IOC Report
DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER628D.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Sep 26 07:26:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER64C1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6510.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0k3srmay.njf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2kjh2l1s.oq1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sgbyx4z.na4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xmbsoyw.evx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3k35ztk.tpn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ccpktzlr.d4q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_flyghtq1.x2t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ikzmqees.beb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3nwbpja.nqc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nbfhnphb.hh1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_secaqxsi.gvo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t2n5vvuf.dz5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vgyfj0rh.ays.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vukss2gq.2sc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vywkdah3.ars.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnv41itx.bec.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 26 06:22:28 2024, mtime=Thu Sep 26 06:22:28 2024, atime=Thu Sep 26 06:22:28 2024, length=489984, window=hide
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
malicious
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
malicious
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7600 -s 2028
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
104.250.180.178
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
ProgramId
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
FileId
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
LowerCaseLongPath
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
LongPathHash
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
Name
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
OriginalFileName
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
Publisher
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
Version
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
BinFileVersion
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
BinaryType
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
ProductName
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
ProductVersion
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
LinkDate
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
BinProductVersion
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
AppxPackageFullName
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
AppxPackageRelativeId
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
Size
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
Language
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DE1000
trusted library allocation
page read and write
malicious
3201000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
34BE000
stack
page read and write
75CE000
stack
page read and write
35C0000
heap
page read and write
610A000
stack
page read and write
915E000
stack
page read and write
7F20000
trusted library allocation
page read and write
3780000
trusted library allocation
page execute and read and write
7FB4000
heap
page read and write
5074000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
5D1E000
stack
page read and write
5581000
trusted library allocation
page read and write
2B50000
trusted library section
page read and write
6E1F000
stack
page read and write
2B20000
heap
page read and write
4200000
trusted library allocation
page read and write
5BDE000
stack
page read and write
170C000
stack
page read and write
7320000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
FDE000
stack
page read and write
8970000
heap
page read and write
249C000
stack
page read and write
70CE000
stack
page read and write
3740000
heap
page readonly
712B000
stack
page read and write
6FFC000
stack
page read and write
4509000
stack
page read and write
6950000
trusted library allocation
page read and write
4FBE000
stack
page read and write
3580000
trusted library allocation
page read and write
4490000
heap
page execute and read and write
7130000
trusted library allocation
page read and write
6647000
heap
page read and write
4CAF000
trusted library allocation
page read and write
29BE000
stack
page read and write
5605000
heap
page read and write
6C5B000
stack
page read and write
7EA0000
trusted library allocation
page read and write
7D6D000
trusted library allocation
page read and write
4B6B000
trusted library allocation
page read and write
7E0A000
trusted library allocation
page read and write
8480000
trusted library allocation
page execute and read and write
4565000
heap
page execute and read and write
5330000
trusted library section
page readonly
8722000
heap
page read and write
72A0000
trusted library allocation
page read and write
7D0A000
trusted library allocation
page read and write
5B9F000
stack
page read and write
5B31000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
11A6000
heap
page read and write
85F0000
trusted library allocation
page read and write
3636000
heap
page read and write
