IOC Report
OXhiMvksgM.exe

loading gif

Files

File Path
Type
Category
Malicious
OXhiMvksgM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\OXhiMvksgM.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\X.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\X.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_X.exe_2883bebedfe0a947abfaed60a9497f85b63fa3ab_10868351_ec699ee9-e9a8-460e-8bd9-cd651ef3aa8e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER635D.tmp.dmp
Mini DuMP crash report, 16 streams, Sun Nov 17 18:25:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6504.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6543.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\X.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Semo.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Oct 18 19:21:12 2024, mtime=Sat Nov 16 19:25:29 2024, atime=Sun Nov 10 22:05:12 2024, length=968192, window=hide
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_00fd4eos.t33.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_10v1h1h1.vja.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2mqi5pi0.hdf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5yanlcpp.fn2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fwx5cq5u.kd5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gapu0315.y0y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmrsoecl.u1a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kxybqzn5.3nd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogcykjou.cua.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skhan0r1.1qo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdvefrgy.iwg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y4tdsawi.k3i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\X.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Nov 17 17:24:38 2024, mtime=Sun Nov 17 17:24:39 2024, atime=Sun Nov 17 17:24:39 2024, length=62464, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OXhiMvksgM.exe
"C:\Users\user\Desktop\OXhiMvksgM.exe"
malicious
C:\Users\user\AppData\Local\Temp\X.exe
"C:\Users\user\AppData\Local\Temp\X.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\X.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\X.exe'
malicious
C:\Users\user\AppData\Roaming\X.exe
"C:\Users\user\AppData\Roaming\X.exe"
malicious
C:\Users\user\AppData\Roaming\X.exe
"C:\Users\user\AppData\Roaming\X.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 460 -p 7100 -ip 7100
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7100 -s 2088
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
activities-mustang.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.cou
unknown
http://upx.sf.net
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
activities-mustang.gl.at.ply.gg
147.185.221.22
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.22
activities-mustang.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
X
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
ProgramId
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
FileId
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
LowerCaseLongPath
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
LongPathHash
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
Name
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
OriginalFileName
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
Publisher
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
Version
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
BinFileVersion
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
BinaryType
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
ProductName
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
ProductVersion
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
LinkDate
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
BinProductVersion
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
AppxPackageFullName
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
AppxPackageRelativeId
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
Size
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
Language
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
24CC000
trusted library allocation
page read and write
malicious
6C2000
unkown
page readonly
malicious
7FFD34A30000
trusted library allocation
page read and write
280E000
stack
page read and write
7FFD34BD0000
trusted library allocation
page read and write
2BADA5FD000
heap
page read and write
2B277EC4000
heap
page read and write
7FFD34AC8000
trusted library allocation
page read and write
2B21006F000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
7DF4B03F0000
trusted library allocation
page execute and read and write
2B277D30000
heap
page read and write
7FFD34B80000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
1B223000
heap
page read and write
539000
heap
page read and write
1C967AF3000
heap
page read and write
910000
heap
page read and write
95B000
heap
page read and write
236E000
stack
page read and write
BD0000
trusted library allocation
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
7FFD34AD2000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
2BAC3921000
trusted library allocation
page read and write
1C94D9EC000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34830000
trusted library allocation
page execute and read and write
95D000
heap
page read and write
D4C000
heap
page read and write
C6846BE000
stack
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
1B68B000
stack
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
12691000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
438067D000
stack
page read and write
