IOC Report
documento.exe

loading gif

Files

File Path
Type
Category
Malicious
documento.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry
ASCII text, with very long lines (57843), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Deinotherium\Pugilist\Unreturnableness\Tapeta\Vulgare\documento.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\mqerms.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\1tvwxxbc.uq0.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\chatrum.sag
data
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Konservatorier.Paa
data
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Pugilist\Unreturnableness\Tapeta\Vulgare\documento.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Pugilist\Unreturnableness\Tapeta\Vulgare\hektowattens.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\fb53bhiv.doo.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\joefz3jg.x0w.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\k5sib43s.z3j.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\nxjimhd4.o1x.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\r5ifwb5w.l2g.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\rpm5w0gg.41f.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\to21uc1n.hla.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\vdb0uukp.cx1.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\xpryghvs.t4f.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\11HJN6AE1PGM5W0V1Q92.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZONHH8O5SKF4P1ZUPDII.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4b41c2.TMP (copy)
data
dropped
C:\Users\user\Documents\Illoyalitet.ini
ASCII text, with CRLF line terminators
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\documento.exe
"C:\Users\user\Desktop\documento.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Linksman=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry';$Curiet136=$Linksman.SubString(57835,3);.$Curiet136($Linksman)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%knkbrdet% -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;%knkbrdet% ($Preeternal)"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Preeternal)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Linksman=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry';$Curiet136=$Linksman.SubString(57835,3);.$Curiet136($Linksman)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Preeternal)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Linksman=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry';$Curiet136=$Linksman.SubString(57835,3);.$Curiet136($Linksman)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%knkbrdet% -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;%knkbrdet% ($Preeternal)"
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
learfo55ozj01.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://crl.entrust.net/server1.crl0
unknown
http://go.microsoB
unknown
http://ocsp.entrust.net03
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://ricohltd.top/ELFpBDmh152.bin
104.21.60.38
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://ricohltd.top/
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
learfo55ozj01.duckdns.org
192.169.69.26
malicious
learfo55ozj02.duckdns.org
unknown
malicious
ricohltd.top
104.21.60.38

IPs

IP
Domain
Country
Malicious
192.169.69.26
learfo55ozj01.duckdns.org
United States
malicious
104.21.60.38
ricohltd.top
United States
172.67.191.112
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Divan180
culturize
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{BD84B380-8CA2-1069-AB1D-08000948F534} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Font Management\Auto Activation Languages
en-Latn-US
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Font Management
Inactive Fonts
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Font Management
Active Languages
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{93412589-74D4-4E4E-AD0E-E0CB621440FD} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
@fontext.dll,-8007
HKEY_CURRENT_USER\Software\Betvingelse
fataliteter
HKEY_CURRENT_USER\Morassweed
Herbalize
HKEY_CURRENT_USER\Environment
knkbrdet
HKEY_CURRENT_USER\Software\alpwovnb-G3F5OR
exepath
HKEY_CURRENT_USER\Software\alpwovnb-G3F5OR
licence
HKEY_CURRENT_USER\Software\alpwovnb-G3F5OR
time
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Startup key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
449000
heap
page read and write
malicious
85E1000
direct allocation
page execute and read and write
malicious
839B000
direct allocation
page execute and read and write
malicious
83F1000
direct allocation
page execute and read and write
malicious
A7E000
stack
page read and write
3904000
heap
page read and write
4D6F000
stack
page read and write
B80000
trusted library allocation
page execute and read and write
4570000
trusted library allocation
page read and write
10000
heap
page read and write
53F0000
heap
page read and write
3A2000
heap
page read and write
5D50000
heap
page read and write
407000
unkown
page readonly
89000
stack
page read and write
208D000
stack
page read and write
42A0000
trusted library allocation
page read and write
10000
heap
page read and write
3F60000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
401000
unkown
page execute read
3958000
heap
page read and write
8D0000
trusted library allocation
page read and write
993000
trusted library allocation
page read and write
39D000
heap
page read and write
21B1F000
stack
page read and write
20CC1000
heap
page read and write
1ED0000
heap
page read and write
21780000
heap
page read and write
2118D000
stack
page read and write
90F000
stack
page read and write
489B000
remote allocation
page execute and read and write
2197F000
stack
page read and write
5039000
heap
page read and write
100000
trusted library section
page read and write
431F000
stack
page read and write