8120000
trusted library allocation
page execute and read and write
783B000
trusted library allocation
page read and write
710E000
stack
page read and write
3209000
trusted library allocation
page read and write
3320000
heap
page read and write
7290000
trusted library allocation
page read and write
E40000
heap
page read and write
126C000
heap
page read and write
3210000
trusted library allocation
page read and write
41B4000
trusted library allocation
page read and write
3697000
heap
page read and write
7ECC000
heap
page read and write
796A000
stack
page read and write
79D0000
trusted library allocation
page read and write
44CD000
stack
page read and write
7F2C000
heap
page read and write
6F5F000
stack
page read and write
7AA2000
heap
page read and write
703C000
stack
page read and write
84DE000
stack
page read and write
5318000
trusted library allocation
page read and write
8C7E000
stack
page read and write
4C9E000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
8920000
trusted library allocation
page execute and read and write
6FD9000
heap
page read and write
713A000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
79EE000
stack
page read and write
638C000
stack
page read and write
767E000
stack
page read and write
7280000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8AE0000
heap
page read and write
71EE000
stack
page read and write
4201000
trusted library allocation
page read and write
31BE000
stack
page read and write
663D000
heap
page read and write
723E000
stack
page read and write
2FDA000
heap
page read and write
37D0000
heap
page read and write
8FD0000
trusted library allocation
page execute and read and write
1364000
heap
page read and write
1756000
heap
page read and write
108B000
stack
page read and write
4A28000
trusted library allocation
page read and write
10FE000
stack
page read and write
6770000
heap
page read and write
7E50000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
6FF2000
heap
page read and write
7D50000
trusted library allocation
page execute and read and write
1218000
heap
page read and write
55A0000
heap
page read and write
35A0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
773F000
heap
page read and write
5228000
trusted library allocation
page read and write
872D000
heap
page read and write
7E10000
trusted library allocation
page read and write
7C24000
heap
page read and write
7A7F000
stack
page read and write
3600000
heap
page read and write
77D6000
heap
page read and write
373E000
stack
page read and write
2F7E000
stack
page read and write
7F000000
trusted library allocation
page execute and read and write
3475000
heap
page read and write
8499000
stack
page read and write
8BA6000
heap
page read and write
4570000
heap
page execute and read and write
3238000
heap
page read and write
4D51000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page execute and read and write
3470000
heap
page read and write
7022000
heap
page read and write
522A000
trusted library allocation
page read and write
2B70000
heap
page readonly
551C000
stack
page read and write
35A9000
trusted library allocation
page read and write
15EA000
trusted library allocation
page execute and read and write
2EF0000
heap
page read and write
6631000
heap
page read and write
83C0000
trusted library allocation
page execute and read and write
73BE000
stack
page read and write
1162000
trusted library allocation
page read and write
584E000
stack
page read and write
634B000
stack
page read and write
6E5F000
stack
page read and write
7D30000
trusted library allocation
page read and write
45F6000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
7E60000
trusted library allocation
page execute and read and write
7700000
heap
page read and write
2C9B000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
15DD000
trusted library allocation
page execute and read and write
8100000
trusted library allocation
page read and write
5600000
heap
page read and write
70C5000
heap
page read and write
8A4E000
stack
page read and write
6FB0000
trusted library allocation
page read and write
8B9E000
heap
page read and write
52B0000
heap
page read and write
321A000
trusted library allocation
page execute and read and write
6C9B000
stack
page read and write
265C000
stack
page read and write
69A0000
heap
page read and write
15F0000
trusted library allocation
page read and write
7E30000
heap
page read and write
2888000
heap
page read and write
4CA7000
trusted library allocation
page read and write
7C00000
heap
page read and write
1150000
trusted library allocation
page read and write
3540000
heap
page read and write
893B000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
8AD8000
heap
page read and write
8D3E000
stack
page read and write
7F04000
heap
page read and write
7DF0000
trusted library allocation
page execute and read and write
13CE000
stack
page read and write
8D10000
trusted library allocation
page read and write
117B000
heap
page read and write
7BB0000
heap
page read and write
1380000
trusted library allocation
page read and write
7BF7000
heap
page read and write
78EE000
stack
page read and write
5589000
trusted library allocation
page read and write
3230000
heap
page read and write
42B0000
heap
page read and write
4F09000
trusted library allocation
page read and write
7F018000
trusted library allocation
