IOC Report
EXQuAzl4Xn.exe

loading gif

Files

File Path
Type
Category
Malicious
EXQuAzl4Xn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EXQuAzl4Xn.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp111.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\wBfGlYCdeX.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\wBfGlYCdeX.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wBfGlYCdeX.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gtkvzgy.j4e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3eynj31f.0ss.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4saod3lc.5l4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a2du2e1r.jke.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_flyoyk5k.dn4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huh5sfd4.3re.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfqnqds2.ymu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xblckosf.u3t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp261D.tmp
XML 1.0 document, ASCII text
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EXQuAzl4Xn.exe
"C:\Users\user\Desktop\EXQuAzl4Xn.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EXQuAzl4Xn.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBfGlYCdeX.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBfGlYCdeX" /XML "C:\Users\user\AppData\Local\Temp\tmp111.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\wBfGlYCdeX.exe
C:\Users\user\AppData\Roaming\wBfGlYCdeX.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBfGlYCdeX" /XML "C:\Users\user\AppData\Local\Temp\tmp261D.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://www.fontbureau.com/designers
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://www.sajatypeworks.com
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://www.carterandcone.coml
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://www.fontbureau.com/designersG
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://www.fontbureau.com/designers?
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.241.208.193
unknown
Moldova Republic of
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3E48000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
30C1000
trusted library allocation
page read and write
malicious
3B91000
trusted library allocation
page read and write
malicious
31D6000
trusted library allocation
page read and write
malicious
3B18000
trusted library allocation
page read and write
malicious
1116000
heap
page read and write
3231000
trusted library allocation
page read and write
50F0000
heap
page read and write
BA5E000
stack
page read and write
5240000
heap
page read and write
6570000
trusted library allocation
page read and write
BCEE000
stack
page read and write
76CE000
stack
page read and write
3570000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
9CF000
unkown
page read and write
7C8E000
stack
page read and write
5580000
heap
page read and write
7205000
trusted library allocation
page read and write
73E0000
trusted library allocation
page execute and read and write
3500000
trusted library allocation
page read and write
8FAE000
stack
page read and write
54A0000
heap
page read and write
4286000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
5075000
trusted library allocation
page read and write
D8F000
stack
page read and write
D36000
trusted library allocation
page execute and read and write
557E000
stack
page read and write
140D000
trusted library allocation
page execute and read and write
2B91000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
2B8E000
stack
page read and write
6530000
trusted library allocation
page read and write
2670000
heap
page read and write
3367000
trusted library allocation
page read and write
7418000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
7150000
heap
page read and write
7FC30000
trusted library allocation
page execute and read and write
54B0000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
98A000
stack
page read and write
6FC1000
heap
page read and write
758E000
stack
page read and write
158D000
trusted library allocation
page execute and read and write
2F28000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2FF0000
heap
page execute and read and write
7430000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
6ED2000
heap
page read and write
8F7F000
stack
page read and write
6D72000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
1926000
trusted library allocation
page execute and read and write
CF7000
stack
page read and write
42EC000
trusted library allocation
page read and write
5880000
heap
page read and write
1932000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
3723000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
6EAD000
stack
page read and write
64F1000
trusted library allocation
page read and write
55DE000
stack
page read and write
4250000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
649C000
heap
page read and write
2FB0000
heap
page read and write
72C0000
trusted library allocation
page read and write
3332000
trusted library allocation
page read and write
7FB0000
heap
page read and write
13F0000
trusted library allocation
page read and write
1460000
heap
page read and write
3692000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
970000
heap
page read and write
F64000
trusted library allocation
page read and write
7280000
trusted library allocation
page execute and read and write
7409000
