IOC Report
RFQ-LOTUS 2024.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ-LOTUS 2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Minken.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Superambitiously.Teg
ASCII text, with very long lines (60524), with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xacbfbf00, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\27-17zLkR9
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Minken.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1t1a5bob.t2e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r04wbpr0.oz2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Keeling\Imblaze\Gorget\Cowpuncher.oml
data
dropped
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Optimummet29\Strelsens.Reg135
data
dropped
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Stewed\eufomane.mul
data
dropped
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Stewed\manifesterede.pap
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 33569792.000000
dropped
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Tveboplante\Diverged\Syntheme\udelade.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Vejgrfts\Sulfonering228\Travesty\vermenging.bes
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 68
ASCII text, with very long lines (9004)
downloaded
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ-LOTUS 2024.exe
"C:\Users\user\Desktop\RFQ-LOTUS 2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Stabejsernes=Get-Content 'C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Superambitiously.Teg';$Steticismes=$Stabejsernes.SubString(8485,3);.$Steticismes($Stabejsernes)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Users\user\AppData\Local\Temp\Minken.exe
"C:\Users\user\AppData\Local\Temp\Minken.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Paraferingen" /t REG_EXPAND_SZ /d "%Uhelds% -windowstyle minimized $Sivsanger=(Get-ItemProperty -Path 'HKCU:\Arkitekttegningers\').Daughterling;%Uhelds% ($Sivsanger)"
malicious
C:\Program Files (x86)\CwLQFsuOtiHKStQKHIUIQCCxeUfckMBKWiRKRDPADHpFqlzgBKfsrATWlUxuUFozrQkfGwXoU\AXeOTfZcitaZASZZQaupEOhzdyJUy.exe
"C:\Program Files (x86)\CwLQFsuOtiHKStQKHIUIQCCxeUfckMBKWiRKRDPADHpFqlzgBKfsrATWlUxuUFozrQkfGwXoU\AXeOTfZcitaZASZZQaupEOhzdyJUy.exe"
malicious
C:\Windows\SysWOW64\fc.exe
"C:\Windows\SysWOW64\fc.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://473750571567004317064230583514468350804565684324378075159610742091604698238217701484029465762430135913242023857750034401559054060945654540273638867228794983640833862748912121851334807031249099092790952130035074227943842970399582505875/
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1684 --field-trial-handle=1844,i,13896805619792055621,4904984186317892360,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=2052,i,55276660867092157,14850349657690875544,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Paraferingen" /t REG_EXPAND_SZ /d "%Uhelds% -windowstyle minimized $Sivsanger=(Get-ItemProperty -Path 'HKCU:\Arkitekttegningers\').Daughterling;%Uhelds% ($Sivsanger)"
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://www.google.com/async/newtab_promos
142.251.32.100
http://www.holein1sa.com/gzu1/
213.171.195.105
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.shevgin.top/gzu1/
162.0.237.22
https://thequirkyartman.co.uk/wp-includes/pLykMdE/ZIbbdBq101.bin
104.21.31.110
https://thequirkyartman.co.uk/wp-includes/pLykMdE/ZIbbdBq101.binP
unknown
https://github.com/Pester/Pester
unknown
http://www.cngdesk.com/gzu1/
47.243.134.243
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGLifzrEGIjAtAotW97xiDhn6fwnyvQS7r43dpv7E1GI8YkXR8lHG-pScMOWVMJEg8fQ1Eg1M3M4yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.32.100
http://www.qdzdvrk.shop/gzu1/
47.76.136.160
http://www.wrgardenrooms.co.uk/gzu1/?7Br4wVx=DZKnd6OrhyjSh2P2xCOvgjG8rz+hGzA4eaP9rB/8/NwqVRaBiTGrNKLJLz7ywVDYeyRbngiLRWWycf7Qti6/6bHZgHdFcdMy6ZljqO/4pGth4X6Se5W+Nzg=&Y0H=66WP
217.160.0.13
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.luckydomainz.shop/gzu1/
91.195.240.19
http://www.qdzdvrk.shop/gzu1/?7Br4wVx=Nc0+1pbABO8bD/b9Wv0Sz/i9XafwHDVY8M6N2p8pgISzJF1z8hz/2TN9JRK2WZ6dwSE5fOiQX7UBBH0PbssqVTyxxREEszEt/mQOHjL8tipl5lQA7LzYQXo=&Y0H=66WP
47.76.136.160
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.32.100
https://thequirkyartman.co.uk/1
unknown
http://www.cngdesk.com/gzu1/?7Br4wVx=qHrU/ycFjG31mFHi/zg+n8+l32EylT8zNFfCUKb22Nc1EMRw4DAgdGnBBmRrxsDJ2EJ0WhI3vZ6+3kEV8pm1/TOgq31Qtmfxg5HCN3XsFKKvE88rt5vqtco=&Y0H=66WP
47.243.134.243
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://www.holein1sa.com/gzu1/?7Br4wVx=VT8K0v27N5bGcxCaj+YYD9yKQ06FddJKrderC5Pcma0WiavcK12ZIFD1KaFj6jAJAc5C6yt/FybBtASqq9iUhSi+wlWN91M6kc0r7o/QXgUEGL9jkgBqabg=&Y0H=66WP
213.171.195.105
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.32.100
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGLafzrEGIjBT_EUKA1u8_t9vjN9UnmJR1K8IADZGF2jLdWpWbLfOyPU11p8YoYWauUFitc_MPvgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.32.100
https://thequirkyartman.co.uk/A
unknown
http://www.luckydomainz.shop/gzu1/?7Br4wVx=KINnc6YGk8HV8ei39HElS4I1DjF/UhmuqXZgjVMGlWHMmd+U6gw6qLbNy3URNR7Ucze4YdZnZ4EfPoI0+cgnC/yXbL3Ii5JH3BdQoxHuvJDFjkEgUbJI9tc=&Y0H=66WP
91.195.240.19
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://www.shevgin.top/gzu1/?7Br4wVx=kn3Ys08AlLLcTB8c3mh/ndv1lRtAG+6GF4y4CDUXNC25SpPwtUp0dEf6cWyblfDnSRkBocYG/2n1J5W5fw7V+kx237huy5oCC9wi7uOTnETtOi+sV7JzakA=&Y0H=66WP
162.0.237.22
http://www.wrgardenrooms.co.uk/gzu1/
217.160.0.13
