IOC Report
Gulvmaattens.exe

loading gif

Files

File Path
Type
Category
Malicious
Gulvmaattens.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nskEE19.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskEE19.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\Airplane_2.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\Dystomic.Bel
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\Pleasurelessly\Anodiserende.opa
data
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\english.txt
ASCII text
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\vfslog.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Gulvmaattens.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x78^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x76^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x61^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x7D^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x76^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x7F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x00^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x01^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x09^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x09^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x70^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x41^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x56^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x52^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x47^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x56^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x75^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x56^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x72^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5E^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x41^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x07^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x4B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x0B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x43^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x07^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x4B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x0B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 125 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://212.192.246.226/jLIEsqMZom33.asdL
unknown
malicious
ftp://ftp.gettoner.com.mx/droid
unknown
malicious
http://212.192.246.226/jLIEsqMZom33.asdm
unknown
malicious
http://212.192.246.226/jLIEsqMZom33.asd
212.192.246.226
malicious
http://127.0.0.1:HTTP/1.1
unknown
http://DynDns.comDynDNS
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://NwSpLV.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.certum.pl/CPS0
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
212.192.246.226
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
1D021000
trusted library allocation
page read and write
malicious
2AA0000
direct allocation
page execute and read and write
malicious
B00000
remote allocation
page execute and read and write
malicious
45F000
unkown
page readonly
DF0000
trusted library allocation
page read and write
2B8EBB74000
heap
page read and write
E00000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
E47000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1018000
heap
page read and write
2B8EB240000
heap
page read and write
F4C8B79000
stack
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
DF1000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1C1F0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1F2C0000
trusted library allocation
page read and write
2B8EBB76000
heap
page read and write
E51000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
1A5A765D000
heap
page read and write
816858B000
stack
page read and write
E50000
trusted library allocation
page read and write
A7A000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
F4C8DFB000
stack
page read and write
E30000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1F290000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
DE0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2019E000
stack
page read and write
DE0000
trusted library allocation
page read and write
1F1F2000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
F4C86CB000
stack
page read and write
1F250000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E20000
trusted library allocation
page execute and read and write
2B8EBB00000
heap
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
1A5A7659000
heap
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF1000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
100E000
heap
page read and write
E10000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1F2E0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
2B8EBB37000
heap
page read and write
E30000
trusted library allocation
page read and write
BC0000
heap
page read and write
1F1DE000
trusted library allocation
page read and write
1F240000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1F258000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E70000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1A5A7632000
heap
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
2B8EBB2D000
heap
page read and write
F4C8EFF000
stack
page read and write
1F1C0000
trusted library allocation
page read and write
2B8EB29F000
heap
page read and write
1BFF1000
heap
page read and write
DF3000
trusted library allocation
page read and write
F48000
heap
page read and write
DF3000
trusted library allocation
page read and write
DD0000
heap
page read and write
E00000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1CE0D000
trusted library allocation
page execute and read and write
1BFF1000
heap
page read and write
E30000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
1C2A6000
heap
page read and write
1D000000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
FDB000
heap
page read and write
1A5A761A000
heap
page read and write
431000
unkown
page read and write
AAA000
trusted library allocation
page read and write
8168D7A000
stack
page read and write
DF0000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
E58000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
46F9000
trusted library allocation
page read and write
1F276000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1CFD0000
