IOC Report
exe003.exe

loading gif

Files

File Path
Type
Category
Malicious
exe003.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0n2tvqww.iga.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_43bbgrgc.km5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dgbzchj2.2oj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dxpli2tc.mlc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h4lwwdrq.xto.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyuyj0ti.1p0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfs3nh3k.14v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_juzsquyl.l2i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmtqfpag.xks.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_myl1mvbw.dlf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pgvopjfv.d54.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryiyd1qf.hec.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tph5eqzb.aco.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1ggbtgy.hrw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbgvda3s.q1q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmwf4kpc.jfe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Nov 22 07:18:42 2024, mtime=Fri Nov 22 07:18:42 2024, atime=Fri Nov 22 07:18:42 2024, length=74752, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\exe003.exe
"C:\Users\user\Desktop\exe003.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\exe003.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'exe003.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user\AppData\Local\Temp\svchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user\AppData\Local\Temp\svchost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
22.ip.gl.ply.gg
http://nuget.org/NuGet.exe
unknown
http://crl.m20
unknown
http://www.microsoft.coG
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
22.ip.gl.ply.gg
147.185.221.22
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.22
22.ip.gl.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
132000
unkown
page readonly
malicious
1BD0B4B3000
heap
page read and write
32A0000
heap
page read and write
1795A834000
trusted library allocation
page read and write
1A66B24D000
heap
page read and write
100679000
stack
page read and write
7FFB4AE52000
trusted library allocation
page read and write
1A66D58C000
heap
page read and write
17957CA0000
heap
page read and write
1795A55D000
trusted library allocation
page read and write
1009BE000
stack
page read and write
1BD0B4DD000
heap
page read and write
100479000
stack
page read and write
39437B8000
stack
page read and write
1BD0B525000
heap
page read and write
19B6C16D000
heap
page read and write
7FFB4AE70000
trusted library allocation
page execute and read and write
7FFB4ACBB000
trusted library allocation
page read and write
5ED000
heap
page read and write
7FFB4ACBD000
trusted library allocation
page execute and read and write
1BD0CEB0000
trusted library section
page read and write
1902000
heap
page read and write
17957AF5000
heap
page read and write
19B10001000
trusted library allocation
page read and write
7FFB4AE6A000
trusted library allocation
page read and write
1E0000
heap
page read and write
7FFB4B030000
trusted library allocation
page read and write
39434F7000
stack
page read and write
7FFB4B12D000
trusted library allocation
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
7FFB4B024000
trusted library allocation
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
7DF438E90000
trusted library allocation
page execute and read and write
1A6010BD000
trusted library allocation
page read and write
1A66B450000
heap
page readonly
1A66D62B000
heap
page read and write
578FDFE000
stack
page read and write
133C3000
trusted library allocation
page read and write
7FFB4AD1C000
trusted library allocation
page execute and read and write
7FFB4AE5A000
trusted library allocation
page read and write
2370000
heap
page read and write
19B102F5000
trusted library allocation
page read and write
1A66D5EB000
heap
page read and write
19B6C138000
heap
page read and write
1BD0D040000
heap
page execute and read and write
1C34E000
stack
page read and write
19B00BFF000
trusted library allocation
page read and write
1A66B1A0000
heap
page read and write
17957A00000
heap
page read and write
7FFB4AFDF000
trusted library allocation
page read and write
7FFB4AD60000
trusted library allocation
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
1A66D412000
heap
page read and write
7FFB4B0BC000
trusted library allocation
page read and write
17957C90000
heap
page read and write
10168B000
stack
page read and write
1A66B297000
heap
page read and write
7FFB4ACE0000
trusted library allocation
page read and write
1C6FE000
stack
page read and write
1A6102F8000
trusted library allocation
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
1BD0B4A0000
heap
page read and write
7FFB4B11D000
trusted library allocation
page read and write
5790BCC000
stack
page read and write
1A66CF20000
heap
page execute and read and write
1A66B253000
heap
page read and write
7FFB4AD70000
trusted library allocation
page read and write
7FFB4ACA3000
trusted library allocation
page execute and read and write
1A601E23000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
1000FD000
stack
page read and write
7FFB4B004000
trusted library allocation
page read and write
1A600088000
trusted library allocation
page read and write
7FFB4B040000
trusted library allocation
page read and write
7FFB4B0D0000
trusted library allocation
page execute and read and write
7FFB4ACC3000
trusted library allocation
page execute and read and write
29A1000
trusted library allocation
page read and write
19B6C3C0000
heap
page read and write
578FAF9000
stack
page read and write
1BD25895000
heap
page read and write
1AEB3000
heap
page read and write
1BD0E673000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
1A6013C3000
trusted library allocation
page read and write
7FFB4B020000
trusted library allocation
page read and write
19B013C3000
trusted library allocation
