IOC Report
1XZFfxyWZA.exe

loading gif

Files

File Path
Type
Category
Malicious
1XZFfxyWZA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\667869\Approaches.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:38 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\667869\N
data
dropped
C:\Users\user\AppData\Local\Temp\667869\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Abu
data
dropped
C:\Users\user\AppData\Local\Temp\Accepted
ASCII text, with very long lines (704), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Accepted.bat
ASCII text, with very long lines (704), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Mac
data
dropped
C:\Users\user\AppData\Local\Temp\Marco
data
dropped
C:\Users\user\AppData\Local\Temp\Preparation
data
dropped
C:\Users\user\AppData\Local\Temp\Recommendations
data
dropped
C:\Users\user\AppData\Local\Temp\Sustained
data
dropped
C:\Users\user\AppData\Local\Temp\Sw
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp296F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp297F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Understand
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1XZFfxyWZA.exe
"C:\Users\user\Desktop\1XZFfxyWZA.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Accepted Accepted.bat & Accepted.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 667869
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "AvenueAdaptorDuiDivision" Marco
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Preparation + ..\Sustained + ..\Recommendations + ..\Sw + ..\Mac + ..\Understand N
malicious
C:\Users\user\AppData\Local\Temp\667869\Approaches.pif
Approaches.pif N
malicious
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
malicious
C:\Users\user\AppData\Local\Temp\667869\RegAsm.exe
C:\Users\user\AppData\Local\Temp\667869\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
https://www.autoitscript.com/autoit3/
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qzvkxaAyizkCBLIA.qzvkxaAyizkCBLIA
unknown

IPs

IP
Domain
Country
Malicious
87.120.115.20
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
4D5D000
trusted library allocation
page read and write
malicious
4D11000
trusted library allocation
page read and write
malicious
4D11000
trusted library allocation
page read and write
malicious
4F11000
trusted library allocation
page read and write
malicious
4D5E000
trusted library allocation
page read and write
malicious
4F11000
trusted library allocation
page read and write
malicious
732000
remote allocation
page execute and read and write
malicious
4E60000
trusted library allocation
page read and write
malicious
4DC5000
trusted library allocation
page read and write
malicious
53BB000
trusted library allocation
page read and write
malicious
4DC5000
trusted library allocation
page read and write
malicious
3D9F000
heap
page read and write
malicious
4F11000
trusted library allocation
page read and write
malicious
5AD000
heap
page read and write
29FC000
heap
page read and write
4B90000
trusted library allocation
page read and write
E1E000
stack
page read and write
725A000
trusted library allocation
page read and write
18F8000
heap
page read and write
61A6000
heap
page read and write
7360000
trusted library allocation
page read and write
500E000
stack
page read and write
61C4000
heap
page read and write
60B9000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
3FA000
stack
page read and write
3E82000
trusted library allocation
page read and write
4E93000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
29F3000
heap
page read and write
5F2E000
stack
page read and write
3D88000
heap
page read and write
51CC000
trusted library allocation
page read and write
67F2000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
28EF000
stack
page read and write
4F11000
trusted library allocation
page read and write
88E000
stack
page read and write
19E7000
heap
page read and write
29F1000
heap
page read and write
860000
heap
page read and write
1AF4000
heap
page read and write
5A4000
heap
page read and write
53AD000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
2A97000
trusted library allocation
page read and write
61D9000
heap
page read and write
29F7000
heap
page read and write
37B2000
trusted library allocation
page read and write
26EE000
stack
page read and write
2C5E000
trusted library allocation
page read and write
568000
heap
page read and write
3E33000
heap
page read and write
4E0F000
trusted library allocation
page read and write
8B2000
heap
page read and write
70B5000
heap
page read and write
190C000
heap
page read and write
37D5000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
282B000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
2A47000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
36FF000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
6151000
heap
page read and write
8B2000
heap
page read and write
29F6000
trusted library allocation
page read and write
346E000
heap
page read and write
4E22000
trusted library allocation
page read and write
3483000
heap
page read and write
2D24000
trusted library allocation
page read and write
3320000
heap
page read and write
381C000
trusted library allocation
page read and write
