IOC Report
9GlCWW6bXc.exe

loading gif

Files

File Path
Type
Category
Malicious
9GlCWW6bXc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0e1ks4eg.fd3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajcbmm4m.zob.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bm5tmmkk.i5m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejgd20co.txd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fpfgkjkl.h3y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hre4qeyf.m3z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwudrs30.oet.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jn0zgzut.cm2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jus5jvk0.spt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o233mgxr.4li.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ozyyzhme.iao.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtvekrnf.lmi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uav1cyzz.mxj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v4avkrma.pwf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xe4tdkqj.0r5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmcqgsxj.cco.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Nov 17 17:21:59 2024, mtime=Sun Nov 17 17:21:59 2024, atime=Sun Nov 17 17:21:59 2024, length=261120, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9GlCWW6bXc.exe
"C:\Users\user\Desktop\9GlCWW6bXc.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\9GlCWW6bXc.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9GlCWW6bXc.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
23.ip.gl.ply.gg
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
23.ip.gl.ply.gg
147.185.221.23

IPs

IP
Domain
Country
Malicious
147.185.221.23
23.ip.gl.ply.gg
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost

Memdumps

Base Address
Regiontype
Protect
Malicious
4A2000
unkown
page readonly
malicious
127C8000
trusted library allocation
page read and write
malicious
277C7A4B000
heap
page read and write
A10000
trusted library allocation
page read and write
277C7685000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
7DF4D08E0000
trusted library allocation
page execute and read and write
22AAC6C2000
trusted library allocation
page read and write
1BFCE000
stack
page read and write
277C79AF000
heap
page read and write
27B0000
heap
page read and write
7FF849083000
trusted library allocation
page read and write
7FF848ED2000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
25606F60000
heap
page read and write
F32773E000
stack
page read and write
277B0A8A000
trusted library allocation
page read and write
EF2443E000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
8350C0E000
stack
page read and write
A96000
heap
page read and write
1B3158C0000
heap
page read and write
277C7A55000
heap
page read and write
22AC3C72000
heap
page read and write
1AC3D000
stack
page read and write
25606FA2000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
22AAB9C9000
trusted library allocation
page read and write
7FF848D5B000
trusted library allocation
page read and write
1422000
heap
page read and write
25609DDD000
trusted library allocation
page read and write
277AF200000
trusted library allocation
page read and write
1B318641000
trusted library allocation
page read and write
F3274BE000
stack
page read and write
580000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
277B1043000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
1B32FC0A000
heap
page read and write
25618D3D000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
25620EA7000
heap
page read and write
22AC3C06000
heap
page execute and read and write
7FF848E06000
trusted library allocation
page read and write
1B315B16000
heap
page execute and read and write
7FF8490A9000
trusted library allocation
page read and write
12F1000
stack
page read and write
A00000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
22AAC463000
trusted library allocation
page read and write
256099E9000
trusted library allocation
page read and write
1AF4E000
stack
page read and write
F32848C000
stack
page read and write
7FF8491B0000
trusted library allocation
page read and write
25609B14000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
E02000
heap
page read and write
1B327787000
trusted library allocation
page read and write
22AAD57B000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7DF46AD60000
trusted library allocation
page execute and read and write
7FF849070000
trusted library allocation
page read and write
7DF4D08C0000
trusted library allocation
page execute and read and write
2562122B000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF8490B5000
trusted library allocation
page read and write
EF23E7E000
stack
page read and write
7FF849180000
trusted library allocation
page execute and read and write
25608C7A000
trusted library allocation
page read and write
EF240F8000
stack
page read and write
25606F7F000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1B31735F000
heap
page read and write
1B318740000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
256099EF000
trusted library allocation
page read and write
8350A0C000
stack
page read and write
12811000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
25606F55000
heap
page read and write
25621261000
heap
page read and write
1B315880000
heap
page read and write
29AC000
trusted library allocation
page read and write
22AAC6CE000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1B3187D6000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
F32830E000
stack
page read and write
22AC3D5C000
heap
page read and write
142D000
heap
page read and write
25620EAF000
heap
page read and write
22AA9D75000
heap
page read and write
22AAC6D7000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1B318095000
trusted library allocation