page read and write
1BD0D2A0000
heap
page execute and read and write
1795A768000
trusted library allocation
page read and write
1C04A000
stack
page read and write
7FFB4ACDB000
trusted library allocation
page read and write
1795AD0E000
trusted library allocation
page read and write
29AF000
trusted library allocation
page read and write
7FFB4B009000
trusted library allocation
page read and write
394468B000
stack
page read and write
1A66D359000
heap
page read and write
7FFB4AEB8000
trusted library allocation
page read and write
19B018C1000
trusted library allocation
page read and write
B2CE93000
stack
page read and write
7FFB4AF70000
trusted library allocation
page read and write
7FFB4AE80000
trusted library allocation
page execute and read and write
7FFB4ACCD000
trusted library allocation
page execute and read and write
7FFB4AF40000
trusted library allocation
page read and write
7FFB4ACE0000
trusted library allocation
page read and write
7FFB4B120000
trusted library allocation
page read and write
7FFB4B019000
trusted library allocation
page read and write
1BD25964000
heap
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
1795A951000
trusted library allocation
page read and write
7FFB4ACB3000
trusted library allocation
page execute and read and write
1BD1D2E1000
trusted library allocation
page read and write
1BD1D5A7000
trusted library allocation
page read and write
19B6C350000
heap
page read and write
1A6011A5000
trusted library allocation
page read and write
19B6E550000
heap
page read and write
19B6C390000
trusted library allocation
page read and write
1A610021000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
17957A4B000
heap
page read and write
7FFB4ACC3000
trusted library allocation
page execute and read and write
1A601E28000
trusted library allocation
page read and write
7FFB4ACCD000
trusted library allocation
page execute and read and write
7FFB4AF60000
trusted library allocation
page read and write
1C8FF000
stack
page read and write
129A1000
trusted library allocation
page read and write
17957A3D000
heap
page read and write
19B00F65000
trusted library allocation
page read and write
124C1000
trusted library allocation
page read and write
129A8000
trusted library allocation
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
19B01E24000
trusted library allocation
page read and write
7FFB4B040000
trusted library allocation
page read and write
17957AFC000
heap
page read and write
19B6C110000
heap
page read and write
179719E8000
heap
page read and write
19B6C173000
heap
page read and write
17971D05000
heap
page read and write
17957C30000
trusted library allocation
page read and write
B2E4CC000
stack
page read and write
1450000
heap
page read and write
7FFB4ACE0000
trusted library allocation
page read and write
7FFB4AFB0000
trusted library allocation
page read and write
7FFB4AF50000
trusted library allocation
page read and write
1A66CD70000
heap
page execute and read and write
1C402000
heap
page read and write
7FFB4ACD4000
trusted library allocation
page read and write
7FFB4ACA4000
trusted library allocation
page read and write
19B00A52000
trusted library allocation
page read and write
1BD0F08D000
trusted library allocation
page read and write
1B83D000
stack
page read and write
7FFB4AEA0000
trusted library allocation
page execute and read and write
5790B4D000
stack
page read and write
1BD0B690000
heap
page read and write
7FFB4ADF0000
trusted library allocation
page execute and read and write
1A66B465000
heap
page read and write
7FFB4AD2C000
trusted library allocation
page execute and read and write
1A600D73000
trusted library allocation
page read and write
1B795000
stack
page read and write
1A66B259000
heap
page read and write
19B6E54B000
heap
page read and write
530000
heap
page read and write
7FFB4AE60000
trusted library allocation
page read and write
578FA7E000
stack
page read and write
19B6DCF5000
heap
page read and write
19B010F1000
trusted library allocation
page read and write
1B260000
heap
page read and write
7FFB4B029000
trusted library allocation
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
17957C70000
heap
page read and write
19B00F71000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
17971B30000
heap
page execute and read and write
19B6DD0E000
heap
page read and write
17969898000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
394468E000
stack
page read and write
7FFB4ACB2000
trusted library allocation
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
7FFB4B090000
trusted library allocation
page read and write
1A66CC80000
trusted library allocation
page read and write
578FF7B000
stack
page read and write
535000
heap
page read and write
19B103FA000
trusted library allocation
page read and write
1BEFE000
stack
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
7FFB4AF50000
trusted library allocation
page read and write
1A66D272000
heap
page read and write
1A6102E9000
trusted library allocation
page read and write
1795A527000
trusted library allocation
page read and write
1795A30A000
trusted library allocation
page read and write
100073000
stack
page read and write
7FFB4AD0C000
trusted library allocation
page execute and read and write
1A66B420000
trusted library allocation
page read and write
1BD0CEE0000
trusted library allocation
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
143D000
heap
page read and write
1BD0E3D0000
trusted library allocation
page read and write
19B0130B000
trusted library allocation
page read and write
1BC02000
heap
page read and write
14C5000
heap
page read and write
A3B000
heap
page read and write
17959616000
trusted library allocation
page read and write
17971B00000
trusted library allocation
page read and write
1BD0CFB0000
heap
page read and write
17F0000
trusted library allocation
page read and write
7FFB4B093000
trusted library allocation
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
B2D37E000
stack
page read and write
1BD258B0000
heap
page read and write
17971A71000
heap
page read and write
1BD0CEA0000
