IOC Report
2024.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
2024.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2024.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Logon32\Logon32.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Logon32\Logon32.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Logon32.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0cz4b0yq.5fs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agzxosrv.ieo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkvdc3mz.avm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nihp0rjw.rop.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2024.scr.exe
"C:\Users\user\Desktop\2024.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\2024.scr.exe"
malicious
C:\Users\user\Desktop\2024.scr.exe
"C:\Users\user\Desktop\2024.scr.exe"
malicious
C:\Users\user\AppData\Roaming\Logon32\Logon32.exe
"C:\Users\user\AppData\Roaming\Logon32\Logon32.exe"
malicious
C:\Users\user\AppData\Roaming\Logon32\Logon32.exe
"C:\Users\user\AppData\Roaming\Logon32\Logon32.exe"
malicious
C:\Users\user\AppData\Roaming\Logon32\Logon32.exe
"C:\Users\user\AppData\Roaming\Logon32\Logon32.exe"
malicious
C:\Users\user\AppData\Roaming\Logon32\Logon32.exe
"C:\Users\user\AppData\Roaming\Logon32\Logon32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://crl.gl
unknown
http://crl.glH
unknown
http://ip-api.com
unknown
http://crl.glC
unknown
http://secure.globals
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://smtp.yandex.com
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
smtp.yandex.com
unknown
malicious
smtp.yandex.ru
77.88.21.158
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
77.88.21.158
smtp.yandex.ru
Russian Federation
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\2024_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Logon32
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Logon32_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3635000
trusted library allocation
page read and write
malicious
3BF6000
trusted library allocation
page read and write
malicious
30EC000
trusted library allocation
page read and write
malicious
408D000
trusted library allocation
page read and write
malicious
2EBC000
trusted library allocation
page read and write
malicious
376C000
trusted library allocation
page read and write
malicious
690B000
heap
page read and write
EF9000
stack
page read and write
A97000
heap
page read and write
3295000
trusted library allocation
page read and write
631E000
stack
page read and write
7D80000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
10DCF000
stack
page read and write
143A000
trusted library allocation
page execute and read and write
8DF0000
heap
page read and write
1146E000
stack
page read and write
3540000
trusted library allocation
page read and write
589E000
stack
page read and write
72D0000
trusted library allocation
page execute and read and write
8DD3000
heap
page read and write
1B20000
heap
page read and write
1098E000
stack
page read and write
647E000
stack
page read and write
28E0000
trusted library allocation
page read and write
4256000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
4336000
trusted library allocation
page read and write
37C8000
trusted library allocation
page read and write
5940000
heap
page read and write
B82E000
stack
page read and write
80F2000
heap
page read and write
996E000
stack
page read and write
1352000
trusted library allocation
page read and write
54E0000
heap
page read and write
4376000
trusted library allocation
page read and write
16B0000
trusted library allocation
page execute and read and write
CAA000
trusted library allocation
page execute and read and write
767E000
stack
page read and write
10E8F000
stack
page read and write
63BD000
stack
page read and write
5AEE000
stack
page read and write
7120000
trusted library allocation
page execute and read and write
4875000
trusted library allocation
page read and write
FCC000
stack
page read and write
572A000
trusted library allocation
page read and write
78D0000
heap
page read and write
53B0000
trusted library allocation
page read and write
666E000
stack
page read and write
B530000
heap
page read and write
2B00000
trusted library allocation
page read and write
13D2000
heap
page read and write
B97000
heap
page read and write
5050000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
5A0B000
heap
page read and write
4FBE000
stack
page read and write
3783000
trusted library allocation
page read and write
516C000
stack
page read and write
1060000
heap
page read and write
30D5000
trusted library allocation
page read and write
2793000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
5640000
heap
page read and write
5A20000
heap
page read and write
3591000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
2E50000
heap
page execute and read and write
737000
stack
page read and write
80E5000
heap
page read and write
26B5000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
109CE000
stack
page read and write
CFFE000
stack
page read and write
290A000
trusted library allocation
page execute and read and write
6C1F000
heap
page read and write
3B61000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
54F2000
trusted library allocation
page read and write
64BF000
stack
page read and write
2B2D000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
7000000
trusted library allocation
page execute and read and write
133D000
trusted library allocation
page execute and read and write
360D000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
48D5000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
FF0000
heap
page read and write
1355000
trusted library allocation
page execute and read and write
763E000
stack
page read and write
30C6000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
D250000
trusted library allocation
page execute and read and write
