IOC Report
EUFOvMxM2H.exe

loading gif

Files

File Path
Type
Category
Malicious
EUFOvMxM2H.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Path1\To2\Save444\uh3ex1.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EUFOvMxM2H.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\uh3ex1.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ziax2ao.hfz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_db2e0tpr.la4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjnfwll3.zpi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucddx1sg.kba.ps1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EUFOvMxM2H.exe
"C:\Users\user\Desktop\EUFOvMxM2H.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Path1\To2\Save444'
malicious
C:\Path1\To2\Save444\uh3ex1.exe
"C:\Path1\To2\Save444\uh3ex1.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faulth
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
https://aka.ms/pscore6lB
unknown
https://objects.githubusercontent.com/github-production-release-asset-2e65be/882783246/b23a0dba-ce39
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://nuget.org/nuget.exe
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://tempuri.org/example/Field1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
https://github.com/Xavieprowel/crispy-palm-tree/releases/download/1/uh3ex1.exe
140.82.121.4
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/example/Field3ResponseD
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://objects.githubusercontent.com
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://github.com
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://objects.githubusercontent.comd
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://github.com
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.4
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.210.39
objects.githubusercontent.com
185.199.110.133
s-part-0032.t-0009.t-msedge.net
13.107.246.60
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious
140.82.121.4
github.com
United States
185.199.110.133
objects.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EUFOvMxM2H_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3396000
trusted library allocation
page read and write
malicious
6CA2B000
unkown
page read and write
malicious
3381000
trusted library allocation
page read and write
malicious
732000
remote allocation
page execute and read and write
malicious
3667000
trusted library allocation
page read and write
3A09000
trusted library allocation
page read and write
4477000
trusted library allocation
page read and write
448E000
trusted library allocation
page read and write
5C5E000
stack
page read and write
3549000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
8A21000
heap
page read and write
263C000
stack
page read and write
3882000
trusted library allocation
page read and write
6712000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
68FE000
stack
page read and write
30D0000
trusted library allocation
page read and write
4401000
trusted library allocation
page read and write
444D000
trusted library allocation
page read and write
57EE000
stack
page read and write
5CA0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page execute and read and write
83DD000
stack
page read and write
6F5F000
heap
page read and write
828E000
stack
page read and write
34ED000
trusted library allocation
page read and write
35E5000
trusted library allocation
page read and write
E07000
heap
page read and write
26D2000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
6B2C000
stack
page read and write
66F0000
trusted library allocation
page read and write
6775000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
4BC2000
trusted library allocation
page read and write
6706000
trusted library allocation
page read and write
4453000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
3854000
trusted library allocation
page read and write
6EAA000
heap
page read and write
76F0000
trusted library allocation
page read and write
79CD000
stack
page read and write
6CAE000
stack
page read and write
254E000
stack
page read and write
3633000
trusted library allocation
page read and write
7B0E000
stack
page read and write
851E000
stack
page read and write
3762000
trusted library allocation
page read and write
6E7F000
stack
page read and write
434F000
stack
page read and write
5CE0000
trusted library allocation
page execute and read and write
28D2000
trusted library allocation
page read and write
43D7000
trusted library allocation
page read and write
65F0000
heap
page read and write
6A4E000
stack
page read and write
446A000
trusted library allocation
page read and write
575F000
stack
page read and write
3803000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
7EB8000
heap
page read and write
7080000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
ABC000
heap
page read and write
25B4000
trusted library allocation
page read and write
35A4000
trusted library allocation
page read and write
4425000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
41FA000
trusted library allocation
page read and write
4BC6000
trusted library allocation
page read and write
4E3E000
stack
page read and write
35BC000
trusted library allocation
page read and write
6600000
heap
page read and write
37FF000
trusted library allocation
page read and write
298E000
stack