trusted library allocation
page read and write
910F000
stack
page read and write
3A28000
trusted library allocation
page read and write
82D0000
heap
page read and write
63C0000
trusted library allocation
page execute and read and write
328A000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
266E000
stack
page read and write
10C5000
heap
page read and write
593F000
stack
page read and write
618B000
trusted library allocation
page read and write
277E000
stack
page read and write
32E5000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
7434000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
152B000
trusted library allocation
page read and write
7890000
heap
page read and write
D1E000
unkown
page read and write
368D000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
1072000
heap
page read and write
4161000
trusted library allocation
page read and write
1590000
heap
page read and write
1524000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
655B000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
3BD6000
trusted library allocation
page read and write
5B8B000
trusted library allocation
page read and write
5BEE000
stack
page read and write
67D0000
trusted library allocation
page execute and read and write
72F0000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
13E0000
heap
page read and write
35F5000
trusted library allocation
page read and write
DAE000
stack
page read and write
750F000
stack
page read and write
13F3000
trusted library allocation
page execute and read and write
1937000
trusted library allocation
page execute and read and write
56A4000
trusted library allocation
page read and write
A8E000
heap
page read and write
6410000
heap
page read and write
71CF000
trusted library allocation
page read and write
11BB000
heap
page read and write
1465000
heap
page read and write
7F2E000
heap
page read and write
4263000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
682C000
stack
page read and write
1377000
stack
page read and write
4298000
trusted library allocation
page read and write
54E3000
heap
page execute and read and write
794E000
stack
page read and write
E30000
heap
page read and write
F97000
trusted library allocation
page execute and read and write
8CFE000
stack
page read and write
3050000
heap
page read and write
2FD0000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
51B0000
trusted library allocation
page execute and read and write
4D35000
trusted library allocation
page read and write
1573000
trusted library allocation
page execute and read and write
52F0000
trusted library allocation
page read and write
1546000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
5773000
heap
page read and write
2FD5000
trusted library allocation
page read and write
7B2000
unkown
page readonly
F9B000
trusted library allocation
page execute and read and write
313F000
stack
page read and write
58B0000
trusted library allocation
page read and write
F3E000
stack
page read and write
73B0000
trusted library section
page read and write
6481000
heap
page read and write
A20000
heap
page read and write
31B3000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
8790000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
655E000
trusted library allocation
page read and write
970000
heap
page read and write
B890000
trusted library allocation
page read and write
4E00000
heap
page read and write
1070000
heap
page read and write
357B000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
32A1000
trusted library allocation
page read and write
83DB000
trusted library allocation
page read and write
42DF000
trusted library allocation
page read and write
1566000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
699E000
stack
page read and write
BAAE000
stack
page read and write
3192000
trusted library allocation
page read and write
7EFD0000
trusted library allocation
page execute and read and write
A14000
heap
page read and write
7F10000
heap
page read and write
3141000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
E8F000
stack
page read and write
6427000
heap
page read and write
5084000
trusted library section
page readonly
35DF000
trusted library allocation
page read and write
3756000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
4402000
trusted library allocation
page read and write
151C000
stack
page read and write
71DF000
trusted library allocation
page read and write
7F83000
heap
page read and write
960000
heap
page read and write
6F75000
heap
page read and write
35AD000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
F8A000
trusted library allocation
page execute and read and write
2844000
trusted library allocation
page read and write
843D000
stack
page read and write
5B74000
heap
page read and write
E35000
heap
page read and write
33E5000
trusted library allocation
page read and write
6F1D000
heap
page read and write
2A41000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
379A000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
D00000
heap
page read and write
7530000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
4D2C000
stack
page read and write
3426000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
597E000
stack
page read and write
8E3E000
stack
page read and write
727E000
stack
page read and write
42B9000
trusted library allocation
page read and write
5A80000
heap
page read and write
6EDA000
heap
page read and write
64C7000
heap
page read and write
5290000
heap