73C0000
heap
page read and write
32D5000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
7D5000
heap
page read and write
56F0000
heap
page execute and read and write
6240000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
663E000
stack
page read and write
565E000
stack
page read and write
54F0000
trusted library allocation
page read and write
745B000
stack
page read and write
4FE0000
heap
page read and write
8DDB000
heap
page read and write
6500000
trusted library allocation
page read and write
1653000
heap
page read and write
CECE000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
36CB000
trusted library allocation
page read and write
29BB000
stack
page read and write
4D20000
trusted library allocation
page read and write
849000
heap
page read and write
CD0000
trusted library allocation
page read and write
6B82000
heap
page read and write
A90000
heap
page read and write
3093000
trusted library allocation
page read and write
18A3000
trusted library allocation
page execute and read and write
2FEB000
trusted library allocation
page read and write
8D94000
heap
page read and write
3948000
trusted library allocation
page read and write
720C000
stack
page read and write
304F000
stack
page read and write
4655000
trusted library allocation
page read and write
11320000
heap
page read and write
5610000
heap
page read and write
F9E000
stack
page read and write
BBA000
stack
page read and write
47B5000
trusted library allocation
page read and write
3ABF000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
732E000
stack
page read and write
6FD0000
trusted library allocation
page read and write
4A61000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
1120C000
stack
page read and write
54E0000
heap
page read and write
80ED000
heap
page read and write
5DA6000
heap
page read and write
290000
unkown
page readonly
3210000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6580000
trusted library allocation
page execute and read and write
5700000
trusted library allocation
page read and write
4136000
trusted library allocation
page read and write
3E61000
trusted library allocation
page read and write
A83000
trusted library allocation
page read and write
5A5B000
stack
page read and write
817D000
heap
page read and write
8DAF000
heap
page read and write
4D0D000
trusted library allocation
page read and write
1270000
heap
page read and write
1552000
trusted library allocation
page read and write
6BB7000
heap
page read and write
50D2000
trusted library allocation
page read and write
386000
unkown
page readonly
693A000
heap
page read and write
6ABF000
stack
page read and write
33EE000
trusted library allocation
page read and write
980000
heap
page read and write
6255000
heap
page read and write
2FE0000
heap
page read and write
3074000
trusted library allocation
page read and write
29C0000
trusted library allocation
page execute and read and write
C19E000
stack
page read and write
4BEE000
trusted library allocation
page read and write
697D000
heap
page read and write
13B3000
heap
page read and write
413000
remote allocation
page execute and read and write
4236000
trusted library allocation
page read and write
2C9C000
stack
page read and write
6590000
trusted library allocation
page execute and read and write
4BB0000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
16AC000
stack
page read and write
5620000
trusted library allocation
page read and write
140D000
heap
page read and write
68ED000
stack
page read and write
5456000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
810C000
heap
page read and write
815F000
heap
page read and write
40FA000
trusted library allocation
page read and write
696E000
heap
page read and write
72C0000
trusted library allocation
page read and write
579C000
stack
page read and write
5A10000
heap
page read and write
5000000
trusted library allocation
page execute and read and write
4D30000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
10C8E000
stack
page read and write
4196000
trusted library allocation
page read and write
6C29000
heap
page read and write
14F9000
stack
page read and write
79C0000
trusted library allocation
page execute and read and write
4D38000
trusted library allocation
page read and write
6B3E000
stack
page read and write
D77000
heap
page read and write
A32E000
stack
page read and write
4D60000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
4C6C000
trusted library allocation
page read and write
5E4E000
stack
page read and write
29E0000
trusted library allocation
page read and write
31BF000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
4775000
trusted library allocation
page read and write
154A000
trusted library allocation
page execute and read and write
3560000
heap
page read and write
2DF2000
trusted library allocation
page read and write
6929000
heap
page read and write
3245000
trusted library allocation
page read and write
5BB0000
heap
page read and write
1136E000
stack
page read and write
6DEE000
stack
page read and write
55E0000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
146A000
heap
page read and write
52C5000
trusted library allocation
page read and write
11E5000
heap
page read and write
FF5000
heap
page read and write
71AE000
stack
page read and write
1354000
heap
page read and write
41F6000
trusted library allocation
page read and write
5AAD000
stack
page read and write
356C000
trusted library allocation
page read and write
62FA000
heap
page read and write
18D0000
trusted library allocation
page read and write
6B50000
heap
page read and write
5EBE000
stack
page read and write
790000
heap
page read and write
358E000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
6DFF000
stack
page read and write
2910000
trusted library allocation
page read and write
134A000
trusted library allocation
page execute and read and write
126E000
stack
page read and write
2F1D000
trusted library allocation