page read and write
947000
trusted library allocation
page execute and read and write
3695000
trusted library allocation
page read and write
551E000
stack
page read and write
3686000
trusted library allocation
page read and write
4B7E000
stack
page read and write
376A000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
1765000
heap
page read and write
35ED000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
1690000
heap
page read and write
6CAB7000
unkown
page read and write
790000
heap
page read and write
677B000
trusted library allocation
page read and write
7E30000
trusted library allocation
page read and write
1757000
heap
page read and write
2A54000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
7EB2000
heap
page read and write
16AE000
heap
page read and write
54ED000
trusted library allocation
page read and write
69CD000
stack
page read and write
359A000
trusted library allocation
page read and write
14C6000
heap
page read and write
1698000
heap
page read and write
389B000
trusted library allocation
page read and write
2753000
heap
page read and write
662B000
heap
page read and write
7624000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
C40000
heap
page read and write
6CAE2000
unkown
page readonly
2941000
trusted library allocation
page read and write
7ECC000
heap
page read and write
729E000
stack
page read and write
387A000
trusted library allocation
page read and write
3D59000
trusted library allocation
page read and write
772A000
trusted library allocation
page read and write
39CB000
trusted library allocation
page read and write
7E91000
heap
page read and write
66DB000
heap
page read and write
1450000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
C50000
heap
page read and write
43C8000
trusted library allocation
page read and write
2850000
heap
page execute and read and write
7F83000
heap
page read and write
3AAE000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
43DF000
trusted library allocation
page read and write
5A10000
heap
page execute and read and write
1600000
heap
page read and write
69D0000
trusted library allocation
page read and write
16BA000
heap
page read and write
1460000
trusted library allocation
page read and write
299C000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
717F000
stack
page read and write
6A2C000
stack
page read and write
1770000
heap
page read and write
364E000
trusted library allocation
page read and write
7F16000
heap
page read and write
6D00000
trusted library allocation
page execute and read and write
43DA000
trusted library allocation
page read and write
BEE000
stack
page read and write
3699000
trusted library allocation
page read and write
43E4000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
2983000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
5AF8000
heap
page read and write
3602000
trusted library allocation
page read and write
6980000
heap
page execute and read and write
6760000
trusted library allocation
page execute and read and write
140E000
stack
page read and write
3508000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
359E000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
27F5000
heap
page read and write
7ECD000
heap
page read and write
6960000
heap
page execute and read and write
75F0000
trusted library allocation
page execute and read and write
26D8000
heap
page read and write
42CE000
stack
page read and write
7496000
trusted library allocation
page read and write
3AAB000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
F70000
heap
page read and write
3867000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
4D10000
heap
page execute and read and write
72C0000
trusted library allocation
page read and write
3994000
trusted library allocation
page read and write
4DBE000
stack
page read and write
25C0000
trusted library allocation
page read and write
3200000
heap
page read and write
53DE000
stack
page read and write
6790000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
26F0000
trusted library allocation
page execute and read and write
9AE000
stack
page read and write
5CC000
stack
page read and write
3566000
trusted library allocation
page read and write
393E000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
C3E000
stack
page read and write
589E000
stack
page read and write
939F000
stack
page read and write
529E000
stack
page read and write
3585000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
7E95000
heap
page read and write
259E000
stack
page read and write
9DA000
heap
page read and write
6780000
trusted library allocation
page read and write
538000
unkown
page readonly
67F0000
heap
page execute and read and write
6770000
trusted library allocation
page read and write
7EDF000
heap
page read and write
7E00000
heap
page read and write
37E8000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
CDE000
stack
page read and write
3766000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
3923000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
7F6E000
heap
page read and write
790E000
unkown
page read and write
6EE9000
heap
page read and write
2A50000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
4601000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
9DE000
heap
page read and write
E00000
heap
page read and write
361E000
trusted library allocation
page read and write
7FA48000
trusted library allocation
