IOC Report
jyRdJ06Naz.exe

loading gif

Files

File Path
Type
Category
Malicious
jyRdJ06Naz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Programs\My Program\Octo_Browser_latest_win.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\is-6IG1B.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\is-8QRAK.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\is-E8O0B.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-PUDAC.tmp\jyRdJ06Naz.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ttgtggt.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Programs\My Program\unins000.dat
InnoSetup Log My Program {873AD2E0-A2B0-482E-8E07-2D2EF1B74924}, version 0x418, 2208 bytes, 580913\37\user\376, C:\Users\user\AppData\Local\Programs\My P
dropped
C:\Users\user\AppData\Local\Temp\is-OJBCC.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\My Program.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Nov 12 12:56:07 2024, mtime=Tue Nov 12 12:56:07 2024, atime=Sun Nov 10 04:07:02 2024, length=346112, window=hide
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jyRdJ06Naz.exe
"C:\Users\user\Desktop\jyRdJ06Naz.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-PUDAC.tmp\jyRdJ06Naz.tmp
"C:\Users\user\AppData\Local\Temp\is-PUDAC.tmp\jyRdJ06Naz.tmp" /SL5="$2042A,48507756,797184,C:\Users\user\Desktop\jyRdJ06Naz.exe"
malicious
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe
"C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://www.remobjects.com/ps
unknown
https://www.innosetup.com/
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.github.com/
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
https://www.github.com/.https://www.github.com/.https://www.github.com/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
https://sectigo.com/CPS0
unknown
https://www.github.com/Q9
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\.exe\OpenWithProgids
Win64.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER_Classes\Win64.exe
NULL
HKEY_CURRENT_USER_Classes\Win64.exe\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\Win64.exe\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\Applications\ttgtggt.exe\SupportedTypes
.myp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F2000
unkown
page readonly
malicious
2794000
trusted library allocation
page read and write
malicious
7FFD9BC20000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
298C000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
BFA000
heap
page read and write
2DC4000
trusted library allocation
page read and write
1D94A000
heap
page read and write
12ACD000
trusted library allocation
page read and write
C54000
heap
page read and write
2B9C000
trusted library allocation
page read and write
2DDF000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
12971000
trusted library allocation
page read and write
1282B000
trusted library allocation
page read and write
29A4000
trusted library allocation
page read and write
128DE000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
2953000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page read and write
C44000
heap
page read and write
7FFD9BBAA000
trusted library allocation
page read and write
7B0000
heap
page read and write
12726000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
C50000
heap
page read and write
279D000
direct allocation
page read and write
2982000
trusted library allocation
page read and write
7FFD9BBA5000
trusted library allocation
page read and write
29AA000
trusted library allocation
page read and write
1BC20000
heap
page read and write
1BD08000
heap
page read and write
1BD44000
heap
page read and write
2DE4000
trusted library allocation
page read and write
1AA81000
heap
page read and write
2A1E000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
7FFD9B999000
trusted library allocation
page read and write
2832000
direct allocation
page read and write
1BCA6000
heap
page read and write
BD8000
heap
page read and write
2A75000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
1288A000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
27E4000
direct allocation
page read and write
1291E000
trusted library allocation
page read and write
12721000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
C3C000
heap
page read and write
C34000
heap
page read and write
12ADF000
trusted library allocation
page read and write
896000
heap
page read and write
277D000
direct allocation
page read and write
3C6C000
heap
page read and write
12A54000
trusted library allocation
page read and write
2E2E000
trusted library allocation
page read and write
C0F000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
C41000
heap
page read and write
C80000
heap
page read and write
12C79000
trusted library allocation
page read and write
2968000
trusted library allocation
page read and write
7FFD9BC18000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
C21000
heap
page read and write
2BDE000
trusted library allocation
page read and write
7FFD9B9DC000
trusted library allocation
page read and write
2BA9000
trusted library allocation
page read and write
2822000
direct allocation
page read and write
2DB9000
trusted library allocation
page read and write
2826000
direct allocation
page read and write