page read and write
627E000
stack
page read and write
1890000
trusted library allocation
page read and write
17FE000
stack
page read and write
26B0000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
B72F000
stack
page read and write
1560000
heap
page read and write
54DD000
stack
page read and write
EA9000
stack
page read and write
2DD0000
trusted library allocation
page read and write
3108000
trusted library allocation
page read and write
3A58000
trusted library allocation
page read and write
29D0000
heap
page read and write
4483000
trusted library allocation
page read and write
69BE000
stack
page read and write
9DFD000
heap
page read and write
72AF000
stack
page read and write
6C7C000
stack
page read and write
5010000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
36D0000
trusted library allocation
page read and write
1044000
trusted library allocation
page read and write
152D000
trusted library allocation
page execute and read and write
431000
remote allocation
page execute and read and write
2B26000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
6FBE000
stack
page read and write
32BA000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
5F20000
trusted library allocation
page execute and read and write
5EB9000
trusted library allocation
page read and write
28A0000
heap
page read and write
2FF1000
trusted library allocation
page read and write
79A000
stack
page read and write
80DC000
stack
page read and write
1546000
trusted library allocation
page execute and read and write
10C8E000
stack
page read and write
641E000
stack
page read and write
2680000
heap
page read and write
1445000
trusted library allocation
page execute and read and write
3A32000
trusted library allocation
page read and write
A0D000
stack
page read and write
728E000
stack
page read and write
114CE000
stack
page read and write
31C3000
trusted library allocation
page read and write
5A40000
heap
page read and write
724E000
stack
page read and write
8280000
heap
page read and write
265E000
trusted library allocation
page read and write
16C0000
heap
page read and write
4735000
trusted library allocation
page read and write
55F0000
heap
page read and write
427000
remote allocation
page execute and read and write
3110000
trusted library allocation
page read and write
4056000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
439000
remote allocation
page execute and read and write
5820000
heap
page read and write
A74000
trusted library allocation
page read and write
673E000
stack
page read and write
15B8000
heap
page read and write
B10000
heap
page read and write
2F90000
trusted library allocation
page read and write
6C00000
heap
page read and write
545D000
trusted library allocation
page read and write
398C000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
1B27000
heap
page read and write
3414000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
CB2000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
28E3000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
15CE000
stack
page read and write
113CE000
stack
page read and write
8176000
heap
page read and write
1436000
trusted library allocation
page execute and read and write
412000
remote allocation
page execute and read and write
261E000
stack
page read and write
5040000
heap
page read and write
815A000
heap
page read and write
1050000
trusted library allocation
page read and write
6E7C000
stack
page read and write
5390000
trusted library allocation
page read and write
4396000
trusted library allocation
page read and write
2666000
trusted library allocation
page read and write
4FD0000
heap
page read and write
5E7D000
stack
page read and write
2CA0000
trusted library allocation
page execute and read and write
1040000
trusted library allocation
page read and write
5D8B000
heap
page read and write
5FBE000
stack
page read and write
2917000
trusted library allocation
page execute and read and write
A73000
trusted library allocation
page execute and read and write
33AA000
trusted library allocation
page read and write
158C000
stack
page read and write
6265000
heap
page read and write
B67000
heap
page read and write
579E000
heap
page read and write
32B5000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
3700000
trusted library allocation
page read and write
297E000
stack
page read and write
34C5000
trusted library allocation
page read and write
5500000
heap
page read and write
2DFE000
trusted library allocation
page read and write
3430000
heap
page read and write
5A5E000
heap
page read and write
162D000
heap
page read and write
84F0000
heap
page read and write
46D5000
trusted library allocation
page read and write
5B5E000
stack
page read and write
783E000
stack
page read and write
3FF1000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
656E000
stack
page read and write
661E000
stack
page read and write
3379000
trusted library allocation
page read and write
6D06000
trusted library allocation
page read and write
3913000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
45F9000
trusted library allocation
page read and write
CEC0000
trusted library allocation
page read and write
1310000
heap
page read and write
3621000
trusted library allocation
page read and write
9CE000
stack
page read and write
425000
remote allocation
page execute and read and write
72A7000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
838000
heap
page read and write
F7E000
stack
page read and write
1000000
heap
page read and write
6080000
trusted library allocation
page execute and read and write
430000
remote allocation
page execute and read and write
7A0000
heap
page read and write
5D88000
heap
page read and write
8122000
heap
page read and write
1205000
heap
page read and write
8503000
heap
page read and write
52CF000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
2661000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
4176000
