IOC Report
S1qgnlqr1V.exe

loading gif

Files

File Path
Type
Category
Malicious
S1qgnlqr1V.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_S1qgnlqr1V.exe_154b5bc2c27c2c66339f0b82a5790485a67d77_77b60c57_56b8f93c-6740-4b23-892a-7c4176431c0b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\S1qgnlqr1V.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp5791.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6553.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6583.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC346.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Oct 29 09:18:21 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dnshost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3p3ul2mh.cvw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ew4cfgm.cmq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4o20lfje.dzr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfbfqfap.5mo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_guctlh1m.ked.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcttykkr.kgg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxynaech.udj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lyaytfz0.uww.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_omybhyip.jhh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wj5e1saj.hif.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0xjcvet.dmh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y1kg522k.22f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\catalog.dat
data
modified
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\task.dat
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\S1qgnlqr1V.exe
"C:\Users\user\Desktop\S1qgnlqr1V.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
malicious
C:\Users\user\Desktop\S1qgnlqr1V.exe
"C:\Users\user\Desktop\S1qgnlqr1V.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp"
malicious
C:\Users\user\Desktop\S1qgnlqr1V.exe
C:\Users\user\Desktop\S1qgnlqr1V.exe 0
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe" 0
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Users\user\Desktop\S1qgnlqr1V.exe
"C:\Users\user\Desktop\S1qgnlqr1V.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 1756
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
66.63.187.113
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
66.63.187.113
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
DNS Host
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
ProgramId
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
FileId
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
LowerCaseLongPath
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
LongPathHash
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
Name
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
OriginalFileName
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
Publisher
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
Version
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
BinFileVersion
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
BinaryType
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
ProductName
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
ProductVersion
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
LinkDate
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
BinProductVersion
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
AppxPackageFullName
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
AppxPackageRelativeId
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
Size
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
Language
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32A1000
trusted library allocation
page read and write
malicious
3BDC000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
410B000
trusted library allocation
page read and write
malicious
41EA000
trusted library allocation
page read and write
malicious
2C01000
trusted library allocation
page read and write
malicious
4B9C000
trusted library allocation
page read and write
malicious
42A9000
trusted library allocation
page read and write
malicious
5580000
trusted library section
page read and write
malicious
32D1000
trusted library allocation
page read and write
malicious
49D0000
trusted library allocation
page execute and read and write
4E90000
heap
page read and write
2B90000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
3174000
trusted library allocation
page read and write
4337000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
DA30000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
32E3000
heap
page read and write
20DA000
trusted library allocation
page execute and read and write
32B4000
trusted library allocation
page read and write
5A2000
unkown
page readonly
699E000
stack
page read and write
5200000
trusted library allocation
page read and write
152E000
stack
page read and write
3301000
trusted library allocation
page read and write
2379000
trusted library allocation
page read and write
1E9000
stack
page read and write
5415000
heap
page read and write
2FF0000
trusted library allocation
page read and write
9AF000
stack
page read and write
4F70000
heap
page execute and read and write
B34000
heap
page read and write
5A30000
trusted library section
page readonly
32C0000
heap
page read and write
1330000
heap
page read and write
720000
heap
page read and write
2D63000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
233E000
stack
page read and write
839000
stack
page read and write
