IOC Report
Windows Defender.exe

loading gif

Files

File Path
Type
Category
Malicious
Windows Defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Windows defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows defender.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4d0gffu1.kdi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5doctpg0.jh5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1yx1xhi.w2p.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a5afjpcb.rjj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_an02oaqi.eh5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bc0wv5r4.0qa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f2myxf2u.u24.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfzetyab.ch1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_irw4ztao.tgd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j1rp0ddx.gcr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ksw5znke.o21.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mm2i0ohh.a1d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqhw0umi.k2z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_szj344xv.hhd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4fvm4dp.z2f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wwr51r4w.hm5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows defender.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 22 11:03:56 2024, mtime=Mon Jul 22 11:03:56 2024, atime=Mon Jul 22 11:03:56 2024, length=88704, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Windows Defender.exe
"C:\Users\user\Desktop\Windows Defender.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Windows Defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows defender.exe'
malicious
C:\Users\user\AppData\Roaming\Windows defender.exe
"C:\Users\user\AppData\Roaming\Windows defender.exe"
malicious
C:\Users\user\AppData\Roaming\Windows defender.exe
"C:\Users\user\AppData\Roaming\Windows defender.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
rest-root.gl.at.ply.gg
malicious
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
unknown
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microso
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://osoft.co
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.microsoft.?
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
rest-root.gl.at.ply.gg
147.185.221.20
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.20
rest-root.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows defender
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12991000
trusted library allocation
page read and write
malicious
2981000
trusted library allocation
page read and write
malicious
672000
unkown
page readonly
malicious
7FFD9B7DC000
trusted library allocation
page execute and read and write
2C490010000
trusted library allocation
page read and write
166CBA2F000
trusted library allocation
page read and write
2C48103B000
trusted library allocation
page read and write
1731559B000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
47B000
heap
page read and write
166BCFB1000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9BB6A000
trusted library allocation
page read and write
17313BB0000
trusted library allocation
page read and write
166B9C80000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
C69000
heap
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
1835C4D5000
heap
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
166B9C50000
trusted library section
page read and write
1732C5F3000
heap
page read and write
12C3000
heap
page read and write
2C481312000
trusted library allocation
page read and write
173141FD000
trusted library allocation
page read and write
1732C572000
heap
page read and write
17314933000
trusted library allocation
page read and write
173156CA000
trusted library allocation
page read and write
1835F051000
trusted library allocation
page read and write
1B865000
heap
page read and write
1732C176000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
1B58E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
17314DC5000
trusted library allocation
page read and write
17315683000
trusted library allocation
page read and write
1BBCE000
stack
page read and write
750000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
166BCA59000
trusted library allocation
page read and write
18376820000
heap
page read and write
2C481955000
trusted library allocation
page read and write
1835F049000
trusted library allocation
page read and write
1731227B000
heap
page read and write
2C48186D000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
166D3C1F000
heap
page read and write
BA0000
trusted library allocation
page read and write
1836E3CA000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
2C48109E000
trusted library allocation
page read and write
1835F044000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1C44E000
stack
page read and write
780000
heap
page read and write
2C4810CA000
trusted library allocation
page read and write
1405000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page read and write
1841EC7000
stack
page read and write
1732C63B000
heap
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
485000
heap
page read and write
5C4477E000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
166B9C60000
trusted library allocation
page read and write
7FFD9BA9F000
trusted library allocation
page read and write
2C480FD5000
trusted library allocation
page read and write
7DF4D94A0000
trusted library allocation
page execute and read and write
7FFD9BAD4000
trusted library allocation
page read and write
12303000
trusted library allocation
page read and write
17314DF1000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
16C0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
17312340000
trusted library allocation
page read and write
5C4437E000
stack
page read and write
1841076000
stack
page read and write
2C4F8FCE000
heap
page read and write
166BC866000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2C4F8F60000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
17313F58000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1840933000
stack
page read and write