page read and write
277BF526000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
A43000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849083000
trusted library allocation
page read and write
25606FBE000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
22AA9AB0000
trusted library section
page read and write
7FF848F00000
trusted library allocation
page read and write
EF24F8A000
stack
page read and write
7FF8490BA000
trusted library allocation
page read and write
256210DE000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
22AC3DC2000
heap
page read and write
1B555000
heap
page read and write
277BF241000
trusted library allocation
page read and write
1B32F905000
heap
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
277B05E5000
trusted library allocation
page read and write
1B317480000
heap
page execute and read and write
7FF848E70000
trusted library allocation
page execute and read and write
25618D38000
trusted library allocation
page read and write
1B327797000
trusted library allocation
page read and write
277AFC73000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
17CF000
stack
page read and write
7FF848EF2000
trusted library allocation
page read and write
277C7910000
heap
page read and write
590000
unkown
page readonly
22AAB97A000
trusted library allocation
page read and write
22AAC92F000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
F327479000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
277AD75F000
heap
page read and write
1B317491000
trusted library allocation
page read and write
25618A81000
trusted library allocation
page read and write
277AF100000
trusted library allocation
page read and write
25609BB3000
trusted library allocation
page read and write
A00000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
1B31750C000
trusted library allocation
page read and write
834FAF7000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
277AF050000
heap
page readonly
277B09A5000
trusted library allocation
page read and write
7FF848F02000
trusted library allocation
page read and write
22AAC879000
trusted library allocation
page read and write
22AA9A90000
heap
page read and write
63BD547000
stack
page read and write
1B4CE000
stack
page read and write
7FF848EF2000
trusted library allocation
page read and write
277AD9D0000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
277C76EF000
heap
page read and write
22AA9D70000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
1B315BA0000
heap
page read and write
1B32FAD0000
trusted library allocation
page read and write
25620F90000
heap
page execute and read and write
F32717D000
stack
page read and write
7FF8490BC000
trusted library allocation
page read and write
22AA9B13000
heap
page read and write
F327539000
stack
page read and write
7FF849160000
trusted library allocation
page execute and read and write
1C402000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B315888000
heap
page read and write
A38000
heap
page read and write
22AA9A50000
heap
page read and write
7FF848EE2000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
25609C31000
trusted library allocation
page read and write
22AACA8F000
trusted library allocation
page read and write
1C6FF000
stack
page read and write
8350B09000
stack
page read and write
8350A8D000
stack
page read and write
7FF848D52000
trusted library allocation
page read and write
256070A0000
trusted library allocation
page read and write
EF2508C000
stack
page read and write
7FF848F0A000
trusted library allocation
page read and write
22AA9B56000
heap
page read and write
834FA7E000
stack
page read and write
22ABB751000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
25618D3F000
trusted library allocation
page read and write
7FF848D42000
trusted library allocation
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
7FF848D50000
trusted library allocation
page read and write
7FF848D6B000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
22AAC6B5000
trusted library allocation
page read and write
1B3158BE000
heap
page read and write
7FF849094000
trusted library allocation
page read and write
1B31849F000
trusted library allocation
page read and write
277AF160000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1B32FB95000
heap
page read and write
1B3277E7000
trusted library allocation
page read and write
25618D57000
trusted library allocation
page read and write
EF2407D000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
834FB7D000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
25620FE0000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
22AC3B36000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
277AD6AD000
heap
page read and write
D30000
heap
page read and write
F327279000
stack
page read and write
1B3158BB000
heap
page read and write
25609DE3000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B32FC8F000
heap
page read and write
277BF57B000
trusted library allocation
page read and write
1B3274A0000
trusted library allocation
page read and write
7FF848F01000
trusted library allocation
page read and write
22AAB3A0000
trusted library allocation
page read and write
25608A51000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
A46000
heap
page read and write
7FF848E06000
trusted library allocation
page read and write
277C7948000
heap
page read and write
7FF848F0A000
trusted library allocation
page read and write
22AACFE3000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1B315AE0000
trusted library allocation
page read and write
1B578000
heap
page read and write
F32850E000
stack
page read and write
63BC6F7000
stack
page read and write
63BD64C000
stack
page read and write
1B3176B8000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
277BF251000
trusted library allocation
page read and write
25621229000
heap
page read and write
834FD39000
