
"C:\Users\user\Desktop\SwitchAutoSetup_v0.7.0.3.exe" /VERYSILENT
malicious
C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe
"C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2436,i,7230122723258020460,16503310506373257666,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2508 /prefetch:3
malicious
C:\Users\user\AppData\Local\Temp\is-P16Q6.tmp\SwitchAutoSetup_v0.7.0.3.tmp
"C:\Users\user\AppData\Local\Temp\is-P16Q6.tmp\SwitchAutoSetup_v0.7.0.3.tmp" /SL5="$2043C,22688416,781824,C:\Users\user\Desktop\SwitchAutoSetup_v0.7.0.3.exe"
C:\Users\user\AppData\Local\Temp\is-7PC5R.tmp\SwitchAutoSetup_v0.7.0.3.tmp
"C:\Users\user\AppData\Local\Temp\is-7PC5R.tmp\SwitchAutoSetup_v0.7.0.3.tmp" /SL5="$20446,22688416,781824,C:\Users\user\Desktop\SwitchAutoSetup_v0.7.0.3.exe" /VERYSILENT

URLs

Name
IP
Malicious
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0Q
unknown
http://www.vmware.com/0
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://mail.google.com/chat/download?usp=chrome_defaultfault
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://ocsps.ssl.com0?
unknown
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
unknown
https://support.google.com/chrome?p=desktop_tab_groups
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://mail.google.com/chat/
unknown
https://us.f.goldenloafuae.com/sts
unknown
http://unisolated.invalid/
unknown
https://www.remobjects.com/ps
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://www.google.com/chrome/tips/
unknown
https://www.innosetup.com/
unknown
https://drive.google.com/?lfhs=2
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://developer.chrome.com/docs/extensions/how-to/distribute/install-extensions)
unknown
http://www.certum.pl/CPS0
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://www.google.com/chrome/browser-tools/
unknown
https://www.google.com/tools/feedback/chrome/__submit7E
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://us.f.goldenloafuae.com/s
unknown
https://chrome.google.com/webstore
unknown
https://us.f.goldenloafuae.com~
unknown
https://www.google.com/intl/en/about/products?tab
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://t.me/l793oy
149.154.167.99
https://steamcommunity.com/profiles/76561199829660832
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://chromewebstore.google.com/
unknown
https://us.f.goldenloafuae.com/B
unknown
https://drive-preprod.corp.google.com/
unknown
https://us.f.goldenloafuae.comd
unknown
https://clients4.google.com/chrome-sync
unknown
https://gemini.google.com/app?q=
unknown
https://gemini.google.com/glic/intro?
unknown
https://us.f.goldenloafuae.com/G
unknown
http://ocsp.sectigo.com0
unknown
https://docs.google.com/presentation/J
unknown
http://www.unicode.org/copyright.html
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
unknown
https://docs.google.com/presentation/:
unknown
http://crl.m&
unknown
https://lens.google.com/gen204
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
http://subca.ocsp-certum.com01
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
https://policies.google.com/
unknown
https://apis.google.com
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE
142.250.185.196
https://labs.google.com/search?source=ntp
unknown
http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://steamcommunity.com/profiles/76561199829660832ir7amMozilla/5.0
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
https://chrome.google.com/webstore/category/extensions
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://mail.google.com/chat/download?usp=chrome_defaultValidator
unknown
https://us.f.goldenloafuae.com/qh
unknown
https://www.google.com/search
unknown
http://www.google.com/update2/response
unknown
https://login.microsoftonline.com/comon
unknown
https://www.certum.pl/CPS0
unknown
https://support.google.com/chrome/a/?p=browser_profile_details
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
https://www.ecosia.org/newtab/v20
unknown
http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview2K
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://drive-daily-6.corp.google.com/
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
unknown
https://gemini.google.com/glic2
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
us.f.goldenloafuae.com
95.217.31.199
malicious
t.me
149.154.167.99
www.google.com
142.250.185.196

IPs

IP
Domain
Country
Malicious
95.217.31.199
us.f.goldenloafuae.com
Germany
malicious
192.168.2.4
unknown
unknown
malicious
142.250.185.196
www.google.com
United States
149.154.167.99
t.me
United Kingdom
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
633000
heap