trusted library allocation
page execute and read and write
DF0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1F200000
trusted library allocation
page read and write
A9A000
trusted library allocation
page read and write
1CE2A000
trusted library allocation
page execute and read and write
1BFF1000
heap
page read and write
2B8EBB2F000
heap
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
5F5000
heap
page read and write
DF0000
trusted library allocation
page read and write
1D007000
trusted library allocation
page read and write
FE7000
heap
page read and write
1F2D0000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
71406000
unkown
page readonly
E00000
trusted library allocation
page read and write
E40000
trusted library allocation
page execute and read and write
1D005000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1F290000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
101D000
heap
page read and write
E70000
trusted library allocation
page read and write
E76000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
F97000
heap
page read and write
1A5A7664000
heap
page read and write
DF0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1004000
heap
page read and write
1BFF1000
heap
page read and write
1A5A7600000
heap
page read and write
DF0000
trusted library allocation
page read and write
FF5000
heap
page read and write
1F240000
trusted library allocation
page read and write
F40000
heap
page read and write
E00000
trusted library allocation
page read and write
1F2A0000
trusted library allocation
page execute and read and write
1D000000
trusted library allocation
page read and write
42C000
unkown
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
FCB000
heap
page read and write
1A5A7649000
heap
page read and write
E00000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1F84E000
stack
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
1008000
heap
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1F2E0000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
8168C7E000
stack
page read and write
1BFF1000
heap
page read and write
E70000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1CDF0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
2B8EBB13000
heap
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E70000
trusted library allocation
page read and write
45B000
unkown
page read and write
1100000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1F1DA000
trusted library allocation
page read and write
2B8EB296000
heap
page read and write
1D000000
trusted library allocation
page read and write
2B8EBB56000
heap
page read and write
A20000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
E11000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
1F2E0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E51000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
B00000
remote allocation
page execute and read and write
E30000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1034000
heap
page read and write
DEC000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1CE30000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
E50000
trusted library allocation
page read and write
1CE00000
trusted library allocation
page read and write
2B8EBB70000
heap
page read and write
1D000000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
DFC000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1F2E0000
trusted library allocation
page read and write
2B8EBB29000
heap
page read and write
1F2D0000
trusted library allocation
page read and write
2B8EBA15000
heap
page read and write
71400000
unkown
page readonly
2B8EBB02000
heap
page read and write
2B8EB27B000
heap
page read and write
2B8EBB2A000
heap
page read and write
1E049000
trusted library allocation
page read and write
2B8EBB0E000
heap
page read and write
E00000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
1E07D000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
101E000
heap
page read and write
DF0000
trusted library allocation
page read and write
1F2F4000
heap
page read and write
71401000
unkown
page execute read
E70000
trusted library allocation
page read and write
1CFE0000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
FD5000
heap
page read and write
1C9AE000
stack
page read and write
1D006000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF3000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
440000
unkown
page read and write
204A0000
heap
page read and write
DF0000
trusted library allocation
page read and write
6B0000
heap
page read and write
E10000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DE1000
trusted library allocation
page read and write
2B8EB286000
heap
page read and write
1D000000
trusted library allocation
page read and write
1A5A763C000
heap
page read and write
1D000000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1029000
heap
page read and write
1D000000
trusted library allocation
page read and write
F8B000
heap
page read and write
E40000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
2B8EBB7C000
heap
page read and write
DF1000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
A91000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF5000
trusted library allocation
page read and write
F4C8CFC000
stack
page read and write
DF0000
trusted library allocation
page read and write
2B8EBB2C000
heap
page read and write
E35000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2B8EB28D000
heap
page read and write
DF0000
trusted library allocation
page read and write
A06000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1F028000
trusted library allocation
page read and write
1F290000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
FCE000
heap
page read and write
1D010000
heap
page execute and read and write
E65000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
F4C90FE000
stack
page read and write
E11000
trusted library allocation
page read and write
A8E000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
F4C91FE000
stack
page read and write
DF1000
trusted library allocation
page read and write
E53000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1A5A764D000
heap
page read and write
2B8EB190000
unclassified section
page readonly
DF0000
trusted library allocation
page read and write
2B8EBA00000
heap
page read and write
FF1000
heap
page read and write