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.theertyuiergthjk.homes
unknown
malicious
www.vegus24.org
unknown
malicious
www.golfscorecardus.com
unknown
malicious
www.sfebg.com
unknown
malicious
www.qdzdvrk.shop
unknown
malicious
www.luckydomainz.shop
unknown
malicious
www.maerealtysg.com
unknown
malicious
www.wrgardenrooms.co.uk
217.160.0.13
thequirkyartman.co.uk
104.21.31.110
www.holein1sa.com
213.171.195.105
www.cngdesk.com
47.243.134.243
vegus24.org
3.33.130.190
parkingpage.namecheap.com
91.195.240.19
www.google.com
142.251.32.100
cjhm.737773.cn
47.76.136.160
www.shevgin.top
162.0.237.22
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.0.237.22
www.shevgin.top
Canada
217.160.0.13
www.wrgardenrooms.co.uk
Germany
192.168.2.16
unknown
unknown
192.168.2.4
unknown
unknown
91.195.240.19
parkingpage.namecheap.com
Germany
239.255.255.250
unknown
Reserved
142.251.32.100
www.google.com
United States
47.243.134.243
www.cngdesk.com
United States
104.21.31.110
thequirkyartman.co.uk
United States
3.33.130.190
vegus24.org
United States
127.0.0.1
unknown
unknown
47.76.136.160
cjhm.737773.cn
United States
213.171.195.105
www.holein1sa.com
United Kingdom
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\Arkitekttegningers
Daughterling
HKEY_CURRENT_USER\Environment
Uhelds
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Paraferingen

Memdumps

Base Address
Regiontype
Protect
Malicious
4BE0000
unkown
page execute and read and write
malicious
B490000
direct allocation
page execute and read and write
malicious
7C0000
trusted library allocation
page read and write
malicious
2160000
system
page execute and read and write
malicious
800000
trusted library allocation
page read and write
malicious
22E00000
unclassified section
page execute and read and write
malicious
110000
system
page execute and read and write
malicious
5D2000
heap
page read and write
570000
unkown
page readonly
4CE2000
trusted library allocation
page read and write
6A84000
system
page read and write
8800000
heap
page read and write
6C1000
heap
page read and write
8930000
trusted library allocation
page read and write
249512A0000
remote allocation
page read and write
7C1000
unkown
page read and write
695000
heap
page read and write
648E000
trusted library allocation
page read and write
70BC000
heap
page read and write
2494BA73000
heap
page read and write
22E0000
heap
page read and write
788000
unkown
page read and write
6C1000
heap
page read and write
7A9000
unkown
page read and write
6C1000
heap
page read and write
21BD000
system
page execute and read and write
1B0000
unkown
page readonly
1A0000
unkown
page readonly
746E5FE000
unkown
page readonly
7C10000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
249512F1000
trusted library allocation
page read and write
6C1000
heap
page read and write
66B2000
system
page read and write
8B4C000
stack
page read and write
70D7000
heap
page read and write
5F2000
unkown
page execute read
2140000
remote allocation
page execute and read and write
2494C1C0000
trusted library section
page readonly
70CE000
heap
page read and write
32F0000
heap
page read and write
A20000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
87F7000
stack
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
6DA8000
system
page read and write
6C1000
heap
page read and write
210A1FBE000
trusted library allocation
page read and write
6C1000
heap
page read and write
210A1E10000
trusted library allocation
page read and write
6C1000
heap
page read and write
528E000
stack
page read and write
7DF0000
trusted library allocation
page read and write
746E6FE000
unkown
page readonly
792E000
stack
page read and write
6C1000
heap
page read and write
4D00000
trusted library allocation
page read and write
746E3FB000
stack
page read and write
22DC9000
heap
page read and write
210A0280000
heap
page read and write
7D90000
trusted library allocation
page read and write
6C1000
heap
page read and write
7CDF000
stack
page read and write
6C1000
heap
page read and write
5343000
trusted library allocation
page read and write
70BC000
heap
page read and write
6C1000
heap
page read and write
8840000
heap
page read and write
22A70000
direct allocation
page read and write
8920000
trusted library allocation
page read and write
6C1000
heap
page read and write
53C000
stack
page read and write
4F4000
heap
page read and write
65C000
heap
page read and write
70D7000
heap
page read and write
D290000
direct allocation
page execute and read and write
22A60000
direct allocation
page read and write
6C1000
heap
page read and write
848000
heap
page read and write
6C1000
heap
page read and write
5A7000
unkown
page readonly
6C1000
heap
page read and write
800000
unkown
page read and write
746E57E000
stack
page read and write
67C000
heap
page read and write
210A1FAC000
trusted library allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
7430000
direct allocation
page read and write
7C0F000
stack
page read and write
731E000
stack
page read and write
752E000
heap
page read and write
2494C31C000
heap
page read and write
22ABE000
stack
page read and write
6C1000
heap
page read and write
746F47E000
stack
page read and write
7B1D000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
2295E000
stack
page read and write
22C60000
heap
page read and write
746EA7E000
stack
page read and write
BBC000
stack
page read and write
52D0000
heap
page execute and read and write
7539000
heap
page read and write
5A7000
unkown
page readonly
7BBE000
heap
page read and write
AFE000
stack
page read and write
706E000
heap
page read and write
6C1000
heap
page read and write
4DA8000
