IOC Report
9758xBqgE1azKnB.exe

loading gif

Files

File Path
Type
Category
Malicious
9758xBqgE1azKnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9758xBqgE1azKnB.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpAD87.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9758xBqgE1azKnB._aa799425bed1b3d36059a0f9e236de6a71257a_3b6de569_a5fee1dc-3513-4561-b22d-7d61e242a063\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BE7.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Nov 25 05:28:30 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1DCD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1DFD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\grjujyNaBLaKbU.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mrao0pob.vfp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ptanzkqs.3if.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzb2yt1e.22j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtganllf.awn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp21F.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpBA0A.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpE11A.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Nov 25 04:25:02 2024, mtime=Mon Nov 25 04:25:03 2024, atime=Mon Nov 25 04:25:03 2024, length=450048, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9758xBqgE1azKnB.exe
"C:\Users\user\Desktop\9758xBqgE1azKnB.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\user\AppData\Local\Temp\tmpAD87.tmp"
malicious
C:\Users\user\Desktop\9758xBqgE1azKnB.exe
"C:\Users\user\Desktop\9758xBqgE1azKnB.exe"
malicious
C:\Users\user\Desktop\9758xBqgE1azKnB.exe
"C:\Users\user\Desktop\9758xBqgE1azKnB.exe"
malicious
C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe
C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\user\AppData\Local\Temp\tmpBA0A.tmp"
malicious
C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe
"C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe"
malicious
C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe
"C:\Users\user\AppData\Roaming\grjujyNaBLaKbU.exe"
malicious
C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe
"C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\user\AppData\Local\Temp\tmpE11A.tmp"
malicious
C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe
"C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe"
malicious
C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe
"C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\user\AppData\Local\Temp\tmp21F.tmp"
malicious
C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe
"C:\Users\user\AppData\Roaming\9758xBqgE1azKnB.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6912 -s 1852
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
18.181.154.24
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
18.181.154.24
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9758xBqgE1azKnB
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
ProgramId
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
FileId
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
LowerCaseLongPath
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
LongPathHash
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
Name
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
OriginalFileName
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
Publisher
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
Version
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
BinFileVersion
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
BinaryType
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
ProductName
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
ProductVersion
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
LinkDate
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
BinProductVersion
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
AppxPackageFullName
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
AppxPackageRelativeId
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
Size
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
Language
\REGISTRY\A\{9d714e1f-1267-2fe3-3db3-165ee0b6aa6b}\Root\InventoryApplicationFile\9758xbqge1azknb.|73a5fbe433dbbb18
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E55000
trusted library allocation
page read and write
malicious
309C000
trusted library allocation
page read and write
malicious
2BCA000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
32A1000
trusted library allocation
page read and write
malicious
3B09000
trusted library allocation
page read and write
125B000
trusted library allocation
page execute and read and write
7F5D0000
trusted library allocation
page execute and read and write
5AD0000
heap
page read and write
66A0000
heap
page read and write
2AE0000
heap
page read and write
1230000
heap
page read and write
4B2E000
stack
page read and write
5A0D000
stack
page read and write
B77E000
stack
page read and write
129E000
stack
page read and write
5610000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
4D5B000
stack
page read and write
147E000
stack
page read and write
8FC4000
heap
page read and write
3C98000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
FB7000
stack
page read and write
8F6000
trusted library allocation
page execute and read and write
A9E000
stack
page read and write
344D000
trusted library allocation
page read and write
78E000
stack
page read and write
8F0000
trusted library allocation
page read and write
2D8E000
stack
page read and write
316E000
stack
page read and write
5610000
heap
page read and write
10A0000
heap
page read and write