2157F000
stack
page read and write
50CF000
stack
page read and write
20000
heap
page read and write
217000
stack
page read and write
4441000
trusted library allocation
page read and write
30000
heap
page read and write
8E0000
trusted library allocation
page read and write
480000
direct allocation
page read and write
3FA000
heap
page read and write
716000
heap
page execute and read and write
20F7F000
stack
page read and write
250000
heap
page read and write
1EA000
trusted library allocation
page read and write
B0000
direct allocation
page read and write
A1D000
stack
page read and write
49D000
heap
page read and write
AE0000
heap
page execute and read and write
5D9F000
stack
page read and write
3DE000
stack
page read and write
4A4B000
stack
page read and write
2A9B000
remote allocation
page execute and read and write
4BFD000
stack
page read and write
20000
heap
page read and write
2147F000
stack
page read and write
274000
heap
page read and write
23F0000
trusted library allocation
page read and write
61DF000
stack
page read and write
299000
heap
page read and write
22F8000
heap
page read and write
32B000
heap
page read and write
AEE000
stack
page read and write
3D4000
heap
page read and write
42E0000
trusted library allocation
page read and write
20E50000
heap
page read and write
24E0000
trusted library allocation
page read and write
F0000
heap
page read and write
4B3F000
stack
page read and write
28AB000
trusted library allocation
page read and write
20CCD000
heap
page read and write
933000
trusted library allocation
page execute and read and write
51DB000
stack
page read and write
4E7E000
stack
page read and write
790000
trusted library allocation
page read and write
17A000
trusted library allocation
page execute and read and write
249E000
stack
page read and write
40A000
heap
page read and write
270000
direct allocation
page read and write
16A000
trusted library allocation
page read and write
4404000
heap
page execute and read and write
2164E000
stack
page read and write
407000
heap
page read and write
6610000
heap
page read and write
431000
heap
page read and write
734000
heap
page execute and read and write
636000
heap
page read and write
20EEE000
stack
page read and write
33F000
heap
page read and write
2048000
trusted library allocation
page read and write
5AE000
stack
page read and write
22ED000
heap
page read and write
340000
heap
page read and write
5130000
heap
page read and write
442000
heap
page read and write
2220000
direct allocation
page read and write
44B6000
heap
page execute and read and write
10000
heap
page read and write
B90000
trusted library allocation
page read and write
4350000
trusted library allocation
page execute and read and write
AC0000
trusted library allocation
page read and write
290000
heap
page read and write
3799000
trusted library allocation
page read and write
510F000
heap
page read and write
2771000
trusted library allocation
page read and write
529B000
remote allocation
page execute and read and write
42F000
heap
page read and write
1A3000
trusted library allocation
page execute and read and write
6197000
heap
page read and write
211BF000
stack
page read and write
4B04000
heap
page read and write
BB000
stack
page read and write
2770000
heap
page read and write
20FFD000
stack
page read and write
2E3000
trusted library allocation
page read and write
2D4000
trusted library allocation
page read and write
435E000
stack
page read and write
5EB4000
heap
page read and write
2C1A000
trusted library allocation
page read and write
A1D000
stack
page read and write
B20000
trusted library allocation
page read and write
4D0D000
heap
page read and write
210000
trusted library allocation
page execute and read and write
2C7000
heap
page read and write
AF0000
trusted library allocation
page read and write
5410000
heap
page read and write
4880000
trusted library allocation
page read and write
211FF000
stack
page read and write
393E000
heap
page read and write
500000
trusted library allocation
page execute and read and write
4AFE000
stack
page read and write
4A40000
trusted library allocation
page execute and read and write
21020000
heap
page read and write
49D000
heap
page read and write
557000
heap
page read and write
2360000
trusted library allocation
page read and write
3B7000
heap
page read and write
4B94000
heap
page read and write
512D000
heap
page read and write
267000
heap
page read and write
A10000
trusted library allocation
page read and write
20000
heap
page read and write
440000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
42E0000
direct allocation
page read and write
228F000
stack
page read and write
4D3E000
stack
page read and write | page guard
80000
direct allocation
page read and write
2191C000
stack
page read and write
A4F000
stack
page read and write
130000
trusted library section
page read and write
43F000
heap
page read and write
1C5000
trusted library allocation
page execute and read and write
3D80000
heap
page read and write
A1E000
stack
page read and write
97E000
stack
page read and write
A0D000
stack
page read and write
C6000
heap
page read and write
4F2D000
stack
page read and write
3E5000
heap
page read and write
9A0000
trusted library allocation
page read and write
4DBE000
stack
page read and write
2129C000
stack
page read and write
AA0000
trusted library allocation
page read and write
180000
direct allocation
page read and write
437000
unkown
page readonly
360000
heap
page read and write
2F8000
heap
page read and write
4430000
trusted library allocation
page read and write
42B0000
trusted library allocation
page execute and read and write
2EE000
stack
page read and write | page guard
4340000
direct allocation
page read and write
265E000
stack
page read and write
44A0000
direct allocation
page read and write
204E000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
93D000
trusted library allocation
page execute and read and write
3E7000
heap
