IOC Report
Portals.exe

loading gif

Files

File Path
Type
Category
Malicious
Portals.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Portals.exe_f411adae77749b33a46592f0ef3e523e429446d0_fc381590_fe84d125-4bdf-4b7f-a9d7-aef8ff40fdbe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DB2.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 13 17:01:57 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EAD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F3B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\i58ym\00z58g4wt
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\i58ym\ct26fk
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\i58ym\d2vasr
SQLite 3.x database, last written using SQLite version 3046000, file counter 6, database pages 41, 1st free page 29, free pages 1, cookie 0x25, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\i58ym\iekxl6
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\i58ym\noh47g
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\i58ym\ophdt0
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\i58ym\phvai5
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\i58ym\qqi5xl
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\i58ym\xt00zm7q1
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\76561199829660832[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3184)
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 78
ASCII text
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (898)
downloaded
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Portals.exe
"C:\Users\user\Desktop\Portals.exe"
malicious
C:\Users\user\Desktop\Portals.exe
"C:\Users\user\Desktop\Portals.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2172,i,4152094786765586208,9576853780185441522,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2440 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 11 & del /f /q "C:\Users\user\Desktop\Portals.exe" & rd /s /q "C:\ProgramData\i58ym" & exit
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7976 -s 784
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 11

URLs

Name
IP
Malicious
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://mail.google.com/chat/download?usp=chrome_defaultfault
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://support.google.com/chrome?p=desktop_tab_groups
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://docs.google.com/document/:
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://mail.google.com/chat/
unknown
http://unisolated.invalid/
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://www.google.com/chrome/tips/
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://drive.google.com/?lfhs=2
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=PCCoCNLxwF4M&am
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://b.b.goldenloafuae.com/OzGS%
unknown
https://www.google.com/chrome/browser-tools/
unknown
https://www.google.com/tools/feedback/chrome/__submit7E
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://steamcommunity.com/ok
unknown
https://chrome.google.com/webstore
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://steamcommunity.com/profiles/76561199829660832/badges/48
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://b.b.goldenloafuae.com/HS
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://116.202.4.223
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://t.me/l793oy
149.154.167.99
https://steamcommunity.com/profiles/76561199829660832
23.197.127.21
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://gemini.google.com/app?q=
unknown
https://gemini.google.com/glic/intro?
unknown
https://docs.google.com/presentation/J
unknown
https://help.steampowered.com/en/
unknown
http://www.unicode.org/copyright.html
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://recaptcha.net/recaptcha/;
unknown
https://docs.google.com/presentation/:
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=Eq36AUaEgab8&l=en
unknown
https://lens.google.com/gen204
unknown
https://b.b.goldenloafuae.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
https://policies.google.com/
unknown
https://apis.google.com
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE
142.250.186.132
https://labs.google.com/search?source=ntp
unknown
https://store.steampowered.com/legal/
unknown
https://b.b.goldenloafuae.comKJ
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://steamcommunity.com/profiles/76561199829660832ir7amMozilla/5.0
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
https://chrome.google.com/webstore/category/extensions
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
unknown
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
unknown
https://www.google.com/search
unknown
https://store.steampowered.com/
unknown
https://support.google.com/chrome/a/?p=browser_profile_details
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
b.b.goldenloafuae.com
94.130.189.58
malicious
steamcommunity.com
23.197.127.21
t.me
149.154.167.99
www.google.com
142.250.184.196

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
94.130.189.58
b.b.goldenloafuae.com
Germany
malicious
116.202.4.223
unknown
Germany
149.154.167.99
t.me
United Kingdom
23.197.127.21
steamcommunity.com
United States
142.250.186.132
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
ProgramId
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
