IOC Report
RuntimeBroker.exe

FilesProcessesURLsDomainsIPsRegistryMemdumps864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_041vu0f1.mu1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b5f00jhw.jjm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbzkyiv2.yz3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjtgnj3o.y1c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evuel3a1.gyu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0owp02v.llf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0t10vwr.kbf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncd5lejz.2ft.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oa5m1kbu.c4c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ssrvehtq.mwz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tc5pixc3.jxz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tiylcndk.ets.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wqkcvss1.55e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wsvb1csr.2xg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xfumxyuw.4fz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xqobnhpo.1sn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WmiPrvSE.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Mar 24 20:06:01 2025, mtime=Mon Mar 24 20:06:01 2025, atime=Mon Mar 24 20:06:01 2025, length=99840, window=hide
dropped
C:\Users\user\AppData\Roaming\app
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RuntimeBroker.exe
"C:\Users\user\Desktop\RuntimeBroker.exe"
malicious
C:\Users\user\AppData\Roaming\WmiPrvSE.exe
"C:\Users\user\AppData\Roaming\WmiPrvSE.exe"
malicious
C:\Users\user\AppData\Roaming\RuntimeBroker.exe
"C:\Users\user\AppData\Roaming\RuntimeBroker.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RuntimeBroker.exe" "RuntimeBroker.exe" ENABLE
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\WmiPrvSE.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WmiPrvSE.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\WmiPrvSE.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WmiPrvSE.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WmiPrvSE" /tr "C:\Users\user\WmiPrvSE.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
morning-ultimately.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://www.microsoft.Q
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsofm/pki/certs/MicRooCerAut_2010-06-23.crt0
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://go.microsoft.
unknown
http://www.microsoft.
unknown
https://aka.ms/pscore68
unknown
http://go.microsoft.LinkId=42127
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.micros
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
morning-ultimately.gl.at.ply.gg
147.185.221.26
malicious
ax-0001.ax-msedge.net
150.171.27.10

IPs

IP
Domain
Country
Malicious
147.185.221.26
morning-ultimately.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
F12000
unkown
page readonly
malicious
F62000
unkown
page readonly
malicious
125A8000
trusted library allocation
page read and write
malicious
3511000
trusted library allocation
page read and write
malicious
6C81EBE000
stack
page read and write
7FF7C7FC0000
trusted library allocation
page read and write
20535A25000
trusted library allocation
page read and write
6C81E3C000
stack
page read and write
1EDBBE8D000
heap
page read and write
2F09000
heap
page read and write
7FF7C7F90000
trusted library allocation
page read and write
2F20000
heap
page read and write
1C6DBE2F000
heap
page read and write
2F05000
heap
page read and write
67AD000
stack
page read and write
1B01000
heap
page read and write
6B1D000
stack
page read and write
20544691000
trusted library allocation
page read and write
1C6DEBF6000
trusted library allocation
page read and write
7FF7C7C36000
trusted library allocation
page execute and read and write
7FF7C7B54000
trusted library allocation
page read and write
138C000
heap
page read and write
4DB0000
heap
page read and write
1EDA5893000
trusted library allocation
page read and write
7FF7C7CE0000
trusted library allocation
page read and write
2D8AF071000
trusted library allocation
page read and write
1C6EDA51000
trusted library allocation
page read and write
1C6F6185000
heap
page read and write
2D8C7970000
heap
page read and write
7FF7C7EB0000
trusted library allocation
page read and write
2D8B09C1000
trusted library allocation
page read and write
7FF7C7B60000
trusted library allocation
page read and write
E262C8E000
stack
page read and write
5467000
heap
page read and write
1C6DDED8000
trusted library allocation
page read and write
1EDA2060000
trusted library allocation
page read and write
353A000
trusted library allocation
page execute and read and write
13513000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
7FF7C7B60000
trusted library allocation
page read and write
7FF7C7CF2000
trusted library allocation
page read and write
1C6F5E62000
heap
page read and write
2D8BF362000
trusted library allocation
page read and write
2D8B0E4D000
trusted library allocation
page read and write
20534410000
trusted library section
page read and write
7FF7C7D40000
trusted library allocation
page execute and read and write
7FF7C7E30000
trusted library allocation
page read and write
1EDA3C99000
trusted library allocation
page read and write
987927F000
stack
page read and write
9451000
trusted library allocation
page read and write
20535875000
trusted library allocation
page read and write
341D000
stack
page read and write
F10000
unkown
page readonly
547E000
heap
page read and write
2054CB5B000
heap
page read and write
2D8B009E000
trusted library allocation
page read and write
2F22000
heap
page read and write
3500000
trusted library allocation
page read and write
205350B4000
trusted library allocation
page read and write
987A54D000
stack
page read and write
2F05000
heap
page read and write
1701000
heap
page read and write
1C6DBE4B000
heap
page read and write
1EDBC22B000
heap
page read and write
20532B00000
heap
page read and write
2F4F000
heap
page read and write
7FF7C7E99000
trusted library allocation
page read and write
1EDB3E83000
trusted library allocation
page read and write
1C6DE988000
trusted library allocation
page read and write
205346E7000
trusted library allocation
page read and write
1EDA38E1000
heap
page read and write
7FF7C7E20000
trusted library allocation
page read and write
2D8B0247000
trusted library allocation
page read and write
20544661000
trusted library allocation
page read and write
1C6DF7FD000
trusted library allocation
page read and write
2F4F000
heap
page read and write
B375FB000
stack
page read and write
20535A3C000
trusted library allocation
page read and write
1C6DECC3000
trusted library allocation
page read and write
7FF7C7B4D000
trusted library allocation
page execute and read and write
2D8B07F4000
trusted library allocation
page read and write
547C000
heap
page read and write
3542000
trusted library allocation
page execute and read and write
2F01000
heap
page read and write
13521000
trusted library allocation
page read and write
7FF7C7EC0000
trusted library allocation
page read and write
CFE000
stack
page read and write
1C6F61C1000
heap
page read and write
7FF7C7C0C000
trusted library allocation
page execute and read and write
3537000
trusted library allocation