stack
page read and write
1B319272000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
22AAB460000
heap
page read and write
B02000
heap
page read and write
A51000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
25606EB0000
heap
page read and write
25620E83000
heap
page read and write
F327638000
stack
page read and write
299F000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
277B090F000
trusted library allocation
page read and write
22AAB641000
heap
page read and write
25621272000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
25618D47000
trusted library allocation
page read and write
17D0000
heap
page read and write
EF243BF000
stack
page read and write
1B3CE000
stack
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
25620EDD000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
22AAB3C0000
trusted library allocation
page read and write
A65000
heap
page read and write
277B0343000
trusted library allocation
page read and write
22AAB751000
trusted library allocation
page read and write
25620DE0000
heap
page read and write
EC5000
heap
page read and write
7FF849011000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
22AC3C7C000
heap
page read and write
1B32F90D000
heap
page read and write
1B315860000
trusted library allocation
page read and write
1B315B95000
heap
page read and write
63BC97C000
stack
page read and write
1BEC0000
heap
page read and write
2D87000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
22AAB606000
heap
page read and write
1B3274FF000
trusted library allocation
page read and write
22AC3D40000
heap
page read and write
277AFF8F000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
2790000
heap
page execute and read and write
1413000
heap
page read and write
1280B000
trusted library allocation
page read and write
25620DE3000
heap
page read and write
1B3157C0000
heap
page read and write
1B32FC6F000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
277B02B4000
trusted library allocation
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
1B318D25000
trusted library allocation
page read and write
22AAD556000
trusted library allocation
page read and write
1B32F8B0000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
22AC3C34000
heap
page read and write
1370000
heap
page read and write
63BC2FE000
stack
page read and write
277ADA10000
heap
page read and write
133A1000
trusted library allocation
page read and write
25606F50000
heap
page read and write
277AD620000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1B32F9B0000
heap
page read and write
256088E0000
trusted library allocation
page read and write
25606F10000
heap
page read and write
63BC8FE000
stack
page read and write
22AAB465000
heap
page read and write
7FF848F28000
trusted library allocation
page read and write
22AAC6CA000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
7FF8490A2000
trusted library allocation
page read and write
7DF47FCC0000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
1454000
heap
page read and write
1B0E3000
heap
page read and write
256070C0000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1A7F0000
trusted library allocation
page read and write
7FF848D6B000
trusted library allocation
page read and write
277B02E0000
trusted library allocation
page read and write
1B31852E000
trusted library allocation
page read and write
1C7FE000
stack
page read and write
277B052A000
trusted library allocation
page read and write
277BF516000
trusted library allocation
page read and write
277C76AF000
heap
page read and write
1B80F000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF849099000
trusted library allocation
page read and write
22AC3C4C000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848DF0000
trusted library allocation
page execute and read and write
7FF8490A9000
trusted library allocation
page read and write
22AA9B54000
heap
page read and write
AC4000
heap
page read and write
63BC9FE000
stack
page read and write
22AC3C10000
heap
page execute and read and write
63BBFFF000
stack
page read and write
1B315B90000
heap
page read and write
7FF848D53000
trusted library allocation
page execute and read and write
22AC3C48000
heap
page read and write
277B0432000
trusted library allocation
page read and write
1AE1D000
stack
page read and write
25621122000
heap
page read and write
834FE3E000
stack
page read and write
22AACED7000
trusted library allocation
page read and write
1B32F8AE000
heap
page read and write
63BC5FD000
stack
page read and write
7FF8490A8000
trusted library allocation
page read and write
2560A1D9000
trusted library allocation
page read and write
2560A3A6000
trusted library allocation
page read and write
277B1023000
trusted library allocation
page read and write
277AF6ED000
trusted library allocation
page read and write
277BF221000
trusted library allocation
page read and write
25620F87000
heap
page execute and read and write
22AAD576000
trusted library allocation
page read and write
277B04C8000
trusted library allocation
page read and write
127C1000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
22AAD0A4000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
5A0000
heap
page read and write
22AAB3B0000
heap
page readonly
EF23FF7000
stack
page read and write
EF23F7E000
stack
page read and write
9E0000
trusted library allocation
page read and write
13E0000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
A0B000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
25607100000
heap
page read and write
277AFF98000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
25606ED0000
heap
page read and write
EF2433E000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
22AACA5B000
trusted library allocation
page read and write
1B315850000
trusted library section
page read and write
1B3158EE000
heap
page read and write
22AC3DA6000