trusted library section
page read and write
7FFB4ACBD000
trusted library allocation
page execute and read and write
AC4000
heap
page read and write
7FFB4AD6C000
trusted library allocation
page execute and read and write
23B0000
heap
page read and write
7FFB4ACC3000
trusted library allocation
page read and write
1BD0D060000
heap
page execute and read and write
17971CDA000
heap
page read and write
19B004CD000
trusted library allocation
page read and write
578FEFE000
stack
page read and write
7FFB4B020000
trusted library allocation
page read and write
1BD0D2B1000
trusted library allocation
page read and write
14AC000
heap
page read and write
19B6E53C000
heap
page read and write
1447000
heap
page read and write
1BD25617000
heap
page read and write
1BD256AA000
heap
page read and write
17971D15000
heap
page read and write
3943A3B000
stack
page read and write
7FFB4ACD3000
trusted library allocation
page execute and read and write
19B10031000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
1A6012A3000
trusted library allocation
page read and write
394440E000
stack
page read and write
B2D4F8000
stack
page read and write
A83000
trusted library allocation
page read and write
1A66B210000
heap
page read and write
7FFB4AF60000
trusted library allocation
page read and write
7FFB4AEC0000
trusted library allocation
page execute and read and write
1A66D336000
heap
page read and write
FF0000
unkown
page readonly
10017F000
stack
page read and write
7FFB4AEB4000
trusted library allocation
page read and write
1A66B440000
trusted library allocation
page read and write
17969880000
trusted library allocation
page read and write
7FFB4ACB4000
trusted library allocation
page read and write
1A66D860000
heap
page read and write
1445000
heap
page read and write
7FFB4B02C000
trusted library allocation
page read and write
17971D01000
heap
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
1A610001000
trusted library allocation
page read and write
F02000
heap
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
1BD0CF30000
trusted library allocation
page read and write
1BD0D4DB000
trusted library allocation
page read and write
1B34D000
heap
page read and write
7FFB4ADD0000
trusted library allocation
page execute and read and write
19B00D85000
trusted library allocation
page read and write
19B6E7C0000
heap
page read and write
19B6DCD0000
heap
page execute and read and write
7FFB4AF30000
trusted library allocation
page read and write
17969888000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page read and write
7FFB4B0D0000
trusted library allocation
page read and write
1BD1D2D1000
trusted library allocation
page read and write
19B6C370000
trusted library section
page read and write
3944509000
stack
page read and write
7FFB4AE92000
trusted library allocation
page read and write
1A600F9F000
trusted library allocation
page read and write
1B2EB000
heap
page read and write
19B012D8000
trusted library allocation
page read and write
1795AE19000
trusted library allocation
page read and write
17971590000
heap
page read and write
1BD0D046000
heap
page execute and read and write
3942FFE000
stack
page read and write
578F8FE000
stack
page read and write
19B6DB80000
trusted library allocation
page read and write
7FFB4AD80000
trusted library allocation
page read and write
19B6E410000
heap
page read and write
7FFB4B018000
trusted library allocation
page read and write
133C8000
trusted library allocation
page read and write
A00000
heap
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
B2CF1E000
stack
page read and write
7FFB4ACC2000
trusted library allocation
page read and write
1BD25604000
heap
page read and write
1A66B218000
heap
page read and write
7FFB4ADB6000
trusted library allocation
page execute and read and write
19B6E240000
heap
page read and write
7FFB4B0D0000
trusted library allocation
page execute and read and write
7FFB4B000000
trusted library allocation
page read and write
1BD0D32D000
trusted library allocation
page read and write
7FFB4AD66000
trusted library allocation
page read and write
1A66D270000
heap
page read and write
1BD25807000
heap
page read and write
B2D67E000
stack
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
7FFB4AD5C000
trusted library allocation
page execute and read and write
19B01124000
trusted library allocation
page read and write
17971E69000
heap
page read and write
39432FE000
stack
page read and write
39438BE000
stack
page read and write
19B01E1F000
trusted library allocation
page read and write
17959550000
heap
page execute and read and write
1802000
heap
page read and write
7FFB4B100000
trusted library allocation
page read and write
7FFB4B120000
trusted library allocation
page read and write
7FFB4B110000
trusted library allocation
page read and write
7FFB4ACB3000
trusted library allocation
page execute and read and write
7FFB4ACFC000
trusted library allocation
page execute and read and write
1A66B251000
heap
page read and write
7FFB4AE62000
trusted library allocation
page read and write
19B6E437000
heap
page read and write
19B6DC80000
heap
page execute and read and write
7FFB4AF30000
trusted library allocation
page read and write
1BD0DEB1000
trusted library allocation
page read and write
9C0000
heap
page read and write
394347F000
stack
page read and write
19B00080000
trusted library allocation
page read and write
1C7FF000
stack
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
1BD0CF70000
trusted library allocation
page read and write
1A66D501000
heap
page read and write
1A66B1B0000
heap
page read and write
1BD0B670000
heap
page read and write
7FFB4AE52000
trusted library allocation
page read and write
7FFB4B0DC000
trusted library allocation
page read and write
9E0000
heap
page read and write
17971D0D000
heap
page read and write
1BD1D599000
trusted library allocation
page read and write
17959FE2000
trusted library allocation
page read and write
1A601891000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
7FFB4B020000
trusted library allocation
page read and write
7FFB4AD1C000