page read and write
4450000
trusted library allocation
page read and write
1BC000
stack
page read and write
4AE0000
heap
page read and write
2F8B000
heap
page read and write
4AFD000
heap
page read and write
3AD0000
heap
page read and write
1B0000
direct allocation
page read and write
49BC000
stack
page read and write
1A0000
trusted library allocation
page read and write
4330000
direct allocation
page read and write
26A0000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
225F000
stack
page read and write
4300000
trusted library allocation
page read and write
220E000
stack
page read and write
25B0000
trusted library allocation
page read and write
B78000
heap
page read and write
1A0000
direct allocation
page read and write
5D72000
heap
page read and write
2149F000
stack
page read and write
20F4E000
stack
page read and write
3A0000
trusted library allocation
page read and write
320000
trusted library allocation
page read and write
42C0000
direct allocation
page read and write
2121C000
stack
page read and write
110000
trusted library allocation
page read and write
277000
heap
page read and write
70E000
stack
page read and write
3B0000
heap
page read and write
44B0000
heap
page execute and read and write
43A0000
direct allocation
page read and write
3C0000
trusted library section
page read and write
4530000
trusted library allocation
page execute and read and write
AED000
stack
page read and write
209B000
remote allocation
page execute and read and write
5F30000
heap
page read and write
2A9B000
remote allocation
page execute and read and write
B70000
trusted library allocation
page read and write
48A1000
trusted library allocation
page read and write
276C000
stack
page read and write
2AF000
heap
page read and write
354000
heap
page read and write
61E0000
heap
page read and write
576E000
stack
page read and write
380000
trusted library allocation
page execute and read and write
29A000
heap
page read and write
344000
heap
page read and write
2171E000
stack
page read and write
6F9B000
direct allocation
page execute and read and write
3ED000
heap
page read and write
1F90000
remote allocation
page execute and read and write
50D9000
heap
page read and write
DB000
stack
page read and write
4FFF000
stack
page read and write
349B000
remote allocation
page execute and read and write
10000
heap
page read and write
190000
direct allocation
page read and write
4360000
direct allocation
page read and write
509F000
stack
page read and write
1B0000
trusted library allocation
page read and write
4770000
trusted library allocation
page execute and read and write
3D0000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
6A0000
remote allocation
page read and write
1D0000
trusted library allocation
page read and write
209B000
remote allocation
page execute and read and write
409000
unkown
page write copy
990000
trusted library allocation
page read and write
B0000
trusted library section
page read and write
20D01000
heap
page read and write
33E000
heap
page read and write
407000
heap
page read and write
425000
heap
page read and write
9C0000
heap
page execute and read and write
26C0000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
1E0000
direct allocation
page read and write
10000
heap
page read and write
4E8E000
stack
page read and write
4930000
trusted library allocation
page read and write
391E000
heap
page read and write
331000
heap
page read and write
21407000
heap
page read and write
200000
trusted library allocation
page read and write
A0000
direct allocation
page read and write
47EE000
stack
page read and write
20F3E000
stack
page read and write
5081000
heap
page read and write
2156F000
stack
page read and write
B40000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
F0000
trusted library section
page read and write
20000
heap
page read and write
4D1000
heap
page read and write
B90000
trusted library allocation
page read and write
41F000
heap
page read and write
340000
direct allocation
page read and write
87E000
stack
page read and write
2C0000
heap
page read and write
2187C000
stack
page read and write
253F000
stack
page read and write
257E000
stack
page read and write
150000
trusted library allocation
page read and write
290000
heap
page read and write
400000
unkown
page readonly
44D4000
heap
page execute and read and write
3C0000
trusted library allocation
page read and write
22E0000
heap
page read and write
20CA0000
heap
page read and write
20E20000
remote allocation
page read and write
4EEB000
stack
page read and write
3958000
heap
page read and write
276E000
stack
page read and write | page guard
407000
unkown
page readonly
4F9F000
stack
page read and write
1F90000
remote allocation
page execute and read and write
2175E000
stack
page read and write
18C000
stack
page read and write
329000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
4550000
direct allocation
page read and write
3B0000
heap
page read and write
2040000
trusted library allocation
page read and write
91E000
stack
page read and write
1BA000
trusted library allocation
page read and write
3D0000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
2D8000
trusted library allocation
page read and write
38F4000
heap
page read and write
AAE000
stack
page read and write
47A000
heap
page read and write
A20000
trusted library allocation
page read and write
430000
heap
page read and write
450000
heap
page read and write
24F0000
trusted library allocation
page read and write
430000
trusted library allocation
page execute and read and write
29E000
heap
page read and write
2240000
direct allocation
page read and write
618D000
stack
page read and write
25BE000
stack
page read and write
4EEE000
stack
page read and write | page guard
21C3D000
stack
page read and write
524000
heap
page read and write
54BD000
stack
page read and write
2AE000
heap
page read and write
540000
heap
page read and write
AC0000
trusted library allocation
page read and write
62E8000
heap