trusted library allocation
page read and write
3864000
trusted library allocation
page read and write
2683000
heap
page read and write
2640000
trusted library allocation
page read and write
18CA000
trusted library allocation
page execute and read and write
1390000
trusted library allocation
page read and write
6C13000
heap
page read and write
140E000
heap
page read and write
6FD2000
trusted library allocation
page read and write
DF7000
stack
page read and write
73F0000
trusted library allocation
page execute and read and write
5D96000
heap
page read and write
2DBE000
stack
page read and write
59EA000
heap
page read and write
7100000
heap
page read and write
FA9000
stack
page read and write
6C0C000
heap
page read and write
117A000
stack
page read and write
5055000
trusted library allocation
page read and write
3A6E000
trusted library allocation
page read and write
1540000
heap
page read and write
150F000
stack
page read and write
34F2000
trusted library allocation
page read and write
F37000
heap
page read and write
4BF0000
trusted library allocation
page read and write
6E3C000
stack
page read and write
5669000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
18DB000
trusted library allocation
page execute and read and write
657F000
stack
page read and write
6070000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
5B2E000
stack
page read and write
535B000
stack
page read and write
5098000
trusted library allocation
page read and write
748E000
stack
page read and write
84E0000
heap
page read and write
710B000
stack
page read and write
3550000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
6240000
heap
page read and write
C9F000
stack
page read and write
35DC000
trusted library allocation
page read and write
6B3E000
stack
page read and write
B52D000
stack
page read and write
15B0000
heap
page read and write
5825000
heap
page read and write
5451000
trusted library allocation
page read and write
D2AE000
stack
page read and write
3144000
trusted library allocation
page read and write
104D000
trusted library allocation
page execute and read and write
4DC0000
heap
page execute and read and write
6A2E000
stack
page read and write
5650000
heap
page read and write
623D000
stack
page read and write
6C2E000
heap
page read and write
2B44000
trusted library allocation
page read and write
729D000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
5284000
trusted library allocation
page read and write
4296000
trusted library allocation
page read and write
43A000
remote allocation
page execute and read and write
B60000
heap
page read and write
55E2000
trusted library allocation
page read and write
4116000
trusted library allocation
page read and write
52A2000
trusted library allocation
page read and write
D70000
heap
page read and write
5614000
heap
page read and write
1524000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
1140000
heap
page read and write
54F0000
heap
page read and write
70E0000
trusted library allocation
page read and write
1110E000
stack
page read and write
18B0000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
4B6F000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
1088000
heap
page read and write
1A6E000
stack
page read and write
4D18000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
13A8000
heap
page read and write
5380000
heap
page read and write
677E000
stack
page read and write
6D7E000
stack
page read and write
4356000
trusted library allocation
page read and write
26C0000
heap
page read and write
4976000
trusted library allocation
page read and write
18C2000
trusted library allocation
page read and write
3A06000
trusted library allocation
page read and write
1A78000
trusted library allocation
page read and write
3F05000
trusted library allocation
page read and write
2F29000
trusted library allocation
page read and write
F20000
heap
page read and write
2FC0000
heap
page execute and read and write
61DE000
stack
page read and write
4D50000
heap
page read and write
6F7E000
stack
page read and write
6A3E000
stack
page read and write
836000
heap
page read and write
3605000
trusted library allocation
page read and write
526E000
stack
page read and write
E4F000
stack
page read and write
3AD7000
trusted library allocation
page read and write
59B2000
heap
page read and write
55DA000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
811E000
heap
page read and write
486C000
stack
page read and write
2F6E000
stack
page read and write
59DF000
stack
page read and write
41B6000
trusted library allocation
page read and write
7330000
trusted library section
page read and write
3611000
trusted library allocation
page read and write
625F000
heap
page read and write
F30000
heap
page read and write
7692000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
6F7C000
stack
page read and write
7370000
heap
page read and write
619D000
stack
page read and write
8E44000
heap
page read and write
703E000
stack
page read and write
5340000
heap
page read and write
55B4000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
292000
unkown
page readonly
BF7000
heap
page read and write
6D3B000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
398A000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
F62B000
trusted library allocation
page read and write
54D0000
heap
page read and write
291B000
trusted library allocation
page execute and read and write
B9E000
stack
page read and write
30DF000
trusted library allocation
page read and write
5370000
heap
page read and write
59ED000
heap
page read and write
72A0000
trusted library allocation
page read and write
55F3000
heap
page read and write
2DE0000
trusted library allocation
page read and write
6973000
heap
page read and write
5A5B000
stack
page read and write
2EA1000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
2F4E000
stack
page read and write
3118000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