page execute and read and write
6C81DBF000
stack
page read and write
624000
heap
page read and write
7FF7C7B50000
trusted library allocation
page read and write
7DF434300000
trusted library allocation
page execute and read and write
7FF7C7F80000
trusted library allocation
page read and write
7FF7C7F96000
trusted library allocation
page read and write
1C6F6197000
heap
page read and write
B3848E000
stack
page read and write
B3747E000
stack
page read and write
2D8AD301000
heap
page read and write
20535666000
trusted library allocation
page read and write
7FF7C7CF2000
trusted library allocation
page read and write
7FF7C7DB0000
trusted library allocation
page read and write
5480000
heap
page read and write
259E000
stack
page read and write
2F7F000
heap
page read and write
3522000
trusted library allocation
page execute and read and write
7FF7C7D50000
trusted library allocation
page read and write
1EDA1E3D000
heap
page read and write
7FF7C7B54000
trusted library allocation
page read and write
2D8AF298000
trusted library allocation
page read and write
2054CBB9000
heap
page read and write
1C6DC0A0000
trusted library allocation
page read and write
2F3C000
heap
page read and write
1C6F5E5E000
heap
page read and write
1EDA1D30000
heap
page read and write
1EDA3AF0000
trusted library allocation
page read and write
20535721000
trusted library allocation
page read and write
1EDA4A72000
trusted library allocation
page read and write
1EDBC226000
heap
page read and write
7FF7C7C70000
trusted library allocation
page execute and read and write
7FF7C7C90000
trusted library allocation
page execute and read and write
7FF7C7B50000
trusted library allocation
page read and write
7FF7C7B52000
trusted library allocation
page read and write
1C6DC005000
heap
page read and write
2F05000
heap
page read and write
5440000
heap
page read and write
7FF7C7D34000
trusted library allocation
page read and write
2EE3000
heap
page read and write
1C6F612E000
heap
page read and write
1EDA2130000
heap
page read and write
2F1E000
heap
page read and write
1EDB3D76000
trusted library allocation
page read and write
2EBA000
heap
page read and write
4AA0000
heap
page read and write
7FF7C7D0A000
trusted library allocation
page read and write
7FF7C7CF0000
trusted library allocation
page read and write
2E4E000
unkown
page read and write
7FF7C7E60000
trusted library allocation
page read and write
7FF7C7E94000
trusted library allocation
page read and write
E262E8C000
stack
page read and write
1EDA1FE0000
heap
page readonly
1EDB3A71000
trusted library allocation
page read and write
7FF7C7D32000
trusted library allocation
page read and write
205360EA000
trusted library allocation
page read and write
205344A0000
trusted library allocation
page read and write
7FF7C7D50000
trusted library allocation
page read and write
7FF7C7CE2000
trusted library allocation
page read and write
FB0000
heap
page read and write
2D8AD4D0000
trusted library allocation
page read and write
7FF7C7DF0000
trusted library allocation
page read and write
6C81B3E000
stack
page read and write
351A000
trusted library allocation
page execute and read and write
7FF7C7E70000
trusted library allocation
page read and write
1C6F5F1E000
heap
page read and write
7FF7C7D64000
trusted library allocation
page read and write
1C6DC090000
heap
page read and write
20532B50000
heap
page read and write
7FF7C7F60000
trusted library allocation
page read and write
7FF7C7B70000
trusted library allocation
page read and write
1C6DC125000
heap
page read and write
B371EF000
stack
page read and write
16AE000
heap
page read and write
9878FA3000
stack
page read and write
7FF7C7D01000
trusted library allocation
page read and write
2D8B0E72000
trusted library allocation
page read and write
7FF7C7EC0000
trusted library allocation
page read and write
1C6F60B1000
heap
page read and write
975C000
trusted library allocation
page read and write
2EE7000
heap
page read and write
1EDA1D95000
heap
page read and write
359A000
trusted library allocation
page read and write
2F32000
heap
page read and write
E262D8E000
stack
page read and write
6E5E000
stack
page read and write
1350000
heap
page read and write
987977E000
stack
page read and write
1C6DF2B0000
trusted library allocation
page read and write
1C25D000
stack
page read and write
180000
unkown
page readonly
5FCB000
stack
page read and write
1C35E000
stack
page read and write
7FF7C7E73000
trusted library allocation
page read and write
1EDA4D76000
trusted library allocation
page read and write
2F81000
heap
page read and write
1C6F61F6000
heap
page read and write
7FF7C7F80000
trusted library allocation
page read and write
8000000
heap
page read and write
2F5F000
heap
page read and write
2D8AFAC3000
trusted library allocation
page read and write
7DF4956B0000
trusted library allocation
page execute and read and write
7FF7C7DC0000
trusted library allocation
page read and write
2054CB3C000
heap
page read and write
20534470000
trusted library allocation
page read and write
1626000
heap
page read and write
2054CE92000
heap
page read and write
352A000
trusted library allocation
page execute and read and write
1300000
heap
page read and write
7FF7C7D00000
trusted library allocation
page execute and read and write
20534B2F000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
162F000
heap
page read and write
1EDA1DE0000
heap
page read and write
7FF7C7D30000
trusted library allocation
page execute and read and write
1C6F61A2000
heap
page read and write
7FF7C7B60000
trusted library allocation
page read and write
1A01000
heap
page read and write
1C3CA000
stack
page read and write
2054CAC2000
heap
page read and write
7FF7C7B42000
trusted library allocation
page read and write
E261F3E000
stack
page read and write
3701000
heap
page read and write
C80670F000
unkown
page read and write
4CF6000
trusted library allocation
page read and write
2FAE000
heap
page read and write
E262E07000
stack
page read and write
7FF7C7D0A000
trusted library allocation
page read and write
2ED1000
heap
page read and write
20535605000
trusted library allocation
page read and write
1EDA4A9E000
trusted library allocation
page read and write
2D8AD2F7000
heap
page read and write
20532C2D000
heap
page read and write
3520000
trusted library allocation
page read and write
7FF7C7E83000
trusted library allocation
page read and write
1C6DE797000
trusted library allocation
page read and write
166D000
heap
page read and write
205365BC000
trusted library allocation
page read and write
987987D000
stack
page read and write
1EDA20E0000
heap
page execute and read and write
2D8B0190000
trusted library allocation
page read and write
6AC000
heap
page read and write
7FF7C7F80000
trusted library allocation
page execute and read and write
20544682000
trusted library allocation
page read and write
1C6F60E8000
heap
page read and write
2D8C7713000
heap
page read and write
1EDBC21A000
heap
page read and write
2D8C766C000
heap
page read and write
7FF7C7DD0000
trusted library allocation
page read and write
2F05000
heap
page read and write
354C000
trusted library allocation
page execute and read and write
7FF7C7DC0000
trusted library allocation
page read and write
7FF7C7B7D000
trusted library allocation
page execute and read and write
13C6000
heap
page read and write
2F09000
heap
page read and write
