IOC Report
graphic.vbs

loading gif

Files

File Path
Type
Category
Malicious
graphic.vbs
ASCII text, with very long lines
initial sample
malicious
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LogicoolTouchPad_947d9cf2526790edff1959af95e3e22df417fa27_e28e5cbf_19bbec0b\Report.wer
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LogicoolTouchPad_947d9cf2526790edff1959af95e3e22df417fa27_e28e5cbf_19d14f63\Report.wer
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3246.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jun 23 21:16:44 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4BBB.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB58A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jun 23 21:15:06 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC598.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\graphic.vbs"
malicious
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
malicious
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6400 -s 800
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6588 -s 772

URLs

Name
IP
Malicious
https://idontgetitpodcast.com/
unknown
malicious
https://idontgetitpodcast.com/contacting/responsible.dae
104.244.73.88
malicious
http://www.borland.com/namespaces/Types-
unknown
http://www.borland.com/namespaces/Types
unknown
http://www.borland.com/namespaces/Typesh
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
https://idontgetitpodcast.com/contacting/responsible.daem
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.borland.com/namespaces/TypesR
unknown

Domains

Name
IP
Malicious
idontgetitpodcast.com
104.244.73.88
malicious

IPs

IP
Domain
Country
Malicious
104.244.73.88
idontgetitpodcast.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
ProgramId
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
FileId
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
LowerCaseLongPath
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
LongPathHash
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
Name
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
Publisher
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
Version
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
BinFileVersion
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
BinaryType
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
ProductName
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
ProductVersion
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
LinkDate
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
BinProductVersion
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
Size
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
Language
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
IsPeFile
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2420000
direct allocation
page execute and read and write
malicious
24F0000
direct allocation
page execute and read and write
malicious
2420000
direct allocation
page execute and read and write
malicious
2420000
direct allocation
page execute and read and write
malicious
24F0000
direct allocation
page execute and read and write
malicious
24F0000
direct allocation
page execute and read and write
malicious
23F5E25A000
heap
page read and write
1D4A6150000
heap
page read and write
1CB1BE02000
heap
page read and write
98000
stack
page read and write
1D4A8BF9000
heap
page read and write
1D4A833B000
heap
page read and write
1D4A9030000
heap
page read and write
A0AF37E000
stack
page read and write
C9FC1FE000
stack
page read and write
1D4A617E000
heap
page read and write
2465CE74000
heap
page read and write
2465CF02000
heap
page read and write
1D4A9230000
heap
page read and write
C9FBEFF000
stack
page read and write
1D4A83AF000
heap
page read and write
876A27B000
stack
page read and write
2A80085A000
heap
page read and write
1B6D1E70000
trusted library allocation
page read and write
C9FC4FC000
stack
page read and write
2C6F000
stack
page read and write
25AE000
stack
page read and write
2566A249000
heap
page read and write
1D4A6137000
heap
page read and write
1CB1AE4D000
heap
page read and write
2566A010000
heap
page read and write
25112FB000
stack
page read and write
1E5AD102000
heap
page read and write
98000
stack
page read and write
19CD4A62000
heap
page read and write
1CB1ACD0000
heap
page read and write
896677E000
stack
page read and write
1B6CC813000
heap
page read and write
1B6D1FB0000
remote allocation
page read and write
1B6CD000000
heap
page read and write
1CFE6285000
heap
page read and write
1B6CC926000
heap
page read and write
19CD4A5B000
heap
page read and write
1D4A6170000
heap
page read and write
1D4A7EFA000
heap
page read and write
1D4A82CA000
heap
page read and write
1D4A83BF000
heap
page read and write
1B6CC8AD000
heap
page read and write
41F667F000
stack
page read and write
AFF000
stack
page read and write
2A80085F000
heap
page read and write
C9FC5FF000
stack
page read and write
1CB1B988000
heap
page read and write
1B6CC88E000
heap
page read and write
1D4A8180000
heap
page read and write
41F6A7C000
stack
page read and write
22A0000
direct allocation
page read and write
1CB1BE00000
heap
page read and write
1CB1B98C000
heap
page read and write
19F000
stack
page read and write
23F5E278000
heap
page read and write
1D4A838F000
heap
page read and write
28A48800000
heap
page read and write
1B6D2065000
heap
page read and write
256E000
stack
page read and write
800000
heap
page read and write
1D4A7F03000
heap
page read and write
780000
heap
page read and write
23F5E260000
heap
page read and write
1D4A839B000
heap