1447000
trusted library allocation
page execute and read and write
5F7E000
stack
page read and write
1043000
trusted library allocation
page execute and read and write
52AD000
trusted library allocation
page read and write
176E000
stack
page read and write
5A16000
heap
page read and write
D1C0000
trusted library section
page read and write
6E8D000
heap
page read and write
351E000
trusted library allocation
page read and write
46B5000
trusted library allocation
page read and write
2E24000
trusted library allocation
page read and write
18C0000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
18BD000
trusted library allocation
page execute and read and write
5060000
heap
page read and write
404000
remote allocation
page execute and read and write
7A0E000
stack
page read and write
403000
remote allocation
page execute and read and write
59D9000
heap
page read and write
6E0C000
heap
page read and write
353D000
stack
page read and write
3A56000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
3263000
trusted library allocation
page read and write
10B8E000
stack
page read and write
52CA000
trusted library allocation
page read and write
AF7000
stack
page read and write
105D000
trusted library allocation
page execute and read and write
1550000
trusted library allocation
page read and write
3890000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
3EE5000
trusted library allocation
page read and write
1A2C000
stack
page read and write
2F2D000
trusted library allocation
page read and write
6EF0000
heap
page read and write
53D0000
heap
page read and write
6098000
trusted library allocation
page read and write
5B60000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
CEF0000
trusted library allocation
page read and write
3961000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
3704000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
CBB000
trusted library allocation
page execute and read and write
5500000
trusted library allocation
page execute and read and write
4216000
trusted library allocation
page read and write
68C4000
heap
page read and write
2B50000
heap
page execute and read and write
28E4000
trusted library allocation
page read and write
2906000
trusted library allocation
page execute and read and write
4D02000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
1068000
heap
page read and write
3067000
trusted library allocation
page read and write
5C30000
trusted library allocation
page execute and read and write
8E2F000
heap
page read and write
316A000
trusted library allocation
page read and write
CED0000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
CEE0000
trusted library allocation
page execute and read and write
694F000
heap
page read and write
3375000
trusted library allocation
page read and write
7F7A0000
trusted library allocation
page execute and read and write
1380000
trusted library allocation
page execute and read and write
359D000
trusted library allocation
page read and write
67AE000
stack
page read and write
4E68000
trusted library allocation
page read and write
18AD000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
665F000
stack
page read and write
6580000
heap
page read and write
72EE000
stack
page read and write
6C3E000
heap
page read and write
396C000
trusted library allocation
page read and write
7BFE000
stack
page read and write
8D86000
heap
page read and write
37CA000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
28ED000
trusted library allocation
page execute and read and write
6CEE000
stack
page read and write
438000
remote allocation
page execute and read and write
50EB000
stack
page read and write
63A000
stack
page read and write
61E0000
heap
page read and write
4755000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
2620000
heap
page execute and read and write
2F99000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
47D5000
trusted library allocation
page read and write
28FD000
trusted library allocation
page execute and read and write
396A000
trusted library allocation
page read and write
52A5000
trusted library allocation
page read and write
C0F000
heap
page read and write
2FA0000
trusted library allocation
page read and write
4D2F000
trusted library allocation
page read and write
667D000
stack
page read and write
6FE6000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
536F000
trusted library section
page readonly
10CCE000
stack
page read and write
2F19000
trusted library allocation
page read and write
4CE9000
trusted library allocation
page read and write
5A50000
heap
page read and write
155B000
trusted library allocation
page execute and read and write
43B6000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
579F000
trusted library section
page readonly
4715000
trusted library allocation
page read and write
7660000
trusted library section
page read and write
D1E000
stack
page read and write
CB7000
trusted library allocation
page execute and read and write
406000
remote allocation
page execute and read and write
4C30000
trusted library allocation
page execute and read and write
2630000
trusted library allocation
page read and write
814D000
heap
page read and write
78AD000
stack
page read and write
12D7000
heap
page read and write
6C7E000
stack
page read and write
62B0000
trusted library allocation
page execute and read and write
72B0000
trusted library allocation
page read and write
13D5000
heap
page read and write
4635000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
CA6000
trusted library allocation
page execute and read and write
10F0D000
stack
page read and write
135B000
trusted library allocation
page execute and read and write
7FA80000
trusted library allocation
page execute and read and write
18A4000
trusted library allocation
page read and write
3AE4000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
8DE2000
heap
page read and write
5A30000
heap
page read and write