1F280000
trusted library allocation
page read and write
71404000
unkown
page readonly
1D000000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
28E0000
trusted library allocation
page read and write
2560000
heap
page read and write
1F255000
trusted library allocation
page read and write
1037000
heap
page read and write
1CE03000
trusted library allocation
page execute and read and write
1D000000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
DF3000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
AE0000
heap
page read and write
1D000000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E71000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
2B8EBB6D000
heap
page read and write
101E000
heap
page read and write
DE1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
6CE000
stack
page read and write
600000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1CAB0000
heap
page read and write
2B8EB27C000
heap
page read and write
E50000
trusted library allocation
page read and write
1A5A7602000
heap
page read and write
1F1D2000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
2B8EBB2C000
heap
page read and write
1F2E0000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
DF3000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E30000
trusted library allocation
page read and write
1C6EE000
stack
page read and write
DF0000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E10000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
2B8EB26B000
heap
page read and write
1BFF1000
heap
page read and write
DE1000
trusted library allocation
page read and write
BC4000
heap
page read and write
2B8EB020000
heap
page read and write
DFA000
trusted library allocation
page read and write
718000
heap
page read and write
E51000
trusted library allocation
page read and write
1CFF0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
FE5000
heap
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
FAE000
heap
page read and write
1BFF1000
heap
page read and write
E10000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1F21B000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
103A000
heap
page read and write
1F240000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
107E000
stack
page read and write
E10000
trusted library allocation
page read and write
100E000
heap
page read and write
1D000000
trusted library allocation
page read and write
2B8EB1B0000
heap
page read and write
2B8EBB2C000
heap
page read and write
1C1EE000
stack
page read and write
E10000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1F220000
trusted library allocation
page read and write
E10000
trusted library allocation
page execute and read and write
1F50C000
stack
page read and write
1BFF1000
heap
page read and write
E10000
trusted library allocation
page read and write
2B8EBB5B000
heap
page read and write
2B8EB302000
heap
page read and write
DF0000
trusted library allocation
page read and write
7F320000
trusted library allocation
page execute and read and write
E70000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1F270000
trusted library allocation
page read and write
1F230000
trusted library allocation
page read and write
29AF000
stack
page read and write
DE0000
trusted library allocation
page read and write
FE3000
heap
page read and write
1F210000
trusted library allocation
page read and write
2B8EB2A5000
heap
page read and write
DF1000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F240000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
A9F000
trusted library allocation
page read and write
1A5A75C0000
unclassified section
page readonly
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
F93000
heap
page read and write
E70000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D005000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1F2E0000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
FEB000
heap
page read and write
E00000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1CEBC000
stack
page read and write
1D000000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
2B8EB283000
heap
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
EA0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
E53000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
A63000
trusted library allocation
page read and write
2B8EB2A2000
heap
page read and write
1F1C6000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E35000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
2B8EBB40000
heap
page read and write
1D005000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D000000
trusted library allocation
page read and write
1A5A7620000
heap
page read and write
1F1CE000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E10000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
40A000
unkown
page write copy
E70000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
2B8EB298000
heap
page read and write
1A5A7670000
heap
page read and write
DF1000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2B8EBB10000
heap
page read and write
DF1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1F1E1000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
20000
unclassified section
page readonly
ED0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E10000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E10000
trusted library allocation
page read and write
2B8EB28F000
heap
page read and write
E50000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DE1000
trusted library allocation
page read and write
FF7000
heap
page read and write
1F220000
trusted library allocation
page read and write
7A0000
remote allocation
page read and write
1D00A000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2B8EB9A0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1A5A762A000
heap
page read and write
19A000
stack
page read and write
E30000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DE1000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D005000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1F250000
trusted library allocation
page read and write
1F1E6000
trusted library allocation
page read and write
2B8EB2C0000
heap
page read and write
E50000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1A5A7520000
heap
page read and write
E50000
trusted library allocation
page read and write
1A5A7654000
heap
page read and write