FileId
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
LowerCaseLongPath
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
LongPathHash
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
Name
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
OriginalFileName
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
Publisher
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
Version
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
BinFileVersion
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
BinaryType
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
ProductName
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
ProductVersion
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
LinkDate
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
BinProductVersion
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
AppxPackageFullName
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
AppxPackageRelativeId
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
Size
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
Language
\REGISTRY\A\{7e9c6df1-5dde-dc21-ec23-797409dda7f4}\Root\InventoryApplicationFile\portals.exe|c72f642fd1e51a1d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00184012D1FD5612
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1395000
heap
page read and write
malicious
322800534000
direct allocation
page read and write
86F5DFC000
stack
page read and write
322C00C44000
direct allocation
page read and write
262C5647000
heap
page read and write
2440000
heap
page read and write
322C00374000
direct allocation
page read and write
322C016A8000
direct allocation
page read and write
262C4FB3000
unclassified section
page read and write
322C00E68000
direct allocation
page read and write
5C5000080000
direct allocation
page read and write
262C5765000
heap
page read and write
322C0026C000
direct allocation
page read and write
8684FFE000
stack
page read and write
5C5000058000
direct allocation
page read and write
322C00128000
direct allocation
page read and write
4870000
heap
page read and write
322C0045C000
direct allocation
page read and write
43D8000
heap
page read and write
322C007D4000
direct allocation
page read and write
2F10000C8000
direct allocation
page read and write
322800524000
direct allocation
page read and write
4D26000
heap
page read and write
262C2558000
heap
page read and write
262C5CA0000
unclassified section
page read and write
868D7FE000
unkown
page readonly
322C015AC000
direct allocation
page read and write
262C56BB000
heap
page read and write
322C013D0000
direct allocation
page read and write
2F100006C000
direct allocation
page read and write
322C0091C000
direct allocation
page read and write
3F9E000
unkown
page read and write
262BE978000
heap
page read and write
322C00258000
direct allocation
page read and write
322C00A04000
direct allocation
page read and write
4448000
heap
page read and write
322C00030000
direct allocation
page read and write
322C00374000
direct allocation
page read and write
262C45A0000
unclassified section
page read and write
4452000
heap
page read and write
262C4F30000
unclassified section
page read and write
2554000
trusted library allocation
page read and write
262C5770000
heap
page read and write
7FFC8CE31000
unkown
page execute read
4F9000
stack
page read and write
8689FFE000
stack
page read and write
322C00B68000
direct allocation
page read and write
262C5725000
heap
page read and write
322800164000
direct allocation
page read and write
322C005E0000
direct allocation
page read and write
3228000F0000
direct allocation
page read and write
322C00CB0000
direct allocation
page read and write
86F95FE000
unkown
page readonly
322C0038C000
direct allocation
page read and write
262C5F80000
unclassified section
page read and write
322C01B6C000
direct allocation
page read and write
4DDB000
heap
page read and write
322C00314000
direct allocation
page read and write
868B7FE000
unkown
page readonly
3228004B0000
direct allocation
page read and write
3228000D8000
direct allocation
page read and write
322C01188000
direct allocation
page read and write
86FB5FE000
unkown
page readonly
5C50000B8000
direct allocation
page read and write
262C5725000
heap
page read and write
262C5652000
heap
page read and write
262C2601000
heap
page read and write
262C1FCC000
heap
page read and write
42A9000
heap
page read and write
4482000
heap
page read and write
322C00184000
direct allocation
page read and write
2F10000DC000
direct allocation
page read and write
262C4FAD000
unclassified section
page read and write
262C7A20000
unclassified section
page read and write
5C500008C000
direct allocation
page read and write
3228004D4000
direct allocation
page read and write
41D4000
heap
page read and write
322C01594000
direct allocation
page read and write
322C00D44000
direct allocation
page read and write
322C00C18000
direct allocation
page read and write
322C0166C000
direct allocation
page read and write
262C257F000
heap
page read and write
86E9DFB000
stack
page read and write
262C5790000
unclassified section
page read and write
322C00D8C000
direct allocation
page read and write
2F1000008000
direct allocation
page read and write
322C017E4000
direct allocation
page read and write
262C56C0000
heap
page read and write
322C00534000
direct allocation
page read and write
322C004AC000