7FF7C7EBA000
trusted library allocation
page read and write
7FF7C7D01000
trusted library allocation
page read and write
987957E000
stack
page read and write
7FF7C7DC0000
trusted library allocation
page read and write
1EDA1E27000
heap
page read and write
7FF7C7EA8000
trusted library allocation
page read and write
1C6F5EAE000
heap
page read and write
E262038000
stack
page read and write
6C81AF9000
stack
page read and write
2D8C7465000
heap
page read and write
6C81D3E000
stack
page read and write
2D8B0374000
trusted library allocation
page read and write
1EDA1E1F000
heap
page read and write
20532B40000
trusted library section
page read and write
1F312768000
heap
page read and write
1EDBBEF7000
heap
page execute and read and write
7FF7C7EBC000
trusted library allocation
page read and write
1EDA2135000
heap
page read and write
2F1F000
heap
page read and write
530000
heap
page read and write
1C6DEB40000
trusted library allocation
page read and write
7FF7C7F70000
trusted library allocation
page execute and read and write
2D8B0102000
trusted library allocation
page read and write
7FF7C7F30000
trusted library allocation
page read and write
95A6000
trusted library allocation
page read and write
1EDBC149000
heap
page read and write
7FF7C7F5E000
trusted library allocation
page read and write
1C6F5EDA000
heap
page read and write
7FF7C7F50000
trusted library allocation
page read and write
1C6F6082000
heap
page read and write
2054CB03000
heap
page read and write
1C6F6200000
heap
page read and write
4F4000
stack
page read and write
E261DF9000
stack
page read and write
53EF000
stack
page read and write
3550000
trusted library allocation
page read and write
1600000
heap
page read and write
7FF7C7E50000
trusted library allocation
page read and write
7FF7C7F33000
trusted library allocation
page read and write
2D8C73E8000
heap
page read and write
7FF7C7B53000
trusted library allocation
page execute and read and write
2F3B000
heap
page read and write
2D8AD5C5000
heap
page read and write
2E00000
heap
page read and write
1414000
heap
page read and write
2054CB93000
heap
page read and write
5476000
heap
page read and write
6C81BB7000
stack
page read and write
2F5F000
heap
page read and write
9236000
trusted library allocation
page read and write
7FF7C7FB0000
trusted library allocation
page read and write
987937A000
stack
page read and write
987A3CC000
stack
page read and write
30AF000
unkown
page read and write
2053525A000
trusted library allocation
page read and write
7FF7C7B74000
trusted library allocation
page read and write
13AF000
heap
page read and write
2D8C7471000
heap
page read and write
20532B95000
heap
page read and write
7FF7C7B60000
trusted library allocation
page read and write
7DF44DC60000
trusted library allocation
page execute and read and write
7FF7C7EC0000
trusted library allocation
page read and write
7FF7C7EE0000
trusted library allocation
page read and write
2FA1000
heap
page read and write
4C9F000
trusted library allocation
page read and write
1EDB3D5E000
trusted library allocation
page read and write
7FF7C7ED0000
trusted library allocation
page read and write
7FF7C7D40000
trusted library allocation
page execute and read and write
2F31000
heap
page read and write
1EDBC020000
trusted library allocation
page read and write
1C6DC0D0000
trusted library allocation
page read and write
3310000
heap
page read and write
20536029000
trusted library allocation
page read and write
7FF7C7D01000
trusted library allocation
page read and write
205329F0000
heap
page read and write
1650000
trusted library allocation
page read and write
13511000
trusted library allocation
page read and write
7FF7C7EA0000
trusted library allocation
page read and write
7FF7C7FA3000
trusted library allocation
page read and write
2D8C73B0000
heap
page read and write
7FF7C7C56000
trusted library allocation
page execute and read and write
7FF4109C0000
trusted library allocation
page execute and read and write
2F9F000
heap
page read and write
66AC000
stack
page read and write
7FF7C7F80000
trusted library allocation
page read and write
7FF7C7E00000
trusted library allocation
page read and write
2D8AD210000
heap
page read and write
6DF000
heap
page read and write
2054CAC0000
heap
page read and write
1EDA1DA0000
heap
page read and write
2053596A000
trusted library allocation
page read and write
681D000
stack
page read and write
7FF7C7B80000
trusted library allocation
page read and write
63E000
heap
page read and write
20532C49000
heap
page read and write
1C6DBEE0000
heap
page read and write
7FF7C7EA2000
trusted library allocation
page read and write
7FF7C7D0A000
trusted library allocation
page read and write
2EF5000
heap
page read and write
5462000
heap
page read and write
1C6DE984000
trusted library allocation
page read and write
7FF7C7F70000
trusted library allocation
page read and write
6AE000
heap
page read and write
7FF7C7DB0000
trusted library allocation
page read and write
1C6DBE74000
heap
page read and write
1AE02000
heap
page read and write
1400000
heap
page read and write
2D8AD265000
heap
page read and write
7FF7C7D80000
trusted library allocation
page read and write
98D3000
trusted library allocation
page read and write
1EDBBE02000
heap
page read and write
7FF7C7E30000
trusted library allocation
page read and write
2D8B0E92000
trusted library allocation
page read and write
2D8C73FE000
heap
page read and write
1EDA1FB0000
trusted library allocation
page read and write
2053608C000
trusted library allocation
page read and write
7FF7C7D10000
trusted library allocation
page execute and read and write
6C82A8C000
stack
page read and write
2D8B08D9000
trusted library allocation
page read and write
1C6DBE35000
heap
page read and write
1EDA51F5000
trusted library allocation
page read and write
1EDA4A0D000
trusted library allocation
page read and write
2D8AD410000
heap
page read and write
1EDBC1FE000
heap
page read and write
7FF7C7C20000
trusted library allocation
page read and write
7FF7C7B53000
trusted library allocation
page execute and read and write
E261D7E000
stack
page read and write
20532B93000
heap
page read and write
5467000
heap
page read and write
560000
heap
page read and write
1C6DEDE1000
trusted library allocation
page read and write
7FF7C7FAD000
trusted library allocation
page read and write
7FF7C7FD0000
trusted library allocation
page read and write
7DF400A80000
trusted library allocation
page execute and read and write
1EDA4C81000
trusted library allocation
page read and write
1F312950000
heap
page read and write
613000
heap
page read and write
987A44E000
stack
page read and write
7FF7C7F60000
trusted library allocation
page read and write
7FF7C7EA9000
trusted library allocation
page read and write
7FF7C7C30000
trusted library allocation
page execute and read and write
7FF7C7B5D000
trusted library allocation
page execute and read and write
7FF7C7EAC000
trusted library allocation
page read and write
7FF7C7C60000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
2D8AF060000
heap
page execute and read and write
2F09000
heap
page read and write
2D8AD4B0000
trusted library allocation
page read and write
643000
heap
page read and write
2D8BF091000
trusted library allocation
page read and write
6C8197E000
stack
page read and write
1EDBBE4B000
heap
page read and write