page execute and read and write
78CE000
unkown
page read and write
3659000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
73B000
stack
page read and write
7290000
trusted library allocation
page read and write
4D7D000
stack
page read and write
833000
trusted library allocation
page execute and read and write
5CF5000
trusted library allocation
page read and write
6985000
heap
page execute and read and write
391F000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
28C2000
trusted library allocation
page read and write
4022000
trusted library allocation
page read and write
35C6000
trusted library allocation
page read and write
31D0000
trusted library allocation
page execute and read and write
44D9000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
3940000
trusted library allocation
page read and write
25B3000
trusted library allocation
page execute and read and write
35FC000
trusted library allocation
page read and write
25D6000
trusted library allocation
page execute and read and write
2A69000
trusted library allocation
page read and write
6635000
heap
page read and write
713E000
stack
page read and write
6631000
heap
page read and write
35A2000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
7E60000
heap
page read and write
3564000
trusted library allocation
page read and write
7E57000
heap
page read and write
FBE000
stack
page read and write
5AF0000
heap
page read and write
75AE000
stack
page read and write
3755000
trusted library allocation
page read and write
9C0000
heap
page read and write
6860000
trusted library allocation
page read and write
4C7E000
stack
page read and write
37EC000
trusted library allocation
page read and write
3921000
trusted library allocation
page read and write
3587000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
7F6A000
heap
page read and write
D5E000
stack
page read and write
65F4000
heap
page read and write
384C000
trusted library allocation
page read and write
F0A000
stack
page read and write
1767000
heap
page read and write
6CF0000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
509F000
stack
page read and write
440E000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
2677000
stack
page read and write
2A7A000
trusted library allocation
page execute and read and write
26C8000
trusted library allocation
page read and write
84DE000
stack
page read and write
970000
heap
page read and write
43B4000
trusted library allocation
page read and write
BF0000
trusted library allocation
page execute and read and write
357D000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
168C000
stack
page read and write
FC0000
heap
page read and write
3136000
trusted library allocation
page read and write
4455000
trusted library allocation
page read and write
591E000
stack
page read and write
7E81000
heap
page read and write
7E2A000
heap
page read and write
DF0000
trusted library allocation
page read and write
38CD000
trusted library allocation
page read and write
4C06000
trusted library allocation
page read and write
849D000
stack
page read and write
369D000
trusted library allocation
page read and write
394F000
trusted library allocation
page read and write
3833000
trusted library allocation
page read and write
7DA0000
heap
page read and write
400A000
trusted library allocation
page read and write
4411000
trusted library allocation
page read and write
442A000
trusted library allocation
page read and write
43CB000
trusted library allocation
page read and write
6E3E000
stack
page read and write
6EFC000
heap
page read and write
975000
heap
page read and write
3657000
trusted library allocation
page read and write
42D0000
trusted library allocation
page execute and read and write
3560000
trusted library allocation
page read and write
3925000
trusted library allocation
page read and write
38B4000
trusted library allocation
page read and write
15CE000
stack
page read and write
393C000
trusted library allocation
page read and write
6F0F000
heap
page read and write
4A01000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
368A000
trusted library allocation
page read and write
7EB8000
heap
page read and write
742D000
stack
page read and write
7700000
trusted library allocation
page read and write
385F000
trusted library allocation
page read and write
43AF000
trusted library allocation
page read and write
367E000
trusted library allocation
page read and write
43D1000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
438B000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
14C0000
heap
page read and write
312E000
trusted library allocation
page read and write
9DE000
heap
page read and write
176E000
heap
page read and write
6CA79000
unkown
page read and write
37D3000
trusted library allocation
page read and write
16FB000
heap
page read and write
66B9000
heap
page read and write
7709000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
3665000
trusted library allocation
page read and write
3904000
trusted library allocation
page read and write
16C7000
heap
page read and write
361A000
trusted library allocation
page read and write
3852000
trusted library allocation
page read and write
4BBE000
trusted library allocation
page read and write
39EA000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
6633000
heap
page read and write
5FFC000
stack
page read and write
3610000
trusted library allocation
page read and write
31A0000
heap