page execute and read and write
287E000
stack
page read and write
15D0000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
691E000
stack
page read and write
64E0000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
854E000
stack
page read and write
1188000
stack
page read and write
2B60000
heap
page read and write
366A000
heap
page read and write
7A60000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
28FA000
heap
page read and write
7E90000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
28B7000
heap
page read and write
7EB0000
trusted library allocation
page read and write
1215000
heap
page read and write
8270000
trusted library allocation
page read and write
8AE4000
heap
page read and write
7140000
heap
page execute and read and write
3108000
trusted library allocation
page read and write
8330000
trusted library allocation
page read and write
734A000
stack
page read and write
8678000
heap
page read and write
4EBB000
trusted library allocation
page read and write
7329000
trusted library allocation
page read and write
1100000
heap
page read and write
74D2000
trusted library allocation
page read and write
6FA9000
heap
page read and write
6A8D000
stack
page read and write
2CB1000
trusted library allocation
page read and write
4B11000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page read and write
3750000
heap
page execute and read and write
132C000
heap
page read and write
4BC6000
trusted library allocation
page read and write
73DE000
stack
page read and write
8BFE000
stack
page read and write
8AD0000
heap
page read and write
6738000
trusted library allocation
page read and write
7D10000
trusted library allocation
page execute and read and write
4A10000
heap
page read and write
2980000
heap
page read and write
7ED0000
heap
page read and write
259E000
stack
page read and write
32A9000
stack
page read and write
792F000
stack
page read and write
72E0000
trusted library allocation
page read and write
8ADC000
heap
page read and write
31D0000
trusted library section
page read and write
290C000
heap
page read and write
64BD000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
792D000
stack
page read and write
70AD000
heap
page read and write
2CAE000
trusted library allocation
page read and write
6496000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
7B6E000
stack
page read and write
12E5000
heap
page read and write
2710000
heap
page read and write
6EE2000
heap
page read and write
36D5000
heap
page read and write
6D9E000
stack
page read and write
8910000
heap
page read and write
79BE000
stack
page read and write
75FB000
stack
page read and write
4F0E000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
726E000
stack
page read and write
7F1B000
heap
page read and write
870E000
heap
page read and write
15E6000
trusted library allocation
page execute and read and write
7330000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
362A000
heap
page read and write
7C36000
heap
page read and write
4C66000
trusted library allocation
page read and write
497E000
trusted library allocation
page read and write
4A22000
trusted library allocation
page read and write
4D4B000
trusted library allocation
page read and write
28C0000
heap
page read and write
6ACA000
stack
page read and write
72D0000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
89E3000
trusted library allocation
page read and write
8C3D000
stack
page read and write
58F0000
trusted library allocation
page read and write
2870000
trusted library section
page read and write
2FB0000
heap
page read and write
7280000
trusted library allocation
page read and write
4AC7000
heap
page read and write
4BD7000
trusted library allocation
page read and write
7E07000
trusted library allocation
page read and write
7F94000
heap
page read and write
72F0000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
55B0000
heap
page read and write
4BBE000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
60C0000
heap
page read and write
7FC8000
heap
page read and write
599E000
stack
page read and write
6A4E000
stack
page read and write
718E000
stack
page read and write
44A1000
trusted library allocation
page read and write
42A0000
trusted library allocation
page execute and read and write
7024000
heap
page read and write
431C000
stack
page read and write
3090000
heap
page read and write
353E000
stack
page read and write
72C0000
trusted library allocation
page read and write
7FDC0000
trusted library allocation
page execute and read and write
54FB000
trusted library allocation
page read and write
9059000
stack
page read and write
2952000
heap
page read and write
7360000
heap
page read and write
705E000
stack
page read and write
79F0000
trusted library allocation
page read and write
3076000
heap
page read and write
4E33000
trusted library allocation
page read and write
74FE000
stack
page read and write
4CEB000
trusted library allocation
page read and write
11F4000
heap
page read and write
2BCC000
stack
page read and write
64D9000
trusted library allocation
page read and write
15F2000
trusted library allocation
page read and write
662E000
heap
page read and write
8540000
heap
page read and write
8A0E000
stack
page read and write
8B7E000
stack
page read and write
6B7E000
stack
page read and write
732D000
stack
page read and write
4F6D000
