IOC Report
MicrosoftEdgeWebview2.exe

loading gif

Files

File Path
Type
Category
Malicious
MicrosoftEdgeWebview2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MicrosoftEdgeWebview2.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34iwqt4s.0t5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3gaqwihj.o0i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jinyxfh.h4e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xpncdbv.z2s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b42rrvsg.ld5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctdchimt.qhv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fxbxkrae.fgq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hjflzlkn.dne.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lff3tido.w3q.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3bsye50.i2l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ubuc4jkz.nxp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1gftxz3.umf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vlt3hmss.vpl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yuvqzeoe.vq0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvar1kmp.cjy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zeryj23e.2te.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeWebview2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 30 04:18:50 2024, mtime=Fri Aug 30 04:18:50 2024, atime=Fri Aug 30 04:18:50 2024, length=64000, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MicrosoftEdgeWebview2.exe
"C:\Users\user\Desktop\MicrosoftEdgeWebview2.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\MicrosoftEdgeWebview2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftEdgeWebview2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftEdgeWebview2.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MicrosoftEdgeWebview2" /tr "C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe"
malicious
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
malicious
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
"C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe"
malicious
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
malicious
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
"C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe"
malicious
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
C:\Users\user\AppData\Local\Temp\MicrosoftEdgeWebview2.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
on-weighted.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.microse
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
on-weighted.gl.at.ply.gg
147.185.221.20
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.20
on-weighted.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicrosoftEdgeWebview2
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8E2000
unkown
page readonly
malicious
7FFD9B5A0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B67C000
trusted library allocation
page execute and read and write
19B880C0000
heap
page read and write
19B891E3000
trusted library allocation
page read and write
D35000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
1593E8D3000
trusted library allocation
page read and write
415477D000
stack
page read and write
4154ABE000
stack
page read and write
D00000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B5CD000
trusted library allocation
page execute and read and write
19B866B0000
heap
page read and write
D45000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
273BACC000
stack
page read and write
126F1000
trusted library allocation
page read and write
1BA0F000
stack
page read and write
135B000
heap
page read and write
16A010C1000
trusted library allocation
page read and write
41541F3000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
19B8A050000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
19B86690000
heap
page read and write
7FFD9B5A4000
trusted library allocation
page read and write
7FFD9B7A2000
trusted library allocation
page read and write
FAF000
heap
page read and write
41545FA000
stack
page read and write
19BA0950000
heap
page read and write
1C3CA854000
trusted library allocation
page read and write
16A6980A000
heap
page read and write
273ADFE000
stack
page read and write
273A8FE000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
7FFD9B676000
trusted library allocation
page execute and read and write
7FFD9B594000
trusted library allocation
page read and write
1593B680000
heap
page execute and read and write
1593E075000
trusted library allocation
page read and write
7FFD9B5EC000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
1594D055000
trusted library allocation
page read and write
19BA0974000
heap
page read and write
F75000
heap
page read and write
16A011DE000
trusted library allocation
page read and write
7FFD9B74A000
trusted library allocation
page read and write
7FFD9B5AD000
trusted library allocation
page execute and read and write
159556D2000
heap
page read and write
1B64D000
stack
page read and write
273AA77000
stack
page read and write
16A6770A000
heap
page read and write
1C3D8F00000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
1593B600000
heap
page readonly
26F1000
trusted library allocation
page read and write
1C3CA14A000
trusted library allocation
page read and write
19BA09CC000
heap
page read and write
1594D011000
trusted library allocation
page read and write
7FFD9B5BD000
trusted library allocation
page execute and read and write
7FFD9B5A0000
trusted library allocation
page read and write
1593E286000
trusted library allocation
page read and write
2A50000
heap
page execute and read and write
1593EDE3000
trusted library allocation
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
1C3CA675000
trusted library allocation
page read and write
E46000
heap
page read and write
7FFD9B5A2000
trusted library allocation
page read and write
7FFD9B59D000
trusted library allocation
page execute and read and write
4154B3F000
stack
page read and write
273AD7E000
stack
page read and write
26FF000
trusted library allocation
page read and write
1C3CA71B000
trusted library allocation
