IOC Report
Ekpb7jn7mf.exe

loading gif

Files

File Path
Type
Category
Malicious
Ekpb7jn7mf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\YsrQekGS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\rKPaQokQ.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\wjoqZlIS.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wjoqZlIS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dbfenx1s.x1v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egxa0rnu.b4r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fefgjlzs.cge.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hz4ykdzn.hpp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0njazfq.u2i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4j30btc.rgc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tmqoftrg.xrx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqixtfub.nrs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp331E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp332F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp333F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3350.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3361.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3371.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3382.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6948.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6949.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp695A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp695B.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp697B.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp698C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp699D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp69EC.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp8DD3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8DE4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8DE5.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8DE6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E3.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8F4.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9FA3.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpC572.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC582.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC593.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC594.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC5A4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC5A5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC5B6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD440.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD461.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD471.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD482.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD493.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD4A3.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpFC77.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFC87.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFC98.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCA9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCAA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCCA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCDA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Ekpb7jn7mf.exe
"C:\Users\user\Desktop\Ekpb7jn7mf.exe"
malicious
C:\Users\user\AppData\Local\Temp\wjoqZlIS.exe
"C:\Users\user\AppData\Local\Temp\wjoqZlIS.exe"
malicious
C:\Users\user\AppData\Local\Temp\YsrQekGS.exe
"C:\Users\user\AppData\Local\Temp\YsrQekGS.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\YsrQekGS.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'YsrQekGS.exe'
malicious
C:\Users\user\AppData\Local\Temp\rKPaQokQ.exe
"C:\Users\user\AppData\Local\Temp\rKPaQokQ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe
"C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
45.88.186.18
malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot6973607627:AAGW_Zx412oiEhjCq5cqO_ZHLESeW8b4re4/sendMessage?chat_id=66784
unknown
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
pst-child.gl.at.ply.gg:9336
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.mic
unknown
https://duckduckgo.com/ac/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://pst-child.gl.at.ply.gg:9336
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://crl.micft.cMicRosof
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ipinfo.io/ip%appdata%
unknown
http://nuget.org/NuGet.exe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.telegram.org/bot6973607627:AAGW_Zx412oiEhjCq5cqO_ZHLESeW8b4re4/sendMessage?chat_id=6678411703&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AA15D1E2A246FDDBBF74C%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%2042ZXX86W9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
https://api.ip.sb
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://pst-child.gl.at.ply.gg:9336/
147.185.221.20
https://ion=v4.5
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://pst-child.gl.at.ply.gg
unknown
https://aka.ms/pscore68
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pst-child.gl.at.ply.gg
147.185.221.20
malicious
api.telegram.org
149.154.167.220
malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
45.88.186.18
unknown
Netherlands
malicious
147.185.221.20
pst-child.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wjoqZlIS_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\YsrQekGS_RASMANCS
FileDirectory
\REGISTRY\A\{ef90d74f-757c-6025-b07c-3d3a71db48f5}\LocalState
VeryFirstLaunch
\REGISTRY\A\{ef90d74f-757c-6025-b07c-3d3a71db48f5}\LocalState
Mode
There are 21 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
902000
unkown
page readonly
malicious
4B2000
unkown
page readonly
malicious
2756000
trusted library allocation
page read and write
malicious
3FCE000
heap
page read and write
malicious
6802000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
7FFD9B573000
trusted library allocation
page read and write
20580825000
heap
page read and write
1AC7C000
stack
page read and write
3E35000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
737000
heap
page read and write
8F17000
heap
page read and write
21740C83000
trusted library allocation
page read and write