page read and write
1D4A6075000
heap
page read and write
2566A26F000
heap
page read and write
2A2F000
stack
page read and write
19CD4A66000
heap
page read and write
400000
unkown
page execute and read and write
1D4A90F6000
heap
page read and write
C067CAB000
stack
page read and write
1D4A7E01000
heap
page read and write
1D4A90B8000
heap
page read and write
794AB7B000
stack
page read and write
1CB1AD70000
trusted library allocation
page read and write
1CB1B98D000
heap
page read and write
1D4A836C000
heap
page read and write
1CC38490000
trusted library allocation
page read and write
1D73C825000
heap
page read and write
1D4A8DF0000
heap
page read and write
7B8000
heap
page read and write
2465CF00000
heap
page read and write
4D2000
unkown
page read and write
1D4A836C000
heap
page read and write
794B079000
stack
page read and write
1D4A8336000
heap
page read and write
1D4A839D000
heap
page read and write
A0AF2FE000
stack
page read and write
1CB1B992000
heap
page read and write
E4E07FE000
stack
page read and write
1CB1B97E000
heap
page read and write
1CB1B98E000
heap
page read and write
1D4A837B000
heap
page read and write
2465CE24000
heap
page read and write
1E5AD04C000
heap
page read and write
1CB1B98D000
heap
page read and write
1D4A837C000
heap
page read and write
23F5E200000
heap
page read and write
2397B86E000
heap
page read and write
2520000
heap
page read and write
837000
heap
page read and write
80A000
heap
page read and write
64E000
stack
page read and write
2465CE02000
heap
page read and write
17812FB000
stack
page read and write
1D4A8BF6000
heap
page read and write
1B6D20D8000
heap
page read and write
23F5E26E000
heap
page read and write
1CB1BE02000
heap
page read and write
2A800827000
heap
page read and write
1B6CC914000
heap
page read and write
1B6D1E80000
trusted library allocation
page read and write
2510BFA000
stack
page read and write
1D4A836E000
heap
page read and write
A1000
stack
page read and write
1CB1AF08000
heap
page read and write
2B2F000
stack
page read and write
23F5E232000
heap
page read and write
1B6CDCC0000
trusted library allocation
page read and write
1CB1AE3C000
heap
page read and write
2470000
direct allocation
page execute and read and write
1B6CCFF0000
trusted library allocation
page read and write
9FF000
stack
page read and write
1D4A807F000
heap
page read and write
1B6D202E000
heap
page read and write
23A0000
direct allocation
page execute and read and write
1B6D1E71000
trusted library allocation
page read and write
1CB1B9A1000
heap
page read and write
1CB1BE03000
heap
page read and write
2566A289000
heap
page read and write
1B6D1E50000
trusted library allocation
page read and write
1CB1B9A4000
heap
page read and write
1E5AD040000
heap
page read and write
8966677000
stack
page read and write
25109F8000
stack
page read and write
1CB1B986000
heap
page read and write
1D73C902000
heap
page read and write
40C000
unkown
page execute read
A0AF8FF000
stack
page read and write
1D4A82F1000
heap
page read and write
98000
stack
page read and write
1CFE6313000
heap
page read and write
1D4A6177000
heap
page read and write
7BE000
stack
page read and write
4D2000
unkown
page read and write
1B6D1F20000
trusted library allocation
page read and write
41F6C7C000
stack
page read and write
89664FB000
stack
page read and write
1CB1BE03000
heap
page read and write
23F5E256000
heap
page read and write
1B6D2087000
heap
page read and write
1D4A7EFE000
heap
page read and write
AFF000
stack
page read and write
794B0FF000
unkown
page read and write
1F0000
trusted library allocation
page read and write
E4E057C000
stack
page read and write
1B6D2020000
heap
page read and write
1D73C858000
heap
page read and write
1CB1B97E000
heap
page read and write
1D73C7D0000
trusted library allocation
page read and write
40C000
unkown
page execute read
1B6CD840000
trusted library allocation
page read and write
23F5E23A000
heap
page read and write
1CB1AEC1000
heap
page read and write
19CD4980000
heap
page read and write
1D4A90F9000
heap
page read and write
1B6D1CC0000
trusted library allocation
page read and write
1D4A83A3000
heap
page read and write
A0AF677000
stack
page read and write
1D4A8342000
heap
page read and write
2397B730000
heap
page read and write
1D4A613C000
heap
page read and write
A1000
stack
page read and write
2C50000
remote allocation
page read and write
1D4A8181000
heap
page read and write
876AA7F000
stack
page read and write
794A79E000
stack
page read and write
1D4A613C000
heap
page read and write
D9887FB000
stack
page read and write
7C5000
heap
page read and write
1D4A7EEB000
heap
page read and write
1CB1B99E000
heap
page read and write
1B6D1F40000
trusted library allocation
page read and write
89663FB000
stack
page read and write
AFF000
stack
page read and write
1B6D203F000
heap
page read and write
788000
heap
page read and write
1F0000
trusted library allocation
page read and write
1CB1B992000
heap
page read and write
1D4A83CA000
heap
page read and write
1D4A839C000
heap
page read and write
23F5E26C000
heap
page read and write
C06847E000
stack
page read and write
1D4A82C6000
heap
page read and write
1B6CD015000
heap
page read and write
1E5AEC02000
trusted library allocation
page read and write
1CC383D9000
heap
page read and write
98000
stack
page read and write
19CD4A20000
heap
page read and write
2465CE51000
heap
page read and write
1CB1BE02000
heap
page read and write
2C40000
unkown
page read and write
23D0000
heap
page read and write
C06827E000
stack
page read and write
1D4A817A000
heap
page read and write
1CB1B9C8000
heap
page read and write
1CC38515000