page read and write
16A01E2A000
trusted library allocation
page read and write
16A69990000
heap
page read and write
1C3C93BD000
trusted library allocation
page read and write
1C3CA146000
trusted library allocation
page read and write
15955640000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page execute and read and write
1C3C8D10000
heap
page readonly
19BA05ED000
heap
page read and write
1B41E000
stack
page read and write
15955835000
heap
page read and write
C80000
heap
page read and write
1C3C9FB6000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
1593D05F000
trusted library allocation
page read and write
F40000
heap
page read and write
19BA0BA0000
heap
page read and write
7DF403010000
trusted library allocation
page execute and read and write
1220000
heap
page read and write
1320000
heap
page read and write
41546F7000
stack
page read and write
6C28E7F000
stack
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
7DF45FA20000
trusted library allocation
page execute and read and write
D1F000
stack
page read and write
273A979000
stack
page read and write
1C3E164F000
heap
page read and write
19B89331000
trusted library allocation
page read and write
159557A2000
heap
page read and write
A88000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
16A69190000
trusted library allocation
page read and write
6C293BE000
stack
page read and write
16A10021000
trusted library allocation
page read and write
1C3C736C000
heap
page read and write
F13000
trusted library allocation
page read and write
12CB8000
trusted library allocation
page read and write
1D368020000
heap
page read and write
B48000
heap
page read and write
16A00229000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
16A1030B000
trusted library allocation
page read and write
7FFD9B77A000
trusted library allocation
page read and write
1593E870000
trusted library allocation
page read and write
D19000
heap
page read and write
16A10031000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
9C903BE000
stack
page read and write
7FFD9B914000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
12851000
trusted library allocation
page read and write
16A699C1000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
19B8675E000
heap
page read and write
1B700000
heap
page read and write
159556DE000
heap
page read and write
4154A3E000
stack
page read and write
7FFD9B670000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
EFB000
heap
page read and write
1C720000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
11F5000
heap
page read and write
2A61000
trusted library allocation
page read and write
7FFD9B686000
trusted library allocation
page execute and read and write
16A69150000
heap
page read and write
1B47E000
stack
page read and write
16A67706000
heap
page read and write
1C3C76F5000
heap
page read and write
1AC7D000
stack
page read and write
AB9000
heap
page read and write
16A69797000
heap
page read and write
9B0000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
285F000
trusted library allocation
page read and write
116F000
stack
page read and write
1593B4F2000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
273AEFB000
stack
page read and write
6C292B9000
stack
page read and write
6C28F7E000
stack
page read and write
7FFD9B5EC000
trusted library allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
1593B690000
trusted library allocation
page read and write
CEC000
heap
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B5DD000
trusted library allocation
page execute and read and write
DB0000
heap
page read and write
16A01893000
trusted library allocation
page read and write
19B88498000
trusted library allocation
page read and write
1C3CAD19000
trusted library allocation
page read and write
1C3C7338000
heap
page read and write
1593E2B6000
trusted library allocation
page read and write
1593B53C000
heap
page read and write
1B270000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
19B891F8000
trusted library allocation
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
19B89305000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
E00000
trusted library allocation
page read and write
16A691F0000
heap
page execute and read and write
7FFD9B7A8000
trusted library allocation
page read and write
E7F000
heap
page read and write
CD6000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
6C2A08C000
stack
page read and write
9C909F8000
stack
page read and write
2BA0000
heap
page read and write
19BA089E000
heap
page read and write
7DF402FF0000
trusted library allocation
page execute and read and write
1593B522000
heap
page read and write
8E0000
unkown
page readonly
7FFD9B730000
trusted library allocation
page read and write
7FFD9B914000
trusted library allocation
page read and write
19B891D6000
trusted library allocation
page read and write
19B86830000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
12F48000
trusted library allocation
page read and write
E5F000
heap
page read and write
7FFD9B61C000
trusted library allocation
page execute and read and write
16A013C5000
trusted library allocation
page read and write
2B9E000
stack
page read and write
1205000
heap
page read and write
1315000
heap
page read and write
7FFD9B8E4000
trusted library allocation
page read and write
1B0BF000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
16A69AE5000
heap
page read and write
7FFD9B8E9000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1BF25000
stack
page read and write
7FFD9B6D0000
trusted library allocation
page execute and read and write
FE0000
heap
page read and write
BD1000
stack
page read and write
15955819000
heap
page read and write
16A6771C000
heap
page read and write
1C3E16E4000
heap
page read and write
7FFD9B750000
trusted library allocation
page execute and read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
12F43000
trusted library allocation
page read and write
19BA0AB0000
trusted library allocation
page read and write
1593D4AD000
trusted library allocation
page read and write
1C3CACCF000
trusted library allocation
page read and write
9C907FF000
stack
page read and write