7FFD34AC0000
trusted library allocation
page read and write
60C000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
2680000
heap
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
7FFD347A2000
trusted library allocation
page read and write
7FFD34911000
trusted library allocation
page read and write
1C967BD8000
heap
page read and write
1C9504C7000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
52B000
heap
page read and write
2B210307000
trusted library allocation
page read and write
C683DFE000
stack
page read and write
1C967C1F000
heap
page read and write
4380ABB000
stack
page read and write
1C95066D000
trusted library allocation
page read and write
7FFD34B50000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page read and write
1B32E000
stack
page read and write
2BAC05ED000
heap
page read and write
C6844B9000
stack
page read and write
7FFD34774000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
1C951184000
trusted library allocation
page read and write
2BAC0570000
heap
page read and write
550000
heap
page read and write
99D000
heap
page read and write
1AEE0000
heap
page execute and read and write
7FFD3481C000
trusted library allocation
page execute and read and write
B00000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
43806F9000
stack
page read and write
1BCDE000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
1ADB0000
heap
page read and write
7FFD34BB0000
trusted library allocation
page read and write
1C967D10000
heap
page read and write
A20000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
676000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
2BAC2FB2000
trusted library allocation
page read and write
1C94D8C0000
heap
page read and write
A05000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
2BADA8AC000
heap
page read and write
1C69A000
stack
page read and write
870000
heap
page read and write
AC0000
heap
page read and write
2BAC3069000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
2B277B54000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
2BADA610000
heap
page read and write
2B277D92000
heap
page read and write
D60000
heap
page execute and read and write
2BADA8A8000
heap
page read and write
7FFD34942000
trusted library allocation
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
2B2777C0000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
438016D000
stack
page read and write
2B2759F0000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
2B210031000
trusted library allocation
page read and write
1C950392000
trusted library allocation
page read and write
7FFD347A3000
trusted library allocation
page read and write
7FFD34B30000
trusted library allocation
page read and write
578000
heap
page read and write
1C94F355000
heap
page read and write
1B5FE000
stack
page read and write
7FFD34B20000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
1C94D960000
heap
page read and write
2BAD2031000
trusted library allocation
page read and write
43804FA000
stack
page read and write
2BAC2020000
heap
page read and write
2BAC2259000
trusted library allocation
page read and write
2BAC1FF0000
heap
page execute and read and write
7F0000
trusted library allocation
page read and write
2BAC05DB000
heap
page read and write
54A000
heap
page read and write
C68407E000
stack
page read and write
1B24E000
stack
page read and write
EA2857A000
stack
page read and write
2401000
trusted library allocation
page read and write
7FFD34948000
trusted library allocation
page read and write
1C967B00000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
C68518E000
stack
page read and write
2BAC1FD0000
heap
page execute and read and write
2B277ECD000
heap
page read and write
510000
heap
page read and write
2B275AE7000
heap
page read and write
61F000
heap
page read and write
1B0000
heap
page read and write
285F000
heap
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
7FFD34932000
trusted library allocation
page read and write
7FFD34816000
trusted library allocation
page read and write
2BAC05D5000
heap
page read and write
7FFD34764000
trusted library allocation
page read and write
24AE000
stack
page read and write
2BAC0616000
heap
page read and write
1AFBB000
heap
page read and write
7FFD3491A000
trusted library allocation
page read and write
EA284F8000
stack
page read and write
2B201E03000
trusted library allocation
page read and write
2BAC2FA1000
trusted library allocation
page read and write
2B200C06000
trusted library allocation
page read and write
1AF9A000
heap
page read and write
2BAC2F94000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
7FFD3477B000
trusted library allocation
page read and write
1C94D8E0000
heap
page read and write
2B277B6B000
heap
page read and write
2B277710000
heap
page execute and read and write
7FFD34BC0000
trusted library allocation
page read and write
9A4000
heap
page read and write
7FFD34AB9000
trusted library allocation
page read and write
2BADA81F000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
970000
heap
page read and write
2BAC323F000
trusted library allocation
page read and write
2BAC1E60000
trusted library allocation
page read and write
7FFD3476D000
trusted library allocation
page execute and read and write
6D3000
heap
page read and write
2B2759D0000
heap
page read and write
534000
stack
page read and write
5E4000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
1B1BF000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
2B2780B0000
heap
page read and write
1AFE3000
heap
page read and write
2B277B21000
heap
page read and write
2B277D86000
heap
page read and write
EA28477000
stack
page read and write
1C95113A000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