page read and write
malicious
E5401BE0000
direct allocation
page read and write
E5401A8C000
direct allocation
page read and write
43B2000
heap
page read and write
24B2634C000
heap
page read and write
24B29B2D000
heap
page read and write
534000
heap
page read and write
250E000
stack
page read and write
E5400401000
direct allocation
page read and write
801000
heap
page read and write
62D000
heap
page read and write
22B1000
direct allocation
page read and write
E5400EE0000
direct allocation
page read and write
E54016F0000
direct allocation
page read and write
534000
heap
page read and write
3AC4000
heap
page read and write
429000
unkown
page read and write
400000
unkown
page readonly
F1D51FC000
stack
page read and write
534000
heap
page read and write
26F4000
stack
page read and write
E5402058000
direct allocation
page read and write
F1CF1FF000
stack
page read and write
E5400398000
direct allocation
page read and write
806000
heap
page read and write
830000
heap
page read and write
E500045C000
direct allocation
page read and write
E5400328000
direct allocation
page read and write
F1DB9FE000
unkown
page readonly
E54006B0000
direct allocation
page read and write
534000
heap
page read and write
2CCF000
stack
page read and write
F1F49FE000
unkown
page readonly
E5401A30000
direct allocation
page read and write
7D0000
heap
page read and write
24B26373000
heap
page read and write
778000A8000
direct allocation
page read and write
84F000
heap
page read and write
3FD0000
heap
page read and write
E54012F8000
direct allocation
page read and write
E5401001000
direct allocation
page read and write
E5401404000
direct allocation
page read and write
E5401358000
direct allocation
page read and write
220A000
direct allocation
page read and write
E5400C54000
direct allocation
page read and write
2EBC000
direct allocation
page read and write
B11000
direct allocation
page read and write
E5401618000
direct allocation
page read and write
24B26780000
unclassified section
page read and write
2261000
direct allocation
page read and write
778000A8000
direct allocation
page read and write
534000
heap
page read and write
E5401E88000
direct allocation
page read and write
24B29B20000
heap
page read and write
E5000070000
direct allocation
page read and write
E5400F74000
direct allocation
page read and write
22B6000
direct allocation
page read and write
6DD000
unkown
page readonly
24B20F86000
unkown
page readonly
E54010C8000
direct allocation
page read and write
E5400640000
direct allocation
page read and write
236D000
direct allocation
page read and write
24B29A8F000
heap
page read and write
E500043C000
direct allocation
page read and write
222F000
direct allocation
page read and write
24B29AD7000
heap
page read and write
22CC000
direct allocation
page read and write
E5401FC4000
direct allocation
page read and write
E54014DC000
direct allocation
page read and write
2350000
direct allocation
page read and write
3F71000
heap
page read and write
E5400A7C000
direct allocation
page read and write
F1ED9FE000
unkown
page readonly
530000
heap
page read and write
E5400D74000
direct allocation
page read and write
77800044000
direct allocation
page read and write
3C41000
heap
page read and write
2292000
direct allocation
page read and write
E540194C000
direct allocation
page read and write
679000
heap
page read and write
534000
heap
page read and write
24B262FA000
heap
page read and write
534000
heap
page read and write
E54017B8000
direct allocation
page read and write
24B299DA000
heap
page read and write
E5400568000
direct allocation
page read and write
4B40000
heap
page read and write
3A90000
heap
page read and write
842000
heap
page read and write
778000B4000
direct allocation
page read and write
E5000168000
direct allocation
page read and write
24B239D5000
heap
page read and write
2161000
heap
page read and write
24B26360000
heap
page read and write
7CE000
stack
page read and write
3AFE000
heap
page read and write
E5400C1C000
direct allocation
page read and write
846000
heap
page read and write
534000
heap
page read and write
7F6000
heap
page read and write
673000
heap
page read and write
E5401F3C000
direct allocation
page read and write
22D8000
direct allocation
page read and write
2E9800028000
direct allocation
page read and write
24B267CD000
unclassified section
page read and write
E5000128000
direct allocation
page read and write
E5401EF8000
direct allocation
page read and write
838000
heap
page read and write
2212000
direct allocation
page read and write
24B263B4000
heap
page read and write
691000
heap
page read and write
E5401DA0000
direct allocation
page read and write
892000
heap
page read and write