3DB2000
heap
page read and write
4DB4000
trusted library allocation
page read and write
4261000
heap
page read and write
8B2000
heap
page read and write
4261000
heap
page read and write
3D88000
heap
page read and write
36F1000
trusted library allocation
page read and write
7097000
heap
page read and write
62B0000
trusted library allocation
page read and write
1AB6000
heap
page read and write
3E20000
heap
page read and write
358F000
stack
page read and write
6F20000
heap
page read and write
545F000
trusted library allocation
page read and write
1B36000
heap
page read and write
29FE000
trusted library allocation
page read and write
8A2000
heap
page read and write
5AD000
heap
page read and write
2580000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
60B7000
trusted library allocation
page read and write
1734000
heap
page read and write
18D5000
heap
page read and write
1B9F000
heap
page read and write
4261000
heap
page read and write
37ED000
trusted library allocation
page read and write
1AB6000
heap
page read and write
8A0000
heap
page read and write
4261000
heap
page read and write
4EAA000
trusted library allocation
page read and write
89F000
heap
page read and write
3E84000
trusted library allocation
page read and write
98000
stack
page read and write
4261000
heap
page read and write
196D000
heap
page read and write
7265000
trusted library allocation
page read and write
1B37000
heap
page read and write
1949000
heap
page read and write
620E000
trusted library allocation
page read and write
15CD000
stack
page read and write
53BF000
trusted library allocation
page read and write
617F000
heap
page read and write
6211000
trusted library allocation
page read and write
520000
heap
page read and write
1927000
heap
page read and write
531B000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
574000
unkown
page write copy
3D95000
heap
page read and write
40B000
unkown
page read and write
4261000
heap
page read and write
6340000
trusted library allocation
page execute and read and write
60EC000
heap
page read and write
3778000
heap
page read and write
1942000
heap
page read and write
296F000
trusted library allocation
page read and write
8B2000
heap
page read and write
285E000
trusted library allocation
page read and write
8D0000
heap
page read and write
2836000
trusted library allocation
page read and write
7340000
trusted library allocation
page execute and read and write
8AE000
heap
page read and write
376C000
trusted library allocation
page read and write
78EF000
stack
page read and write
28F6000
trusted library allocation
page read and write
1919000
heap
page read and write
3D8B000
heap
page read and write
8B6000
heap
page read and write
18CC000
heap
page read and write
66E000
stack
page read and write
2798000
trusted library allocation
page read and write
29F4000
heap
page read and write
348B000
heap
page read and write
46C000
stack
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
59B000
heap
page read and write
60A0000
trusted library allocation
page read and write
1895000
heap
page read and write
2C3A000
trusted library allocation
page read and write
1B34000
heap
page read and write
1B5F000
heap
page read and write
190A000
heap
page read and write
59EE000
stack
page read and write
3483000
heap
page read and write
18DC000
heap
page read and write
8AE000
heap
page read and write
2B14000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
4D11000
trusted library allocation
page read and write
3770000
heap
page read and write
1BE9000
heap
page read and write
4EB8000
trusted library allocation
page read and write
8B6000
heap
page read and write
37DB000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
2AA7000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
1948000
heap
page read and write
4EB8000
trusted library allocation
page read and write
18C8000
heap
page read and write
1C5D000
heap
page read and write
2865000
trusted library allocation
page read and write
1AC1000
heap
page read and write
3440000
heap
page read and write
1A63000
heap
page read and write
4EA2000
trusted library allocation
page read and write
19BB000
heap
page read and write
4B70000
trusted library allocation
page read and write
18CB000
heap
page read and write
8B2000
heap
page read and write
4B9B000
trusted library allocation
page read and write
5CAE000
stack
page read and write
1C16000
heap
page read and write
53B2000
trusted library allocation
page read and write
540000
unkown
page readonly
7044000
heap
page read and write
385A000
trusted library allocation
page read and write
4261000
heap
page read and write
1BFE000
heap
page read and write
2B92000
trusted library allocation
page read and write
1BB1000
heap
page read and write
4261000
heap
page read and write
792E000
stack
page read and write
19E7000
heap
page read and write
4EB8000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
59B000
heap
page read and write
1965000
heap
page read and write
4BAE000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
3E4B000
heap
page read and write
348B000
heap
page read and write
1BDB000
heap
page read and write
29FA000
heap
page read and write
530000
heap
page read and write
1B26000
heap
page read and write
408000
unkown
page readonly
59F000