2B275A4C000
heap
page read and write
1C95041D000
trusted library allocation
page read and write
2BADA930000
trusted library allocation
page read and write
6D2000
unkown
page readonly
4380A3E000
stack
page read and write
2BAC1F00000
heap
page read and write
7DF4DBDF0000
trusted library allocation
page execute and read and write
1C94F2D0000
heap
page execute and read and write
EA2867E000
stack
page read and write
576000
heap
page read and write
2B275A02000
heap
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
7FFD34856000
trusted library allocation
page execute and read and write
1B220000
heap
page read and write
2B275CB0000
heap
page read and write
760000
heap
page read and write
438158A000
stack
page read and write
262E000
stack
page read and write
29C1000
trusted library allocation
page read and write
C68453E000
stack
page read and write
2BAC05CC000
heap
page read and write
2B200228000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
2BAC30EE000
trusted library allocation
page read and write
A1E000
stack
page read and write
1C95063A000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
C684439000
stack
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
2B277E27000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
2BAC2FA5000
trusted library allocation
page read and write
129C8000
trusted library allocation
page read and write
643000
heap
page read and write
2B277B61000
heap
page read and write
1C94F82D000
trusted library allocation
page read and write
1C94DA36000
heap
page read and write
C68510E000
stack
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD34AB4000
trusted library allocation
page read and write
2BAC20B8000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
A01000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
1C95F3CF000
trusted library allocation
page read and write
43808B9000
stack
page read and write
7FFD34A70000
trusted library allocation
page read and write
2BAC0820000
heap
page read and write
1C94F3DB000
trusted library allocation
page read and write
2B275CB5000
heap
page read and write
438057F000
stack
page read and write
7FFD349D0000
trusted library allocation
page read and write
2BADA630000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
2B2102ED000
trusted library allocation
page read and write
1B58E000
stack
page read and write
7FFD34988000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
1C967C43000
heap
page read and write
2BADA85F000
heap
page read and write
24CA000
trusted library allocation
page read and write
7FFD34AF4000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
1C290000
heap
page read and write
2BADA8B1000
heap
page read and write
1C967873000
heap
page read and write
2B2102F7000
trusted library allocation
page read and write
770000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
1C950B87000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page execute and read and write
7DF4CD9D0000
trusted library allocation
page execute and read and write
2BAC2A83000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
CE2000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
7FFD34A80000
trusted library allocation
page read and write
EA292C9000
stack
page read and write
2B277D47000
heap
page read and write
7FFD3476D000
trusted library allocation
page execute and read and write
2BAC3898000
trusted library allocation
page read and write
438047F000
stack
page read and write
C60000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
2BAC0430000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
1B18D000
stack
page read and write
1C967BF2000
heap
page read and write
12401000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
600000
heap
page read and write
7FFD34912000
trusted library allocation
page read and write
1C94D940000
trusted library section
page read and write
2BADA859000
heap
page read and write
7FFD34C00000
trusted library allocation
page read and write
1B200000
heap
page read and write
7FFD34782000
trusted library allocation
page read and write
C68433F000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
2BAC3E56000
trusted library allocation
page read and write
2BAC2C42000
trusted library allocation
page read and write
1C95F648000
trusted library allocation
page read and write
1AF90000
heap
page read and write
EA2817E000
stack
page read and write
2B277BDC000
heap
page read and write
9F3000
heap
page read and write
2BADA512000
heap
page read and write
875000
heap
page read and write
EA283F9000
stack
page read and write
269C000
trusted library allocation
page read and write
2BADA4F7000
heap
page execute and read and write
1B8D1000
heap
page read and write
1C95044F000
trusted library allocation
page read and write
1B89E000
heap
page read and write
7FFD34B70000
trusted library allocation
page read and write
2B277ED7000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
2BAC061A000
heap
page read and write
1B3F0000
heap
page execute and read and write
7FFD34958000
trusted library allocation
page read and write
2BADA718000
heap
page read and write
2B275A75000
heap
page read and write
2B277604000
heap
page read and write
2B275A2C000
heap
page read and write
7FFD34AA3000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
2B277EBC000
heap
page read and write
2BAC1E90000
heap
page readonly
2B277D96000
heap
page read and write
7FFD34BAC000
trusted library allocation
page read and write
EA27D83000
stack
page read and write
1A9F0000
trusted library allocation
page read and write
2B275A0E000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
C68427D000
stack
page read and write
5B0000
heap
page read and write
B80000
heap
page read and write
7DE000