E540078F000
direct allocation
page read and write
E5401E8C000
direct allocation
page read and write
24B203F9000
heap
page read and write
534000
heap
page read and write
3855000
heap
page read and write
4A8B000
heap
page read and write
24B202D0000
heap
page read and write
E54012C4000
direct allocation
page read and write
239F000
direct allocation
page read and write
F1DC9FE000
unkown
page readonly
A3F000
stack
page read and write
24B239D1000
heap
page read and write
E5401764000
direct allocation
page read and write
833000
heap
page read and write
E54019BC000
direct allocation
page read and write
E5401B20000
direct allocation
page read and write
E54010DC000
direct allocation
page read and write
E54013B0000
direct allocation
page read and write
B64000
direct allocation
page read and write
24B29A8F000
heap
page read and write
F1DD1FE000
stack
page read and write
E5400995000
direct allocation
page read and write
3B1F000
stack
page read and write
E5401C01000
direct allocation
page read and write
24B29ADD000
heap
page read and write
270F000
stack
page read and write
24B26850000
unclassified section
page read and write
E5401DDC000
direct allocation
page read and write
534000
heap
page read and write
24B28B50000
unclassified section
page read and write
E5401D7C000
direct allocation
page read and write
22E8000
direct allocation
page read and write
24B20414000
heap
page read and write
50E000
stack
page read and write
E54009DC000
direct allocation
page read and write
24B201E0000
heap
page read and write
E5401188000
direct allocation
page read and write
2E98000C8000
direct allocation
page read and write
534000
heap
page read and write
24B20381000
heap
page read and write
3410000
trusted library allocation
page read and write
E54009E8000
direct allocation
page read and write
24B2636F000
heap
page read and write
F1FC9FE000
unkown
page readonly
2F6F000
stack
page read and write
E5400404000
direct allocation
page read and write
E5000568000
direct allocation
page read and write
800000
heap
page read and write
E5401F30000
direct allocation
page read and write
811000
heap
page read and write
77800098000
direct allocation
page read and write
534000
heap
page read and write
E5400388000
direct allocation
page read and write
826000
heap
page read and write
97F000
stack
page read and write
E540017C000
direct allocation
page read and write
24B29A8F000
heap
page read and write
80F000
heap
page read and write
E5401088000
direct allocation
page read and write
E5400032000
direct allocation
page read and write
2431000
direct allocation
page read and write
E50000F0000
direct allocation
page read and write
E5401F6C000
direct allocation
page read and write
E5400310000
direct allocation
page read and write
24B282B0000
unclassified section
page read and write
E54019C8000
direct allocation
page read and write
E5400990000
direct allocation
page read and write
AC4000
direct allocation
page read and write
534000
heap
page read and write
E54007B8000
direct allocation
page read and write
F1F01FE000
stack
page read and write
E5400334000
direct allocation
page read and write
24B282E1000
unclassified section
page read and write
24B283F7000
unclassified section
page read and write
E5402004000
direct allocation
page read and write
4549000
heap
page read and write
4B9000
unkown
page read and write
E5401DB4000
direct allocation
page read and write
35B1000
heap
page read and write
24B299F5000
heap
page read and write
B21000
direct allocation
page read and write
24B26397000
heap
page read and write
24B267A7000
unclassified section
page read and write
E5401150000
direct allocation
page read and write
3F41000
heap
page read and write
24B26930000
unclassified section
page read and write
E5401198000
direct allocation
page read and write
E54009F0000
direct allocation
page read and write
E54006C1000
direct allocation
page read and write
E5000468000
direct allocation
page read and write
24B239C9000
heap
page read and write
F1FD9FE000
unkown
page readonly
604000
heap
page read and write
E54000F0000
direct allocation
page read and write
24B239D6000
heap
page read and write
534000
heap
page read and write
F1F21FD000
stack
page read and write
E500049C000
direct allocation
page read and write
2700000
stack
page read and write
22A0000
direct allocation
page read and write
E5401A3C000
direct allocation
page read and write
E54001D0000
direct allocation
page read and write
804000
heap
page read and write
E5400DA0000
direct allocation
page read and write
24B20384000
heap
page read and write
2E6E000
stack
page read and write
E5401E20000
direct allocation
page read and write
E54015D8000
direct allocation
page read and write