1732C501000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
166BB540000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
2C480229000
trusted library allocation
page read and write
2C480A52000
trusted library allocation
page read and write
166D3E9A000
heap
page read and write
18413FB000
stack
page read and write
17323F82000
trusted library allocation
page read and write
17315B34000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
184204E000
stack
page read and write
1291B4C000
stack
page read and write
1840FF9000
stack
page read and write
1732C104000
heap
page read and write
FE91277000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1732C237000
heap
page execute and read and write
2C4FB588000
heap
page read and write
2D04000
trusted library allocation
page read and write
1732C5F1000
heap
page read and write
1ADAE000
stack
page read and write
2C4FB593000
heap
page read and write
1835DE80000
trusted library section
page read and write
1835F1A2000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
73E000
stack
page read and write
B65000
heap
page read and write
2C481DE1000
trusted library allocation
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
12905CE000
stack
page read and write
2C4FB162000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
166BCA84000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7DF410590000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1732C3B0000
trusted library allocation
page read and write
1835E0D0000
heap
page execute and read and write
1220000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
17314CA2000
trusted library allocation
page read and write
7DF4D94B0000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
1C3E0000
heap
page read and write
1BE2F000
stack
page read and write
B60000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
22FF000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1835F94E000
trusted library allocation
page read and write
17312190000
heap
page read and write
17312360000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
1B0AE000
stack
page read and write
184127E000
stack
page read and write
BF6000
heap
page read and write
B30000
heap
page read and write
89E000
stack
page read and write
C60000
heap
page read and write
166B9CDF000
heap
page read and write
1835E309000
trusted library allocation
page read and write
7FFD9BAE5000
trusted library allocation
page read and write
FE9173B000
stack
page read and write
1836E151000
trusted library allocation
page read and write
2C4FB580000
heap
page read and write
5C453CC000
stack
page read and write
7FFD9B78B000
trusted library allocation
page read and write
13071000
trusted library allocation
page read and write
1291AC7000
stack
page read and write
755000
heap
page read and write
17315B54000
trusted library allocation
page read and write
17314C95000
trusted library allocation
page read and write
2C4FB164000
heap
page read and write
2C4FB172000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
1836E111000
trusted library allocation
page read and write
166D3BD8000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
18376961000
heap
page read and write
2C4F901A000
heap
page read and write
FE91438000
stack
page read and write
129087E000
stack
page read and write
183764B1000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1290A7E000
stack
page read and write
166CBA2A000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1835FEE8000
trusted library allocation
page read and write
28EF000
stack
page read and write
166BB969000
trusted library allocation
page read and write
166BC992000
trusted library allocation
page read and write
1731223D000
heap
page read and write
166BC6FA000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1841F4C000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
166BB570000
trusted library allocation
page read and write
17324018000
trusted library allocation
page read and write
1400000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
27E0000
heap
page read and write
620000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1731493D000
trusted library allocation
page read and write
2C4FAA80000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
495000
heap
page read and write
166BC6AC000
trusted library allocation
page read and write
2C4FB5DD000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1835C5F8000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1835F04D000
trusted library allocation
page read and write
1835F975000
trusted library allocation
page read and write
17313D31000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
166D4100000
heap
page read and write
BF0000
heap
page read and write
1835F2F5000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
27D0000
heap
page execute and read and write
18376710000
heap
page execute and read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
DEC000
stack
page read and write
166BD525000
trusted library allocation
page read and write
7FFD9BBDD000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
7FFD9B7A3000
trusted library allocation
page read and write
17312370000
heap
page readonly
5C4544E000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2C480086000
trusted library allocation
page read and write
166D3C79000
heap
page read and write
166BB5A0000
trusted library allocation
page read and write
FE9228D000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1835DFCB000
heap
page read and write
2C4FA940000
heap
page read and write
166D3BE9000
heap
page read and write
1835C4D0000
heap
page read and write
C1C000
heap
page read and write
2C490031000
trusted library allocation
page read and write
1837653C000
heap
page read and write
166BC772000
trusted library allocation
page read and write
48F000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1835DEE5000
heap
page read and write
21E0000
heap
page execute and read and write
7FFD9B800000
trusted library allocation
page read and write
1835C470000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
2C4902F8000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
183764AF000
heap
page read and write
166BB560000
heap
page read and write
7C1000
stack
page read and write
166BC530000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