trusted library allocation
page execute and read and write
B2E2CD000
stack
page read and write
19B6C300000
heap
page read and write
1BD50000
heap
page execute and read and write
DCF000
stack
page read and write
7FFB4B032000
trusted library allocation
page read and write
1795B38C000
trusted library allocation
page read and write
1BD0EADA000
trusted library allocation
page read and write
129A3000
trusted library allocation
page read and write
1A66D56D000
heap
page read and write
7FFB4B110000
trusted library allocation
page read and write
7DF42A600000
trusted library allocation
page execute and read and write
1A600F99000
trusted library allocation
page read and write
1BD0E024000
trusted library allocation
page read and write
17957A5D000
heap
page read and write
1B2FD000
heap
page read and write
19B10306000
trusted library allocation
page read and write
1795A52D000
trusted library allocation
page read and write
1BD1D2C0000
trusted library allocation
page read and write
B2E3C7000
stack
page read and write
394383E000
stack
page read and write
14AA000
heap
page read and write
33C1000
trusted library allocation
page read and write
19B6E513000
heap
page read and write
1B33D000
heap
page read and write
1BD0EA34000
trusted library allocation
page read and write
A75000
heap
page read and write
7FFB4B014000
trusted library allocation
page read and write
1BD0E000
stack
page read and write
7FFB4AEB2000
trusted library allocation
page read and write
A2C000
heap
page read and write
7FFB4ADA6000
trusted library allocation
page execute and read and write
B2D576000
stack
page read and write
1494000
heap
page read and write
7FFB4AF90000
trusted library allocation
page read and write
17959591000
trusted library allocation
page read and write
578FC77000
stack
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
578FE7E000
stack
page read and write
17969600000
trusted library allocation
page read and write
7FFB4AE60000
trusted library allocation
page execute and read and write
7FFB4AF30000
trusted library allocation
page read and write
1795B3B1000
trusted library allocation
page read and write
142D000
heap
page read and write
19B6E330000
heap
page read and write
1A600A52000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page execute and read and write
1B15E000
stack
page read and write
7DF42A610000
trusted library allocation
page execute and read and write
17971D09000
heap
page read and write
7FFB4ACC4000
trusted library allocation
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
7FFB4B110000
trusted library allocation
page read and write
19B6C177000
heap
page read and write
7DF4773F0000
trusted library allocation
page execute and read and write
7FFB4AD70000
trusted library allocation
page execute and read and write
17971DC3000
heap
page read and write
7FFB4B003000
trusted library allocation
page read and write
1BD0E5B8000
trusted library allocation
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
7FFB4ACD4000
trusted library allocation
page read and write
7FFB4B000000
trusted library allocation
page read and write
1BD0E2E2000
trusted library allocation
page read and write
10093E000
stack
page read and write
100737000
stack
page read and write
578F97E000
stack
page read and write
19B00F6D000
trusted library allocation
page read and write
63F000
heap
page read and write
19B00229000
trusted library allocation
page read and write
910000
heap
page read and write
19B00F7E000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
19B10011000
trusted library allocation
page read and write
1BD0F0D2000
trusted library allocation
page read and write
7FFB4AED0000
trusted library allocation
page read and write
7FFB4AD96000
trusted library allocation
page execute and read and write
7DF438E80000
trusted library allocation
page execute and read and write
1795A17A000
trusted library allocation
page read and write
540000
heap
page read and write
1795A64F000
trusted library allocation
page read and write
7FFB4AFF9000
trusted library allocation
page read and write
17969879000
trusted library allocation
page read and write
1BD4F000
stack
page read and write
7FFB4ACEB000
trusted library allocation
page read and write
65B000
heap
page read and write
7FFB4AF10000
trusted library allocation
page read and write
143F000
heap
page read and write
1A601E03000
trusted library allocation
page read and write
7FFB4B120000
trusted library allocation
page read and write
1BFFE000
stack
page read and write
17971A74000
heap
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
1AF1E000
stack
page read and write
1BD25683000
heap
page read and write
17971CCA000
heap
page read and write
17971F20000
heap
page read and write
7FFB4B126000
trusted library allocation
page read and write
7FFB4B030000
trusted library allocation
page read and write
1A66D400000
heap
page read and write
7FFB4AE80000
trusted library allocation
page execute and read and write
7FFB4AE72000
trusted library allocation
page read and write
8F1000
stack
page read and write
7FFB4AF30000
trusted library allocation
page read and write
1A66CDA0000
heap
page read and write
AA6000
heap
page read and write
101589000
stack
page read and write
1A6102EE000
trusted library allocation
page read and write
7FFB4AED0000
trusted library allocation
page read and write
578F5B3000
stack
page read and write
1BD2584E000
heap
page read and write
1BD0B490000
heap
page read and write
1A601DDE000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
7FFB4AD60000
trusted library allocation
page read and write
11A0000
heap
page read and write
1BA90000
heap
page read and write
17957A24000
heap
page read and write
1BD25658000
heap
page read and write
1BD0D0CF000
heap
page read and write
7FFB4AF00000
trusted library allocation
page read and write
1BD257F0000
heap
page read and write
7FFB4ACA2000
trusted library allocation
page read and write
1BD0CEC0000
trusted library allocation
page read and write
1D1FE000
stack
page read and write
19B6C380000
trusted library section
page read and write
1BD256B9000
heap
page read and write