E5401E18000
direct allocation
page read and write
E5000594000
direct allocation
page read and write
E54004CC000
direct allocation
page read and write
2E9800104000
direct allocation
page read and write
24B28470000
unclassified section
page read and write
E54002FC000
direct allocation
page read and write
22C8000
direct allocation
page read and write
24B299F5000
heap
page read and write
37A8000
heap
page read and write
E500059C000
direct allocation
page read and write
E5000530000
direct allocation
page read and write
E540022C000
direct allocation
page read and write
859000
heap
page read and write
9B0000
heap
page read and write
E5400801000
direct allocation
page read and write
7FB60000
direct allocation
page read and write
24B29AD4000
heap
page read and write
E540207A000
direct allocation
page read and write
67F000
heap
page read and write
E54003BC000
direct allocation
page read and write
634000
heap
page read and write
3977000
heap
page read and write
E54000E0000
direct allocation
page read and write
F1EC9FC000
stack
page read and write
E5400568000
direct allocation
page read and write
E5400288000
direct allocation
page read and write
E5401A8C000
direct allocation
page read and write
E540161C000
direct allocation
page read and write
86D000
heap
page read and write
24B239D6000
heap
page read and write
38AF000
heap
page read and write
E5000434000
direct allocation
page read and write
E54016A0000
direct allocation
page read and write
24B263B5000
heap
page read and write
24B26373000
heap
page read and write
E5400E64000
direct allocation
page read and write
24B2635D000
heap
page read and write
38ED000
heap
page read and write
534000
heap
page read and write
384E000
heap
page read and write
9B000
stack
page read and write
E5401870000
direct allocation
page read and write
E5401401000
direct allocation
page read and write
815000
heap
page read and write
E5400710000
direct allocation
page read and write
E5401B7C000
direct allocation
page read and write
534000
heap
page read and write
24B29A8D000
heap
page read and write
24B263CE000
heap
page read and write
534000
heap
page read and write
F1E99FE000
unkown
page readonly
E5000530000
direct allocation
page read and write
6D6000
unkown
page write copy
24B268D0000
unclassified section
page read and write
E500059E000
direct allocation
page read and write
E5000184000
direct allocation
page read and write
F1FB9FE000
unkown
page readonly
E5401070000
direct allocation
page read and write
3718000
direct allocation
page read and write
E5000001000
direct allocation
page read and write
22DA000
direct allocation
page read and write
2363000
direct allocation
page read and write
E5400E70000
direct allocation
page read and write
7FFC8F061000
unkown
page execute read
27A0000
heap
page read and write
E5400E01000
direct allocation
page read and write
E5401460000
direct allocation
page read and write
24B24090000
heap
page read and write
3ABD000
heap
page read and write
E50004E8000
direct allocation
page read and write
F1ED1FE000
unkown
page readonly
6C7000
unkown
page read and write
E54005E8000
direct allocation
page read and write
E5000050000
direct allocation
page read and write
E5401E44000
direct allocation
page read and write
E5000504000
direct allocation
page read and write
24B26777000
unclassified section
page read and write
24B20D62000
unkown
page readonly
F1F09FE000
unkown
page readonly
2286000
direct allocation
page read and write
E5401045000
direct allocation
page read and write
24B26355000
heap
page read and write
24B29A8F000
heap
page read and write
E5401610000
direct allocation
page read and write
534000
heap
page read and write
3F69000
heap
page read and write
5BA000
heap
page read and write
E5401910000
direct allocation
page read and write
F1F41FD000
stack
page read and write
B54000
direct allocation
page read and write
E5401E01000
direct allocation
page read and write
F1D99FE000
unkown
page readonly
255A000
heap
page read and write
219D000
heap
page read and write
24B299DA000
heap
page read and write
E540015C000
direct allocation
page read and write
3990000
trusted library allocation
page read and write
37E0000
heap
page read and write
E5400430000
direct allocation
page read and write
E54003BC000
direct allocation
page read and write
824000
heap
page read and write
E50004A0000
direct allocation
page read and write
2244000
direct allocation
page read and write
E5401601000
direct allocation
page read and write
3840000
heap
page read and write
22BD000
direct allocation
page read and write
228E000
direct allocation
page read and write
534000
heap
page read and write
E5401094000
direct allocation
page read and write
24B262E4000
heap