205E8942000
trusted library allocation
page read and write
7FFD9B276000
trusted library allocation
page execute and read and write
1A705800000
heap
page read and write
75F0000
trusted library allocation
page execute and read and write
79BE000
stack
page read and write
1B0BD000
stack
page read and write
3BF2000
trusted library allocation
page read and write
7FFD9B430000
trusted library allocation
page read and write
1B760000
heap
page read and write
7600000
trusted library allocation
page read and write
7FFD9B34A000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
20580471000
heap
page read and write
1A77FF76000
heap
page read and write
F39000
heap
page read and write
7FFD9B24C000
trusted library allocation
page execute and read and write
205E6515000
heap
page read and write
7FF4F7883000
trusted library allocation
page execute read
1A77F3EF000
heap
page read and write
1A7063DA000
heap
page read and write
1A77F310000
heap
page read and write
2173D2E9000
heap
page read and write
205E9842000
trusted library allocation
page read and write
1A77F2E5000
heap
page read and write
20580430000
heap
page read and write
1A706A00000
heap
page read and write
3FD6000
trusted library allocation
page read and write
71F000
heap
page read and write
7FF630CE0000
unkown
page readonly
1A77FF23000
heap
page read and write
2585878000
stack
page read and write
2173EF28000
trusted library allocation
page read and write
7797000
heap
page read and write
7FFD9B4B3000
trusted library allocation
page read and write
7FFD9B380000
trusted library allocation
page execute and read and write
205E8FB0000
trusted library allocation
page read and write
217571E0000
heap
page read and write
205F81EB000
trusted library allocation
page read and write
2173F36E000
trusted library allocation
page read and write
2C74000
trusted library allocation
page read and write
6513000
heap
page read and write
1C8AC000
stack
page read and write
BF93C7D000
stack
page read and write
1A70582F000
heap
page read and write
7FFD9B270000
trusted library allocation
page execute and read and write
205806D8000
heap
page read and write
66E2000
trusted library allocation
page read and write
6821000
trusted library allocation
page read and write
1A706C82000
heap
page read and write
135B000
heap
page read and write
21757488000
heap
page read and write
9AF000
heap
page read and write
26EF000
stack
page read and write
DD5000
heap
page read and write
57FE000
trusted library allocation
page read and write
205E64D4000
heap
page read and write
1A77F3CA000
heap
page read and write
1A706C10000
heap
page read and write
7FFD9B320000
trusted library allocation
page execute and read and write
1A706329000
heap
page read and write
ED3000
heap
page read and write
1A77F3AB000
heap
page read and write
1A706B1B000
heap
page read and write
48BE000
heap
page read and write
1E388FB000
stack
page read and write
5590000
trusted library allocation
page read and write
2173D366000
heap
page read and write
6B6000
heap
page read and write
5260000
trusted library allocation
page read and write
205E8BFE000
trusted library allocation
page read and write
1A706B67000
heap
page read and write
258597E000
stack
page read and write
3FFE000
trusted library allocation
page read and write
5270000
heap
page execute and read and write
7FFD9B5C0000
trusted library allocation
page read and write
1A77FF6A000
heap
page read and write
205804D6000
heap
page read and write
2E10000
trusted library allocation
page read and write
1284000
trusted library allocation
page read and write
1C58A000
stack
page read and write
20580495000
heap
page read and write
7FFD9B190000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
217575A7000
heap
page read and write
7FFD9B18D000
trusted library allocation
page execute and read and write
2173D290000
heap
page read and write
21757558000
heap
page read and write
7FFD9B1DC000
trusted library allocation
page execute and read and write
205E8E8D000
trusted library allocation
page read and write
21740233000
trusted library allocation
page read and write
7FFD9B341000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
931000
heap
page read and write
DAE9C7F000
stack
page read and write
1A77F27B000
heap
page read and write
2173D450000
heap
page read and write
21740CCD000
trusted library allocation
page read and write
205F7F21000
trusted library allocation
page read and write
2174EF13000
trusted library allocation
page read and write
7FFD9B162000
trusted library allocation
page read and write
2585A7E000
stack
page read and write
6F60000
trusted library allocation
page read and write
DAE9D76000
stack
page read and write
7FFD9B4EC000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
1B827000
heap
page read and write
BF94ECC000
stack
page read and write
7FFD9B194000
trusted library allocation
page read and write
77FD000
heap
page read and write
77B4000
heap
page read and write
55B0000
trusted library allocation
page execute and read and write
1A77F3EB000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
2173ED10000
heap
page execute and read and write
401000
unkown
page execute read
1A77FF93000
heap
page read and write
205E7F6A000
trusted library allocation
page read and write
62FE000
stack
page read and write
7FFD9B17B000
trusted library allocation
page execute and read and write
7FFD9B5B0000
trusted library allocation
page execute and read and write
2254000
heap
page read and write
1A706AFB000
heap
page read and write
205E971B000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7FFD9B310000
trusted library allocation
page execute and read and write
4013000
trusted library allocation
page read and write
5E0000
heap
page read and write
1A77F388000
heap
page read and write
6DB000
heap
page read and write
6532000
trusted library allocation
page read and write
2A6F000
stack
page read and write
5610000
trusted library allocation
page read and write
205E7EE0000
heap
page read and write
3DCA000
trusted library allocation
page read and write
1A77F296000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
2173FC60000
trusted library allocation
page read and write
3C5B000
trusted library allocation
page read and write
1A706D02000
heap
page read and write
6EF0000
heap
page read and write
1A706B46000
heap
page read and write
C64000
heap
page read and write
81A000
heap