page read and write
21A0000
trusted library allocation
page read and write
2134E000
stack
page read and write
2500000
trusted library allocation
page read and write
30C000
heap
page read and write
1E0000
direct allocation
page read and write
83A0000
direct allocation
page execute and read and write
53DF000
stack
page read and write
2127E000
stack
page read and write
10D000
stack
page read and write
2A6B000
trusted library allocation
page read and write
220000
trusted library allocation
page read and write
4EEF000
stack
page read and write
110000
direct allocation
page read and write
24AF000
stack
page read and write
3299000
trusted library allocation
page read and write
2030000
trusted library allocation
page read and write
340000
heap
page read and write
7A07000
trusted library allocation
page read and write
21C8D000
stack
page read and write
550E000
stack
page read and write
B50000
trusted library allocation
page read and write
213EA000
heap
page read and write
90000
direct allocation
page read and write
260000
heap
page read and write
2125E000
stack
page read and write
2117F000
stack
page read and write
2110000
heap
page read and write
229A000
heap
page read and write
1CA000
trusted library allocation
page execute and read and write
220000
direct allocation
page read and write
1D70000
heap
page read and write
4ADB000
stack
page read and write
5D5000
heap
page read and write
4320000
direct allocation
page read and write
380000
heap
page read and write
5160000
heap
page read and write
10000
heap
page read and write
2020000
trusted library allocation
page read and write
61A3000
heap
page read and write
245C000
stack
page read and write
11C000
stack
page read and write
5CF0000
heap
page read and write
2109F000
stack
page read and write
B00000
heap
page execute and read and write
240000
heap
page read and write
260E000
stack
page read and write | page guard
202000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
153000
trusted library allocation
page execute and read and write
213E0000
heap
page read and write
5000000
heap
page read and write
29D000
heap
page read and write
1AD000
trusted library allocation
page execute and read and write
7B7000
trusted library allocation
page read and write
4E0E000
stack
page read and write
180000
heap
page read and write
501E000
stack
page read and write
20E8E000
stack
page read and write
297000
trusted library allocation
page read and write
46F000
heap
page read and write
41F000
heap
page read and write
1C0000
direct allocation
page read and write
217AF000
stack
page read and write
33F000
heap
page read and write
2B67000
trusted library allocation
page read and write
34B000
heap
page read and write
388000
heap
page read and write
22F6000
heap
page read and write
289D000
stack
page read and write
20F0D000
stack
page read and write
A00000
trusted library allocation
page execute and read and write
2631000
trusted library allocation
page read and write
1D7000
stack
page read and write
5186000
heap
page read and write
2610000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
20CE3000
heap
page read and write
52F2000
heap
page read and write
190000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
5C9B000
remote allocation
page execute and read and write
4F70000
heap
page read and write
2105E000
stack
page read and write
62E0000
heap
page read and write
50FE000
stack
page read and write
26B0000
trusted library allocation
page read and write
22D2000
trusted library allocation
page read and write
2150000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
22E0000
heap
page read and write
43C0000
trusted library allocation
page read and write
41E000
heap
page read and write
4641000
trusted library allocation
page read and write
391000
heap
page read and write
570000
heap
page read and write
3C0000
heap
page read and write
33A000
heap
page read and write
20D05000
heap
page read and write
44C0000
trusted library allocation
page read and write
5D18000
stack
page read and write
2291000
trusted library allocation
page read and write
20D05000
heap
page read and write
315000
heap
page read and write
20F8D000
stack
page read and write
4650000
trusted library allocation
page read and write
347000
heap
page read and write
7EF10000
trusted library allocation
page execute and read and write
2138F000
stack
page read and write
799B000
direct allocation
page execute and read and write
463F000
stack
page read and write
5D7C000
stack
page read and write
3063000
trusted library allocation
page read and write
4A0C000
stack
page read and write
218BF000
stack
page read and write
210000
direct allocation
page read and write
B00000
trusted library allocation
page read and write
2670000
heap
page read and write
6B0000
heap
page read and write
20ECF000
stack
page read and write
393E000
heap
page read and write
2720000
trusted library allocation
page read and write
100000
direct allocation
page read and write
214FF000
stack
page read and write
5BF8000
stack
page read and write
3B1000
heap
page read and write
34A000
heap
page read and write
4380000
direct allocation
page read and write
51AB000
stack
page read and write
7B0000
trusted library allocation
page read and write
20AF0000
direct allocation
page read and write
250000
direct allocation
page read and write
3E0000
heap
page read and write
B70000
direct allocation
page read and write
2974000
trusted library allocation
page read and write
1A0000
direct allocation
page read and write
200000
heap
page read and write
513A000
heap
page read and write
4B13000
heap
page read and write
120000
trusted library section
page read and write
299000
trusted library allocation
page read and write
180000
direct allocation
page read and write
47E000
heap
page read and write
21B30000
heap
page read and write
3B2000
heap
page read and write
194000
trusted library allocation
page read and write
214FE000
stack
page read and write
25AE000
stack
page read and write
3011000