16A004CD000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
7FFD9B640000
trusted library allocation
page read and write
7FFD9B771000
trusted library allocation
page read and write
1C124000
stack
page read and write
16A69BB0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
16A677AF000
heap
page read and write
19B88050000
trusted library allocation
page read and write
6C2953B000
stack
page read and write
1593CF90000
heap
page execute and read and write
7FFD9B5BD000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page read and write
9C90332000
stack
page read and write
273ACFA000
stack
page read and write
EAC000
heap
page read and write
DC0000
heap
page read and write
19B8873D000
trusted library allocation
page read and write
4155709000
stack
page read and write
19B867F7000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
1B37F000
stack
page read and write
1C3C76B0000
trusted library section
page read and write
2861000
trusted library allocation
page read and write
16A67704000
heap
page read and write
16A102ED000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
19B8951D000
trusted library allocation
page read and write
1C3CA842000
trusted library allocation
page read and write
9C903FE000
stack
page read and write
19B899F7000
trusted library allocation
page read and write
1593B350000
heap
page read and write
16A011AD000
trusted library allocation
page read and write
1BC0E000
stack
page read and write
415568D000
stack
page read and write
7FFD9B850000
trusted library allocation
page read and write
6C2A10E000
stack
page read and write
16A102F1000
trusted library allocation
page read and write
16A6770E000
heap
page read and write
9C90AFA000
stack
page read and write
1600000
heap
page read and write
16A676FB000
heap
page read and write
1593E1BA000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
1B4CD000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B59D000
trusted library allocation
page execute and read and write
19BA09C1000
heap
page read and write
7FFD9B5B3000
trusted library allocation
page execute and read and write
1593CFD0000
heap
page read and write
19B894C6000
trusted library allocation
page read and write
931000
stack
page read and write
7FFD9B60C000
trusted library allocation
page execute and read and write
7FFD9B5EC000
trusted library allocation
page execute and read and write
9C90A7D000
stack
page read and write
9C9067E000
stack
page read and write
1593B450000
heap
page read and write
19B8674A000
heap
page read and write
16A00D72000
trusted library allocation
page read and write
159557E4000
heap
page read and write
16A69B03000
heap
page read and write
6C28B7E000
stack
page read and write
1593D494000
trusted library allocation
page read and write
1C3E16DC000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1C3E13AC000
heap
page read and write
1C3C8D20000
trusted library allocation
page read and write
16A01123000
trusted library allocation
page read and write
15955844000
heap
page read and write
CF1000
heap
page read and write
1C3C72B0000
heap
page read and write
19B9857D000
trusted library allocation
page read and write
2660000
heap
page execute and read and write
15955764000
heap
page read and write
D30000
heap
page read and write
CB8000
heap
page read and write
7FFD9B5CD000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
C7E000
stack
page read and write
12A61000
trusted library allocation
page read and write
CD1000
heap
page read and write
1C3D9194000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
16A01254000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
19B9856D000
trusted library allocation
page read and write
16A012AC000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B741000
trusted library allocation
page read and write
1C3C738C000
heap
page read and write
1AFED000
stack
page read and write
28A0000
heap
page read and write
19B8A09A000
trusted library allocation
page read and write
7FFD9B761000
trusted library allocation
page read and write
F9D000
heap
page read and write
2A5E000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
16A69207000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
EB2000
heap
page read and write
7FFD9B5B4000
trusted library allocation
page read and write
16A69130000
trusted library allocation
page read and write
19B88260000
heap
page execute and read and write
7FFD9B8FC000
trusted library allocation
page read and write
DD0000
heap
page read and write
19B88FED000
trusted library allocation
page read and write
19B8963B000
trusted library allocation
page read and write
9C90779000
stack
page read and write
B7D4EE9000
stack
page read and write
7FFD9B750000
trusted library allocation
page read and write
16A67700000
heap
page read and write
7FFD9B593000
trusted library allocation
page execute and read and write
16A00F9D000
trusted library allocation
page read and write
7FFD9B8C3000
trusted library allocation
page read and write
19BA0994000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
15955810000
heap
page read and write
7FFD9B676000
trusted library allocation
page execute and read and write
16A690F0000
trusted library allocation
page read and write
19B880EE000
heap
page read and write
C70000
heap
page read and write
130B000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page execute and read and write
7FFD9B5A4000
trusted library allocation
page read and write
19BA06F0000
heap
page execute and read and write
B11000
stack
page read and write
273A5BF000
stack
page read and write
1210000
trusted library allocation
page read and write
7FFD9B60C000
trusted library allocation
page execute and read and write
7FFD9B5A2000
trusted library allocation
page read and write
7FFD9B918000
trusted library allocation
page read and write
16A676B0000
heap
page read and write
1C02A000
stack
page read and write
1C3CA018000
trusted library allocation
page read and write
12853000
trusted library allocation
page read and write
1C3C8D50000
heap
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
41547F9000
stack
page read and write
16A699C5000
heap
page read and write
19B891E7000
trusted library allocation
page read and write