1EDBBE80000
heap
page read and write
2F2D000
heap
page read and write
1C6F6077000
heap
page read and write
1EDBC15E000
heap
page read and write
2D8B000F000
trusted library allocation
page read and write
7FF7C7B54000
trusted library allocation
page read and write
1C6DE990000
trusted library allocation
page read and write
2D8AD450000
heap
page read and write
2D8BF35D000
trusted library allocation
page read and write
1C6DE994000
trusted library allocation
page read and write
7FF7C7EBC000
trusted library allocation
page read and write
7FF7C7DB0000
trusted library allocation
page read and write
1EDA4DA9000
trusted library allocation
page read and write
7FF7C7DA0000
trusted library allocation
page read and write
7FF7C7B50000
trusted library allocation
page read and write
B02000
heap
page read and write
7FF7C7DA0000
trusted library allocation
page read and write
7FF7C7E40000
trusted library allocation
page read and write
7FF7C7B44000
trusted library allocation
page read and write
2D8AEF00000
heap
page execute and read and write
20544957000
trusted library allocation
page read and write
160A000
heap
page read and write
2054CBE0000
heap
page read and write
1EDA4D14000
trusted library allocation
page read and write
1C6DDA10000
heap
page execute and read and write
2D8AD520000
trusted library allocation
page read and write
16B4000
heap
page read and write
7FF7C7E50000
trusted library allocation
page read and write
98797FE000
stack
page read and write
1380000
heap
page read and write
7FF7C7EA4000
trusted library allocation
page read and write
1EDA1FD0000
trusted library allocation
page read and write
1C6EDA21000
trusted library allocation
page read and write
1C6DDBA7000
trusted library allocation
page read and write
1C6EDD11000
trusted library allocation
page read and write
1C6DBFE0000
trusted library allocation
page read and write
7FF7C7F40000
trusted library allocation
page read and write
A02000
heap
page read and write
20534450000
heap
page readonly
1EDBC0D7000
heap
page read and write
20534465000
heap
page read and write
C806689000
stack
page read and write
1EDA5300000
trusted library allocation
page read and write
7FF7C7D10000
trusted library allocation
page execute and read and write
2EF8000
heap
page read and write
2CEE000
stack
page read and write
7FF7C7BAC000
trusted library allocation
page execute and read and write
987A4CB000
stack
page read and write
1C6F6104000
heap
page read and write
7FF7C7B82000
trusted library allocation
page read and write
7FF7C7E30000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
7FF7C7D38000
trusted library allocation
page read and write
1C6DF823000
trusted library allocation
page read and write
2EB0000
heap
page read and write
1C6DF842000
trusted library allocation
page read and write
7FF7C7C36000
trusted library allocation
page execute and read and write
7FF7C7EB5000
trusted library allocation
page read and write
2F2E000
heap
page read and write
1C6F5E30000
heap
page read and write
20544952000
trusted library allocation
page read and write
7FF7C7DF0000
trusted library allocation
page read and write
3552000
trusted library allocation
page read and write
547F000
heap
page read and write
7FF7C7DA0000
trusted library allocation
page read and write
1C6EDCEF000
trusted library allocation
page read and write
2D8AD228000
heap
page read and write
7FF7C7B7D000
trusted library allocation
page execute and read and write
B38607000
stack
page read and write
637000
heap
page read and write
7FF7C7D22000
trusted library allocation
page read and write
7FF7C7DE0000
trusted library allocation
page read and write
7FF7C7B60000
trusted library allocation
page read and write
7FF7C7F70000
trusted library allocation
page execute and read and write
13F0000
heap
page execute and read and write
7FF7C7C0C000
trusted library allocation
page execute and read and write
7FF7C7C70000
trusted library allocation
page execute and read and write
19D5000
heap
page read and write
94B000
stack
page read and write
1B12000
heap
page read and write
2F09000
heap
page read and write
1EDBC0DB000
heap
page read and write
2D8BF313000
trusted library allocation
page read and write
20532B99000
heap
page read and write
B3858E000
stack
page read and write
1EDA1D90000
heap
page read and write
7FF7C7FC0000
trusted library allocation
page read and write
1C6DC000000
heap
page read and write
E261FBC000
stack
page read and write
7FF7C7DE0000
trusted library allocation
page read and write
2D8BF0A1000
trusted library allocation
page read and write
1F312AF5000
heap
page read and write
B3850C000
stack
page read and write
6E9D000
stack
page read and write
2E05000
heap
page read and write
13E0000
heap
page read and write
2F0A000
heap
page read and write
2D8BF080000
trusted library allocation
page read and write
205365C1000
trusted library allocation
page read and write
1C6DC010000
trusted library allocation
page read and write
4C8E000
stack
page read and write
6C819F7000
stack
page read and write
5C40000
trusted library allocation
page execute and read and write
20544901000
trusted library allocation
page read and write
3557000
trusted library allocation
page execute and read and write
5461000
heap
page read and write
7FF7C7C06000
trusted library allocation
page read and write
2054CE99000
heap
page read and write
1EDBC0D3000
heap
page read and write
7FF7C7FA0000
trusted library allocation
page read and write
1C020000
heap
page read and write
2F20000
heap
page read and write
2D8AD220000
heap
page read and write
7FF7C7BFC000
trusted library allocation
page execute and read and write
1EDBC11F000
heap
page read and write
6C81C3D000
stack
page read and write
1EDA4B03000
trusted library allocation
page read and write
1C6F619F000
heap
page read and write
7FF7C7E70000
trusted library allocation
page read and write
180000
unkown
page readonly
2D8C7459000
heap
page read and write
1C8FE000
stack
page read and write
16A5000
heap
page read and write
2D8AF0E3000
trusted library allocation
page read and write
7FF7C7F4C000
trusted library allocation
page read and write
6C81F3B000
stack
page read and write
2054CE8D000
heap
page read and write
7FF7C7B6B000
trusted library allocation
page read and write
B374F9000
stack
page read and write
2F2C000
heap
page read and write
1EDA5873000
trusted library allocation
page read and write
570000
heap
page read and write
6C8156F000
stack
page read and write
1EDA3A60000
heap
page read and write
12F4000
stack
page read and write
E262D0C000
stack
page read and write
1EDA4C48000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
7FF7C7FC0000
trusted library allocation
page read and write
2D8AEFC0000
trusted library allocation
page read and write
2F24000
heap
page read and write
20535603000
trusted library allocation
page read and write
2F2F000
heap
page read and write
7FF7C7D80000
trusted library allocation
page read and write
1C6DBD60000
heap
page read and write
2F32000
heap
page read and write
20535784000
trusted library allocation
page read and write
2D8AD261000
heap
page read and write
5B0000
trusted library allocation
page read and write
2D8C74D0000
heap
page read and write
7FF7C7B5D000
trusted library allocation
page execute and read and write
1C6F620B000
heap
page read and write
25A1000
trusted library allocation
page read and write