trusted library allocation
page read and write
2545000
trusted library allocation
page read and write
630000
heap
page read and write
3939000
trusted library allocation
page read and write
43FE000
stack
page read and write
150000
direct allocation
page read and write
418000
trusted library allocation
page read and write
43A000
heap
page read and write
23C8000
trusted library allocation
page read and write
5280000
heap
page read and write
281E000
stack
page read and write
3E2000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
400000
heap
page read and write
610000
heap
page read and write
4940000
heap
page execute and read and write
20E3E000
stack
page read and write
5151000
heap
page read and write
5EF0000
heap
page read and write
49CE000
stack
page read and write
20E70000
heap
page read and write
21300000
heap
page read and write
50EF000
heap
page read and write
20000
heap
page read and write
A7E000
stack
page read and write
41D000
heap
page read and write
2140F000
stack
page read and write
2183B000
stack
page read and write
29E4000
trusted library allocation
page read and write
3E9B000
remote allocation
page execute and read and write
434000
unkown
page readonly
492C000
stack
page read and write
20BA0000
direct allocation
page read and write
4F2E000
stack
page read and write | page guard
519E000
stack
page read and write
43E6000
heap
page execute and read and write
56DE000
stack
page read and write
B90000
trusted library allocation
page read and write
5DCF000
stack
page read and write
341000
heap
page read and write
60D8000
stack
page read and write
43A0000
direct allocation
page read and write
678000
heap
page read and write
137000
stack
page read and write
2260000
heap
page read and write
266F000
stack
page read and write
2A9000
heap
page read and write
188000
heap
page read and write
8CF000
stack
page read and write
2ED000
heap
page read and write
327000
trusted library allocation
page read and write
1BED000
heap
page read and write
21520000
heap
page read and write
3B90000
heap
page read and write
217EF000
stack
page read and write
1C0000
direct allocation
page read and write
2B6000
heap
page read and write
A60000
trusted library allocation
page read and write
ABE000
stack
page read and write
216D0000
heap
page read and write
A60000
trusted library allocation
page read and write
25C0000
trusted library allocation
page execute and read and write
4D3F000
stack
page read and write
A62000
trusted library allocation
page read and write
42D0000
direct allocation
page read and write
24ED000
stack
page read and write
9A5000
trusted library allocation
page execute and read and write
1A0000
direct allocation
page read and write
4480000
trusted library allocation
page read and write
3933000
heap
page read and write
A9E000
stack
page read and write
4C3B000
stack
page read and write
213DE000
stack
page read and write
B80000
trusted library allocation
page read and write
474000
unkown
page readonly
4C3D000
stack
page read and write
2670000
heap
page read and write
4370000
direct allocation
page read and write
3E5000
trusted library allocation
page execute and read and write
42E000
heap
page read and write
529B000
remote allocation
page execute and read and write
3E9B000
remote allocation
page execute and read and write
60FC000
stack
page read and write
1A4000
trusted library allocation
page read and write
4BAE000
stack
page read and write
10000
heap
page read and write
990000
heap
page execute and read and write
19D000
trusted library allocation
page execute and read and write
50B5000
heap
page read and write
3BF000
heap
page read and write
229D000
heap
page read and write
2EF000
stack
page read and write
2A9B000
remote allocation
page execute and read and write
292000
heap
page read and write
40E000
heap
page read and write
483A000
stack
page read and write
5D54000
heap
page read and write
212CF000
stack
page read and write
42F0000
trusted library allocation
page read and write
AD0000
trusted library allocation
page execute and read and write
9B0000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
2F84000
heap
page read and write
B90000
direct allocation
page read and write
B30000
trusted library allocation
page read and write
20FCC000
stack
page read and write
696000
heap
page read and write
1EC000
stack
page read and write
20CE3000
heap
page read and write
2510000
trusted library allocation
page read and write
256F000
stack
page read and write
4440000
trusted library allocation
page read and write
423000
heap
page read and write
4D1000
heap
page read and write
AD0000
heap
page read and write
2420000
heap
page read and write
92E000
stack
page read and write
23D0000
heap
page read and write
2147000
trusted library allocation
page read and write
4EED000
stack
page read and write
88C000
stack
page read and write
2D0000
trusted library allocation
page read and write
10000
heap
page read and write
260F000
stack
page read and write
290000
direct allocation
page read and write
5240000
heap
page read and write
391E000
heap
page read and write
2410000
trusted library allocation
page read and write
437000
unkown
page readonly
416000
heap
page read and write
294000
heap
page read and write
B90000
trusted library allocation
page read and write
536000
heap
page read and write
365000
heap
page read and write
22E0000
heap
page read and write
4EE000
stack
page read and write
38F0000
heap
page read and write
62F7000
heap
page read and write
327000
heap
page read and write
230000
direct allocation
page read and write
5EEF000
stack
page read and write
99F000
stack
page read and write
2A3B000
trusted library allocation
page read and write
453E000
stack
page read and write
20E20000
remote allocation
page read and write
4CF0000
heap
page read and write
20BB0000
direct allocation
page read and write
34E000
heap
page read and write
405000
heap
page read and write
48EF000
stack
page read and write
457000
heap
page read and write
390000