heap
page read and write
7249000
trusted library allocation
page read and write
2AB3000
heap
page read and write
4F44000
trusted library allocation
page read and write
4D9F000
trusted library allocation
page read and write
2ABA000
trusted library allocation
page read and write
4680000
heap
page read and write
1AC5000
heap
page read and write
18EB000
heap
page read and write
55E000
stack
page read and write
4B0000
unkown
page readonly
346E000
heap
page read and write
2910000
trusted library allocation
page read and write
3D9F000
heap
page read and write
2A4C000
trusted library allocation
page read and write
4D11000
trusted library allocation
page read and write
1971000
heap
page read and write
582000
heap
page read and write
8C5000
heap
page read and write
2280000
heap
page read and write
1E0000
heap
page read and write
4C82000
trusted library allocation
page read and write
4BF5000
trusted library allocation
page read and write
705E000
heap
page read and write
4261000
heap
page read and write
4D93000
trusted library allocation
page read and write
1A5A000
heap
page read and write
1942000
heap
page read and write
8B6000
heap
page read and write
8B2000
heap
page read and write
3E24000
heap
page read and write
6220000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
566000
unkown
page readonly
18D1000
heap
page read and write
347D000
heap
page read and write
725F000
trusted library allocation
page read and write
348B000
heap
page read and write
19A2000
heap
page read and write
1B70000
heap
page read and write
6F1C000
stack
page read and write
7390000
trusted library allocation
page execute and read and write
5110000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
730000
remote allocation
page execute and read and write
19EB000
heap
page read and write
5313000
trusted library allocation
page read and write
2FEC000
stack
page read and write
1948000
heap
page read and write
5130000
trusted library allocation
page read and write
3499000
heap
page read and write
3848000
trusted library allocation
page read and write
5AD000
heap
page read and write
2CB6000
trusted library allocation
page read and write
8D6000
heap
page read and write
246F000
stack
page read and write
4F11000
trusted library allocation
page read and write
5DEF000
stack
page read and write
4261000
heap
page read and write
726F000
trusted library allocation
page read and write
18A4000
heap
page read and write
18D7000
heap
page read and write
4C80000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
7148000
heap
page read and write
4261000
heap
page read and write
4261000
heap
page read and write
5E0000
heap
page read and write
8D3000
heap
page read and write
530F000
stack
page read and write
1B31000
heap
page read and write
289D000
trusted library allocation
page read and write
1A82000
heap
page read and write
2992000
trusted library allocation
page read and write
1AF4000
heap
page read and write
4D8E000
trusted library allocation
page read and write
3450000
heap
page read and write
197C000
heap
page read and write
7038000
heap
page read and write
3835000
trusted library allocation
page read and write
1B7E000
heap
page read and write
7280000
trusted library allocation
page read and write
4261000
heap
page read and write
19DF000
heap
page read and write
1BCB000
heap
page read and write
9A8000
heap
page read and write
4D11000
trusted library allocation
page read and write
1878000
heap
page read and write
7258000
trusted library allocation
page read and write
3D9F000
heap
page read and write
4261000
heap
page read and write
963000
trusted library allocation
page execute and read and write
8AE000
heap
page read and write
4C00000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
23D0000
heap
page read and write
4261000
heap
page read and write
695000
heap
page read and write
4E22000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
28F8000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
198E000
heap
page read and write
618A000
heap
page read and write
348B000
heap
page read and write
996000
trusted library allocation
page execute and read and write
3841000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
7162000
heap
page read and write
18E5000
heap
page read and write
37AF000
trusted library allocation
page read and write
3E1F000
heap
page read and write
712C000
heap
page read and write
343E000
stack
page read and write
2C2B000
trusted library allocation
page read and write
23AE000
stack
page read and write
504E000
stack
page read and write
23E0000
heap
page execute and read and write
3472000
heap
page read and write
5007000
trusted library allocation
page read and write
7242000
trusted library allocation
page read and write
3470000
heap
page read and write
482B000
stack
page read and write
53B0000
heap
page read and write
24D0000
trusted library allocation
page execute and read and write
510000
heap
page read and write
1ACF000
heap
page read and write
36BC000
stack
page read and write
1850000
heap
page read and write
1C60000
heap
page read and write
1972000
heap
page read and write
382A000
trusted library allocation
page read and write
12C000
stack
page read and write
8D6000
heap
page read and write
323C000
stack
page read and write
3290000