stack
page read and write
EA2877B000
stack
page read and write
1C94F361000
trusted library allocation
page read and write
7FFD34ACC000
trusted library allocation
page read and write
2BAD2336000
trusted library allocation
page read and write
7FFD34BC0000
trusted library allocation
page read and write
190000
heap
page read and write
2B277760000
trusted library allocation
page read and write
B2E000
stack
page read and write
2B277D82000
heap
page read and write
C68417E000
stack
page read and write
910000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page read and write
1BE18000
stack
page read and write
AF4000
stack
page read and write
965000
heap
page read and write
2BAD231E000
trusted library allocation
page read and write
438150C000
stack
page read and write
438168C000
stack
page read and write
1AFD4000
heap
page read and write
2B277B7F000
heap
page read and write
1C95F391000
trusted library allocation
page read and write
2B277DC9000
heap
page read and write
2BADA8A1000
heap
page read and write
1C967B98000
heap
page read and write
1AE3D000
stack
page read and write
2B200F9F000
trusted library allocation
page read and write
C6845BE000
stack
page read and write
7FFD34B7C000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD34BC6000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
1C94F280000
trusted library allocation
page read and write
43801EE000
stack
page read and write
2BADA824000
heap
page read and write
170000
heap
page read and write
2BAC1EA0000
trusted library allocation
page read and write
1B4FE000
stack
page read and write
7FFD34984000
trusted library allocation
page read and write
2B277D8A000
heap
page read and write
1C967CE0000
trusted library allocation
page read and write
1C95F370000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
1C95F6B0000
trusted library allocation
page read and write
1C9678AF000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
1B6FE000
stack
page read and write
1C967B73000
heap
page read and write
2B277B52000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
2BAC1F10000
trusted library allocation
page read and write
1C94D920000
heap
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
7FFD34880000
trusted library allocation
page execute and read and write
2B277C27000
heap
page execute and read and write
7FFD34922000
trusted library allocation
page read and write
2BADA787000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
1C94DA39000
heap
page read and write
2BAC2FA9000
trusted library allocation
page read and write
AA0000
heap
page execute and read and write
7FFD34940000
trusted library allocation
page execute and read and write
1C9678E2000
heap
page read and write
1C95F64F000
trusted library allocation
page read and write
2BADA72C000
heap
page read and write
2BAC306B000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
2B277B10000
heap
page read and write
2BADA896000
heap
page read and write
1C94D9EE000
heap
page read and write
1B7FE000
stack
page read and write
EA281FA000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
1C950577000
trusted library allocation
page read and write
2BADA03B000
heap
page read and write
2B277E07000
heap
page read and write
62B000
heap
page read and write
2BAC3335000
trusted library allocation
page read and write
7FFD34BF6000
trusted library allocation
page read and write
7FFD34AC9000
trusted library allocation
page read and write
1C967C30000
heap
page read and write
1A98D000
stack
page read and write
2B200D7D000
trusted library allocation
page read and write
1B87C000
heap
page read and write
7FFD34952000
trusted library allocation
page read and write
1C94D950000
trusted library section
page read and write
2B201DDE000
trusted library allocation
page read and write
1C967869000
heap
page read and write
7FFD34B00000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD3478D000
trusted library allocation
page execute and read and write
43809BF000
stack
page read and write
1C967826000
heap
page execute and read and write
2B200FA1000
trusted library allocation
page read and write
2B2004CB000
trusted library allocation
page read and write
1C94F2C0000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
2BADA720000
heap
page read and write
2B277BF1000
heap
page read and write
977000
heap
page read and write
7B0000
heap
page read and write
5B8000
heap
page read and write
1C95060A000
trusted library allocation
page read and write
7FFD34BF0000
trusted library allocation
page read and write
2BADA4F0000
heap
page execute and read and write
2BAC3206000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
7FFD34762000
trusted library allocation
page read and write
CB0000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
2BADA724000
heap
page read and write
7FFD34BC0000
trusted library allocation
page execute and read and write
7FFD34820000
trusted library allocation
page read and write
C68528E000
stack
page read and write
2BADAAD0000
heap
page read and write
1B38E000
stack
page read and write
7FFD347BC000
trusted library allocation
page execute and read and write
2BAC05A2000
heap
page read and write
2B275C40000
trusted library allocation
page read and write
1C967AA0000
heap
page execute and read and write
7FFD3479D000
trusted library allocation
page execute and read and write
2BAC2FAE000
trusted library allocation
page read and write
2B277E2B000
heap
page read and write
930000
heap
page read and write
1C94D9B0000
heap
page read and write
2B201951000
trusted library allocation
page read and write
2B2102F5000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
C68538E000
stack
page read and write
2BAC3151000
trusted library allocation
page read and write
C683CF3000