remote allocation
page read and write
2114E000
stack
page read and write
50D2000
heap
page read and write
20000
heap
page read and write
920000
heap
page read and write
400000
unkown
page readonly
2125F000
stack
page read and write
710000
heap
page read and write
4360000
trusted library allocation
page execute and read and write
A10000
trusted library allocation
page read and write
4F2F000
stack
page read and write
212DE000
stack
page read and write
6140000
heap
page read and write
416000
heap
page read and write
934000
trusted library allocation
page read and write
6490000
direct allocation
page execute and read and write
4B70000
heap
page read and write
20DA0000
trusted library allocation
page read and write
2137000
heap
page read and write
529B000
remote allocation
page execute and read and write
338000
heap
page read and write
6450000
heap
page read and write
2360000
trusted library allocation
page read and write
5110000
heap
page read and write
2530000
trusted library allocation
page read and write
C0000
trusted library section
page read and write
219E000
stack
page read and write
260000
trusted library allocation
page execute and read and write
474000
unkown
page readonly
6420000
heap
page read and write
3D1000
heap
page read and write
A28000
trusted library allocation
page read and write
287000
stack
page read and write
710000
heap
page execute and read and write
432000
unkown
page read and write
1CEE000
stack
page read and write
5290000
heap
page read and write
3931000
trusted library allocation
page read and write
F0000
direct allocation
page read and write
71D000
heap
page read and write
4C6E000
stack
page read and write
8CE000
stack
page read and write | page guard
3AB0000
trusted library allocation
page read and write
48AC000
stack
page read and write
4CAE000
stack
page read and write
5F2E000
stack
page read and write
5550000
heap
page read and write
2147000
trusted library allocation
page read and write
1B0000
direct allocation
page read and write
8590000
direct allocation
page execute and read and write
20CE3000
heap
page read and write
424000
unkown
page read and write
C0000
heap
page read and write
25C0000
trusted library allocation
page read and write
50E000
heap
page read and write
2D0000
heap
page read and write
285000
heap
page read and write
4390000
direct allocation
page read and write
F0000
direct allocation
page read and write
507E000
stack
page read and write | page guard
310000
heap
page read and write
1D0000
direct allocation
page read and write
980000
trusted library allocation
page read and write
1D0000
direct allocation
page read and write
5520000
heap
page read and write
40A000
heap
page read and write
2540000
trusted library allocation
page read and write
2011000
trusted library allocation
page read and write
550E000
stack
page read and write
8D9B000
direct allocation
page execute and read and write
B7C000
stack
page read and write
2B0000
heap
page read and write
3959000
trusted library allocation
page read and write
4330000
direct allocation
page read and write
364000
heap
page read and write
4BA3000
heap
page read and write
2149F000
stack
page read and write
970000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
B13000
trusted library allocation
page read and write
4290000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
5E9E000
stack
page read and write
519000
heap
page read and write
1D0000
direct allocation
page read and write
2C46000
trusted library allocation
page read and write
1F8000
trusted library allocation
page read and write
2165F000
stack
page read and write
95C000
stack
page read and write
280000
direct allocation
page read and write
6190000
heap
page read and write
B4E000
stack
page read and write
29F000
heap
page read and write
979B000
direct allocation
page execute and read and write
548D000
stack
page read and write
2A58000
trusted library allocation
page read and write
51EF000
stack
page read and write
5EF000
stack
page read and write
20000
heap
page read and write
2145E000
stack
page read and write
5D12000
heap
page read and write
21640000
heap
page read and write
5028000
heap
page read and write
29A9000
trusted library allocation
page read and write
394B000
heap
page read and write
579000
heap
page read and write
B40000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
4320000
direct allocation
page read and write
209B000
remote allocation
page execute and read and write
248000
trusted library allocation
page read and write
13B000
stack
page read and write
4350000
direct allocation
page read and write
349B000
remote allocation
page execute and read and write
2BFA000
trusted library allocation
page read and write
5B0000
heap
page read and write
1FA000
trusted library allocation
page execute and read and write
2560000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
20DA0000
trusted library allocation
page read and write
D0000
trusted library allocation
page read and write
1F0000
direct allocation
page read and write
294000
heap
page read and write
5CBE000
stack
page read and write
4B0000
trusted library allocation
page read and write
2EA000
trusted library allocation
page read and write
38000
heap
page read and write
210DD000
stack
page read and write
216BF000
stack
page read and write
220000
direct allocation
page read and write
38F1000
heap
page read and write
2230000
direct allocation
page read and write
248000
heap
page read and write
4300000
direct allocation
page read and write
429000
heap
page read and write
1BD0000
heap
page read and write
2A88000
trusted library allocation
page read and write
390000
remote allocation
page read and write
4B8D000
heap
page read and write
61DE000
stack
page read and write | page guard
928000
heap
page read and write
211A000
heap
page read and write
21010000
heap
page read and write
22E000
stack
page read and write
A19B000
direct allocation
page execute and read and write
214EE000
stack
page read and write
28F0000