1FF9E000
unkown
page read and write
DF0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
408000
unkown
page readonly
DF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
A08000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1CE7E000
stack
page read and write
1F258000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
1CFCE000
stack
page read and write
2B8EB22A000
heap
page read and write
DE0000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E11000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1BFF0000
heap
page read and write
2B8EBB74000
heap
page read and write
1F255000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
5F0000
heap
page read and write
1A5A7670000
heap
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
1A5A8002000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1D008000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1A5A7613000
heap
page read and write
1F255000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E60000
trusted library allocation
page read and write
1C00C000
heap
page read and write
1F280000
trusted library allocation
page read and write
2B8EB29A000
heap
page read and write
1CE10000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1D133000
trusted library allocation
page read and write
1CAAF000
stack
page read and write
DD4000
heap
page read and write
DF0000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF1000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1E021000
trusted library allocation
page read and write
1CE20000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
C20000
heap
page read and write
1F250000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D005000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
2B8EB2B0000
heap
page read and write
2B8EBB2C000
heap
page read and write
DE0000
trusted library allocation
page read and write
2B8EBB6B000
heap
page read and write
1CE22000
trusted library allocation
page read and write
1F2B0000
trusted library allocation
page execute and read and write
DF1000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1D008000
trusted library allocation
page read and write
A7D000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E35000
trusted library allocation
page read and write
DF3000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1F240000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E70000
trusted library allocation
page read and write
1D007000
trusted library allocation
page read and write
334C000
stack
page read and write
1BFF1000
heap
page read and write
E51000
trusted library allocation
page read and write
2B8EBB29000
heap
page read and write
1F240000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1F1BE000
stack
page read and write
FD0000
heap
page read and write
1A5A7627000
heap
page read and write
1D000000
trusted library allocation
page read and write
438000
unkown
page read and write
1A5A7640000
heap
page read and write
1BFF1000
heap
page read and write
E00000
trusted library allocation
page read and write
1CEC0000
heap
page read and write
1008000
heap
page read and write
DF0000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1A5A7656000
heap
page read and write
E10000
trusted library allocation
page read and write
1CE1D000
trusted library allocation
page execute and read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D000000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1F4C0000
heap
page execute and read and write
E40000
trusted library allocation
page read and write
1CE3B000
trusted library allocation
page execute and read and write
A6C000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
1C2A0000
heap
page read and write
1A5A75D0000
heap
page read and write
1100000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E7E000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
2B8EBA02000
heap
page read and write
DF0000
trusted library allocation
page read and write
1A5A7646000
heap
page read and write
100B000
heap
page read and write
1F2B0000
trusted library allocation
page read and write
1F2D1000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
FA5000
heap
page read and write
DF0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2B8EB2B0000
heap
page read and write
DF0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E06000
trusted library allocation
page read and write
FA0000
heap
page read and write
DE1000
trusted library allocation
page read and write
2B8EBB7C000
heap
page read and write
E51000
trusted library allocation
page read and write
6E0000
heap
page read and write
E00000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
1F2D0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
2029C000
stack
page read and write
DF3000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
1A5A7627000
heap
page read and write
1BFF1000
heap
page read and write
1D000000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1A5A7E90000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
6E8000
heap
page read and write
DE0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2B8EB25F000
heap
page read and write
1D131000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
F85000
heap
page read and write
E10000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1A5A7702000
heap
page read and write
1F250000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
A94000
trusted library allocation
page read and write
2B8EBB41000
heap
page read and write
E31000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
FA5000
heap
page read and write
E14000
trusted library allocation
page read and write
FB8000
heap
page read and write
1D000000
trusted library allocation
page read and write
1F21E000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
FB1000
heap
page read and write
E50000
trusted library allocation
page read and write
1F241000
trusted library allocation
page read and write
A92000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
FCE000
heap
page read and write
1F270000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
D4F000
stack
page read and write
1CCCA000
stack
page read and write
408000
unkown
page readonly
DE1000
trusted library allocation
page read and write
98000
stack
page read and write
1BFF1000
heap
page read and write
1F2F0000
heap
page read and write
E30000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
1BFF1000
heap