page read and write
E54004E8000
direct allocation
page read and write
6CB000
unkown
page read and write
85D000
heap
page read and write
534000
heap
page read and write
84B000
heap
page read and write
230E000
direct allocation
page read and write
24B29AE6000
heap
page read and write
225A000
direct allocation
page read and write
E5401E70000
direct allocation
page read and write
43C000
unkown
page readonly
E5400478000
direct allocation
page read and write
24B283CD000
unclassified section
page read and write
2464000
direct allocation
page read and write
E5400258000
direct allocation
page read and write
869000
heap
page read and write
E500047C000
direct allocation
page read and write
E54003B2000
direct allocation
page read and write
E5401304000
direct allocation
page read and write
E5400C78000
direct allocation
page read and write
24B28600000
unclassified section
page read and write
43F4000
heap
page read and write
E5400A44000
direct allocation
page read and write
E5000138000
direct allocation
page read and write
24B2401E000
heap
page read and write
24B29B39000
heap
page read and write
E500057C000
direct allocation
page read and write
26F8000
stack
page read and write
235F000
direct allocation
page read and write
BB4000
direct allocation
page read and write
6CE000
unkown
page read and write
3790000
heap
page read and write
19D000
stack
page read and write
F1E09FE000
unkown
page readonly
E5000018000
direct allocation
page read and write
83C000
heap
page read and write
24B26320000
heap
page read and write
838000
heap
page read and write
E54002F4000
direct allocation
page read and write
4C0000
unkown
page read and write
2E9800078000
direct allocation
page read and write
2422000
direct allocation
page read and write
2BCE000
stack
page read and write
19D000
stack
page read and write
E5000098000
direct allocation
page read and write
E5401388000
direct allocation
page read and write
883000
heap
page read and write
E5401E28000
direct allocation
page read and write
22DF000
direct allocation
page read and write
E5000144000
direct allocation
page read and write
24B2636F000
heap
page read and write
E54017A4000
direct allocation
page read and write
24B2636E000
heap
page read and write
A6F000
stack
page read and write
24B28720000
unclassified section
page read and write
8A7000
heap
page read and write
30FE000
stack
page read and write
7F4000
heap
page read and write
24B202F0000
heap
page read and write
24B2634C000
heap
page read and write
24B29A4A000
heap
page read and write
3B49000
heap
page read and write
E5401B80000
direct allocation
page read and write
E5400E90000
direct allocation
page read and write
22C1000
direct allocation
page read and write
229B000
direct allocation
page read and write
24B28940000
unclassified section
page read and write
24B29A8F000
heap
page read and write
687000
heap
page read and write
77800018000
direct allocation
page read and write
3614000
heap
page read and write
245D000
direct allocation
page read and write
630000
heap
page read and write
24B263E3000
heap
page read and write
E5400B4C000
direct allocation
page read and write
E5400578000
direct allocation
page read and write
620000
heap
page read and write
24B28731000
unclassified section
page read and write
E54010E8000
direct allocation
page read and write
E540046C000
direct allocation
page read and write
E5400968000
direct allocation
page read and write
3A1E000
stack
page read and write
534000
heap
page read and write
24B29A8F000
heap
page read and write
B6B000
direct allocation
page read and write
24B28580000
unclassified section
page read and write
E5400E46000
direct allocation
page read and write
534000
heap
page read and write
24B263B4000
heap
page read and write
2510000
heap
page read and write
24B299DA000
heap
page read and write
38C7000
heap
page read and write
534000
heap
page read and write
E5400C01000
direct allocation
page read and write
247A000
direct allocation
page read and write
822000
heap
page read and write
E54006C3000
direct allocation
page read and write
E540025C000
direct allocation
page read and write
E5400908000
direct allocation
page read and write
83E000
heap
page read and write
24B26797000
unclassified section
page read and write
24B282A0000
unclassified section
page read and write
77800098000
direct allocation
page read and write
3865000
heap
page read and write
E5401E64000
direct allocation
page read and write
833000
heap
page read and write
E5400C04000
direct allocation
page read and write
361D000
heap
page read and write
24B203D5000
heap
page read and write
24B29B33000
heap
page read and write
2473000
direct allocation
page read and write
878000
heap
page read and write