4E80000
heap
page read and write
D7AF000
stack
page read and write
641F000
stack
page read and write
5CAD000
stack
page read and write
5810000
heap
page read and write
31A3000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page execute and read and write
D12E000
stack
page read and write
3C39000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
52D0000
heap
page read and write
634D000
stack
page read and write
F60000
trusted library allocation
page read and write
F7D000
trusted library allocation
page execute and read and write
1544000
trusted library allocation
page read and write
5A80000
heap
page read and write
F6D000
trusted library allocation
page execute and read and write
5A50000
heap
page read and write
7EF20000
trusted library allocation
page execute and read and write
5080000
heap
page read and write
50A0000
trusted library allocation
page execute and read and write
937000
stack
page read and write
C9BF000
stack
page read and write
1076000
trusted library allocation
page read and write
31AB000
trusted library allocation
page read and write
491E000
trusted library allocation
page read and write
1790000
heap
page read and write
3D85000
trusted library allocation
page read and write
51C9000
trusted library allocation
page read and write
4FF0000
heap
page read and write
28D5000
trusted library allocation
page read and write
D7EE000
stack
page read and write
C54000
trusted library allocation
page read and write
3D95000
trusted library allocation
page read and write
763D000
trusted library allocation
page read and write
6C3E000
stack
page read and write
65FE000
heap
page read and write
C6A000
stack
page read and write
70F000
unkown
page read and write
32C0000
heap
page read and write
BA4F000
stack
page read and write
714000
trusted library allocation
page read and write
178E000
stack
page read and write
1740000
heap
page execute and read and write
F3E000
stack
page read and write
9F60000
trusted library section
page read and write
1410000
heap
page read and write
4E5B000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
B5A000
stack
page read and write
F92000
trusted library allocation
page read and write
FA0000
heap
page read and write
4E90000
trusted library allocation
page read and write
C00000
trusted library allocation
page execute and read and write
761000
heap
page read and write
4921000
trusted library allocation
page read and write
57A0000
heap
page read and write
5186000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
184C000
stack
page read and write
3360000
trusted library allocation
page read and write
CFE0000
trusted library allocation
page execute and read and write
5740000
trusted library allocation
page read and write
58A0000
heap
page read and write
20D2000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
5430000
heap
page read and write
311B000
trusted library allocation
page read and write
173E000
stack
page read and write
CBA000
heap
page read and write
507B000
stack
page read and write
31AF000
trusted library allocation
page read and write
3197000
heap
page read and write
FD6000
heap
page read and write
CC0E000
stack
page read and write
F64000
trusted library allocation
page read and write
4F90000
heap
page read and write
3DFC000
trusted library allocation
page read and write
C60000
heap
page read and write
967D000
stack
page read and write
BD3E000
stack
page read and write
3332000
trusted library allocation
page read and write
4F93000
heap
page read and write
1543000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
3173000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
9A0000
heap
page read and write
5770000
heap
page read and write
69F0000
heap
page read and write
8D5C000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
5500000
heap
page read and write
3150000
trusted library allocation
page read and write
41A7000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
6B0E000
heap
page read and write
5770000
trusted library allocation
page read and write
50D0000
heap
page read and write
5761000
trusted library allocation
page read and write
55A0000
heap
page execute and read and write
B83000
trusted library allocation
page execute and read and write
CC7B000
stack
page read and write
14D3000
trusted library allocation
page execute and read and write
32B6000
trusted library allocation
page read and write
A80000
heap
page read and write
C40000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
51A1000
trusted library allocation
page read and write
4320000
trusted library allocation
page read and write
959E000
stack
page read and write
14FA000
trusted library allocation
page execute and read and write
5692000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
556E000
stack
page read and write
15A6000
heap
page read and write
6FE0000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
9050000
heap
page read and write
14F0000
trusted library allocation
page read and write
870000
heap
page read and write
75F000
heap
page read and write
3345000
trusted library allocation
page read and write
15C2000
heap
page read and write
1260000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
32E0000
heap
page read and write
14D0000
trusted library allocation
page read and write
7558000
heap
page read and write
1090000
trusted library allocation
page read and write
1450000
heap
page read and write
5A2B000
stack
page read and write
2100000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
70CD000
stack
page read and write