1BBB0000
heap
page execute and read and write
7FFB4AF80000
trusted library allocation
page read and write
17957CA5000
heap
page read and write
A97000
heap
page read and write
7FFB4B0A0000
trusted library allocation
page read and write
7FFB4AF00000
trusted library allocation
page read and write
7FFB4B028000
trusted library allocation
page read and write
17971E37000
heap
page read and write
7FFB4AEA4000
trusted library allocation
page read and write
1BD0B850000
heap
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
19B00C0D000
trusted library allocation
page read and write
A24000
heap
page read and write
1AFBE000
stack
page read and write
5AC000
heap
page read and write
7FFB4ADA6000
trusted library allocation
page execute and read and write
1AEB0000
heap
page read and write
7FFB4AE82000
trusted library allocation
page read and write
7FFB4AED0000
trusted library allocation
page read and write
578FD7A000
stack
page read and write
17957A86000
heap
page read and write
7FFB4ACD2000
trusted library allocation
page read and write
57909CC000
stack
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
1BD25710000
heap
page read and write
17957C10000
trusted library allocation
page read and write
1B55E000
stack
page read and write
17957A89000
heap
page read and write
1A66D607000
heap
page read and write
179597B8000
trusted library allocation
page read and write
1A6102F6000
trusted library allocation
page read and write
7FFB4AEA2000
trusted library allocation
page read and write
7FFB4AFD3000
trusted library allocation
page read and write
7FFB4B130000
trusted library allocation
page read and write
1BD0EC0A000
trusted library allocation
page read and write
11B0000
heap
page read and write
1BD0DD02000
trusted library allocation
page read and write
B15000
heap
page read and write
AA9000
heap
page read and write
5790AC7000
stack
page read and write
19B6C224000
heap
page read and write
7FFB4AE90000
trusted library allocation
page execute and read and write
17957C95000
heap
page read and write
1A610308000
trusted library allocation
page read and write
B00000
heap
page execute and read and write
7FFB4B140000
trusted library allocation
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
1BD1D320000
trusted library allocation
page read and write
19B1006F000
trusted library allocation
page read and write
39433FA000
stack
page read and write
7FFB4AE70000
trusted library allocation
page execute and read and write
578F87E000
stack
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
19B6E55C000
heap
page read and write
19B6E210000
heap
page read and write
19B6E200000
heap
page execute and read and write
B2CFDF000
stack
page read and write
10148D000
stack
page read and write
7FFB4AD60000
trusted library allocation
page read and write
1413000
heap
page read and write
1A4F0000
trusted library allocation
page read and write
1A66D2BE000
heap
page read and write
1BD258B6000
heap
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
23A0000
heap
page execute and read and write
7FFB4AF50000
trusted library allocation
page read and write
1BD0F0B3000
trusted library allocation
page read and write
124D1000
trusted library allocation
page read and write
7FFB4B0F0000
trusted library allocation
page execute and read and write
17971D82000
heap
page read and write
394448D000
stack
page read and write
10140F000
stack
page read and write
7FFB4AE90000
trusted library allocation
page execute and read and write
7FFB4AE40000
trusted library allocation
page read and write
17969591000
trusted library allocation
page read and write
19B6E531000
heap
page read and write
1A66CC40000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page execute and read and write
17957A49000
heap
page read and write
1B994000
stack
page read and write
7FFB4AD96000
trusted library allocation
page execute and read and write
19B10021000
trusted library allocation
page read and write
1BD0CF00000
trusted library allocation
page read and write
1795A596000
trusted library allocation
page read and write
17971E75000
heap
page read and write
17957C40000
heap
page readonly
7FFB4AD66000
trusted library allocation
page read and write
9D0000
heap
page execute and read and write
7FFB4ACDD000
trusted library allocation
page execute and read and write
7FFB4ADE0000
trusted library allocation
page execute and read and write
7FFB4AD70000
trusted library allocation
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
DE0000
heap
page execute and read and write
7FFB4AE62000
trusted library allocation
page read and write
1BD0EB19000
trusted library allocation
page read and write
1A6011D7000
trusted library allocation
page read and write
1795B367000
trusted library allocation
page read and write
1A66B26D000
heap
page read and write
1BD0E557000
trusted library allocation
page read and write
7FFB4AD7C000
trusted library allocation
page execute and read and write
930000
heap
page read and write
7FFB4AD80000
trusted library allocation
page execute and read and write
24BE000
stack
page read and write
17957AE5000
heap
page read and write
130000
unkown
page readonly
A3E000
heap
page read and write
7FFB4B0A0000
trusted library allocation
page read and write
B2E34E000
stack
page read and write
1A601306000
trusted library allocation
page read and write
1BD0EC01000
trusted library allocation
page read and write
7FFB4B022000
trusted library allocation
page read and write
A42000
heap
page read and write
1A66CCD0000
heap
page execute and read and write
1BD25922000
heap
page read and write
7FFB4ACB0000
trusted library allocation
page read and write
1BD0E36D000
trusted library allocation
page read and write
1BD1D5B7000
trusted library allocation
page read and write
1437000
heap
page read and write
1BD25681000
heap
page read and write
1A66CDA5000
heap
page read and write
1C050000
heap
page read and write
1795A6B2000
trusted library allocation
page read and write
578FBF8000
stack
page read and write
7FFB4ACB4000
trusted library allocation
page read and write
B2D6FE000
stack
page read and write
10150E000
stack