D1000
unkown
page execute read
27A0000
direct allocation
page read and write
1BC76000
heap
page read and write
C45000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
2AD2000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
12AB7000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
27C4000
direct allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BB87000
trusted library allocation
page read and write
1BD37000
heap
page read and write
3D30000
heap
page read and write
280E000
direct allocation
page read and write
1BCCC000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
27C6000
direct allocation
page read and write
2818000
direct allocation
page read and write
12A3B000
trusted library allocation
page read and write
12AD9000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
2D93000
trusted library allocation
page read and write
2D40000
heap
page read and write
179000
unkown
page read and write
C53000
heap
page read and write
7FFD9BB8D000
trusted library allocation
page read and write
12A67000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
D0000
unkown
page readonly
2A80000
trusted library allocation
page read and write
BF6000
heap
page read and write
2D3C000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page read and write
CE5000
heap
page read and write
C12000
heap
page read and write
1D940000
heap
page read and write
55E000
unkown
page write copy
2BAD000
trusted library allocation
page read and write
AD0000
heap
page read and write
1B3C0000
heap
page read and write
285D000
direct allocation
page read and write
C6F000
heap
page read and write
2B7C000
trusted library allocation
page read and write
12B38000
trusted library allocation
page read and write
3F6E000
stack
page read and write
7FF4EDC00000
trusted library allocation
page execute and read and write
C56000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1BA14000
heap
page read and write
2DB5000
trusted library allocation
page read and write
C0A000
heap
page read and write
1B38E000
stack
page read and write
C63000
heap
page read and write
276F000
direct allocation
page read and write
2AE7000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
D7E000
stack
page read and write
2F45000
trusted library allocation
page read and write
27BB000
direct allocation
page read and write
278B000
direct allocation
page read and write
3FAE000
stack
page read and write
27DA000
direct allocation
page read and write
7FFD9BA5B000
trusted library allocation
page read and write
12831000
trusted library allocation
page read and write
C1B000
heap
page read and write
2760000
direct allocation
page read and write
1292A000
trusted library allocation
page read and write
C3B000
heap
page read and write
F2E000
stack
page read and write
2AC3000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
1B60F000
stack
page read and write
2A82000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
C49000
heap
page read and write
2D71000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
2B0000
unkown
page readonly
2F43000
trusted library allocation
page read and write
281F000
direct allocation
page read and write
2EB5000
trusted library allocation
page read and write
12885000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
17B000
unkown
page read and write
2DAF000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
C59000
heap
page read and write
3863000
direct allocation
page read and write
12824000
trusted library allocation
page read and write
2E32000
trusted library allocation
page read and write
3B8D000
direct allocation
page read and write
2AE5000
trusted library allocation
page read and write
2851000
direct allocation
page read and write
3840000
direct allocation
page read and write
1BD47000
heap
page read and write
BFA000
heap
page read and write
C3E000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2B69000
trusted library allocation
page read and write
12A64000
trusted library allocation
page read and write
284F000
direct allocation
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
3E6E000
stack
page read and write
2EDF000
trusted library allocation
page read and write
3F0000
unkown
page readonly
2B30000
trusted library allocation
page read and write
BFD000
heap
page read and write
BF3000
heap
page read and write
2B3F000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
C29000
heap
page read and write
2E34000
trusted library allocation
page read and write
FA0000
heap
page read and write
2BCF000
trusted library allocation
page read and write
C17000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2806000
direct allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
27A2000
direct allocation
page read and write
2DB1000
trusted library allocation
page read and write
12B26000
trusted library allocation
page read and write
3D31000
heap
page read and write
128EB000
trusted library allocation
page read and write
12962000
trusted library allocation
page read and write
272A000
direct allocation
page read and write
C1A000
heap
page read and write
12701000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
27E8000
direct allocation
page read and write
295C000
trusted library allocation
page read and write
3850000
direct allocation
page read and write
743000
stack