page read and write
1625000
heap
page read and write
2820000
trusted library allocation
page execute and read and write
1598000
heap
page read and write
587F000
stack
page read and write
1279000
stack
page read and write
1422000
trusted library allocation
page read and write
2F1E000
stack
page read and write
2A46000
trusted library allocation
page read and write
64DA000
heap
page read and write
940000
heap
page read and write
56DC000
heap
page read and write
457A000
trusted library allocation
page read and write
5280000
heap
page execute and read and write
9EA000
heap
page read and write
2A4D000
trusted library allocation
page read and write
AFF0000
heap
page read and write
54E0000
heap
page execute and read and write
15AE000
heap
page read and write
6790000
trusted library allocation
page execute and read and write
35C0000
trusted library allocation
page read and write
9D0000
heap
page read and write
45FF000
trusted library allocation
page read and write
B85D000
stack
page read and write
7402000
trusted library allocation
page read and write
5BAE000
stack
page read and write
4055000
trusted library allocation
page read and write
43FA000
trusted library allocation
page read and write
1688000
heap
page read and write
4D6D000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
10E0000
heap
page read and write
56C1000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
72C0000
heap
page read and write
153E000
trusted library allocation
page read and write
429D000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
15BA000
heap
page read and write
5050000
trusted library allocation
page execute and read and write
28DF000
trusted library allocation
page read and write
7F1A000
heap
page read and write
34A1000
trusted library allocation
page read and write
6ADE000
stack
page read and write
3697000
trusted library allocation
page read and write
ABA000
heap
page read and write
61F0000
trusted library allocation
page read and write
1030000
heap
page read and write
6590000
trusted library allocation
page execute and read and write
4B98000
trusted library allocation
page read and write
6EBD000
heap
page read and write
4DD0000
trusted library allocation
page read and write
5EA000
stack
page read and write
34C6000
trusted library allocation
page read and write
1010000
trusted library allocation
page execute and read and write
489C000
stack
page read and write
6414000
heap
page read and write
58B8000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
154D000
trusted library allocation
page read and write
40A3000
trusted library allocation
page read and write
6F47000
heap
page read and write
64B2000
heap
page read and write
7425000
trusted library allocation
page read and write
B36F000
stack
page read and write
7200000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
63E0000
heap
page read and write
7510000
trusted library allocation
page read and write
394C000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
3E07000
trusted library allocation
page read and write
378F000
trusted library allocation
page read and write
71B5000
trusted library allocation
page read and write
1120000
heap
page read and write
3274000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
4559000
trusted library allocation
page read and write
51E0000
heap
page read and write
8F7000
stack
page read and write
715E000
heap
page read and write
66CC000
stack
page read and write
3432000
trusted library allocation
page read and write
6F53000
heap
page read and write
F82000
trusted library allocation
page read and write
1450000
trusted library allocation
page execute and read and write
1930000
trusted library allocation
page read and write
6289000
trusted library allocation
page execute and read and write
57FE000
stack
page read and write
35D4000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
1935000
trusted library allocation
page execute and read and write
64E0000
trusted library allocation
page read and write
721D000
stack
page read and write
14C0000
trusted library allocation
page read and write
768E000
stack
page read and write
1440000
heap
page read and write
14BE000
stack
page read and write
1460000
trusted library allocation
page read and write
34BE000
trusted library allocation
page read and write
338E000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
122F000
stack
page read and write
3568000
trusted library allocation
page read and write
5ADF000
heap
page read and write
344B000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
1000000
heap
page read and write
7450000
trusted library allocation
page read and write
6400000
trusted library allocation
page execute and read and write
72D4000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
5148000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
6E60000
heap
page read and write
1110000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
32B6000
trusted library allocation
page read and write
35C9000
trusted library allocation
page read and write
AFED000
stack
page read and write
58C0000
heap
page read and write
34A9000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
7870000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
CEE000
stack
page read and write
4291000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
D14000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
90A000
stack
page read and write
73CD000
stack
page read and write
402F000
trusted library allocation
page read and write