page read and write
BAF000
stack
page read and write
5C1E000
stack
page read and write
4C90000
trusted library section
page read and write
2783000
heap
page read and write
7DFE000
stack
page read and write
1452000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
3764000
trusted library allocation
page read and write
493F000
trusted library allocation
page read and write
6CA24000
unkown
page readonly
2994000
trusted library allocation
page read and write
ABF000
heap
page read and write
671E000
trusted library allocation
page read and write
440C000
stack
page read and write
3888000
trusted library allocation
page read and write
4481000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
3816000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
43C0000
heap
page execute and read and write
6740000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
350000
unkown
page readonly
43D4000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
4D0E000
stack
page read and write
3672000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
27F0000
heap
page read and write
781000
remote allocation
page execute and read and write
38E6000
trusted library allocation
page read and write
5AEE000
stack
page read and write
2781000
heap
page read and write
3989000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
FF490000
trusted library allocation
page execute and read and write
940000
heap
page read and write
5A6F000
stack
page read and write
3A05000
trusted library allocation
page read and write
FCD000
heap
page read and write
80B0000
trusted library allocation
page execute and read and write
719D000
stack
page read and write
4158000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
66CB000
heap
page read and write
43A4000
trusted library allocation
page read and write
294E000
unkown
page read and write
6B8B000
stack
page read and write
7260000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
4AEA000
trusted library allocation
page read and write
9E4000
heap
page read and write
7610000
trusted library allocation
page read and write
6604000
heap
page read and write
6C0A000
stack
page read and write
290D000
unkown
page read and write
A05000
heap
page read and write
756B000
unkown
page read and write
9B0000
heap
page read and write
442C000
trusted library allocation
page read and write
3FB8000
trusted library allocation
page read and write
530000
unkown
page readonly
297F000
trusted library allocation
page read and write
6A0B000
stack
page read and write
387C000
trusted library allocation
page read and write
845E000
stack
page read and write
AB7000
heap
page read and write
7705000
trusted library allocation
page read and write
39E6000
trusted library allocation
page read and write
3A59000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
369B000
trusted library allocation
page read and write
7FA30000
trusted library allocation
page execute and read and write
4B00000
heap
page read and write
15F0000
trusted library allocation
page read and write
444E000
stack
page read and write
27E0000
heap
page read and write
37BE000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
6E8C000
heap
page read and write
75D0000
trusted library allocation
page execute and read and write
394B000
trusted library allocation
page read and write
29D0000
heap
page read and write
57AE000
stack
page read and write
3BAE000
trusted library allocation
page read and write
37EA000
trusted library allocation
page read and write
4311000
trusted library allocation
page read and write
386B000
trusted library allocation
page read and write
65EF000
stack
page read and write
7F77000
heap
page read and write
6880000
trusted library allocation
page read and write
7670000
trusted library allocation
page execute and read and write
3160000
heap
page read and write
3568000
trusted library allocation
page read and write
12F7000
stack
page read and write
5C80000
trusted library allocation
page execute and read and write
26D6000
trusted library allocation
page read and write
66AC000
heap
page read and write
25B0000
trusted library allocation
page read and write
63AE000
stack
page read and write
6F1E000
heap
page read and write
7CE0000
trusted library allocation
page execute and read and write
470C000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
860000
heap
page read and write
7EFB000
heap
page read and write
3680000
trusted library allocation
page read and write
2A85000
trusted library allocation
page execute and read and write
6F1B000
heap
page read and write
7D9E000
stack
page read and write
35D5000
trusted library allocation
page read and write
9BE000
heap
page read and write
70E7000
trusted library allocation
page read and write
2A5D000
trusted library allocation
page execute and read and write
37C8000
trusted library allocation
page read and write
8243000
trusted library allocation
page read and write
3163000
heap
page read and write
2A82000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
7EB0000
heap
page read and write
2840000
trusted library allocation
page read and write
3936000
trusted library allocation
page read and write
930000
heap
page read and write
FD0000
heap
page read and write
38E4000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
3955000
trusted library allocation
page read and write
3697000
trusted library allocation
page read and write
772F000
trusted library allocation