heap
page read and write
1D4A8355000
heap
page read and write
876AE7F000
stack
page read and write
1CB1B988000
heap
page read and write
25B3000
trusted library allocation
page read and write
23F5E258000
heap
page read and write
7C5000
heap
page read and write
4DC000
unkown
page readonly
1B6D1F60000
trusted library allocation
page read and write
1D4A6250000
heap
page read and write
23F5E213000
heap
page read and write
19CD4A65000
heap
page read and write
1B6D1F20000
trusted library allocation
page read and write
1CFE627B000
heap
page read and write
1D4A6175000
heap
page read and write
2A800800000
heap
page read and write
23F5E276000
heap
page read and write
AFF000
stack
page read and write
23E0000
direct allocation
page execute and read and write
600000
heap
page read and write
EF87F7B000
stack
page read and write
1CB1B9A0000
heap
page read and write
1CB1B97F000
heap
page read and write
23F5E27B000
heap
page read and write
24C0000
heap
page read and write
23F5E267000
heap
page read and write
1CC383BF000
heap
page read and write
1E5AD074000
heap
page read and write
876AC7F000
stack
page read and write
1D4A817B000
heap
page read and write
1CC383BF000
heap
page read and write
1D4A8000000
heap
page read and write
1CB1B984000
heap
page read and write
1E5AEB00000
trusted library allocation
page read and write
80A000
heap
page read and write
1CB1B97C000
heap
page read and write
4DC000
unkown
page readonly
1CC38480000
trusted library allocation
page read and write
1CB1B97F000
heap
page read and write
1CB1B9B9000
heap
page read and write
876A87D000
stack
page read and write
7F0000
trusted library allocation
page read and write
1E5AEB80000
remote allocation
page read and write
23F5E265000
heap
page read and write
837000
heap
page read and write
1CB1BE20000
heap
page read and write
2465CE80000
heap
page read and write
2566A070000
heap
page read and write
1D4A83BF000
heap
page read and write
28A48902000
heap
page read and write
1CB1B978000
heap
page read and write
2370000
direct allocation
page read and write
19CD4A51000
heap
page read and write
896697E000
stack
page read and write
19CD4A5B000
heap
page read and write
1CB1B97F000
heap
page read and write
1CFE6229000
heap
page read and write
1B6CC640000
heap
page read and write
17813FF000
stack
page read and write
1CB1B986000
heap
page read and write
1CB1B966000
heap
page read and write
7B8000
heap
page read and write
1CB1AEED000
heap
page read and write
1CB1AE4E000
heap
page read and write
1B6CC8FE000
heap
page read and write
23F5EA02000
trusted library allocation
page read and write
19F000
stack
page read and write
1CC392C0000
trusted library allocation
page read and write
41F609C000
stack
page read and write
1D4A606D000
heap
page read and write
1D4A7F04000
heap
page read and write
2A800864000
heap
page read and write
2AFF000
stack
page read and write
1CB1B974000
heap
page read and write
23F5E25F000
heap
page read and write
AE1CFF000
stack
page read and write
1CB1B990000
heap
page read and write
1B6D20F0000
heap
page read and write
1D4A6136000
heap
page read and write
89662FD000
stack
page read and write
876AB7E000
stack
page read and write
1CB1AF02000
heap
page read and write
8BE000
stack
page read and write
C9FBFFE000
stack
page read and write
25B3000
heap
page read and write
1D4A8181000
heap
page read and write
1CB1B9BA000
heap
page read and write
23F5E241000
heap
page read and write
2C50000
remote allocation
page read and write
1CB1B989000
heap
page read and write
1B6CC875000
heap
page read and write
7AC000
heap
page read and write
1CC39010000
trusted library allocation
page read and write
2A8006A0000
heap
page read and write
23F5E0E0000
heap
page read and write
8B3DAFF000
stack
page read and write
24D0000
direct allocation
page execute and read and write
28A48829000
heap
page read and write
2397C202000
heap
page read and write
1CB1B9B4000
heap
page read and write
23F5E263000
heap
page read and write
2A2F000
stack
page read and write
1CB1B98C000
heap
page read and write
4D2000
unkown
page read and write
28A48802000
heap
page read and write
8B3D8FC000
stack
page read and write
30000
unkown
page read and write
1CB1B991000
heap
page read and write
1CC39270000
trusted library allocation
page read and write
1D4A6078000
heap
page read and write
23F5E22C000
heap
page read and write
23F5E268000
heap
page read and write
1B6D1E80000
trusted library allocation
page read and write
2A800900000
heap
page read and write
1CB1ADE0000
remote allocation
page read and write
2397B902000
heap
page read and write
E4E05FC000
stack
page read and write
23F5E264000
heap
page read and write
1CB1B9A5000
heap
page read and write
1D4A8531000
heap
page read and write
600000
heap
page read and write
876A57F000
stack
page read and write
4DC000
unkown
page readonly
2463000
trusted library allocation
page read and write
2370000
direct allocation
page read and write
1F0000
trusted library allocation
page read and write
1CB1AE00000
heap
page read and write
77E000
stack
page read and write
630000
heap
page read and write
1B6D20FC000
heap
page read and write
1D73C660000
heap
page read and write
28A48760000
remote allocation
page read and write
1CB1B981000
heap
page read and write
1D4A83F9000
heap
page read and write
1CB1B981000
heap
page read and write
2465CE00000
heap
page read and write
29FF000
stack
page read and write
1D4A8349000
heap
page read and write
61E000
stack
page read and write
1D4A8EF0000
heap
page read and write
23D0000
heap
page read and write
1D4A6177000
heap
page read and write
1D4A7E00000
heap
page read and write
C067D2E000
stack