heap
page execute and read and write
21532000
heap
page read and write
507F000
stack
page read and write
1C0000
heap
page execute and read and write
55EE000
stack
page read and write
5306000
heap
page read and write
2100000
trusted library allocation
page read and write
B80000
direct allocation
page read and write
4310000
trusted library allocation
page read and write
2011000
trusted library allocation
page read and write
513E000
stack
page read and write
50C2000
heap
page read and write
140000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
307C000
trusted library allocation
page read and write
492E000
stack
page read and write
2360000
trusted library allocation
page read and write
260000
direct allocation
page read and write
5C9B000
remote allocation
page execute and read and write
20F8D000
stack
page read and write
10000
heap
page read and write
230000
trusted library allocation
page execute and read and write
52AF000
heap
page read and write
2F0000
heap
page read and write
563E000
stack
page read and write
2670000
heap
page read and write
45BD000
stack
page read and write
21050000
heap
page read and write
5020000
heap
page read and write
7D8000
heap
page read and write
603E000
stack
page read and write
A7D000
stack
page read and write
575000
heap
page read and write
409000
unkown
page read and write
9D0000
heap
page read and write
335000
heap
page read and write
25D0000
heap
page execute and read and write
15D000
trusted library allocation
page execute and read and write
3BE000
stack
page read and write
A90000
trusted library allocation
page execute and read and write
513E000
heap
page read and write
4360000
direct allocation
page read and write
305B000
trusted library allocation
page read and write
98A000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
2670000
heap
page read and write
3084000
trusted library allocation
page read and write
1D5000
trusted library allocation
page execute and read and write
293000
heap
page read and write
659B000
direct allocation
page execute and read and write
5060000
heap
page read and write
276F000
stack
page read and write
21A4F000
stack
page read and write
49D0000
trusted library allocation
page execute and read and write
20D01000
heap
page read and write
4B2B000
stack
page read and write
1D2000
trusted library allocation
page read and write
5B88000
stack
page read and write
880000
trusted library allocation
page read and write
294000
heap
page read and write
A5F000
stack
page read and write
270000
heap
page read and write
466000
heap
page read and write
22E0000
heap
page read and write
154000
trusted library allocation
page read and write
4380000
direct allocation
page read and write
26BC000
trusted library allocation
page read and write
434000
unkown
page readonly
54CC000
stack
page read and write
2E4000
heap
page read and write
560000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
1D74000
heap
page read and write
AF2000
heap
page read and write
2BE000
stack
page read and write
160000
trusted library allocation
page read and write
53DE000
stack
page read and write | page guard
52BD000
heap
page read and write
AD4000
heap
page read and write
4560000
direct allocation
page read and write
2B0000
trusted library section
page read and write
360000
heap
page read and write
2115F000
stack
page read and write
501E000
stack
page read and write
22FD000
heap
page read and write
B19000
trusted library allocation
page read and write
4B6E000
stack
page read and write
403000
heap
page read and write
407000
heap
page read and write
211DF000
stack
page read and write
1F90000
remote allocation
page execute and read and write
3C7000
heap
page read and write
20E1F000
stack
page read and write
2360000
trusted library allocation
page read and write
46A0000
direct allocation
page execute and read and write
21410000
heap
page read and write
4480000
direct allocation
page read and write
2110E000
stack
page read and write
336000
heap
page read and write
4F7D000
stack
page read and write
4310000
direct allocation
page read and write
100000
direct allocation
page read and write
2460000
trusted library allocation
page read and write
219DD000
stack
page read and write
55F0000
heap
page read and write
674000
heap
page read and write
29B000
heap
page read and write
2A2000
heap
page read and write
475000
heap
page read and write
342000
heap
page read and write
2F88000
heap
page read and write
20CDD000
heap
page read and write
A5E000
stack
page read and write
42E000
heap
page read and write
1B0000
direct allocation
page read and write
20CBD000
heap
page read and write
98E000
stack
page read and write
A50000
trusted library allocation
page read and write
4F6000
heap
page read and write
29FB000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
B80000
trusted library allocation
page read and write
210CC000
stack
page read and write
2F0000
heap
page execute and read and write
2121D000
stack
page read and write
210FE000
stack
page read and write
1C0000
trusted library allocation
page read and write
200000
direct allocation
page read and write
A30000
trusted library allocation
page read and write
5320000
heap
page read and write
2F0000
trusted library allocation
page read and write
9DF000
stack
page read and write
3F20000
heap
page read and write
422000
unkown
page read and write
2931000
trusted library allocation
page read and write
F0000
trusted library section
page read and write
3AF000
heap
page read and write
3A5000
heap
page read and write
349B000
remote allocation
page execute and read and write
490000
direct allocation
page read and write
330000
trusted library allocation
page read and write
46D000
stack
page read and write
750000
heap
page execute and read and write
3B9000
heap
page read and write
6A0000
remote allocation
page read and write
3771000
trusted library allocation
page read and write
190000
direct allocation
page read and write
2DD000
trusted library allocation