trusted library allocation
page read and write
8BCC000
stack
page read and write
9CF000
heap
page read and write
249510E7000
heap
page read and write
657000
heap
page read and write
ACBE7FE000
stack
page read and write
2494BA78000
heap
page read and write
7DD0000
trusted library allocation
page read and write
7430000
heap
page execute and read and write
726E000
stack
page read and write
25DF000
stack
page read and write
746E7FE000
unkown
page readonly
40A000
unkown
page write copy
8B8C000
stack
page read and write
7119000
heap
page read and write
7DE0000
trusted library allocation
page read and write
5E8000
unkown
page execute read
7DB0000
trusted library allocation
page read and write
7220000
heap
page read and write
5EA000
unkown
page execute read
24950F10000
trusted library allocation
page read and write
24950F15000
trusted library allocation
page read and write
5C7000
heap
page read and write
6C1000
heap
page read and write
77AF000
stack
page read and write
4DD0000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
ACBD7FE000
stack
page read and write
735E000
stack
page read and write
51AE000
stack
page read and write
22DC0000
direct allocation
page read and write
2480000
heap
page read and write
6C1000
heap
page read and write
24950F10000
trusted library allocation
page read and write
2494C1F0000
trusted library section
page readonly
33A3000
heap
page read and write
7450000
direct allocation
page read and write
7119000
heap
page read and write
6C1000
heap
page read and write
43A000
stack
page read and write
8C30000
heap
page read and write
210A0031000
system
page execute and read and write
9690000
direct allocation
page execute and read and write
6C1000
heap
page read and write
2495102C000
heap
page read and write
6C1000
heap
page read and write
22BE0000
remote allocation
page read and write
6C1000
heap
page read and write
8940000
trusted library allocation
page read and write
2460000
heap
page read and write
6C1000
heap
page read and write
22F0000
unkown
page readonly
233F1000
direct allocation
page execute and read and write
6C1000
heap
page read and write
77EE000
stack
page read and write
746E0FE000
unkown
page readonly
6C1000
heap
page read and write
40A000
unkown
page write copy
7AE7000
heap
page read and write
8A85000
trusted library allocation
page read and write
42D4000
unclassified section
page read and write
647000
heap
page read and write
34B0000
trusted library section
page read and write
68E000
heap
page read and write
73B0000
direct allocation
page read and write
2494C302000
heap
page read and write
6C1000
heap
page read and write
24951256000
trusted library allocation
page read and write
20E0000
unkown
page read and write
6C1000
heap
page read and write
5D6000
heap
page read and write
2CB0000
heap
page read and write
848000
heap
page read and write
752D000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
7DF000
stack
page read and write
7B12000
heap
page read and write
2DCE000
direct allocation
page execute and read and write
297F000
unkown
page read and write
5D40000
remote allocation
page execute and read and write
210A1A60000
trusted library allocation
page read and write
6C1000
heap
page read and write
5CA000
heap
page read and write
6C1000
heap
page read and write
AAA000
heap
page read and write
6C1000
heap
page read and write
24951218000
trusted library allocation
page read and write
6C1000
heap
page read and write
7440000
direct allocation
page read and write
6C1000
heap
page read and write
4F4000
heap
page read and write
24950EF0000
trusted library allocation
page read and write
6C1000
heap
page read and write
5436000
trusted library allocation
page read and write
6D0000
heap
page read and write
249510C4000
heap
page read and write
63A000
heap
page read and write
840000
trusted library allocation
page read and write
6C1000
heap
page read and write
711F000
heap
page read and write
7450000
direct allocation
page read and write
21AD000
system
page execute and read and write
73E0000
direct allocation
page read and write
746E67E000
stack
page read and write
210A1E03000
trusted library allocation
page read and write
6C1000
heap
page read and write
249510FB000
heap
page read and write
6C1000
heap
page read and write
401000
unkown
page execute read
7B0D000
heap
page read and write
85F000
heap
page read and write
24951215000
trusted library allocation
page read and write
8C12000
heap
page read and write
7C0000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
7AB0000
heap
page execute and read and write
24950FE0000
trusted library allocation
page read and write
2AA0000
heap
page read and write
5E2000
heap
page read and write
22A50000
direct allocation
page read and write
2494C30C000
heap
page read and write
24951117000
heap
page read and write
6349000
trusted library allocation
page read and write
32F6000
heap
page read and write
6C1000
heap
page read and write
98000
stack
page read and write
190000
unkown
page readonly
6C1000
heap
page read and write
6C1000
heap
page read and write
2494C31A000
heap
page read and write
4CB4000
trusted library allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
4E06000
unkown
page execute and read and write
210A01B0000
heap
page read and write
7C30000
trusted library allocation
page read and write
3396000
heap
page read and write
8810000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
23E70000
unclassified section
page execute and read and write
6C1000
heap
page read and write
22BE0000
remote allocation
page read and write
70CC000
system
page read and write
22E00000
direct allocation
page read and write