5B53000
heap
page read and write
7FE1000
heap
page read and write
6E68000
heap
page read and write
6D50000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
10B5000
heap
page read and write
6180000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
583E000
stack
page read and write
7FEB000
heap
page read and write
87EE000
stack
page read and write
4407000
trusted library allocation
page read and write
83E0000
trusted library allocation
page execute and read and write
42C1000
trusted library allocation
page read and write
D47000
trusted library allocation
page execute and read and write
318F000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
BF8C000
stack
page read and write
33C0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
4050000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
432E000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
78A6000
heap
page read and write
4574000
trusted library allocation
page read and write
7A1E000
stack
page read and write
6FA3000
heap
page read and write
6F8E000
heap
page read and write
194E000
heap
page read and write
430D000
trusted library allocation
page read and write
428B000
trusted library allocation
page read and write
4D01000
trusted library allocation
page read and write
1058000
heap
page read and write
30D2000
trusted library allocation
page read and write
45D8000
trusted library allocation
page read and write
657C000
stack
page read and write
5733000
heap
page execute and read and write
5260000
trusted library allocation
page execute and read and write
50AD000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
42A4000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page execute and read and write
1440000
trusted library allocation
page read and write
6F2E000
heap
page read and write
6660000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
6D5E000
stack
page read and write
7300000
trusted library allocation
page read and write
6650000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
51E3000
heap
page read and write
5B1D000
heap
page read and write
7460000
trusted library allocation
page execute and read and write
61A0000
trusted library allocation
page read and write
89E2000
heap
page read and write
5B23000
heap
page read and write
849A000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page execute and read and write
73F0000
trusted library allocation
page read and write
6970000
heap
page read and write
8D3E000
stack
page read and write
4E03000
heap
page read and write
67E0000
trusted library allocation
page execute and read and write
4343000
trusted library allocation
page read and write
42DA000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
35ED000
trusted library allocation
page read and write
79DE000
stack
page read and write
34FD000
trusted library allocation
page read and write
5170000
heap
page read and write
82E1000
heap
page read and write
43F5000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
980000
heap
page read and write
618E000
trusted library allocation
page read and write
56E0000
heap
page read and write
D5F000
unkown
page read and write
7F95000
heap
page read and write
D80000
heap
page read and write
7F46000
heap
page read and write
BFCE000
stack
page read and write
440F000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
11BD000
heap
page read and write
1570000
trusted library allocation
page read and write
71CA000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
9F0000
heap
page read and write
13EF000
stack
page read and write
1400000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
30BB000
heap
page read and write
950000
heap
page read and write
35B5000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
42B6000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
F63000
trusted library allocation
page execute and read and write
8F80000
trusted library section
page read and write
7A4E000
stack
page read and write
56EA000
heap
page read and write
35BC000
trusted library allocation
page read and write
6280000
trusted library allocation
page execute and read and write
56CE000
heap
page read and write
4D60000
trusted library allocation
page read and write
1940000
heap
page read and write
1430000
heap
page read and write
4CFE000
trusted library allocation
page read and write
36F4000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
5185000
heap
page read and write
1420000
trusted library allocation
page read and write
3050000
heap
page read and write
4265000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
6E70000
heap
page read and write
82E6000
heap
page read and write
F7D000
trusted library allocation
page execute and read and write
6470000
trusted library allocation
page execute and read and write
446000
remote allocation
page execute and read and write
5080000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
B5FC000
stack
page read and write
D4E000
stack
page read and write
456A000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7442000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
3524000
trusted library allocation
page read and write
157E000
heap
page read and write
63F0000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
2FE4000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
6E92000
heap
page read and write
3251000
trusted library allocation
page read and write
9BE000
stack
page read and write
4606000
trusted library allocation
page read and write
6F17000
heap