page read and write
CD0000
heap
page read and write
5D0000
heap
page read and write
127D8000
trusted library allocation
page read and write
411E000
stack
page read and write
800000
heap
page read and write
C65000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
182000
unkown
page read and write
1B1C3000
heap
page read and write
273C000
direct allocation
page read and write
12A80000
trusted library allocation
page read and write
27D3000
direct allocation
page read and write
2A95000
trusted library allocation
page read and write
3C31000
heap
page read and write
2DF4000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
12731000
trusted library allocation
page read and write
2F0A000
trusted library allocation
page read and write
7F75B000
direct allocation
page read and write
7FFD9BA2F000
trusted library allocation
page read and write
27BE000
direct allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
2F2C000
trusted library allocation
page read and write
1BC4C000
heap
page read and write
2D91000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
1293F000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
1C4D0000
heap
page read and write
2D8F000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
1BC2A000
heap
page read and write
2B1F000
trusted library allocation
page read and write
8BB000
heap
page read and write
967000
heap
page read and write
1290E000
trusted library allocation
page read and write
BFF000
heap
page read and write
2EDD000
trusted library allocation
page read and write
12A83000
trusted library allocation
page read and write
12930000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
1BA75000
heap
page read and write
2BBC000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2D7E000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
12968000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
8FD000
heap
page read and write
1C00E000
stack
page read and write
2834000
direct allocation
page read and write
2ECC000
trusted library allocation
page read and write
1294C000
trusted library allocation
page read and write
1BA1F000
heap
page read and write
E7F000
stack
page read and write
2B05000
trusted library allocation
page read and write
12A74000
trusted library allocation
page read and write
2D50000
heap
page read and write
3040000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
C22000
heap
page read and write
2A35000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
C10000
heap
page read and write
3C6E000
heap
page read and write
27BD000
direct allocation
page read and write
189000
unkown
page readonly
7FFD9B846000
trusted library allocation
page read and write
ABE000
stack
page read and write
56D000
unkown
page read and write
128F8000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
3F0000
unkown
page readonly
2D9E000
trusted library allocation
page read and write
1BA5E000
heap
page read and write
2F39000
trusted library allocation
page read and write
C0A000
heap
page read and write
577000
unkown
page readonly
2BE9000
trusted library allocation
page read and write
93C000
stack
page read and write
3850000
direct allocation
page read and write
1BC2F000
heap
page read and write
3C6B000
heap
page read and write
2A77000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2888000
direct allocation
page read and write
2B32000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
1BC58000
heap
page read and write
2B3D000
trusted library allocation
page read and write
2EC6000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B9A5000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
C2A000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BB94000
trusted library allocation
page read and write
2DBE000
trusted library allocation
page read and write
2EB0000
heap
page read and write
1BD33000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
179000
unkown
page write copy
296C000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
C14000
heap
page read and write
27B0000
direct allocation
page read and write
7FE000
stack
page read and write
B90000
heap
page execute and read and write
2D62000
trusted library allocation
page read and write
55E000
unkown
page read and write
C38000
heap
page read and write
C45000
heap
page read and write
2D82000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
2B5A000
trusted library allocation
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
BFE000
heap
page read and write
1293A000
trusted library allocation
page read and write
618F000
stack
page read and write
2AF4000
trusted library allocation
page read and write
560000
unkown
page read and write
E05000
heap
page read and write
2E18000
trusted library allocation
page read and write
12A79000
trusted library allocation
page read and write
2856000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
BA5000
heap
page read and write
2A33000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
B30000
heap
page read and write
1BA7D000
heap
page read and write
2BDA000
trusted library allocation
page read and write
C52000
heap
page read and write
2B21000
trusted library allocation
page read and write
D80000
heap
page read and write
1BF0D000
stack
page read and write
BEE000
heap
page read and write
1BAF0000
heap
page read and write