15E7000
heap
page read and write
1227000
heap
page read and write
6AFD000
stack
page read and write
9EF0000
trusted library allocation
page read and write
572F000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
340C000
stack
page read and write
4CFC000
stack
page read and write
55F1000
trusted library allocation
page read and write
8290000
heap
page read and write
6BB9000
heap
page read and write
4855000
trusted library allocation
page read and write
4795000
trusted library allocation
page read and write
357E000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
3970000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
64FD000
stack
page read and write
53D5000
heap
page read and write
5DCE000
heap
page read and write
5930000
heap
page read and write
30B7000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
5DAB000
heap
page read and write
3050000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
738E000
stack
page read and write
3346000
trusted library allocation
page read and write
8DA2000
heap
page read and write
370C000
trusted library allocation
page read and write
54D4000
heap
page read and write
357B000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
6CFE000
stack
page read and write
5A00000
heap
page execute and read and write
5462000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
4091000
trusted library allocation
page read and write
405000
remote allocation
page execute and read and write
18D7000
trusted library allocation
page execute and read and write
CE80000
trusted library allocation
page read and write
55B0000
heap
page read and write
40B9000
trusted library allocation
page read and write
B95000
heap
page read and write
692E000
stack
page read and write
5040000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
9D74000
heap
page read and write
18C6000
trusted library allocation
page execute and read and write
2BAF000
trusted library allocation
page read and write
5020000
heap
page read and write
43E000
remote allocation
page execute and read and write
570D000
trusted library allocation
page read and write
4C10000
heap
page read and write
3070000
trusted library allocation
page read and write
C70000
heap
page read and write
52F0000
trusted library allocation
page read and write
10FE000
stack
page read and write
3954000
trusted library allocation
page read and write
F80000
heap
page read and write
37B3000
trusted library allocation
page read and write
5D40000
heap
page read and write
1320000
trusted library allocation
page read and write
5C20000
heap
page read and write
5060000
trusted library allocation
page read and write
11F0000
heap
page read and write
37B1000
trusted library allocation
page read and write
10E0D000
stack
page read and write
2EE8000
trusted library allocation
page read and write
3599000
trusted library allocation
page read and write
B00000
heap
page read and write
1317000
heap
page read and write
344A000
trusted library allocation
page read and write
85E000
heap
page read and write
35BD000
trusted library allocation
page read and write
66AE000
stack
page read and write
1220000
heap
page read and write
3AF1000
trusted library allocation
page read and write
2795000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
A20000
heap
page read and write
5FFE000
stack
page read and write
164E000
stack
page read and write
18A0000
trusted library allocation
page read and write
54D0000
heap
page read and write
5A7E000
trusted library allocation
page read and write
70CE000
stack
page read and write
34F0000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
46F5000
trusted library allocation
page read and write
48B5000
trusted library allocation
page read and write
1523000
trusted library allocation
page execute and read and write
1346000
trusted library allocation
page execute and read and write
47F5000
trusted library allocation
page read and write
5030000
heap
page read and write
8D90000
heap
page read and write
2E30000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
577C000
stack
page read and write
3574000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
9DE0000
heap
page read and write
655B000
stack
page read and write
8A0000
heap
page read and write
111D0000
heap
page read and write
13A0000
heap
page read and write
5702000
trusted library allocation
page read and write
10F10000
heap
page read and write
32B3000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
80E3000
heap
page read and write
12E5000
heap
page read and write
166E000
stack
page read and write
1096000
heap
page read and write
8DB3000
heap
page read and write
4FC0000
trusted library section
page readonly
6CBE000
stack
page read and write
316D000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
6886000
heap
page read and write
50C0000
heap
page read and write
1432000
trusted library allocation
page read and write
50E0000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
7AE000
heap
page read and write
1060000
heap
page read and write
1B10000
trusted library allocation
page execute and read and write
7F3D0000
trusted library allocation
page execute and read and write
3958000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
12BE000
stack
page read and write
1323000
trusted library allocation
page execute and read and write
810F000
heap
page read and write
5725000
trusted library allocation
page read and write
28F3000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
5A0D000
heap
page read and write
1542000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
3564000
heap
page read and write
43B000
remote allocation
page execute and read and write
29F0000
heap
page read and write
4FF0000
trusted library allocation
page read and write
D03E000
stack
page read and write
6570000
trusted library allocation
page read and write
83DE000
stack
page read and write
592D000
stack
page read and write
6E90000
heap
page read and write
2CB0000