heap
page read and write
3E42000
heap
page read and write
FAD000
stack
page read and write
4E22000
trusted library allocation
page read and write
1AA2000
heap
page read and write
3483000
heap
page read and write
4261000
heap
page read and write
2CCD000
trusted library allocation
page read and write
350000
unkown
page readonly
4261000
heap
page read and write
199C000
heap
page read and write
82F000
stack
page read and write
25D0000
heap
page read and write
772E000
stack
page read and write
4D44000
trusted library allocation
page read and write
3733000
trusted library allocation
page read and write
23A0000
heap
page read and write
7020000
heap
page read and write
1AE9000
heap
page read and write
3F10000
heap
page read and write
4F4000
unkown
page readonly
3483000
heap
page read and write
37E7000
trusted library allocation
page read and write
61DE000
heap
page read and write
2AA5000
heap
page read and write
8C5000
heap
page read and write
8AE000
heap
page read and write
19E9000
heap
page read and write
357E000
stack
page read and write
1BC4000
heap
page read and write
4DC5000
trusted library allocation
page read and write
28F0000
heap
page read and write
1954000
heap
page read and write
7364000
trusted library allocation
page read and write
64D0000
trusted library allocation
page execute and read and write
3458000
heap
page read and write
4261000
heap
page read and write
7104000
heap
page read and write
67AD000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
4261000
heap
page read and write
4261000
heap
page read and write
25EF000
stack
page read and write
19EA000
heap
page read and write
8CE000
heap
page read and write
2B0C000
trusted library allocation
page read and write
77EE000
stack
page read and write
4D11000
trusted library allocation
page read and write
3E43000
heap
page read and write
3DD9000
heap
page read and write
19AC000
heap
page read and write
7370000
trusted library allocation
page execute and read and write
1B92000
heap
page read and write
1BF0000
heap
page read and write
2B85000
trusted library allocation
page read and write
3DD3000
heap
page read and write
EC000
stack
page read and write
2BD1000
trusted library allocation
page read and write
4D9F000
trusted library allocation
page read and write
4BC2000
trusted library allocation
page read and write
62E000
stack
page read and write
8C5000
heap
page read and write
24E0000
heap
page read and write
18F7000
heap
page read and write
189F000
heap
page read and write
6250000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
4DF8000
trusted library allocation
page read and write
F60000
heap
page read and write
675E000
stack
page read and write
6129000
heap
page read and write
4D53000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
28CC000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
1BAA000
heap
page read and write
1AAC000
heap
page read and write
234B000
trusted library allocation
page execute and read and write
18A2000
heap
page read and write
189A000
heap
page read and write
3E46000
heap
page read and write
4E8E000
stack
page read and write
8D5000
heap
page read and write
18EF000
heap
page read and write
2A4A000
trusted library allocation
page read and write
7AF000
stack
page read and write
1B1D000
heap
page read and write
50DA000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
2290000
heap
page read and write
4BBD000
trusted library allocation
page read and write
776000
remote allocation
page execute and read and write
3790000
trusted library allocation
page read and write
58D000
heap
page read and write
60B5000
trusted library allocation
page read and write
1AC1000
heap
page read and write
2B71000
trusted library allocation
page read and write
679E000
stack
page read and write
18A4000
heap
page read and write
579000
unkown
page readonly
6170000
heap
page read and write
2908000
heap
page read and write
1BC5000
heap
page read and write
60A8000
trusted library allocation
page read and write
2905000
trusted library allocation
page read and write
1AAC000
heap
page read and write
1C40000
heap
page read and write
4261000
heap
page read and write
1BE9000
heap
page read and write
7F4C0000
trusted library allocation
page execute and read and write
8A2000
heap
page read and write
1928000
heap
page read and write
5FB0000
trusted library allocation
page execute and read and write
1BDB000
heap
page read and write
2438000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
3483000
heap
page read and write
1BF7000
heap
page read and write
3803000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
3E62000
heap
page read and write
2A55000
trusted library allocation
page read and write
191A000
heap
page read and write
59E000
heap
page read and write
190000
heap
page read and write
1BF7000
heap
page read and write
2AA1000
trusted library allocation
page read and write
EF9000
stack
page read and write
4FD6000
trusted library allocation
page read and write
1892000
heap
page read and write
2AD0000
trusted library allocation
page read and write
6122000
heap
page read and write
4FF1000
trusted library allocation
page read and write
4F4000
unkown
page readonly
19C7000
heap
page read and write
2B09000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