2547000
trusted library allocation
page read and write
F4E000
stack
page read and write
147F000
stack
page read and write
15DE000
stack
page read and write
8A3000
heap
page read and write
5470000
trusted library allocation
page read and write
6A0E000
stack
page read and write
5B5E000
stack
page read and write
24F1000
trusted library allocation
page read and write
1233000
trusted library allocation
page read and write
3F4B000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
4A3D000
trusted library allocation
page read and write
12A6000
heap
page read and write
2AFB000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
6126000
trusted library allocation
page read and write
2856000
trusted library allocation
page execute and read and write
1220000
trusted library allocation
page read and write
12E9000
heap
page read and write
8C0000
trusted library allocation
page read and write
80B1000
heap
page read and write
4A70000
trusted library allocation
page read and write
3E7000
stack
page read and write
258F000
unkown
page read and write
C20000
heap
page read and write
B75D000
stack
page read and write
2505000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
1380000
heap
page read and write
1490000
trusted library allocation
page read and write
5A30000
heap
page read and write
4A42000
trusted library allocation
page read and write
14E3000
trusted library allocation
page execute and read and write
2553000
trusted library allocation
page read and write
DB1000
heap
page read and write
5310000
heap
page read and write
5030000
trusted library allocation
page read and write
745000
heap
page read and write
251B000
trusted library allocation
page read and write
43A5000
trusted library allocation
page read and write
24F9000
trusted library allocation
page read and write
2579000
trusted library allocation
page read and write
2573000
trusted library allocation
page read and write
2577000
trusted library allocation
page read and write
D70000
heap
page read and write
258D000
trusted library allocation
page read and write
3C0000
heap
page read and write
5A40000
trusted library allocation
page read and write
63B7000
trusted library allocation
page read and write
283F000
stack
page read and write
6D92000
heap
page read and write
237E000
stack
page read and write
58AE000
stack
page read and write
5010000
trusted library allocation
page read and write
2593000
trusted library allocation
page read and write
11BE000
stack
page read and write
2511000
trusted library allocation
page read and write
2850000
heap
page read and write
32D9000
trusted library allocation
page read and write
526E000
stack
page read and write
33B9000
trusted library allocation
page read and write
50A0000
heap
page read and write
2557000
trusted library allocation
page read and write
14E4000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
BD0000
unkown
page readonly
BB3E000
stack
page read and write
706D000
stack
page read and write
5BC0000
trusted library section
page read and write
B49E000
stack
page read and write
67D0000
heap
page read and write
1135000
heap
page read and write
7B4D000
stack
page read and write
33B1000
trusted library allocation
page read and write
2523000
trusted library allocation
page read and write
4A31000
trusted library allocation
page read and write
5A15000
heap
page read and write
2E69000
trusted library allocation
page read and write
1084000
trusted library allocation
page read and write
5515000
heap
page read and write
340D000
trusted library allocation
page read and write
B8A000
stack
page read and write
2ECE000
stack
page read and write
54B0000
heap
page read and write
B37000
stack
page read and write
2DA4000
trusted library allocation
page read and write
1005000
heap
page read and write
56E0000
heap
page read and write
2E0E000
stack
page read and write
DEE000
stack
page read and write
B4FD000
stack
page read and write
18F0000
trusted library allocation
page execute and read and write
55B0000
trusted library allocation
page read and write
13AA000
heap
page read and write
35A000
stack
page read and write
614D000
trusted library allocation
page read and write
55C4000
trusted library section
page readonly
578E000
stack
page read and write
10EB000
stack
page read and write
13BB000
heap
page read and write
4B08000
trusted library allocation
page read and write
11B8000
heap
page read and write
D78000
heap
page read and write
53EF000
stack
page read and write
8E3000
trusted library allocation
page read and write
B8FC000
stack
page read and write
2543000
trusted library allocation
page read and write
B2BE000
stack
page read and write
351B000
trusted library allocation
page read and write
1180000
heap
page read and write
BF1E000
stack
page read and write
1504000
trusted library allocation
page read and write
24EB000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
52D0000
heap
page read and write
146F000
stack
page read and write
83EE000
stack
page read and write
BA3D000
stack
page read and write
2527000
trusted library allocation
page read and write
5D5E000
stack
page read and write
5400000
trusted library allocation
page read and write
2CD0000
heap
page read and write
258F000
trusted library allocation
page read and write
72D2000
trusted library allocation
page read and write
9B7000
stack
page read and write
2B01000
trusted library allocation
page read and write
286B000
trusted library allocation
page execute and read and write
72D0000
trusted library allocation
page read and write
B3FD000
stack
page read and write
14E7000
heap
page read and write
B17E000
stack
page read and write
53C4000
trusted library allocation