17314CAF000
trusted library allocation
page read and write
166CB750000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
5C442FE000
stack
page read and write
1BB7E000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
17323D9F000
trusted library allocation
page read and write
17314782000
trusted library allocation
page read and write
17312239000
heap
page read and write
2C4FAF99000
heap
page read and write
2C4FB1B6000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
5C43FCF000
stack
page read and write
518000
heap
page read and write
FE911FE000
stack
page read and write
1732C4E0000
heap
page read and write
1731224F000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
905000
heap
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
2C4FA8F0000
trusted library allocation
page read and write
1835E0E1000
trusted library allocation
page read and write
2C4F8F50000
trusted library section
page read and write
1732C581000
heap
page read and write
1835C53E000
heap
page read and write
13078000
trusted library allocation
page read and write
173123D0000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1B84D000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
1835ECCB000
trusted library allocation
page read and write
166B9C30000
heap
page read and write
1E1000
stack
page read and write
173154B5000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
166B9CA0000
heap
page read and write
173155C1000
trusted library allocation
page read and write
166BC6B0000
trusted library allocation
page read and write
166CBA37000
trusted library allocation
page read and write
900000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2C4FABC6000
heap
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
2C4F8FDE000
heap
page read and write
1835F869000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
173121B0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B932000
trusted library allocation
page read and write
2C481893000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
2C4FB5C1000
heap
page read and write
FE9210F000
stack
page read and write
2C480C33000
trusted library allocation
page read and write
4BD000
heap
page read and write
17315B0F000
trusted library allocation
page read and write
1732C1B5000
heap
page read and write
166BC528000
trusted library allocation
page read and write
2C4F8FEE000
heap
page read and write
1BCCE000
stack
page read and write
7FF472C60000
trusted library allocation
page execute and read and write
CB0000
heap
page read and write
166CB771000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1B383000
heap
page read and write
17312380000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
1291A4E000
stack
page read and write
2301000
trusted library allocation
page read and write
166BC34F000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1A9B0000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
12308000
trusted library allocation
page read and write
456000
heap
page read and write
18409BD000
stack
page read and write
1380000
trusted library allocation
page read and write
1285000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
2C4F8F70000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2C4FAB60000
heap
page execute and read and write
166D3C35000
heap
page read and write
166BB741000
trusted library allocation
page read and write
173123D5000
heap
page read and write
166B9CE9000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
166D3DC0000
heap
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
166BB6E0000
heap
page execute and read and write
1AF0D000
stack
page read and write
166B9D94000
heap
page read and write
166CB741000
trusted library allocation
page read and write
2C4FB11A000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
17312276000
heap
page read and write
1291BCE000
stack
page read and write
C66000
heap
page read and write
166B9C20000
heap
page read and write
2C48112C000
trusted library allocation
page read and write
CB6000
heap
page read and write
1732C4F0000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
FE913BE000
stack
page read and write
1690000
heap
page read and write
17313B80000
trusted library allocation
page read and write
1287000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
166B9CA8000
heap
page read and write
90000
unkown
page readonly
166B9AD0000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
2C4FA930000
heap
page read and write
129A7000
trusted library allocation
page read and write
2C4FB121000
heap
page read and write
2C480001000
trusted library allocation
page read and write
160E000
stack
page read and write
2C4F8E10000
heap
page read and write
166BCB09000
trusted library allocation
page read and write
5C444F9000
stack
page read and write
2C4FB624000
heap
page read and write
B10000
heap
page read and write
BD0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
166BD54A000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
166BC192000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
166BBC0D000
trusted library allocation
page read and write
18376514000
heap
page read and write
2C4FB196000
heap
page read and write
7FFD9B8A5000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
1290C7A000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
166D3B90000
heap
page read and write
5C4554C000
stack
page read and write
125D000
heap
page read and write
EEE000
stack
page read and write
150F000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1C48F000
stack
page read and write
1835E167000
trusted library allocation
page read and write
2970000
heap
page execute and read and write
47D000
heap
page read and write
5C454C7000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2C4FB674000
heap
page read and write
FE910FE000
stack
page read and write
2C4902EA000
trusted library allocation
page read and write
17315B59000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
1835C588000
heap
page read and write
17314E55000
trusted library allocation
page read and write
2C4FB5DB000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
1835FA36000
trusted library allocation
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
17314C9E000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2C4F8F10000
heap