stack
page read and write
2BADA878000
heap
page read and write
1C95F64D000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34AF9000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD34876000
trusted library allocation
page execute and read and write
7FFD34880000
trusted library allocation
page execute and read and write
C6840F9000
stack
page read and write
2B277D60000
heap
page read and write
2BADA514000
heap
page read and write
1B800000
heap
page read and write
936000
heap
page read and write
2B2010BC000
trusted library allocation
page read and write
EA291CD000
stack
page read and write
66E000
heap
page read and write
2B201890000
trusted library allocation
page read and write
580000
heap
page read and write
BF0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
2B2775B0000
heap
page execute and read and write
1C94D965000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD3495A000
trusted library allocation
page read and write
2B277C20000
heap
page execute and read and write
2B2004CD000
trusted library allocation
page read and write
2B2011D5000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
1C95F381000
trusted library allocation
page read and write
2BAC32D4000
trusted library allocation
page read and write
4381609000
stack
page read and write
2B277C50000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
1C94F350000
heap
page read and write
7FFD34764000
trusted library allocation
page read and write
EA2827E000
stack
page read and write
438093E000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
2BAC0825000
heap
page read and write
1C95F361000
trusted library allocation
page read and write
1C967830000
heap
page read and write
2BAC33F0000
trusted library allocation
page read and write
2B275A34000
heap
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
7FFD34AF0000
trusted library allocation
page read and write
2B200001000
trusted library allocation
page read and write
1C94FDB1000
trusted library allocation
page read and write
2BAC0530000
heap
page read and write
1B0BF000
stack
page read and write
1C967820000
heap
page execute and read and write
5D0000
heap
page read and write
C6843B7000
stack
page read and write
7FFD34784000
trusted library allocation
page read and write
541000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
C6842F7000
stack
page read and write
2BAC0590000
heap
page read and write
C7C000
heap
page read and write
1C79C000
stack
page read and write
7FFD3478B000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
EA293CC000
stack
page read and write
2BAC1F05000
heap
page read and write
2B200080000
trusted library allocation
page read and write
7FFD34826000
trusted library allocation
page read and write
12693000
trusted library allocation
page read and write
129C1000
trusted library allocation
page read and write
2BAD2051000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
1C96736B000
heap
page read and write
2B275BC0000
heap
page read and write
C6841F7000
stack
page read and write
EA2944E000
stack
page read and write
2BAC05D7000
heap
page read and write
23F0000
heap
page execute and read and write
2B275C80000
trusted library allocation
page read and write
2BADA7E9000
heap
page read and write
1B140000
heap
page read and write
A03000
heap
page read and write
640000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD34A93000
trusted library allocation
page read and write
2B2102E8000
trusted library allocation
page read and write
C0F000
stack
page read and write
2BAC37B2000
trusted library allocation
page read and write
915000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
2B277490000
trusted library allocation
page read and write
7FFD34B60000
trusted library allocation
page read and write
2B2775F0000
heap
page read and write
AB0000
heap
page read and write
2B201304000
trusted library allocation
page read and write
1C94D990000
trusted library allocation
page read and write
EA285FE000
stack
page read and write
2B20111F000
trusted library allocation
page read and write
2B210021000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
1B34E000
stack
page read and write
1B05E000
stack
page read and write
1B48E000
stack
page read and write
2B200A53000
trusted library allocation
page read and write
2B2775F5000
heap
page read and write
C25000
heap
page read and write
CB3000
heap
page read and write
2B277DBC000
heap
page read and write
5D0000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34BD0000
trusted library allocation
page read and write
7FFD34B6A000
trusted library allocation
page read and write
2BAD209F000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
12403000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
240C000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
1C951160000
trusted library allocation
page read and write
590000
heap
page read and write
C00000
trusted library allocation
page read and write
2BADA757000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
1B8B1000
heap
page read and write
1C967C16000
heap
page read and write
CDD000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD34982000
trusted library allocation
page read and write
7FFD34ADC000
trusted library allocation
page read and write
2B2013BF000
trusted library allocation
page read and write
2BADA805000
heap
page read and write
1C95F667000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
97E000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
2BADA7D2000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
1C9679C0000
heap
page read and write
CA2000
heap
page read and write
438073F000
stack
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
7FFD347A3000
trusted library allocation