3110000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
4A4C000
stack
page read and write
4F10000
trusted library allocation
page execute and read and write
4960000
trusted library allocation
page read and write
500000
unkown
page readonly
531D000
stack
page read and write
4141000
trusted library allocation
page read and write
7FB60000
trusted library allocation
page execute and read and write
1560000
heap
page execute and read and write
57B0000
heap
page read and write
BE3F000
stack
page read and write
437C000
stack
page read and write
571B000
trusted library allocation
page read and write
707000
heap
page read and write
98BE000
stack
page read and write
567E000
trusted library allocation
page read and write
13A6000
trusted library allocation
page execute and read and write
5731000
trusted library allocation
page read and write
BBFE000
stack
page read and write
2F93000
trusted library allocation
page read and write
5020000
heap
page execute and read and write
3DD000
stack
page read and write
2D39000
trusted library allocation
page read and write
321F000
stack
page read and write
E92000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
FC9000
stack
page read and write
97BE000
stack
page read and write
2385000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
83E000
stack
page read and write
5AD0000
heap
page execute and read and write
26CE000
stack
page read and write
313E000
stack
page read and write
BD0000
trusted library allocation
page read and write
C83E000
stack
page read and write
1337000
heap
page read and write
2226000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
329F000
stack
page read and write
5AAE000
stack
page read and write
51C0000
trusted library allocation
page read and write
2B2E000
stack
page read and write
310F000
stack
page read and write
3161000
trusted library allocation
page read and write
42D9000
trusted library allocation
page read and write
71D000
trusted library allocation
page execute and read and write
CBE000
heap
page read and write
3CC6000
trusted library allocation
page read and write
3199000
trusted library allocation
page read and write
757E000
stack
page read and write
5223000
heap
page read and write
119D000
stack
page read and write
1570000
heap
page read and write
3117000
trusted library allocation
page read and write
CAC0000
trusted library allocation
page read and write
1544000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
4E70000
heap
page read and write
67DD000
unkown
page read and write
77AE000
stack
page read and write
F1A000
stack
page read and write
310F000
trusted library allocation
page read and write
29B5000
trusted library allocation
page read and write
6E3A000
heap
page read and write
5540000
trusted library allocation
page read and write
15B9000
heap
page read and write
79EE000
stack
page read and write
1830000
trusted library allocation
page execute and read and write
4926000
trusted library allocation
page read and write
7FC60000
trusted library allocation
page execute and read and write
5A90000
trusted library allocation
page execute and read and write
313D000
trusted library allocation
page read and write
1970000
heap
page read and write
5420000
heap
page read and write
155C000
trusted library allocation
page read and write
AD6000
heap
page read and write
1740000
trusted library allocation
page read and write
14D5000
heap
page read and write
159E000
stack
page read and write
3E0C000
trusted library allocation
page read and write
2230000
heap
page read and write
49C0000
heap
page read and write
B10000
heap
page read and write
3C19000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
663E000
stack
page read and write
C9FE000
stack
page read and write
576D000
stack
page read and write
2224000
trusted library allocation
page read and write
20D0000
trusted library allocation
page read and write
16F7000
heap
page read and write
1082000
trusted library allocation
page read and write
E86000
trusted library allocation
page execute and read and write
1485000
heap
page read and write
CD7000
heap
page read and write
2D51000
trusted library allocation
page read and write
E9B000
trusted library allocation
page execute and read and write
4D50000
heap
page read and write
20D6000
trusted library allocation
page execute and read and write
5A51000
trusted library allocation
page read and write
17A4000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
937000
stack
page read and write
16AE000
stack
page read and write
1520000
trusted library allocation
page read and write
5790000
trusted library section
page read and write
2220000
trusted library allocation
page read and write
16DD000
trusted library allocation
page execute and read and write
543D000
stack
page read and write
4CFD000
stack
page read and write
668E000
stack
page read and write
3C29000
trusted library allocation
page read and write
179E000
stack
page read and write
61CE000
stack
page read and write
51B2000
trusted library allocation
page read and write
A38D000
stack
page read and write
1055000
heap
page read and write
333C000
trusted library allocation
page read and write
137E000
stack
page read and write
1530000
trusted library allocation
page execute and read and write
12F8000
stack
page read and write
6E00000
heap
page read and write
5AA0000
heap
page read and write
9D90000
heap
page read and write
5AB0000
heap
page read and write
DE0000
heap
page read and write
63A000
stack
page read and write
1572000
trusted library allocation
page read and write
447B000
stack
page read and write