trusted library allocation
page read and write
4EDB000
stack
page read and write
8BA1000
heap
page read and write
7EDC000
heap
page read and write
43BE000
stack
page read and write
86A2000
heap
page read and write
4B0E000
stack
page read and write
37A0000
trusted library allocation
page read and write
28F6000
heap
page read and write
15C0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page execute and read and write
82BE000
stack
page read and write
858E000
stack
page read and write
35C7000
heap
page read and write
51EC000
trusted library allocation
page read and write
7570000
heap
page execute and read and write
52D0000
trusted library allocation
page execute and read and write
6209000
stack
page read and write
8CBF000
stack
page read and write
7E70000
heap
page read and write
65F0000
trusted library allocation
page read and write
6D1D000
stack
page read and write
701E000
stack
page read and write
89E0000
trusted library allocation
page read and write
4370000
heap
page read and write
7800000
heap
page execute and read and write
3222000
trusted library allocation
page read and write
1133000
trusted library allocation
page execute and read and write
35B0000
trusted library allocation
page read and write
7FC0000
heap
page read and write
3608000
heap
page read and write
8CD2000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
56F0000
heap
page read and write
4C17000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
444E000
stack
page read and write
4BD3000
trusted library allocation
page read and write
8B6B000
heap
page read and write
7067000
heap
page read and write
42DD000
trusted library allocation
page read and write
77C6000
heap
page read and write
6720000
trusted library allocation
page read and write
7C30000
heap
page read and write
52C0000
heap
page read and write
551E000
trusted library allocation
page read and write
428E000
stack
page read and write
343E000
stack
page read and write
3225000
trusted library allocation
page execute and read and write
8320000
trusted library allocation
page read and write
2CBD000
trusted library allocation
page read and write
6A0E000
stack
page read and write
F90000
heap
page read and write
42C8000
trusted library allocation
page read and write
64B1000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
6FDB000
stack
page read and write
122E000
stack
page read and write
7F90000
heap
page read and write
787B000
stack
page read and write
72B0000
trusted library allocation
page read and write
7F8A000
heap
page read and write
15E0000
trusted library allocation
page read and write
6617000
heap
page read and write
7F1C000
heap
page read and write
7D80000
heap
page read and write
28AB000
heap
page read and write
6F9D000
stack
page read and write
8E83000
trusted library allocation
page read and write
7EC4000
heap
page read and write
13D0000
trusted library allocation
page execute and read and write
7F10000
trusted library allocation
page read and write
3440000
heap
page read and write
6710000
trusted library allocation
page read and write
2906000
heap
page read and write
1152000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
4BCA000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
8CFE000
stack
page read and write
25E5000
heap
page read and write
69EE000
stack
page read and write
7DCF000
stack
page read and write
871A000
heap
page read and write
7EC8000
heap
page read and write
7D40000
heap
page execute and read and write
4F0F000
trusted library allocation
page read and write
F20000
heap
page read and write
7370000
trusted library allocation
page read and write
6F90000
heap
page read and write
730E000
stack
page read and write
54C1000
trusted library allocation
page read and write
1143000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
893D000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
68FE000
stack
page read and write
1750000
heap
page read and write
4FC1000
trusted library allocation
page read and write
7042000
heap
page read and write
2ED0000
heap
page read and write
5E5C000
stack
page read and write
6490000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
15F7000
trusted library allocation
page execute and read and write
4180000
heap
page read and write
728E000
stack
page read and write
24D8000
stack
page read and write
6B4C000
stack
page read and write
2E80000
heap
page read and write
698D000
stack
page read and write
71FF000
stack
page read and write
7897000
trusted library allocation
page read and write
72CB000
stack
page read and write
74BE000
stack
page read and write
3685000
heap
page read and write
5240000
trusted library allocation
page read and write
7290000
trusted library allocation
page execute and read and write
85D0000
heap
page read and write
70A7000
heap
page read and write
6BBE000
stack
page read and write
2FE7000
heap
page read and write
7A3E000
stack
page read and write
290E000
heap
page read and write
41DA000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
7C7C000
heap
page read and write
789A000
trusted library allocation
page read and write
77F2000
heap
page read and write
6ABD000
stack
page read and write
7793000
heap
page read and write
85B0000
trusted library allocation
page read and write
2998000
heap
page read and write
6FD4000
heap
page read and write
2F90000
heap
page read and write
48AA000
trusted library allocation