page read and write
50B0000
heap
page read and write
256B000
trusted library allocation
page read and write
2428000
trusted library allocation
page read and write
B11D000
stack
page read and write
5017000
trusted library allocation
page read and write
257D000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
2ED7000
trusted library allocation
page execute and read and write
250B000
trusted library allocation
page read and write
14C0000
trusted library allocation
page execute and read and write
DD7000
stack
page read and write
1146000
trusted library allocation
page execute and read and write
1510000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
5460000
heap
page read and write
5B0C000
heap
page read and write
51A0000
heap
page read and write
2AD6000
trusted library allocation
page read and write
C90000
heap
page read and write
2DA0000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
AA3E000
stack
page read and write
5740000
heap
page read and write
1600000
heap
page read and write
AD9E000
stack
page read and write
54C2000
trusted library allocation
page read and write
1574000
heap
page read and write
12F6000
trusted library allocation
page execute and read and write
53F2000
trusted library allocation
page read and write
1257000
trusted library allocation
page execute and read and write
43B8000
trusted library allocation
page read and write
5560000
heap
page read and write
1507000
heap
page read and write
B130000
heap
page read and write
4FEB000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
252F000
trusted library allocation
page read and write
1644000
trusted library allocation
page read and write
4FE4000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
4F40000
heap
page read and write
5550000
trusted library allocation
page read and write
5A10000
heap
page read and write
253B000
trusted library allocation
page read and write
1887000
trusted library allocation
page execute and read and write
3171000
trusted library allocation
page read and write
2CF0000
heap
page read and write
A8FF000
stack
page read and write
5AC0000
heap
page read and write
2590000
heap
page read and write
14BA000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
812E000
stack
page read and write
55D0000
trusted library allocation
page read and write
FF4000
heap
page read and write
188B000
trusted library allocation
page execute and read and write
6610000
trusted library allocation
page execute and read and write
2525000
trusted library allocation
page read and write
2533000
trusted library allocation
page read and write
58DE000
stack
page read and write
2CBE000
unkown
page read and write
6420000
trusted library allocation
page read and write
E2A000
heap
page read and write
53DE000
trusted library allocation
page read and write
182E000
stack
page read and write
2C20000
heap
page read and write
5530000
heap
page read and write
2519000
trusted library allocation
page read and write
5730000
trusted library allocation
page execute and read and write
6119000
stack
page read and write
ADBE000
stack
page read and write
AFEE000
stack
page read and write
1240000
trusted library allocation
page read and write
42D000
stack
page read and write
2E50000
heap
page execute and read and write
2C3C000
trusted library allocation
page read and write
10C0000
heap
page read and write
5613000
heap
page read and write
6D9A000
heap
page read and write
82EE000
stack
page read and write
1660000
heap
page read and write
80F3000
heap
page read and write
690D000
heap
page read and write
2479000
trusted library allocation
page read and write
2515000
trusted library allocation
page read and write
CA0000
heap
page read and write
1302000
trusted library allocation
page read and write
1003000
heap
page read and write
3B01000
trusted library allocation
page read and write
53BE000
stack
page read and write
BB7E000
stack
page read and write
80CB000
heap
page read and write
829E000
stack
page read and write
55BE000
stack
page read and write
58F0000
heap
page read and write
2560000
heap
page read and write
24B9000
stack
page read and write
25DF000
unkown
page read and write
253D000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
5A1F000
stack
page read and write
3FE9000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
FE7000
heap
page read and write
3460000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page execute and read and write
52FB000
stack
page read and write
7680000
trusted library allocation
page execute and read and write
CEE000
stack
page read and write
34AE000
trusted library allocation
page read and write
56A0000
heap
page read and write
66B0000
heap
page read and write
172F000
stack
page read and write
6600000
heap
page read and write
2E50000
heap
page read and write
2C7E000
unkown
page read and write
902000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
6BCE000
stack
page read and write
56C0000
trusted library allocation
page execute and read and write
4C2D000
stack
page read and write
255D000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
4F80000
heap
page execute and read and write
1590000
heap
page read and write
2DA6000
trusted library allocation
page read and write
2555000
trusted library allocation
page read and write
1035000
heap
page read and write
57CF000
stack
page read and write
122D000
trusted library allocation
page execute and read and write
6146000
trusted library allocation
page read and write
1520000
heap
page read and write
500D000
trusted library allocation
page read and write
FFB000
stack
page read and write
D90000
heap
page read and write
10B0000
heap
page read and write
2EF0000
