IOC Report
18fvs4AVae.exe

loading gif

Files

File Path
Type
Category
Malicious
18fvs4AVae.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\VLC_Media.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ydybnru.pye.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4mqpufjx.445.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cs4xvllz.2eu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e0gmtdxn.qhm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkg3mn5d.100.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_igj1vjc1.cmq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iyqsndom.0xl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oph1kxjd.htd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pjzxblcs.pz0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qqjkkage.p2o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_swg2tfos.lam.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tjxdpdwh.w1i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uaa2hjgv.xxw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0d5b5d3.coe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1cznaaq.xer.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqvsoues.4p0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_Media.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 18:55:55 2024, mtime=Sat Nov 23 18:55:55 2024, atime=Sat Nov 23 18:55:55 2024, length=51200, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\18fvs4AVae.exe
"C:\Users\user\Desktop\18fvs4AVae.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\18fvs4AVae.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '18fvs4AVae.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\VLC_Media.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VLC_Media.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
45.141.26.170
malicious
http://crl.microsg
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://crl.micr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.microsVa
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
45.141.26.170
unknown
Netherlands
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
482000
unkown
page readonly
malicious
2771000
trusted library allocation
page read and write
malicious
7DF46F080000
trusted library allocation
page execute and read and write
16B69979000
trusted library allocation
page read and write
1AD1ECC8000
heap
page read and write
2D1A0DA7000
trusted library allocation
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
1B586CF000
stack
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7DF4A3560000
trusted library allocation
page execute and read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1CEFE32A000
heap
page read and write
252E7F7000
stack
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2D1A1B36000
trusted library allocation
page read and write
2D1AFD31000
trusted library allocation
page read and write
1AD38DE0000
heap
page read and write
252EC7C000
stack
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
25A27D3000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1C19E000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
16B67980000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1AD30891000
trusted library allocation
page read and write
1CEFE535000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
12782000
trusted library allocation
page read and write
1AD21933000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1CE98A14000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BB60000
trusted library allocation
page read and write
1B67F000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
16B65F55000
heap
page read and write
2D1A0DD3000
trusted library allocation
page read and write
16B77B60000
trusted library allocation
page read and write
DD3000
trusted library allocation
page read and write
1CEFE2FD000
heap
page read and write
BC0000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1CE80246000
trusted library allocation
page read and write
1CEFE250000
heap
page read and write
2D19FD97000
trusted library allocation
page read and write
16B67870000
heap
page readonly
2D19DF8D000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1B14B000
stack
page read and write
2D19E267000
heap
page execute and read and write
2D19E190000
trusted library section
page read and write
1AD1ECDE000
heap
page read and write
2D19E1A0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1CE988C0000
heap
page read and write
7FFD9B952000
trusted library allocation
page read and write
1AD1EED6000
heap
page execute and read and write
1AAFF000
heap
page read and write
2D19FB68000
heap
page read and write
1C1DF000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
480000
unkown
page readonly
7FFD9B922000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1CE9868A000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1B9BE000
stack
page read and write
1CE80060000
trusted library allocation
page read and write
1AD220D8000
trusted library allocation
page read and write
1CEFE2E7000
heap
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
25A3C0D000
stack
page read and write
2D19FB50000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
1AD38CEC000
heap
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
252EB7F000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
5D1000
stack
page read and write
1CE98693000
heap
page read and write
1CE98A5F000
heap
page read and write
1CE904AE000
trusted library allocation
page read and write
7DF4DB680000
trusted library allocation
page execute and read and write
16B00095000
heap
page read and write