page read and write
1213000
heap
page read and write
323C000
trusted library allocation
page read and write
71C8000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
42E5000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
64EB000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
D32000
trusted library allocation
page read and write
7F69000
heap
page read and write
D13000
trusted library allocation
page execute and read and write
BBEE000
stack
page read and write
5220000
trusted library section
page readonly
3AD7000
trusted library allocation
page read and write
43FF000
trusted library allocation
page read and write
2A0B000
stack
page read and write
4CEB000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
B77E000
stack
page read and write
88EE000
stack
page read and write
10E6000
heap
page read and write
72BA000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
673E000
stack
page read and write
5090000
heap
page read and write
4278000
trusted library allocation
page read and write
4552000
trusted library allocation
page read and write
1623000
heap
page read and write
51F0000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page execute and read and write
3329000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
FFE000
stack
page read and write
2846000
trusted library allocation
page read and write
5230000
heap
page read and write
1425000
trusted library allocation
page execute and read and write
58A0000
trusted library allocation
page execute and read and write
D70000
heap
page read and write
521B000
stack
page read and write
2FE0000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
3663000
trusted library allocation
page read and write
B87F000
stack
page read and write
67C0000
trusted library allocation
page read and write
D77000
heap
page read and write
5585000
heap
page read and write
B12D000
stack
page read and write
359D000
trusted library allocation
page read and write
63D0000
heap
page execute and read and write
4D06000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
4DB0000
heap
page read and write
5080000
trusted library section
page readonly
3561000
trusted library allocation
page read and write
775B000
stack
page read and write
5D2E000
stack
page read and write
3AB7000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
7445000
trusted library allocation
page read and write
D3A000
trusted library allocation
page execute and read and write
113F000
heap
page read and write
65F0000
trusted library allocation
page read and write
F6D000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page read and write
E0E000
stack
page read and write
CAA000
stack
page read and write
83F0000
trusted library allocation
page execute and read and write
366C000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
5480000
heap
page read and write
1564000
trusted library allocation
page read and write
D42000
trusted library allocation
page read and write
14D0000
heap
page execute and read and write
6270000
trusted library allocation
page execute and read and write
5BA2000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
73AF000
stack
page read and write
3728000
trusted library allocation
page read and write
193B000
trusted library allocation
page execute and read and write
33C2000
trusted library allocation
page read and write
1060000
heap
page read and write
774E000
stack
page read and write
50A0000
heap
page execute and read and write
1577000
heap
page read and write
5770000
heap
page read and write
8DA000
stack
page read and write
72A0000
heap
page read and write
770F000
stack
page read and write
37A9000
trusted library allocation
page read and write
7A8E000
stack
page read and write
37B4000
trusted library allocation
page read and write
E60000
heap
page read and write
5730000
heap
page execute and read and write
6410000
trusted library allocation
page execute and read and write
98E000
unkown
page read and write
42F1000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
788E000
stack
page read and write
3CDB000
trusted library allocation
page read and write
1007000
heap
page read and write
42B3000
trusted library allocation
page read and write
15C6000
heap
page read and write
87A0000
trusted library allocation
page read and write
70B0000
heap
page read and write
5B48000
heap
page read and write
10D8000
heap
page read and write
8460000
heap
page read and write
71F4000
trusted library allocation
page read and write
5690000
heap
page read and write
F50000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
B860000
heap
page read and write
5A7E000
stack
page read and write
10DE000
heap
page read and write
DEF000
stack
page read and write
7560000
trusted library allocation
page execute and read and write
AB8000
heap
page read and write
7F5C000
heap
page read and write
33D2000
trusted library allocation
page read and write
167E000
stack
page read and write
1920000
trusted library allocation
page read and write
8490000
trusted library allocation
page read and write
6511000
trusted library allocation
page read and write
F86000
trusted library allocation
page execute and read and write
7FB0000
heap
page read and write
73D0000
trusted library allocation
page execute and read and write
528D000
stack
page read and write
C0CF000
stack
page read and write
7F3C000
heap
page read and write
459B000
trusted library allocation
page read and write
568E000
stack
page read and write
BBAE000
stack
page read and write
6F32000
heap