22DC0000
direct allocation
page read and write
210A1FC4000
trusted library allocation
page read and write
210A1E00000
trusted library allocation
page read and write
3E1E000
unclassified section
page read and write
8E8E000
stack
page read and write
BE90000
direct allocation
page execute and read and write
2495111A000
heap
page read and write
14D000
stack
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
1D0000
heap
page read and write
ACBEFFE000
stack
page read and write
5D6000
heap
page read and write
7C4000
unkown
page readonly
6C1000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
1FF82000
system
page read and write
2494C501000
trusted library allocation
page read and write
6C1000
heap
page read and write
2F98000
stack
page read and write
4C90000
trusted library section
page read and write
8A2000
heap
page read and write
6C1000
heap
page read and write
24950F44000
trusted library allocation
page read and write
88BD000
stack
page read and write
400000
unkown
page readonly
746E97E000
stack
page read and write
23115000
heap
page read and write
34C8000
heap
page read and write
626000
unkown
page execute read
6C1000
heap
page read and write
2495101F000
heap
page read and write
5EC000
unkown
page execute read
746DFF9000
stack
page read and write
810000
heap
page read and write
77C000
unkown
page read and write
732F000
stack
page read and write
85B000
unkown
page read and write
B9E000
stack
page read and write
7714000
system
page read and write
796E000
stack
page read and write
24951200000
trusted library allocation
page read and write
2F01000
direct allocation
page execute and read and write
6C1000
heap
page read and write
3359000
heap
page read and write
210A028F000
heap
page read and write
70DF000
heap
page read and write
7C50000
trusted library allocation
page read and write
2299F000
stack
page read and write
7350000
direct allocation
page read and write
6C1000
heap
page read and write
2494BA13000
heap
page read and write
9B000
stack
page read and write
7440000
direct allocation
page read and write
6C1000
heap
page read and write
210A1E16000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
2494C1E0000
trusted library section
page readonly
D8000
stack
page read and write
E690000
direct allocation
page execute and read and write
516C000
stack
page read and write
4D8E000
stack
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
298E000
stack
page read and write
2D5D000
direct allocation
page execute and read and write
AA90000
direct allocation
page execute and read and write
5F0000
unkown
page execute read
338D000
heap
page read and write
6C1000
heap
page read and write
22840000
heap
page read and write
20272000
system
page read and write
6C1000
heap
page read and write
4C70000
heap
page read and write
232BE000
direct allocation
page execute and read and write
37E0000
unkown
page execute and read and write
249512A3000
trusted library allocation
page read and write
23E0000
unkown
page execute and read and write
6C1000
heap
page read and write
2109FFF0000
system
page execute and read and write
24950E80000
trusted library allocation
page read and write
6475000
trusted library allocation
page read and write
6C1000
heap
page read and write
210A02B1000
heap
page read and write
6C1000
heap
page read and write
69B000
heap
page read and write
2150000
heap
page read and write
227AE000
stack
page read and write
24950FD0000
trusted library allocation
page read and write
22B4E000
stack
page read and write
7D1E000
stack
page read and write
6309000
trusted library allocation
page read and write
7117000
heap
page read and write
5B00000
trusted library allocation
page read and write
59BF000
trusted library allocation
page read and write
2F82000
unclassified section
page read and write
820000
unkown
page readonly
5DC000
heap
page read and write
22DC000
stack
page read and write
250F000
stack
page read and write
7D70000
trusted library allocation
page read and write
3480000
direct allocation
page read and write
7117000
heap
page read and write
59B9000
trusted library allocation
page read and write
4DE7000
heap
page read and write
2440000
heap
page read and write
7BBA000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
2494C35A000
heap
page read and write
210A1A60000
trusted library allocation
page read and write
5A5000
unkown
page read and write
7E20000
trusted library allocation
page read and write
23EE000
unkown
page read and write
6C1000
heap
page read and write
C890000
direct allocation
page execute and read and write
739E000
stack
page read and write
23A0000
heap
page read and write
5806000
unkown
page execute and read and write
7117000
heap
page read and write
230A4000
heap
page read and write
7D1000
unkown
page readonly
249512A0000
remote allocation
page read and write
6C1000
heap
page read and write
67C000
heap
page read and write
22F0000
unkown
page readonly
6C1000
heap
page read and write
4CC9000
trusted library allocation
page read and write
7210000
heap
page read and write
72EE000
stack
page read and write
21C9000
system
page execute and read and write
4F4000
heap
page read and write
7BB4000
heap
page read and write
A97000
heap
page read and write
6C1000
heap
page read and write
210A01E0000
heap
page read and write
24950F14000
trusted library allocation
page read and write
6F3A000
system
page read and write
8E4F000
stack
page read and write
278B000
heap
page read and write
75E0000
heap
page read and write
51D0000
direct allocation
page read and write
70CE000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
32A5000
unclassified section
page read and write
