IOC Report
DHL_1003671162.exe

loading gif

Files

File Path
Type
Category
Malicious
DHL_1003671162.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp3999.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\qmUxKv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_1003671162.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qmUxKv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yqn1xl1.2cw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0awgqk0.nll.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwg340ft.njq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uaeswejy.dxd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp46C8.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp6C70.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp8A0A.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\qmUxKv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHL_1003671162.exe
"C:\Users\user\Desktop\DHL_1003671162.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qmUxKv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qmUxKv" /XML "C:\Users\user\AppData\Local\Temp\tmp3999.tmp"
malicious
C:\Users\user\Desktop\DHL_1003671162.exe
"C:\Users\user\Desktop\DHL_1003671162.exe"
malicious
C:\Users\user\AppData\Roaming\qmUxKv.exe
C:\Users\user\AppData\Roaming\qmUxKv.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qmUxKv" /XML "C:\Users\user\AppData\Local\Temp\tmp46C8.tmp"
malicious
C:\Users\user\AppData\Roaming\qmUxKv.exe
"C:\Users\user\AppData\Roaming\qmUxKv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qmUxKv" /XML "C:\Users\user\AppData\Local\Temp\tmp6C70.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qmUxKv" /XML "C:\Users\user\AppData\Local\Temp\tmp8A0A.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://mail.clslk.com
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.clslk.com
50.87.253.239
malicious

IPs

IP
Domain
Country
Malicious
50.87.253.239
mail.clslk.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
2EEC000
trusted library allocation
page read and write
malicious
2F64000
trusted library allocation
page read and write
malicious
2F32000
trusted library allocation
page read and write
malicious
3302000
trusted library allocation
page read and write
malicious
3A08000
trusted library allocation
page read and write
malicious
330A000
trusted library allocation
page read and write
malicious
33C2000
trusted library allocation
page read and write
malicious
2F6C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
32B1000
trusted library allocation
page read and write
malicious
33CA000
trusted library allocation
page read and write
malicious
2F3A000
trusted library allocation
page read and write
malicious
337C000
trusted library allocation
page read and write
malicious
486F000
trusted library allocation
page read and write
malicious
2EF1000
trusted library allocation
page read and write
malicious
4257000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
DFB000
heap
page read and write
63AF000
stack
page read and write
11C4000
heap
page read and write
7460000
heap
page read and write
583C000
stack
page read and write
3068000
trusted library allocation
page read and write
303D000
stack
page read and write
5B50000
heap
page read and write
9C1E000
stack
page read and write
5270000
heap
page read and write
9C0000
heap
page read and write
5970000
trusted library allocation
page read and write
27BE000
unkown
page read and write
7580000
heap
page read and write
46F9000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
42B9000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
69C8000
heap
page read and write
7A7000
stack
page read and write
6B70000
heap
page read and write
4D13000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
6477000
trusted library allocation
page read and write
6B5E000
stack
page read and write
59D0000
trusted library allocation
page read and write
ED0000
heap
page read and write
43E000
remote allocation
page execute and read and write
A2A000
trusted library allocation
page execute and read and write
1774000
trusted library allocation
page read and write
28C0000
heap
page execute and read and write
1936000
trusted library allocation
page execute and read and write
9BDE000
stack
page read and write
169B000
trusted library allocation
page execute and read and write
A1D000
trusted library allocation
page execute and read and write
57FB000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
769E000
stack
page read and write
A04000
trusted library allocation
page read and write
14AC000
stack
page read and write
1907000
trusted library allocation
page execute and read and write
6343000
heap
page read and write
A5A000
heap
page read and write
6D30000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
9D1E000
stack
page read and write
67D0000
heap
page read and write
79AE000
stack
page read and write
1760000
trusted library allocation
page read and write
507B000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
139D000
trusted library allocation
page execute and read and write
11B3000
trusted library allocation
page execute and read and write
738000
heap
page read and write
4E30000
trusted library allocation
page read and write
720000
heap
page read and write
3318000
heap
page read and write
5950000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page execute and read and write
5374000
trusted library section
page readonly
2A86000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
18FA000
trusted library allocation
page execute and read and write
4F52000
trusted library allocation
page read and write
1477000
heap
page read and write
2A53000
trusted library allocation
page read and write
EB3C000
stack
page read and write
5970000
heap
page read and write
5406000
trusted library allocation
page read and write
467C000
trusted library allocation
page read and write
5B55000
heap
page read and write