direct allocation
page read and write
262C5725000
heap
page read and write
322C01630000
direct allocation
page read and write
86E0DFD000
stack
page read and write
322C01401000
direct allocation
page read and write
5373000
heap
page read and write
322C01474000
direct allocation
page read and write
1315000
heap
page read and write
262C56C0000
heap
page read and write
262BF372000
unkown
page readonly
322C00228000
direct allocation
page read and write
262C5ED0000
unclassified section
page read and write
262C4CD0000
unclassified section
page read and write
322C00604000
direct allocation
page read and write
262C5590000
heap
page read and write
322C0136C000
direct allocation
page read and write
322C01CF0000
direct allocation
page read and write
32280047C000
direct allocation
page read and write
2F1000028000
direct allocation
page read and write
2E80000
heap
page read and write
3228000E2000
direct allocation
page read and write
73E000
stack
page read and write
1B0000
heap
page read and write
322C016A8000
direct allocation
page read and write
322800168000
direct allocation
page read and write
262BE8A0000
heap
page read and write
5C50000B4000
direct allocation
page read and write
5C5000004000
direct allocation
page read and write
322C0024C000
direct allocation
page read and write
3BE0000
heap
page read and write
322C00360000
direct allocation
page read and write
322C00FC8000
direct allocation
page read and write
3228004CC000
direct allocation
page read and write
262C1600000
unkown
page readonly
548B000
heap
page read and write
33CF000
stack
page read and write
322C00314000
direct allocation
page read and write
30FE000
stack
page read and write
322C01340000
direct allocation
page read and write
32280003C000
direct allocation
page read and write
322C008BC000
direct allocation
page read and write
262C4651000
unclassified section
page read and write
322C01A38000
direct allocation
page read and write
262C5758000
heap
page read and write
4210000
heap
page read and write
4302000
heap
page read and write
1347000
heap
page read and write
322C01AAC000
direct allocation
page read and write
322C0023C000
direct allocation
page read and write
262BEA44000
heap
page read and write
322C0010C000
direct allocation
page read and write
262C1FB0000
heap
page read and write
434B000
heap
page read and write
7D5000
heap
page read and write
2F1000058000
direct allocation
page read and write
45C3000
heap
page read and write
36AE000
stack
page read and write
4430000
heap
page read and write
322C00004000
direct allocation
page read and write
322C0141C000
direct allocation
page read and write
322C0128C000
direct allocation
page read and write
262C5725000
heap
page read and write
322C01A74000
direct allocation
page read and write
322C00908000
direct allocation
page read and write
43B0000
heap
page read and write
322C01214000
direct allocation
page read and write
262C5FD7000
unclassified section
page read and write
4D1B000
heap
page read and write
322800144000
direct allocation
page read and write
322C00860000
direct allocation
page read and write
990000
trusted library allocation
page read and write
322C015A0000
direct allocation
page read and write
262C2603000
heap
page read and write
262C55F1000
heap
page read and write
3228004A0000
direct allocation
page read and write
262C56BE000
heap
page read and write
262C566C000
heap
page read and write
322C01020000
direct allocation
page read and write
4E50000
heap
page read and write
322C01198000
direct allocation
page read and write
262C56C0000
heap
page read and write
322800046000
direct allocation
page read and write
5C50000A8000
direct allocation
page read and write
322800414000
direct allocation
page read and write
5C50000B8000
direct allocation
page read and write
28A4000
trusted library allocation
page read and write
322C00284000
direct allocation
page read and write
322C002A0000
direct allocation
page read and write
2576000
trusted library allocation
page read and write
86877FE000
unkown
page readonly
5C500002C000
direct allocation
page read and write
4A8E000
stack
page read and write
322C010B8000
direct allocation
page read and write
2E50000
heap
page read and write
322C0131C000
direct allocation
page read and write
322C00280000
direct allocation
page read and write
25CE000
stack
page read and write
262C7AC1000
heap
page read and write
452D000
heap
page read and write
322C005B8000
direct allocation
page read and write
262C57A1000
unclassified section
page read and write
262C25DD000
heap
page read and write
322800001000
direct allocation
page read and write
86F2DFB000
stack
page read and write
4477000
heap
page read and write
77E000
stack
page read and write
262C4E90000
unclassified section
page read and write
262C5F30000
unclassified section
page read and write
2BAC000
stack
page read and write
32280059C000
direct allocation
page read and write
262C5658000
heap
page read and write
322C01004000
direct allocation
page read and write
322C01160000
direct allocation
page read and write
86DDDFE000
stack
page read and write
322C01A01000
direct allocation
page read and write
32280007C000
direct allocation
page read and write
322C00320000
direct allocation
page read and write
322C00834000
direct allocation
page read and write
322C012E0000
direct allocation
page read and write
3228004C8000
direct allocation
page read and write
41A2000
heap