page read and write
7EE000
stack
page read and write
5489000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
385D000
trusted library allocation
page read and write
3622000
trusted library allocation
page read and write
144D000
trusted library allocation
page execute and read and write
2AA0000
trusted library allocation
page read and write
3583000
trusted library allocation
page read and write
7043D000
unkown
page read and write
25DA000
trusted library allocation
page execute and read and write
6BCD000
stack
page read and write
3038000
trusted library allocation
page read and write
76A0000
trusted library allocation
page execute and read and write
26D0000
heap
page read and write
313D000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
7E08000
heap
page read and write
6677000
heap
page read and write
68BE000
stack
page read and write
71BE000
stack
page read and write
5B17000
heap
page read and write
38AA000
trusted library allocation
page read and write
4AFF000
stack
page read and write
14B0000
trusted library allocation
page execute and read and write
7EC8000
heap
page read and write
354F000
trusted library allocation
page read and write
64AD000
stack
page read and write
28F5000
trusted library allocation
page read and write
7651000
trusted library allocation
page read and write
7DEE000
stack
page read and write
441D000
trusted library allocation
page read and write
441A000
trusted library allocation
page read and write
7725000
trusted library allocation
page read and write
1434000
trusted library allocation
page read and write
532000
unkown
page readonly
42E0000
trusted library allocation
page read and write
4407000
trusted library allocation
page read and write
687B000
stack
page read and write
7E1C000
heap
page read and write
2AC0000
trusted library allocation
page read and write
6F08000
heap
page read and write
6000000
heap
page read and write
35A0000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
25EB000
trusted library allocation
page execute and read and write
2AE0000
heap
page read and write
4470000
heap
page read and write
7EBC000
heap
page read and write
3768000
trusted library allocation
page read and write
FC7000
heap
page read and write
9DC000
heap
page read and write
43A7000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
3807000
trusted library allocation
page read and write
7EC5000
heap
page read and write
788E000
stack
page read and write
7EB4000
heap
page read and write
36C5000
trusted library allocation
page read and write
2AB0000
heap
page readonly
367C000
trusted library allocation
page read and write
7480000
heap
page read and write
35B5000
trusted library allocation
page read and write
499E000
stack
page read and write
70DE000
stack
page read and write
1467000
trusted library allocation
page execute and read and write
70421000
unkown
page execute read
3884000
trusted library allocation
page read and write
6F20000
heap
page read and write
3DAB000
trusted library allocation
page read and write
7702000
trusted library allocation
page read and write
7ACD000
stack
page read and write
761A000
trusted library allocation
page read and write
4384000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2728000
heap
page read and write
7E6C000
heap
page read and write
C9E000
stack
page read and write
35FE000
trusted library allocation
page read and write
25E7000
trusted library allocation
page execute and read and write
38A3000
trusted library allocation
page read and write
171F000
heap
page read and write
4417000
trusted library allocation
page read and write
352E000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
865000
heap
page read and write
15E0000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
2A00000
heap
page read and write
70436000
unkown
page readonly
386D000
trusted library allocation
page read and write
4398000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
4BB5000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
7450000
trusted library allocation
page execute and read and write
3861000
trusted library allocation
page read and write
6D00000
heap
page read and write
3652000
trusted library allocation
page read and write
381C000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
188E000
stack
page read and write
3506000
trusted library allocation
page read and write
7B50000
heap
page read and write
80C0000
trusted library allocation
page read and write
82CF000
stack
page read and write
7718000
trusted library allocation
page read and write
25BD000
trusted library allocation
page execute and read and write
6CA10000
unkown
page readonly
28C4000
trusted library allocation
page read and write
1778000
heap
page read and write
54DE000
stack
page read and write
4477000
heap
page read and write
3A0B000
trusted library allocation
page read and write
7E3E000
heap
page read and write
2904000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
6CFF000
stack
page read and write
3E4C000
trusted library allocation
page read and write
4CE0000
heap
page read and write
7770000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
396A000
trusted library allocation
page read and write
3EC5000
trusted library allocation
page read and write
5629000
trusted library allocation
page read and write
6CBE000
stack
page read and write
4465000
trusted library allocation
page read and write
31C0000
heap
page read and write
834000