1B57877000
stack
page read and write
2D1B0004000
trusted library allocation
page read and write
2D1B826D000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
252E3CE000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
252EAFE000
stack
page read and write
883000
heap
page read and write
16B68E2C000
trusted library allocation
page read and write
1AD38C7F000
heap
page read and write
1B5884E000
stack
page read and write
2D1A1B16000
trusted library allocation
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
1B57979000
stack
page read and write
F0172FD000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1AD3902A000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1C7E0000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
B30000
heap
page read and write
1B524000
heap
page read and write
252F74B000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
B50000
heap
page read and write
2D19FD11000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2D1B8050000
heap
page read and write
2D19E220000
trusted library allocation
page read and write
252F8CE000
stack
page read and write
2D1A01DD000
trusted library allocation
page read and write
25A303E000
stack
page read and write
16B68D63000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
8CE000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
F017AFB000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
1AD21C3B000
trusted library allocation
page read and write
2760000
heap
page execute and read and write
1CE98928000
heap
page read and write
25A2BF9000
stack
page read and write
16B001E6000
heap
page execute and read and write
84C000
heap
page read and write
16B68DFC000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
16B67985000
heap
page read and write
16B00280000
heap
page read and write
2600000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1CE988C8000
heap
page read and write
1AD38EE0000
trusted library allocation
page read and write
1CE98C60000
heap
page read and write
16B77B51000
trusted library allocation
page read and write
1AD1ED2C000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2D1AFD11000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
16B004F1000
heap
page read and write
16B6874F000
trusted library allocation
page read and write
2D1A1097000
trusted library allocation
page read and write
25A2CF9000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1CE981CB000
heap
page read and write
2D19FCE0000
trusted library allocation
page read and write
2D1A0EEC000
trusted library allocation
page read and write
16B68749000
trusted library allocation
page read and write
1AD38EF0000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
2D1A0C84000
trusted library allocation
page read and write
F017273000
stack
page read and write
91D000
heap
page read and write
7FFD9B974000
trusted library allocation
page read and write
1CE987B0000
heap
page read and write
2D1B8250000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1B5874C000
stack
page read and write
1CE811C5000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
1AD206D0000
trusted library allocation
page read and write
1B577FE000
stack
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
16B00567000
heap
page read and write
7FFD9B948000
trusted library allocation
page read and write
1B587CE000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1CEFE2E9000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
F0173FE000
stack
page read and write
1AD1EBE0000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1AD220FF000
trusted library allocation
page read and write
B2E000
stack
page read and write
F0175F7000
stack
page read and write
7FFD9B954000
trusted library allocation
page read and write
BC5000
heap
page read and write
1CE904BC000
trusted library allocation
page read and write
25A2D7D000
stack
page read and write
16B6605D000
heap
page read and write
2D1B000A000
trusted library allocation
page read and write
1AD2264D000
trusted library allocation
page read and write
F017A7F000
stack
page read and write
16B004BB000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
1CE98634000
heap
page read and write
1C6DA000
stack
page read and write
2D1B80F2000
heap
page read and write
F01797E000
stack
page read and write
16B693BB000
trusted library allocation
page read and write
1CE81946000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9BBD6000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2D19DF59000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
16B00000000
trusted library allocation
page read and write
1AD1ECE4000
heap
page read and write
1CEFE2DD000
heap
page read and write
2D19FC70000
heap
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1CE98717000
heap
page execute and read and write
480000
unkown
page readonly
7FFD9BB90000
trusted library allocation
page read and write
2D1A157C000
trusted library allocation
page read and write
2D1B83A1000
heap
page read and write
16B65FAC000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1AD30B64000
trusted library allocation
page read and write
1CE81502000
trusted library allocation
page read and write
16B00070000
heap
page read and write
1CE90235000
trusted library allocation
page read and write
1AD21656000
trusted library allocation
page read and write
1B4DF000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1CE988CC000
heap
page read and write
16B65FA6000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1B57AFE000
stack
page read and write
F0174F9000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1AD38CCE000
heap
page read and write
2D1A1019000