page read and write
166BCA8A000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2C4F8FD8000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
17312231000
heap
page read and write
1836E101000
trusted library allocation
page read and write
5C448FE000
stack
page read and write
166B9BD0000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1840E7E000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
166BD56A000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1228000
heap
page read and write
17324027000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
CBE000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1290CF7000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1840F7D000
stack
page read and write
1841DCE000
stack
page read and write
1835E5AD000
trusted library allocation
page read and write
1290BF9000
stack
page read and write
FE91179000
stack
page read and write
1732C280000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1835C55E000
heap
page read and write
1835F38B000
trusted library allocation
page read and write
1835F062000
trusted library allocation
page read and write
2C4F9017000
heap
page read and write
FE9153A000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
166D3E35000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
5C447FE000
stack
page read and write
5C446FB000
stack
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
17312237000
heap
page read and write
17324037000
trusted library allocation
page read and write
1290EFE000
stack
page read and write
1835DE90000
trusted library allocation
page read and write
DF0000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
173150F3000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B823000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
166D3F17000
heap
page read and write
2C490021000
trusted library allocation
page read and write
166D3747000
heap
page read and write
12F5000
heap
page read and write
166BCA56000
trusted library allocation
page read and write
166D3DF8000
heap
page read and write
1732C5A8000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
17314E90000
trusted library allocation
page read and write
18410F8000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2C481570000
trusted library allocation
page read and write
17315A7D000
trusted library allocation
page read and write
2C4902EE000
trusted library allocation
page read and write
2C480F9F000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
18376991000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2C4FB330000
heap
page read and write
2C4FA840000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
1731568C000
trusted library allocation
page read and write
166CB7B1000
trusted library allocation
page read and write
FE914B9000
stack
page read and write
166B9D28000
heap
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
166B9CE5000
heap
page read and write
1732C0C0000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2C4FABB0000
trusted library allocation
page read and write
166BCA75000
trusted library allocation
page read and write
1B790000
heap
page read and write
166BCFD7000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
450000
heap
page read and write
1C1DA000
stack
page read and write
2C4F8F90000
heap
page read and write
12F3000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1AEAE000
stack
page read and write
7DF4105A0000
trusted library allocation
page execute and read and write
1731222E000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1835F4A9000
trusted library allocation
page read and write
BD3000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1732C17C000
heap
page read and write
1B34B000
stack
page read and write
5C443F9000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
17315624000
trusted library allocation
page read and write
1731506E000
trusted library allocation
page read and write
166D3EF0000
heap
page read and write
1840D7E000
stack
page read and write
17313DB5000
trusted library allocation
page read and write
1BA3E000
stack
page read and write
2C4FAF70000
heap
page read and write
17323D31000
trusted library allocation
page read and write
166B9CDC000
heap
page read and write
1732C360000
heap
page execute and read and write
1835ECE3000
trusted library allocation
page read and write
17314C91000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
2F6F000
stack
page read and write
17314AAD000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
1835C51F000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1835DEB0000
trusted library allocation
page read and write
A10000
heap
page read and write
2C4FA860000
trusted library allocation
page read and write
FE9220E000
stack
page read and write
1841E4E000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1290583000
stack
page read and write
166BC6B8000
trusted library allocation
page read and write
2C481788000
trusted library allocation
page read and write
1731223B000
heap
page read and write
5C455CE000
stack
page read and write
166BCA86000
trusted library allocation
page read and write
166BCECC000
trusted library allocation
page read and write
FE90DDD000
stack
page read and write
2C4FB5E2000
heap
page read and write
166BD56F000
trusted library allocation
page read and write
17314F0C000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
166BC91C000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
C30000
heap
page read and write
5C4427E000
stack
page read and write
760000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
2C481E26000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
17312233000
heap
page read and write
173121F0000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
166BB656000
heap
page execute and read and write
129097E000
stack
page read and write
17312278000
heap
page read and write
2C48121A000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1835C542000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
12988000
trusted library allocation
page read and write
1835F2BC000
trusted library allocation
page read and write
FE916BE000
stack
page read and write
18411FE000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
12908FE000
stack
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
2C490071000