heap
page read and write
3597000
trusted library allocation
page read and write
D240000
trusted library allocation
page read and write
78BD000
stack
page read and write
8DAB000
heap
page read and write
3080000
heap
page read and write
266D000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
D13F000
stack
page read and write
3271000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
18D2000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
4D05000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
26D1000
trusted library allocation
page read and write
7CFF000
stack
page read and write
A80000
trusted library allocation
page read and write
F2A3000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
62AB000
stack
page read and write
3269000
trusted library allocation
page read and write
80F7000
heap
page read and write
5080000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
5300000
heap
page execute and read and write
15E5000
heap
page read and write
3614000
trusted library allocation
page read and write
2F70000
heap
page read and write
795000
heap
page read and write
7FD20000
trusted library allocation
page execute and read and write
6B40000
heap
page read and write
6BD3000
heap
page read and write
5705000
trusted library allocation
page read and write
7F340000
trusted library allocation
page execute and read and write
3917000
trusted library allocation
page read and write
7A3F000
stack
page read and write
160D000
stack
page read and write
1920000
heap
page read and write
5810000
heap
page execute and read and write
2DEE000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
436000
remote allocation
page execute and read and write
FF7000
heap
page read and write
CFA000
stack
page read and write
55FD000
trusted library allocation
page read and write
1927000
heap
page read and write
1210000
heap
page read and write
7310000
trusted library allocation
page execute and read and write
5F1E000
stack
page read and write
41D6000
trusted library allocation
page read and write
D268000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
8185000
heap
page read and write
3BB9000
trusted library allocation
page read and write
131E000
heap
page read and write
344C000
trusted library allocation
page read and write
5970000
heap
page read and write
1557000
trusted library allocation
page execute and read and write
70F0000
heap
page read and write
1533000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
5690000
heap
page execute and read and write
55DE000
trusted library allocation
page read and write
5025000
heap
page read and write
7E2000
heap
page read and write
6E36000
heap
page read and write
45D1000
trusted library allocation
page read and write
6BFC000
heap
page read and write
8127000
heap
page read and write
52D0000
trusted library allocation
page read and write
6FCD000
trusted library allocation
page read and write
7A60000
heap
page read and write
3516000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
7A6A000
heap
page read and write
5B70000
trusted library allocation
page read and write
D5C000
stack
page read and write
1093000
heap
page read and write
73B0000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
708D000
stack
page read and write
130E000
stack
page read and write
A60000
trusted library allocation
page read and write
12E0000
heap
page read and write
2EA5000
trusted library allocation
page read and write
CA2000
trusted library allocation
page read and write
111CD000
stack
page read and write
65DC000
stack
page read and write
2900000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
1342000
trusted library allocation
page read and write
4D09000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
67EB000
stack
page read and write
3E89000
trusted library allocation
page read and write
8DB8000
heap
page read and write
144B000
trusted library allocation
page execute and read and write
2B40000
trusted library allocation
page read and write
6FD7000
trusted library allocation
page read and write
15DA000
heap
page read and write
6DBE000
stack
page read and write
132E000
stack
page read and write
33B2000
trusted library allocation
page read and write
1347000
heap
page read and write
9D70000
heap
page read and write
1442000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
5790000
heap
page read and write
6689000
trusted library allocation
page read and write
B42F000
stack
page read and write
CE70000
trusted library section
page read and write
2690000
trusted library allocation
page read and write
4675000
trusted library allocation
page read and write
72EB000
trusted library allocation
page read and write
C75000
heap
page read and write
16C7000
heap
page read and write
55EE000
trusted library allocation
page read and write
32C6000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
5D4C000
stack
page read and write
3AAB000
trusted library allocation
page read and write
D260000
trusted library allocation
page read and write
153D000
trusted library allocation
page execute and read and write
3060000
heap
page execute and read and write
3285000
trusted library allocation
page read and write
72B6000
trusted library allocation
page read and write
5790000
trusted library section
page readonly
43D6000
trusted library allocation
page read and write
625A000
heap
page read and write
55B0000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
701B000
trusted library allocation
page read and write
40F6000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
1900000
heap
page read and write
59AE000
stack
page read and write
6880000
heap
page read and write
75DE000
stack
page read and write
53A0000
trusted library allocation
page execute and read and write
3ED5000
trusted library allocation
page read and write
4156000
trusted library allocation
page read and write
73D0000
heap
page read and write
37A9000
trusted library allocation
page read and write
57DE000
stack