trusted library allocation
page read and write
6F91000
heap
page read and write
6E82000
heap
page read and write
63C000
stack
page read and write
7F4A000
heap
page read and write
596E000
stack
page read and write
7E0B000
heap
page read and write
69C0000
trusted library allocation
page execute and read and write
7EA2000
heap
page read and write
6B0A000
stack
page read and write
143D000
trusted library allocation
page execute and read and write
8A10000
heap
page read and write
72E0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
4544000
trusted library allocation
page read and write
7F7E000
heap
page read and write
38F9000
trusted library allocation
page read and write
683D000
stack
page read and write
69E0000
trusted library allocation
page execute and read and write
A1B000
heap
page read and write
3987000
trusted library allocation
page read and write
539E000
stack
page read and write
8F9000
stack
page read and write
38B2000
trusted library allocation
page read and write
6F49000
heap
page read and write
29CE000
stack
page read and write
35EF000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
3906000
trusted library allocation
page read and write
366F000
trusted library allocation
page read and write
26FC000
heap
page read and write
439B000
trusted library allocation
page read and write
6622000
heap
page read and write
7E11000
heap
page read and write
7E6E000
heap
page read and write
164E000
stack
page read and write
4DFD000
stack
page read and write
6F74000
heap
page read and write
2720000
heap
page read and write
438C000
stack
page read and write
3934000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
64EE000
stack
page read and write
6B4E000
stack
page read and write
7043D000
unkown
page read and write
3524000
trusted library allocation
page read and write
6751000
trusted library allocation
page read and write
7E22000
heap
page read and write
7E4F000
heap
page read and write
4E50000
heap
page execute and read and write
3654000
trusted library allocation
page read and write
DDF000
stack
page read and write
3551000
trusted library allocation
page read and write
8390000
trusted library allocation
page execute and read and write
76ED000
stack
page read and write
1443000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
26AE000
stack
page read and write
5481000
trusted library allocation
page read and write
5AAE000
stack
page read and write
35FA000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
3532000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
5A13000
heap
page execute and read and write
39C9000
trusted library allocation
page read and write
6E8F000
heap
page read and write
3846000
trusted library allocation
page read and write
1456000
trusted library allocation
page execute and read and write
45D5000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
9F7000
heap
page read and write
38AE000
trusted library allocation
page read and write
4446000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
7E13000
heap
page read and write
7F0F000
heap
page read and write
5EFB000
stack
page read and write
282E000
stack
page read and write
37EF000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
7043F000
unkown
page readonly
677E000
trusted library allocation
page read and write
565E000
stack
page read and write
3809000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
445C000
trusted library allocation
page read and write
9B8000
heap
page read and write
1480000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
7A0000
heap
page read and write
7E42000
trusted library allocation
page read and write
3848000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
4321000
trusted library allocation
page read and write
AAC000
heap
page read and write
730000
remote allocation
page execute and read and write
7B5A000
heap
page read and write
71FD000
stack
page read and write
25D0000
trusted library allocation
page read and write
7E72000
heap
page read and write
5CD0000
trusted library allocation
page execute and read and write
3932000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
330E000
stack
page read and write
5B1E000
stack
page read and write
8230000
trusted library allocation
page read and write
2908000
trusted library allocation
page read and write
561E000
stack
page read and write
7CD0000
heap
page read and write
A51000
heap
page read and write
3917000
trusted library allocation
page read and write
4BCA000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
3E89000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
5E80000
heap
page read and write
7090000
trusted library allocation
page execute and read and write
7E86000
heap
page read and write
58DD000
stack
page read and write
72A0000
trusted library allocation
page read and write
38D3000
trusted library allocation
page read and write
66FB000
trusted library allocation
page read and write
70EA000
trusted library allocation
page read and write
37D1000
trusted library allocation
page read and write
3953000
trusted library allocation
page read and write
351F000
trusted library allocation
page read and write
66DF000
heap
page read and write
4383000
trusted library allocation
page read and write
3DAE000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
9F0000
heap
page read and write
4300000
heap
page read and write
25E0000
trusted library allocation
page read and write
354D000