page read and write
A5D0000
heap
page read and write
70D0000
trusted library allocation
page read and write
6FE3000
heap
page read and write
FF0000
heap
page read and write
7D00000
heap
page read and write
7110000
trusted library allocation
page read and write
169E000
stack
page read and write
7F3E000
heap
page read and write
49F0000
trusted library allocation
page read and write
1640000
heap
page execute and read and write
136E000
stack
page read and write
55A9000
trusted library allocation
page read and write
89CD000
stack
page read and write
8D0F000
trusted library allocation
page read and write
706E000
heap
page read and write
737E000
trusted library allocation
page read and write
443C000
stack
page read and write
5F5E000
stack
page read and write
448E000
stack
page read and write
758E000
stack
page read and write
909E000
stack
page read and write
7130000
trusted library allocation
page read and write
6E9E000
stack
page read and write
7D10000
trusted library allocation
page read and write
7700000
heap
page read and write
76FA000
stack
page read and write
283E000
stack
page read and write
12B8000
heap
page read and write
4501000
trusted library allocation
page read and write
79FE000
stack
page read and write
7D60000
trusted library allocation
page read and write
2E38000
stack
page read and write
122B000
heap
page read and write
64A2000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
851D000
stack
page read and write
853E000
stack
page read and write
7055000
heap
page read and write
78EE000
stack
page read and write
7CB0000
trusted library allocation
page execute and read and write
700F000
heap
page read and write
7260000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
8660000
heap
page read and write
84CF000
stack
page read and write
8139000
trusted library allocation
page read and write
8B48000
heap
page read and write
5220000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
77A8000
heap
page read and write
2B27000
heap
page read and write
15E2000
trusted library allocation
page read and write
31C0000
trusted library section
page read and write
7A20000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
7FA4000
heap
page read and write
7137000
trusted library allocation
page read and write
8ECE000
stack
page read and write
114D000
trusted library allocation
page execute and read and write
84CD000
stack
page read and write
8B1D000
heap
page read and write
2AF0000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
7E0E000
stack
page read and write
6157000
trusted library allocation
page read and write
7D9D000
stack
page read and write
2969000
heap
page read and write
763E000
stack
page read and write
70EF000
stack
page read and write
2BD8000
trusted library allocation
page read and write
135F000
heap
page read and write
8610000
trusted library allocation
page execute and read and write
55EB000
trusted library allocation
page read and write
74AC000
stack
page read and write
5B78000
trusted library allocation
page read and write
7D8E000
stack
page read and write
83AE000
stack
page read and write
1267000
heap
page read and write
35D2000
trusted library allocation
page read and write
7170000
heap
page execute and read and write
2EF5000
heap
page read and write
71BE000
stack
page read and write
69B0000
heap
page read and write
7375000
trusted library allocation
page read and write
7316000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
1650000
heap
page read and write
2EA8000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
12E8000
heap
page read and write
89D0000
trusted library allocation
page read and write
1580000
heap
page read and write
5717000
trusted library allocation
page read and write
6DDE000
stack
page read and write
4F65000
trusted library allocation
page read and write
4A13000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page execute and read and write
84FE000
stack
page read and write
866C000
heap
page read and write
5250000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
8B38000
heap
page read and write
71D0000
trusted library section
page read and write
7A00000
trusted library allocation
page read and write
6717000
trusted library allocation
page read and write
2DDF000
stack
page read and write
8BAC000
heap
page read and write
16C0000
heap
page execute and read and write
2C10000
heap
page read and write
2BF0000
trusted library allocation
page execute and read and write
286E000
stack
page read and write
7F00000
heap
page read and write
8273000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
77B6000
heap
page read and write
454E000
stack
page read and write
7FE4000
heap
page read and write
7CAE000
stack
page read and write
7E20000
trusted library allocation
page read and write
750E000
stack
page read and write
2B6E000
stack
page read and write
5CDD000
stack
page read and write
7DEE000
stack
page read and write
7D6B000
trusted library allocation
page read and write
4AE4000
trusted library allocation
page read and write
7D2B000
trusted library allocation
page read and write
5343000
heap
page read and write
7F57000
heap
page read and write
12B0000
heap
page read and write
6489000
stack
page read and write
5B11000
trusted library allocation
page read and write
11E9000
heap
page read and write
30FE000
stack
page read and write
2AE0000
trusted library allocation