19B891DF000
trusted library allocation
page read and write
273BB4E000
stack
page read and write
1C3E1708000
heap
page read and write
16A6770C000
heap
page read and write
7DF403000000
trusted library allocation
page execute and read and write
12A63000
trusted library allocation
page read and write
1C3E1980000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1594D2D3000
trusted library allocation
page read and write
7FFD9B5AD000
trusted library allocation
page execute and read and write
1B67E000
stack
page read and write
1595583D000
heap
page read and write
12F0000
heap
page read and write
7FFD9B7A2000
trusted library allocation
page read and write
15955466000
heap
page read and write
19B86708000
heap
page read and write
C90000
heap
page read and write
CEE000
heap
page read and write
2F4F000
trusted library allocation
page read and write
1593E2E9000
trusted library allocation
page read and write
F7C000
heap
page read and write
19B8A095000
trusted library allocation
page read and write
D50000
heap
page read and write
16A678C0000
heap
page read and write
15955630000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
19B86860000
heap
page readonly
7FFD9BA1D000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
19B89ADC000
trusted library allocation
page read and write
26EE000
stack
page read and write
7FFD9B890000
trusted library allocation
page read and write
1C3E16F2000
heap
page read and write
1C3C8F63000
trusted library allocation
page read and write
CE0000
heap
page read and write
1B90E000
stack
page read and write
16A697CC000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1595552D000
heap
page read and write
1225000
heap
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
FDD000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
1D368025000
heap
page read and write
9C908FD000
stack
page read and write
19B982A1000
trusted library allocation
page read and write
1C3C9C6E000
trusted library allocation
page read and write
2F30000
heap
page read and write
7DF45FA10000
trusted library allocation
page execute and read and write
12B0000
heap
page read and write
1C3D8F65000
trusted library allocation
page read and write
7FFD9B5A3000
trusted library allocation
page execute and read and write
159556A0000
heap
page read and write
A50000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1593B563000
heap
page read and write
19B98271000
trusted library allocation
page read and write
9E0000
heap
page read and write
1C3C8EB6000
heap
page execute and read and write
1D367D8F000
heap
page read and write
12858000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9BA0D000
trusted library allocation
page read and write
19B866F0000
trusted library section
page read and write
16A0130C000
trusted library allocation
page read and write
14EF000
stack
page read and write
16A69B0A000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
A60000
heap
page read and write
19B88CC3000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
19BA06F7000
heap
page execute and read and write
19B880D0000
heap
page read and write
19BA0870000
heap
page execute and read and write
19B882F8000
trusted library allocation
page read and write
1ADDD000
stack
page read and write
19BA0790000
heap
page read and write
273AB79000
stack
page read and write
2F20000
heap
page execute and read and write
7FFD9B904000
trusted library allocation
page read and write
7FFD9B5C3000
trusted library allocation
page execute and read and write
1CA1C000
stack
page read and write
1C3CA053000
trusted library allocation
page read and write
16A690D5000
heap
page read and write
16A00C06000
trusted library allocation
page read and write
A80000
unkown
page readonly
7FFD9B8D0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
19BA09EA000
heap
page read and write
7FF4C88F0000
trusted library allocation
page execute and read and write
ABD000
heap
page read and write
41549BB000
stack
page read and write
1C3C9AF6000
trusted library allocation
page read and write
1BCEE000
stack
page read and write
1C3E15B0000
heap
page read and write
19B89396000
trusted library allocation
page read and write
7FFD9B696000
trusted library allocation
page execute and read and write
6C2907D000
stack
page read and write
16A69ADC000
heap
page read and write
16A69740000
heap
page execute and read and write
126F8000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1C3C7342000
heap
page read and write
12BB1000
trusted library allocation
page read and write
E6A000
heap
page read and write
1C3E1340000
heap
page read and write
19B895FD000
trusted library allocation
page read and write
7FFD9B60C000
trusted library allocation
page execute and read and write
6C29F8D000
stack
page read and write
AB5000
heap
page read and write
1593B640000
trusted library allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
1593EBFF000
trusted library allocation
page read and write
19BA0890000
heap
page read and write
15955550000
heap
page read and write
7FFD9B5B4000
trusted library allocation
page read and write
1C3CA2BD000
trusted library allocation
page read and write
2701000
trusted library allocation
page read and write
9C90CFC000
stack
page read and write
2CB1000
trusted library allocation
page read and write
1594D001000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
19B86700000
heap
page read and write
273AE7E000
stack
page read and write
1C3C7320000
trusted library section
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
273ABF7000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page execute and read and write
7FFD9B8D0000
trusted library allocation
page read and write
1044000
heap
page read and write
E4C000
heap
page read and write
1C3C9F21000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
1BAEF000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1593DE6B000
trusted library allocation
page read and write
7FFD9B5BD000
trusted library allocation
page execute and read and write
16A69AB5000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
1593B700000
heap
page read and write
7FFD9B640000
trusted library allocation
page read and write
1C220000
heap
page read and write