page read and write
20580725000
heap
page read and write
42A000
unkown
page readonly
1A77F37E000
heap
page read and write
1A706CB0000
heap
page read and write
205E65D0000
heap
page read and write
205E90CB000
trusted library allocation
page read and write
1A77F313000
heap
page read and write
6860000
trusted library allocation
page read and write
7FF630CE2000
unkown
page readonly
1C688000
stack
page read and write
205E9200000
trusted library allocation
page read and write
77BA000
heap
page read and write
2270000
heap
page read and write
1A706323000
heap
page read and write
BF9407E000
stack
page read and write
7FFD9B510000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
27494D80000
heap
page read and write
7FFD9B330000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
205E9D19000
trusted library allocation
page read and write
7DF410750000
trusted library allocation
page execute and read and write
205E9013000
trusted library allocation
page read and write
205E8C66000
trusted library allocation
page read and write
1B859000
heap
page read and write
7FFD9B150000
trusted library allocation
page read and write
DAE99CC000
stack
page read and write
217572A1000
heap
page read and write
2F44000
trusted library allocation
page read and write
20580507000
heap
page read and write
7FFD9B570000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
1A706B2C000
heap
page read and write
3BE1000
trusted library allocation
page read and write
205E7EB0000
heap
page execute and read and write
66E000
stack
page read and write
1A77F060000
heap
page read and write
1A706B0E000
heap
page read and write
7FFD9B182000
trusted library allocation
page read and write
3FE2000
trusted library allocation
page read and write
5580000
trusted library allocation
page execute and read and write
2174EED1000
trusted library allocation
page read and write
54BE000
stack
page read and write
20580460000
heap
page read and write
8FC000
heap
page read and write
C6D000
heap
page read and write
3FC8000
heap
page read and write
2173FE17000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
2173D3BA000
heap
page read and write
1A77F323000
heap
page read and write
1A7063DC000
heap
page read and write
7FFD9B590000
trusted library allocation
page read and write
2173ED40000
heap
page read and write
1A706C52000
heap
page read and write
2173D1B0000
heap
page read and write
9AB000
stack
page read and write
1A77FF12000
heap
page read and write
20580759000
heap
page read and write
21757228000
heap
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
21757760000
heap
page read and write
1B35E000
stack
page read and write
2173EE90000
heap
page read and write
2273000
heap
page read and write
205E64CC000
heap
page read and write
66CF000
trusted library allocation
page read and write
2173FF36000
trusted library allocation
page read and write
1A77FFEA000
heap
page read and write
6D40000
trusted library allocation
page read and write
BF941FA000
stack
page read and write
64F5000
heap
page read and write
2173FAA3000
trusted library allocation
page read and write
217401AB000
trusted library allocation
page read and write
2173D300000
heap
page read and write
6B50000
trusted library allocation
page execute and read and write
7FFD9B2F0000
trusted library allocation
page read and write
178000
stack
page read and write
1B955000
stack
page read and write
5E5000
heap
page read and write
1A720000
trusted library allocation
page read and write
1B65E000
stack
page read and write
737000
heap
page read and write
1A706B26000
heap
page read and write
7FFD9B500000
trusted library allocation
page read and write
21740CC8000
trusted library allocation
page read and write
20580426000
heap
page execute and read and write
2173D430000
trusted library allocation
page read and write
2BD0000
heap
page execute and read and write
80FE000
stack
page read and write
BF943FF000
stack
page read and write
3C0F000
trusted library allocation
page read and write
7FFD9B4E4000
trusted library allocation
page read and write
1A706ACE000
heap
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
7FFD9B600000
trusted library allocation
page read and write
1A706C98000
heap
page read and write
205E9675000
trusted library allocation
page read and write
1E397FF000
stack
page read and write
66D4000
trusted library allocation
page read and write
BF93F79000
stack
page read and write
BF93EFE000
stack
page read and write
25854FE000
stack
page read and write
75D0000
trusted library allocation
page execute and read and write
451000
unkown
page readonly
7FFD9B4F8000
trusted library allocation
page read and write
2173EC10000
heap
page readonly
6804000
trusted library allocation
page read and write
7FFD9B170000
trusted library allocation
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
2173EC90000
heap
page execute and read and write
7630000
trusted library allocation
page read and write
205E7DA0000
trusted library allocation
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
28FB000
trusted library allocation
page read and write
205E64EC000
heap
page read and write
7FFD9B470000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
778B000
heap
page read and write
6516000
heap
page read and write
95D000
heap
page read and write
21757460000
heap
page execute and read and write
7FFD9B160000
trusted library allocation
page read and write
1A706C04000
heap
page read and write
D8E000
stack
page read and write
2FA0000
trusted library allocation
page read and write
205E9D14000
trusted library allocation
page read and write
1A706C9C000
heap
page read and write
1E391FE000
stack
page read and write
21BF000
stack
page read and write
27494DB8000
heap
page read and write
7FFD9B460000
trusted library allocation
page read and write
7FFD9B4F2000
trusted library allocation
page read and write
79FE000
stack
page read and write
1A7059BB000
heap
page read and write
3D84000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page read and write
1A77F1D0000
heap
page read and write
205E8CD9000
trusted library allocation
page read and write
7FFD9B236000
trusted library allocation
page read and write
1A77FF88000
heap
page read and write
25866CD000
stack
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
1350000
heap
page read and write
2058084E000
heap
page read and write
20580868000
heap
page read and write
205F81E9000