20532BD5000
heap
page read and write
B370E3000
stack
page read and write
1C6F60A1000
heap
page read and write
1C400000
heap
page read and write
2D8AD510000
heap
page read and write
20534440000
trusted library allocation
page read and write
5471000
heap
page read and write
5D0000
trusted library allocation
page read and write
2CFE000
stack
page read and write
7FF7C7B6B000
trusted library allocation
page read and write
7FF7C7DF0000
trusted library allocation
page read and write
7FF7C7C75000
trusted library allocation
page execute and read and write
20532AF0000
heap
page read and write
7FF7C7C2C000
trusted library allocation
page execute and read and write
7FF7C7EB2000
trusted library allocation
page read and write
7FF7C7EA4000
trusted library allocation
page read and write
7FF7C7E70000
trusted library allocation
page read and write
13518000
trusted library allocation
page read and write
7FF7C7E90000
trusted library allocation
page read and write
1EDBBEC0000
heap
page execute and read and write
20532AF5000
heap
page read and write
5465000
heap
page read and write
1C6F5EDF000
heap
page read and write
547C000
heap
page read and write
7FF7C7ED0000
trusted library allocation
page read and write
2053541E000
trusted library allocation
page read and write
1C6DF289000
trusted library allocation
page read and write
7FF7C7E83000
trusted library allocation
page read and write
2D8AD515000
heap
page read and write
2F0A000
heap
page read and write
1C6F6270000
trusted library allocation
page read and write
2F39000
heap
page read and write
7FF7C7FA6000
trusted library allocation
page read and write
2D8C7441000
heap
page read and write
7FF7C7EB5000
trusted library allocation
page read and write
2F3E000
heap
page read and write
7FF7C7EA9000
trusted library allocation
page read and write
7FF7C7EB2000
trusted library allocation
page read and write
7FF7C7F40000
trusted library allocation
page read and write
7FF7C7D38000
trusted library allocation
page read and write
2FA3000
heap
page read and write
9D0000
heap
page read and write
693000
heap
page read and write
801A000
heap
page read and write
20534570000
heap
page execute and read and write
2D8BF37B000
trusted library allocation
page read and write
7FF7C7D90000
trusted library allocation
page read and write
1EDA4B2F000
trusted library allocation
page read and write
5465000
heap
page read and write
125A3000
trusted library allocation
page read and write
7FF7C7B8D000
trusted library allocation
page execute and read and write
1740000
heap
page read and write
7FF7C7FB0000
trusted library allocation
page read and write
B37838000
stack
page read and write
16C0000
heap
page execute and read and write
1EDA1E64000
heap
page read and write
1EDBC108000
heap
page read and write
125A1000
trusted library allocation
page read and write
1EDA4B92000
trusted library allocation
page read and write
2F62000
heap
page read and write
1EDA53C2000
trusted library allocation
page read and write
2CF4000
stack
page read and write
2D8AD3F0000
heap
page read and write
1EDA1DFE000
heap
page read and write
194E000
stack
page read and write
6C1E000
stack
page read and write
6C8298E000
stack
page read and write
3130000
heap
page read and write
7FF7C7E83000
trusted library allocation
page read and write
1C6F60DB000
heap
page read and write
2F4F000
heap
page read and write
166F000
heap
page read and write
1C6F61DF000
heap
page read and write
7FF7C7EB8000
trusted library allocation
page read and write
62A000
heap
page read and write
6C815EE000
stack
page read and write
2054CF4D000
heap
page read and write
1C6DE99D000
trusted library allocation
page read and write
981D000
trusted library allocation
page read and write
2053526A000
trusted library allocation
page read and write
2EF5000
heap
page read and write
164E000
stack
page read and write
7FF7C7EBC000
trusted library allocation
page read and write
359E000
stack
page read and write
7FF7C7D80000
trusted library allocation
page read and write
3C4E000
trusted library allocation
page read and write
1612000
heap
page read and write
13B2000
heap
page read and write
600C000
stack
page read and write
987947E000
stack
page read and write
7FF7C7D78000
trusted library allocation
page read and write
13DE000
stack
page read and write
3512000
trusted library allocation
page execute and read and write
1C4C7000
stack
page read and write
7FF7C7EB8000
trusted library allocation
page read and write
7FF7C7C70000
trusted library allocation
page execute and read and write
2054CD00000
trusted library allocation
page read and write
2D8BF071000
trusted library allocation
page read and write
13F5000
heap
page read and write
1C6F6030000
heap
page execute and read and write
98795F9000
stack
page read and write
546B000
heap
page read and write
7FF7C7F90000
trusted library allocation
page read and write
1C6DEA54000
trusted library allocation
page read and write
1F312930000
heap
page read and write
1EDBBEF0000
heap
page execute and read and write
2F27000
heap
page read and write
1C6F60AD000
heap
page read and write
E261EF9000
stack
page read and write
7FF7C7D90000
trusted library allocation
page read and write
2D8B0313000
trusted library allocation
page read and write
1EDBC0EB000
heap
page read and write
1C6DBEE2000
heap
page read and write
2D8C75B0000
heap
page read and write
98793FF000
stack
page read and write
1AF02000
heap
page execute and read and write
1745000
heap
page read and write
2FA0000
heap
page read and write
7FF7C7D10000
trusted library allocation
page execute and read and write
1EDA5363000
trusted library allocation
page read and write
B3870D000
stack
page read and write
1642000
heap
page read and write
B37ABB000
stack
page read and write
7FF7C7D70000
trusted library allocation
page read and write
2D8B042F000
trusted library allocation
page read and write
B3757F000
stack
page read and write
13AD000
heap
page read and write
1C6DEADD000
trusted library allocation
page read and write
5E20000
trusted library allocation
page execute and read and write
2D8BF36B000
trusted library allocation
page read and write
677000
heap
page read and write
2F3A000
heap
page read and write
3190000
heap
page read and write
2F3C000
heap
page read and write
2F2D000
heap
page read and write
E2622BB000
stack
page read and write
7FF7C7C06000
trusted library allocation
page read and write
7FF7C7E80000
trusted library allocation
page read and write
2F5F000
heap
page read and write
2054CEE4000
heap
page read and write
7FF7C7B40000
trusted library allocation
page read and write
205343F0000
heap
page read and write
5E10000
trusted library allocation
page read and write
2F3D000
heap
page read and write
5461000
heap
page read and write
FF0000
heap
page read and write
6ADE000
stack
page read and write
7FF7C7DD0000
trusted library allocation
page read and write
987A64E000
stack
page read and write
5474000
heap
page read and write
1EDA4E31000
trusted library allocation
page read and write
69DE000
stack
page read and write
689D000
stack
page read and write
1EDBC0E5000
heap
page read and write
1C6EDA8B000
trusted library allocation
page read and write
7FF7C7F90000
trusted library allocation
page read and write
C80678F000
stack
page read and write
547C000
heap
page read and write
1EDBC1D8000
heap
page read and write
1EDB3CB2000
trusted library allocation