7FFD9B676000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
16A0182D000
trusted library allocation
page read and write
7D1000
stack
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
19B9855E000
trusted library allocation
page read and write
F70000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B732000
trusted library allocation
page read and write
A20000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1593E764000
trusted library allocation
page read and write
7FFD9B5B4000
trusted library allocation
page read and write
19BA05FA000
heap
page read and write
1593E010000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B5CD000
trusted library allocation
page execute and read and write
7FFD9B5D0000
trusted library allocation
page read and write
16A0186C000
trusted library allocation
page read and write
1593CFD5000
heap
page read and write
19B86742000
heap
page read and write
1C3D8F11000
trusted library allocation
page read and write
1C3C8E80000
heap
page execute and read and write
7DF439D00000
trusted library allocation
page execute and read and write
19B895B7000
trusted library allocation
page read and write
1594D41E000
trusted library allocation
page read and write
1595584F000
heap
page read and write
415447E000
stack
page read and write
7FFD9B670000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
AE9000
heap
page read and write
1C3E13C8000
heap
page read and write
CE5000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
1B23E000
stack
page read and write
1593B6E0000
heap
page execute and read and write
7FFD9B5C2000
trusted library allocation
page read and write
19B86870000
heap
page read and write
6C28AF3000
stack
page read and write
1C3C8DF5000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page execute and read and write
16A69770000
heap
page execute and read and write
16A6978D000
heap
page read and write
19B86800000
heap
page read and write
7FFD9B670000
trusted library allocation
page execute and read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
16A690C0000
trusted library section
page read and write
10F1000
stack
page read and write
19B865B0000
heap
page read and write
1ABD0000
trusted library allocation
page read and write
19BA0A0A000
heap
page read and write
1593DFE4000
trusted library allocation
page read and write
415580E000
stack
page read and write
1B51E000
stack
page read and write
12A68000
trusted library allocation
page read and write
7FFD9B6A6000
trusted library allocation
page execute and read and write
1C3E0EF5000
heap
page read and write
A8A000
heap
page read and write
1C3E1387000
heap
page read and write
16A10011000
trusted library allocation
page read and write
19B89BC4000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
11F0000
heap
page read and write
101B000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
15954FE0000
heap
page read and write
7FFD9B92C000
trusted library allocation
page read and write
B7D4FEE000
stack
page read and write
1593B526000
heap
page read and write
2BA1000
trusted library allocation
page read and write
CB0000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
6C290F9000
stack
page read and write
1593B4D0000
trusted library allocation
page read and write
9C90B7F000
stack
page read and write
D40000
heap
page read and write
16A103A9000
trusted library allocation
page read and write
DC5000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1C3E14D0000
heap
page read and write
273B94C000
stack
page read and write
16A69110000
trusted library allocation
page read and write
C40000
heap
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
273BA49000
stack
page read and write
7FFD9B928000
trusted library allocation
page read and write
16A690E0000
trusted library section
page read and write
2EAE000
stack
page read and write
1200000
heap
page read and write
EFF000
heap
page read and write
1605000
heap
page read and write
6C2943C000
stack
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
1D367D40000
heap
page read and write
F00000
heap
page read and write
19B88020000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
19BA05B0000
heap
page read and write
7FFD9B5DB000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
19B982E5000
trusted library allocation
page read and write
7DF439D10000
trusted library allocation
page execute and read and write
7FFD9B5DB000
trusted library allocation
page read and write
2950000
heap
page execute and read and write
1594D2CE000
trusted library allocation
page read and write
D20000
heap
page read and write
9C90877000
stack
page read and write
415560D000
stack
page read and write
1C3C73B5000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
1C3C8DF0000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
19B8923E000
trusted library allocation
page read and write
15EF000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
B7D4F6F000
unkown
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
B10000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
990000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B59D000
trusted library allocation
page execute and read and write
1593B490000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1C2D0000
heap
page read and write
6C28BFE000
stack
page read and write
7FFD9B919000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
A80000
heap
page read and write
1593DD54000
trusted library allocation
page read and write
16A102F3000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
6C28FF7000
stack
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page execute and read and write
16A01956000
trusted library allocation
page read and write
19BA09C3000
heap
page read and write
B46000
heap
page read and write
9C906FE000
stack
page read and write
7FFD9B676000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
16A01340000
trusted library allocation
page read and write
273A9FE000
stack
page read and write
7FFD9B76A000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
415558E000
stack
page read and write
1240000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
19BA0952000
heap
page read and write
E82000
heap