page read and write
E70000
trusted library allocation
page read and write
FBF000
heap
page read and write
E70000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
2B8EBB32000
heap
page read and write
E35000
trusted library allocation
page read and write
24CF000
stack
page read and write
DF0000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
2B8EBB76000
heap
page read and write
1BFF1000
heap
page read and write
FED000
heap
page read and write
102D000
heap
page read and write
73D000
heap
page read and write
2B8EBB70000
heap
page read and write
102A000
heap
page read and write
1F1ED000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
400000
unkown
page readonly
E30000
trusted library allocation
page read and write
B8E000
stack
page read and write
E50000
trusted library allocation
page read and write
1A5A75B0000
unclassified section
page readonly
C25000
heap
page read and write
DE0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2B8EBB0E000
heap
page read and write
DE1000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E30000
trusted library allocation
page read and write
1F280000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
F8E000
heap
page read and write
1D000000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
2B8EB329000
heap
page read and write
46C0000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
D0E000
stack
page read and write
E70000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
1CE32000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
E7B000
trusted library allocation
page read and write
400000
unkown
page readonly
E00000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
2B8EBB7C000
heap
page read and write
8168B7F000
stack
page read and write
E00000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1D135000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
344D000
stack
page read and write
DF3000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1A5A7580000
heap
page read and write
1CE35000
trusted library allocation
page execute and read and write
1D005000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
200DE000
stack
page read and write
1D008000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
FC0000
heap
page read and write
F00000
heap
page read and write
E00000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2B8EB313000
heap
page read and write
E50000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1110000
trusted library allocation
page execute and read and write
1F280000
trusted library allocation
page read and write
45F000
unkown
page readonly
F30000
trusted library allocation
page read and write
2B8EB213000
heap
page read and write
FD9000
heap
page read and write
F4C8BFE000
stack
page read and write
DF0000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
1F280000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2B8EB2C0000
heap
page read and write
1D000000
trusted library allocation
page read and write
2C30000
heap
page read and write
DF0000
trusted library allocation
page read and write
1F260000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
1F250000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E01000
trusted library allocation
page read and write
1CDC7000
stack
page read and write
1F254000
trusted library allocation
page read and write
1FFDE000
unkown
page read and write
1F255000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
2B8EB300000
heap
page read and write
E51000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1023000
heap
page read and write
40A000
unkown
page read and write
DF1000
trusted library allocation
page read and write
726000
heap
page read and write
1BFF1000
heap
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E3A000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
1F2D0000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
F4C8FFD000
stack
page read and write
DF1000
trusted library allocation
page read and write
1C007000
heap
page read and write
1D004000
trusted library allocation
page read and write
DE1000
trusted library allocation
page read and write
1CE26000
trusted library allocation
page execute and read and write
E50000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2B8EBB3B000
heap
page read and write
E70000
trusted library allocation
page read and write
1D000000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
E50000
trusted library allocation
page read and write
1CE37000
trusted library allocation
page execute and read and write
DE1000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2B8EB272000
heap
page read and write
714000
heap
page read and write
1D000000
trusted library allocation
page read and write
E52000
trusted library allocation
page read and write
1CE04000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1A5A7660000
heap
page read and write
DF0000
trusted library allocation
page read and write
72C000
heap
page read and write
10BB000
stack
page read and write
1F250000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
E03000
trusted library allocation
page read and write
2B8EB1A0000
unclassified section
page readonly
E00000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
DF0000
trusted library allocation
page read and write
E51000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
1A5A767D000
heap
page read and write
DF1000
trusted library allocation
page read and write
2B8EB090000
heap
page read and write
E70000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1F1CB000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
1D005000
trusted library allocation
page read and write
DF3000
trusted library allocation
page read and write
1BFF1000
heap
page read and write
F8A000
heap
page read and write
FF9000
heap
page read and write
DF0000
trusted library allocation
page read and write
E35000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
30000
heap
page read and write
DE1000
trusted library allocation
page read and write
1F88D000
stack
page read and write
2B8EB2AF000
heap
page read and write
2B8EB200000
heap
page read and write
1D000000
trusted library allocation
page read and write
1F2B0000
trusted library allocation
page read and write
1F255000
trusted library allocation
page read and write
1008000
heap
page read and write
1D000000
trusted library allocation
page read and write
There are 1090 hidden memdumps, click here to show them.