heap
page read and write
277AF1D0000
heap
page execute and read and write
22AA9D60000
trusted library allocation
page read and write
5C0000
heap
page read and write
277C7223000
heap
page read and write
1B327491000
trusted library allocation
page read and write
834FC3E000
stack
page read and write
A28000
heap
page read and write
1B32FA90000
heap
page execute and read and write
2810000
trusted library allocation
page read and write
25606F68000
heap
page read and write
22ABB7BE000
trusted library allocation
page read and write
256213C0000
heap
page read and write
7FF848F38000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
277AF449000
trusted library allocation
page read and write
1B32FC84000
heap
page read and write
25620FC0000
heap
page read and write
F32838B000
stack
page read and write
1502000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
2560A2BE000
trusted library allocation
page read and write
BA5000
heap
page read and write
25618D45000
trusted library allocation
page read and write
7FF8490A4000
trusted library allocation
page read and write
1B31795D000
trusted library allocation
page read and write
A77000
heap
page read and write
22AA9B17000
heap
page read and write
1B317470000
heap
page read and write
22AA9AC0000
trusted library section
page read and write
277B0224000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7FF8490A9000
trusted library allocation
page read and write
1B318C19000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848E06000
trusted library allocation
page read and write
1B32FB0C000
heap
page read and write
22ABBA44000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
2560A832000
trusted library allocation
page read and write
AD5000
heap
page read and write
277C7A44000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
1360000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
1D0FE000
stack
page read and write
1451000
heap
page read and write
EF23AF3000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
143C000
heap
page read and write
EF25009000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
133A8000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848F32000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
25618ABF000
trusted library allocation
page read and write
14C1000
heap
page read and write
7FF8490A4000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
22AAC6BD000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
277AD670000
heap
page read and write
1B2A0000
heap
page execute and read and write
22AA9AD0000
heap
page read and write
25621257000
heap
page read and write
22AAC814000
trusted library allocation
page read and write
1B32FBF2000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B3158EB000
heap
page read and write
1B32FBF8000
heap
page read and write
F02000
heap
page read and write
7FF8491D0000
trusted library allocation
page read and write
277C767A000
heap
page read and write
22AC3C44000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
1B31589E000
heap
page read and write
A25000
heap
page read and write
7FF849011000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
F327377000
stack
page read and write
7FF848D63000
trusted library allocation
page read and write
1BBCA000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
F32783C000
stack
page read and write
2560A877000
trusted library allocation
page read and write
1B32F8BB000
heap
page read and write
834F5F2000
stack
page read and write
990000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
22AABC1F000
trusted library allocation
page read and write
F32828C000
stack
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
7FF848D53000
trusted library allocation
page execute and read and write
7FF848E26000
trusted library allocation
page execute and read and write
834FBF9000
stack
page read and write
8F1000
stack
page read and write
22AC3D27000
heap
page read and write
2560A87C000
trusted library allocation
page read and write
AFE000
heap
page read and write
277B01C1000
trusted library allocation
page read and write
1B315840000
trusted library section
page read and write
7FF848EE0000
trusted library allocation
page read and write
2562112B000
heap
page read and write
7FF8490B2000
trusted library allocation
page read and write
63BD4CB000
stack
page read and write
22AA9B19000
heap
page read and write
277AD6B9000
heap
page read and write
1802000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
AE0000
heap
page read and write
277B0AB0000
trusted library allocation
page read and write
F3276BE000
stack
page read and write
7DF4D08D0000
trusted library allocation
page execute and read and write
7FF8491A0000
trusted library allocation
page read and write
1C210000
heap
page read and write
277AF165000
heap
page read and write
7FF8490B2000
trusted library allocation
page read and write
277AD600000
heap
page read and write
EF23EF9000
stack
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
22AAC6C6000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
22AAD531000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
129A3000
trusted library allocation
page read and write
25606FE6000
heap
page read and write
1B3185BC000
trusted library allocation
page read and write
7FF8490BA000
trusted library allocation
page read and write
22AC3D56000
heap
page read and write
7FF849196000
trusted library allocation
page read and write
277C796E000
heap
page read and write
277C7A4D000
heap
page read and write
2562127F000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
63BBFB3000
stack
page read and write
1B319298000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
22AAB5D0000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
25608AD8000
trusted library allocation
page read and write
25618A71000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