trusted library allocation
page read and write
252EA7E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1CE904CC000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1B57B7F000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2D19DFDB000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1AD21654000
trusted library allocation
page read and write
1AD21AC6000
trusted library allocation
page read and write
25A3E0C000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
16B65FA8000
heap
page read and write
252E978000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1BE5C000
stack
page read and write
16B0053D000
heap
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
1AD30B5D000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
2D1B80FD000
heap
page read and write
F0185CC000
stack
page read and write
2D1A0C8D000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1AD1EEF5000
heap
page read and write
2D1AFFFE000
trusted library allocation
page read and write
2D19DF9B000
heap
page read and write
91A000
heap
page read and write
1AD20865000
heap
page read and write
2D1B8278000
heap
page read and write
2D1B0002000
trusted library allocation
page read and write
16B65FBE000
heap
page read and write
1AD308A1000
trusted library allocation
page read and write
1C7DC000
stack
page read and write
252EBFE000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2D1B8170000
heap
page read and write
252E8F7000
stack
page read and write
1B320000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
2D19E120000
heap
page read and write
16B000E8000
heap
page read and write
16B65FA4000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
16B67840000
trusted library allocation
page read and write
2D1A10D5000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1AD22697000
trusted library allocation
page read and write
2D1AFD84000
trusted library allocation
page read and write
1CE8146D000
trusted library allocation
page read and write
2D19DF8F000
heap
page read and write
16B00551000
heap
page read and write
25A2E3F000
stack
page read and write
2D19FCD0000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B92A000
trusted library allocation
page read and write
880000
heap
page read and write
1B573AE000
stack
page read and write
7FFD9BAE8000
trusted library allocation
page read and write
2D19FD00000
heap
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1CE9867D000
heap
page read and write
1B28E000
stack
page read and write
2D19DF50000
heap
page read and write
16B67800000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1CE800A0000
heap
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
16B65EF0000
heap
page read and write
2D1A0908000
trusted library allocation
page read and write
1CEFE2E5000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1CE800E0000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1CE80050000
heap
page readonly
7FFD9BAB4000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
1CE81FE9000
trusted library allocation
page read and write
1AD1EEF0000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1AD21FF3000
trusted library allocation
page read and write
2D19E1C5000
heap
page read and write
2D1A0C80000
trusted library allocation
page read and write
1AD1EEA0000
heap
page readonly
16B67B51000
trusted library allocation
page read and write
1AD22133000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1AD1ED28000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1AD21876000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1AD30B6C000
trusted library allocation
page read and write
16B001E0000
heap
page execute and read and write
1CE81256000
trusted library allocation
page read and write
1C1E0000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
8B0000
heap
page read and write
2D19E1C0000
heap
page read and write
2D1B000C000
trusted library allocation
page read and write
16B685A2000
trusted library allocation
page read and write
16B68DA4000
trusted library allocation
page read and write
2D1B825B000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
F018549000
stack
page read and write
2D19DF30000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
16B003EF000
heap
page read and write
16B68B54000
trusted library allocation
page read and write
1AD20D3E000
trusted library allocation
page read and write
7DF46F070000
trusted library allocation
page execute and read and write
2D19DF93000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
2D19E160000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
2D19DF6F000
heap
page read and write
1B480000
heap
page read and write
1CE986C3000
heap
page read and write
270E000
stack
page read and write
16B688BC000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1CE80020000
trusted library allocation
page read and write
1AD212C4000
trusted library allocation
page read and write
1B576FE000
stack
page read and write
1CE988BC000
heap
page read and write
16B65F68000
heap
page read and write
16B6801D000
trusted library allocation
page read and write
2D19DF63000
heap
page read and write
F0176F8000
stack
page read and write
2D1A0E36000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
12771000
trusted library allocation
page read and write
2D1A1664000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9BA93000
trusted library allocation
page read and write
1AD21B80000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
25A2FB8000
stack
page read and write
2D1B811E000
heap
page read and write
1277E000
trusted library allocation
page read and write
1B57A7A000
stack
page read and write
2D1B8096000
heap
page read and write