5440000
heap
page read and write
6F9F000
stack
page read and write
589E000
stack
page read and write
2E90000
heap
page execute and read and write
57C2000
trusted library allocation
page read and write
185F000
heap
page read and write
2DB4000
trusted library allocation
page read and write
3440000
heap
page read and write
175E000
stack
page read and write
5404000
trusted library allocation
page read and write
45FC000
trusted library allocation
page read and write
569C000
stack
page read and write
811000
heap
page read and write
E48E000
stack
page read and write
695E000
stack
page read and write
6C20000
heap
page read and write
1940000
trusted library allocation
page read and write
97FE000
stack
page read and write
1599000
heap
page read and write
1910000
heap
page read and write
D2A000
heap
page read and write
5220000
trusted library allocation
page execute and read and write
7200000
heap
page read and write
40DC000
trusted library allocation
page read and write
746E000
heap
page read and write
1408000
heap
page read and write
581D000
trusted library allocation
page read and write
42D9000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
65AE000
stack
page read and write
2AB0000
heap
page read and write
884E000
stack
page read and write
654E000
stack
page read and write
7190000
trusted library section
page read and write
2FAD000
stack
page read and write
6400000
trusted library allocation
page read and write
581E000
stack
page read and write
A00000
trusted library allocation
page read and write
65DE000
stack
page read and write
69A0000
trusted library allocation
page read and write
640C000
trusted library allocation
page read and write
33DF000
stack
page read and write
4C10000
trusted library allocation
page read and write
56DE000
stack
page read and write
192D000
trusted library allocation
page execute and read and write
190B000
trusted library allocation
page execute and read and write
32A0000
heap
page execute and read and write
3240000
trusted library allocation
page read and write
2EE0000
heap
page read and write
6BB0000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
8AFE000
stack
page read and write
431E000
trusted library allocation
page read and write
1570000
heap
page read and write
1770000
trusted library allocation
page read and write
1655000
heap
page read and write
5E6C000
trusted library allocation
page read and write
11B0000
heap
page read and write
57E0000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
D00000
heap
page read and write
11BA000
heap
page read and write
53F2000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
5973000
heap
page read and write
4F20000
trusted library allocation
page read and write
1800000
heap
page read and write
9FCE000
stack
page read and write
5940000
heap
page read and write
7B80000
trusted library allocation
page execute and read and write
68D0000
heap
page read and write
1384000
trusted library allocation
page read and write
1580000
heap
page read and write
54AD000
stack
page read and write
5500000
heap
page read and write
722E000
stack
page read and write
11EF000
heap
page read and write
710E000
stack
page read and write
1435000
heap
page read and write
77A0000
trusted library allocation
page execute and read and write
53C0000
trusted library allocation
page read and write
80BC000
heap
page read and write
58B0000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
5A00000
trusted library allocation
page execute and read and write
700E000
stack
page read and write
166D000
trusted library allocation
page execute and read and write
53E1000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
7F1F0000
trusted library allocation
page execute and read and write
4E00000
heap
page read and write
6B72000
trusted library allocation
page read and write
A03000
trusted library allocation
page execute and read and write
3300000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
6300000
heap
page read and write
160D000
stack
page read and write
6B60000
heap
page read and write
1210000
heap
page read and write
3F19000
trusted library allocation
page read and write
191D000
trusted library allocation
page execute and read and write
61CB000
heap
page read and write
25B0000
trusted library allocation
page execute and read and write
17C2000
heap
page read and write
559C000
stack
page read and write
1218000
heap
page read and write
DEE000
stack
page read and write
7940000
trusted library allocation
page read and write
6DE2000
heap
page read and write
3220000
trusted library allocation
page read and write
26CD000
stack
page read and write
5886000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
1590000
heap
page read and write
245E000
stack
page read and write
5212000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
18DD000
trusted library allocation
page execute and read and write
14B0000
trusted library allocation
page execute and read and write
4ADC000
stack
page read and write
779E000
stack
page read and write
6B00000
heap
page read and write
870000
heap
page read and write
B170000
trusted library section
page read and write
5412000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
A24E000
stack
page read and write
DD2000
heap
page read and write
993E000
stack
page read and write
57D4000
trusted library allocation
page read and write
792D000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
197F000
stack
page read and write
1500000
heap
page read and write
5860000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
5390000
heap
page read and write
2B9E000
trusted library allocation
page read and write
6860000
trusted library allocation
page execute and read and write
57BD000
trusted library allocation
page read and write
6E9E000
stack
page read and write
45F5000
trusted library allocation
page read and write
6A30000
heap
page read and write
5400000
trusted library allocation
page read and write
68C7000