834FEBF000
stack
page read and write
22AA9AD8000
heap
page read and write
277C7B30000
heap
page read and write
277C7A25000
heap
page read and write
2560963B000
trusted library allocation
page read and write
22AAB3F0000
trusted library allocation
page read and write
1B3187A2000
trusted library allocation
page read and write
22AC3DB8000
heap
page read and write
1BFFE000
stack
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
25621227000
heap
page read and write
22AAC1A3000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848F0A000
trusted library allocation
page read and write
1B318CFE000
trusted library allocation
page read and write
1B31595D000
heap
page read and write
1B56F000
heap
page read and write
1280E000
trusted library allocation
page read and write
22AC3C00000
heap
page execute and read and write
22AA9B2D000
heap
page read and write
1C60A000
stack
page read and write
1BB60000
heap
page execute and read and write
7FF849030000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
1BEFE000
stack
page read and write
1B32FC4E000
heap
page read and write
22AAC3A9000
trusted library allocation
page read and write
1B32F915000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
63BC679000
stack
page read and write
25607060000
trusted library allocation
page read and write
835098E000
stack
page read and write
25621248000
heap
page read and write
AE4000
heap
page read and write
25620EA3000
heap
page read and write
277B0470000
trusted library allocation
page read and write
DF0000
heap
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
1B07D000
stack
page read and write
AC2000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
BA0000
heap
page read and write
1B31855A000
trusted library allocation
page read and write
22ABBA3C000
trusted library allocation
page read and write
63BC3FE000
stack
page read and write
1B315BA5000
heap
page read and write
7DF4E3780000
trusted library allocation
page execute and read and write
129A8000
trusted library allocation
page read and write
277AF040000
trusted library allocation
page read and write
7DF46AD50000
trusted library allocation
page execute and read and write
33B1000
trusted library allocation
page read and write
22AAD075000
trusted library allocation
page read and write
1B327778000
trusted library allocation
page read and write
A20000
heap
page read and write
1B315A70000
trusted library allocation
page read and write
22AAC35D000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
25609A56000
trusted library allocation
page read and write
277C7913000
heap
page read and write
A13000
trusted library allocation
page read and write
277B0B13000
trusted library allocation
page read and write
25620E11000
heap
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
EF244BB000
stack
page read and write
277B0250000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
277B1048000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
277BF230000
trusted library allocation
page read and write
EF2413E000
stack
page read and write
834FCBC000
stack
page read and write
7FF848D70000
trusted library allocation
page read and write
25621109000
heap
page read and write
277AD683000
heap
page read and write
1B315B10000
heap
page execute and read and write
7FF848E36000
trusted library allocation
page execute and read and write
277C7743000
heap
page read and write
EAE000
stack
page read and write
1350000
heap
page read and write
1B32FC2F000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
22AC3B20000
heap
page read and write
277ADA00000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
DE0000
heap
page execute and read and write
22AC3E50000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
EF24F0C000
stack
page read and write
1B32FC58000
heap
page read and write
911000
stack
page read and write
7FF848D50000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
EC0000
heap
page read and write
7FF8490B8000
trusted library allocation
page read and write
F3271FF000
stack
page read and write
63BC778000
stack
page read and write
339F000
stack
page read and write
7FF848F34000
trusted library allocation
page read and write
1B3157B0000
heap
page read and write
7FF4B8710000
trusted library allocation
page execute and read and write
63BC37E000
stack
page read and write
25620FB0000
trusted library allocation
page read and write
22AC3C38000
heap
page read and write
1AE40000
heap
page execute and read and write
277C76B8000
heap
page read and write
1B318CBF000
trusted library allocation
page read and write
1B315A50000
trusted library allocation
page read and write
22AAC9FB000
trusted library allocation
page read and write
7FF84914C000
trusted library allocation
page read and write
EF241B7000
stack
page read and write
7FF849083000
trusted library allocation
page read and write
8350B8C000
stack
page read and write
A26000
heap
page read and write
13B0000
trusted library allocation
page read and write
1BAC5000
stack
page read and write
25606FAA000
heap
page read and write
A92000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
256210C0000
heap
page read and write
22AACB16000
trusted library allocation
page read and write
A4B000
heap
page read and write
277AF1D6000
heap
page execute and read and write
1B32FC69000
heap
page read and write
25618EBE000
trusted library allocation
page read and write
1B318674000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
1B32FC03000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
63BC6FE000
stack
page read and write
1B3184CB000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
834F8FE000
stack
page read and write
145C000
heap
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
7FF848D6D000
trusted library allocation
page execute and read and write
25607105000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
277C7990000
heap