page read and write
1CFE6A02000
trusted library allocation
page read and write
19F000
stack
page read and write
1E5AD000000
heap
page read and write
1CFE6308000
heap
page read and write
1D4A839D000
heap
page read and write
1CB1B978000
heap
page read and write
1CC39250000
heap
page readonly
23F5E27E000
heap
page read and write
1D4A8001000
heap
page read and write
E4E097D000
stack
page read and write
1B6D2000000
heap
page read and write
1CB1AD40000
heap
page read and write
1B6CD118000
heap
page read and write
8B3DBFF000
stack
page read and write
1D4A7EEA000
heap
page read and write
2397B800000
heap
page read and write
77E000
stack
page read and write
23F5E240000
heap
page read and write
1CB1B979000
heap
page read and write
1CB1B988000
heap
page read and write
1CB1B978000
heap
page read and write
2397B8E8000
heap
page read and write
876A67D000
stack
page read and write
2397B885000
heap
page read and write
AE19DA000
stack
page read and write
2C6F000
stack
page read and write
1CB1B989000
heap
page read and write
1B6D2058000
heap
page read and write
1E5AD013000
heap
page read and write
1D4A6079000
heap
page read and write
28A48813000
heap
page read and write
1B6CC650000
heap
page read and write
2566A308000
heap
page read and write
1CC382F0000
heap
page read and write
1E5AD05C000
heap
page read and write
1B6D1F80000
trusted library allocation
page read and write
19CD4A46000
heap
page read and write
1B6CC893000
heap
page read and write
2566A213000
heap
page read and write
19CD4A5B000
heap
page read and write
1D4A8EF7000
heap
page read and write
1CB1B9B8000
heap
page read and write
2A801002000
trusted library allocation
page read and write
1CB1AE49000
heap
page read and write
23F5E255000
heap
page read and write
EF87E7E000
stack
page read and write
1D4A6137000
heap
page read and write
2500000
remote allocation
page read and write
19CD4A51000
heap
page read and write
1CB1B98F000
heap
page read and write
1D4A8BFE000
heap
page read and write
28A48730000
trusted library allocation
page read and write
1CB1AEA9000
heap
page read and write
1CB1B98E000
heap
page read and write
1CB1AE52000
heap
page read and write
1D73C854000
heap
page read and write
2465CCD0000
heap
page read and write
1CB1B9A6000
heap
page read and write
1CFE6300000
heap
page read and write
1CB1B981000
heap
page read and write
1D4A613C000
heap
page read and write
2A800902000
heap
page read and write
19CD49F0000
heap
page read and write
1B6D1FB0000
remote allocation
page read and write
1CB1AE29000
heap
page read and write
1CC39260000
trusted library allocation
page read and write
1D4A82C7000
heap
page read and write
AFF000
stack
page read and write
8B3DC7C000
stack
page read and write
2397B83E000
heap
page read and write
1D4A7ED2000
heap
page read and write
1E5AEA70000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
1CB1BE02000
heap
page read and write
1CFE624B000
heap
page read and write
780000
heap
page read and write
1CB1B9B8000
heap
page read and write
1B6CD002000
heap
page read and write
A0AF6FF000
stack
page read and write
1D4A839D000
heap
page read and write
19F000
stack
page read and write
E4E009B000
stack
page read and write
1D4A9072000
heap
page read and write
2566A300000
heap
page read and write
1D4A834D000
heap
page read and write
1CB1BE02000
heap
page read and write
1D4A7EEB000
heap
page read and write
4DC000
unkown
page readonly
1CC383E3000
heap
page read and write
2B2F000
stack
page read and write
1CC38520000
trusted library allocation
page read and write
1E5AD02A000
heap
page read and write
2400000
direct allocation
page execute and read and write
24A0000
direct allocation
page execute and read and write
1CB1B920000
heap
page read and write
24F0000
unkown
page read and write
1D4A8201000
heap
page read and write
2397B888000
heap
page read and write
2A80083C000
heap
page read and write
1B6CC902000
heap
page read and write
1B6CC83D000
heap
page read and write
1E5ACFD0000
heap
page read and write
7BE000
stack
page read and write
1D4A8323000
heap
page read and write
23E0000
direct allocation
page execute and read and write
876A47B000
stack
page read and write
2465CE3C000
heap
page read and write
1CB1B98D000
heap
page read and write
1E5AEB80000
remote allocation
page read and write
2C40000
unkown
page read and write
1E5AD113000
heap
page read and write
1E5AD049000
heap
page read and write
25B0000
trusted library allocation
page read and write
1CB1AE54000
heap
page read and write
1CC383BF000
heap
page read and write
2463000
trusted library allocation
page read and write
1D4A6200000
remote allocation
page read and write
8B3DD7D000
stack
page read and write
1CB1AEE1000
heap
page read and write
1D4A8EF4000
heap
page read and write
2470000
direct allocation
page execute and read and write
1CB1B986000
heap
page read and write
2C3F000
stack
page read and write
A0AF57B000
stack
page read and write
1B6CD104000
heap
page read and write
1D4A8FEE000
heap
page read and write
1D4A83BF000
heap
page read and write
1CB1B990000
heap
page read and write
1D4A8C1C000
heap
page read and write
1CFE6200000
heap
page read and write
1D4A817A000
heap
page read and write
1780EDB000
stack
page read and write
C9FC2FF000
stack
page read and write
630000
heap
page read and write
1D4A8C00000
heap
page read and write
1B6CC907000
heap
page read and write
1CB1AE27000
heap
page read and write
1D4A7EFD000
heap
page read and write
1D4A8BFD000
heap
page read and write
1CB1BE02000
heap
page read and write
2C3F000
stack
page read and write
1CB1B9B0000
heap
page read and write
1D4A90FA000
heap
page read and write
1CB1B802000
heap