page read and write
7C80000
heap
page read and write
71AE000
stack
page read and write
2C18000
heap
page read and write
649E000
trusted library allocation
page read and write
778E000
heap
page read and write
2934000
heap
page read and write
2ECE000
stack
page read and write
1657000
heap
page read and write
86FA000
heap
page read and write
77DE000
heap
page read and write
7F0C000
heap
page read and write
4581000
trusted library allocation
page read and write
4A90000
trusted library allocation
page execute and read and write
6EB0000
heap
page read and write
4E97000
trusted library allocation
page read and write
73FF000
stack
page read and write
15C3000
trusted library allocation
page execute and read and write
435C000
stack
page read and write
8BB9000
stack
page read and write
7250000
trusted library allocation
page execute and read and write
4C7A000
trusted library allocation
page read and write
796E000
stack
page read and write
2756000
heap
page read and write
783D000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
7B2E000
stack
page read and write
7003000
heap
page read and write
8BC3000
heap
page read and write
724D000
stack
page read and write
3DE9000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
859E000
stack
page read and write
7F18000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
11B3000
heap
page read and write
71AE000
stack
page read and write
7E4D000
stack
page read and write
911E000
stack
page read and write
5710000
heap
page read and write
42A1000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
41E5000
trusted library allocation
page execute and read and write
67E0000
heap
page read and write
8490000
trusted library allocation
page read and write
7DE0000
heap
page read and write
4A40000
heap
page execute and read and write
2910000
heap
page read and write
69A5000
heap
page execute and read and write
64F0000
heap
page read and write
1156000
trusted library allocation
page execute and read and write
7360000
heap
page read and write
3790000
heap
page read and write
70ED000
stack
page read and write
7F80000
trusted library section
page read and write
64D0000
trusted library allocation
page read and write
64B6000
trusted library allocation
page read and write
788E000
stack
page read and write
8D09000
trusted library allocation
page read and write
8D20000
trusted library allocation
page read and write
4C33000
trusted library allocation
page read and write
4377000
heap
page read and write
55F0000
trusted library allocation
page read and write
855E000
stack
page read and write
6B8C000
stack
page read and write
572E000
trusted library allocation
page read and write
6C5E000
stack
page read and write
15FB000
trusted library allocation
page execute and read and write
727D000
stack
page read and write
6AFB000
stack
page read and write
2C7B000
stack
page read and write
8260000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
4D4F000
trusted library allocation
page read and write
299C000
heap
page read and write
746D000
stack
page read and write
28C8000
heap
page read and write
716E000
stack
page read and write
2699000
stack
page read and write
7010000
heap
page read and write
448E000
stack
page read and write
570D000
stack
page read and write
4A00000
heap
page readonly
35D5000
trusted library allocation
page execute and read and write
36E1000
heap
page read and write
3594000
trusted library allocation
page read and write
69A0000
heap
page execute and read and write
72B0000
trusted library allocation
page read and write
2FB8000
heap
page read and write
664D000
heap
page read and write
6760000
trusted library allocation
page execute and read and write
2EAA000
trusted library allocation
page read and write
4290000
heap
page readonly
2984000
heap
page read and write
7C7A000
heap
page read and write
41C0000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page read and write
5A9E000
stack
page read and write
13F7000
heap
page read and write
624C000
stack
page read and write
3660000
heap
page read and write
6DDE000
stack
page read and write
6CDD000
stack
page read and write
7370000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
7F14000
heap
page read and write
FF6000
heap
page read and write
7785000
heap
page read and write
8AD4000
heap
page read and write
5340000
heap
page read and write
8A6E000
stack
page read and write
8470000
heap
page read and write
3200000
trusted library allocation
page read and write
848E000
stack
page read and write
127E000
stack
page read and write
7840000
trusted library allocation
page execute and read and write
43FC000
stack
page read and write
71EE000
stack
page read and write
5E1E000
stack
page read and write
1120000
trusted library allocation
page read and write
6CDE000
stack
page read and write
43FE000
stack
page read and write
85C2000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
7C94000
heap
page read and write
81D0000
trusted library allocation
page read and write
4BCF000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
6494000
trusted library allocation
page read and write
41E2000
trusted library allocation
page read and write
4A1A000
trusted library allocation
page read and write
7F49000
heap
page read and write
850E000
stack
page read and write
4AB0000
heap
page execute and read and write
7602000
heap
page read and write