page read and write
B22E000
stack
page read and write
1416000
trusted library allocation
page execute and read and write
142E000
stack
page read and write
83BF000
stack
page read and write
335C000
trusted library allocation
page read and write
4063000
trusted library allocation
page read and write
52CB000
stack
page read and write
4D10000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
6AFD000
stack
page read and write
72BF000
stack
page read and write
67A0000
heap
page execute and read and write
8A20000
heap
page read and write
ACE000
heap
page read and write
786D000
stack
page read and write
61C0000
trusted library allocation
page execute and read and write
34B3000
trusted library allocation
page read and write
45B0000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
569E000
stack
page read and write
7F4C000
heap
page read and write
55E0000
trusted library allocation
page read and write
B002000
heap
page read and write
414F000
trusted library allocation
page read and write
7880000
heap
page read and write
332C000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
7FC8000
heap
page read and write
192A000
trusted library allocation
page execute and read and write
511C000
stack
page read and write
3435000
trusted library allocation
page read and write
45E8000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
1090000
heap
page read and write
1574000
trusted library allocation
page read and write
741F000
trusted library allocation
page read and write
BE8C000
stack
page read and write
5B96000
trusted library allocation
page read and write
741A000
trusted library allocation
page read and write
6FB1000
heap
page read and write
4315000
trusted library allocation
page read and write
6BDE000
stack
page read and write
3226000
trusted library allocation
page read and write
746D000
stack
page read and write
4049000
trusted library allocation
page read and write
727C000
stack
page read and write
71B2000
trusted library allocation
page read and write
94D000
stack
page read and write
11B5000
heap
page read and write
742A000
trusted library allocation
page read and write
6D1E000
stack
page read and write
30BA000
trusted library allocation
page read and write
66F9000
trusted library allocation
page read and write
75AE000
stack
page read and write
56A0000
heap
page read and write
4565000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
35C6000
trusted library allocation
page read and write
9FE000
stack
page read and write
142B000
trusted library allocation
page execute and read and write
35AA000
trusted library allocation
page read and write
5B04000
heap
page read and write
33FB000
trusted library allocation
page read and write
13F4000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
61B0000
trusted library allocation
page read and write
1010000
heap
page read and write
5B34000
heap
page read and write
6210000
trusted library allocation
page read and write
430A000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
89B0000
heap
page read and write
4DC0000
heap
page read and write
33F3000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5E2E000
stack
page read and write
2FC0000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
6502000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7320000
trusted library allocation
page execute and read and write
1552000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
1427000
trusted library allocation
page execute and read and write
11CF000
heap
page read and write
31CC000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5B3F000
heap
page read and write
2A2B000
trusted library allocation
page read and write
E10000
heap
page read and write
8470000
heap
page read and write
9EE000
heap
page read and write
6EFF000
heap
page read and write
71D5000
trusted library allocation
page read and write
303E000
stack
page read and write
71B0000
trusted library allocation
page read and write
103E000
heap
page read and write
8EAD000
stack
page read and write
3330000
trusted library allocation
page read and write
7490000
trusted library allocation
page execute and read and write
1946000
heap
page read and write
7760000
heap
page read and write
36C5000
trusted library allocation
page read and write
72AE000
stack
page read and write
6A9C000
stack
page read and write
3684000
trusted library allocation
page read and write
4582000
trusted library allocation
page read and write
6487000
heap
page read and write
71B9000
trusted library allocation
page read and write
455F000
trusted library allocation
page read and write
F92000
trusted library allocation
page read and write
1541000
trusted library allocation
page read and write
10DE000
stack
page read and write
458D000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
4320000
trusted library allocation
page read and write
105E000
stack
page read and write
32F5000
trusted library allocation
page read and write
305A000
heap
page read and write
13FD000
trusted library allocation
page execute and read and write
81D0000
trusted library allocation
page execute and read and write
5BAE000
trusted library allocation
page read and write
3010000
heap
page read and write
CD0000
heap
page read and write
405C000
trusted library allocation
page read and write
7405000
trusted library allocation
page read and write
36FD000
trusted library allocation
page read and write
6F3F000
heap
page read and write
52E0000
trusted library allocation
page execute and read and write