page read and write
19BA0657000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
7FFD9B8A5000
trusted library allocation
page read and write
7FFD9B67C000
trusted library allocation
page execute and read and write
6C29237000
stack
page read and write
1190000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B730000
trusted library allocation
page read and write
12BA8000
trusted library allocation
page read and write
1C3C8EB0000
heap
page execute and read and write
1C3D91DE000
trusted library allocation
page read and write
1C3CACF4000
trusted library allocation
page read and write
19B880D5000
heap
page read and write
7FFD9B5C4000
trusted library allocation
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
1C3C72C0000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
1C3C7372000
heap
page read and write
7FFD9B696000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page read and write
1B9EE000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
980000
heap
page read and write
41548B7000
stack
page read and write
7FFD9B593000
trusted library allocation
page execute and read and write
1593B705000
heap
page read and write
1593B4C0000
trusted library section
page read and write
7FFD9B778000
trusted library allocation
page read and write
7FFD9B5CD000
trusted library allocation
page execute and read and write
7FFD9B7A8000
trusted library allocation
page read and write
1C3C8EE0000
heap
page read and write
1593D421000
trusted library allocation
page read and write
1593E104000
trusted library allocation
page read and write
11D0000
heap
page read and write
19B98565000
trusted library allocation
page read and write
19B8A075000
trusted library allocation
page read and write
1C3C9EF5000
trusted library allocation
page read and write
16A678C5000
heap
page read and write
1B12C000
stack
page read and write
6C291B7000
stack
page read and write
1593B565000
heap
page read and write
19B89B03000
trusted library allocation
page read and write
6C2933E000
stack
page read and write
6C2913E000
stack
page read and write
1593E1F3000
trusted library allocation
page read and write
CE0000
heap
page read and write
1593D208000
trusted library allocation
page read and write
1593E931000
trusted library allocation
page read and write
19B89363000
trusted library allocation
page read and write
7FFD9B730000
trusted library allocation
page read and write
12F8000
heap
page read and write
A8F000
heap
page read and write
E40000
heap
page read and write
4154938000
stack
page read and write
19B8673D000
heap
page read and write
6C2A009000
stack
page read and write
7FFD9B5A4000
trusted library allocation
page read and write
7FFD9B8E3000
trusted library allocation
page read and write
16A00085000
trusted library allocation
page read and write
1BBBF000
heap
page read and write
1593B5F0000
trusted library allocation
page read and write
7FFD9B5A2000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
19B86875000
heap
page read and write
E20000
heap
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
16A01095000
trusted library allocation
page read and write
1BB84000
heap
page read and write
7FFD9B5B4000
trusted library allocation
page read and write
F76000
heap
page read and write
16A69160000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page execute and read and write
16A102FB000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
27DE000
stack
page read and write
7FFD9B66C000
trusted library allocation
page execute and read and write
1B540000
heap
page execute and read and write
1593CFE1000
trusted library allocation
page read and write
16A01E25000
trusted library allocation
page read and write
16A00A52000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
19B8678A000
heap
page read and write
273AC78000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
16A01DE0000
trusted library allocation
page read and write
159554C3000
heap
page read and write
9E5000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
159556CA000
heap
page read and write
1B660000
heap
page execute and read and write
7FFD9B909000
trusted library allocation
page read and write
DA0000
heap
page read and write
E3F000
stack
page read and write
11A3000
heap
page read and write
1B4B0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
AA9000
heap
page read and write
1C51E000
stack
page read and write
16A00001000
trusted library allocation
page read and write
1C29F000
stack
page read and write
12CB1000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page execute and read and write
7FFD9B9BC000
trusted library allocation
page read and write
1593E0A1000
trusted library allocation
page read and write
1C3C76F0000
heap
page read and write
7FFD9B5D4000
trusted library allocation
page read and write
1C3CA204000
trusted library allocation
page read and write
7FFD9B77A000
trusted library allocation
page read and write
159556CE000
heap
page read and write
1B23E000
stack
page read and write
16A69A42000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B593000
trusted library allocation
page execute and read and write
7FFD9B5D0000
trusted library allocation
page read and write
7FFD9B5B2000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1BAF0000
heap
page read and write
16A0156F000
trusted library allocation
page read and write
1593B4B0000
trusted library section
page read and write
19B88271000
trusted library allocation
page read and write
2EF0000
heap
page execute and read and write
E33000
trusted library allocation
page read and write
1C3E1424000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1595582E000
heap
page read and write
7FFD9B6E5000
trusted library allocation
page execute and read and write
1C3D8F21000
trusted library allocation
page read and write
7FFD9B6A6000
trusted library allocation
page execute and read and write
1BA0F000
stack
page read and write
F34000
heap
page read and write
1B90E000
stack
page read and write
7FFD9B5EC000
trusted library allocation
page execute and read and write
16A67890000
heap
page read and write
19B86820000
trusted library section
page read and write
11A0000
heap
page read and write