64DC000
system
page read and write
6C1000
heap
page read and write
2120000
unkown
page read and write
6C1000
heap
page read and write
280E000
stack
page read and write
249510F5000
heap
page read and write
4940000
remote allocation
page execute and read and write
4D4E000
stack
page read and write
630000
heap
page read and write
22A40000
direct allocation
page read and write
2464000
heap
page read and write
6C0000
heap
page read and write
24950F00000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
24951055000
heap
page read and write
6C1000
heap
page read and write
24950E70000
trusted library allocation
page read and write
6C1000
heap
page read and write
4CC0000
trusted library allocation
page read and write
63C2000
system
page read and write
2494BA5B000
heap
page read and write
820000
unkown
page readonly
6C1000
heap
page read and write
1B0000
unkown
page readonly
7E0000
unkown
page read and write
210A1E21000
trusted library allocation
page read and write
249512A0000
remote allocation
page read and write
2494BA00000
heap
page read and write
2D30000
heap
page read and write
5D6000
heap
page read and write
4CDA000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
7C4000
unkown
page readonly
22C5F000
stack
page read and write
334D000
heap
page read and write
6D0000
heap
page read and write
6C1000
heap
page read and write
34C0000
heap
page read and write
746EDFA000
stack
page read and write
210A02AF000
heap
page read and write
2494BA2B000
heap
page read and write
6C1000
heap
page read and write
7EF000
heap
page read and write
6C1000
heap
page read and write
7F1000
unkown
page readonly
4CBD000
trusted library allocation
page execute and read and write
59E000
unkown
page readonly
22E00000
direct allocation
page read and write
5CB000
heap
page read and write
746DEFE000
unkown
page readonly
7D5D000
stack
page read and write
6C1000
heap
page read and write
840000
heap
page read and write
22BE0000
remote allocation
page read and write
6C1000
heap
page read and write
6740000
remote allocation
page execute and read and write
634000
heap
page read and write
2276D000
stack
page read and write
2495124D000
trusted library allocation
page read and write
6C1000
heap
page read and write
230A0000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
7119000
heap
page read and write
3328000
heap
page read and write
5A5000
unkown
page read and write
7530000
heap
page read and write
73A0000
direct allocation
page read and write
65C000
heap
page read and write
6C1000
heap
page read and write
233D000
stack
page read and write
6C1000
heap
page read and write
210A1C00000
heap
page read and write
666000
heap
page read and write
249512E5000
trusted library allocation
page read and write
2A8F000
stack
page read and write
2494BAA2000
heap
page read and write
6C1000
heap
page read and write
24951307000
trusted library allocation
page read and write
6C1000
heap
page read and write
ACBDFFE000
stack
page read and write
3450000
direct allocation
page read and write
5C0000
heap
page read and write
2494C200000
heap
page read and write
649000
unkown
page execute read
A090000
direct allocation
page execute and read and write
6C1000
heap
page read and write
210A1D00000
trusted library allocation
page read and write
8EA0000
direct allocation
page execute and read and write
24950F40000
trusted library allocation
page read and write
70D0000
heap
page read and write
74B0000
heap
page read and write
6C1000
heap
page read and write
22CBC000
stack
page read and write
22DBC000
stack
page read and write
2494C1A0000
trusted library section
page readonly
7380000
direct allocation
page read and write
746EC7E000
stack
page read and write
73C0000
direct allocation
page read and write
7AE4000
heap
page read and write
2494BA8E000
heap
page read and write
2915000
heap
page read and write
400000
unkown
page readonly
6C1000
heap
page read and write
210A1F01000
trusted library allocation
page read and write
6C1000
heap
page read and write
3644000
unclassified section
page read and write
71000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
2F5C000
stack
page read and write
2494C1D0000
trusted library section
page readonly
8990000
trusted library allocation
page read and write
7BDD000
heap
page read and write
7DC0000
trusted library allocation
page read and write
3C8C000
unclassified section
page read and write
2F72000
direct allocation
page execute and read and write
7880000
heap
page read and write
63A000
heap
page read and write
24951050000
heap
page read and write
8830000
trusted library allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
21D000
stack
page read and write
5D0000
heap
page read and write
2600000
heap
page read and write
5E6000
unkown
page execute read
2F9D000
stack
page read and write
2494BA7A000
heap
page read and write
66E5000
system
page read and write
22AFF000
stack
page read and write
840000
trusted library allocation
page read and write
24951230000
trusted library allocation
page read and write
239D000
stack
page read and write
7340000
direct allocation
page read and write
804000
unkown
page readonly
2494C31B000
heap
page read and write
6C1000
heap
page read and write
24950F30000
trusted library allocation
page read and write
7E6C000
stack
page read and write
4D98000
unkown
page execute and read and write
6C1000
heap
page read and write
73D0000
direct allocation
page read and write
591000
unkown
page execute read
698000
heap
page read and write
51B0000
trusted library allocation
page read and write
408000
unkown
page readonly
3470000
direct allocation
page read and write