trusted library allocation
page read and write
6D3C000
trusted library allocation
page read and write
6F7000
stack
page read and write
1692000
trusted library allocation
page read and write
717E000
stack
page read and write
27FD000
trusted library allocation
page execute and read and write
50E0000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5CCD000
stack
page read and write
15E7000
heap
page read and write
50B0000
heap
page read and write
4B30000
trusted library allocation
page read and write
29F8000
heap
page read and write
267F000
unkown
page read and write
2A48000
trusted library allocation
page read and write
8960000
heap
page read and write
6550000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
14B5000
heap
page read and write
3634000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
873E000
stack
page read and write
6470000
trusted library allocation
page read and write
582D000
stack
page read and write
53CB000
trusted library allocation
page read and write
1595000
heap
page read and write
2A80000
heap
page read and write
670E000
stack
page read and write
1400000
heap
page read and write
7B70000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
540000
unkown
page readonly
2CE5000
trusted library allocation
page execute and read and write
1536000
heap
page read and write
11B0000
trusted library allocation
page read and write
2890000
trusted library allocation
page execute and read and write
6B5E000
stack
page read and write
A5E000
heap
page read and write
5DBF000
stack
page read and write
2EE1000
trusted library allocation
page read and write
875000
heap
page read and write
125E000
stack
page read and write
1902000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
4BC2000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
A87000
heap
page read and write
50D5000
trusted library allocation
page read and write
AA78000
trusted library allocation
page read and write
11A0000
heap
page read and write
27F0000
trusted library allocation
page read and write
7D6E000
stack
page read and write
5420000
heap
page execute and read and write
9CFE000
stack
page read and write
16B0000
heap
page read and write
2A4A000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5E50000
trusted library allocation
page execute and read and write
96BD000
trusted library allocation
page read and write
5080000
heap
page read and write
236A000
stack
page read and write
5EC0000
trusted library allocation
page read and write
5952000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
4F6D000
stack
page read and write
5ED0000
trusted library allocation
page read and write
16D0000
trusted library allocation
page execute and read and write
708E000
stack
page read and write
4FF2000
trusted library allocation
page read and write
54EE000
stack
page read and write
2A01000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
5082000
trusted library allocation
page read and write
30B0000
heap
page read and write
59E4000
trusted library allocation
page read and write
5100000
heap
page execute and read and write
14F7000
stack
page read and write
A50000
heap
page read and write
42A5000
trusted library allocation
page read and write
508E000
trusted library allocation
page read and write
B3BE000
stack
page read and write
64DE000
stack
page read and write
33D6000
trusted library allocation
page read and write
5050000
heap
page read and write
2DB6000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
45F5000
trusted library allocation
page read and write
61DF000
heap
page read and write
27F4000
trusted library allocation
page read and write
29F0000
heap
page read and write
4F0C000
trusted library allocation
page read and write
E0C000
heap
page read and write
456E000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
11C3000
trusted library allocation
page read and write
18ED000
trusted library allocation
page execute and read and write
16C7000
heap
page read and write
1390000
heap
page read and write
5BB0000
heap
page read and write
5B37000
trusted library allocation
page read and write
6D80000
heap
page read and write
2CD0000
trusted library allocation
page read and write
35F8000
trusted library allocation
page read and write
3EE9000
trusted library allocation
page read and write
781E000
stack
page read and write
A37000
trusted library allocation
page execute and read and write
18F6000
trusted library allocation
page execute and read and write
2B91000
trusted library allocation
page read and write
9A7E000
stack
page read and write
5BC0000
heap
page execute and read and write
5933000
heap
page read and write
5590000
heap
page read and write
4EF8000
trusted library allocation
page read and write
5310000
heap
page read and write
1947000
trusted library allocation
page execute and read and write
B310000
trusted library allocation
page read and write
2E4F000
stack
page read and write
5420000
heap
page read and write
FF0000
heap
page read and write
96FE000
stack
page read and write
80C0000
heap
page read and write
4FE0000
heap
page read and write
2A9B000
trusted library allocation
page read and write
7EEC0000
trusted library allocation
page execute and read and write
11E7000
trusted library allocation
page execute and read and write
57F0000
trusted library allocation
page read and write
30E0000
heap
page read and write
31D0000
heap
page read and write
151E000
heap
page read and write
1125000
heap
page read and write
1664000
trusted library allocation
page read and write
ED5000
heap
page read and write
5230000
trusted library allocation
page read and write
1930000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
6A90000
heap
page read and write
58C0000
heap
page execute and read and write
5040000
heap
page read and write
E9FE000
stack
page read and write
1A7E000
stack
page read and write
9E8D000
stack
page read and write
A22000
trusted library allocation
page read and write
5450000