4B1000
unkown
page execute read
23B0000
heap
page read and write
77AE000
stack
page read and write
347C000
heap
page read and write
970000
trusted library allocation
page read and write
4E22000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
346E000
heap
page read and write
7A2E000
stack
page read and write
8A2000
heap
page read and write
23D3000
heap
page read and write
2931000
trusted library allocation
page read and write
4261000
heap
page read and write
191A000
heap
page read and write
9E0000
heap
page read and write
4C20000
trusted library allocation
page read and write
4E07000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
5802000
heap
page read and write
6F7000
stack
page read and write
8C5000
heap
page read and write
2A38000
trusted library allocation
page read and write
15FC000
stack
page read and write
4BF0000
trusted library allocation
page read and write
4261000
heap
page read and write
48F000
unkown
page read and write
1903000
heap
page read and write
1AC1000
heap
page read and write
8A2000
heap
page read and write
18F0000
heap
page read and write
7278000
trusted library allocation
page read and write
1830000
heap
page read and write
52CE000
stack
page read and write
4261000
heap
page read and write
2BC7000
trusted library allocation
page read and write
8A2000
heap
page read and write
855000
heap
page read and write
206E000
stack
page read and write
2A43000
trusted library allocation
page read and write
703E000
heap
page read and write
35E000
unkown
page readonly
1913000
heap
page read and write
3D8B000
heap
page read and write
2342000
trusted library allocation
page read and write
4C70000
heap
page execute and read and write
1870000
heap
page read and write
500000
heap
page read and write
8C5000
heap
page read and write
2908000
trusted library allocation
page read and write
4E5F000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
18C9000
heap
page read and write
283D000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4261000
heap
page read and write
E5F000
stack
page read and write
623E000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
661C000
stack
page read and write
372C000
trusted library allocation
page read and write
4E07000
trusted library allocation
page read and write
5181000
trusted library allocation
page read and write
1A08000
heap
page read and write
1B7E000
heap
page read and write
79F000
stack
page read and write
22F0000
heap
page read and write
1B99000
heap
page read and write
1AC2000
heap
page read and write
2CAB000
trusted library allocation
page read and write
57E000
heap
page read and write
1A08000
heap
page read and write
3D9F000
heap
page read and write
5118000
trusted library allocation
page read and write
8B6000
heap
page read and write
1B9F000
heap
page read and write
3E80000
trusted library allocation
page read and write
18CE000
heap
page read and write
4F11000
trusted library allocation
page read and write
4261000
heap
page read and write
53B0000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
7245000
trusted library allocation
page read and write
196D000
heap
page read and write
4D11000
trusted library allocation
page read and write
8EE000
heap
page read and write
4E60000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
1A19000
heap
page read and write
29F0000
heap
page read and write
26F0000
heap
page read and write
1BE0000
heap
page read and write
29FE000
heap
page read and write
4BE8000
trusted library allocation
page read and write
1893000
heap
page read and write
7184000
heap
page read and write
3E62000
heap
page read and write
29DE000
trusted library allocation
page read and write
1AF4000
heap
page read and write
8D3000
heap
page read and write
2C50000
trusted library allocation
page read and write
7034000
heap
page read and write
2AC8000
trusted library allocation
page read and write
EE0000
heap
page read and write
84E000
stack
page read and write
401000
unkown
page execute read
60AA000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1AA3000
heap
page read and write
50C0000
trusted library allocation
page read and write
3D99000
heap
page read and write
40B000
unkown
page write copy
908000
heap
page read and write
34A1000
heap
page read and write
2C66000
trusted library allocation
page read and write
618F000
heap
page read and write
8C5000
heap
page read and write
70C2000
heap
page read and write
623B000
trusted library allocation
page read and write
1B19000
heap
page read and write
3F14000
heap
page read and write
8B6000
heap
page read and write
8B2000
heap
page read and write
4261000
heap
page read and write
5313000
trusted library allocation
page read and write
5A5000
heap
page read and write
538F000
stack
page read and write
1B75000
heap
page read and write
733E000
stack
page read and write
18A2000
heap
page read and write
18CC000
heap
page read and write
28C4000
trusted library allocation
page read and write
3720000
trusted library allocation
page read and write
41F000
unkown
page read and write
3D99000
heap
page read and write
6198000
heap
page read and write
62D0000
trusted library allocation
page execute and read and write
4261000
heap
page read and write
73DE000
stack
page read and write
4D11000
trusted library allocation