trusted library allocation
page read and write
900000
unkown
page readonly
6B7000
heap
page read and write
1A706B3C000
heap
page read and write
1C8EE000
stack
page read and write
1AA76000
heap
page read and write
81FE000
stack
page read and write
1C290000
heap
page read and write
2173D3F0000
heap
page read and write
400E000
heap
page read and write
5530000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
2173FE0E000
trusted library allocation
page read and write
1A706512000
trusted library allocation
page read and write
20580864000
heap
page read and write
62E000
stack
page read and write
21757490000
heap
page read and write
1A77FF63000
heap
page read and write
778F000
heap
page read and write
D20000
heap
page read and write
66A5000
trusted library allocation
page read and write
7FFD9B59C000
trusted library allocation
page read and write
3FEF000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
F73000
heap
page read and write
54D1000
trusted library allocation
page read and write
21740629000
trusted library allocation
page read and write
205F81FB000
trusted library allocation
page read and write
1B250000
heap
page execute and read and write
1A77FF4C000
heap
page read and write
400000
unkown
page readonly
DAE9CFE000
stack
page read and write
205E656A000
heap
page read and write
217407F7000
trusted library allocation
page read and write
2173D410000
trusted library section
page read and write
205806A0000
heap
page execute and read and write
54CB000
trusted library allocation
page read and write
274967F4000
heap
page read and write
6818000
trusted library allocation
page read and write
7FFD9B362000
trusted library allocation
page read and write
6E9E000
stack
page read and write
205E7EF1000
trusted library allocation
page read and write
5650000
trusted library allocation
page execute and read and write
7FF630CE4000
unkown
page readonly
9C3000
heap
page read and write
1A77F2BB000
heap
page read and write
2173FA8B000
trusted library allocation
page read and write
2173D326000
heap
page read and write
25864CE000
stack
page read and write
7FFD9B16D000
trusted library allocation
page execute and read and write
1E396FF000
stack
page read and write
680000
heap
page read and write
227A000
heap
page read and write
205E6430000
heap
page read and write
1A7063EB000
heap
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
66BA000
trusted library allocation
page read and write
66CA000
trusted library allocation
page read and write
6438000
heap
page read and write
6B4000
heap
page read and write
1C28E000
stack
page read and write
7FF630CE2000
unkown
page readonly
680C000
trusted library allocation
page read and write
2173FE12000
trusted library allocation
page read and write
7DF4C0920000
trusted library allocation
page execute and read and write
1B7BE000
heap
page read and write
258518D000
stack
page read and write
BF93D7E000
stack
page read and write
66A9000
trusted library allocation
page read and write
3C5D000
trusted library allocation
page read and write
7FFD9B300000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
2173FE0A000
trusted library allocation
page read and write
7DF4C0930000
trusted library allocation
page execute and read and write
274967F0000
heap
page read and write
54F1000
trusted library allocation
page read and write
12B7000
trusted library allocation
page execute and read and write
205E6450000
heap
page read and write
3FE8000
trusted library allocation
page read and write
3D7E000
trusted library allocation
page read and write
4B5E000
stack
page read and write
205E92BB000
trusted library allocation
page read and write
1A77F3CF000
heap
page read and write
1A77F347000
heap
page read and write
4C5F000
stack
page read and write
1B1A0000
heap
page read and write
27496720000
heap
page read and write
1A706B35000
heap
page read and write
CF7000
stack
page read and write
6B40000
trusted library allocation
page read and write
25858F9000
stack
page read and write
651D000
heap
page read and write
7FFD9B370000
trusted library allocation
page execute and read and write
1B55E000
stack
page read and write
790000
trusted library allocation
page read and write
7FFD9B266000
trusted library allocation
page execute and read and write
2585AFB000
stack
page read and write
7FFD9B230000
trusted library allocation
page read and write
1A77F200000
heap
page read and write
1A706B17000
heap
page read and write
205E7DF0000
heap
page read and write
3DD7000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page read and write
1A77F2BF000
heap
page read and write
258674E000
stack
page read and write
21F0000
heap
page read and write
BF93DFE000
stack
page read and write
7FFD9B600000
trusted library allocation
page read and write
3C62000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
205E7D80000
trusted library allocation
page read and write
12A6000
trusted library allocation
page execute and read and write
1300000
heap
page read and write
1A77F3BE000
heap
page read and write
205804D0000
heap
page read and write
205804FB000
heap
page read and write
1A77F3E7000
heap
page read and write
BE3000
trusted library allocation
page read and write
2173F0C9000
trusted library allocation
page read and write
7FFD9B1A0000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
7FFD9B430000
trusted library allocation
page read and write
1A706B98000
heap
page read and write
1A77FF09000
heap
page read and write
205E64D8000
heap
page read and write
BBE000
stack
page read and write
1A77F2FD000
heap
page read and write
1A7059F1000
heap
page read and write
77A1000
heap
page read and write
721000
heap
page read and write
DAE9FFF000
stack
page read and write
7FFD9B3B0000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
64B3000
heap
page read and write
BF93CFE000
stack
page read and write
205805C0000
heap
page read and write
66D0000
trusted library allocation
page read and write
7FFD9B364000
trusted library allocation
page read and write
7FFD9B374000
trusted library allocation
page read and write
1CB2B000
stack
page read and write
1A77F243000
heap
page read and write
1B829000
heap
page read and write
68B000
heap
page read and write
1A706B59000
heap
page read and write
1A706B06000
heap
page read and write
7DF410740000
trusted library allocation
page execute and read and write
42A000
unkown
page readonly
27494D70000