heap
page read and write
6DF3000
heap
page read and write
9D0000
heap
page read and write
2CE7000
trusted library allocation
page execute and read and write
586B000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
58DE000
stack
page read and write
167D000
trusted library allocation
page execute and read and write
5B08000
trusted library allocation
page read and write
DAF000
stack
page read and write
5F0E000
stack
page read and write
5B44000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
A34E000
stack
page read and write
146E000
stack
page read and write
508D000
stack
page read and write
2DC0000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
4A05000
trusted library allocation
page read and write
99E000
stack
page read and write
280D000
trusted library allocation
page execute and read and write
6940000
trusted library allocation
page read and write
6408000
trusted library allocation
page read and write
5EC4000
trusted library allocation
page read and write
F88000
stack
page read and write
5010000
trusted library allocation
page read and write
592E000
stack
page read and write
A20000
heap
page read and write
5070000
heap
page read and write
6B50000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
898E000
stack
page read and write
2800000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
9F8E000
stack
page read and write
E74E000
stack
page read and write
58E0000
heap
page execute and read and write
E4CE000
stack
page read and write
61C0000
heap
page read and write
11AE000
stack
page read and write
1673000
trusted library allocation
page read and write
346B000
heap
page read and write
2A7C000
trusted library allocation
page read and write
4DFE000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
8089000
heap
page read and write
1776000
trusted library allocation
page read and write
791E000
stack
page read and write
6DCA000
heap
page read and write
288E000
stack
page read and write
1420000
heap
page read and write
1178000
heap
page read and write
2812000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
5006000
trusted library allocation
page read and write
142E000
stack
page read and write
2CB0000
trusted library allocation
page read and write
1788000
heap
page read and write
5ECC000
trusted library allocation
page read and write
4AEE000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
1045000
heap
page read and write
307A000
stack
page read and write
25D6000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
7000000
heap
page read and write
2A71000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
4E60000
heap
page execute and read and write
595E000
stack
page read and write
76BC000
trusted library allocation
page read and write
1120000
heap
page read and write
983E000
stack
page read and write
4B60000
heap
page read and write
2EA0000
trusted library allocation
page execute and read and write
2CD6000
trusted library allocation
page execute and read and write
AE70000
trusted library allocation
page read and write
732E000
stack
page read and write
17B5000
heap
page read and write
997E000
stack
page read and write
3168000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
4A0F000
trusted library allocation
page read and write
329E000
unkown
page read and write
4371000
trusted library allocation
page read and write
E84E000
stack
page read and write
580A000
trusted library allocation
page read and write
B75000
heap
page read and write
18D0000
trusted library allocation
page read and write
2460000
heap
page read and write
A97000
heap
page read and write
5B9B000
stack
page read and write
D62000
heap
page read and write
75AC000
heap
page read and write
14B5000
heap
page read and write
6960000
trusted library allocation
page execute and read and write
38E3000
trusted library allocation
page read and write
7F010000
trusted library allocation
page execute and read and write
17CE000
stack
page read and write
59E0000
trusted library allocation
page read and write
4FC0000
heap
page read and write
7920000
trusted library allocation
page read and write
9BFE000
stack
page read and write
1214000
heap
page read and write
50B3000
heap
page read and write
2840000
trusted library allocation
page read and write
10E6000
heap
page read and write
27FB000
heap
page read and write
4FAE000
stack
page read and write
4F41000
trusted library allocation
page read and write
1508000
heap
page read and write
4FC5000
heap
page read and write
3460000
heap
page read and write
4BD0000
trusted library allocation
page execute and read and write
801000
heap
page read and write
71B0000
trusted library allocation
page execute and read and write
11C0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
6233000
heap
page read and write
699E000
stack
page read and write
4F4D000
trusted library allocation
page read and write
127A000
stack
page read and write
4B20000
trusted library allocation
page read and write
7E6E000
stack
page read and write
A26000
trusted library allocation
page execute and read and write
1690000
trusted library allocation
page read and write
65DE000
stack
page read and write
5315000
heap
page read and write
13A2000
trusted library allocation
page read and write
50FF000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
1650000
heap
page read and write
540B000
trusted library allocation
page read and write
60BE000
stack
page read and write
1932000
trusted library allocation
page read and write
5940000
heap
page read and write
A0CE000
stack
page read and write
283C000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
B50000
heap
page read and write
A0D000
trusted library allocation
page execute and read and write
32B0000
trusted library allocation
page execute and read and write
759000
heap
page read and write
25F1000
trusted library allocation
page read and write
6D5E000
stack
page read and write
2CE2000
trusted library allocation
page read and write