page read and write
322C01364000
direct allocation
page read and write
868CFFA000
stack
page read and write
86ED5FE000
unkown
page readonly
322C00298000
direct allocation
page read and write
262C56D7000
heap
page read and write
32280059E000
direct allocation
page read and write
86F35FE000
unkown
page readonly
322C01300000
direct allocation
page read and write
322C01AD0000
direct allocation
page read and write
86FDDFD000
stack
page read and write
262BE790000
heap
page read and write
544A000
heap
page read and write
322C0197D000
direct allocation
page read and write
313E000
stack
page read and write
322C00308000
direct allocation
page read and write
5C50000D0000
direct allocation
page read and write
5C500003C000
direct allocation
page read and write
322800401000
direct allocation
page read and write
322C00A6D000
direct allocation
page read and write
322C0163C000
direct allocation
page read and write
322C01A68000
direct allocation
page read and write
322C01B00000
direct allocation
page read and write
262C55AD000
heap
page read and write
322C019A0000
direct allocation
page read and write
5495000
heap
page read and write
53AB000
heap
page read and write
322C015B9000
direct allocation
page read and write
262C4F90000
unclassified section
page read and write
262C56C0000
heap
page read and write
262BE9A2000
heap
page read and write
322C00290000
direct allocation
page read and write
322C013E0000
direct allocation
page read and write
41F0000
heap
page read and write
428B000
heap
page read and write
322C003C4000
direct allocation
page read and write
4CB1000
heap
page read and write
5C50000B4000
direct allocation
page read and write
322C00DA4000
direct allocation
page read and write
322C01520000
direct allocation
page read and write
32A0000
heap
page read and write
3228000B0000
direct allocation
page read and write
41B8000
heap
page read and write
4291000
heap
page read and write
262C5602000
heap
page read and write
322C003CA000
direct allocation
page read and write
4354000
heap
page read and write
262C4CE7000
unclassified section
page read and write
92000
unkown
page readonly
322C01680000
direct allocation
page read and write
262C1FE2000
heap
page read and write
400000
remote allocation
page execute and read and write
322C0049C000
direct allocation
page read and write
7BD000
heap
page read and write
262BE9E3000
heap
page read and write
86E45FE000
unkown
page readonly
262C5701000
heap
page read and write
3228001E4000
direct allocation
page read and write
262C561E000
heap
page read and write
262C2690000
unclassified section
page read and write
5380000
heap
page read and write
322C00E48000
direct allocation
page read and write
5C50000EC000
direct allocation
page read and write
322C00784000
direct allocation
page read and write
322C01072000
direct allocation
page read and write
4212000
heap
page read and write
86E25FE000
unkown
page readonly
322C000D4000
direct allocation
page read and write
32280043C000
direct allocation
page read and write
262C7AC1000
heap
page read and write
322C00278000
direct allocation
page read and write
322C01294000
direct allocation
page read and write
32280011C000
direct allocation
page read and write
322C005D0000
direct allocation
page read and write
262C13B3000
heap
page read and write
322C00204000
direct allocation
page read and write
139A000
heap
page read and write
262C4D00000
unclassified section
page read and write
322C01794000
direct allocation
page read and write
32280011C000
direct allocation
page read and write
868AFFD000
stack
page read and write
41D2000
heap
page read and write
322800100000
direct allocation
page read and write
262C2553000
heap
page read and write
5C50000B4000
direct allocation
page read and write
262C46A0000
unclassified section
page read and write
317F000
stack
page read and write
8686FFD000
stack
page read and write
7C6000
heap
page read and write
322C014C4000
direct allocation
page read and write
86F6DFC000
stack
page read and write
3228005A0000
direct allocation
page read and write
7FFC90031000
unkown
page execute read
262C4DAD000
unclassified section
page read and write
322C00E38000
direct allocation
page read and write
322C01B18000
direct allocation
page read and write
43AA000
heap
page read and write
262C5647000
heap
page read and write
86F45FE000
unkown
page readonly
79E000
heap
page read and write
2F1000018000
direct allocation
page read and write
322C005C4000
direct allocation
page read and write
86EEDFB000
stack
page read and write
86E6DFC000
stack
page read and write
86FC5FE000
unkown
page readonly
2F100008C000
direct allocation
page read and write
262C4D77000
unclassified section
page read and write
322C000A7000
direct allocation
page read and write
2651000
trusted library allocation
page execute and read and write
322C004E0000
direct allocation
page read and write
322C0166C000
direct allocation
page read and write
322C001D4000
direct allocation
page read and write
60E000
stack
page read and write
322C0176C000
direct allocation
page read and write
2640000
heap
page execute and read and write
322C01BE8000
direct allocation
page read and write
1240000
heap
page read and write
4910000
heap
page read and write
322C004AE000
direct allocation
page read and write
4518000
heap
page read and write
322C002D8000
direct allocation
page read and write
262C4D4A000
unclassified section
page read and write
2F1000088000