trusted library allocation
page read and write
152A000
heap
page read and write
2AF9000
trusted library allocation
page read and write
5162000
trusted library allocation
page read and write
B67E000
stack
page read and write
70D0000
heap
page read and write
285A000
trusted library allocation
page execute and read and write
F8E000
stack
page read and write
162F000
stack
page read and write
7237000
heap
page read and write
2390000
trusted library allocation
page read and write
500E000
stack
page read and write
4D80000
trusted library allocation
page read and write
256F000
trusted library allocation
page read and write
57A0000
heap
page read and write
3DE1000
trusted library allocation
page read and write
5600000
trusted library section
page readonly
136E000
stack
page read and write
4A60000
heap
page read and write
107E000
stack
page read and write
53E1000
trusted library allocation
page read and write
11D0000
heap
page read and write
5015000
trusted library allocation
page read and write
930000
heap
page execute and read and write
1577000
heap
page read and write
2D10000
trusted library allocation
page read and write
960000
heap
page read and write
723B000
heap
page read and write
130B000
trusted library allocation
page execute and read and write
565E000
stack
page read and write
2581000
trusted library allocation
page read and write
91DD000
stack
page read and write
5441000
trusted library allocation
page read and write
7C8000
heap
page read and write
2EB0000
heap
page execute and read and write
5710000
trusted library allocation
page read and write
5001000
trusted library allocation
page read and write
2569000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
11AA000
heap
page read and write
2567000
trusted library allocation
page read and write
256D000
trusted library allocation
page read and write
14BE000
stack
page read and write
D13000
trusted library allocation
page execute and read and write
2403000
trusted library allocation
page read and write
589E000
stack
page read and write
28A0000
heap
page read and write
115B000
trusted library allocation
page execute and read and write
1490000
heap
page read and write
2DD0000
heap
page execute and read and write
3E90000
trusted library allocation
page read and write
2561000
trusted library allocation
page read and write
792E000
stack
page read and write
8DD000
trusted library allocation
page execute and read and write
2565000
trusted library allocation
page read and write
2583000
trusted library allocation
page read and write
865E000
stack
page read and write
4A90000
trusted library allocation
page read and write
2ED0000
heap
page read and write
12ED000
trusted library allocation
page execute and read and write
7A2E000
stack
page read and write
AC5E000
stack
page read and write
31D9000
trusted library allocation
page read and write
1130000
heap
page read and write
B03E000
stack
page read and write
2DC5000
trusted library allocation
page read and write
740000
heap
page read and write
12FA000
trusted library allocation
page execute and read and write
123D000
trusted library allocation
page execute and read and write
241C000
trusted library allocation
page read and write
A7FE000
stack
page read and write
5330000
trusted library allocation
page execute and read and write
2EC0000
trusted library allocation
page read and write
24EF000
trusted library allocation
page read and write
2E8F000
unkown
page read and write
7370000
trusted library allocation
page execute and read and write
D36000
trusted library allocation
page execute and read and write
730000
heap
page read and write
5320000
heap
page read and write
6132000
trusted library allocation
page read and write
4F7C000
stack
page read and write
D30000
trusted library allocation
page read and write
7F6000
heap
page read and write
AFDF000
stack
page read and write
2F18000
trusted library allocation
page read and write
2587000
trusted library allocation
page read and write
4FFE000
stack
page read and write
325E000
stack
page read and write
130D000
heap
page read and write
2509000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
56D0000
heap
page read and write
6F6C000
stack
page read and write
14D0000
heap
page read and write
2CC0000
heap
page read and write
2EA5000
trusted library allocation
page read and write
14A0000
heap
page read and write
131B000
heap
page read and write
1360000
heap
page read and write
C3CE000
stack
page read and write
30B8000
trusted library allocation
page read and write
296D000
stack
page read and write
2ED0000
trusted library allocation
page read and write
4C20000
heap
page read and write
2E08000
trusted library allocation
page read and write
FC8000
heap
page read and write
51A3000
heap
page read and write
2867000
trusted library allocation
page execute and read and write
D57000
heap
page read and write
254D000
trusted library allocation
page read and write
2F00000
heap
page read and write
F00000
heap
page read and write
63AA000
stack
page read and write
542E000
stack
page read and write
103F000
stack
page read and write
D23000
trusted library allocation
page read and write
4C10000
heap
page read and write
2A5E000
stack
page read and write
103E000
stack
page read and write
31D000
stack
page read and write
3060000
heap
page execute and read and write
2DB0000
trusted library allocation
page read and write
B2DE000
stack
page read and write
12B3000
heap
page read and write
24E9000
trusted library allocation
page read and write
4FFE000
trusted library allocation
page read and write
55F0000
trusted library allocation
page execute and read and write
29F0000
heap
page read and write
B120000
heap