7D8000
heap
page read and write
E5401F48000
direct allocation
page read and write
2E9800018000
direct allocation
page read and write
3C06000
heap
page read and write
E5401B78000
direct allocation
page read and write
24B239BB000
heap
page read and write
2600000
direct allocation
page execute and read and write
E5401A04000
direct allocation
page read and write
24B239C9000
heap
page read and write
540000
trusted library allocation
page read and write
E50000B0000
direct allocation
page read and write
24B26364000
heap
page read and write
E540016C000
direct allocation
page read and write
24B262AF000
heap
page read and write
24B20340000
trusted library allocation
page read and write
24B23D70000
trusted library section
page read and write
534000
heap
page read and write
F1D31FD000
stack
page read and write
24B2635D000
heap
page read and write
534000
heap
page read and write
816000
heap
page read and write
E5400B18000
direct allocation
page read and write
E5401B88000
direct allocation
page read and write
238A000
direct allocation
page read and write
24B24085000
heap
page read and write
24B203BD000
heap
page read and write
F1F99FE000
unkown
page readonly
24B240C0000
unclassified section
page read and write
7F7000
heap
page read and write
E540099C000
direct allocation
page read and write
778000A8000
direct allocation
page read and write
E5401DA8000
direct allocation
page read and write
852000
heap
page read and write
24B2630E000
heap
page read and write
E5400328000
direct allocation
page read and write
E54001A8000
direct allocation
page read and write
E5000514000
direct allocation
page read and write
3AF3000
heap
page read and write
E54001EC000
direct allocation
page read and write
E5400A38000
direct allocation
page read and write
2E9800068000
direct allocation
page read and write
2300000
heap
page read and write
E54000B5000
direct allocation
page read and write
24B203CF000
heap
page read and write
E5401638000
direct allocation
page read and write
740000
heap
page read and write
534000
heap
page read and write
F1E69FE000
unkown
page readonly
4B61000
heap
page read and write
F1EE1FC000
stack
page read and write
24B26387000
heap
page read and write
E5400370000
direct allocation
page read and write
2398000
direct allocation
page read and write
230A000
direct allocation
page read and write
E54013BC000
direct allocation
page read and write
24B26373000
heap
page read and write
AD2000
direct allocation
page read and write
82F000
heap
page read and write
E5401314000
direct allocation
page read and write
E5401D6C000
direct allocation
page read and write
5F0000
heap
page read and write
E54014F0000
direct allocation
page read and write
43D4000
heap
page read and write
E5000144000
direct allocation
page read and write
F1F91FD000
stack
page read and write
534000
heap
page read and write
7F4000
heap
page read and write
E540008C000
direct allocation
page read and write
B3F000
direct allocation
page read and write
7780008C000
direct allocation
page read and write
F1D49FE000
unkown
page readonly
E5400260000
direct allocation
page read and write
726000
heap
page read and write
E5401EE0000
direct allocation
page read and write
24B28417000
unclassified section
page read and write
43AA000
heap
page read and write
E5400550000
direct allocation
page read and write
24B239C0000
heap
page read and write
44C9000
heap
page read and write
E5000401000
direct allocation
page read and write
24B26910000
unclassified section
page read and write
2763000
heap
page read and write
E5401F14000
direct allocation
page read and write
3990000
trusted library allocation
page read and write
E5400FA0000
direct allocation
page read and write
24B240BC000
heap
page read and write
96E000
stack
page read and write
E54018B8000
direct allocation
page read and write
E540055C000
direct allocation
page read and write
3AF6000
heap
page read and write
8A6000
heap
page read and write
7FFC8E661000
unkown
page execute read
24B26860000
unclassified section
page read and write
E5401B78000
direct allocation
page read and write
825000
heap
page read and write
E540035C000
direct allocation
page read and write
441F000
heap
page read and write
534000
heap
page read and write
7FFC8E660000
unkown
page readonly
E5401260000
direct allocation
page read and write
E5401C60000
direct allocation
page read and write
F1E51FE000
stack
page read and write
E5401740000
direct allocation
page read and write
24B28543000
unclassified section
page read and write
F1DA9FE000
unkown
page readonly
5D0000
heap
page read and write
E54001C4000
direct allocation
page read and write
2EC1000
direct allocation
page read and write
825000
heap
page read and write