2D19E1D0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
820000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
252E87D000
stack
page read and write
1AD30880000
trusted library allocation
page read and write
1AD1EE80000
trusted library allocation
page read and write
1AD208E3000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
16B67830000
trusted library section
page read and write
16B65F50000
heap
page read and write
2D1B838F000
heap
page read and write
1B57323000
stack
page read and write
1AD20860000
heap
page read and write
25A3D8D000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
16B68B7F000
trusted library allocation
page read and write
1B57779000
stack
page read and write
16B6992F000
trusted library allocation
page read and write
1CE803E9000
trusted library allocation
page read and write
252E38E000
stack
page read and write
2D1AFD41000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1AD22672000
trusted library allocation
page read and write
2D1A0F25000
trusted library allocation
page read and write
DE5000
heap
page read and write
1CE8136D000
trusted library allocation
page read and write
1CE989D4000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2D1B001C000
trusted library allocation
page read and write
1CE98A53000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B944000
trusted library allocation
page read and write
7DF406CA0000
trusted library allocation
page execute and read and write
1AD218A2000
trusted library allocation
page read and write
7FFD9B968000
trusted library allocation
page read and write
25A3B8E000
stack
page read and write
2D19E1E0000
heap
page readonly
CCC000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
252F7C9000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1B578FD000
stack
page read and write
1AD221C0000
trusted library allocation
page read and write
2D1B80BF000
heap
page read and write
25A2A7E000
stack
page read and write
7FFD9B958000
trusted library allocation
page read and write
16B67820000
trusted library section
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
2D1A0FB8000
trusted library allocation
page read and write
1AD21B1F000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2D19DFD8000
heap
page read and write
2D1A0C7C000
trusted library allocation
page read and write
1CE8068D000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
16B68F19000
trusted library allocation
page read and write
16B77E43000
trusted library allocation
page read and write
1AD38F0D000
heap
page read and write
1CE814CF000
trusted library allocation
page read and write
2D1A1AF1000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BBDD000
trusted library allocation
page read and write
1AD1EEB0000
heap
page read and write
252E77E000
stack
page read and write
16B77B81000
trusted library allocation
page read and write
12778000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1CEFE490000
heap
page read and write
F016FFE000
stack
page read and write
1AD1EDE0000
heap
page read and write
1CE81A2B000
trusted library allocation
page read and write
16B68E5F000
trusted library allocation
page read and write
1CEFE2E1000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1AD206A0000
trusted library allocation
page read and write
2D19E2A5000
heap
page read and write
2D1A091F000
trusted library allocation
page read and write
1B180000
heap
page read and write
1CE986D2000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
25A2DF9000
stack
page read and write
1AD21907000
trusted library allocation
page read and write
16B66048000
heap
page read and write
1CE80DC7000
trusted library allocation
page read and write
1C05A000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
F017777000
stack
page read and write
1AD3901F000
heap
page read and write
1CE98938000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1CE98A77000
heap
page read and write
1C4DB000
stack
page read and write
1B57BF8000
stack
page read and write
1B579F7000
stack
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
16B693E2000
trusted library allocation
page read and write
1CE9866D000
heap
page read and write
16B65F9D000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1AD39039000
heap
page read and write
1AD21471000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1AD21628000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1CE812E7000
trusted library allocation
page read and write
7FFD9B978000
trusted library allocation
page read and write
1CE8139F000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
2D19DF20000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1AD1EEC0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
2D1A0C0C000
trusted library allocation
page read and write
DCC000
stack
page read and write
252E30E000
stack
page read and write
1AD30AB5000
trusted library allocation
page read and write
1CE811F1000
trusted library allocation
page read and write
1CE901E1000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
16B67B40000
heap
page execute and read and write
8D3000
heap
page read and write
252F64E000
stack
page read and write
25A3C8E000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
16B69955000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9BAE9000
trusted library allocation
page read and write
1CE80C12000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
16B003EB000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1AD38F00000
heap
page read and write
1CE801C1000
trusted library allocation
page read and write
1AD30B7C000
trusted library allocation
page read and write
1CE988B0000
heap
page read and write
1AD38FBC000
heap