page read and write
55E0000
heap
page read and write
4FCE000
stack
page read and write
8090000
heap
page read and write
2E61000
trusted library allocation
page read and write
C28C000
stack
page read and write
253F000
trusted library allocation
page read and write
B85E000
stack
page read and write
4F02000
trusted library allocation
page read and write
6D10000
heap
page read and write
5570000
trusted library allocation
page read and write
6141000
trusted library allocation
page read and write
612B000
trusted library allocation
page read and write
8F50000
heap
page read and write
5000000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
2B2B000
heap
page read and write
58F3000
heap
page read and write
23A0000
heap
page read and write
7320000
trusted library allocation
page execute and read and write
6170000
heap
page read and write
4171000
trusted library allocation
page read and write
2AF0000
heap
page execute and read and write
AA7D000
stack
page read and write
2FDE000
stack
page read and write
1640000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
2507000
trusted library allocation
page read and write
4A2E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1882000
trusted library allocation
page read and write
74EB000
stack
page read and write
53DD000
stack
page read and write
8B9000
stack
page read and write
D1D000
trusted library allocation
page execute and read and write
2513000
trusted library allocation
page read and write
68D0000
heap
page read and write
24E6000
trusted library allocation
page read and write
1076000
heap
page read and write
2D20000
heap
page read and write
4BF5000
trusted library section
page readonly
5750000
trusted library allocation
page read and write
8A35000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
2E4F000
stack
page read and write
14D0000
trusted library allocation
page read and write
24ED000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
1480000
trusted library allocation
page execute and read and write
4A0F000
stack
page read and write
FCE000
heap
page read and write
2DC0000
trusted library allocation
page read and write
258B000
trusted library allocation
page read and write
E0C000
heap
page read and write
11FE000
stack
page read and write
865000
heap
page read and write
2CE0000
heap
page read and write
D10000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
13A4000
heap
page read and write
3CE5000
trusted library allocation
page read and write
29E0000
heap
page read and write
ACBD000
stack
page read and write
2386000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
11A4000
heap
page read and write
5480000
trusted library allocation
page execute and read and write
1498000
heap
page read and write
55BC000
stack
page read and write
1527000
heap
page read and write
D98000
heap
page read and write
7F3000
heap
page read and write
1083000
trusted library allocation
page execute and read and write
1876000
trusted library allocation
page execute and read and write
1550000
heap
page read and write
250D000
trusted library allocation
page read and write
B25E000
stack
page read and write
D3A000
trusted library allocation
page execute and read and write
2571000
trusted library allocation
page read and write
744E000
stack
page read and write
56E0000
heap
page read and write
55C0000
trusted library section
page readonly
12E3000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
24F3000
trusted library allocation
page read and write
52C0000
heap
page read and write
52EE000
stack
page read and write
17EE000
stack
page read and write
5AFE000
heap
page read and write
4BF0000
trusted library section
page readonly
4A55000
trusted library allocation
page read and write
90B000
trusted library allocation
page execute and read and write
1406000
heap
page read and write
1906000
heap
page read and write
3AF1000
trusted library allocation
page read and write
6D96000
heap
page read and write
A93E000
stack
page read and write
2A9E000
stack
page read and write
12DD000
trusted library allocation
page execute and read and write
2AF1000
trusted library allocation
page read and write
1120000
heap
page read and write
30E0000
heap
page read and write
71A2000
trusted library allocation
page read and write
CA5000
heap
page read and write
2AD4000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
1520000
heap
page read and write
63FC000
stack
page read and write
B13E000
stack
page read and write
2537000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
940000
trusted library allocation
page execute and read and write
17AE000
stack
page read and write
252B000
trusted library allocation
page read and write
967000
heap
page read and write
1470000
trusted library allocation
page read and write
C40000
unkown
page readonly
14C4000
heap
page read and write
C18C000
stack
page read and write
1040000
heap
page read and write
B90000
heap
page read and write
1299000
heap
page read and write
578E000
stack
page read and write
C70000
heap
page read and write
2E9000
stack
page read and write
3B5D000
trusted library allocation
page read and write
8A2E000
stack
page read and write
2AE0000
trusted library allocation
page read and write
2384000
trusted library allocation
page read and write
BF0000
heap
page read and write
81B0000
trusted library allocation
page execute and read and write
51AE000
stack
page read and write
AEDE000
stack
page read and write
25CE000
stack
page read and write
62AC000
stack
page read and write
B89E000
stack
page read and write
4AD0000
heap
page execute and read and write
56CD000
stack
page read and write
591D000
stack
page read and write