75BD000
stack
page read and write
712E000
stack
page read and write
7A30000
trusted library allocation
page read and write
2B80000
heap
page read and write
7ED4000
heap
page read and write
113D000
trusted library allocation
page execute and read and write
31F4000
trusted library allocation
page read and write
70AF000
heap
page read and write
115A000
trusted library allocation
page execute and read and write
45DC000
trusted library allocation
page read and write
722C000
stack
page read and write
69CB000
stack
page read and write
82FF000
stack
page read and write
70E0000
trusted library allocation
page execute and read and write
2F3D000
stack
page read and write
6730000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
71CE000
stack
page read and write
2B67000
heap
page read and write
F6E000
stack
page read and write
567E000
stack
page read and write
7F02000
heap
page read and write
2550000
heap
page read and write
776D000
heap
page read and write
8102000
trusted library allocation
page read and write
7EF08000
trusted library allocation
page execute and read and write
4CA3000
trusted library allocation
page read and write
7E7E000
stack
page read and write
9E0000
unkown
page readonly
77D8000
heap
page read and write
25E0000
heap
page read and write
2BCE000
stack
page read and write
25DF000
stack
page read and write
6B3E000
stack
page read and write
712E000
stack
page read and write
7EC0000
trusted library allocation
page read and write
8B90000
heap
page read and write
7350000
heap
page read and write
8728000
heap
page read and write
7EF0000
trusted library allocation
page read and write
5740000
heap
page read and write
720E000
stack
page read and write
2720000
heap
page read and write
7E40000
trusted library allocation
page read and write
1296000
heap
page read and write
117E000
heap
page read and write
3593000
trusted library allocation
page execute and read and write
2C80000
heap
page execute and read and write
7E50000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
80E0000
trusted library allocation
page execute and read and write
81BC000
stack
page read and write
743D000
stack
page read and write
6BFA000
stack
page read and write
15C4000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
28A0000
heap
page read and write
5948000
trusted library allocation
page read and write
4AB5000
heap
page execute and read and write
15B0000
trusted library allocation
page read and write
2992000
heap
page read and write
56F3000
heap
page read and write
79AD000
stack
page read and write
400000
remote allocation
page execute and read and write
157E000
stack
page read and write
90DD000
stack
page read and write
649B000
trusted library allocation
page read and write
5CBB000
trusted library allocation
page read and write
8B89000
heap
page read and write
8980000
heap
page read and write
736E000
stack
page read and write
6FC8000
heap
page read and write
716E000
stack
page read and write
7DDF000
stack
page read and write
6168000
trusted library allocation
page read and write
A7CE000
stack
page read and write
31F3000
trusted library allocation
page execute and read and write
7EC0000
heap
page read and write
6177000
trusted library allocation
page read and write
5FE1000
trusted library allocation
page read and write
424E000
stack
page read and write
1134000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
6F1E000
stack
page read and write
34FE000
stack
page read and write
3220000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
736C000
stack
page read and write
616F000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
7FDA0000
trusted library allocation
page execute and read and write
7F890000
trusted library allocation
page execute and read and write
817E000
stack
page read and write
3368000
trusted library allocation
page read and write
1290000
heap
page read and write
7DAE000
stack
page read and write
813F000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
8B12000
heap
page read and write
BE7000
stack
page read and write
5B19000
trusted library allocation
page read and write
6FD0000
heap
page read and write
2750000
heap
page read and write
1230000
heap
page read and write
4560000
heap
page execute and read and write
840D000
stack
page read and write
8664000
heap
page read and write
41B3000
trusted library allocation
page execute and read and write
7320000
trusted library allocation
page read and write
6C1D000
stack
page read and write
41BD000
trusted library allocation
page execute and read and write
8F0E000
stack
page read and write
12DC000
heap
page read and write
15CD000
trusted library allocation
page execute and read and write
AEA000
stack
page read and write
6C9D000
stack
page read and write
4BC2000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
41B0000
trusted library allocation
page read and write
326C000
stack
page read and write
7099000
heap
page read and write
7310000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
901D000
stack
page read and write
80C2000
trusted library allocation
page read and write
5245000
trusted library allocation
page read and write
125F000
heap
page read and write
78A0000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
46D6000
trusted library allocation
page read and write
7F10000
heap
page read and write
722A000
stack
page read and write
13F0000
heap