page read and write
17959480000
trusted library allocation
page read and write
19B0194E000
trusted library allocation
page read and write
7FFB4AE88000
trusted library allocation
page read and write
19B01250000
trusted library allocation
page read and write
7FFB4AD0C000
trusted library allocation
page execute and read and write
7DF42A5F0000
trusted library allocation
page execute and read and write
7FFB4AE81000
trusted library allocation
page read and write
299F000
stack
page read and write
1BD1D4F5000
trusted library allocation
page read and write
1001FF000
stack
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
7FFB4AF00000
trusted library allocation
page read and write
7FFB4AFF3000
trusted library allocation
page read and write
17957AFA000
heap
page read and write
33CC000
trusted library allocation
page read and write
B2D87B000
stack
page read and write
58C000
heap
page read and write
1AFF000
stack
page read and write
19B6E610000
trusted library allocation
page read and write
19B6E206000
heap
page execute and read and write
7FFB4AEE0000
trusted library allocation
page read and write
5A1000
heap
page read and write
B02000
heap
page read and write
7FFB4B040000
trusted library allocation
page read and write
1BD0CEF0000
heap
page readonly
7FF472F80000
trusted library allocation
page execute and read and write
7FFB4AF20000
trusted library allocation
page read and write
179695B1000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page execute and read and write
1A600001000
trusted library allocation
page read and write
7FFB4AFB0000
trusted library allocation
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
7FFB4ACF0000
trusted library allocation
page read and write
1795A895000
trusted library allocation
page read and write
7FFB4ACCD000
trusted library allocation
page execute and read and write
17971AC9000
heap
page read and write
7FFB4AD70000
trusted library allocation
page execute and read and write
7FFB4AD0C000
trusted library allocation
page execute and read and write
7FFB4ACA0000
trusted library allocation
page read and write
19B6DBB0000
heap
page read and write
179695C1000
trusted library allocation
page read and write
19B102E8000
trusted library allocation
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
3943739000
stack
page read and write
7FFB4B010000
trusted library allocation
page read and write
B2D3FB000
stack
page read and write
7FFB4ACB0000
trusted library allocation
page read and write
19B00F69000
trusted library allocation
page read and write
1A60115F000
trusted library allocation
page read and write
A50000
heap
page read and write
4F1000
stack
page read and write
17971E1C000
heap
page read and write
17959580000
heap
page execute and read and write
7FFB4AE61000
trusted library allocation
page read and write
179719E0000
heap
page read and write
7FFB4AF20000
trusted library allocation
page read and write
1BD1D2B1000
trusted library allocation
page read and write
1B25E000
stack
page read and write
17957990000
heap
page read and write
7FFB4AF90000
trusted library allocation
page read and write
19B00F7A000
trusted library allocation
page read and write
B2D5FA000
stack
page read and write
7FFB4AE7A000
trusted library allocation
page read and write
1BD0E488000
trusted library allocation
page read and write
19B00BF7000
trusted library allocation
page read and write
1A66CD40000
heap
page read and write
1BD0DEB9000
trusted library allocation
page read and write
7FFB4ACAD000
trusted library allocation
page execute and read and write
5790A4E000
stack
page read and write
1795AEDB000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
7FFB4AFB0000
trusted library allocation
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
1BD25BB0000
heap
page read and write
1B332000
heap
page read and write
7FFB4AD8C000
trusted library allocation
page execute and read and write
7FFB4B060000
trusted library allocation
page read and write
1008BF000
stack
page read and write
1BD0CFB5000
heap
page read and write
1AE1D000
stack
page read and write
11C0000
heap
page read and write
1795B3AC000
trusted library allocation
page read and write
1BD255F0000
heap
page read and write
17957C50000
trusted library allocation
page read and write
1A6004CD000
trusted library allocation
page read and write
1A66B1D0000
heap
page read and write
B10000
heap
page read and write
7FFB4B00C000
trusted library allocation
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
17971BD0000
heap
page read and write
1AA5D000
stack
page read and write
5C3000
heap
page read and write
7FFB4B100000
trusted library allocation
page read and write
394327E000
stack
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
B2E54E000
stack
page read and write
7FFB4AE8A000
trusted library allocation
page read and write
B2CF9E000
stack
page read and write
394393C000
stack
page read and write
1A66CDBF000
heap
page read and write
B2E24F000
stack
page read and write
1006BE000
stack
page read and write
29B1000
trusted library allocation
page read and write
1D0FE000
stack
page read and write
1A66B400000
trusted library section
page read and write
7FFB4B030000
trusted library allocation
page read and write
7FFB4AF20000
trusted library allocation
page read and write
1D0000
heap
page read and write
19B01781000
trusted library allocation
page read and write
1502000
heap
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
7FFB4AE51000
trusted library allocation
page read and write
1A66D320000
heap
page read and write
17971D19000
heap
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
19B6E554000
heap
page read and write
7FFB4AEA8000
trusted library allocation
page read and write
179579C0000
heap
page read and write
7FFB4ACDD000
trusted library allocation
page execute and read and write
7FFB4AF90000
trusted library allocation
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
1AE9D000
stack
page read and write
7FFB4B008000
trusted library allocation
page read and write
7FFB4AE84000
trusted library allocation
page read and write
1A600229000