page read and write
277AF0D0000
trusted library allocation
page read and write
7FF848F24000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF84915E000
trusted library allocation
page read and write
1400000
heap
page read and write
7FF8490B8000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848E06000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page execute and read and write
22AAC6B9000
trusted library allocation
page read and write
277AD759000
heap
page read and write
277AD6F4000
heap
page read and write
1C50D000
stack
page read and write
980000
heap
page read and write
7FF8490BC000
trusted library allocation
page read and write
22AA9B11000
heap
page read and write
1B318201000
trusted library allocation
page read and write
1B3157E0000
heap
page read and write
7DF47FCB0000
trusted library allocation
page execute and read and write
F3270FE000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF8490A4000
trusted library allocation
page read and write
2560A858000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
7FF848D54000
trusted library allocation
page read and write
63BC47A000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
970000
heap
page read and write
7FF848F38000
trusted library allocation
page read and write
950000
heap
page read and write
A13000
heap
page read and write
22AAB5F0000
heap
page read and write
25609D5E000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
7FF8490B8000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
133A3000
trusted library allocation
page read and write
22AAB471000
heap
page read and write
EF24E8F000
stack
page read and write
25609E1F000
trusted library allocation
page read and write
EF23BFE000
stack
page read and write
22AA9B59000
heap
page read and write
834F87E000
stack
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
834FF3E000
stack
page read and write
834FFBB000
stack
page read and write
22AC3DC4000
heap
page read and write
1B7CE000
stack
page read and write
63BC4FE000
stack
page read and write
25609B78000
trusted library allocation
page read and write
4B0000
unkown
page readonly
22AC3C40000
heap
page read and write
277AD6B3000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
F3272FE000
stack
page read and write
7FF84900D000
trusted library allocation
page read and write
1438000
heap
page read and write
7FF849143000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
277BF508000
trusted library allocation
page read and write
22AAB63A000
heap
page read and write
1B32777F000
trusted library allocation
page read and write
1B315A60000
heap
page readonly
22AAC968000
trusted library allocation
page read and write
7FF848F32000
trusted library allocation
page read and write
14AF000
heap
page read and write
7FF848D6B000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848D54000
trusted library allocation
page read and write
1B1EE000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
277C7800000
heap
page read and write
277B0FFE000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
F3273FD000
stack
page read and write
25608928000
heap
page read and write
1B32FBD6000
heap
page read and write
7FF848E10000
trusted library allocation
page execute and read and write
25620F80000
heap
page execute and read and write
1B32FC17000
heap
page read and write
277B0B72000
trusted library allocation
page read and write
1B32F92B000
heap
page read and write
1B6CE000
stack
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
1B315820000
heap
page read and write
25606DD0000
heap
page read and write
25618A51000
trusted library allocation
page read and write
277AF1E0000
heap
page execute and read and write
22AC3B45000
heap
page read and write
22AC3D88000
heap
page read and write
129A1000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF8490AC000
trusted library allocation
page read and write
256097B1000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
25607080000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848D34000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
1B315AA0000
trusted library allocation
page read and write
1B4D0000
heap
page read and write
63BC27E000
stack
page read and write
289E000
stack
page read and write
277C7907000
heap
page read and write
1B81D000
stack
page read and write
1B32F890000
heap
page read and write
25609AE8000
trusted library allocation
page read and write
277AD6B5000
heap
page read and write
277BF50E000
trusted library allocation
page read and write
25621157000
heap
page read and write
277AD752000
heap
page read and write
22AAB6A4000
heap
page read and write
A62000
heap
page read and write
1B31820A000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
277C79A6000
heap
page read and write
22AAB7D5000
trusted library allocation
page read and write
267E000
heap
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
277C76B6000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
AA8000
heap
page read and write
A40000
heap
page read and write
22AA9950000
heap
page read and write
7FF849170000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
277B03F9000
trusted library allocation
page read and write
22ABBA37000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1B3192B7000
trusted library allocation
page read and write
7FF848EFA000
trusted library allocation
page read and write
25620EAB000
heap
page read and write
1B32F966000
heap
page read and write
277AF221000
trusted library allocation
page read and write
7FF848F32000
trusted library allocation
page read and write
63BC7F9000
stack
page read and write
1B0E0000
heap
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
277AF210000
heap
page execute and read and write
277C79FB000
heap
page read and write
2562126D000
heap
page read and write
256094A3000
trusted library allocation
page read and write
22ABB771000