5780000
trusted library allocation
page read and write
550000
heap
page read and write
2DE0000
heap
page read and write
5736000
trusted library allocation
page read and write
12F8000
stack
page read and write
2AB0000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
CAFE000
stack
page read and write
2746000
trusted library allocation
page read and write
4301000
trusted library allocation
page read and write
20EB000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
1380000
trusted library allocation
page read and write
BA6000
trusted library allocation
page execute and read and write
14ED000
trusted library allocation
page execute and read and write
D56E000
stack
page read and write
2710000
heap
page read and write
2341000
trusted library allocation
page read and write
F9B000
trusted library allocation
page execute and read and write
654E000
stack
page read and write
5681000
trusted library allocation
page read and write
76AE000
stack
page read and write
51D0000
trusted library allocation
page read and write
1546000
trusted library allocation
page read and write
5A60000
heap
page read and write
5790000
trusted library allocation
page execute and read and write
311F000
trusted library allocation
page read and write
21AE000
stack
page read and write
CF1000
heap
page read and write
78EF000
stack
page read and write
52F0000
heap
page read and write
6FCE000
stack
page read and write
13B8000
heap
page read and write
1720000
heap
page read and write
4E80000
trusted library allocation
page read and write
6FCD000
stack
page read and write
17BC000
trusted library allocation
page read and write
5A6E000
stack
page read and write
1287000
heap
page read and write
400000
remote allocation
page execute and read and write
960000
heap
page read and write
DA2C000
stack
page read and write
B0E000
stack
page read and write
755000
heap
page read and write
3D75000
trusted library allocation
page read and write
106E000
trusted library allocation
page read and write
15AD000
heap
page read and write
BDE000
stack
page read and write
1608000
heap
page read and write
1480000
heap
page read and write
1577000
heap
page read and write
155D000
trusted library allocation
page execute and read and write
1780000
trusted library allocation
page read and write
7430000
heap
page read and write
4F22000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
57B0000
heap
page read and write
EC0000
heap
page read and write
16C0000
trusted library allocation
page execute and read and write
4E20000
heap
page read and write
95DE000
stack
page read and write
5270000
trusted library allocation
page execute and read and write
415F000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
D02E000
stack
page read and write
6C0000
heap
page read and write
490B000
trusted library allocation
page read and write
11FE000
stack
page read and write
51F0000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
BE7B000
stack
page read and write
1567000
heap
page read and write
169F000
stack
page read and write
2730000
trusted library allocation
page read and write
72E000
heap
page read and write
6860000
heap
page read and write
288B000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
6D3E000
stack
page read and write
B8D000
trusted library allocation
page execute and read and write
161B000
heap
page read and write
2B38000
trusted library allocation
page read and write
57E0000
heap
page execute and read and write
3111000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
51AD000
trusted library allocation
page read and write
5BEE000
stack
page read and write
56EE000
stack
page read and write
C5D000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
55B0000
heap
page read and write
4CC0000
trusted library allocation
page read and write
AC9000
heap
page read and write
4E50000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
16AF000
stack
page read and write
1750000
heap
page read and write
17C0000
heap
page execute and read and write
5772000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
4A60000
heap
page read and write
3D1D000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
45BF000
stack
page read and write
BABE000
stack
page read and write
1850000
heap
page read and write
FB8000
trusted library allocation
page read and write
7D5000
heap
page read and write
175A000
trusted library allocation
page read and write
CB3E000
stack
page read and write
5A2E000
stack
page read and write
6410000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
5672000
trusted library allocation
page read and write
6F3C000
stack
page read and write
257B000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
134D000
heap
page read and write
195F000
stack
page read and write
1550000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
98FE000
stack
page read and write
D8EE000
stack
page read and write
1740000
trusted library allocation
page execute and read and write
12F7000
stack
page read and write
5742000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
4F8B000
stack
page read and write
C9B000
stack
page read and write
624E000
stack
page read and write
13CE000
stack
page read and write
5BB0000
heap
page read and write
575E000
trusted library allocation
page read and write
139D000
trusted library allocation
page execute and read and write
977E000
stack
page read and write
4F00000
heap
page read and write
5766000
trusted library allocation
page read and write
2BF7000
heap
page read and write
31AD000
trusted library allocation
page read and write
1859000