page read and write
2397B913000
heap
page read and write
19CD4A64000
heap
page read and write
1CB1B9A7000
heap
page read and write
2A2F000
stack
page read and write
9FE000
stack
page read and write
1CB1AE56000
heap
page read and write
2465CCC0000
heap
page read and write
2AFF000
stack
page read and write
2360000
heap
page read and write
1D73C841000
heap
page read and write
24A0000
direct allocation
page execute and read and write
1D4A6058000
heap
page read and write
1CB1AE4F000
heap
page read and write
1CB1B97D000
heap
page read and write
1D73C802000
heap
page read and write
9FE000
stack
page read and write
1CB1B997000
heap
page read and write
2566A313000
heap
page read and write
1D73C670000
heap
page read and write
25B3000
trusted library allocation
page read and write
1D4A9072000
heap
page read and write
1CB1B986000
heap
page read and write
1D4A8EFB000
heap
page read and write
2A800878000
heap
page read and write
1CC39240000
trusted library allocation
page read and write
1D4A6172000
heap
page read and write
1CB1B995000
heap
page read and write
401000
unkown
page execute read
794AD77000
stack
page read and write
23F5E25C000
heap
page read and write
1CB1BE02000
heap
page read and write
1E5ACF60000
heap
page read and write
876AD7F000
stack
page read and write
1E5AD068000
heap
page read and write
1B6CD100000
heap
page read and write
1D73D002000
trusted library allocation
page read and write
1E5AD024000
heap
page read and write
1CC383DE000
heap
page read and write
23A0000
direct allocation
page execute and read and write
73F000
stack
page read and write
1CB1B986000
heap
page read and write
24D0000
direct allocation
page execute and read and write
1D4A8389000
heap
page read and write
29FF000
stack
page read and write
8BE000
stack
page read and write
1CB1B9B0000
heap
page read and write
2460000
trusted library allocation
page read and write
24D0000
direct allocation
page execute and read and write
1D4A83A3000
heap
page read and write
C06837E000
stack
page read and write
D9886FE000
stack
page read and write
23F5E249000
heap
page read and write
1D4A8C01000
heap
page read and write
C9FC3FC000
stack
page read and write
19CD4A36000
heap
page read and write
1D4A6082000
heap
page read and write
2397C33A000
heap
page read and write
400000
unkown
page execute and read and write
1CFE624D000
heap
page read and write
2A800908000
heap
page read and write
1CB1B992000
heap
page read and write
1CB1AEC8000
heap
page read and write
24C0000
heap
page read and write
1CB1B989000
heap
page read and write
1CB1B992000
heap
page read and write
8B3D4DC000
stack
page read and write
19CD4A31000
heap
page read and write
1CC383B7000
heap
page read and write
1B6D1F70000
trusted library allocation
page read and write
1E5AD05C000
heap
page read and write
2510AF9000
stack
page read and write
1CB1B9AE000
heap
page read and write
19CD4A36000
heap
page read and write
2510CFE000
stack
page read and write
896657E000
stack
page read and write
9FF000
stack
page read and write
841000
heap
page read and write
1CB1B9B7000
heap
page read and write
8965F9B000
stack
page read and write
1E5AD059000
heap
page read and write
1CFE61D0000
trusted library allocation
page read and write
4D2000
unkown
page read and write
1CB1B9A9000
heap
page read and write
1D4A82CA000
heap
page read and write
1E5AEA90000
trusted library allocation
page read and write
1D4A83FB000
heap
page read and write
1CB1AEFB000
heap
page read and write
1D4A8186000
heap
page read and write
1D4A613C000
heap
page read and write
24EE000
stack
page read and write
7B8000
heap
page read and write
AE1E7E000
stack
page read and write
1D4A83CE000
heap
page read and write
23F5E259000
heap
page read and write
1B6CC89E000
heap
page read and write
1CB1B98D000
heap
page read and write
30000
unkown
page read and write
41F677F000
stack
page read and write
C9FBBC9000
stack
page read and write
24F0000
unkown
page read and write
1D4A5F70000
heap
page read and write
600000
heap
page read and write
1D4A837B000
heap
page read and write
7CB000
heap
page read and write
24EE000
stack
page read and write
2A800851000
heap
page read and write
1CB1B992000
heap
page read and write
837000
heap
page read and write
1B6D1D40000
trusted library allocation
page read and write
1CB1B98D000
heap
page read and write
24AE000
stack
page read and write
1B6CC877000
heap
page read and write
24EE000
stack
page read and write
A1000
stack
page read and write
1CB1B9B7000
heap
page read and write
2C3F000
stack
page read and write
28A485D0000
heap
page read and write
2520000
heap
page read and write
2B3E000
stack
page read and write
1D73C6D0000
heap
page read and write
1D4A8377000
heap
page read and write
1CFE623C000
heap
page read and write
1D4A837B000
heap
page read and write
7F0000
trusted library allocation
page read and write
1D4A8C0C000
heap
page read and write
23F5E252000
heap
page read and write
1D4A6050000
heap
page read and write
2A800878000
heap
page read and write
2B3E000
stack
page read and write
1B6D1F90000
trusted library allocation
page read and write
1CB1B99D000
heap
page read and write
2400000
direct allocation
page execute and read and write
1CFE6070000
heap
page read and write
23F5E1E0000
trusted library allocation
page read and write
794AF7F000
stack
page read and write
1B6CC8A9000
heap
page read and write
400000
unkown
page execute and read and write
1CB1AF16000
heap
page read and write
2397B790000
heap
page read and write
AE1DFE000
stack
page read and write
770000
trusted library allocation
page read and write
1D4A6068000
heap
page read and write
A1000
stack
page read and write