1C3C76E0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
113E000
stack
page read and write
7FFD9B670000
trusted library allocation
page execute and read and write
7FFD9B5AB000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
9C90978000
stack
page read and write
1D367D80000
heap
page read and write
F10000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
4154BBC000
stack
page read and write
1C3C7330000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1593EE03000
trusted library allocation
page read and write
AB1000
heap
page read and write
1C3C9E91000
trusted library allocation
page read and write
16A69776000
heap
page execute and read and write
7FFD9B790000
trusted library allocation
page execute and read and write
16A0102F000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1C3CA175000
trusted library allocation
page read and write
7FFD9B8F3000
trusted library allocation
page read and write
7FFD9B646000
trusted library allocation
page read and write
1B80F000
stack
page read and write
1C3CA75A000
trusted library allocation
page read and write
7FFD9B660000
trusted library allocation
page read and write
ABB000
heap
page read and write
273A533000
stack
page read and write
16A0115E000
trusted library allocation
page read and write
7FFD9BA06000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
1B310000
heap
page execute and read and write
12B5000
heap
page read and write
FB1000
heap
page read and write
16A690A0000
heap
page read and write
16A01E06000
trusted library allocation
page read and write
1BB0E000
stack
page read and write
1594CFE1000
trusted library allocation
page read and write
16A01954000
trusted library allocation
page read and write
FA5000
heap
page read and write
1BB60000
heap
page read and write
7FFD9B91C000
trusted library allocation
page read and write
9C918CD000
stack
page read and write
7FFD9B890000
trusted library allocation
page read and write
1C3C9943000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
16A678D0000
heap
page read and write
7FFD9B8F8000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
273A5FE000
stack
page read and write
1C3CA781000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
19B8941F000
trusted library allocation
page read and write
9C9174D000
stack
page read and write
19B86850000
trusted library allocation
page read and write
EAE000
stack
page read and write
15955493000
heap
page read and write
B60000
heap
page read and write
2851000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page execute and read and write
159556C6000
heap
page read and write
7FFD9B676000
trusted library allocation
page execute and read and write
16A698A0000
heap
page read and write
16A676C8000
heap
page read and write
1593DA32000
trusted library allocation
page read and write
1B8EE000
stack
page read and write
415483E000
stack
page read and write
9C916CE000
stack
page read and write
1C71A000
stack
page read and write
2840000
heap
page execute and read and write
7FFD9B8E0000
trusted library allocation
page read and write
1C3C72E0000
heap
page read and write
19BA0683000
heap
page read and write
12BA1000
trusted library allocation
page read and write
273B9CE000
stack
page read and write
7FFD9B5C3000
trusted library allocation
page execute and read and write
415467F000
stack
page read and write
7FFD9B5AD000
trusted library allocation
page execute and read and write
1594D2ED000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page execute and read and write
9C90BFE000
stack
page read and write
7FFD9B890000
trusted library allocation
page read and write
1C3CA1A2000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1593B430000
heap
page read and write
19B86786000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
19BA061F000
heap
page read and write
12F41000
trusted library allocation
page read and write
7FFD9B5CB000
trusted library allocation
page read and write
159556DA000
heap
page read and write
9C917CD000
stack
page read and write
1593CFB0000
heap
page read and write
A7F000
heap
page read and write
1230000
trusted library allocation
page read and write
16A69D00000
heap
page read and write
1357000
heap
page read and write
EAE000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
1C3C8EF1000
trusted library allocation
page read and write
19B98563000
trusted library allocation
page read and write
1B130000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
A58000
heap
page read and write
16A676C0000
heap
page read and write
7FFD9B5A4000
trusted library allocation
page read and write
F16000
heap
page read and write
19B891DA000
trusted library allocation
page read and write
1C3D91EC000
trusted library allocation
page read and write
1C3C9119000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
1593B568000
heap
page read and write
273A87F000
stack
page read and write
9C91849000
stack
page read and write
103C000
stack
page read and write
7FFD9B59D000
trusted library allocation
page execute and read and write
7FFD9B5C2000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1C3C7376000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
1593B51C000
heap
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
2570000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1593B6E7000
heap
page execute and read and write
16A102A3000
trusted library allocation
page read and write
1B61E000
stack
page read and write
12FC000
stack
page read and write
16A01787000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
19B86746000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
7FFD9B696000
trusted library allocation
page execute and read and write
7FFD9B740000
trusted library allocation
page read and write
1BB96000
heap
page read and write
7FFD9B676000
trusted library allocation
page read and write
6C294BE000
stack
page read and write
AE7000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
26D0000
heap
page read and write
7DF4C0950000
trusted library allocation
page execute and read and write
19B892A6000
trusted library allocation
page read and write
11B0000
heap
page read and write
1C3E1698000
heap
page read and write
15955704000
heap
page read and write