page read and write
76BE000
stack
page read and write
2C90000
trusted library allocation
page read and write
7049000
heap
page read and write
7D20000
trusted library allocation
page read and write
35BA000
trusted library allocation
page execute and read and write
28EA000
heap
page read and write
8674000
heap
page read and write
80F0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
77AD000
heap
page read and write
7F20000
heap
page read and write
699B000
stack
page read and write
5737000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
7E7E000
stack
page read and write
4AA0000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
6E5E000
stack
page read and write
1610000
trusted library allocation
page read and write
7FDB8000
trusted library allocation
page execute and read and write
7A2E000
stack
page read and write
8670000
heap
page read and write
7FDD8000
trusted library allocation
page execute and read and write
7A70000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
1620000
trusted library allocation
page execute and read and write
52F0000
heap
page execute and read and write
8CBD000
stack
page read and write
7C29000
heap
page read and write
75AD000
stack
page read and write
7C3D000
heap
page read and write
7FA8000
heap
page read and write
25F0000
heap
page read and write
5023000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
116B000
trusted library allocation
page execute and read and write
6600000
heap
page read and write
7E2F000
stack
page read and write
783E000
stack
page read and write
64AE000
trusted library allocation
page read and write
8B30000
trusted library allocation
page execute and read and write
2880000
heap
page read and write
7B90000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
844B000
stack
page read and write
2B10000
trusted library allocation
page read and write
7D2D000
trusted library allocation
page read and write
36B8000
heap
page read and write
4AC0000
heap
page read and write
41E0000
trusted library allocation
page read and write
1170000
heap
page read and write
7D07000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
31F0000
heap
page read and write
564D000
trusted library allocation
page read and write
7CFE000
stack
page read and write
37D8000
heap
page read and write
2AEA000
trusted library allocation
page execute and read and write
2CD0000
heap
page read and write
7390000
trusted library allocation
page execute and read and write
8A2E000
stack
page read and write
7F9E000
heap
page read and write
8B2A000
heap
page read and write
1630000
trusted library allocation
page read and write
6E1E000
stack
page read and write
6E92000
heap
page read and write
8668000
heap
page read and write
7830000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
359D000
trusted library allocation
page execute and read and write
64C2000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page execute and read and write
31FD000
trusted library allocation
page execute and read and write
7F30000
trusted library allocation
page read and write
702D000
heap
page read and write
5FE9000
trusted library allocation
page read and write
7C6F000
stack
page read and write
7FD10000
trusted library allocation
page execute and read and write
550B000
trusted library allocation
page read and write
119D000
heap
page read and write
41C9000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
2AF2000
trusted library allocation
page read and write
7F7E000
heap
page read and write
185D000
stack
page read and write
41D0000
trusted library allocation
page read and write
7F7E000
stack
page read and write
7F64000
heap
page read and write
747B000
stack
page read and write
7BC9000
heap
page read and write
7E90000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
55C0000
trusted library allocation
page execute and read and write
7EEF0000
trusted library allocation
page execute and read and write
7F42000
heap
page read and write
2AF5000
trusted library allocation
page execute and read and write
7F93000
heap
page read and write
5CC3000
trusted library allocation
page read and write
779C000
heap
page read and write
8333000
trusted library allocation
page read and write
8360000
trusted library allocation
page execute and read and write
5720000
heap
page read and write
4CAB000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
7BEF000
heap
page read and write
8D00000
trusted library allocation
page read and write
52FE000
stack
page read and write
859C000
stack
page read and write
6A2E000
stack
page read and write
5FC1000
trusted library allocation
page read and write
7575000
heap
page execute and read and write
7C12000
heap
page read and write
695D000
stack
page read and write
6AE0000
heap
page read and write
5CA3000
trusted library allocation
page read and write
9E2000
unkown
page readonly
7710000
heap
page read and write
7A63000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
7028000
heap
page read and write
59AC000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
754E000
stack
page read and write
7FD0000
heap
page read and write
4A8E000
stack
page read and write
507E000
trusted library allocation
page read and write
700A000
heap
page read and write
7775000
heap
page read and write
41A0000
trusted library allocation
page read and write
There are 1003 hidden memdumps, click here to show them.