trusted library allocation
page read and write
13AA000
trusted library allocation
page execute and read and write
EB0000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
14F6000
trusted library allocation
page execute and read and write
BBBE000
stack
page read and write
5A40000
trusted library allocation
page read and write
3951000
trusted library allocation
page read and write
1384000
trusted library allocation
page read and write
57F0000
heap
page read and write
4C60000
trusted library allocation
page execute and read and write
2160000
trusted library allocation
page execute and read and write
16C3000
trusted library allocation
page execute and read and write
1040000
heap
page read and write
4E7D000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
4A0C000
stack
page read and write
42A1000
trusted library allocation
page read and write
1755000
trusted library allocation
page read and write
124C000
stack
page read and write
D28E000
stack
page read and write
7780000
trusted library allocation
page read and write
1760000
heap
page read and write
11B0000
trusted library allocation
page read and write
10A7000
heap
page read and write
710000
heap
page read and write
4F80000
trusted library section
page readonly
AA8000
heap
page read and write
5A00000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
5760000
trusted library allocation
page read and write
1264000
trusted library allocation
page read and write
21F0000
heap
page execute and read and write
1750000
trusted library allocation
page read and write
13C0000
heap
page read and write
BBB000
trusted library allocation
page execute and read and write
B84000
trusted library allocation
page read and write
4305000
trusted library allocation
page read and write
492D000
trusted library allocation
page read and write
31B0000
heap
page read and write
D51000
heap
page read and write
316D000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
6E3F000
heap
page read and write
2750000
trusted library allocation
page read and write
BA0000
heap
page read and write
17A0000
trusted library allocation
page read and write
13B0000
heap
page read and write
57C0000
heap
page read and write
1340000
heap
page read and write
4E30000
trusted library allocation
page execute and read and write
B94000
heap
page read and write
6091000
stack
page read and write
ACE000
stack
page read and write
B30000
heap
page read and write
31CE000
trusted library allocation
page read and write
5E5000
heap
page read and write
7F050000
trusted library allocation
page execute and read and write
353B000
trusted library allocation
page read and write
CC3F000
stack
page read and write
189F000
stack
page read and write
1380000
heap
page read and write
78EF000
stack
page read and write
DC5000
heap
page read and write
679E000
unkown
page read and write
FA8000
heap
page read and write
20E2000
trusted library allocation
page read and write
6420000
heap
page read and write
57F0000
trusted library allocation
page read and write
5E8E000
stack
page read and write
5AB0000
heap
page read and write
5D2E000
stack
page read and write
BF0000
heap
page read and write
681D000
unkown
page read and write
6F0000
trusted library allocation
page read and write
7F8F0000
trusted library allocation
page execute and read and write
5184000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
127F000
trusted library allocation
page read and write
1560000
heap
page read and write
3879000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
30BE000
stack
page read and write
138D000
trusted library allocation
page execute and read and write
20C3000
trusted library allocation
page read and write
566B000
trusted library allocation
page read and write
418B000
trusted library allocation
page read and write
303E000
unkown
page read and write
9A0000
heap
page read and write
5664000
trusted library allocation
page read and write
42EF000
trusted library allocation
page read and write
E8A000
trusted library allocation
page execute and read and write
6BBE000
stack
page read and write
1735000
trusted library allocation
page read and write
2760000
heap
page execute and read and write
7790000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
237C000
trusted library allocation
page read and write
9B9E000
stack
page read and write
A10D000
stack
page read and write
65F0000
heap
page read and write
1530000
trusted library allocation
page read and write
D18E000
stack
page read and write
16E0000
trusted library allocation
page read and write
1380000
heap
page read and write
5E3E000
stack
page read and write
7F170000
trusted library allocation
page execute and read and write
2200000
trusted library allocation
page execute and read and write
6D40000
heap
page read and write
16B0000
trusted library allocation
page read and write
1587000
trusted library allocation
page execute and read and write
20C0000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
5CDF000
stack
page read and write
D52E000
stack
page read and write
3B97000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
EC0000
heap
page read and write
F80000
heap
page read and write
4EA0000
trusted library section
page readonly
286E000
stack
page read and write
BF80000
trusted library allocation
page read and write
20E0000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
1760000
heap
page read and write
2951000
trusted library allocation
page read and write
1383000
trusted library allocation
page execute and read and write
4EC0000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