1217000
heap
page read and write
256F000
stack
page read and write
1380000
trusted library allocation
page read and write
2468000
heap
page read and write
315E000
stack
page read and write
4483000
trusted library allocation
page read and write
1000000
heap
page read and write
4F89000
trusted library allocation
page read and write
765000
heap
page read and write
59FC000
trusted library allocation
page read and write
23D0000
heap
page read and write
71A0000
trusted library section
page read and write
EC0000
trusted library allocation
page read and write
4A4E000
stack
page read and write
D20000
heap
page read and write
10B0000
heap
page read and write
580E000
trusted library allocation
page read and write
12A0000
trusted library allocation
page execute and read and write
4FD0000
heap
page read and write
138D000
trusted library allocation
page execute and read and write
525C000
stack
page read and write
5070000
trusted library allocation
page read and write
5060000
trusted library section
page readonly
2FE9000
stack
page read and write
86E000
stack
page read and write
5980000
heap
page read and write
30F0000
heap
page read and write
38F5000
trusted library allocation
page read and write
53A0000
heap
page read and write
13B5000
trusted library allocation
page execute and read and write
2D00000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
6BA2000
heap
page read and write
1905000
trusted library allocation
page execute and read and write
4E85000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
339E000
stack
page read and write
596E000
stack
page read and write
B4E000
stack
page read and write
32FC000
stack
page read and write
149E000
heap
page read and write
A10E000
stack
page read and write
5B40000
trusted library allocation
page read and write
4B63000
heap
page read and write
1686000
trusted library allocation
page execute and read and write
1920000
trusted library allocation
page read and write
53AC000
stack
page read and write
13B2000
trusted library allocation
page read and write
B70000
heap
page read and write
5EE0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
180E000
stack
page read and write
27FF000
unkown
page read and write
A490000
trusted library allocation
page read and write
E59E000
stack
page read and write
36A9000
trusted library allocation
page read and write
1485000
heap
page read and write
11D6000
trusted library allocation
page execute and read and write
1942000
trusted library allocation
page read and write
27F3000
trusted library allocation
page execute and read and write
3244000
trusted library allocation
page read and write
C4E000
stack
page read and write
1710000
heap
page read and write
4D2D000
stack
page read and write
9BBC000
stack
page read and write
E87E000
stack
page read and write
718E000
stack
page read and write
5EE4000
trusted library allocation
page read and write
A99000
heap
page read and write
66DB000
stack
page read and write
1910000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7D2E000
stack
page read and write
4379000
trusted library allocation
page read and write
3F09000
trusted library allocation
page read and write
330E000
unkown
page read and write
10AE000
stack
page read and write
5CBC000
stack
page read and write
C8E000
stack
page read and write
762000
heap
page read and write
178E000
heap
page read and write
2AC0000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
B00000
heap
page read and write
1660000
trusted library allocation
page read and write
12E0000
heap
page read and write
12C0000
trusted library allocation
page read and write
5CD0000
heap
page read and write
6420000
trusted library allocation
page execute and read and write
5160000
heap
page read and write
2ED8000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
2827000
trusted library allocation
page execute and read and write
2A57000
trusted library allocation
page read and write
3260000
heap
page read and write
25D4000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
E70C000
stack
page read and write
29D0000
trusted library allocation
page read and write
1480000
heap
page read and write
4B10000
trusted library allocation
page read and write
5F2C000
trusted library allocation
page read and write
5C7C000
stack
page read and write
2CA0000
trusted library allocation
page read and write
53A5000
heap
page read and write
1945000
trusted library allocation
page execute and read and write
281A000
trusted library allocation
page execute and read and write
5096000
trusted library allocation
page read and write
326C000
stack
page read and write
E70000
heap
page read and write
57FE000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
5A6E000
stack
page read and write
3A01000
trusted library allocation
page read and write
6870000
trusted library allocation
page execute and read and write
5890000
trusted library allocation
page read and write
1914000
trusted library allocation
page read and write
681E000
stack
page read and write
1170000
heap
page read and write
263E000
unkown
page read and write
6E40000
heap
page read and write
B45000
heap
page read and write
6950000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
EAFE000
stack
page read and write
13F0000
heap
page read and write
75DE000
heap
page read and write
4A00000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
4AF6000
trusted library allocation
page read and write
29CF000
stack
page read and write
156E000
stack
page read and write
D98000
heap
page read and write
2A51000
trusted library allocation
page read and write
89D7000
heap
page read and write
730000
heap
page read and write
32E0000
heap
page read and write
53D0000
trusted library allocation
page read and write
123B000
heap
page read and write
35F1000
trusted library allocation
page read and write
541E000
stack
page read and write
4C20000
trusted library allocation
page execute and read and write
6BB0000
heap