trusted library allocation
page read and write
2C4FAF80000
heap
page read and write
166BC803000
trusted library allocation
page read and write
1B795000
heap
page read and write
1837684C000
heap
page read and write
1835F3EE000
trusted library allocation
page read and write
2C4FB0FF000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
1BD2E000
stack
page read and write
1841FCC000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1B380000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
183768D1000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9BBD6000
trusted library allocation
page read and write
2C4812AF000
trusted library allocation
page read and write
17312300000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
1290F7C000
stack
page read and write
3071000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
5C445F7000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2C4FA870000
heap
page readonly
166B9D9C000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
166BD03A000
trusted library allocation
page read and write
1B7E1000
heap
page read and write
491000
heap
page read and write
7DF452550000
trusted library allocation
page execute and read and write
1B5FD000
stack
page read and write
7FFD9B9D3000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1290DFE000
stack
page read and write
1360000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2C4FA880000
trusted library allocation
page read and write
1840EFB000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7DF452530000
trusted library allocation
page execute and read and write
166B9C10000
trusted library section
page read and write
166BB650000
heap
page execute and read and write
17312390000
heap
page execute and read and write
1837683D000
heap
page read and write
2C48100F000
trusted library allocation
page read and write
FE9238C000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
FEE000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
21F0000
heap
page execute and read and write
430000
heap
page read and write
1B48E000
stack
page read and write
17314CA6000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
2C481E2B000
trusted library allocation
page read and write
166BC345000
trusted library allocation
page read and write
1835EB32000
trusted library allocation
page read and write
129194E000
stack
page read and write
166BD0AA000
trusted library allocation
page read and write
166B9D25000
heap
page read and write
FE9107E000
stack
page read and write
1835DEC0000
heap
page readonly
2C4FB1A8000
heap
page read and write
2C4F8FD0000
heap
page read and write
1835F205000
trusted library allocation
page read and write
1835F176000
trusted library allocation
page read and write
3060000
heap
page execute and read and write
1298E000
trusted library allocation
page read and write
1BA70000
heap
page read and write
166B9BB0000
heap
page read and write
7FFD9B964000
trusted library allocation
page read and write
45C000
heap
page read and write
1731503B000
trusted library allocation
page read and write
18409FE000
stack
page read and write
1732C58A000
heap
page read and write
17314FD9000
trusted library allocation
page read and write
18376830000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
4BB000
heap
page read and write
1C4A0000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
51F000
heap
page read and write
1C0D5000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1B68E000
stack
page read and write
BFC000
heap
page read and write
B35000
heap
page read and write
2C4FB0FD000
heap
page read and write
1732C59E000
heap
page read and write
1840CFE000
stack
page read and write
7FFD9B922000
trusted library allocation
page read and write
1290B7D000
stack
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1248000
heap
page read and write
1BACE000
stack
page read and write
18412FD000
stack
page read and write
166B9CBF000
heap
page read and write
1835F055000
trusted library allocation
page read and write
1835DE70000
trusted library section
page read and write
2C490001000
trusted library allocation
page read and write
1835FF07000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1ACA0000
heap
page read and write
1732401D000
trusted library allocation
page read and write
166BC6A3000
trusted library allocation
page read and write
173120B0000
heap
page read and write
166BCDE7000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1840C7E000
stack
page read and write
2C4FB0DF000
heap
page read and write
5C4457D000
stack
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
1731492F000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
FE91377000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
5C4447E000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9BAE8000
trusted library allocation
page read and write
2C4804CD000
trusted library allocation
page read and write
2C481E06000
trusted library allocation
page read and write
2110000
heap
page read and write
670000
unkown
page readonly
FE9218C000
stack
page read and write
7FFD9B968000
trusted library allocation
page read and write
2C4FB58F000
heap
page read and write
1835DED0000
trusted library allocation
page read and write
AF0000
heap
page read and write
5C4497B000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
166BCA4E000
trusted library allocation
page read and write
1C8AA000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1320000
heap
page read and write
2C4F8EF0000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
7DF4D0960000
trusted library allocation
page execute and read and write
166D3F12000
heap
page read and write
183765E0000
heap
page execute and read and write
2C4813CB000
trusted library allocation
page read and write
7DF452540000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
FE90D53000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
5C4487E000
stack
page read and write
17323D51000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1835FF0D000
trusted library allocation
page read and write
7FFD9BBE6000
trusted library allocation
page read and write
686000
unkown
page readonly
166BC6A7000
trusted library allocation
page read and write
17313D20000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
2C490308000