23F0000
heap
page read and write
23E0000
heap
page read and write
70B5000
heap
page read and write
6C1000
heap
page read and write
7526000
heap
page read and write
7040000
heap
page read and write
746DBFE000
stack
page read and write
725E000
system
page read and write
6C1000
heap
page read and write
7225000
heap
page read and write
2AEF000
unkown
page read and write
626000
heap
page read and write
6C1000
heap
page read and write
24951097000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
870000
heap
page read and write
22EEC000
heap
page read and write
66A000
heap
page read and write
66F000
heap
page read and write
2DE0000
unkown
page execute and read and write
249510CD000
heap
page read and write
24950FD0000
trusted library allocation
page read and write
400000
unkown
page readonly
2B1E000
stack
page read and write
7048000
heap
page read and write
62E1000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page execute and read and write
6CC000
heap
page read and write
8C62000
heap
page read and write
2220000
system
page execute and read and write
7F1000
unkown
page readonly
6C1000
heap
page read and write
2A7F000
stack
page read and write
6C1000
heap
page read and write
8900000
trusted library allocation
page execute and read and write
210A1E0E000
trusted library allocation
page read and write
73DE000
stack
page read and write
6C1000
heap
page read and write
24951210000
trusted library allocation
page read and write
70B5000
heap
page read and write
6C1000
heap
page read and write
2494BB13000
heap
page read and write
8C70000
heap
page read and write
7D1000
unkown
page readonly
7470000
heap
page read and write
2AD0000
heap
page read and write
2495110E000
heap
page read and write
2D59000
direct allocation
page execute and read and write
24950F12000
trusted library allocation
page read and write
7B3E000
heap
page read and write
7C20000
trusted library allocation
page read and write
615000
heap
page read and write
746E4FE000
unkown
page readonly
210A002F000
system
page execute and read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
8F7000
heap
page read and write
24950F11000
trusted library allocation
page read and write
1A0000
unkown
page readonly
666000
heap
page read and write
249512C2000
trusted library allocation
page read and write
22E00000
direct allocation
page read and write
408000
unkown
page readonly
940000
unkown
page readonly
634000
heap
page read and write
89A0000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
24950EB0000
trusted library allocation
page read and write
746D67B000
stack
page read and write
249512FF000
trusted library allocation
page read and write
746E9FE000
unkown
page readonly
6C1000
heap
page read and write
24951291000
trusted library allocation
page read and write
6C1000
heap
page read and write
8EC0000
trusted library allocation
page read and write
249512BA000
trusted library allocation
page read and write
7030000
heap
page read and write
746F4FE000
unkown
page readonly
7390000
direct allocation
page read and write
401000
unkown
page execute read
24952000000
heap
page read and write
22B8F000
stack
page read and write
2494B990000
trusted library section
page read and write
6C1000
heap
page read and write
24951208000
trusted library allocation
page read and write
24951113000
heap
page read and write
2912000
heap
page read and write
59E000
unkown
page readonly
782F000
stack
page read and write
66F000
heap
page read and write
669C000
system
page read and write
3210000
heap
page read and write
2450000
heap
page read and write
88FF000
stack
page read and write
8D4E000
stack
page read and write
753D000
heap
page read and write
2494BA28000
heap
page read and write
24950EE0000
trusted library allocation
page read and write
6C1000
heap
page read and write
70DC000
heap
page read and write
6C1000
heap
page read and write
2494C840000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
7435000
heap
page execute and read and write
7AFD000
heap
page read and write
2494BAFF000
heap
page read and write
2495126C000
trusted library allocation
page read and write
5D7000
heap
page read and write
20F0000
unkown
page read and write
590000
unkown
page readonly
693000
heap
page read and write
2495110A000
heap
page read and write
2CD0000
heap
page read and write
401000
unkown
page execute read
2494CE70000
trusted library allocation
page read and write
24951113000
heap
page read and write
2560000
heap
page read and write
2494CA20000
trusted library allocation
page read and write
6C1000
heap
page read and write
325C000
unclassified section
page read and write
2CA0000
heap
page read and write
408000
unkown
page readonly
8C4000
heap
page read and write
6206000
unkown
page execute and read and write
7B97000
heap
page read and write
20644000
system
page read and write
5EE000
unkown
page execute read
2C30000
direct allocation
page execute and read and write
7D1000
unkown
page readonly
2120000
unkown
page read and write
840000
trusted library allocation
page read and write
6488000
trusted library allocation
page read and write
3300000
heap
page read and write
6C1000
heap
page read and write
70D7000
heap
page read and write
4CB0000
trusted library allocation
page read and write
746DCFE000
unkown
page readonly
6C1000
heap
page read and write
746DDFB000
stack
page read and write
7360000
direct allocation
page read and write
8F8F000
stack
page read and write
7C9E000
stack
page read and write
9367000
trusted library allocation
page read and write
580000
heap
page read and write
746EAFE000
unkown
page readonly
2494B940000
heap
page read and write
3540000