page read and write
6B9E000
stack
page read and write
544E000
stack
page read and write
11D2000
trusted library allocation
page read and write
3610000
heap
page read and write
57AE000
trusted library allocation
page read and write
7D7000
heap
page read and write
53EB000
stack
page read and write
3230000
heap
page execute and read and write
587E000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page execute and read and write
32DE000
unkown
page read and write
794C000
trusted library allocation
page read and write
6F50000
heap
page read and write
3B91000
trusted library allocation
page read and write
2AA3000
trusted library allocation
page read and write
7F1C0000
trusted library allocation
page execute and read and write
836E000
stack
page read and write
3250000
heap
page read and write
2A33000
trusted library allocation
page read and write
E60C000
stack
page read and write
13E0000
heap
page read and write
7C7000
heap
page read and write
11FD000
stack
page read and write
1010000
heap
page read and write
16C0000
heap
page read and write
168A000
trusted library allocation
page execute and read and write
590E000
stack
page read and write
2AB3000
trusted library allocation
page read and write
282B000
trusted library allocation
page execute and read and write
270A000
stack
page read and write
50A2000
trusted library allocation
page read and write
7B8000
heap
page read and write
1520000
heap
page read and write
7FA00000
trusted library allocation
page execute and read and write
2CBD000
trusted library allocation
page execute and read and write
6946000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
17F9000
heap
page read and write
1533000
heap
page read and write
4E3C000
trusted library allocation
page read and write
579E000
trusted library allocation
page read and write
12D6000
trusted library allocation
page read and write
71D0000
trusted library section
page read and write
1575000
heap
page read and write
322F000
stack
page read and write
4BE0000
trusted library allocation
page read and write
27AE000
stack
page read and write
3371000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
1040000
heap
page read and write
646D000
stack
page read and write
EC7E000
stack
page read and write
7945000
trusted library allocation
page read and write
3270000
trusted library allocation
page execute and read and write
2690000
heap
page read and write
4055000
trusted library allocation
page read and write
4E10000
heap
page read and write
4E20000
trusted library allocation
page execute and read and write
193A000
trusted library allocation
page execute and read and write
5430000
heap
page read and write
569C000
stack
page read and write
12B0000
heap
page execute and read and write
2803000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
4421000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
57EE000
stack
page read and write
62C0000
trusted library allocation
page execute and read and write
56E0000
heap
page read and write
42F3000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5520000
trusted library allocation
page execute and read and write
6D60000
heap
page read and write
4AFD000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
43DF000
trusted library allocation
page read and write
A10000
heap
page read and write
63EE000
stack
page read and write
67DC000
stack
page read and write
76C0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
3290000
trusted library allocation
page read and write
1663000
trusted library allocation
page execute and read and write
1437000
heap
page read and write
3FCE000
trusted library allocation
page read and write
3B98000
trusted library allocation
page read and write
AE80000
trusted library allocation
page execute and read and write
630E000
stack
page read and write
2F46000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
1379000
stack
page read and write
108E000
stack
page read and write
336E000
stack
page read and write
596D000
stack
page read and write
587C000
stack
page read and write
113A000
stack
page read and write
EEE000
stack
page read and write
61D3000
heap
page read and write
341E000
stack
page read and write
509D000
trusted library allocation
page read and write
CAA000
stack
page read and write
513A000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
2A00000
heap
page read and write
13A6000
trusted library allocation
page execute and read and write
5B00000
trusted library allocation
page read and write
5050000
heap
page read and write
A13000
trusted library allocation
page read and write
2BA0000
heap
page read and write
36C8000
trusted library allocation
page read and write
1010000
heap
page read and write
4428000
trusted library allocation
page read and write
1596000
heap
page read and write
25D0000
trusted library allocation
page read and write
3200000
trusted library allocation
page execute and read and write
4F60000
trusted library allocation
page read and write
DA8000
stack
page read and write
11E2000
trusted library allocation
page read and write
3BA000
stack
page read and write
194B000
trusted library allocation
page execute and read and write
113C000
heap
page read and write
5790000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
5000000
trusted library allocation
page execute and read and write
826E000
stack
page read and write
3316000
trusted library allocation
page read and write
F2E000
stack
page read and write
10F0000
heap
page read and write
2A5F000
trusted library allocation
page read and write
5BA0000
heap
page read and write
2D4E000
stack
page read and write
E9BE000
stack
page read and write
507E000
stack
page read and write
16F0000
trusted library allocation
page read and write
822E000
stack
page read and write
1480000
heap
page read and write
10BA000
stack
page read and write
5F18000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
3F5F000
trusted library allocation
page read and write