page read and write
361D000
trusted library allocation
page read and write
4FFE000
stack
page read and write
82A3000
heap
page read and write
FDE000
stack
page read and write
5A60000
heap
page read and write
5BA9000
trusted library allocation
page read and write
29D3000
heap
page read and write
4895000
trusted library allocation
page read and write
603E000
stack
page read and write
17BE000
stack
page read and write
18D5000
trusted library allocation
page execute and read and write
6F3C000
stack
page read and write
4D40000
trusted library allocation
page read and write
3582000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
5B9E000
stack
page read and write
3EE9000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
1457000
heap
page read and write
4815000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
10F8E000
stack
page read and write
7160000
heap
page read and write
1510000
trusted library allocation
page read and write
470D000
stack
page read and write
3410000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
578C000
stack
page read and write
42B6000
trusted library allocation
page read and write
6BC8000
heap
page read and write
B5E000
stack
page read and write
2E06000
trusted library allocation
page read and write
6DE0000
heap
page read and write
10CCE000
stack
page read and write
6DF0000
heap
page read and write
73E0000
trusted library allocation
page read and write
46A6000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
7040000
trusted library allocation
page execute and read and write
3161000
trusted library allocation
page read and write
D60000
trusted library allocation
page execute and read and write
6D00000
trusted library allocation
page read and write
110CD000
stack
page read and write
38B4000
trusted library allocation
page read and write
E9E000
stack
page read and write
594C000
stack
page read and write
62F0000
heap
page read and write
5C2E000
stack
page read and write
1108E000
stack
page read and write
31C7000
trusted library allocation
page read and write
4835000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
59D3000
heap
page read and write
36D1000
trusted library allocation
page read and write
4695000
trusted library allocation
page read and write
2E9D000
trusted library allocation
page read and write
E50000
heap
page read and write
6918000
heap
page read and write
1450000
heap
page read and write
3B50000
trusted library allocation
page read and write
12D0000
heap
page read and write
4276000
trusted library allocation
page read and write
4725000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
35C0000
heap
page execute and read and write
6247000
heap
page read and write
6B7C000
stack
page read and write
1430000
trusted library allocation
page read and write
3AFD000
trusted library allocation
page read and write
80E0000
heap
page read and write
6E9C000
heap
page read and write
5A89000
trusted library allocation
page read and write
394C000
trusted library allocation
page read and write
476D000
stack
page read and write
5730000
trusted library allocation
page read and write
4DBB000
stack
page read and write
65DE000
stack
page read and write
3014000
trusted library allocation
page read and write
7A7D000
stack
page read and write
55D0000
trusted library allocation
page read and write
42D6000
trusted library allocation
page read and write
78C0000
heap
page read and write
7EF50000
trusted library allocation
page execute and read and write
5360000
trusted library section
page readonly
4316000
trusted library allocation
page read and write
1200000
heap
page read and write
6FE0000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
5DB4000
heap
page read and write
2B0B000
trusted library allocation
page read and write
734D000
stack
page read and write
58DE000
stack
page read and write
3771000
trusted library allocation
page read and write
1125000
heap
page read and write
7010000
trusted library allocation
page read and write
1130C000
stack
page read and write
A8D000
trusted library allocation
page execute and read and write
1357000
trusted library allocation
page execute and read and write
2FB0000
trusted library allocation
page read and write
6966000
heap
page read and write
1324000
trusted library allocation
page read and write
658A000
heap
page read and write
3596000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
2AFF000
stack
page read and write
18F0000
trusted library allocation
page read and write
63FB000
stack
page read and write
118E000
stack
page read and write
4D2A000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
5D83000
heap
page read and write
4C44000
trusted library allocation
page read and write
7ABE000
stack
page read and write
4D25000
trusted library allocation
page read and write
6C05000
heap
page read and write
5430000
trusted library allocation
page read and write
142C000
stack
page read and write
661E000
stack
page read and write
6D20000
trusted library allocation
page execute and read and write
4AE8000
trusted library allocation
page read and write
5670000
heap
page read and write
547C000
stack
page read and write
5C2E000
heap
page read and write
78B0000
heap
page read and write
2C5E000
stack
page read and write
31CB000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
33CE000
stack
page read and write
43C000
remote allocation
page execute and read and write
5434000
trusted library allocation
page read and write
13C8000
heap
page read and write
8D80000
heap
page read and write
A7D000
trusted library allocation
page execute and read and write
6D60000
trusted library allocation
page execute and read and write
2FA6000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
42F6000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
FF0000
heap
page read and write
787E000
stack
page read and write
2975000
trusted library allocation
page read and write
There are 1139 hidden memdumps, click here to show them.