page read and write
1AD0D000
stack
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
16B00380000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
1AD20871000
trusted library allocation
page read and write
16B0051D000
heap
page read and write
1B5894C000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1AD308E4000
trusted library allocation
page read and write
16B0054B000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1AD38C85000
heap
page read and write
16B006D0000
heap
page read and write
25A2C7E000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
2D1A0C88000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
F0177FC000
stack
page read and write
1AD38C93000
heap
page read and write
1BCBD000
stack
page read and write
2D1B8130000
heap
page read and write
8AE000
heap
page read and write
1AD21816000
trusted library allocation
page read and write
846000
heap
page read and write
16B68C0F000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1CE98A73000
heap
page read and write
7FFD9BB53000
trusted library allocation
page read and write
7DF4DB690000
trusted library allocation
page execute and read and write
16B003B0000
heap
page read and write
1CEFE325000
heap
page read and write
2D1A0C78000
trusted library allocation
page read and write
16B77BC3000
trusted library allocation
page read and write
F01864C000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
1CEFE4B0000
heap
page read and write
1CE81FC4000
trusted library allocation
page read and write
2D1B8098000
heap
page read and write
1CE989CE000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1CE989A1000
heap
page read and write
16B003F3000
heap
page read and write
16B003FF000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
1B47E000
stack
page read and write
252E9FA000
stack
page read and write
1AD39001000
heap
page read and write
2D19E260000
heap
page execute and read and write
1CE904B2000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
2D19E270000
trusted library allocation
page read and write
F01747E000
stack
page read and write
2D1B82EC000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
25A313E000
stack
page read and write
2D1A0C91000
trusted library allocation
page read and write
16B65F10000
heap
page read and write
2D1B8371000
heap
page read and write
F0179FC000
stack
page read and write
1AD20A99000
trusted library allocation
page read and write
1AD38FA0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
16B00403000
heap
page read and write
16B67D7A000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1CE9891C000
heap
page read and write
2D19E1F0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
1B500000
heap
page read and write
16B678B0000
trusted library allocation
page read and write
16B0056B000
heap
page read and write
1AD38C70000
heap
page read and write
2D1A1497000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
F0184CE000
stack
page read and write
25A2AFE000
stack
page read and write
25A3D07000
stack
page read and write
16B6980C000
trusted library allocation
page read and write
1BABE000
stack
page read and write
1CE98AE0000
trusted library allocation
page read and write
7FFD9BACC000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1CE80DBB000
trusted library allocation
page read and write
1CE988F2000
heap
page read and write
1CE80040000
trusted library allocation
page read and write
2D1A0C74000
trusted library allocation
page read and write
F01864E000
stack
page read and write
1AD30B62000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7DF406CB0000
trusted library allocation
page execute and read and write
16B67BCA000
trusted library allocation
page read and write
16B68BE3000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
16B66052000
heap
page read and write
25A2B7E000
stack
page read and write
1CEFE2E3000
heap
page read and write
2D1B8331000
heap
page read and write
25A2F3E000
stack
page read and write
1B589CE000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1CEFE4B5000
heap
page read and write
1CE98890000
heap
page execute and read and write
2D1A0D4A000
trusted library allocation
page read and write
1B4E4000
heap
page read and write
16B0055F000
heap
page read and write
25A2EB7000
stack
page read and write
1CE81282000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
1AD21479000
trusted library allocation
page read and write
16B6799F000
heap
page read and write
1CE81B13000
trusted library allocation
page read and write
1BF55000
stack
page read and write
1AD21998000
trusted library allocation
page read and write
16B65F60000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1AD1EE60000
trusted library allocation
page read and write
1B183000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1CEFE2A0000
heap
page read and write
1CE901C1000
trusted library allocation
page read and write
1CE801B0000
heap
page read and write
16B00510000
heap
page read and write
1AD38D80000
heap
page execute and read and write
2D1A0A25000
trusted library allocation
page read and write
1AD2071D000
heap
page read and write
16B65FEA000
heap
page read and write
7DF4DB670000
trusted library allocation
page execute and read and write
16B00390000
heap
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
16B0010D000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
1AD38C95000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1AD1ECFF000
heap
page read and write
2D19E04A000
heap
page read and write
252E67E000
stack
page read and write
1CE98710000
heap
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
16B004AE000
heap
page read and write
1CE81FE4000
trusted library allocation