direct allocation
page read and write
322C000E4000
direct allocation
page read and write
868E7FE000
unkown
page readonly
322C01801000
direct allocation
page read and write
262C4731000
unclassified section
page read and write
322800540000
direct allocation
page read and write
4990000
heap
page read and write
322C0109C000
direct allocation
page read and write
45AD000
heap
page read and write
322800468000
direct allocation
page read and write
4352000
heap
page read and write
5395000
heap
page read and write
1130000
stack
page read and write
86F0DFE000
stack
page read and write
17A0000
heap
page read and write
32280023C000
direct allocation
page read and write
2F1000114000
direct allocation
page read and write
322C016D0000
direct allocation
page read and write
322C017C8000
direct allocation
page read and write
262C5765000
heap
page read and write
322C00040000
direct allocation
page read and write
445D000
heap
page read and write
322C00B70000
direct allocation
page read and write
5C5000098000
direct allocation
page read and write
322C01AE9000
direct allocation
page read and write
322800664000
direct allocation
page read and write
322C00C34000
direct allocation
page read and write
262C56BB000
heap
page read and write
262C4FA7000
unclassified section
page read and write
322C01330000
direct allocation
page read and write
262BE8E0000
trusted library allocation
page read and write
322C00100000
direct allocation
page read and write
262C56C0000
heap
page read and write
86887FE000
unkown
page readonly
262C5647000
heap
page read and write
322C01AE4000
direct allocation
page read and write
86E35FE000
unkown
page readonly
2F10000E4000
direct allocation
page read and write
262C45D0000
unkown
page readonly
262C5650000
heap
page read and write
322C014A4000
direct allocation
page read and write
86E15FE000
unkown
page readonly
3DB8000
heap
page read and write
53E0000
heap
page read and write
322C016D0000
direct allocation
page read and write
32280052C000
direct allocation
page read and write
322800490000
direct allocation
page read and write
139F000
heap
page read and write
3659000
trusted library allocation
page read and write
322C004C6000
direct allocation
page read and write
322C018A4000
direct allocation
page read and write
322C00404000
direct allocation
page read and write
3228004F4000
direct allocation
page read and write
4308000
heap
page read and write
2F1000104000
direct allocation
page read and write
322C00384000
direct allocation
page read and write
86F85FE000
unkown
page readonly
32280057C000
direct allocation
page read and write
86F75FE000
unkown
page readonly
322C006B0000
direct allocation
page read and write
5C50000A8000
direct allocation
page read and write
32280007B000
direct allocation
page read and write
322C01D94000
direct allocation
page read and write
B80000
heap
page read and write
262C5605000
heap
page read and write
1C0000
heap
page read and write
322C01AF4000
direct allocation
page read and write
322C0180C000
direct allocation
page read and write
322800150000
direct allocation
page read and write
262C5695000
heap
page read and write
262C254A000
heap
page read and write
322C00DB4000
direct allocation
page read and write
4582000
heap
page read and write
262C4790000
unclassified section
page read and write
3D0A000
heap
page read and write
262C7AC1000
heap
page read and write
262C562F000
heap
page read and write
262C55FE000
heap
page read and write
86FEDFE000
stack
page read and write
262C7B1C000
heap
page read and write
322800418000
direct allocation
page read and write
9A000
unkown
page readonly
32280002C000
direct allocation
page read and write
322C00030000
direct allocation
page read and write
262C0F50000
unkown
page read and write
322C00D80000
direct allocation
page read and write
322C00A78000
direct allocation
page read and write
322C01190000
direct allocation
page read and write
322C011B8000
direct allocation
page read and write
322800554000
direct allocation
page read and write
262C1490000
unkown
page readonly
322C005A8000
direct allocation
page read and write
868A7FE000
unkown
page readonly
7C9000
heap
page read and write
262C2487000
unclassified section
page read and write
3C57000
heap
page read and write
41A0000
heap
page read and write
262C569B000
heap
page read and write
2BEC000
stack
page read and write
86DF5FE000
unkown
page readonly
322C01720000
direct allocation
page read and write
680000
trusted library allocation
page read and write
340E000
stack
page read and write
322C001C0000
direct allocation
page read and write
322C0093C000
direct allocation
page read and write
322C01ACC000
direct allocation
page read and write
322C01484000
direct allocation
page read and write
322C007B4000
direct allocation
page read and write
3228000B8000
direct allocation
page read and write
5C5000098000
direct allocation
page read and write
98E000
stack
page read and write
322C01CFC000
direct allocation
page read and write
262C5613000
heap
page read and write
546B000
heap
page read and write
322C010D8000
direct allocation
page read and write
262BE99E000
heap
page read and write
322800528000
direct allocation
page read and write
262C4D90000
unclassified section
page read and write
86FA5FE000
unkown
page readonly
86E85FE000
unkown
page readonly
322C01070000
direct allocation
page read and write
4DBB000
heap
page read and write
322C00510000
direct allocation
page read and write