82BE000
stack
page read and write
5060000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
5600000
heap
page read and write
7210000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
65CE000
stack
page read and write
7310000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
426D000
trusted library allocation
page read and write
30B0000
heap
page read and write
5250000
heap
page read and write
6541000
trusted library allocation
page read and write
52A0000
heap
page read and write
6640000
trusted library allocation
page execute and read and write
B26E000
stack
page read and write
6E5E000
stack
page read and write
6520000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
A07000
heap
page read and write
324A000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
1158000
heap
page read and write
50EB000
stack
page read and write
6F25000
heap
page read and write
4041000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
3459000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
64F6000
trusted library allocation
page read and write
5B4E000
heap
page read and write
4CE0000
trusted library allocation
page read and write
72B7000
trusted library allocation
page read and write
1570000
heap
page read and write
334A000
trusted library allocation
page read and write
45F9000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
CAE000
stack
page read and write
6550000
trusted library allocation
page read and write
742D000
stack
page read and write
3438000
trusted library allocation
page read and write
6C1E000
stack
page read and write
7FCE000
heap
page read and write
54D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
42CC000
trusted library allocation
page read and write
1470000
heap
page read and write
34A5000
trusted library allocation
page read and write
6EB0000
heap
page read and write
C0E0000
trusted library allocation
page read and write
A22000
heap
page read and write
52D0000
trusted library allocation
page read and write
9E0000
heap
page read and write
324B000
trusted library allocation
page read and write
B63D000
stack
page read and write
4D30000
trusted library allocation
page read and write
6840000
trusted library allocation
page execute and read and write
325B000
trusted library allocation
page read and write
1681000
heap
page read and write
6EE4000
heap
page read and write
71DA000
trusted library allocation
page read and write
3516000
trusted library allocation
page read and write
7B0000
unkown
page readonly
78CE000
stack
page read and write
1020000
trusted library allocation
page read and write
352C000
trusted library allocation
page read and write
591E000
stack
page read and write
3229000
trusted library allocation
page read and write
5603000
heap
page read and write
5180000
heap
page read and write
6176000
trusted library allocation
page read and write
2F80000
heap
page read and write
742F000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
4307000
trusted library allocation
page read and write
5CEE000
stack
page read and write
6555000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
694C000
stack
page read and write
359B000
trusted library allocation
page read and write
1627000
heap
page read and write
8E7E000
stack
page read and write
66FC000
trusted library allocation
page read and write
499C000
stack
page read and write
B4FB000
stack
page read and write
42FD000
trusted library allocation
page read and write
1038000
heap
page read and write
531C000
stack
page read and write
B010000
heap
page read and write
371F000
trusted library allocation
page read and write
3497000
trusted library allocation
page read and write
2850000
heap
page execute and read and write
B73E000
stack
page read and write
2A60000
trusted library allocation
page read and write
72E0000
trusted library allocation
page execute and read and write
3715000
trusted library allocation
page read and write
723A000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
752C000
trusted library allocation
page read and write
2A10000
heap
page read and write
74CE000
stack
page read and write
D4B000
trusted library allocation
page execute and read and write
6EC8000
heap
page read and write
2788000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
651A000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7F75000
heap
page read and write
5270000
trusted library allocation
page read and write
89D000
stack
page read and write
1114000
heap
page read and write
D60000
heap
page read and write
328D000
trusted library allocation
page read and write
370C000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
1922000
trusted library allocation
page read and write
6EDE000
heap
page read and write
650E000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
DA7000
stack
page read and write
1095000
heap
page read and write
178E000
stack
page read and write
2A80000
heap
page execute and read and write
30B6000
trusted library allocation
page read and write
42F8000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
89C5000
heap
page read and write
2A20000
trusted library allocation
page read and write
645C000
stack
page read and write
10EE000
heap
page read and write
349D000
trusted library allocation
page read and write
7B8F000
stack
page read and write
8029000
heap
page read and write
4577000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
4D0D000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
There are 936 hidden memdumps, click here to show them.