page read and write
13F1000
heap
page read and write
7FF7C7DA0000
trusted library allocation
page read and write
2D8C76E8000
heap
page read and write
9878FEE000
stack
page read and write
2D8AD25D000
heap
page read and write
2054CB05000
heap
page read and write
7FF7C7D40000
trusted library allocation
page read and write
6C82A09000
stack
page read and write
600000
heap
page read and write
1C6F61EC000
heap
page read and write
7FF7C7C36000
trusted library allocation
page execute and read and write
7FF7C7B5B000
trusted library allocation
page read and write
98796F9000
stack
page read and write
1EDB3A91000
trusted library allocation
page read and write
1EDA5512000
trusted library allocation
page read and write
1EDA1D50000
heap
page read and write
2EFF000
heap
page read and write
1EDA1E69000
heap
page read and write
2D8AD27D000
heap
page read and write
6C8290E000
stack
page read and write
7FF7C7ED0000
trusted library allocation
page read and write
2D8AD550000
trusted library allocation
page read and write
652000
heap
page read and write
97E1000
trusted library allocation
page read and write
7FF7C7D60000
trusted library allocation
page read and write
1C6DBDF0000
heap
page read and write
E26213E000
stack
page read and write
2EFF000
heap
page read and write
1EDA2020000
trusted library allocation
page read and write
7FF7C7BF0000
trusted library allocation
page read and write
20532B8D000
heap
page read and write
7FF7C7D70000
trusted library allocation
page read and write
7FF7C7D32000
trusted library allocation
page read and write
20544961000
trusted library allocation
page read and write
2D8AD490000
trusted library allocation
page read and write
7FF7C7D34000
trusted library allocation
page read and write
2D8AD263000
heap
page read and write
7FF7C7BAC000
trusted library allocation
page execute and read and write
7FF7C7B6B000
trusted library allocation
page read and write
7FF7C7D70000
trusted library allocation
page read and write
1C6F5E6E000
heap
page read and write
354A000
trusted library allocation
page execute and read and write
9F0000
heap
page execute and read and write
6C81CBA000
stack
page read and write
7FF7C7E50000
trusted library allocation
page read and write
1EDA4E06000
trusted library allocation
page read and write
38FE000
stack
page read and write
1C6DE999000
trusted library allocation
page read and write
7FF7C7C06000
trusted library allocation
page read and write
6C81A7D000
stack
page read and write
20532BAD000
heap
page read and write
7FF7C7EA9000
trusted library allocation
page read and write
7FF7C7D34000
trusted library allocation
page read and write
2054CEF1000
heap
page read and write
329F000
stack
page read and write
B378BE000
stack
page read and write
7FF7C7FA0000
trusted library allocation
page read and write
1CAFE000
stack
page read and write
1EDA1E1D000
heap
page read and write
98798FE000
stack
page read and write
1C6F609D000
heap
page read and write
7FF7C7D10000
trusted library allocation
page execute and read and write
1C6F62E0000
heap
page read and write
E26194F000
stack
page read and write
2FA8000
heap
page read and write
1EDA1DF0000
heap
page read and write
E261E7E000
stack
page read and write
7FF7C7D50000
trusted library allocation
page read and write
1F312AF0000
heap
page read and write
E2618C2000
stack
page read and write
2FA7000
heap
page read and write
20536577000
trusted library allocation
page read and write
1C6EDD22000
trusted library allocation
page read and write
7FF7C7E40000
trusted library allocation
page read and write
1653000
trusted library allocation
page read and write
7FF7C7BAC000
trusted library allocation
page execute and read and write
2F5F000
heap
page read and write
2F3B000
heap
page read and write
1336000
stack
page read and write
1444000
heap
page read and write
B38689000
stack
page read and write
7FF7C7EE0000
trusted library allocation
page read and write
1C6DBE2A000
heap
page read and write
29E0000
heap
page read and write
1C6DF847000
trusted library allocation
page read and write
1C419000
heap
page read and write
19D0000
heap
page read and write
7FF7C7B62000
trusted library allocation
page read and write
7FF7C7B70000
trusted library allocation
page read and write
1C6EDD09000
trusted library allocation
page read and write
1C6F6050000
heap
page read and write
1EDA47DC000
trusted library allocation
page read and write
9CF000
stack
page read and write
1C7FE000
stack
page read and write
7FF7C7EC0000
trusted library allocation
page read and write
1C6DE473000
trusted library allocation
page read and write
2F32000
heap
page read and write
1EDBBE9E000
heap
page read and write
2F3E000
heap
page read and write
1C6DC120000
heap
page read and write
7FF7C7B73000
trusted library allocation
page execute and read and write
1B540000
trusted library allocation
page read and write
2F2C000
heap
page read and write
1EDBC0B0000
heap
page read and write
60B000
heap
page read and write
2D8AFC76000
trusted library allocation
page read and write
13C4000
heap
page read and write
2F08000
heap
page read and write
2D8B0072000
trusted library allocation
page read and write
1C6DBDD0000
heap
page read and write
1C6DC030000
trusted library allocation
page read and write
7FF7C7EA0000
trusted library allocation
page read and write
1C6DF371000
trusted library allocation
page read and write
7FF7C7B5D000
trusted library allocation
page execute and read and write
7FF7C7B43000
trusted library allocation
page execute and read and write
1500000
heap
page read and write
7FF7C7B50000
trusted library allocation
page read and write
7FF7C7E50000
trusted library allocation
page read and write
2D8C76DA000
heap
page read and write
2FA5000
heap
page read and write
7FF7C7C06000
trusted library allocation
page read and write
7FF7C7E40000
trusted library allocation
page read and write
97D3000
trusted library allocation
page read and write
2F2A000
heap
page read and write
1C6F5F50000
heap
page read and write
5CDE000
stack
page read and write
7FF7C7EBA000
trusted library allocation
page read and write
6F9E000
stack
page read and write
7FF7C7C0C000
trusted library allocation
page execute and read and write
6C8187E000
stack
page read and write
2D8C7497000
heap
page read and write
52EF000
stack
page read and write
550000
heap
page read and write
7FF7C7E10000
trusted library allocation
page read and write
1C6DEA4E000
trusted library allocation
page read and write
2F1B000
heap
page read and write
1C6DF1A4000
trusted library allocation
page read and write
1C404000
heap
page read and write
205344E0000
trusted library allocation
page read and write
2F2C000
heap
page read and write
20534889000
trusted library allocation
page read and write
7FF7C7E80000
trusted library allocation
page read and write
7FF7C7E70000
trusted library allocation
page read and write
7FF7C7D20000
trusted library allocation
page execute and read and write
1EDA3A71000
trusted library allocation
page read and write
2054CDF0000
heap
page read and write
1C6DEAB1000
trusted library allocation
page read and write
1EDBC0C3000
heap
page read and write
7FF7C7E10000
trusted library allocation
page read and write
B3716F000
stack
page read and write
7FF7C7EA4000
trusted library allocation
page read and write
5ECC000
stack
page read and write
1C6F60B5000
heap
page read and write