page execute and read and write
2B275A73000
heap
page read and write
2B277E8B000
heap
page read and write
2BADA505000
heap
page read and write
438170E000
stack
page read and write
C65000
heap
page read and write
EA2914E000
stack
page read and write
2B201E23000
trusted library allocation
page read and write
12408000
trusted library allocation
page read and write
1C94DA97000
heap
page read and write
1D0000
unkown
page readonly
2BAC3E31000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
2BAC2F9D000
trusted library allocation
page read and write
9FE000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
1C94D9A0000
heap
page readonly
2BAD2326000
trusted library allocation
page read and write
2B2012A2000
trusted library allocation
page read and write
7FFD34921000
trusted library allocation
page read and write
1C967C39000
heap
page read and write
2BADA861000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
1C94D970000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
2BAC0598000
heap
page read and write
2BAC3E51000
trusted library allocation
page read and write
2BADA714000
heap
page read and write
554000
stack
page read and write
2B275C60000
trusted library allocation
page read and write
1C94D9F8000
heap
page read and write
24B1000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD34B02000
trusted library allocation
page read and write
438148F000
stack
page read and write
2B277D56000
heap
page read and write
2B20186A000
trusted library allocation
page read and write
2BADA50F000
heap
page read and write
7FFD34944000
trusted library allocation
page read and write
5B0000
heap
page read and write
2BAC38BE000
trusted library allocation
page read and write
2BAD231C000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
1C967C36000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
1C967AD6000
heap
page read and write
2BAC0510000
heap
page read and write
1B8CE000
stack
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
1B8AD000
heap
page read and write
1AFB0000
heap
page execute and read and write
1BB6F000
stack
page read and write
96E000
heap
page read and write
1C94F250000
trusted library allocation
page read and write
7FFD34B08000
trusted library allocation
page read and write
1BC7C000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
2B201E28000
trusted library allocation
page read and write
DAE000
unkown
page read and write
7FFD34A40000
trusted library allocation
page read and write
C683D7E000
stack
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
2BAC3E0C000
trusted library allocation
page read and write
4380838000
stack
page read and write
B85000
heap
page read and write
7FFD34920000
trusted library allocation
page execute and read and write
7FFD34BA0000
trusted library allocation
page read and write
EA280FF000
stack
page read and write
1D2000
unkown
page readonly
1C950451000
trusted library allocation
page read and write
2BAC3980000
trusted library allocation
page read and write
93C000
heap
page read and write
1B875000
heap
page read and write
1C94F589000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
790000
heap
page read and write
519000
heap
page read and write
2BAC2C38000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
1AE00000
heap
page read and write
2B277E02000
heap
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
1AEBE000
stack
page read and write
8D0000
heap
page read and write
54C000
heap
page read and write
7FFD34B80000
trusted library allocation
page read and write
7FFD34B70000
trusted library allocation
page read and write
2B201005000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page execute and read and write
1C967AC0000
heap
page read and write
5A0000
heap
page read and write
1AA3C000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
B05000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34902000
trusted library allocation
page read and write
2B2018F3000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
C68530C000
stack
page read and write
EA27DCF000
stack
page read and write
2BAC1E80000
trusted library allocation
page read and write
2B2102EF000
trusted library allocation
page read and write
1C967ADE000
heap
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
2B275AE2000
heap
page read and write
1C95117F000
trusted library allocation
page read and write
2BADA80E000
heap
page read and write
2B275C00000
heap
page read and write
400000
unkown
page readonly
2B275A78000
heap
page read and write
1C950CAE000
trusted library allocation
page read and write
2B277EB0000
heap
page read and write
1C94D9F4000
heap
page read and write
43805F7000
stack
page read and write
2B277E61000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
7FFD34794000
trusted library allocation
page read and write
1C950BED000
trusted library allocation
page read and write
1C94DA34000
heap
page read and write
972000
heap
page read and write
7FFD347BC000
trusted library allocation
page execute and read and write
2BAC3053000
trusted library allocation
page read and write
1C95053E000
trusted library allocation
page read and write
2BADA500000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
160000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34AC4000
trusted library allocation
page read and write
2B277DE1000
heap
page read and write
240F000
trusted library allocation
page read and write
124B8000
trusted library allocation
page read and write
1C94F310000
heap
page read and write
7FFD34AD8000
trusted library allocation
page read and write
270E000
stack
page read and write
2B275A15000
heap
page read and write
2B201031000
trusted library allocation
page read and write
7FFD34B0C000
trusted library allocation