4F7000
stack
page read and write
7640000
trusted library allocation
page execute and read and write
F86000
trusted library allocation
page execute and read and write
52A1000
trusted library allocation
page read and write
105B000
trusted library allocation
page read and write
C8BE000
stack
page read and write
31C1000
trusted library allocation
page read and write
158D000
heap
page read and write
EF0000
heap
page read and write
521B000
stack
page read and write
517E000
stack
page read and write
1850000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
2372000
trusted library allocation
page read and write
B5C000
heap
page read and write
C5E000
stack
page read and write
D42D000
stack
page read and write
16CD000
trusted library allocation
page execute and read and write
5812000
trusted library allocation
page read and write
720000
heap
page read and write
57A0000
trusted library allocation
page read and write
57A0000
heap
page execute and read and write
CD7D000
stack
page read and write
5000000
trusted library allocation
page read and write
C64E000
stack
page read and write
657E000
stack
page read and write
3136000
trusted library allocation
page read and write
20E7000
trusted library allocation
page execute and read and write
572E000
trusted library allocation
page read and write
100F000
heap
page read and write
5750000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
518B000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
44BE000
stack
page read and write
CB0E000
stack
page read and write
6425000
heap
page read and write
1500000
trusted library allocation
page read and write
9C9D000
stack
page read and write
6B9E000
stack
page read and write
52BD000
stack
page read and write
32D5000
trusted library allocation
page read and write
3C4B000
trusted library allocation
page read and write
4FF5000
heap
page read and write
574B000
trusted library allocation
page read and write
76DD000
heap
page read and write
767E000
stack
page read and write
4A70000
heap
page read and write
3C81000
trusted library allocation
page read and write
4E7D000
stack
page read and write
107D000
trusted library allocation
page read and write
307F000
unkown
page read and write
713000
trusted library allocation
page execute and read and write
76B8000
heap
page read and write
38A7000
trusted library allocation
page read and write
667E000
stack
page read and write
3C69000
trusted library allocation
page read and write
13D0000
heap
page read and write
3338000
trusted library allocation
page read and write
87A000
heap
page read and write
4DA5000
trusted library allocation
page read and write
1043000
heap
page read and write
16E6000
trusted library allocation
page execute and read and write
68B8000
heap
page read and write
10A0000
heap
page read and write
53CD000
stack
page read and write
507C000
stack
page read and write
70E0000
trusted library allocation
page read and write
3210000
trusted library allocation
page execute and read and write
5180000
trusted library allocation
page read and write
1626000
heap
page read and write
1337000
stack
page read and write
5AE0000
heap
page read and write
4E40000
trusted library allocation
page read and write
FCA000
heap
page read and write
16FB000
trusted library allocation
page execute and read and write
F50000
trusted library allocation
page read and write
4E00000
heap
page read and write
4878000
trusted library allocation
page read and write
6F8E000
stack
page read and write
680000
heap
page read and write
519E000
trusted library allocation
page read and write
1200000
heap
page execute and read and write
71BC000
stack
page read and write
4955000
trusted library allocation
page read and write
D6AE000
stack
page read and write
5A70000
heap
page read and write
3890000
trusted library allocation
page read and write
B1D000
stack
page read and write
4A83000
heap
page read and write
608F000
stack
page read and write
196E000
stack
page read and write
647E000
stack
page read and write
105F000
heap
page read and write
5290000
trusted library allocation
page read and write
6740000
heap
page read and write
5813000
heap
page read and write
687D000
heap
page read and write
5710000
trusted library allocation
page execute and read and write
502000
unkown
page readonly
4E50000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
4E95000
trusted library allocation
page read and write
839000
stack
page read and write
4E6E000
trusted library allocation
page read and write
14B2000
trusted library allocation
page read and write
5000000
trusted library section
page read and write
1050000
trusted library allocation
page read and write
B60000
heap
page read and write
EE7000
heap
page read and write
5710000
trusted library allocation
page read and write
C10000
heap
page execute and read and write
9FCD000
stack
page read and write
5570000
trusted library section
page read and write
5A40000
heap
page read and write
B3B000
heap
page read and write
5520000
trusted library allocation
page execute and read and write
1415000
heap
page read and write
6763000
heap
page read and write
172C000
stack
page read and write
1770000
trusted library allocation
page read and write
9ECD000
stack
page read and write
C1E000
stack
page read and write
4A10000
heap
page execute and read and write
70D0000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
B9A000
heap
page read and write
150B000
trusted library allocation
page execute and read and write
4E03000
heap
page read and write
2740000
trusted library allocation