remote allocation
page execute and read and write
73F0000
direct allocation
page read and write
2BEF000
stack
page read and write
746EEFE000
unkown
page readonly
CD1000
unkown
page readonly
95B0000
direct allocation
page execute and read and write
22E4000
heap
page read and write
210A028A000
heap
page read and write
340E000
stack
page read and write
2025C000
system
page read and write
6C1000
heap
page read and write
6CE000
stack
page read and write
804000
unkown
page readonly
940000
unkown
page readonly
85E000
stack
page read and write
570000
unkown
page readonly
746D9F7000
stack
page read and write
6C1000
heap
page read and write
2494C202000
heap
page read and write
24950F30000
trusted library allocation
page read and write
24DE000
stack
page read and write
202A5000
system
page read and write
8AF000
heap
page read and write
243D000
stack
page read and write
24951043000
heap
page read and write
7520000
heap
page read and write
270E000
unkown
page read and write
7123000
heap
page read and write
550000
unkown
page readonly
8820000
trusted library allocation
page read and write
8C65000
heap
page read and write
70BC000
heap
page read and write
804000
unkown
page readonly
226ED000
stack
page read and write
5CB000
heap
page read and write
6C1000
heap
page read and write
647000
heap
page read and write
DC90000
direct allocation
page execute and read and write
7DA0000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
2495131A000
trusted library allocation
page read and write
19A000
stack
page read and write
980000
trusted library allocation
page read and write
51F0000
direct allocation
page read and write
4F0000
heap
page read and write
70DC000
heap
page read and write
210A1A60000
trusted library allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
23F0000
heap
page read and write
7B47000
heap
page read and write
2C1F000
stack
page read and write
2494BAA0000
heap
page read and write
6C1000
heap
page read and write
309C000
unclassified section
page read and write
2495120E000
trusted library allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
A4E000
stack
page read and write
1E0000
heap
page read and write
40C000
unkown
page read and write
3240000
heap
page read and write
A68000
heap
page read and write
BFD000
stack
page read and write
2494CE41000
trusted library allocation
page read and write
7E0000
unkown
page read and write
210A00C0000
heap
page read and write
6C1000
heap
page read and write
2494C1B0000
trusted library section
page readonly
21A4000
system
page execute and read and write
6C1000
heap
page read and write
52CE000
stack
page read and write
4CD0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
683000
heap
page read and write
86E000
heap
page read and write
6C1000
heap
page read and write
A60000
heap
page read and write
2494BA7D000
heap
page read and write
23470000
unclassified section
page execute and read and write
24950F00000
trusted library allocation
page read and write
401000
unkown
page execute read
249512FC000
trusted library allocation
page read and write
6C1000
heap
page read and write
70B7000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
7B15000
heap
page read and write
B3E000
stack
page read and write
24951264000
trusted library allocation
page read and write
7228000
heap
page read and write
70000
heap
page read and write
6C1000
heap
page read and write
249512E8000
trusted library allocation
page read and write
2494BA95000
heap
page read and write
70A6000
heap
page read and write
591000
unkown
page execute read
7535000
heap
page read and write
1660000
remote allocation
page execute and read and write
2445000
heap
page read and write
5CD000
heap
page read and write
7085000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
233ED000
direct allocation
page execute and read and write
5340000
remote allocation
page execute and read and write
786000
unkown
page read and write
5DC000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
66A000
heap
page read and write
22C1E000
stack
page read and write
69D000
heap
page read and write
6C1000
heap
page read and write
866000
unkown
page read and write
24951240000
trusted library allocation
page read and write
3440000
direct allocation
page read and write
24C0000
heap
page read and write
4CE0000
trusted library allocation
page read and write
6C1000
heap
page read and write
1740000
remote allocation
page execute and read and write
746ECFE000
unkown
page readonly
7C4000
unkown
page readonly
40A000
unkown
page read and write
786E000
stack
page read and write
6C1000
heap
page read and write
22F77000
heap
page read and write
277E000
stack
page read and write
27A0000
heap
page read and write
28FB000
heap
page read and write
6C1000
heap
page read and write
746DAFE000
unkown
page readonly
51E0000
direct allocation
page read and write
249E000
stack
page read and write
59B7000
trusted library allocation
page read and write
23249000
direct allocation
page execute and read and write
7C40000
trusted library allocation
page read and write
24951062000
heap
page read and write
550000
unkown
page readonly
7420000
direct allocation
page read and write
24951272000
trusted library allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
776E000
stack
page read and write
6C1000
heap
page read and write
3430000
direct allocation
page read and write
6C1000
heap
page read and write
2494BA90000
heap
page read and write
7AC000
unkown
page read and write
22E0000
heap
page read and write
43A000
stack
page read and write
6C1000
heap
page read and write
CD1000
unkown
page readonly
210A1FCE000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