trusted library allocation
page read and write
EF23B7E000
stack
page read and write
7FF8490B5000
trusted library allocation
page read and write
22ABBA55000
trusted library allocation
page read and write
F3277BE000
stack
page read and write
4A0000
unkown
page readonly
AAF000
heap
page read and write
1425000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
1AFE000
stack
page read and write
7FF849073000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page execute and read and write
25620EB7000
heap
page read and write
277C7670000
heap
page read and write
A4B000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
7FF848D33000
trusted library allocation
page execute and read and write
834F9F9000
stack
page read and write
1B32777D000
trusted library allocation
page read and write
1B3192BC000
trusted library allocation
page read and write
22ABBA3E000
trusted library allocation
page read and write
25606F9E000
heap
page read and write
277C77E0000
heap
page read and write
7FF848F22000
trusted library allocation
page read and write
1456000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
277C78E0000
heap
page read and write
25606FA8000
heap
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
A2C000
heap
page read and write
22AA9A30000
heap
page read and write
F3275B9000
stack
page read and write
A2D000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
63BC87E000
stack
page read and write
2560A2E5000
trusted library allocation
page read and write
1C8FF000
stack
page read and write
256097CC000
trusted library allocation
page read and write
63BD6CC000
stack
page read and write
1B32FC75000
heap
page read and write
22AAC7E8000
trusted library allocation
page read and write
277C7903000
heap
page read and write
22AC3C3C000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
25609DDF000
trusted library allocation
page read and write
25620E50000
heap
page read and write
1B3274B1000
trusted library allocation
page read and write
1B3274C1000
trusted library allocation
page read and write
1B318089000
trusted library allocation
page read and write
277AF29A000
trusted library allocation
page read and write
63BCA7B000
stack
page read and write
7FF848F34000
trusted library allocation
page read and write
277AF0C0000
heap
page read and write
F32840C000
stack
page read and write
2562114C000
heap
page read and write
7FF848F01000
trusted library allocation
page read and write
277AD6CD000
heap
page read and write
22AACFBD000
trusted library allocation
page read and write
834FDB8000
stack
page read and write
25608F1D000
trusted library allocation
page read and write
7FF848F38000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1B318DE6000
trusted library allocation
page read and write
7FF848EF2000
trusted library allocation
page read and write
EF242B9000
stack
page read and write
25608A40000
heap
page execute and read and write
DAE000
stack
page read and write
256097C3000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848D50000
trusted library allocation
page read and write
22AA9B0D000
heap
page read and write
7FF848F01000
trusted library allocation
page read and write
7FF84904D000
trusted library allocation
page read and write
7FF848EF1000
trusted library allocation
page read and write
13F0000
heap
page execute and read and write
A48000
heap
page read and write
22AA9AE2000
heap
page read and write
25609BFD000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
1B3158E9000
heap
page read and write
25609CFD000
trusted library allocation
page read and write
63BC57B000
stack
page read and write
22AAB665000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
277AD5F0000
heap
page read and write
22ABB781000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page execute and read and write
13D0000
trusted library allocation
page read and write
22AAB740000
heap
page execute and read and write
63BD5CC000
stack
page read and write
834F97E000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
DCF000
stack
page read and write
25607090000
heap
page readonly
22AAC353000
trusted library allocation
page read and write
7FF8490BC000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1C20C000
stack
page read and write
7FF8491C0000
trusted library allocation
page read and write
2560A27F000
trusted library allocation
page read and write
22AC3F80000
heap
page read and write
277BF28F000
trusted library allocation
page read and write
277AF060000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
1902000
heap
page read and write
1B315B60000
heap
page read and write
1B31885B000
trusted library allocation
page read and write
22AC3C30000
heap
page read and write
1487000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
1B32FB00000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
25621199000
heap
page read and write
EF2510E000
stack
page read and write
1BCC4000
stack
page read and write
25609649000
trusted library allocation
page read and write
570000
heap
page read and write
A3E000
heap
page read and write
22AAB430000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
F32820F000
stack
page read and write
7DF4E3790000
trusted library allocation
page execute and read and write
EF2423A000
stack
page read and write
277BF50C000
trusted library allocation
page read and write
63BD44E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
277C79A0000
heap
page read and write
A91000
heap
page read and write
1B32FB1E000
heap
page read and write
1330000
heap
page read and write
277ADA15000
heap
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
1BC02000
heap
page read and write
25620E2A000
heap
page read and write
F327072000
stack
page read and write
25609A82000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
1B317EE1000
trusted library allocation
page read and write
There are 964 hidden memdumps, click here to show them.