page read and write
572E000
stack
page read and write
643F000
unkown
page read and write
500D000
trusted library allocation
page read and write
127C000
trusted library allocation
page read and write
17BF000
trusted library allocation
page read and write
14DD000
trusted library allocation
page execute and read and write
16B0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page execute and read and write
6CFC000
stack
page read and write
3181000
trusted library allocation
page read and write
653E000
stack
page read and write
4E71000
trusted library allocation
page read and write
1071000
trusted library allocation
page read and write
5D6E000
stack
page read and write
16C4000
trusted library allocation
page read and write
2150000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
966000
heap
page read and write
BAB000
heap
page read and write
1553000
trusted library allocation
page read and write
5BFE000
stack
page read and write
A3CD000
stack
page read and write
5F8E000
stack
page read and write
FD9000
stack
page read and write
57D0000
heap
page read and write
77EE000
stack
page read and write
3C09000
trusted library allocation
page read and write
1330000
heap
page read and write
B93000
trusted library allocation
page read and write
14B7000
trusted library allocation
page execute and read and write
4E76000
trusted library allocation
page read and write
16F2000
trusted library allocation
page read and write
4FA0000
heap
page read and write
294F000
stack
page read and write
1507000
trusted library allocation
page execute and read and write
3141000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
14D4000
trusted library allocation
page read and write
2BD0000
heap
page read and write
16F0000
heap
page read and write
EAE000
stack
page read and write
3341000
trusted library allocation
page read and write
7530000
heap
page read and write
17EE000
stack
page read and write
62B0000
heap
page read and write
D6C000
heap
page read and write
1580000
trusted library allocation
page read and write
CD80000
trusted library allocation
page read and write
1649000
heap
page read and write
14BB000
trusted library allocation
page execute and read and write
4D60000
heap
page read and write
91E000
stack
page read and write
20CD000
trusted library allocation
page execute and read and write
16EA000
trusted library allocation
page execute and read and write
703D000
stack
page read and write
1590000
heap
page read and write
1366000
heap
page read and write
51E0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
4149000
trusted library allocation
page read and write
16EE000
stack
page read and write
4C5B000
stack
page read and write
FAE000
stack
page read and write
135A000
heap
page read and write
9AAB000
trusted library allocation
page read and write
5410000
heap
page read and write
180E000
stack
page read and write
F80000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
62A0000
heap
page read and write
4A50000
heap
page read and write
6E8E000
stack
page read and write
49F0000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
6CE000
unkown
page read and write
58A3000
heap
page read and write
7694000
heap
page read and write
D66E000
stack
page read and write
155F000
trusted library allocation
page read and write
5CFE000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
51C5000
trusted library allocation
page read and write
F63000
trusted library allocation
page execute and read and write
540E000
stack
page read and write
B90000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
C53000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
CAC3000
trusted library allocation
page read and write
16EF000
trusted library allocation
page read and write
5AB0000
heap
page read and write
B70000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page execute and read and write
756C000
heap
page read and write
2D00000
heap
page read and write
F8A000
trusted library allocation
page execute and read and write
7A7000
heap
page read and write
2D97000
trusted library allocation
page read and write
ABE000
heap
page read and write
77EE000
stack
page read and write
5010000
trusted library allocation
page execute and read and write
AA0000
heap
page read and write
1370000
trusted library allocation
page read and write
700000
heap
page read and write
1576000
trusted library allocation
page execute and read and write
1840000
heap
page read and write
554D000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
1250000
trusted library allocation
page execute and read and write
6F8E000
stack
page read and write
688B000
heap
page read and write
173A000
trusted library allocation
page read and write
EE0000
heap
page read and write
6CBE000
stack
page read and write
3DEC000
trusted library allocation
page read and write
5D0000
heap
page read and write
1710000
trusted library allocation
page read and write
214E000
stack
page read and write
4DA0000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
4309000
trusted library allocation
page read and write
5CEE000
stack
page read and write
14C0000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
1280000
heap
page read and write
BB7000
trusted library allocation
page execute and read and write
6D55000
heap
page read and write
1855000
trusted library allocation
page read and write
E6E000
stack
page read and write
422000
remote allocation
page execute and read and write
77A0000
trusted library allocation
page execute and read and write
5260000
trusted library allocation
page read and write