heap
page read and write
6849000
trusted library allocation
page read and write
DD0000
heap
page read and write
4A1E000
stack
page read and write
205804EF000
heap
page read and write
DAE9D79000
stack
page read and write
3D71000
trusted library allocation
page read and write
2C63000
trusted library allocation
page read and write
DAE9DFB000
stack
page read and write
815000
heap
page read and write
7FFD9B3E0000
trusted library allocation
page read and write
1A706ACB000
heap
page read and write
1C92E000
stack
page read and write
7760000
heap
page read and write
7FFD9B420000
trusted library allocation
page read and write
1A706B13000
heap
page read and write
2BE1000
trusted library allocation
page read and write
7FFD9B340000
trusted library allocation
page execute and read and write
1A706B8F000
heap
page read and write
190000
stack
page read and write
20580755000
heap
page read and write
7FFD9B206000
trusted library allocation
page read and write
DCE000
stack
page read and write
5ACE000
stack
page read and write
205E64EF000
heap
page read and write
1BB5B000
stack
page read and write
64E9000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
1A77FF18000
heap
page read and write
1E390FF000
stack
page read and write
1270000
trusted library allocation
page read and write
25865CE000
stack
page read and write
205F7F11000
trusted library allocation
page read and write
1E39EFE000
stack
page read and write
1290000
trusted library allocation
page read and write
2B6E000
stack
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
205E6490000
heap
page read and write
1C2B5000
heap
page read and write
451000
unkown
page readonly
63FE000
stack
page read and write
205E8118000
trusted library allocation
page read and write
1E389FF000
stack
page read and write
61FE000
stack
page read and write
675D000
stack
page read and write
7620000
heap
page read and write
1B45E000
stack
page read and write
1A77FFF3000
heap
page read and write
4027000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
42F000
unkown
page write copy
1A70583F000
heap
page read and write
2173FEDA000
trusted library allocation
page read and write
4B0000
unkown
page readonly
1A77F37A000
heap
page read and write
2058052D000
heap
page read and write
BD0000
trusted library allocation
page read and write
7FFD9B368000
trusted library allocation
page read and write
1E38BF9000
stack
page read and write
1A77F22A000
heap
page read and write
3C00000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
7FFD9B2A0000
trusted library allocation
page execute and read and write
737000
heap
page read and write
96000
stack
page read and write
7FFD9B153000
trusted library allocation
page execute and read and write
1A706CA6000
heap
page read and write
125F000
stack
page read and write
6B30000
heap
page read and write
205F82D1000
trusted library allocation
page read and write
205E7E30000
trusted library allocation
page read and write
7FFD9B320000
trusted library allocation
page read and write
21757498000
heap
page read and write
D40000
heap
page read and write
1A706C00000
heap
page read and write
1B7B0000
heap
page read and write
1A70584A000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
1150000
heap
page read and write
3FF2000
trusted library allocation
page read and write
7FFD9B3F0000
trusted library allocation
page read and write
7650000
trusted library allocation
page execute and read and write
1C08E000
stack
page read and write
6AFE000
stack
page read and write
7FFD9B500000
trusted library allocation
page read and write
7FFD9B184000
trusted library allocation
page read and write
1A77F3F4000
heap
page read and write
7FFD9B236000
trusted library allocation
page execute and read and write
1C690000
heap
page read and write
2173FA9B000
trusted library allocation
page read and write
3FB1000
heap
page read and write
E4C000
stack
page read and write
205E91CA000
trusted library allocation
page read and write
1A77F383000
heap
page read and write
537E000
stack
page read and write
2173D31E000
heap
page read and write
2174F1AB000
trusted library allocation
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
1B0F0000
heap
page read and write
1B0F3000
heap
page read and write
7FFD9B1EC000
trusted library allocation
page execute and read and write
21740798000
trusted library allocation
page read and write
1A706D02000
heap
page read and write
1A77F3A2000
heap
page read and write
1A701410000
trusted library allocation
page read and write
1A706D02000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page execute and read and write
669F000
stack
page read and write
126F1000
trusted library allocation
page read and write
27496CA0000
heap
page read and write
1A77F1C0000
trusted library allocation
page read and write
6C0000
heap
page read and write
21757631000
heap
page read and write
BF940F6000
stack
page read and write
2BC0000
trusted library allocation
page read and write
205804F3000
heap
page read and write
2173EEA1000
trusted library allocation
page read and write
1A706B00000
heap
page read and write
40B0000
trusted library allocation
page read and write
1A705915000
heap
page read and write
66E5000
trusted library allocation
page read and write
7FF4F4940000
trusted library allocation
page execute and read and write
BF94078000
stack
page read and write
1A706AEA000
heap
page read and write
7FFD9B331000
trusted library allocation
page read and write
777D000
heap
page read and write
1A706CB0000
heap
page read and write
1A77F35E000
heap
page read and write
7FFD9B4D9000
trusted library allocation
page read and write
2210000
heap
page read and write
205E8E77000
trusted library allocation
page read and write
1A706D02000
heap
page read and write
6C0000
heap
page read and write
BE0000
trusted library allocation
page read and write
7FFD9B590000
trusted library allocation
page read and write
7FFD9B5E6000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
205E65D4000
heap
page read and write
6C4000
heap
page read and write
2173D320000
heap
page read and write
258547E000
stack
page read and write
205E8F84000
trusted library allocation
page read and write
18A000
stack
page read and write
205E6590000
heap
page read and write
53BE000
stack
page read and write
6540000
trusted library allocation
page execute and read and write
205E7DB0000
heap
page readonly
F9F000
heap