page read and write
EA2837E000
stack
page read and write
EA2924E000
stack
page read and write
1C94D9B8000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
1C950727000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
124B3000
trusted library allocation
page read and write
7FFD34BCD000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
2BAD2061000
trusted library allocation
page read and write
7FFD34763000
trusted library allocation
page execute and read and write
7FFD34BF0000
trusted library allocation
page read and write
1C967AD2000
heap
page read and write
43807B8000
stack
page read and write
7FFD34BB0000
trusted library allocation
page read and write
2BAC24FE000
trusted library allocation
page read and write
EA282F7000
stack
page read and write
EA2807E000
stack
page read and write
1C950488000
trusted library allocation
page read and write
12698000
trusted library allocation
page read and write
C20000
heap
page read and write
2DD5000
trusted library allocation
page read and write
7FFD34954000
trusted library allocation
page read and write
EA2934D000
stack
page read and write
6C0000
unkown
page readonly
1C9500DA000
trusted library allocation
page read and write
C8F000
stack
page read and write
2BADA71C000
heap
page read and write
635000
heap
page read and write
1B884000
heap
page read and write
2411000
trusted library allocation
page read and write
1C94DA0C000
heap
page read and write
1C950455000
trusted library allocation
page read and write
C70000
heap
page read and write
7DF4B0410000
trusted library allocation
page execute and read and write
606000
heap
page read and write
1BFE4000
stack
page read and write
7FFD34B90000
trusted library allocation
page read and write
124B1000
trusted library allocation
page read and write
2B275A2E000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
1B44E000
stack
page read and write
2BAC2C29000
trusted library allocation
page read and write
2BAC318B000
trusted library allocation
page read and write
EA286FF000
stack
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
536000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
2BAC05CF000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
AC5000
heap
page read and write
2DD1000
trusted library allocation
page read and write
1B120000
heap
page execute and read and write
2BADA8B3000
heap
page read and write
C03000
trusted library allocation
page read and write
2BAC05D3000
heap
page read and write
2BAC2F99000
trusted library allocation
page read and write
C685209000
stack
page read and write
2B277D7E000
heap
page read and write
7FFD34772000
trusted library allocation
page read and write
7FFD34B60000
trusted library allocation
page read and write
D85000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
2BAC2CEA000
trusted library allocation
page read and write
29B0000
heap
page execute and read and write
1D0000
unkown
page readonly
7FFD34760000
trusted library allocation
page read and write
2B2759F8000
heap
page read and write
B30000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
1C95F657000
trusted library allocation
page read and write
7FFD34BD0000
trusted library allocation
page read and write
1AC1D000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD34990000
trusted library allocation
page execute and read and write
1C950366000
trusted library allocation
page read and write
2B277C30000
heap
page read and write
2B21048B000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FF4A8890000
trusted library allocation
page execute and read and write
2BADA544000
heap
page read and write
7FFD34951000
trusted library allocation
page read and write
7FFD3492A000
trusted library allocation
page read and write
7DF4B0400000
trusted library allocation
page execute and read and write
7FFD34820000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
7FFD3485C000
trusted library allocation
page execute and read and write
2BADA5AC000
heap
page read and write
2B275C70000
heap
page readonly
1B8C8000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
2BAC1F40000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
2B277BAE000
heap
page read and write
C68473C000
stack
page read and write
1C950BC6000
trusted library allocation
page read and write
1C9500D1000
trusted library allocation
page read and write
1B877000
heap
page read and write
2B2759C0000
heap
page read and write
2840000
heap
page read and write
1C967B1B000
heap
page read and write
4F4000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
2BADA752000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
2B201784000
trusted library allocation
page read and write
1C967B91000
heap
page read and write
7DF4CD9E0000
trusted library allocation
page execute and read and write
8CE000
stack
page read and write
1B28F000
stack
page read and write
1C950AE1000
trusted library allocation
page read and write
2691000
trusted library allocation
page read and write
1C9678AA000
heap
page read and write
2BAD2318000
trusted library allocation
page read and write
1B2BE000
stack
page read and write
7FFD34AD3000
trusted library allocation
page read and write
7DF4DBE00000
trusted library allocation
page execute and read and write
2BAC2031000
trusted library allocation
page read and write
C68463D000
stack
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
1C94D7E0000
heap
page read and write
7FFD34B53000
trusted library allocation
page read and write
2B210001000
trusted library allocation
page read and write
43800E2000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
2BADA710000
heap
page read and write
7FFD34942000
trusted library allocation
page read and write
There are 862 hidden memdumps, click here to show them.