CA1000
heap
page read and write
2B6D000
trusted library allocation
page read and write
1BC95000
heap
page read and write
128D1000
trusted library allocation
page read and write
DEE000
stack
page read and write
1BD12000
heap
page read and write
1D920000
heap
page read and write
27F8000
direct allocation
page read and write
27B6000
direct allocation
page read and write
1BD9B000
heap
page read and write
3D31000
heap
page read and write
29C6000
trusted library allocation
page read and write
27F4000
direct allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1BA49000
heap
page read and write
2799000
direct allocation
page read and write
2EE1000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
12914000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
2768000
direct allocation
page read and write
2EA8000
trusted library allocation
page read and write
12A51000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
1B85B000
stack
page read and write
1BA34000
heap
page read and write
E0E000
heap
page read and write
12B2B000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
2DDD000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
C31000
heap
page read and write
C60000
heap
page read and write
2D21000
trusted library allocation
page read and write
1BADD000
heap
page read and write
1BC0B000
stack
page read and write
2E80000
direct allocation
page execute and read and write
3C30000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
3B68000
direct allocation
page read and write
29C4000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
1BCBA000
heap
page read and write
2A20000
trusted library allocation
page read and write
1BA38000
heap
page read and write
2EAC000
trusted library allocation
page read and write
C6B000
heap
page read and write
29A8000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
C40000
heap
page read and write
AD5000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2B78000
trusted library allocation
page read and write
12A5D000
trusted library allocation
page read and write
12A89000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
1BA3C000
heap
page read and write
2E59000
trusted library allocation
page read and write
2A67000
trusted library allocation
page read and write
C3E000
heap
page read and write
26AE000
stack
page read and write
2DFF000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1287D000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
C21000
heap
page read and write
2BBA000
trusted library allocation
page read and write
1BC9E000
heap
page read and write
7FFD9BC06000
trusted library allocation
page read and write
127D2000
trusted library allocation
page read and write
1296F000
trusted library allocation
page read and write
C31000
heap
page read and write
B80000
heap
page read and write
2EB9000
trusted library allocation
page read and write
7F46B000
direct allocation
page read and write
8D3000
heap
page read and write
5C8000
unkown
page readonly
7FFD9B940000
trusted library allocation
page read and write
185000
unkown
page write copy
2BCB000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
27FB000
direct allocation
page read and write
2DC0000
trusted library allocation
page read and write
12A9C000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
C28000
heap
page read and write
C4F000
heap
page read and write
12907000
trusted library allocation
page read and write
27E1000
direct allocation
page read and write
2773000
direct allocation
page read and write
CAE000
stack
page read and write
BF3000
heap
page read and write
1BC53000
heap
page read and write
1B5CB000
stack
page read and write
2E1F000
direct allocation
page read and write
7FFD9BBD6000
trusted library allocation
page read and write
2AFB000
trusted library allocation
page read and write
7FFD9BBAF000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
C5F000
heap
page read and write
C40000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2848000
direct allocation
page read and write
2E03000
trusted library allocation
page read and write
C0E000
heap
page read and write
29A6000
trusted library allocation
page read and write
1BDA8000
heap
page read and write
12AD2000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
282B000
direct allocation
page read and write
2997000
trusted library allocation
page read and write
1AC8B000
stack
page read and write
C11000
heap
page read and write
2984000
trusted library allocation
page read and write
128E3000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
2731000
direct allocation
page read and write
7FFD9BBFF000
trusted library allocation
page read and write
1BCC4000
heap
page read and write
1BC15000
heap
page read and write
1271B000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
12A4B000
trusted library allocation
page read and write
1BA93000
heap
page read and write
C2D000
heap
page read and write
1BD1D000
heap
page read and write
2B76000
trusted library allocation
page read and write
C20000
heap
page read and write
2DF6000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
C17000
heap
page read and write
2CA3000
heap
page read and write
C3B000
heap
page read and write
7FFD9BBEA000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