4DE8000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
187A000
trusted library allocation
page execute and read and write
1500000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
1445000
heap
page read and write
EF7000
stack
page read and write
257F000
trusted library allocation
page read and write
5300000
trusted library section
page readonly
53ED000
trusted library allocation
page read and write
1440000
heap
page read and write
1350000
heap
page read and write
8D4000
trusted library allocation
page read and write
117E000
stack
page read and write
7A8E000
stack
page read and write
2510000
heap
page read and write
6A10000
trusted library allocation
page execute and read and write
574E000
stack
page read and write
53C0000
trusted library allocation
page read and write
1270000
heap
page read and write
537E000
stack
page read and write
1307000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
7A40000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
1349000
heap
page read and write
2563000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
10FE000
stack
page read and write
1124000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
6428000
trusted library allocation
page read and write
DA6000
heap
page read and write
55B0000
trusted library allocation
page read and write
C2CD000
stack
page read and write
2840000
trusted library allocation
page read and write
740E000
stack
page read and write
5720000
heap
page execute and read and write
410000
heap
page read and write
4AF0000
trusted library allocation
page read and write
754E000
stack
page read and write
14C6000
heap
page read and write
255F000
trusted library allocation
page read and write
14B0000
heap
page read and write
BC7E000
stack
page read and write
1090000
heap
page read and write
134E000
stack
page read and write
AB7D000
stack
page read and write
BB1F000
stack
page read and write
5B1E000
stack
page read and write
2AD0000
trusted library allocation
page read and write
3BFE000
trusted library allocation
page read and write
5520000
heap
page read and write
5740000
trusted library allocation
page read and write
2541000
trusted library allocation
page read and write
8FA4000
heap
page read and write
34FB000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
542B000
trusted library allocation
page read and write
2CDD000
stack
page read and write
CDA000
stack
page read and write
23BB000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
8FCD000
heap
page read and write
E37000
heap
page read and write
164D000
trusted library allocation
page execute and read and write
E1F000
heap
page read and write
5AB0000
heap
page read and write
1524000
heap
page read and write
1215000
heap
page read and write
1230000
trusted library allocation
page read and write
AD5E000
stack
page read and write
71F0000
heap
page read and write
2880000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
65E9000
stack
page read and write
82A0000
trusted library allocation
page read and write
23B1000
trusted library allocation
page read and write
919D000
stack
page read and write
8D3000
trusted library allocation
page execute and read and write
849000
heap
page read and write
158B000
heap
page read and write
1123000
trusted library allocation
page execute and read and write
2F0F000
stack
page read and write
990000
heap
page read and write
151A000
trusted library allocation
page execute and read and write
252D000
trusted library allocation
page read and write
2C80000
heap
page read and write
1527000
heap
page read and write
2C6E000
unkown
page read and write
BC20000
heap
page read and write
14FB000
stack
page read and write
1250000
trusted library allocation
page read and write
67DE000
heap
page read and write
55FB000
stack
page read and write
2549000
trusted library allocation
page read and write
2503000
trusted library allocation
page read and write
490E000
stack
page read and write
4A36000
trusted library allocation
page read and write
285B000
heap
page read and write
5700000
trusted library allocation
page execute and read and write
B15C000
stack
page read and write
B29F000
stack
page read and write
E00000
heap
page read and write
5420000
trusted library allocation
page read and write
B35E000
stack
page read and write
4AE0000
heap
page read and write
2517000
trusted library allocation
page read and write
2C70000
heap
page read and write
2E2E000
stack
page read and write
2589000
trusted library allocation
page read and write
40C000
remote allocation
page execute and read and write
7360000
trusted library allocation
page read and write
5070000
heap
page execute and read and write
2F7E000
stack
page read and write
4A1B000
trusted library allocation
page read and write
255B000
trusted library allocation
page read and write
4D60000
trusted library allocation
page execute and read and write
2597000
trusted library allocation
page read and write
251D000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
1388000
heap
page read and write
2575000
trusted library allocation
page read and write
B91E000
stack
page read and write
1040000
trusted library allocation
page read and write
14BE000
stack
page read and write
53E6000
trusted library allocation
page read and write
114A000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
2559000
trusted library allocation
page read and write
4C9C000
stack
page read and write
1252000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
29C0000
heap
page read and write
12F2000
trusted library allocation
page read and write
5A50000
heap
page execute and read and write
55C0000
heap
page execute and read and write
70AE000
stack
page read and write
2C8B000
heap