159557B5000
heap
page read and write
7FFD9B660000
trusted library allocation
page execute and read and write
7FFD9B772000
trusted library allocation
page read and write
1C3C8D60000
trusted library allocation
page read and write
16A697D7000
heap
page read and write
1C3C73BA000
heap
page read and write
1594D2DD000
trusted library allocation
page read and write
7FFD9B8F3000
trusted library allocation
page read and write
19B98291000
trusted library allocation
page read and write
1C3C9F8A000
trusted library allocation
page read and write
2B5F000
stack
page read and write
1593E84A000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
7FFD9B66C000
trusted library allocation
page execute and read and write
7FFD9B6D0000
trusted library allocation
page execute and read and write
7FFD9B730000
trusted library allocation
page read and write
16A01003000
trusted library allocation
page read and write
7FFD9B590000
trusted library allocation
page read and write
16A67744000
heap
page read and write
19B86748000
heap
page read and write
415580C000
stack
page read and write
1593EDBE000
trusted library allocation
page read and write
273AAFD000
stack
page read and write
16A690D0000
heap
page read and write
7FFD9B5B3000
trusted library allocation
page execute and read and write
1593E3A5000
trusted library allocation
page read and write
415578C000
stack
page read and write
1C3C7690000
heap
page read and write
16A69120000
heap
page readonly
1594D2D5000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
1594D2DB000
trusted library allocation
page read and write
16A69780000
heap
page read and write
1046000
heap
page read and write
2CAF000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page execute and read and write
159556D6000
heap
page read and write
FDB000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
7FFD9B5B3000
trusted library allocation
page execute and read and write
7FFD9B928000
trusted library allocation
page read and write
A30000
heap
page read and write
16A67748000
heap
page read and write
19BA05EF000
heap
page read and write
1C3E17B0000
trusted library allocation
page read and write
19B891D2000
trusted library allocation
page read and write
A8C000
heap
page read and write
7FFD9B61C000
trusted library allocation
page execute and read and write
9C90C7E000
stack
page read and write
19B89450000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
16A10074000
trusted library allocation
page read and write
19B88090000
trusted library allocation
page read and write
1C3E16A9000
heap
page read and write
19B8957F000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
41544FE000
stack
page read and write
19BA09F6000
heap
page read and write
7FFD9B5C2000
trusted library allocation
page read and write
6C28EF9000
stack
page read and write
1D367D88000
heap
page read and write
1B57F000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
C50000
heap
page read and write
7FFD9B64C000
trusted library allocation
page execute and read and write
980000
heap
page read and write
25B0000
heap
page execute and read and write
7FFD9B798000
trusted library allocation
page read and write
273B8CE000
stack
page read and write
1B21E000
stack
page read and write
132D000
heap
page read and write
7FFD9BA16000
trusted library allocation
page read and write
12CB3000
trusted library allocation
page read and write
1C3D91E2000
trusted library allocation
page read and write
7FFD9B5BD000
trusted library allocation
page execute and read and write
25E0000
heap
page read and write
1C3C8D90000
trusted library allocation
page read and write
7FFD9B592000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
1160000
heap
page execute and read and write
107E000
stack
page read and write
1593EE08000
trusted library allocation
page read and write
7FFD9B92C000
trusted library allocation
page read and write
7FFD9B771000
trusted library allocation
page read and write
1C3CA0CE000
trusted library allocation
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
7FFD9B5AD000
trusted library allocation
page execute and read and write
9C9194E000
stack
page read and write
1C3E13E5000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
1593B524000
heap
page read and write
1B7EE000
stack
page read and write
126F3000
trusted library allocation
page read and write
1C3D8EF1000
trusted library allocation
page read and write
1C3D91FC000
trusted library allocation
page read and write
1C3C9F57000
trusted library allocation
page read and write
1C3D91EA000
trusted library allocation
page read and write
19BA092B000
heap
page read and write
19B88E81000
trusted library allocation
page read and write
19BA05E9000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
CF1000
stack
page read and write
1C3CAD14000
trusted library allocation
page read and write
CCC000
heap
page read and write
7FFD9B593000
trusted library allocation
page execute and read and write
7FFD9B666000
trusted library allocation
page read and write
1593B4E0000
heap
page read and write
1C3C76C0000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
7FFD9B5C4000
trusted library allocation
page read and write
A75000
heap
page read and write
2DA9000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
6C29F0E000
stack
page read and write
1D367D60000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
16A10001000
trusted library allocation
page read and write
415457F000
stack
page read and write
DD0000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B5C4000
trusted library allocation
page read and write
F70000
heap
page read and write
1D367D30000
heap
page read and write
7FFD9B925000
trusted library allocation
page read and write
7FFD9B594000
trusted library allocation
page read and write
7DF4C0940000
trusted library allocation
page execute and read and write
2F51000
trusted library allocation
page read and write
15955430000
heap
page read and write
7FFD9B5B2000
trusted library allocation
page read and write
7FFD9B666000
trusted library allocation
page read and write
1C3C73B3000
heap
page read and write
19BA0A01000
heap
page read and write
There are 1095 hidden memdumps, click here to show them.