C4D000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
C1D000
heap
page read and write
2BE7000
trusted library allocation
page read and write
12A38000
trusted library allocation
page read and write
C62000
heap
page read and write
2AAE000
trusted library allocation
page read and write
570000
unkown
page write copy
C3C000
heap
page read and write
5400000
heap
page read and write
2E56000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
274B000
direct allocation
page read and write
1273E000
trusted library allocation
page read and write
1D950000
heap
page read and write
2DA7000
trusted library allocation
page read and write
F70000
heap
page read and write
12B32000
trusted library allocation
page read and write
127CB000
trusted library allocation
page read and write
12923000
trusted library allocation
page read and write
3B39000
direct allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
CE0000
heap
page read and write
1BCF8000
heap
page read and write
2843000
direct allocation
page read and write
2E07000
trusted library allocation
page read and write
128F2000
trusted library allocation
page read and write
1C5E0000
heap
page read and write
2AD5000
trusted library allocation
page read and write
2B1000
unkown
page execute read
1B2CE000
stack
page read and write
C27000
heap
page read and write
2A88000
trusted library allocation
page read and write
AEC000
stack
page read and write
2EDB000
trusted library allocation
page read and write
C38000
heap
page read and write
27EF000
direct allocation
page read and write
2A5E000
trusted library allocation
page read and write
2815000
direct allocation
page read and write
C5D000
heap
page read and write
3840000
direct allocation
page read and write
7FFD9BBB3000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
1BA10000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
12956000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
C56000
heap
page read and write
12AA6000
trusted library allocation
page read and write
2D53000
heap
page read and write
7FFD9BC08000
trusted library allocation
page read and write
12A41000
trusted library allocation
page read and write
12902000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
386D000
direct allocation
page read and write
AC0000
heap
page read and write
2AAC000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
8FB000
heap
page read and write
2759000
direct allocation
page read and write
29B9000
trusted library allocation
page read and write
12A58000
trusted library allocation
page read and write
298A000
trusted library allocation
page read and write
12A70000
trusted library allocation
page read and write
C2D000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
385B000
direct allocation
page read and write
E00000
heap
page read and write
C2E000
heap
page read and write
BEB000
heap
page read and write
5E0000
heap
page read and write
C6B000
heap
page read and write
1BCAA000
heap
page read and write
1D968000
heap
page read and write
3880000
direct allocation
page read and write
12953000
trusted library allocation
page read and write
1BCEA000
heap
page read and write
2A86000
trusted library allocation
page read and write
C35000
heap
page read and write
2B0E000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
870000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
C14000
heap
page read and write
2A11000
trusted library allocation
page read and write
1BD18000
heap
page read and write
12A8C000
trusted library allocation
page read and write
27CC000
direct allocation
page read and write
1D92C000
heap
page read and write
2ECA000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
C61000
heap
page read and write
C21000
heap
page read and write
27CD000
direct allocation
page read and write
2B67000
trusted library allocation
page read and write
83B000
stack
page read and write
27A8000
direct allocation
page read and write
2D25000
trusted library allocation
page read and write
1B75E000
stack
page read and write
2DDB000
trusted library allocation
page read and write
2999000
trusted library allocation
page read and write
2CA0000
heap
page read and write
7FFD9BBD4000
trusted library allocation
page read and write
890000
heap
page read and write
29AC000
trusted library allocation
page read and write
12A6D000
trusted library allocation
page read and write
2988000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
12A95000
trusted library allocation
page read and write
C06000
heap
page read and write
3B95000
direct allocation
page read and write
2B8D000
trusted library allocation
page read and write
2AFF000
trusted library allocation
page read and write
1C5DD000
stack
page read and write
12946000
trusted library allocation
page read and write
1C5F1000
heap
page read and write
1B390000
heap
page execute and read and write
3880000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1BD6B000
heap
page read and write
F77000
heap
page read and write
C77000
heap
page read and write
B1E000
stack
page read and write
7FFD9BBE1000
trusted library allocation
page read and write
5890000
direct allocation
page read and write
BA0000
heap
page read and write
2E30000
trusted library allocation
page read and write
C74000
heap
page read and write
E2E000
stack
page read and write
2802000
direct allocation