page read and write
1940000
heap
page read and write
97D000
trusted library allocation
page execute and read and write
3719000
trusted library allocation
page read and write
707C000
heap
page read and write
19B9000
heap
page read and write
61BD000
heap
page read and write
50F000
stack
page read and write
8A2000
heap
page read and write
400000
unkown
page readonly
534E000
stack
page read and write
5AD000
heap
page read and write
64B0000
trusted library allocation
page execute and read and write
6240000
trusted library allocation
page read and write
4FD1000
trusted library allocation
page read and write
4E20000
trusted library allocation
page execute and read and write
8EE000
heap
page read and write
6480000
trusted library allocation
page read and write
1BC4000
heap
page read and write
4D10000
trusted library allocation
page read and write
8B2000
heap
page read and write
37F4000
trusted library allocation
page read and write
1AA2000
heap
page read and write
37F8000
trusted library allocation
page read and write
383B000
trusted library allocation
page read and write
2800000
heap
page read and write
2B06000
trusted library allocation
page read and write
8B2000
heap
page read and write
7350000
trusted library allocation
page read and write
7151000
heap
page read and write
4EB8000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
FFE000
stack
page read and write
4261000
heap
page read and write
2C37000
trusted library allocation
page read and write
980000
heap
page read and write
3E20000
heap
page read and write
188F000
heap
page read and write
348F000
heap
page read and write
1BF7000
heap
page read and write
8B6000
heap
page read and write
1C4C000
heap
page read and write
408000
unkown
page readonly
4D0F000
stack
page read and write
510E000
stack
page read and write
A82000
heap
page read and write
4BB1000
trusted library allocation
page read and write
1BF7000
heap
page read and write
8C5000
heap
page read and write
2B9A000
trusted library allocation
page read and write
2430000
trusted library allocation
page read and write
4261000
heap
page read and write
331F000
stack
page read and write
50C5000
trusted library allocation
page read and write
2B6E000
trusted library allocation
page read and write
382F000
trusted library allocation
page read and write
7057000
heap
page read and write
2340000
trusted library allocation
page read and write
61F6000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
4261000
heap
page read and write
4261000
heap
page read and write
EDF000
stack
page read and write
29F8000
heap
page read and write
3D9F000
heap
page read and write
3E41000
heap
page read and write
1B28000
heap
page read and write
570000
unkown
page read and write
905000
heap
page read and write
192B000
heap
page read and write
4EB8000
trusted library allocation
page read and write
19A2000
heap
page read and write
50B0000
heap
page read and write
4261000
heap
page read and write
1A03000
heap
page read and write
4261000
heap
page read and write
4F53000
trusted library allocation
page read and write
490F000
stack
page read and write
9A0000
heap
page read and write
4BB6000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
57F000
heap
page read and write
19E8000
heap
page read and write
18E1000
heap
page read and write
1BEC000
heap
page read and write
690000
heap
page read and write
A4D000
heap
page read and write
18F9000
heap
page read and write
1B43000
heap
page read and write
4261000
heap
page read and write
59F000
stack
page read and write
19A000
stack
page read and write
19BA000
heap
page read and write
53EF000
trusted library allocation
page read and write
528F000
stack
page read and write
8B6000
heap
page read and write
8C5000
heap
page read and write
8C5000
heap
page read and write
4E36000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
2A95000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page execute and read and write
2BDF000
trusted library allocation
page read and write
8B6000
heap
page read and write
6490000
trusted library allocation
page read and write
1984000
heap
page read and write
3D9F000
heap
page read and write
1926000
heap
page read and write
9D4000
heap
page read and write
4D11000
trusted library allocation
page read and write
4261000
heap
page read and write
191A000
heap
page read and write
6235000
trusted library allocation
page read and write
1BCB000
heap
page read and write
4D90000
trusted library allocation
page read and write
8CE000
heap
page read and write
4EB5000
trusted library allocation
page read and write
900000
heap
page read and write
2BEA000
trusted library allocation
page read and write
579000
unkown
page readonly
1B17000
heap
page read and write
59B000
heap
page read and write
704C000
heap
page read and write
8A2000
heap
page read and write
3D94000
heap
page read and write
191A000
heap
page read and write
1AB8000
heap
page read and write
3D9F000
heap
page read and write
2C9D000
trusted library allocation
page read and write
4F11000
trusted library allocation
page read and write
1B26000
heap
page read and write
3E46000
heap
page read and write
1BA0000
heap
page read and write
7A0000
heap
page read and write
2C45000
trusted library allocation
page read and write
19B9000
heap
page read and write