8850000
heap
page read and write
8C55000
heap
page read and write
7B34000
heap
page read and write
6C1000
heap
page read and write
24951000000
heap
page read and write
2150000
heap
page read and write
3420000
direct allocation
page read and write
8C10000
heap
page read and write
70D7000
heap
page read and write
6C1000
heap
page read and write
41E0000
unkown
page execute and read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
2495126F000
trusted library allocation
page read and write
ACBCFFC000
stack
page read and write
7400000
direct allocation
page read and write
26FD000
stack
page read and write
70CE000
heap
page read and write
4DE0000
heap
page read and write
7EE70000
trusted library allocation
page execute and read and write
2494B920000
heap
page read and write
657000
heap
page read and write
6C1000
heap
page read and write
2568000
heap
page read and write
590000
unkown
page readonly
6C1000
heap
page read and write
24951102000
heap
page read and write
580000
heap
page read and write
6C1000
heap
page read and write
626000
heap
page read and write
4CB3000
trusted library allocation
page execute and read and write
621000
heap
page read and write
6C1000
heap
page read and write
60C000
heap
page read and write
C9F000
stack
page read and write
3F40000
remote allocation
page execute and read and write
860000
heap
page read and write
70D0000
heap
page read and write
2495128E000
trusted library allocation
page read and write
180000
heap
page read and write
28F0000
heap
page read and write
560000
unkown
page readonly
210A02B1000
heap
page read and write
A9D000
heap
page read and write
64EF000
trusted library allocation
page read and write
6C1000
heap
page read and write
AB0000
heap
page read and write
A99000
heap
page read and write
5E4000
unkown
page execute read
2324D000
direct allocation
page execute and read and write
6C1000
heap
page read and write
3968000
unclassified section
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
4D90000
heap
page readonly
746E77E000
stack
page read and write
6C1000
heap
page read and write
2494C300000
heap
page read and write
3AFA000
unclassified section
page read and write
7410000
direct allocation
page read and write
249512F4000
trusted library allocation
page read and write
746EBFE000
unkown
page readonly
3460000
direct allocation
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
7AD0000
trusted library allocation
page execute and read and write
560000
unkown
page readonly
4CE5000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
210A029C000
heap
page read and write
6C1000
heap
page read and write
2494BB02000
heap
page read and write
24951100000
heap
page read and write
6C1000
heap
page read and write
2494B980000
trusted library allocation
page read and write
2494C215000
heap
page read and write
7117000
heap
page read and write
2730000
heap
page read and write
890000
heap
page read and write
5200000
direct allocation
page read and write
6C1000
heap
page read and write
2494BA40000
heap
page read and write
6C1000
heap
page read and write
2820000
heap
page read and write
6C1000
heap
page read and write
7A6000
unkown
page read and write
6B6000
heap
page read and write
800000
unkown
page read and write
6C1000
heap
page read and write
7992000
heap
page read and write
22E4000
heap
page read and write
688000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
2494B950000
heap
page read and write
6D6000
heap
page read and write
2494BAB0000
heap
page read and write
2B40000
remote allocation
page execute and read and write
7E10000
trusted library allocation
page read and write
7370000
direct allocation
page read and write
6C1000
heap
page read and write
3490000
direct allocation
page read and write
2494BAB4000
heap
page read and write
6C1000
heap
page read and write
6C1000
heap
page read and write
7AE0000
heap
page read and write
A40000
heap
page read and write
875000
heap
page read and write
52E1000
trusted library allocation
page read and write
840000
heap
page read and write
8C3E000
heap
page read and write
8E90000
trusted library allocation
page read and write
6C1000
heap
page read and write
23462000
direct allocation
page execute and read and write
210A02AA000
heap
page read and write
2494C31A000
heap
page read and write
24951250000
trusted library allocation
page read and write
6C1000
heap
page read and write
630000
heap
page read and write
9CB000
heap
page read and write
2AB0000
heap
page read and write
2780000
heap
page read and write
72AE000
stack
page read and write
7B2000
unkown
page read and write
7BA4000
heap
page read and write
53C000
stack
page read and write
7117000
heap
page read and write
2272D000
stack
page read and write
21CB000
system
page execute and read and write
782000
unkown
page read and write
7123000
heap
page read and write
3320000
heap
page read and write
23120000
direct allocation
page execute and read and write
2494C313000
heap
page read and write
6A7000
heap
page read and write
70D0000
heap
page read and write
7A97000
trusted library allocation
page read and write
24A0000
heap
page read and write
6C1000
heap
page read and write
190000
unkown
page readonly
2EFD000
direct allocation
page execute and read and write
6C1000
heap
page read and write
330C000
stack
page read and write
6C1000
heap
page read and write
746EB7E000
stack
page read and write
249512A0000
trusted library allocation
page read and write
4DC0000
heap
page read and write
6C1000
heap
page read and write
3272000
unclassified section
page read and write
There are 995 hidden memdumps, click here to show them.