322C013A4000
direct allocation
page read and write
4522000
heap
page read and write
6A3000
trusted library allocation
page execute and read and write
86E65FE000
unkown
page readonly
322C0034C000
direct allocation
page read and write
322C0007D000
direct allocation
page read and write
429E000
heap
page read and write
322C009D8000
direct allocation
page read and write
262C4D67000
unclassified section
page read and write
4265000
heap
page read and write
262C1FDA000
heap
page read and write
262C4D50000
unclassified section
page read and write
3228000FA000
direct allocation
page read and write
53D5000
heap
page read and write
262C5725000
heap
page read and write
322C00F70000
direct allocation
page read and write
262C5653000
heap
page read and write
3F5C000
unkown
page read and write
262C56C0000
heap
page read and write
262C7AC1000
heap
page read and write
262C4AC0000
unclassified section
page read and write
86E05FE000
unkown
page readonly
4CB9000
heap
page read and write
4848000
heap
page read and write
262C569B000
heap
page read and write
322C01104000
direct allocation
page read and write
322C01619000
direct allocation
page read and write
86E8DFA000
stack
page read and write
2F1000048000
direct allocation
page read and write
322C00FF4000
direct allocation
page read and write
322C011D8000
direct allocation
page read and write
322C00174000
direct allocation
page read and write
3E10000
heap
page read and write
262C1FCC000
heap
page read and write
103B000
stack
page read and write
262C5770000
heap
page read and write
7FFC8E231000
unkown
page execute read
322C00804000
direct allocation
page read and write
262C8670000
unkown
page readonly
262C5725000
heap
page read and write
3228004B4000
direct allocation
page read and write
262C5772000
heap
page read and write
322C004B8000
direct allocation
page read and write
7FD000
heap
page read and write
262C5770000
heap
page read and write
322C00994000
direct allocation
page read and write
322C006A0000
direct allocation
page read and write
322C01070000
direct allocation
page read and write
322C01B0C000
direct allocation
page read and write
446E000
heap
page read and write
262C1FE6000
heap
page read and write
5C5000044000
direct allocation
page read and write
322800098000
direct allocation
page read and write
322C00664000
direct allocation
page read and write
134A000
heap
page read and write
322C01720000
direct allocation
page read and write
695000
heap
page read and write
322C00720000
direct allocation
page read and write
322C00144000
direct allocation
page read and write
8680FFC000
stack
page read and write
262C4D47000
unclassified section
page read and write
2D5C000
heap
page read and write
322C00FA4000
direct allocation
page read and write
3DCA000
heap
page read and write
262C5605000
heap
page read and write
262C56A5000
heap
page read and write
5C5000029000
direct allocation
page read and write
262C5FB7000
unclassified section
page read and write
262C1360000
heap
page read and write
322C0082C000
direct allocation
page read and write
322C005C4000
direct allocation
page read and write
322C010A8000
direct allocation
page read and write
322C00314000
direct allocation
page read and write
443C000
heap
page read and write
322C0037C000
direct allocation
page read and write
322C0029C000
direct allocation
page read and write
4327000
heap
page read and write
1170000
heap
page read and write
262C562F000
heap
page read and write
262C5725000
heap
page read and write
322800428000
direct allocation
page read and write
2F1000044000
direct allocation
page read and write
42F3000
heap
page read and write
322C01980000
direct allocation
page read and write
322C00254000
direct allocation
page read and write
262BE910000
heap
page read and write
262BE9ED000
heap
page read and write
322C00088000
direct allocation
page read and write
322800498000
direct allocation
page read and write
322C00F1C000
direct allocation
page read and write
2F100000D000
direct allocation
page read and write
5C5000018000
direct allocation
page read and write
322C00C04000
direct allocation
page read and write
5C50000B8000
direct allocation
page read and write
322C01201000
direct allocation
page read and write
32280045C000
direct allocation
page read and write
322C00568000
direct allocation
page read and write
86EB5FE000
unkown
page readonly
322C001D4000
direct allocation
page read and write
322C003BC000
direct allocation
page read and write
322800248000
direct allocation
page read and write
5C50000A8000
direct allocation
page read and write
322C01958000
direct allocation
page read and write
322C013A0000
direct allocation
page read and write
322C00BA0000
direct allocation
page read and write
322C00B30000
direct allocation
page read and write
112C000
stack
page read and write
262C45C0000
unclassified section
page read and write
112A000
stack
page read and write
322C01854000
direct allocation
page read and write
5C5000054000
direct allocation
page read and write
2F1000078000
direct allocation
page read and write
42E3000
heap
page read and write
322800504000
direct allocation
page read and write
262C56C0000
heap
page read and write
322C00308000
direct allocation
page read and write
6CA000
trusted library allocation
page execute and read and write
262C5725000
heap
page read and write
262C561E000
heap
page read and write
322C01920000
direct allocation
page read and write