8CF000
stack
page read and write
4D53000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
72FD000
stack
page read and write
4F00000
heap
page read and write
4D9A000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
1AB6000
heap
page read and write
2A02000
trusted library allocation
page read and write
99A000
trusted library allocation
page execute and read and write
4F11000
trusted library allocation
page read and write
349E000
heap
page read and write
2850000
trusted library allocation
page read and write
3784000
trusted library allocation
page read and write
5CED000
stack
page read and write
7230000
trusted library allocation
page execute and read and write
3E40000
heap
page read and write
4B94000
trusted library allocation
page read and write
A5D000
heap
page read and write
1A87000
heap
page read and write
6470000
trusted library allocation
page read and write
3E43000
heap
page read and write
53FE000
trusted library allocation
page read and write
8B6000
heap
page read and write
283A000
trusted library allocation
page read and write
4260000
heap
page read and write
67AA000
trusted library allocation
page read and write
964000
trusted library allocation
page read and write
379D000
trusted library allocation
page read and write
8A2000
heap
page read and write
7290000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
15BE000
stack
page read and write
242E000
stack
page read and write
3777000
trusted library allocation
page read and write
E9E000
stack
page read and write
4C2E000
trusted library allocation
page read and write
1985000
heap
page read and write
233E000
stack
page read and write
57E000
heap
page read and write
2347000
trusted library allocation
page execute and read and write
1C28000
heap
page read and write
2CC4000
trusted library allocation
page read and write
58C000
heap
page read and write
4BD0000
trusted library allocation
page read and write
524E000
stack
page read and write
508E000
stack
page read and write
1A87000
heap
page read and write
1B70000
heap
page read and write
61B2000
heap
page read and write
1905000
heap
page read and write
18D7000
heap
page read and write
762000
remote allocation
page execute and read and write
2A63000
trusted library allocation
page read and write
32DE000
stack
page read and write
4DF8000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
3E5A000
heap
page read and write
776E000
stack
page read and write
60A5000
trusted library allocation
page read and write
717A000
heap
page read and write
1AF5000
heap
page read and write
7380000
trusted library allocation
page read and write
1BCF000
heap
page read and write
8CB000
heap
page read and write
4F53000
trusted library allocation
page read and write
291B000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
199F000
heap
page read and write
1C5F000
heap
page read and write
2929000
trusted library allocation
page read and write
472C000
stack
page read and write
348E000
heap
page read and write
7EE000
stack
page read and write
4F11000
trusted library allocation
page read and write
4D11000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
15DC000
stack
page read and write
19A2000
heap
page read and write
1BCB000
heap
page read and write
29DA000
trusted library allocation
page read and write
4E22000
trusted library allocation
page read and write
A5F000
stack
page read and write
3712000
trusted library allocation
page read and write
19A4000
heap
page read and write
3E40000
heap
page read and write
1AC6000
heap
page read and write
1AAB000
heap
page read and write
3E20000
heap
page read and write
2808000
heap
page read and write
1B83000
heap
page read and write
1734000
heap
page read and write
37BC000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
1B5C000
heap
page read and write
2AAF000
trusted library allocation
page read and write
4261000
heap
page read and write
1C37000
heap
page read and write
348B000
heap
page read and write
1974000
heap
page read and write
1939000
heap
page read and write
195E000
heap
page read and write
665E000
stack
page read and write
2B35000
trusted library allocation
page read and write
50A7000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
4261000
heap
page read and write
510000
heap
page read and write
27EE000
stack
page read and write
26F1000
trusted library allocation
page read and write
1B9F000
heap
page read and write
191B000
heap
page read and write
349E000
heap
page read and write
19BD000
heap
page read and write
1947000
heap
page read and write
2D19000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
4BDF000
heap
page read and write
8CE000
heap
page read and write
67F0000
trusted library allocation
page read and write
70D0000
heap
page read and write
18A0000
heap
page read and write
61C2000
heap
page read and write
3806000
trusted library allocation
page read and write
349E000
heap
page read and write
2580000
trusted library allocation
page read and write
726A000
trusted library allocation
page read and write
FB0000
heap
page read and write
29F4000
trusted library allocation
page read and write
8C5000
heap
page read and write
1C5D000
heap
page read and write
53E0000
heap
page read and write
1B52000
heap
page read and write
1A58000
heap
page read and write