trusted library allocation
page read and write
166BC6C5000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1835ECDD000
trusted library allocation
page read and write
1835DF40000
heap
page read and write
1837694F000
heap
page read and write
166D3C51000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
7DF4D0970000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
17324025000
trusted library allocation
page read and write
2C4FABC0000
heap
page execute and read and write
2C4FB1AC000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
173150F9000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
10F1000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
18376985000
heap
page read and write
1837697F000
heap
page read and write
183765E7000
heap
page execute and read and write
1835F114000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
166BB730000
heap
page read and write
1835C4E0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BAEA000
trusted library allocation
page read and write
2C4F8F65000
heap
page read and write
166BC74E000
trusted library allocation
page read and write
16C5000
heap
page read and write
18376883000
heap
page read and write
1835C460000
heap
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
17314C9A000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1290D7E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1835FEC2000
trusted library allocation
page read and write
17314D60000
trusted library allocation
page read and write
184137F000
stack
page read and write
C35000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
166B9D8A000
heap
page read and write
12301000
trusted library allocation
page read and write
1732C187000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
7FFD9BAE8000
trusted library allocation
page read and write
18376760000
trusted library allocation
page read and write
1C9AC000
stack
page read and write
166CBA48000
trusted library allocation
page read and write
166CB761000
trusted library allocation
page read and write
FE912FD000
stack
page read and write
1732C230000
heap
page execute and read and write
2C4FA830000
trusted library section
page read and write
1C9B0000
heap
page read and write
1C2D8000
stack
page read and write
1835C500000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B968000
trusted library allocation
page read and write
1841179000
stack
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
FE915BE000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1732C657000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
166BB735000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1835C5DD000
heap
page read and write
1835C490000
heap
page read and write
1836E3D8000
trusted library allocation
page read and write
2C4FB050000
heap
page read and write
1835ECD9000
trusted library allocation
page read and write
2C481258000
trusted library allocation
page read and write
1835C54A000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
1835DF80000
trusted library allocation
page read and write
FE9240E000
stack
page read and write
166D3DE0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1836E3CF000
trusted library allocation
page read and write
17313BFD000
heap
page read and write
166B9C90000
heap
page readonly
17312305000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
166D3DB0000
trusted library allocation
page read and write
1A88D000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1732401F000
trusted library allocation
page read and write
7FFD9BB73000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1836E3E8000
trusted library allocation
page read and write
2C4FA8B0000
trusted library allocation
page read and write
1AFAE000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
2C4FAC00000
heap
page execute and read and write
FE9163E000
stack
page read and write
12919CC000
stack
page read and write
1290AF9000
stack
page read and write
1835DEE0000
heap
page read and write
1250000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
184204C000
stack
page read and write
1836E0E1000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1835EE5B000
trusted library allocation
page read and write
11D0000
heap
page read and write
166B9CFD000
heap
page read and write
17323D61000
trusted library allocation
page read and write
166BC9EB000
trusted library allocation
page read and write
C33000
heap
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
17314D66000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
12909F9000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
166BC778000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
166BC6B4000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
166BB7C7000
trusted library allocation
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
5C4534F000
stack
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B94A000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
FE92309000
stack
page read and write
183764DD000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
13073000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2C4FA935000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
2C4811E1000
trusted library allocation
page read and write
2C4FB087000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
5C44679000
stack
page read and write
5C43F83000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
166D3CB0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1840DFA000
stack
page read and write
1290E7A000
stack
page read and write
7FFD9B93A000
trusted library allocation
page read and write
1732C616000
heap
page read and write
1BDCD000
stack
page read and write
125A000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
18376470000
heap
page read and write
17312310000
heap
page read and write
1BC20000
heap
page execute and read and write
12981000
trusted library allocation
page read and write
166B9C25000
heap
page read and write
173121F8000
heap
page read and write
18376630000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1835F90F000
trusted library allocation
page read and write
166BD099000
trusted library allocation
page read and write
166BC7D7000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
There are 962 hidden memdumps, click here to show them.