1D4A8BF0000
heap
page read and write
1CB1B992000
heap
page read and write
1CB1B9A4000
heap
page read and write
C06817E000
stack
page read and write
1D4A7EDA000
heap
page read and write
1B6D20C6000
heap
page read and write
7AC000
heap
page read and write
770000
trusted library allocation
page read and write
1D4A7EE1000
heap
page read and write
1CB1AF13000
heap
page read and write
1B6D20AF000
heap
page read and write
1D4A90F6000
heap
page read and write
19CD4A51000
heap
page read and write
40C000
unkown
page execute read
1CB1B94D000
heap
page read and write
1B6CC902000
heap
page read and write
400000
unkown
page execute and read and write
1D4A8339000
heap
page read and write
1D4A9072000
heap
page read and write
1CB1B990000
heap
page read and write
1B6CC829000
heap
page read and write
2465CE79000
heap
page read and write
4DC000
unkown
page readonly
8B3DDFB000
stack
page read and write
24AE000
stack
page read and write
8B3E1FE000
stack
page read and write
EF87FFE000
stack
page read and write
1D4A617A000
heap
page read and write
1D73C813000
heap
page read and write
1D4A82DB000
heap
page read and write
25AE000
stack
page read and write
1CB1B963000
heap
page read and write
1CB1B953000
heap
page read and write
1D4A834B000
heap
page read and write
1F0000
trusted library allocation
page read and write
1D4A8385000
heap
page read and write
1B6CCFE3000
trusted library allocation
page read and write
AE1C7F000
stack
page read and write
1B6D20FC000
heap
page read and write
1E5AEB80000
remote allocation
page read and write
1B6D1D30000
trusted library allocation
page read and write
1E5AEAC0000
trusted library allocation
page read and write
794AA7E000
stack
page read and write
1D4A8C00000
heap
page read and write
1CB1AEB3000
heap
page read and write
800000
heap
page read and write
1CB1B98D000
heap
page read and write
1CB1BE19000
heap
page read and write
2400000
direct allocation
page execute and read and write
1CB1B99F000
heap
page read and write
1D4A8345000
heap
page read and write
1B6D1E90000
trusted library allocation
page read and write
1D4A608E000
heap
page read and write
1D4A6077000
heap
page read and write
1E5ACF70000
heap
page read and write
1B6D1F20000
trusted library allocation
page read and write
74F000
stack
page read and write
1B6D20DF000
heap
page read and write
19F000
stack
page read and write
1B6CC6B0000
heap
page read and write
2397B813000
heap
page read and write
1D4A90F6000
heap
page read and write
1B6D22A0000
trusted library allocation
page read and write
1CB1B900000
heap
page read and write
1D73C83E000
heap
page read and write
780000
heap
page read and write
2B6E000
stack
page read and write
1D4A83CB000
heap
page read and write
1D4A8384000
heap
page read and write
1CFE6253000
heap
page read and write
1CB1B9B9000
heap
page read and write
4D7000
unkown
page write copy
794A71B000
stack
page read and write
1CB1BE02000
heap
page read and write
9FE000
stack
page read and write
28A49002000
trusted library allocation
page read and write
1CB1B98D000
heap
page read and write
1CB1B98C000
heap
page read and write
1D4A83C7000
heap
page read and write
1D4A82F0000
heap
page read and write
2566A229000
heap
page read and write
30000
heap
page read and write
19CD4A42000
heap
page read and write
40C000
unkown
page execute read
1CB1B978000
heap
page read and write
23F5E261000
heap
page read and write
1CFE6227000
heap
page read and write
1D4A8342000
heap
page read and write
40C000
unkown
page execute read
1CB1B978000
heap
page read and write
2465CE71000
heap
page read and write
23E0000
direct allocation
page execute and read and write
1B6D20C8000
heap
page read and write
1CB1AEA9000
heap
page read and write
1D4A817E000
heap
page read and write
2A800FB0000
trusted library allocation
page read and write
2A80085D000
heap
page read and write
61E000
stack
page read and write
2566A24A000
heap
page read and write
1D4A82DB000
heap
page read and write
1D4A6145000
heap
page read and write
EF87B3B000
stack
page read and write
2397B8E2000
heap
page read and write
1D4A8DF1000
heap
page read and write
1CFE6270000
heap
page read and write
4DC000
unkown
page readonly
1CB1B9A8000
heap
page read and write
1E5AD04C000
heap
page read and write
1CB1AE71000
heap
page read and write
1D4A83A3000
heap
page read and write
256E000
stack
page read and write
29FF000
stack
page read and write
1D4A6135000
heap
page read and write
4D7000
unkown
page write copy
80A000
heap
page read and write
1D4A9231000
heap
page read and write
1D73C913000
heap
page read and write
98000
stack
page read and write
1B6CC870000
heap
page read and write
2566A24B000
heap
page read and write
41F697E000
stack
page read and write
1CB1B97F000
heap
page read and write
8B3DFFF000
stack
page read and write
2C6F000
stack
page read and write
2566A200000
heap
page read and write
1D4A7F05000
heap
page read and write
EF880FB000
stack
page read and write
1B6D2015000
heap
page read and write
1CC38310000
heap
page read and write
1CFE6213000
heap
page read and write
770000
trusted library allocation
page read and write
23F5E080000
heap
page read and write
23F5E262000
heap
page read and write
1B6CC8AD000
heap
page read and write
23F5E27C000
heap
page read and write
1D4A8200000
heap
page read and write
1D4A8530000
heap
page read and write
41F687F000
stack
page read and write
22A0000
direct allocation
page read and write
1D4A833E000
heap
page read and write
1CC381B0000
heap
page read and write
1D4A83A3000
heap
page read and write
1D4A614D000
heap
page read and write
AE1EF8000
stack
page read and write
1D4A8BFC000
heap
page read and write
1CC38510000