322800514000
direct allocation
page read and write
2F1000114000
direct allocation
page read and write
1210000
heap
page read and write
ADF000
stack
page read and write
262C5593000
heap
page read and write
2579000
trusted library allocation
page read and write
322C01720000
direct allocation
page read and write
5C5000064000
direct allocation
page read and write
322C01350000
direct allocation
page read and write
262C5772000
heap
page read and write
322C018C8000
direct allocation
page read and write
5C50000A8000
direct allocation
page read and write
262BF596000
unkown
page readonly
262C5725000
heap
page read and write
86807FE000
unkown
page readonly
262BE920000
trusted library section
page readonly
7FFC8EC31000
unkown
page execute read
322C01864000
direct allocation
page read and write
322C015C4000
direct allocation
page read and write
1334000
heap
page read and write
86DFDFE000
stack
page read and write
13A3000
heap
page read and write
322C00308000
direct allocation
page read and write
11C0000
heap
page read and write
322C001D4000
direct allocation
page read and write
86EA5FE000
unkown
page readonly
322C01AE0000
direct allocation
page read and write
322C00190000
direct allocation
page read and write
322C011A8000
direct allocation
page read and write
262C56BE000
heap
page read and write
2653000
trusted library allocation
page read and write
2F100000F000
direct allocation
page read and write
322C00118000
direct allocation
page read and write
262C56BB000
heap
page read and write
322C00D0C000
direct allocation
page read and write
322C01624000
direct allocation
page read and write
32A2000
heap
page read and write
322C00274000
direct allocation
page read and write
322C001C0000
direct allocation
page read and write
5555000
heap
page read and write
262C5770000
heap
page read and write
322C010EC000
direct allocation
page read and write
322C01C14000
direct allocation
page read and write
3D2B000
heap
page read and write
262C5725000
heap
page read and write
322C01588000
direct allocation
page read and write
7FFC8D831000
unkown
page execute read
86837FE000
unkown
page readonly
322C0195C000
direct allocation
page read and write
322C00684000
direct allocation
page read and write
262C4D6D000
unclassified section
page read and write
322C0155C000
direct allocation
page read and write
44C2000
heap
page read and write
3BCF000
stack
page read and write
322C01760000
direct allocation
page read and write
322C011CC000
direct allocation
page read and write
322C0078C000
direct allocation
page read and write
322C0005C000
direct allocation
page read and write
322C018BC000
direct allocation
page read and write
322C01940000
direct allocation
page read and write
322C00118000
direct allocation
page read and write
322C00401000
direct allocation
page read and write
322C012E8000
direct allocation
page read and write
536B000
heap
page read and write
262BEDB0000
unkown
page readonly
322C013F0000
direct allocation
page read and write
262C575F000
heap
page read and write
322C00534000
direct allocation
page read and write
322C00E90000
direct allocation
page read and write
322C01500000
direct allocation
page read and write
47D8000
heap
page read and write
262C4B13000
heap
page read and write
262C7B28000
heap
page read and write
322C00A4C000
direct allocation
page read and write
322C0081C000
direct allocation
page read and write
322C01804000
direct allocation
page read and write
86E75FE000
unkown
page readonly
322800144000
direct allocation
page read and write
262C1FDC000
heap
page read and write
2F100002C000
direct allocation
page read and write
262C4B10000
heap
page read and write
322C01988000
direct allocation
page read and write
322C0027C000
direct allocation
page read and write
86DADEE000
stack
page read and write
322C0137C000
direct allocation
page read and write
262C561E000
heap
page read and write
3228004E8000
direct allocation
page read and write
322C00CA0000
direct allocation
page read and write
4383000
heap
page read and write
2E60000
heap
page read and write
262BE9C0000
heap
page read and write
86ECDFE000
stack
page read and write
86F7DFC000
stack
page read and write
322C0017D000
direct allocation
page read and write
2F10000F7000
direct allocation
page read and write
322800438000
direct allocation
page read and write
322C00294000
direct allocation
page read and write
322C00ECC000
direct allocation
page read and write
262C45E1000
unclassified section
page read and write
1E0000
heap
page read and write
322C00EF4000
direct allocation
page read and write
322C0138C000
direct allocation
page read and write
322C00E01000
direct allocation
page read and write
262C1680000
unkown
page readonly
2F10000C8000
direct allocation
page read and write
322C00FD8000
direct allocation
page read and write
32280046C000
direct allocation
page read and write
262C5772000
heap
page read and write
322C00E04000
direct allocation
page read and write
322C00260000
direct allocation
page read and write
322C0046C000
direct allocation
page read and write
86F05FE000
unkown
page readonly
262C24F0000
unclassified section
page read and write
780000
trusted library allocation
page execute and read and write
262C569B000
heap
page read and write
4DD0000
heap
page read and write
4455000
heap
page read and write
260E000
stack
page read and write
322C01500000
direct allocation
page read and write
322C0025C000
direct allocation