7FF7C7EB0000
trusted library allocation
page read and write
205356F5000
trusted library allocation
page read and write
1690000
heap
page read and write
1BFD0000
heap
page read and write
E26223E000
stack
page read and write
B37A3F000
stack
page read and write
2EFA000
heap
page read and write
352C000
trusted library allocation
page execute and read and write
2F1D000
heap
page read and write
1EDBC1DA000
heap
page read and write
1C6DBD70000
heap
page read and write
7FF7C7D24000
trusted library allocation
page read and write
1C6DBD90000
heap
page read and write
1C6DED24000
trusted library allocation
page read and write
7FF7C7F9D000
trusted library allocation
page read and write
7FF7C7D38000
trusted library allocation
page read and write
1EDA5898000
trusted library allocation
page read and write
7DF4956C0000
trusted library allocation
page execute and read and write
2D8AD2A4000
heap
page read and write
E262F0E000
stack
page read and write
1C6F60A5000
heap
page read and write
1C6DDEED000
trusted library allocation
page read and write
5E0000
heap
page read and write
7FF7C7DF0000
trusted library allocation
page read and write
20535909000
trusted library allocation
page read and write
7FF7C7E20000
trusted library allocation
page read and write
2D8C768A000
heap
page read and write
7FF7C7ED0000
trusted library allocation
page read and write
B3793E000
stack
page read and write
2053583C000
trusted library allocation
page read and write
20532BD8000
heap
page read and write
2D8AFC66000
trusted library allocation
page read and write
2054CB8E000
heap
page read and write
2F00000
heap
page read and write
987A5CC000
stack
page read and write
98794F7000
stack
page read and write
B377B7000
stack
page read and write
7FF7C7D10000
trusted library allocation
page read and write
2FA6000
heap
page read and write
2D8BF0E4000
trusted library allocation
page read and write
E2619CF000
stack
page read and write
B376F9000
stack
page read and write
699D000
stack
page read and write
1EDBBDCF000
heap
page read and write
1EDBBDB0000
heap
page read and write
7FF7C7BF6000
trusted library allocation
page read and write
B3773F000
stack
page read and write
2EFC000
heap
page read and write
1C6EDD04000
trusted library allocation
page read and write
205446D9000
trusted library allocation
page read and write
3196000
heap
page read and write
7DF400A90000
trusted library allocation
page execute and read and write
1EDA1FF0000
trusted library allocation
page read and write
2CFB000
stack
page read and write
7FF7C7C10000
trusted library allocation
page execute and read and write
7FF7C7E20000
trusted library allocation
page read and write
2D8AEF06000
heap
page execute and read and write
2EF6000
heap
page read and write
19E0000
heap
page read and write
3550000
trusted library allocation
page read and write
5C80000
unclassified section
page read and write
2EF5000
heap
page read and write
2D8AD2A9000
heap
page read and write
2F40000
heap
page read and write
7FF7C7E80000
trusted library allocation
page read and write
7FF7C7EA0000
trusted library allocation
page read and write
7FF7C7B5D000
trusted library allocation
page execute and read and write
2D8AFDE6000
trusted library allocation
page read and write
20534661000
trusted library allocation
page read and write
7000000
heap
page read and write
2D8B0962000
trusted library allocation
page read and write
98792FE000
stack
page read and write
9879676000
stack
page read and write
7FF7C7C00000
trusted library allocation
page read and write
7FF7C7D80000
trusted library allocation
page read and write
1C6F5EA2000
heap
page read and write
2D8C770E000
heap
page read and write
7FF7C7B74000
trusted library allocation
page read and write
987A34E000
stack
page read and write
2F35000
heap
page read and write
F1C000
unkown
page readonly
2FA8000
heap
page read and write
1EDB3D66000
trusted library allocation
page read and write
2F9F000
heap
page read and write
5DDE000
stack
page read and write
2054CF0B000
heap
page read and write
2D8AEE90000
heap
page read and write
6C82B0C000
stack
page read and write
B3767E000
stack
page read and write
7FF7C7B53000
trusted library allocation
page execute and read and write
2F05000
heap
page read and write
123A000
stack
page read and write
FE0000
heap
page read and write
5462000
heap
page read and write
7FF7C7C00000
trusted library allocation
page read and write
2FA4000
heap
page read and write
1F312750000
heap
page read and write
2054CE00000
heap
page read and write
7FF7C7B54000
trusted library allocation
page read and write
2D8B012D000
trusted library allocation
page read and write
2EF5000
heap
page read and write
7FF7C7F60000
trusted library allocation
page read and write
7FF7C7B6D000
trusted library allocation
page execute and read and write
2D8AEF80000
heap
page execute and read and write
2D8AD2A6000
heap
page read and write
1C9FB000
stack
page read and write
20534650000
heap
page read and write
2F22000
heap
page read and write
2FAA000
heap
page read and write
7FF7C7C00000
trusted library allocation
page read and write
2F2C000
heap
page read and write
1C6FE000
stack
page read and write
7FF7C7B9C000
trusted library allocation
page execute and read and write
685B000
stack
page read and write
20535F1D000
trusted library allocation
page read and write
1C6DDAA0000
trusted library allocation
page read and write
20532AD0000
heap
page read and write
7FF7C7D28000
trusted library allocation
page read and write
20534640000
heap
page execute and read and write
6C82B8E000
stack
page read and write
1EDBBF20000
heap
page read and write
1C6DE7DC000
trusted library allocation
page read and write
20535692000
trusted library allocation
page read and write
1C6DDC48000
trusted library allocation
page read and write
7FF7C7FA0000
trusted library allocation
page read and write
2D8C7469000
heap
page read and write
20534420000
trusted library allocation
page read and write
7FF7C7D20000
trusted library allocation
page execute and read and write
1C6DBE14000
heap
page read and write
2D8B0E97000
trusted library allocation
page read and write
1EDA1E04000
heap
page read and write
1EDA1D20000
heap
page read and write
1C6F5E20000
heap
page execute and read and write
7FF7C7D60000
trusted library allocation
page read and write
1C6F5F2B000
heap
page read and write
29D0000
heap
page read and write
E261CFA000
stack
page read and write
3601000
heap
page execute and read and write
7FF7C7BAC000
trusted library allocation
page execute and read and write
702000
heap
page read and write
1C6DC020000
heap
page readonly
2054CF29000
heap
page read and write
7FF7C7DE0000
trusted library allocation
page read and write
7FF7C7F40000
trusted library allocation
page read and write
7FF7C7BCC000
trusted library allocation
page execute and read and write
2EF9000
heap
page read and write
1C402000
heap
page read and write
7FF7C7F4A000
trusted library allocation
page read and write
2FAB000
heap
page read and write
1EDA1DE8000
heap
page read and write
7FF7C7D90000
trusted library allocation
page read and write
7FF7C7E30000
trusted library allocation
page read and write
1C6DE616000
trusted library allocation
page read and write
2D8C75F5000
heap
page read and write
7FF7C7D40000
trusted library allocation
page execute and read and write
7FF7C7EE0000
trusted library allocation