heap
page read and write
1B6D1E94000
trusted library allocation
page read and write
2A800913000
heap
page read and write
1B6CD113000
heap
page read and write
1CB1B916000
heap
page read and write
1CB1B997000
heap
page read and write
1D4A61E0000
heap
page read and write
1B6D1FB0000
remote allocation
page read and write
1D4A613E000
heap
page read and write
1D4A8378000
heap
page read and write
1CB1AE13000
heap
page read and write
1CFE6060000
heap
page read and write
1B6CC87A000
heap
page read and write
2566A302000
heap
page read and write
1CB1B979000
heap
page read and write
2465CD30000
heap
page read and write
1D73C82A000
heap
page read and write
61E000
stack
page read and write
28A4885C000
heap
page read and write
2397B8C5000
heap
page read and write
28A48630000
heap
page read and write
D9888FE000
stack
page read and write
24A0000
direct allocation
page execute and read and write
1B6CC8FE000
heap
page read and write
1D4A613C000
heap
page read and write
9BF000
stack
page read and write
1CB1B997000
heap
page read and write
2566AA02000
trusted library allocation
page read and write
28A48760000
remote allocation
page read and write
1CB1B9A3000
heap
page read and write
1781379000
stack
page read and write
2B2F000
stack
page read and write
1B6CC859000
heap
page read and write
1B6D20FA000
heap
page read and write
1B6D1FA0000
trusted library allocation
page read and write
1D4A83BF000
heap
page read and write
1CB1B9B9000
heap
page read and write
1CB1B99A000
heap
page read and write
1CB1B982000
heap
page read and write
7BE000
stack
page read and write
1D4A839D000
heap
page read and write
1E5AD002000
heap
page read and write
1D4A83C2000
heap
page read and write
794AC77000
stack
page read and write
2B3E000
stack
page read and write
1B6D22C0000
trusted library allocation
page read and write
788000
heap
page read and write
1CB1B989000
heap
page read and write
7C5000
heap
page read and write
1CB1B98A000
heap
page read and write
256E000
stack
page read and write
1CB1AE51000
heap
page read and write
7F0000
trusted library allocation
page read and write
1E5AD08D000
heap
page read and write
1CB1AE57000
heap
page read and write
1D4A7EF3000
heap
page read and write
1D73C879000
heap
page read and write
23D0000
heap
page read and write
EF882FE000
stack
page read and write
1CB1ADE0000
remote allocation
page read and write
2397B829000
heap
page read and write
1CFE6302000
heap
page read and write
24C0000
heap
page read and write
A0AF47C000
stack
page read and write
2465D802000
trusted library allocation
page read and write
30000
heap
page read and write
400000
unkown
page execute and read and write
1CB1ADE0000
remote allocation
page read and write
2566A170000
trusted library allocation
page read and write
1D4A83CD000
heap
page read and write
A1000
stack
page read and write
841000
heap
page read and write
1CC38370000
heap
page read and write
1D4A5E30000
heap
page read and write
1D4A8EEE000
heap
page read and write
2397B7C0000
trusted library allocation
page read and write
1D73C85B000
heap
page read and write
1B6D1E5E000
trusted library allocation
page read and write
7AC000
heap
page read and write
896687C000
stack
page read and write
23F5E285000
heap
page read and write
1B6D204C000
heap
page read and write
4D2000
unkown
page write copy
1D4A6255000
heap
page read and write
23F5E257000
heap
page read and write
1CB1B98C000
heap
page read and write
2500000
remote allocation
page read and write
1D4A817C000
heap
page read and write
1D4A6136000
heap
page read and write
1CB1B974000
heap
page read and write
1CB1B98D000
heap
page read and write
23F5E070000
heap
page read and write
1D4A6200000
remote allocation
page read and write
2520000
heap
page read and write
1B6CC800000
heap
page read and write
1CB1B97D000
heap
page read and write
1D4A85D7000
heap
page read and write
40C000
unkown
page execute read
1CB1B996000
heap
page read and write
1D4A83BF000
heap
page read and write
28A48760000
remote allocation
page read and write
2397C312000
heap
page read and write
4DC000
unkown
page readonly
23F5E242000
heap
page read and write
1CC383E3000
heap
page read and write
8BE000
stack
page read and write
28A48840000
heap
page read and write
1CB1B98D000
heap
page read and write
4D2000
unkown
page read and write
25B0000
heap
page read and write
23F5E302000
heap
page read and write
2566A000000
heap
page read and write
2510DFC000
stack
page read and write
1CC38519000
heap
page read and write
2465CF13000
heap
page read and write
794000
heap
page read and write
1D4A834B000
heap
page read and write
1CB1B991000
heap
page read and write
C067DAE000
stack
page read and write
AE1D79000
stack
page read and write
800000
heap
page read and write
2397B866000
heap
page read and write
1E5AD118000
heap
page read and write
1CB1B981000
heap
page read and write
1CB1B9CE000
heap
page read and write
E4E047E000
stack
page read and write
2A800813000
heap
page read and write
EF881F7000
stack
page read and write
2566A24F000
heap
page read and write
2A800829000
heap
page read and write
64E000
stack
page read and write
1B6D1E58000
trusted library allocation
page read and write
1D4A9031000
heap
page read and write
23F5E275000
heap
page read and write
1D4A83A3000
heap
page read and write
1F0000
trusted library allocation
page read and write
2460000
heap
page read and write
2566A290000
heap
page read and write
2A800884000
heap
page read and write
1CB1B994000
heap
page read and write
EF883FF000
stack
page read and write
1D4A893A000
heap
page read and write
1D4A6200000
remote allocation
page read and write
19F000
stack
page read and write