page read and write
562A000
trusted library allocation
page read and write
7FFD9B240000
trusted library allocation
page read and write
7FFD9B378000
trusted library allocation
page read and write
3C68000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
BF94E4E000
stack
page read and write
7FFD9B15D000
trusted library allocation
page execute and read and write
205F81E1000
trusted library allocation
page read and write
1A77F3E2000
heap
page read and write
7FFD9B174000
trusted library allocation
page read and write
2173FE2C000
trusted library allocation
page read and write
205F81DD000
trusted library allocation
page read and write
1A705740000
trusted library allocation
page read and write
7FFD9B332000
trusted library allocation
page read and write
2585579000
stack
page read and write
3C55000
trusted library allocation
page read and write
1A77F2E7000
heap
page read and write
7FFD9B360000
trusted library allocation
page execute and read and write
1BA54000
stack
page read and write
1A77FF00000
heap
page read and write
7FFD9B390000
trusted library allocation
page read and write
1B7D4000
heap
page read and write
57F0000
trusted library allocation
page read and write
12B5000
trusted library allocation
page execute and read and write
54D6000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
129D000
trusted library allocation
page execute and read and write
2173D36A000
heap
page read and write
66A2000
trusted library allocation
page read and write
7FFD9B450000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
7FF630CE4000
unkown
page readonly
7FFD9B490000
trusted library allocation
page read and write
1A706B56000
heap
page read and write
7FFD9B190000
trusted library allocation
page read and write
3DDD000
trusted library allocation
page read and write
6C0000
heap
page read and write
7FFD9B380000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
6C0000
heap
page read and write
12A2000
trusted library allocation
page read and write
1A706CA4000
heap
page read and write
6420000
heap
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
2173FE1B000
trusted library allocation
page read and write
205804FF000
heap
page read and write
205E9CCF000
trusted library allocation
page read and write
20580870000
heap
page read and write
1CA2D000
stack
page read and write
1A77F040000
heap
page read and write
7FFD9B450000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
1A77FE02000
heap
page read and write
BF9447B000
stack
page read and write
4B0000
unkown
page readonly
3BEE000
trusted library allocation
page read and write
1BD4B000
stack
page read and write
205E9199000
trusted library allocation
page read and write
1A706B42000
heap
page read and write
2174F19B000
trusted library allocation
page read and write
1A77FFE2000
heap
page read and write
2173FE06000
trusted library allocation
page read and write
D44000
heap
page read and write
7FFD9B3F0000
trusted library allocation
page read and write
4BE8000
trusted library allocation
page read and write
2174007B000
trusted library allocation
page read and write
DAE9E7F000
stack
page read and write
D10000
heap
page read and write
1A706B8B000
heap
page read and write
401A000
trusted library allocation
page read and write
1A77F2D5000
heap
page read and write
205E64D0000
heap
page read and write
1C18D000
stack
page read and write
7FFD9B440000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
6CFE000
stack
page read and write
54EE000
trusted library allocation
page read and write
3DD0000
trusted library allocation
page read and write
3FBE000
heap
page read and write
67B0000
trusted library allocation
page read and write
205807C1000
heap
page read and write
7DF410730000
trusted library allocation
page execute and read and write
205E8EF5000
trusted library allocation
page read and write
2173D2E0000
heap
page read and write
2173EC50000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
1A706AE2000
heap
page read and write
1E38EF0000
stack
page read and write
205E9CF4000
trusted library allocation
page read and write
1A77F2D8000
heap
page read and write
1A77F335000
heap
page read and write
1A705898000
heap
page read and write
6D50000
heap
page read and write
20580340000
trusted library allocation
page read and write
1A706CA6000
heap
page read and write
205E8AF6000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
205E83BD000
trusted library allocation
page read and write
850000
heap
page read and write
12E0000
trusted library allocation
page execute and read and write
56DE000
stack
page read and write
205E64A3000
heap
page read and write
1A706300000
heap
page read and write
7FFD9B4E9000
trusted library allocation
page read and write
1E39AFC000
stack
page read and write
6478000
heap
page read and write
5A8E000
stack
page read and write
7A00000
trusted library allocation
page execute and read and write
25851CE000
stack
page read and write
183000
stack
page read and write
1A70582D000
heap
page read and write
2174EEA1000
trusted library allocation
page read and write
21757623000
heap
page read and write
21740735000
trusted library allocation
page read and write
7FFD9B1AC000
trusted library allocation
page execute and read and write
1B1E0000
heap
page read and write
7FFD9B20C000
trusted library allocation
page execute and read and write
DAE9EFD000
stack
page read and write
20580420000
heap
page execute and read and write
2174EEC1000
trusted library allocation
page read and write
658E000
stack
page read and write
27494DB0000
heap
page read and write
400E000
heap
page read and write
7FFD9B19B000
trusted library allocation
page read and write
1A706B4E000
heap
page read and write
5511000
trusted library allocation
page read and write
1E392FC000
stack
page read and write
59E000
stack
page read and write
7FF630CE0000
unkown
page readonly
205E8E93000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
1A706D02000
heap
page read and write
2BAC000
stack
page read and write
258654D000
stack
page read and write
2173ED55000
heap
page read and write
20580780000
heap
page read and write
1B1D0000
heap
page read and write
8F00000
heap
page read and write
7FFD9B4FC000
trusted library allocation
page read and write
7FFD9B3C0000
trusted library allocation
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
1A7059B6000
heap
page read and write
679E000
stack
page read and write