trusted library allocation
page read and write
1A66B460000
heap
page read and write
7FFB4B110000
trusted library allocation
page read and write
394357D000
stack
page read and write
7FFB4B012000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
19B6C16A000
heap
page read and write
124CB000
trusted library allocation
page read and write
7FFB4ACC4000
trusted library allocation
page read and write
7FFB4B010000
trusted library allocation
page read and write
7FFB4AF40000
trusted library allocation
page read and write
1BD0E901000
trusted library allocation
page read and write
19B6C130000
heap
page read and write
7FFB4ADD0000
trusted library allocation
page execute and read and write
7FFB4ACB3000
trusted library allocation
page execute and read and write
7FFB4ACB4000
trusted library allocation
page read and write
7FFB4ACB0000
trusted library allocation
page read and write
B2D47D000
stack
page read and write
7FFB4AED0000
trusted library allocation
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
17959450000
trusted library allocation
page read and write
5790BCE000
stack
page read and write
17957AF1000
heap
page read and write
1BD0EB40000
trusted library allocation
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
1180000
heap
page read and write
7FFB4B000000
trusted library allocation
page read and write
3942F73000
stack
page read and write
1A61048C000
trusted library allocation
page read and write
19B6E256000
heap
page read and write
17957BD0000
heap
page read and write
7FFB4AF10000
trusted library allocation
page read and write
1A66B308000
heap
page read and write
19B6C18D000
heap
page read and write
1796987E000
trusted library allocation
page read and write
B2D2F9000
stack
page read and write
19B00001000
trusted library allocation
page read and write
A45000
heap
page read and write
19B0188D000
trusted library allocation
page read and write
7FFB4B03C000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
39436B7000
stack
page read and write
7FFB4AFB0000
trusted library allocation
page read and write
394363E000
stack
page read and write
A37000
heap
page read and write
1A66D4E0000
heap
page read and write
19B6E2AE000
heap
page read and write
1A6102F0000
trusted library allocation
page read and write
940000
heap
page read and write
1A601210000
trusted library allocation
page read and write
1005FD000
stack
page read and write
7FFB4AF20000
trusted library allocation
page read and write
1BD0B855000
heap
page read and write
39439BE000
stack
page read and write
1BD0B4FE000
heap
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
7FFB4AE70000
trusted library allocation
page read and write
33BE000
stack
page read and write
500000
heap
page read and write
19B6E414000
heap
page read and write
39435F9000
stack
page read and write
7FFB4ADE0000
trusted library allocation
page execute and read and write
19B102ED000
trusted library allocation
page read and write
1BD0CE80000
heap
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
19B6E429000
heap
page read and write
7FFB4AE98000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
1A66D637000
heap
page read and write
1A600D7C000
trusted library allocation
page read and write
7FFB4ACCD000
trusted library allocation
page execute and read and write
7FFB4AF00000
trusted library allocation
page read and write
1BD2589F000
heap
page read and write
7FFB4B130000
trusted library allocation
page read and write
7FFB4B01C000
trusted library allocation
page read and write
B2D27E000
stack
page read and write
179579A0000
heap
page read and write
A50000
trusted library allocation
page read and write
1A610070000
trusted library allocation
page read and write
1477000
heap
page read and write
19B6C154000
heap
page read and write
1B89A000
stack
page read and write
1A66D5D9000
heap
page read and write
17959A5D000
trusted library allocation
page read and write
7FFB4AD86000
trusted library allocation
page read and write
1A601004000
trusted library allocation
page read and write
1795A6EC000
trusted library allocation
page read and write
17971E5C000
heap
page read and write
17957A84000
heap
page read and write
1A66B24B000
heap
page read and write
B2D77E000
stack
page read and write
394460C000
stack
page read and write
1A66B295000
heap
page read and write
7FFB4B010000
trusted library allocation
page read and write
19B01866000
trusted library allocation
page read and write
7FFB4AE50000
trusted library allocation
page read and write
19B6C320000
heap
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
19B01827000
trusted library allocation
page read and write
19B6C142000
heap
page read and write
579094E000
stack
page read and write
7FFB4AE52000
trusted library allocation
page read and write
19B6C3B0000
trusted library allocation
page read and write
7FFB4B100000
trusted library allocation
page read and write
7FFB4ADD0000
trusted library allocation
page execute and read and write
578FCF9000
stack
page read and write
100577000
stack
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
7FFB4ACD4000
trusted library allocation
page read and write
7FFB4AF40000
trusted library allocation
page read and write
1A601785000
trusted library allocation
page read and write
1BD0E2B6000
trusted library allocation
page read and write
B2E44D000
stack
page read and write
32B0000
heap
page execute and read and write
19B011D9000
trusted library allocation
page read and write
100A3B000
stack
page read and write
1BD0B4E6000
heap
page read and write
7FFB4B0D0000
trusted library allocation
page read and write
394337F000
stack
page read and write
144A000
heap
page read and write
1A601952000
trusted library allocation
page read and write
7DF477400000
trusted library allocation
page execute and read and write
1BD0E455000
trusted library allocation
page read and write
7FFB4AF60000
trusted library allocation
page read and write
7FFB4AE80000
trusted library allocation
page execute and read and write
1A60186A000
trusted library allocation
page read and write
19B6C1B7000
heap
page read and write
19B6E27B000
heap
page read and write