531D000
trusted library allocation
page read and write
8040000
heap
page read and write
7224000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
2AFB000
trusted library allocation
page read and write
8B6000
heap
page read and write
3497000
heap
page read and write
706F000
heap
page read and write
24F0000
trusted library allocation
page read and write
19E7000
heap
page read and write
8CB000
heap
page read and write
1BB1000
heap
page read and write
767000
remote allocation
page execute and read and write
70F0000
heap
page read and write
349E000
heap
page read and write
4B0000
unkown
page readonly
86E000
heap
page read and write
3E83000
trusted library allocation
page read and write
1730000
heap
page read and write
1DE000
stack
page read and write
1931000
heap
page read and write
7FE000
stack
page read and write
4BE0000
trusted library allocation
page read and write
570000
unkown
page write copy
1B27000
heap
page read and write
349E000
heap
page read and write
4F11000
trusted library allocation
page read and write
18E9000
heap
page read and write
4C60000
heap
page read and write
3E8B000
trusted library allocation
page read and write
252E000
stack
page read and write
4DA2000
trusted library allocation
page read and write
4261000
heap
page read and write
1AB6000
heap
page read and write
3E3F000
heap
page read and write
560000
heap
page read and write
64A0000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
5314000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
5AD000
heap
page read and write
3326000
heap
page read and write
4EB5000
trusted library allocation
page read and write
256E000
stack
page read and write
7087000
heap
page read and write
4261000
heap
page read and write
4261000
heap
page read and write
4EB8000
trusted library allocation
page read and write
76E000
stack
page read and write
1A87000
heap
page read and write
4261000
heap
page read and write
24F0000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
4F44000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
4B1000
unkown
page execute read
4261000
heap
page read and write
900000
heap
page read and write
367F000
stack
page read and write
5E2E000
stack
page read and write
850000
heap
page read and write
28A3000
trusted library allocation
page read and write
8CE000
heap
page read and write
461000
unkown
page read and write
4F10000
trusted library allocation
page read and write
5AD000
heap
page read and write
352000
unkown
page readonly
6330000
trusted library allocation
page execute and read and write
651C000
stack
page read and write
3E4B000
heap
page read and write
4EB4000
trusted library allocation
page read and write
8AF000
heap
page read and write
7111000
heap
page read and write
990000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2570000
direct allocation
page execute and read and write
4261000
heap
page read and write
992000
trusted library allocation
page read and write
8AE000
heap
page read and write
70A3000
heap
page read and write
2B20000
trusted library allocation
page read and write
3838000
trusted library allocation
page read and write
4261000
heap
page read and write
37C8000
trusted library allocation
page read and write
22F4000
heap
page read and write
4DC4000
trusted library allocation
page read and write
8AE000
heap
page read and write
4E60000
trusted library allocation
page read and write
1C32000
heap
page read and write
19EB000
heap
page read and write
711C000
heap
page read and write
4261000
heap
page read and write
2A6B000
trusted library allocation
page read and write
1AA2000
heap
page read and write
59B000
heap
page read and write
6202000
trusted library allocation
page read and write
1C2B000
heap
page read and write
5314000
trusted library allocation
page read and write
7064000
heap
page read and write
8B2000
heap
page read and write
8AE000
heap
page read and write
86A000
heap
page read and write
3725000
trusted library allocation
page read and write
57EF000
stack
page read and write
29E2000
trusted library allocation
page read and write
80C1000
heap
page read and write
19E9000
heap
page read and write
94E000
stack
page read and write
18D5000
heap
page read and write
70DB000
heap
page read and write
2892000
trusted library allocation
page read and write
37BC000
stack
page read and write
566000
unkown
page readonly
540000
unkown
page readonly
8AE000
heap
page read and write
8AE000
heap
page read and write
3E5A000
heap
page read and write
1B9F000
heap
page read and write
4EB8000
trusted library allocation
page read and write
2345000
trusted library allocation
page execute and read and write
62E0000
trusted library allocation
page execute and read and write
1A38000
heap
page read and write
1B9C000
heap
page read and write
526000
heap
page read and write
6280000
trusted library allocation
page read and write
4AC000
stack
page read and write
2B79000
trusted library allocation
page read and write
7C0000
heap
page read and write
1898000
heap
page read and write
62C0000
trusted library allocation
page read and write
3809000
trusted library allocation
page read and write
96D000
trusted library allocation
page execute and read and write
4261000
heap
page read and write
There are 1027 hidden memdumps, click here to show them.