page read and write
165D000
trusted library allocation
page execute and read and write
54DD000
stack
page read and write
2492000
trusted library allocation
page read and write
EBB000
stack
page read and write
1110000
trusted library allocation
page read and write
3C6B000
trusted library allocation
page read and write
249C000
trusted library allocation
page read and write
227E000
stack
page read and write
12C0000
trusted library allocation
page read and write
3E7D000
trusted library allocation
page read and write
B3BF000
stack
page read and write
16AC000
unkown
page read and write
23ED000
trusted library allocation
page read and write
4B00000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
29C0000
trusted library allocation
page read and write
BA1E000
stack
page read and write
2F30000
heap
page read and write
1057000
heap
page read and write
5472000
trusted library allocation
page read and write
B9FC000
stack
page read and write
3FE1000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
3290000
heap
page read and write
24F5000
trusted library allocation
page read and write
A3B000
stack
page read and write
165F000
stack
page read and write
2380000
trusted library allocation
page read and write
3150000
heap
page execute and read and write
6D70000
heap
page read and write
40E000
unkown
page read and write
54F0000
trusted library allocation
page read and write
BEB000
stack
page read and write
2595000
trusted library allocation
page read and write
970000
heap
page read and write
CA5000
heap
page read and write
14F0000
heap
page read and write
305E000
stack
page read and write
2531000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
C7E000
stack
page read and write
81F0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
24FB000
trusted library allocation
page read and write
23B9000
trusted library allocation
page read and write
2B20000
heap
page read and write
5170000
trusted library allocation
page execute and read and write
458C000
stack
page read and write
2890000
trusted library allocation
page execute and read and write
1223000
trusted library allocation
page execute and read and write
5012000
trusted library allocation
page read and write
8F2000
trusted library allocation
page read and write
56B0000
heap
page read and write
C30000
heap
page read and write
2545000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
4A63000
heap
page read and write
D47000
trusted library allocation
page execute and read and write
7ACE000
stack
page read and write
52DC000
stack
page read and write
BF5E000
stack
page read and write
3E61000
trusted library allocation
page read and write
5C1E000
stack
page read and write
8FD5000
heap
page read and write
108E000
stack
page read and write
1242000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
7C0000
heap
page read and write
24FF000
trusted library allocation
page read and write
FC0000
heap
page read and write
F3E000
stack
page read and write
414B000
trusted library allocation
page read and write
5510000
heap
page read and write
B19E000
stack
page read and write
B71C000
stack
page read and write
C05E000
stack
page read and write
D42000
trusted library allocation
page read and write
6DAE000
stack
page read and write
4F45000
heap
page read and write
DB4000
heap
page read and write
2F20000
trusted library allocation
page execute and read and write
3E3D000
trusted library allocation
page read and write
1040000
heap
page read and write
127E000
heap
page read and write
D4B000
trusted library allocation
page execute and read and write
63B0000
trusted library allocation
page read and write
552E000
stack
page read and write
52A0000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
AEED000
stack
page read and write
8200000
trusted library allocation
page execute and read and write
B63E000
stack
page read and write
5050000
trusted library allocation
page read and write
1516000
trusted library allocation
page execute and read and write
2E5B000
heap
page read and write
2521000
trusted library allocation
page read and write
14AE000
heap
page read and write
3280000
trusted library allocation
page read and write
5304000
trusted library section
page readonly
B39E000
stack
page read and write
50DC000
stack
page read and write
CA0000
heap
page read and write
F50000
heap
page read and write
D14000
trusted library allocation
page read and write
2425000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
2501000
trusted library allocation
page read and write
6410000
trusted library allocation
page read and write
612E000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
B27E000
stack
page read and write
D2D000
trusted library allocation
page execute and read and write
4C00000
heap
page read and write
BD2000
unkown
page readonly
73AD000
stack
page read and write
6120000
trusted library allocation
page read and write
73EC000
stack
page read and write
3C4B000
trusted library allocation
page read and write
65F0000
trusted library allocation
page execute and read and write
4A50000
trusted library allocation
page read and write
1370000
heap
page read and write
B99F000
stack
page read and write
2AC0000
trusted library allocation
page read and write
B05C000
stack
page read and write
1188000
heap
page read and write
557E000
stack
page read and write
3FC5000
trusted library allocation
page read and write
29AA000
stack
page read and write
5F5E000
stack
page read and write
D50000
heap
page read and write
D20000
trusted library allocation
page read and write
14E0000
heap
page read and write
251F000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
5770000
heap
page execute and read and write