trusted library allocation
page read and write
361C000
trusted library allocation
page read and write
43AA000
trusted library allocation
page read and write
6ACE000
stack
page read and write
94B000
trusted library allocation
page execute and read and write
3534000
trusted library allocation
page read and write
7F2A000
heap
page read and write
72F0000
trusted library allocation
page read and write
579E000
stack
page read and write
3985000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
441F000
trusted library allocation
page read and write
6F02000
heap
page read and write
7210000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
7690000
trusted library allocation
page execute and read and write
6A8F000
stack
page read and write
363B000
trusted library allocation
page read and write
178C000
heap
page read and write
72D0000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
4425000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
39E8000
trusted library allocation
page read and write
489C000
stack
page read and write
381E000
trusted library allocation
page read and write
771F000
trusted library allocation
page read and write
37CF000
trusted library allocation
page read and write
6CA11000
unkown
page execute read
3502000
trusted library allocation
page read and write
4457000
trusted library allocation
page read and write
3618000
trusted library allocation
page read and write
146B000
trusted library allocation
page execute and read and write
3100000
heap
page execute and read and write
39E2000
trusted library allocation
page read and write
25E2000
trusted library allocation
page read and write
38EA000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
264E000
stack
page read and write
34FA000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
6F66000
heap
page read and write
708B000
trusted library allocation
page read and write
9D0000
heap
page read and write
422A000
trusted library allocation
page read and write
2929000
trusted library allocation
page read and write
7043D000
unkown
page read and write
43BB000
trusted library allocation
page read and write
4462000
trusted library allocation
page read and write
D60000
heap
page read and write
2600000
trusted library allocation
page read and write
6701000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
3951000
trusted library allocation
page read and write
7F72000
heap
page read and write
8240000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
7E02000
heap
page read and write
1462000
trusted library allocation
page read and write
352000
unkown
page readonly
3A07000
trusted library allocation
page read and write
38EC000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
6B6E000
stack
page read and write
3684000
trusted library allocation
page read and write
357F000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
28D7000
trusted library allocation
page read and write
7C00000
heap
page read and write
7280000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
37FD000
trusted library allocation
page read and write
844000
trusted library allocation
page read and write
3669000
trusted library allocation
page read and write
1433000
trusted library allocation
page execute and read and write
4202000
trusted library allocation
page read and write
6E80000
heap
page read and write
34EB000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
A12000
heap
page read and write
3850000
trusted library allocation
page read and write
7E30000
heap
page read and write
3114000
trusted library allocation
page read and write
35B7000
trusted library allocation
page read and write
2709000
heap
page read and write
708D000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
7EF2000
heap
page read and write
3968000
trusted library allocation
page read and write
7D5D000
stack
page read and write
6C6C000
stack
page read and write
1490000
heap
page read and write
2A53000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page execute and read and write
519F000
stack
page read and write
7BE000
remote allocation
page execute and read and write
3949000
trusted library allocation
page read and write
8A26000
heap
page read and write
7493000
trusted library allocation
page read and write
34E5000
trusted library allocation
page read and write
7EC4000
heap
page read and write
7640000
trusted library allocation
page read and write
70420000
unkown
page readonly
4B20000
trusted library allocation
page read and write
476B000
trusted library allocation
page read and write
397B000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
3592000
trusted library allocation
page read and write
7220000
trusted library allocation
page execute and read and write
3110000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
67FE000
stack
page read and write
34DB000
trusted library allocation
page read and write
2700000
heap
page read and write
3CCF000
trusted library allocation
page read and write
3835000
trusted library allocation
page read and write
59BE000
stack
page read and write
35E3000
trusted library allocation
page read and write
AC3000
heap
page read and write
8419000
stack
page read and write
1465000
trusted library allocation
page execute and read and write
9BD000
stack
page read and write
3861000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
540C000
stack
page read and write
There are 904 hidden memdumps, click here to show them.