page execute and read and write
5EB0000
heap
page read and write
24DF000
stack
page read and write
3039000
trusted library allocation
page read and write
43E0000
heap
page execute and read and write
22FD000
heap
page read and write
227D000
heap
page read and write
4A7C000
stack
page read and write
300000
heap
page read and write
1EC000
stack
page read and write
5CED000
stack
page read and write
2139E000
stack
page read and write
4A5000
heap
page read and write
227000
stack
page read and write
96E000
stack
page read and write
7B3000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
20DA0000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
2163E000
stack
page read and write
528E000
stack
page read and write
2130F000
stack
page read and write
71D000
heap
page read and write
213CF000
stack
page read and write
270000
heap
page read and write
2A5000
heap
page read and write
3904000
heap
page read and write
4460000
trusted library allocation
page execute and read and write
2010000
trusted library allocation
page read and write
2F80000
heap
page read and write
2210000
direct allocation
page read and write
4A4E000
stack
page read and write
489B000
remote allocation
page execute and read and write
285E000
stack
page read and write
B70000
heap
page read and write
3D40000
heap
page read and write
44BF000
stack
page read and write
4E3D000
stack
page read and write
930000
trusted library allocation
page read and write
5ED2000
heap
page read and write
602000
heap
page read and write
193000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
5146000
heap
page read and write
4A9E000
stack
page read and write
4470000
direct allocation
page read and write
44F0000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
7B9000
trusted library allocation
page read and write
250000
heap
page read and write
227E000
heap
page read and write
450E000
stack
page read and write
9A2000
trusted library allocation
page read and write
509E000
stack
page read and write | page guard
5CF4000
heap
page read and write
10000
heap
page read and write
3039000
trusted library allocation
page read and write
34B000
heap
page read and write
2C0000
trusted library allocation
page read and write
2660000
heap
page read and write
610E000
stack
page read and write
260000
trusted library section
page read and write
5C9B000
remote allocation
page execute and read and write
21B0000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
550000
heap
page read and write
43B0000
direct allocation
page read and write
2E0000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
506F000
heap
page read and write
3415000
trusted library allocation
page read and write
270000
heap
page read and write
5E20000
heap
page read and write
20ECE000
stack
page read and write
4482000
trusted library allocation
page read and write
240000
direct allocation
page read and write
3B0000
heap
page read and write
510E000
stack
page read and write
49EE000
stack
page read and write
B6E000
stack
page read and write
160000
direct allocation
page read and write
27B5000
trusted library allocation
page read and write
22ED000
heap
page read and write
421000
heap
page read and write
4C1E000
stack
page read and write
4A9E000
stack
page read and write
515A000
heap
page read and write
1C2000
trusted library allocation
page read and write
33F000
heap
page read and write
21C0000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
369000
heap
page read and write
5B7000
heap
page read and write
489B000
remote allocation
page execute and read and write
205000
trusted library allocation
page execute and read and write
2101D000
stack
page read and write
3933000
heap
page read and write
2B3000
heap
page read and write
2670000
heap
page read and write
394B000
heap
page read and write
5EEE000
stack
page read and write | page guard
2520000
trusted library allocation
page read and write
4A0000
direct allocation
page read and write
20FFE000
stack
page read and write
1D92000
heap
page read and write
337000
heap
page read and write
170000
direct allocation
page read and write
470000
direct allocation
page read and write
60F8000
stack
page read and write
3063000
trusted library allocation
page read and write
98F000
stack
page read and write
9D0000
trusted library allocation
page execute and read and write
4C0000
heap
page execute and read and write
20FBE000
stack
page read and write
429000
unkown
page read and write
120000
heap
page read and write
49C000
heap
page read and write
3E0000
heap
page read and write
46B0000
trusted library allocation
page execute and read and write
2426000
heap
page read and write
2D3000
trusted library allocation
page execute and read and write
504E000
stack
page read and write
B60000
direct allocation
page read and write
40E000
heap
page read and write
2BF000
heap
page read and write
42B000
heap
page read and write
983000
trusted library allocation
page read and write
5040000
heap
page read and write
68D000
stack
page read and write
272A000
stack
page read and write
510000
heap
page read and write
B50000
heap
page execute and read and write
1C0000
direct allocation
page read and write
4370000
direct allocation
page read and write
10000
heap
page read and write
2A3E000
trusted library allocation
page read and write
8CF000
stack
page read and write
980000
trusted library allocation
page read and write
26BE000
stack
page read and write
382000
heap
page read and write
4A2B000
stack
page read and write
4370000
direct allocation
page read and write
2BE000
stack
page read and write
716000
heap
page read and write
31F000
heap
page read and write
401000
unkown
page execute read
999000
trusted library allocation
page read and write
506A000
heap
page read and write
3E9B000
remote allocation
page execute and read and write
AF0000
trusted library allocation
page read and write
460000
trusted library allocation
page read and write
457000
heap
page read and write
There are 1067 hidden memdumps, click here to show them.