E5E000
stack
page read and write
4B02000
trusted library allocation
page read and write
14A2000
heap
page read and write
2CBF000
stack
page read and write
16E0000
heap
page execute and read and write
6305000
heap
page read and write
6BA0000
trusted library allocation
page read and write
114E000
heap
page read and write
141E000
stack
page read and write
27F0000
heap
page read and write
5DBE000
stack
page read and write
59A8000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
334F000
unkown
page read and write
56EE000
stack
page read and write
D47000
heap
page read and write
10B8000
heap
page read and write
B39000
heap
page read and write
17A8000
heap
page read and write
4AD4000
trusted library allocation
page read and write
343F000
stack
page read and write
9ABC000
stack
page read and write
2D8A000
trusted library allocation
page read and write
18CF000
stack
page read and write
A3B000
trusted library allocation
page execute and read and write
41D6000
trusted library allocation
page read and write
5467000
heap
page read and write
12E7000
heap
page read and write
13B7000
trusted library allocation
page execute and read and write
CF7000
stack
page read and write
7F600000
trusted library allocation
page execute and read and write
74E000
heap
page read and write
E8A000
stack
page read and write
4F24000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
3350000
heap
page read and write
142A000
heap
page read and write
4FE3000
heap
page read and write
14F0000
heap
page read and write
5EBE000
stack
page read and write
57AA000
trusted library allocation
page read and write
478C000
stack
page read and write
58A0000
trusted library allocation
page read and write
31DA000
heap
page read and write
A38C000
stack
page read and write
EBE000
stack
page read and write
AF44000
trusted library allocation
page read and write
58F3000
heap
page read and write
6D40000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
4159000
trusted library allocation
page read and write
E73E000
stack
page read and write
2410000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
11C6000
heap
page read and write
4DA0000
heap
page read and write
4FB0000
trusted library allocation
page execute and read and write
102F000
stack
page read and write
6AC7000
trusted library allocation
page read and write
5453000
heap
page read and write
6ABD000
stack
page read and write
84AF000
stack
page read and write
591F000
stack
page read and write
50D0000
trusted library allocation
page read and write
AD37000
trusted library allocation
page read and write
4DF5000
trusted library section
page readonly
4DF0000
trusted library section
page readonly
68BE000
stack
page read and write
111F000
heap
page read and write
A32000
trusted library allocation
page read and write
18D4000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
D54000
heap
page read and write
137F000
stack
page read and write
808F000
heap
page read and write
29E0000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
27EF000
stack
page read and write
3421000
trusted library allocation
page read and write
43DE000
trusted library allocation
page read and write
2E8C000
stack
page read and write
18F2000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
E77E000
stack
page read and write
E8BE000
stack
page read and write
3EF1000
trusted library allocation
page read and write
2A4E000
stack
page read and write
5B40000
trusted library section
page readonly
2A97000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
A40000
heap
page read and write
2D9E000
stack
page read and write
5175000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
4399000
trusted library allocation
page read and write
853E000
stack
page read and write
ED7F000
stack
page read and write
3480000
heap
page read and write
CA0000
heap
page read and write
B100000
heap
page read and write
71E1000
trusted library section
page read and write
67DE000
heap
page read and write
6D9E000
stack
page read and write
6223000
heap
page read and write
23E0000
heap
page read and write
2A9A000
heap
page read and write
5EBF000
stack
page read and write
5B30000
trusted library allocation
page read and write
25AC000
stack
page read and write
894E000
stack
page read and write
58F0000
heap
page read and write
29E5000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
3F4E000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
1697000
trusted library allocation
page execute and read and write
54F0000
heap
page read and write
6AA000
stack
page read and write
59F0000
trusted library allocation
page read and write
5960000
trusted library allocation
page execute and read and write
3210000
trusted library allocation
page read and write
5B44000
trusted library section
page readonly
5E60000
trusted library allocation
page read and write
6E50000
trusted library allocation
page execute and read and write
4EE8000
trusted library allocation
page read and write
EC3C000
stack
page read and write
96B0000
trusted library allocation
page read and write
83AE000
stack
page read and write
1528000
heap
page read and write
D2E000
heap
page read and write
B2EE000
stack
page read and write
5370000
trusted library section
page readonly
76B0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page execute and read and write
A48C000
stack
page read and write
6F40000
heap
page read and write
366F000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
33C0000
trusted library allocation
page read and write
A37000
heap
page read and write
232D000
stack
page read and write
5CE0000
heap
page read and write
57F4000
trusted library allocation
page read and write
5ED6000
trusted library allocation
page read and write
25FE000
trusted library allocation
page read and write
6215000
heap
page read and write
2B8E000
stack
page read and write
4F3E000
trusted library allocation
page read and write
2F78000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