page read and write
6B4000
trusted library allocation
page read and write
86E7DFD000
stack
page read and write
322C00AF8000
direct allocation
page read and write
4250000
heap
page read and write
2F10000D4000
direct allocation
page read and write
8683FFB000
stack
page read and write
9D0000
heap
page read and write
86FFDFC000
stack
page read and write
53B5000
heap
page read and write
322800410000
direct allocation
page read and write
322800458000
direct allocation
page read and write
86E4DFA000
stack
page read and write
5C50000B8000
direct allocation
page read and write
262BEA26000
heap
page read and write
4375000
heap
page read and write
322C00568000
direct allocation
page read and write
43EE000
heap
page read and write
322C00154000
direct allocation
page read and write
322C004D0000
direct allocation
page read and write
538B000
heap
page read and write
322C003D0000
direct allocation
page read and write
322C0003C000
direct allocation
page read and write
322C009A4000
direct allocation
page read and write
262C4DB0000
unclassified section
page read and write
322C01A8C000
direct allocation
page read and write
322C01824000
direct allocation
page read and write
322C01794000
direct allocation
page read and write
322C01914000
direct allocation
page read and write
322C013A4000
direct allocation
page read and write
322C00550000
direct allocation
page read and write
4CFB000
heap
page read and write
322C017A0000
direct allocation
page read and write
262BEA22000
heap
page read and write
86847FE000
unkown
page readonly
322C00DD0000
direct allocation
page read and write
86F25FE000
unkown
page readonly
322800500000
direct allocation
page read and write
42A3000
heap
page read and write
43B8000
heap
page read and write
322C01599000
direct allocation
page read and write
86FBDFE000
stack
page read and write
159E000
stack
page read and write
3E20000
heap
page read and write
5C50000F0000
direct allocation
page read and write
322C004D0000
direct allocation
page read and write
322C0003C000
direct allocation
page read and write
86897FE000
unkown
page readonly
322C01468000
direct allocation
page read and write
86EBDFE000
stack
page read and write
3228004D8000
direct allocation
page read and write
322800050000
direct allocation
page read and write
322800594000
direct allocation
page read and write
322C01A14000
direct allocation
page read and write
12D0000
heap
page read and write
322C00A52000
direct allocation
page read and write
411F000
stack
page read and write
262C5772000
heap
page read and write
262C1FE2000
heap
page read and write
550B000
heap
page read and write
322C00CB8000
direct allocation
page read and write
262C569F000
heap
page read and write
322C00338000
direct allocation
page read and write
430A000
heap
page read and write
322C0004D000
direct allocation
page read and write
B3D000
stack
page read and write
2FBE000
stack
page read and write
322C00250000
direct allocation
page read and write
322800478000
direct allocation
page read and write
790000
heap
page read and write
86FADFC000
stack
page read and write
43E4000
heap
page read and write
322C0003C000
direct allocation
page read and write
262C5725000
heap
page read and write
322C01956000
direct allocation
page read and write
322C00A24000
direct allocation
page read and write
322C0157C000
direct allocation
page read and write
322C0125C000
direct allocation
page read and write
322C0099C000
direct allocation
page read and write
262C562F000
heap
page read and write
262C4587000
unclassified section
page read and write
322800224000
direct allocation
page read and write
64E000
stack
page read and write
262C38C0000
unclassified section
page read and write
322C001A0000
direct allocation
page read and write
8687FFC000
stack
page read and write
86DE5FE000
unkown
page readonly
322C01204000
direct allocation
page read and write
5B1D000
stack
page read and write
262C563D000
heap
page read and write
262C7390000
unclassified section
page read and write
4CC6000
heap
page read and write
2F10000A0000
direct allocation
page read and write
322800558000
direct allocation
page read and write
86FF5FE000
unkown
page readonly
322C01B7C000
direct allocation
page read and write
458D000
heap
page read and write
2F10000C8000
direct allocation
page read and write
262C8501000
heap
page read and write
322C00A01000
direct allocation
page read and write
2F10000D4000
direct allocation
page read and write
322C003A4000
direct allocation
page read and write
322C00480000
direct allocation
page read and write
5C5000098000
direct allocation
page read and write
5C5000098000
direct allocation
page read and write
322C00E90000
direct allocation
page read and write
262C56BB000
heap
page read and write
262C13C0000
unkown
page readonly
86FE5FE000
unkown
page readonly
42FB000
heap
page read and write
86EFDFE000
stack
page read and write
262C1FE2000
heap
page read and write
322C00B3C000
direct allocation
page read and write
4214000
heap
page read and write
322800544000
direct allocation
page read and write
322800018000
direct allocation
page read and write
12D8000
heap
page read and write
322C00EAC000
direct allocation
page read and write
322C00154000
direct allocation
page read and write
322C008F4000
direct allocation
page read and write
86E2DFB000
stack
page read and write
262C4EC3000
unclassified section
page read and write
322800568000
direct allocation
page read and write