2B6E000
stack
page read and write
2465CE13000
heap
page read and write
A0AF7FF000
stack
page read and write
1CB1B98D000
heap
page read and write
2397C300000
heap
page read and write
1B6D3000000
heap
page read and write
1D4A83D7000
heap
page read and write
1D4A7EC6000
heap
page read and write
1B6CD102000
heap
page read and write
1B6D1E74000
trusted library allocation
page read and write
2566A24E000
heap
page read and write
1CB1AE4A000
heap
page read and write
1D4A83A3000
heap
page read and write
2397B720000
heap
page read and write
1CB1B981000
heap
page read and write
1D4A8377000
heap
page read and write
25114FE000
stack
page read and write
1CB1B98D000
heap
page read and write
7CB000
heap
page read and write
1D4A6173000
heap
page read and write
1CFE6250000
heap
page read and write
2A800710000
heap
page read and write
1CB1B9AE000
heap
page read and write
1CC381C0000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
19CD4960000
heap
page read and write
2465CE21000
heap
page read and write
1CC383C1000
heap
page read and write
1D4A837F000
heap
page read and write
1D4A83BF000
heap
page read and write
19CD4A44000
heap
page read and write
4DC000
unkown
page readonly
77E000
stack
page read and write
1D4A834B000
heap
page read and write
794000
heap
page read and write
25AE000
stack
page read and write
64E000
stack
page read and write
1CB1B99A000
heap
page read and write
9BF000
stack
page read and write
30000
unkown
page read and write
9BF000
stack
page read and write
2510EFB000
stack
page read and write
2A8006B0000
heap
page read and write
1D4A7EEA000
heap
page read and write
794B1FC000
stack
page read and write
8B3E0FC000
stack
page read and write
23A0000
direct allocation
page execute and read and write
2AFF000
stack
page read and write
1D4A617A000
heap
page read and write
2360000
heap
page read and write
D9885FB000
stack
page read and write
1CB1AE8B000
heap
page read and write
2465CD60000
trusted library allocation
page read and write
1D4A617A000
heap
page read and write
23F5E23C000
heap
page read and write
EF87BBE000
stack
page read and write
1CB1B978000
heap
page read and write
1D73C800000
heap
page read and write
1CB1ACE0000
heap
page read and write
794AE78000
stack
page read and write
2A80087A000
heap
page read and write
23F5E26A000
heap
page read and write
1B6CD118000
heap
page read and write
788000
heap
page read and write
1CFE6249000
heap
page read and write
1781479000
stack
page read and write
2470000
direct allocation
page execute and read and write
9FF000
stack
page read and write
19CD4A5F000
heap
page read and write
1B6CC7B0000
trusted library allocation
page read and write
D9880FB000
stack
page read and write
1CB1B97C000
heap
page read and write
1B6CCFE0000
trusted library allocation
page read and write
1B6D20AC000
heap
page read and write
794000
heap
page read and write
1D4A5F90000
heap
page read and write
1D4A8184000
heap
page read and write
19CD49F5000
heap
page read and write
400000
unkown
page execute and read and write
1D4A6135000
heap
page read and write
251059C000
stack
page read and write
1D4A83FC000
heap
page read and write
73F000
stack
page read and write
1CB1B9A0000
heap
page read and write
1B6D1E50000
trusted library allocation
page read and write
1D4A617B000
heap
page read and write
876A97D000
stack
page read and write
73F000
stack
page read and write
2566A251000
heap
page read and write
1D4A9430000
heap
page read and write
28A485C0000
heap
page read and write
19CD4A60000
heap
page read and write
1D4A7F00000
heap
page read and write
A0AF27C000
stack
page read and write
1CB1AEEA000
heap
page read and write
A1000
stack
page read and write
1CB1AE4C000
heap
page read and write
E4E087F000
stack
page read and write
23F5E229000
heap
page read and write
1CFE60D0000
heap
page read and write
2566A252000
heap
page read and write
1D4A6174000
heap
page read and write
1D4A83FE000
heap
page read and write
74F000
stack
page read and write
1D4A8323000
heap
page read and write
2360000
heap
page read and write
630000
heap
page read and write
1D4A8EFA000
heap
page read and write
19CD4830000
heap
page read and write
1CB1B9A4000
heap
page read and write
2397B8CD000
heap
page read and write
400000
unkown
page readonly
2B6E000
stack
page read and write
401000
unkown
page execute read
2397B8BC000
heap
page read and write
30000
unkown
page read and write
7CB000
heap
page read and write
2566A24C000
heap
page read and write
1D4A817C000
heap
page read and write
8B3DEFD000
stack
page read and write
1CB1B985000
heap
page read and write
4D2000
unkown
page read and write
1CB1B97A000
heap
page read and write
1CB1B97C000
heap
page read and write
1D4A85D8000
heap
page read and write
2566A23C000
heap
page read and write
22A0000
direct allocation
page read and write
896627E000
stack
page read and write
1E5AD100000
heap
page read and write
1F0000
trusted library allocation
page read and write
1B6CC826000
heap
page read and write
19CD4A47000
heap
page read and write
74F000
stack
page read and write
1D4A8400000
heap
page read and write
1CB1B98E000
heap
page read and write
1CB1AEEC000
heap
page read and write
24AE000
stack
page read and write
2370000
direct allocation
page read and write
1CB1B9A6000
heap
page read and write
400000
unkown
page readonly
1B6D1FB0000
trusted library allocation
page read and write
841000
heap
page read and write
4D2000
unkown
page write copy
AFF000
stack
page read and write
2463000
heap
page read and write
1CC384F0000
trusted library allocation
page read and write
98000
stack
page read and write
There are 1069 hidden memdumps, click here to show them.