7FFD9B3C0000
trusted library allocation
page read and write
5F1000
stack
page read and write
57EE000
stack
page read and write
2173D420000
trusted library section
page read and write
21740CA8000
trusted library allocation
page read and write
6E5D000
stack
page read and write
3BF9000
trusted library allocation
page read and write
217575EE000
heap
page read and write
77DF000
heap
page read and write
91B000
heap
page read and write
2058086D000
heap
page read and write
511E000
stack
page read and write
2174F191000
trusted library allocation
page read and write
D20000
heap
page execute and read and write
2585102000
stack
page read and write
7FFD9B4C3000
trusted library allocation
page read and write
7FFD9B3D0000
trusted library allocation
page read and write
1E39BFC000
stack
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
434000
unkown
page read and write
6DB000
heap
page read and write
1A7061E0000
trusted library allocation
page read and write
7FF630CE9000
unkown
page readonly
67F0000
trusted library allocation
page read and write
BF94179000
stack
page read and write
2BCA000
trusted library allocation
page read and write
2175723A000
heap
page read and write
BF94FCC000
stack
page read and write
1A77F3B5000
heap
page read and write
6850000
trusted library allocation
page read and write
205E7EE4000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
1357000
heap
page read and write
1A706C70000
heap
page read and write
7FF4F7881000
trusted library allocation
page execute read
6506000
heap
page read and write
1A77F2EF000
heap
page read and write
2173EC00000
trusted library allocation
page read and write
205E64AE000
heap
page read and write
205F7F64000
trusted library allocation
page read and write
6EDF000
stack
page read and write
1A77F3DD000
heap
page read and write
2173D454000
heap
page read and write
7F730000
trusted library allocation
page execute and read and write
7FFD9B154000
trusted library allocation
page read and write
1A7057A0000
trusted library allocation
page read and write
1A706D00000
heap
page read and write
1A706CA6000
heap
page read and write
205E9140000
trusted library allocation
page read and write
BF9437E000
stack
page read and write
7FFD9B3D0000
trusted library allocation
page read and write
54E2000
trusted library allocation
page read and write
3C6F000
trusted library allocation
page read and write
205E64DA000
heap
page read and write
7FFD9B19D000
trusted library allocation
page execute and read and write
BF93FFD000
stack
page read and write
181000
stack
page read and write
1A706B75000
heap
page read and write
1A706B1F000
heap
page read and write
237F000
stack
page read and write
7FFD9B4D4000
trusted library allocation
page read and write
1A706B24000
heap
page read and write
C60000
heap
page read and write
9B3000
heap
page read and write
F76000
heap
page read and write
682D000
trusted library allocation
page read and write
205E91CC000
trusted library allocation
page read and write
BF9427E000
stack
page read and write
19A000
stack
page read and write
7FFD9B33A000
trusted library allocation
page read and write
EC0000
heap
page read and write
1A77F3B9000
heap
page read and write
2174F18C000
trusted library allocation
page read and write
460000
heap
page read and write
1A705780000
heap
page read and write
5600000
trusted library allocation
page read and write
3C79000
trusted library allocation
page read and write
6806000
trusted library allocation
page read and write
F7F000
heap
page read and write
1A706CA6000
heap
page read and write
6EE0000
trusted library allocation
page read and write
1E38DFC000
stack
page read and write
BF942FE000
stack
page read and write
6D3B000
stack
page read and write
192000
stack
page read and write
2D4E000
trusted library allocation
page read and write
2058070B000
heap
page read and write
6DD000
heap
page read and write
17E000
stack
page read and write
4004000
trusted library allocation
page read and write
77A8000
heap
page read and write
7FFD9B1B0000
trusted library allocation
page read and write
3FBF000
heap
page read and write
6DB000
heap
page read and write
7FFD9B23C000
trusted library allocation
page execute and read and write
2585677000
stack
page read and write
2173D32C000
heap
page read and write
2586649000
stack
page read and write
134E000
stack
page read and write
6462000
heap
page read and write
66E0000
trusted library allocation
page read and write
400000
unkown
page readonly
1E399FC000
stack
page read and write
205806C0000
heap
page read and write
BF93983000
stack
page read and write
F05000
heap
page read and write
540000
heap
page read and write
205E975A000
trusted library allocation
page read and write
3FDB000
trusted library allocation
page read and write
205807A2000
heap
page read and write
1A77F2C8000
heap
page read and write
20BF000
stack
page read and write
7FFD9B400000
trusted library allocation
page read and write
205805A0000
heap
page read and write
1283000
trusted library allocation
page execute and read and write
6B0000
heap
page read and write
7FFD9B3E0000
trusted library allocation
page read and write
1A70591B000
heap
page read and write
1A705827000
heap
page read and write
7FFD9B440000
trusted library allocation
page read and write
128D000
trusted library allocation
page execute and read and write
64EE000
heap
page read and write
205E7E00000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
7FFD9B580000
trusted library allocation
page read and write
6B0000
heap
page read and write
6814000
trusted library allocation
page read and write
26CF000
heap
page read and write
2E8D000
trusted library allocation
page read and write
DAE9F7D000
stack
page read and write
205F81E3000
trusted library allocation
page read and write
205E9104000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
205804CD000
heap
page read and write
F7B000
heap
page read and write
205E9781000
trusted library allocation
page read and write
7FFD9B470000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
2174026D000
trusted library allocation
page read and write
1A706B7A000
heap
page read and write
870000
heap
page read and write
2173FF62000
trusted library allocation
page read and write
4DDC000
stack
page read and write
50C0000
heap
page read and write
1A706B9B000
heap
page read and write
7FFD9B192000
trusted library allocation
page read and write