3548000
trusted library allocation
page read and write
E43000
heap
page read and write
6690000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
28C0000
heap
page execute and read and write
1090000
trusted library allocation
page execute and read and write
AE9E000
stack
page read and write
2539000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
2529000
trusted library allocation
page read and write
D7E000
heap
page read and write
10A0000
heap
page read and write
AB80000
heap
page read and write
FA0000
heap
page read and write
BE1E000
stack
page read and write
1140000
trusted library allocation
page read and write
255E000
unkown
page read and write
8FA000
trusted library allocation
page execute and read and write
35B3000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
10F0000
heap
page read and write
5C5E000
stack
page read and write
4BE0000
trusted library allocation
page read and write
5B10000
heap
page read and write
5AAE000
stack
page read and write
650000
heap
page read and write
12F7000
stack
page read and write
4AF2000
trusted library allocation
page read and write
5563000
heap
page read and write
1900000
heap
page read and write
448B000
stack
page read and write
5160000
trusted library allocation
page read and write
E24000
heap
page read and write
1653000
trusted library allocation
page read and write
79EE000
stack
page read and write
3DE9000
trusted library allocation
page read and write
24FD000
trusted library allocation
page read and write
561E000
stack
page read and write
B53E000
stack
page read and write
6D1E000
heap
page read and write
1150000
trusted library allocation
page read and write
257B000
trusted library allocation
page read and write
23E1000
trusted library allocation
page read and write
28C0000
heap
page read and write
1080000
heap
page read and write
601A000
stack
page read and write
407C000
trusted library allocation
page read and write
290E000
stack
page read and write
247C000
trusted library allocation
page read and write
35C7000
trusted library allocation
page read and write
1030000
heap
page read and write
CEE000
stack
page read and write
2535000
trusted library allocation
page read and write
B01D000
stack
page read and write
2AA0000
heap
page read and write
2489000
trusted library allocation
page read and write
7580000
heap
page read and write
13E8000
heap
page read and write
7890000
trusted library section
page read and write
8ED000
trusted library allocation
page execute and read and write
725A000
heap
page read and write
BC1D000
stack
page read and write
29CA000
stack
page read and write
14BC000
stack
page read and write
7850000
trusted library allocation
page execute and read and write
5420000
trusted library allocation
page read and write
135E000
heap
page read and write
6670000
trusted library allocation
page read and write
5E5E000
unkown
page read and write
1500000
trusted library allocation
page execute and read and write
1643000
trusted library allocation
page execute and read and write
7B0E000
stack
page read and write
148E000
stack
page read and write
2B75000
trusted library allocation
page read and write
18EE000
stack
page read and write
156C000
heap
page read and write
139F000
heap
page read and write
5AB5000
heap
page read and write
1224000
trusted library allocation
page read and write
12D3000
trusted library allocation
page execute and read and write
912F000
stack
page read and write
2551000
trusted library allocation
page read and write
5A20000
heap
page read and write
907000
trusted library allocation
page execute and read and write
124A000
trusted library allocation
page execute and read and write
52AF000
stack
page read and write
298D000
stack
page read and write
2585000
trusted library allocation
page read and write
250F000
trusted library allocation
page read and write
55D0000
heap
page read and write
1667000
heap
page read and write
72AC000
stack
page read and write
6160000
trusted library allocation
page read and write
137F000
stack
page read and write
2AEE000
stack
page read and write
1530000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
12D4000
trusted library allocation
page read and write
5910000
heap
page execute and read and write
D32000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page execute and read and write
2C9E000
stack
page read and write
3EDE000
trusted library allocation
page read and write
3B9D000
trusted library allocation
page read and write
2C30000
heap
page read and write
E6F000
heap
page read and write
6D6E000
stack
page read and write
5025000
trusted library allocation
page read and write
283E000
stack
page read and write
2FC7000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
5006000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
43E5000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
254B000
trusted library allocation
page read and write
10C5000
heap
page read and write
24F7000
trusted library allocation
page read and write
7A48000
trusted library allocation
page read and write
254F000
trusted library allocation
page read and write
4FFE000
stack
page read and write
1210000
heap
page read and write
5630000
heap
page read and write
5799000
trusted library allocation
page read and write
1246000
trusted library allocation
page execute and read and write
2591000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
B61C000
stack
page read and write
E08000
heap
page read and write
2DE1000
trusted library allocation
page read and write
1157000
trusted library allocation
page execute and read and write
B3DF000
stack
page read and write
There are 977 hidden memdumps, click here to show them.