page read and write
287A000
direct allocation
page read and write
1B1C0000
heap
page read and write
2720000
direct allocation
page read and write
2AC1000
trusted library allocation
page read and write
1D9B9000
heap
page read and write
C31000
heap
page read and write
1BC10000
heap
page read and write
C8F000
heap
page read and write
C0E000
heap
page read and write
1272C000
trusted library allocation
page read and write
C32000
heap
page read and write
1BAD3000
heap
page read and write
2E67000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
1BD77000
heap
page read and write
2CB0000
heap
page read and write
2858000
direct allocation
page read and write
12A48000
trusted library allocation
page read and write
7FFD9BAAA000
trusted library allocation
page read and write
12A35000
trusted library allocation
page read and write
2744000
direct allocation
page read and write
C2D000
heap
page read and write
2A44000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
B94000
heap
page execute and read and write
40AE000
stack
page read and write
7F450000
direct allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
7FFD9B7B0000
trusted library allocation
page read and write
2809000
direct allocation
page read and write
2840000
direct allocation
page read and write
2A42000
trusted library allocation
page read and write
B5E000
stack
page read and write
8D1000
heap
page read and write
3B48000
direct allocation
page read and write
575000
unkown
page readonly
C35000
heap
page read and write
89C000
heap
page read and write
2AA2000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
1281F000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9BBD1000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
12981000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
27AF000
direct allocation
page read and write
1BD5C000
heap
page read and write
2839000
direct allocation
page read and write
2A37000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
286C000
direct allocation
page read and write
283C000
direct allocation
page read and write
CE0000
heap
page read and write
2701000
trusted library allocation
page read and write
1C4DC000
heap
page read and write
C59000
heap
page read and write
128D7000
trusted library allocation
page read and write
C03000
heap
page read and write
7FFD9BBF7000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
12A90000
trusted library allocation
page read and write
1B4CE000
stack
page read and write
128FF000
trusted library allocation
page read and write
2A84000
trusted library allocation
page read and write
2776000
direct allocation
page read and write
2B01000
trusted library allocation
page read and write
2ED9000
trusted library allocation
page read and write
27A9000
direct allocation
page read and write
1C5FD000
heap
page read and write
2F00000
trusted library allocation
page read and write
12780000
trusted library allocation
page read and write
C17000
heap
page read and write
1291B000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
27FF000
direct allocation
page read and write
27D4000
direct allocation
page read and write
1BCDE000
heap
page read and write
2873000
direct allocation
page read and write
C50000
heap
page read and write
C64000
heap
page read and write
1A730000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
C92000
heap
page read and write
C4B000
heap
page read and write
12878000
trusted library allocation
page read and write
282D000
direct allocation
page read and write
2752000
direct allocation
page read and write
820000
heap
page read and write
1BA16000
heap
page read and write
2792000
direct allocation
page read and write
12738000
trusted library allocation
page read and write
1BD3F000
heap
page read and write
C5F000
heap
page read and write
127C6000
trusted library allocation
page read and write
2864000
direct allocation
page read and write
1BA63000
heap
page read and write
2810000
direct allocation
page read and write
1BA41000
heap
page read and write
BD0000
heap
page read and write
2A22000
trusted library allocation
page read and write
2881000
direct allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
903000
heap
page read and write
2EA4000
trusted library allocation
page read and write
C40000
heap
page read and write
26F0000
heap
page execute and read and write
187000
unkown
page readonly
2791000
direct allocation
page read and write
9A0000
heap
page read and write
2A97000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
296A000
trusted library allocation
page read and write
C3C000
heap
page read and write
1B1BE000
stack
page read and write
565000
unkown
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
12937000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
584000
stack
page read and write
27EB000
direct allocation
page read and write
EC0000
heap
page read and write
1295B000
trusted library allocation
page read and write
1BD2D000
heap
page read and write
2B7F000
trusted library allocation
page read and write
1BD15000
heap
page read and write
3B81000
direct allocation
page read and write
284A000
direct allocation
page read and write
2AD0000
trusted library allocation
page read and write
B88000
heap
page read and write
There are 775 hidden memdumps, click here to show them.