13AA000
trusted library allocation
page execute and read and write
3110000
trusted library allocation
page read and write
465E000
stack
page read and write
542000
unkown
page readonly
7190000
trusted library allocation
page read and write
A20E000
stack
page read and write
25E0000
heap
page execute and read and write
6560000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
7F660000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page execute and read and write
58A5000
trusted library allocation
page read and write
691D000
stack
page read and write
17C0000
heap
page read and write
1913000
trusted library allocation
page execute and read and write
10E4000
heap
page read and write
1200000
trusted library allocation
page read and write
47F2000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
2822000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
1190000
heap
page read and write
68C0000
trusted library allocation
page read and write
E5CF000
stack
page read and write
2C4C000
trusted library allocation
page read and write
11DA000
trusted library allocation
page execute and read and write
75C7000
heap
page read and write
5432000
trusted library allocation
page read and write
1950000
heap
page read and write
16F0000
heap
page read and write
59A0000
trusted library allocation
page read and write
5930000
heap
page read and write
D60000
heap
page read and write
5920000
heap
page read and write
5091000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
75B3000
heap
page read and write
18D3000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
794E000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
11EB000
trusted library allocation
page execute and read and write
57D0000
trusted library allocation
page read and write
53F0000
heap
page execute and read and write
4B25000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
89A6000
heap
page read and write
2CEB000
trusted library allocation
page execute and read and write
1640000
trusted library allocation
page read and write
18F0000
trusted library allocation
page read and write
4776000
trusted library allocation
page read and write
2A73000
trusted library allocation
page read and write
13BB000
trusted library allocation
page execute and read and write
C67000
heap
page read and write
2816000
trusted library allocation
page execute and read and write
4F90000
trusted library allocation
page read and write
14B0000
heap
page read and write
744000
heap
page read and write
2CB3000
trusted library allocation
page execute and read and write
56D0000
heap
page read and write
1700000
heap
page read and write
A6F7000
trusted library allocation
page read and write
11BD000
trusted library allocation
page execute and read and write
1383000
trusted library allocation
page execute and read and write
7530000
trusted library allocation
page read and write
A30000
heap
page read and write
4ADB000
trusted library allocation
page read and write
6410000
trusted library allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
6E9E000
stack
page read and write
57A2000
trusted library allocation
page read and write
959000
stack
page read and write
14C0000
heap
page read and write
312E000
stack
page read and write
5F10000
trusted library allocation
page read and write
38F8000
trusted library allocation
page read and write
89CE000
stack
page read and write
5593000
heap
page read and write
C60000
heap
page read and write
33FE000
stack
page read and write
11CD000
trusted library allocation
page execute and read and write
592E000
stack
page read and write
71D5000
trusted library allocation
page read and write
7FA50000
trusted library allocation
page execute and read and write
4AF1000
trusted library allocation
page read and write
4DEB000
stack
page read and write
57DE000
stack
page read and write
2CDA000
trusted library allocation
page execute and read and write
541A000
trusted library allocation
page read and write
9B0000
heap
page read and write
2CD2000
trusted library allocation
page read and write
6997000
heap
page read and write
4F2B000
trusted library allocation
page read and write
3EE3000
trusted library allocation
page read and write
5260000
heap
page read and write
6F5E000
heap
page read and write
1470000
heap
page read and write
B0F0000
heap
page read and write
12D4000
trusted library allocation
page read and write
551B000
stack
page read and write
6980000
heap
page read and write
1780000
heap
page read and write
6AC0000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
2DD0000
heap
page execute and read and write
5D7E000
stack
page read and write
557C000
stack
page read and write
4BB0000
heap
page read and write
A10000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
AEE000
heap
page read and write
11B8000
stack
page read and write
2820000
trusted library allocation
page read and write
5460000
heap
page read and write
950000
heap
page read and write
2DB0000
trusted library allocation
page read and write
3310000
heap
page read and write
8050000
heap
page read and write
4BDC000
stack
page read and write
1682000
trusted library allocation
page read and write
2623000
trusted library allocation
page read and write
6970000
trusted library allocation
page execute and read and write
11B4000
trusted library allocation
page read and write
10DA000
heap
page read and write
129C000
stack
page read and write
5B30000
heap
page read and write
5260000
heap
page execute and read and write
2A90000
heap
page read and write
2770000
heap
page read and write
7B30000
trusted library allocation
page read and write
5380000
heap
page read and write
650E000
stack
page read and write
53CE000
trusted library allocation
page read and write
3EF9000
trusted library allocation
page read and write
1197000
heap
page read and write
69B0000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
There are 1103 hidden memdumps, click here to show them.