24B26387000
heap
page read and write
F1DA1FD000
stack
page read and write
6D3000
unkown
page read and write
534000
heap
page read and write
2A8E000
stack
page read and write
E54012F0000
direct allocation
page read and write
E5000208000
direct allocation
page read and write
86B000
heap
page read and write
F1F59FE000
unkown
page readonly
24B29A8F000
heap
page read and write
AE0000
direct allocation
page read and write
2E98000DC000
direct allocation
page read and write
778000B4000
direct allocation
page read and write
E540192D000
direct allocation
page read and write
2348000
direct allocation
page read and write
E540028C000
direct allocation
page read and write
E54014DC000
direct allocation
page read and write
24B22E20000
trusted library section
page readonly
981000
direct allocation
page execute read
E54001E0000
direct allocation
page read and write
25B0000
heap
page read and write
E50004B8000
direct allocation
page read and write
E5400985000
direct allocation
page read and write
E5401248000
direct allocation
page read and write
F1F71FD000
stack
page read and write
E5401EE4000
direct allocation
page read and write
24B203D1000
heap
page read and write
B98000
direct allocation
page read and write
38B6000
heap
page read and write
24B267C7000
unclassified section
page read and write
24B26396000
heap
page read and write
E5000554000
direct allocation
page read and write
E50000E0000
direct allocation
page read and write
4B6B000
heap
page read and write
81B000
heap
page read and write
E5400098000
direct allocation
page read and write
F1D39FE000
unkown
page readonly
E5401E54000
direct allocation
page read and write
853000
heap
page read and write
24B24019000
heap
page read and write
E5400540000
direct allocation
page read and write
E5400E04000
direct allocation
page read and write
F1D69FE000
unkown
page readonly
534000
heap
page read and write
534000
heap
page read and write
E5400DF0000
direct allocation
page read and write
E54017CC000
direct allocation
page read and write
35B0000
heap
page read and write
E5400424000
direct allocation
page read and write
E5401E74000
direct allocation
page read and write
24B2633A000
heap
page read and write
E5000508000
direct allocation
page read and write
E5400240000
direct allocation
page read and write
B30000
direct allocation
page read and write
E5400290000
direct allocation
page read and write
E5400898000
direct allocation
page read and write
E54017F4000
direct allocation
page read and write
534000
heap
page read and write
F1CD1F2000
stack
page read and write
E5401EDC000
direct allocation
page read and write
F1D59FE000
unkown
page readonly
E5000218000
direct allocation
page read and write
E50000C7000
direct allocation
page read and write
24B29A12000
heap
page read and write
24B26387000
heap
page read and write
E540015C000
direct allocation
page read and write
24B26373000
heap
page read and write
E540049C000
direct allocation
page read and write
22F4000
direct allocation
page read and write
806000
heap
page read and write
24B29A8F000
heap
page read and write
254D000
heap
page read and write
24B2635D000
heap
page read and write
24B2639D000
heap
page read and write
3B94000
heap
page read and write
22E6000
direct allocation
page read and write
57E000
stack
page read and write
4ACB000
heap
page read and write
24B24091000
heap
page read and write
77800098000
direct allocation
page read and write
E500058C000
direct allocation
page read and write
24B29A4A000
heap
page read and write
E54004CC000
direct allocation
page read and write
4AAB000
heap
page read and write
E5401EB8000
direct allocation
page read and write
E5401E34000
direct allocation
page read and write
67C000
heap
page read and write
24B22FF0000
unkown
page readonly
E54011A8000
direct allocation
page read and write
2374000
direct allocation
page read and write
3C72000
heap
page read and write
24B23FC0000
heap
page read and write
867000
heap
page read and write
23BC000
direct allocation
page read and write
B28000
direct allocation
page read and write
2161000
heap
page read and write
F1E39FE000
unkown
page readonly
E5400280000
direct allocation
page read and write
3820000
heap
page read and write
E5400D0C000
direct allocation
page read and write
86F000
heap
page read and write
806000
heap
page read and write
816000
heap
page read and write
E50000F0000
direct allocation
page read and write
E5401740000
direct allocation
page read and write
E5401840000
direct allocation
page read and write
E54017EE000
direct allocation
page read and write
E5401B08000
direct allocation
page read and write
E5400398000
direct allocation
page read and write
38E3000
heap
page read and write
E50000E3000