124C8000
trusted library allocation
page read and write
17971D5E000
heap
page read and write
1B45E000
stack
page read and write
A80000
trusted library allocation
page read and write
17971CB0000
heap
page read and write
7FFB4B100000
trusted library allocation
page read and write
19B6DBF0000
trusted library allocation
page read and write
1A610031000
trusted library allocation
page read and write
10160C000
stack
page read and write
7FFB4ACDD000
trusted library allocation
page execute and read and write
1004FE000
stack
page read and write
578F9FA000
stack
page read and write
7FFB4B038000
trusted library allocation
page read and write
580000
heap
page read and write
7FFB4AF70000
trusted library allocation
page read and write
19B01E00000
trusted library allocation
page read and write
17971AD4000
heap
page read and write
19B6DB70000
heap
page readonly
1BD0B4E8000
heap
page read and write
1BD0D0B0000
heap
page read and write
1A66D420000
heap
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
1A66D28B000
heap
page read and write
B2D7FE000
stack
page read and write
1BD0D77E000
trusted library allocation
page read and write
5EF000
heap
page read and write
1A601120000
trusted library allocation
page read and write
2511000
trusted library allocation
page read and write
7FFB4ADC0000
trusted library allocation
page execute and read and write
1795ADF3000
trusted library allocation
page read and write
19B013C7000
trusted library allocation
page read and write
10083A000
stack
page read and write
1A66D62D000
heap
page read and write
1BD0B527000
heap
page read and write
1BD0B4E4000
heap
page read and write
7FFB4AD96000
trusted library allocation
page execute and read and write
586000
heap
page read and write
1BF4C000
stack
page read and write
84E000
stack
page read and write
578F5FE000
stack
page read and write
19B012A8000
trusted library allocation
page read and write
1BD1D59E000
trusted library allocation
page read and write
19B6E42F000
heap
page read and write
17957A45000
heap
page read and write
17957A3F000
heap
page read and write
7FFB4AF50000
trusted library allocation
page read and write
17971D3F000
heap
page read and write
7FFB4B120000
trusted library allocation
page read and write
17CF000
stack
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
E02000
heap
page read and write
1A601030000
trusted library allocation
page read and write
17957A08000
heap
page read and write
1BB80000
heap
page read and write
7FFB4B0CC000
trusted library allocation
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
7FFB4AD76000
trusted library allocation
page read and write
7FFB4AF60000
trusted library allocation
page read and write
1A66B3E0000
heap
page read and write
1BD2593F000
heap
page read and write
1400000
heap
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
A40000
heap
page read and write
7FFB4ACC4000
trusted library allocation
page read and write
17971A12000
heap
page read and write
7FFB4AD50000
trusted library allocation
page read and write
19B01DDA000
trusted library allocation
page read and write
7FFB4AFF4000
trusted library allocation
page read and write
24C1000
trusted library allocation
page read and write
7DF47F970000
trusted library allocation
page execute and read and write
7FFB4AE70000
trusted library allocation
page execute and read and write
A70000
trusted library allocation
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
7DF47F960000
trusted library allocation
page execute and read and write
19B6C3C5000
heap
page read and write
1BD0D250000
trusted library allocation
page read and write
133C1000
trusted library allocation
page read and write
19B6E4B5000
heap
page read and write
7FFB4AD6C000
trusted library allocation
page execute and read and write
1A66B29A000
heap
page read and write
1BD25656000
heap
page read and write
7FFB4AE71000
trusted library allocation
page read and write
1007B8000
stack
page read and write
1A66B257000
heap
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
7FFB4AF40000
trusted library allocation
page read and write
17971DA4000
heap
page read and write
7FFB4ACBD000
trusted library allocation
page execute and read and write
19B6DCF0000
heap
page read and write
1BD0B52B000
heap
page read and write
7FFB4AD86000
trusted library allocation
page execute and read and write
394458E000
stack
page read and write
19B00F75000
trusted library allocation
page read and write
7FFB4AD56000
trusted library allocation
page read and write
7FFB4B116000
trusted library allocation
page read and write
19B010BF000
trusted library allocation
page read and write
1A66CCD7000
heap
page execute and read and write
10168E000
stack
page read and write
7FFB4B020000
trusted library allocation
page read and write
10FE000
stack
page read and write
17971DB8000
heap
page read and write
9B0000
trusted library allocation
page read and write
7FFB4ACCB000
trusted library allocation
page read and write
950000
heap
page read and write
1A66CEF0000
trusted library allocation
page read and write
17971CD1000
heap
page read and write
1BD0F0D7000
trusted library allocation
page read and write
5C1000
heap
page read and write
17971A3D000
heap
page read and write
17971D11000
heap
page read and write
1BD25632000
heap
page read and write
7FFB4AE60000
trusted library allocation
page read and write
1141000
stack
page read and write
1A66B410000
trusted library section
page read and write
7FFB4AE94000
trusted library allocation
page read and write
7FFB4AFE3000
trusted library allocation
page read and write
1795A5C2000
trusted library allocation
page read and write
A13000
heap
page read and write
1BD255FB000
heap
page read and write
578FB7D000
stack
page read and write
1428000
heap
page read and write
7FFB4AF90000
trusted library allocation
page read and write
1BD25951000
heap
page read and write
7FFB4B0E0000
trusted library allocation
page execute and read and write
7FFB4B030000
trusted library allocation
page read and write
17971B36000
heap
page execute and read and write
There are 960 hidden memdumps, click here to show them.