page read and write
2D19FF39000
trusted library allocation
page read and write
1CE98A2E000
heap
page read and write
16B694A3000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1AD3902F000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1CE81F9F000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1CEFE260000
heap
page read and write
2D1A1B3B000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1B57CFB000
stack
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
2D1B8271000
heap
page read and write
16B00429000
heap
page read and write
2D19E2A0000
heap
page read and write
1AD1ECC0000
heap
page read and write
1CE988B4000
heap
page read and write
16B65FE5000
heap
page read and write
2D19E180000
trusted library section
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B94A000
trusted library allocation
page read and write
1AD21966000
trusted library allocation
page read and write
1AD22104000
trusted library allocation
page read and write
7FFD9BA8F000
trusted library allocation
page read and write
1BBBD000
stack
page read and write
1AD38D55000
heap
page read and write
16B77E3C000
trusted library allocation
page read and write
7DF4A3550000
trusted library allocation
page execute and read and write
16B0016D000
heap
page read and write
16B65FE7000
heap
page read and write
840000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1CEFE280000
heap
page read and write
16B77E5B000
trusted library allocation
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
920000
heap
page read and write
1CE8158B000
trusted library allocation
page read and write
F01737E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1B568000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1AD220FB000
trusted library allocation
page read and write
1CEFE530000
heap
page read and write
16B68C72000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1CE98684000
heap
page read and write
16B0015C000
heap
page read and write
7FFD9BBED000
trusted library allocation
page read and write
1CE901F1000
trusted library allocation
page read and write
16B67920000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1AD1EED0000
heap
page execute and read and write
1CE812B3000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
16B67860000
trusted library allocation
page read and write
16B65E10000
heap
page read and write
1AD1ED8B000
heap
page read and write
25A30BF000
stack
page read and write
7FFD9BBE6000
trusted library allocation
page read and write
16B77E49000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1CE98A4B000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
F017877000
stack
page read and write
1AD1EE20000
heap
page read and write
1AD1ECFD000
heap
page read and write
F01757E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
16B004C1000
heap
page read and write
1AD22692000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
16B00480000
heap
page read and write
16B0055C000
heap
page read and write
2D19DF91000
heap
page read and write
7FF4D6220000
trusted library allocation
page execute and read and write
1CE988C4000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1B5767E000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1A7A0000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
86B000
heap
page read and write
252E283000
stack
page read and write
1CEFE327000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1AD30871000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
16B003FB000
heap
page read and write
2D1A0D48000
trusted library allocation
page read and write
16B68757000
trusted library allocation
page read and write
2D1A0762000
trusted library allocation
page read and write
16B77B71000
trusted library allocation
page read and write
1AD1EDC0000
heap
page read and write
1C155000
stack
page read and write
16B6937C000
trusted library allocation
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
252F6CC000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
2D19DFAD000
heap
page read and write
1CE904BA000
trusted library allocation
page read and write
1B370000
heap
page execute and read and write
16B004B2000
heap
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
25A3E8E000
stack
page read and write
1CE98610000
heap
page read and write
2D19DFD6000
heap
page read and write
1CE80F1D000
trusted library allocation
page read and write
16B77E4B000
trusted library allocation
page read and write
2D1B8357000
heap
page read and write
252F84C000
stack
page read and write
915000
heap
page read and write
A10000
heap
page read and write
1B588C9000
stack
page read and write
252E6FA000
stack
page read and write
1AD1EE90000
heap
page execute and read and write
16B77E41000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
1AD21A4F000
trusted library allocation
page read and write
25A31BB000
stack
page read and write
1B573EF000
stack
page read and write
2D1A15A3000
trusted library allocation
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
8CC000
heap
page read and write
2D1B8052000
heap
page read and write
16B003F7000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
16B69974000
trusted library allocation
page read and write
16B68D2A000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1CE81A52000
trusted library allocation
page read and write
F01767D000
stack
page read and write
F0178FF000
stack
page read and write
16B692D6000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
2D1A153D000
trusted library allocation
page read and write
1B57C7E000
stack
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
There are 866 hidden memdumps, click here to show them.