page read and write
1EDBBE98000
heap
page read and write
B3878E000
stack
page read and write
64D000
heap
page read and write
20534460000
heap
page read and write
7FF7C7CF0000
trusted library allocation
page read and write
1EDA3F3D000
trusted library allocation
page read and write
2F9F000
heap
page read and write
7FF7C7E10000
trusted library allocation
page read and write
2D8C74B0000
heap
page read and write
E261C7E000
stack
page read and write
1C6F5E84000
heap
page read and write
2D8AD5C0000
heap
page read and write
7DF4956A0000
trusted library allocation
page execute and read and write
2D8AF53D000
trusted library allocation
page read and write
2054CE2F000
heap
page read and write
2F3C000
heap
page read and write
1EDB3AA1000
trusted library allocation
page read and write
2D8AD4C0000
heap
page readonly
7FF7C7C00000
trusted library allocation
page read and write
E2620BA000
stack
page read and write
1EDBBDD1000
heap
page read and write
2F23000
heap
page read and write
1BECE000
stack
page read and write
5F0000
heap
page execute and read and write
5465000
heap
page read and write
2E8E000
stack
page read and write
1EDA584E000
trusted library allocation
page read and write
7FF7C7DD0000
trusted library allocation
page read and write
7FF7C7D32000
trusted library allocation
page read and write
2F26000
heap
page read and write
7FF7C7B53000
trusted library allocation
page execute and read and write
2D8B01CB000
trusted library allocation
page read and write
547D000
heap
page read and write
1456000
heap
page read and write
1EDA52DA000
trusted library allocation
page read and write
2EF5000
heap
page read and write
987997B000
stack
page read and write
1EDBC1C8000
heap
page read and write
1660000
heap
page read and write
7FF7C7D60000
trusted library allocation
page read and write
610C000
stack
page read and write
7FF7C7E10000
trusted library allocation
page read and write
1EDBC0A0000
heap
page read and write
1C6DE62F000
trusted library allocation
page read and write
35F0000
heap
page read and write
1EDBC160000
heap
page read and write
3C41000
trusted library allocation
page read and write
1C6F5E27000
heap
page execute and read and write
355B000
trusted library allocation
page execute and read and write
7FF7C7E20000
trusted library allocation
page read and write
2D8AFFC3000
trusted library allocation
page read and write
7FF7C7F90000
trusted library allocation
page read and write
7FF7C7D50000
trusted library allocation
page read and write
182000
unkown
page readonly
3500000
heap
page execute and read and write
976F000
trusted library allocation
page read and write
7FF7C7F40000
trusted library allocation
page read and write
666F000
stack
page read and write
20536003000
trusted library allocation
page read and write
1C6F5E6C000
heap
page read and write
7FF7C7C36000
trusted library allocation
page execute and read and write
7FF7C7F50000
trusted library allocation
page read and write
1EDB3D5C000
trusted library allocation
page read and write
62D000
heap
page read and write
1C6DE98C000
trusted library allocation
page read and write
1380000
heap
page read and write
7FF7C7FB0000
trusted library allocation
page read and write
7FF7C7D90000
trusted library allocation
page read and write
2054CF34000
heap
page read and write
2D8AD26B000
heap
page read and write
7FF7C7EB0000
trusted library allocation
page read and write
656E000
stack
page read and write
7FF7C7F70000
trusted library allocation
page execute and read and write
1EDB3D57000
trusted library allocation
page read and write
1669000
heap
page read and write
7FF7C7E40000
trusted library allocation
page read and write
2D8C745D000
heap
page read and write
7FF7C7E60000
trusted library allocation
page read and write
7FF7C7E00000
trusted library allocation
page read and write
1C6F60A9000
heap
page read and write
35EC000
stack
page read and write
2054CCC0000
heap
page execute and read and write
7FF7C7D20000
trusted library allocation
page execute and read and write
7FF7C7B84000
trusted library allocation
page read and write
7FF7C7E00000
trusted library allocation
page read and write
7FF7C7CF1000
trusted library allocation
page read and write
F60000
unkown
page readonly
1EDB3ADE000
trusted library allocation
page read and write
547C000
heap
page read and write
2D8C746D000
heap
page read and write
7FF7C7DD0000
trusted library allocation
page read and write
1EDA481F000
trusted library allocation
page read and write
20532B8F000
heap
page read and write
6C814E3000
stack
page read and write
165C000
heap
page read and write
1F312760000
heap
page read and write
6C818FA000
stack
page read and write
2D8C7461000
heap
page read and write
2D8AED77000
heap
page read and write
B379BE000
stack
page read and write
7FF7C7C0C000
trusted library allocation
page execute and read and write
7FF7C7FB0000
trusted library allocation
page read and write
20532B58000
heap
page read and write
2F09000
heap
page read and write
7FF7C7FC0000
trusted library allocation
page read and write
7FF7C7CFA000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
7FF7C7C70000
trusted library allocation
page execute and read and write
1EDA1E21000
heap
page read and write
7FF7C7E60000
trusted library allocation
page read and write
4CA0000
heap
page read and write
1C1CE000
stack
page read and write
7FF7C7EB8000
trusted library allocation
page read and write
7FF7C7B90000
trusted library allocation
page read and write
7DF44DC70000
trusted library allocation
page execute and read and write
4C2E000
stack
page read and write
20544959000
trusted library allocation
page read and write
1390000
heap
page read and write
649000
heap
page read and write
2F23000
heap
page read and write
1350000
trusted library allocation
page read and write
2F05000
heap
page read and write
205355FD000
trusted library allocation
page read and write
7FF7C7E60000
trusted library allocation
page read and write
7FF7C7E00000
trusted library allocation
page read and write
1C6DDA21000
trusted library allocation
page read and write
1C6DD8DF000
heap
page read and write
354E000
trusted library allocation
page read and write
1EDA1E2B000
heap
page read and write
E2621BF000
stack
page read and write
7FF7C7C26000
trusted library allocation
page execute and read and write
1AA1D000
stack
page read and write
2F2A000
heap
page read and write
2DD0000
heap
page read and write
2F32000
heap
page read and write
2054C66F000
heap
page read and write
19CF000
stack
page read and write
2053659C000
trusted library allocation
page read and write
1C6EDA41000
trusted library allocation
page read and write
2D8B08FF000
trusted library allocation
page read and write
647000
heap
page read and write
7FF7C7DB0000
trusted library allocation
page read and write
7FF7C7DE0000
trusted library allocation
page read and write
7DF4342F0000
trusted library allocation
page execute and read and write
20534646000
heap
page execute and read and write
1C6F617B000
heap
page read and write
7FF7C7D70000
trusted library allocation
page read and write
1EDA44C2000
trusted library allocation
page read and write
7FF7C7DC0000
trusted library allocation
page read and write
7FF7C7F60000
trusted library allocation
page read and write
1C6DBDF8000
heap
page read and write
2D8C73B8000
heap
page read and write
There are 1160 hidden memdumps, click here to show them.