70F2000
trusted library allocation
page read and write
CD83000
trusted library allocation
page read and write
16EC000
trusted library allocation
page read and write
5220000
heap
page read and write
310C000
trusted library allocation
page read and write
CD0F000
stack
page read and write
3959000
trusted library allocation
page read and write
6E50000
heap
page read and write
270C000
stack
page read and write
53FB000
stack
page read and write
3C01000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
72A000
heap
page read and write
4980000
trusted library allocation
page read and write
CE4000
heap
page read and write
31A1000
trusted library allocation
page read and write
325E000
stack
page read and write
157A000
trusted library allocation
page execute and read and write
FCE000
stack
page read and write
6A9E000
stack
page read and write
1860000
heap
page read and write
BF83000
trusted library allocation
page read and write
E97000
trusted library allocation
page execute and read and write
52C0000
heap
page read and write
FD0000
heap
page read and write
133E000
stack
page read and write
BF7C000
stack
page read and write
14A0000
heap
page read and write
7F5000
heap
page read and write
CB0000
heap
page read and write
7F9B0000
trusted library allocation
page execute and read and write
16D4000
trusted library allocation
page read and write
13E6000
heap
page read and write
4932000
trusted library allocation
page read and write
934E000
stack
page read and write
6D58000
heap
page read and write
56F0000
heap
page read and write
A00D000
stack
page read and write
4A80000
heap
page read and write
1598000
heap
page read and write
644E000
stack
page read and write
32F0000
heap
page execute and read and write
31A3000
trusted library allocation
page read and write
32C7000
heap
page read and write
E73000
trusted library allocation
page read and write
4E42000
trusted library allocation
page read and write
3190000
heap
page read and write
4CD0000
heap
page read and write
5801000
trusted library allocation
page read and write
5250000
heap
page read and write
BA2000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
4F90000
heap
page read and write
17A0000
trusted library allocation
page read and write
30FF000
stack
page read and write
B15000
heap
page read and write
EF7000
heap
page read and write
4950000
trusted library allocation
page read and write
15C5000
heap
page read and write
3127000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
D65000
stack
page read and write
6E40000
trusted library allocation
page execute and read and write
5780000
heap
page execute and read and write
4A65000
heap
page read and write
3197000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
5D3E000
stack
page read and write
5DAE000
stack
page read and write
182C000
stack
page read and write
1007000
heap
page read and write
6C9F000
stack
page read and write
6FD0000
trusted library allocation
page read and write
B85E000
stack
page read and write
63FE000
stack
page read and write
5AF0000
trusted library allocation
page execute and read and write
6DFD000
stack
page read and write
5660000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
1440000
heap
page read and write
5810000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
7546000
heap
page read and write
924E000
stack
page read and write
5780000
trusted library allocation
page execute and read and write
40C7000
trusted library allocation
page read and write
158B000
trusted library allocation
page execute and read and write
4B57000
trusted library allocation
page read and write
5AE000
stack
page read and write
DA33000
trusted library allocation
page read and write
658E000
stack
page read and write
2744000
trusted library allocation
page read and write
620F000
stack
page read and write
1750000
trusted library allocation
page read and write
4339000
trusted library allocation
page read and write
F97000
trusted library allocation
page execute and read and write
2210000
trusted library allocation
page read and write
5090000
heap
page read and write
31FE000
stack
page read and write
6B00000
heap
page read and write
BCFE000
stack
page read and write
16C0000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
13C5000
heap
page read and write
16D6000
trusted library allocation
page read and write
D92C000
stack
page read and write
560000
heap
page read and write
1582000
trusted library allocation
page read and write
D6E000
stack
page read and write
70F0000
trusted library allocation
page execute and read and write
57B3000
heap
page read and write
B9D000
trusted library allocation
page execute and read and write
16F7000
trusted library allocation
page execute and read and write
186F000
stack
page read and write
13D9000
heap
page read and write
72BE000
stack
page read and write
4175000
trusted library allocation
page read and write
123A000
stack
page read and write
651F000
stack
page read and write
576D000
trusted library allocation
page read and write
568D000
trusted library allocation
page read and write
7F8C0000
trusted library allocation
page execute and read and write
1570000
trusted library allocation
page read and write
674D000
heap
page read and write
7680000
heap
page read and write
A80000
heap
page read and write
4EA0000
trusted library allocation
page read and write
BAA000
trusted library allocation
page execute and read and write
49E2000
trusted library allocation
page read and write
2BF0000
heap
page read and write
There are 977 hidden memdumps, click here to show them.