direct allocation
page read and write
F1E49FE000
unkown
page readonly
534000
heap
page read and write
E54015E4000
direct allocation
page read and write
3A9D000
heap
page read and write
E54005E8000
direct allocation
page read and write
E540188C000
direct allocation
page read and write
E50005A0000
direct allocation
page read and write
2900000
heap
page read and write
E5400310000
direct allocation
page read and write
24B26BC0000
heap
page read and write
24B2406E000
heap
page read and write
23AD000
direct allocation
page read and write
E5401E14000
direct allocation
page read and write
2E98000C8000
direct allocation
page read and write
E5401A28000
direct allocation
page read and write
24B29A48000
heap
page read and write
821000
heap
page read and write
23B4000
direct allocation
page read and write
4C4B000
heap
page read and write
80A000
heap
page read and write
224C000
direct allocation
page read and write
E54002CC000
direct allocation
page read and write
24B283E0000
unkown
page read and write
24B29A8F000
heap
page read and write
534000
heap
page read and write
24B2639D000
heap
page read and write
2383000
direct allocation
page read and write
24B25F80000
unclassified section
page read and write
2391000
direct allocation
page read and write
E540027C000
direct allocation
page read and write
23EF000
direct allocation
page read and write
40A000
unkown
page write copy
24B2403F000
heap
page read and write
E5400E80000
direct allocation
page read and write
24B29A12000
heap
page read and write
E5400B24000
direct allocation
page read and write
E54004D8000
direct allocation
page read and write
24B2629E000
heap
page read and write
5603000
heap
page read and write
E54015B0000
direct allocation
page read and write
24B240AC000
heap
page read and write
B4D000
direct allocation
page read and write
534000
heap
page read and write
534000
heap
page read and write
76E000
stack
page read and write
E5000138000
direct allocation
page read and write
24B26329000
heap
page read and write
24B26373000
heap
page read and write
3AB6000
heap
page read and write
E5401410000
direct allocation
page read and write
2E98000D4000
direct allocation
page read and write
24B22D50000
unkown
page readonly
E5000534000
direct allocation
page read and write
E540026C000
direct allocation
page read and write
6C6000
unkown
page read and write
F1DC1FB000
stack
page read and write
2220000
direct allocation
page read and write
534000
heap
page read and write
E5000224000
direct allocation
page read and write
3AA2000
heap
page read and write
E54014E0000
direct allocation
page read and write
232A000
direct allocation
page read and write
E5400284000
direct allocation
page read and write
2E0F000
stack
page read and write
F1EF1FD000
stack
page read and write
3792000
heap
page read and write
2219000
direct allocation
page read and write
E54001E0000
direct allocation
page read and write
5601000
heap
page read and write
B3C000
direct allocation
page read and write
3E9A000
heap
page read and write
2E9800034000
direct allocation
page read and write
E5401E84000
direct allocation
page read and write
24B262A6000
heap
page read and write
BC3000
direct allocation
page read and write
3903000
heap
page read and write
3650000
trusted library allocation
page read and write
24B26373000
heap
page read and write
E5400264000
direct allocation
page read and write
226F000
direct allocation
page read and write
5608000
heap
page read and write
534000
heap
page read and write
2730000
heap
page read and write
E50001F4000
direct allocation
page read and write
3570000
heap
page read and write
385B000
heap
page read and write
24B20330000
trusted library allocation
page read and write
24B29B1A000
heap
page read and write
534000
heap
page read and write
630000
heap
page read and write
A9F000
stack
page read and write
55C1000
heap
page read and write
E5400443000
direct allocation
page read and write
24B239D5000
heap
page read and write
19A000
stack
page read and write
E54003C4000
direct allocation
page read and write
3BF4000
heap
page read and write
E54007E4000
direct allocation
page read and write
3C81000
heap
page read and write
679000
heap
page read and write
534000
heap
page read and write
2E9800001000
direct allocation
page read and write
22BA000
direct allocation
page read and write
E5000404000
direct allocation
page read and write
401000
unkown
page execute read
24B20350000
heap
page read and write
E5400650000
direct allocation
page read and write
534000
heap
page read and write
E5400248000
direct allocation
page read and write
E5400A01000
direct allocation
page read and write
3800000
heap
page read and write
38DC000
heap
page read and write