BF939CE000
stack
page read and write
7FF630CE1000
unkown
page execute read
7FFD9B480000
trusted library allocation
page read and write
205808E0000
trusted library allocation
page read and write
680F000
trusted library allocation
page read and write
25856FE000
stack
page read and write
205804B9000
heap
page read and write
12BB000
trusted library allocation
page execute and read and write
7FFD9B1AB000
trusted library allocation
page read and write
205804E5000
heap
page read and write
7FFD9B1A0000
trusted library allocation
page read and write
2250000
heap
page read and write
1A706CA6000
heap
page read and write
7FFD9B3B0000
trusted library allocation
page read and write
205807EB000
heap
page read and write
1A77F361000
heap
page read and write
1B1D4000
heap
page read and write
2173ECA0000
trusted library allocation
page read and write
521F000
stack
page read and write
6B4000
heap
page read and write
3C89000
trusted library allocation
page read and write
66BF000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
BF9504E000
stack
page read and write
20580800000
heap
page read and write
2175762F000
heap
page read and write
1E398FC000
stack
page read and write
7823000
heap
page read and write
21740148000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
44E000
unkown
page read and write
7FF630CE9000
unkown
page readonly
2173FA99000
trusted library allocation
page read and write
67FA000
trusted library allocation
page read and write
3D77000
trusted library allocation
page read and write
1A706B0A000
heap
page read and write
3FB0000
heap
page read and write
7FFD9B480000
trusted library allocation
page read and write
1A70589A000
heap
page read and write
810000
heap
page read and write
401000
unkown
page execute read
95B000
heap
page read and write
1A706202000
heap
page read and write
57FB000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
20580503000
heap
page read and write
6828000
trusted library allocation
page read and write
780000
heap
page read and write
6C0000
heap
page read and write
3C0C000
trusted library allocation
page read and write
681E000
trusted library allocation
page read and write
205804F7000
heap
page read and write
2173FFC5000
trusted library allocation
page read and write
21757634000
heap
page read and write
2173F8F2000
trusted library allocation
page read and write
2173D2B0000
heap
page read and write
12B0000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
64AD000
heap
page read and write
2058046E000
heap
page read and write
8F02000
heap
page read and write
1E39DFD000
stack
page read and write
1A77F371000
heap
page read and write
3C13000
trusted library allocation
page read and write
205F7F00000
trusted library allocation
page read and write
67E0000
trusted library allocation
page execute and read and write
25859FF000
stack
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
840000
heap
page read and write
BF94F47000
stack
page read and write
525E000
stack
page read and write
776A000
heap
page read and write
7FFD9B460000
trusted library allocation
page read and write
EFA000
heap
page read and write
66A0000
trusted library allocation
page read and write
7FFD9B246000
trusted library allocation
page read and write
20580817000
heap
page read and write
2173D324000
heap
page read and write
12B2000
trusted library allocation
page read and write
7786000
heap
page read and write
1A77F3B1000
heap
page read and write
1A706213000
heap
page read and write
5540000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
2E32000
trusted library allocation
page read and write
400E000
trusted library allocation
page read and write
205804E0000
heap
page read and write
4B1F000
stack
page read and write
4D7D000
stack
page read and write
2173FC1D000
trusted library allocation
page read and write
205E8F21000
trusted library allocation
page read and write
21757480000
heap
page read and write
9AD000
heap
page read and write
1A77FFE0000
heap
page read and write
1A77F30A000
heap
page read and write
30DD000
trusted library allocation
page read and write
27494E37000
heap
page read and write
7FFD9B210000
trusted library allocation
page execute and read and write
F07000
heap
page read and write
7FFD9B180000
trusted library allocation
page read and write
C20000
heap
page read and write
7FFD9B580000
trusted library allocation
page read and write
7FFD9B510000
trusted library allocation
page read and write
1A706C4A000
heap
page read and write
6826000
trusted library allocation
page read and write
2173FD9E000
trusted library allocation
page read and write
205FFEFC000
heap
page read and write
7FFD9B372000
trusted library allocation
page read and write
BF93E79000
stack
page read and write
1A706AD6000
heap
page read and write
25855FE000
stack
page read and write
205E91CE000
trusted library allocation
page read and write
7FFD9B17D000
trusted library allocation
page execute and read and write
1E39FF9000
stack
page read and write
890000
heap
page read and write
21757494000
heap
page read and write
25857F8000
stack
page read and write
4D9F000
stack
page read and write
1E395FC000
stack
page read and write
7FF630CE1000
unkown
page execute read
56E0000
trusted library allocation
page execute and read and write
1E39CFC000
stack
page read and write
1A77F39E000
heap
page read and write
55A0000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
205E6350000
heap
page read and write
30A9000
trusted library allocation
page read and write
7FFD9B4E8000
trusted library allocation
page read and write
2174F193000
trusted library allocation
page read and write
92F000
heap
page read and write
7FFD9B183000
trusted library allocation
page execute and read and write
1A77F030000
heap
page read and write
2BC4000
trusted library allocation
page read and write
569E000
stack
page read and write
2174070F000
trusted library allocation
page read and write
693000
heap
page read and write
21757238000
heap
page read and write
205F7EF1000
trusted library allocation
page read and write
1CC2A000
stack
page read and write
2585779000
stack
page read and write
4C9E000
stack
page read and write
7FFD9B420000
trusted library allocation
page read and write
7FFD9B200000
trusted library allocation
page read and write
217576B0000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
2173EC97000
heap
page execute and read and write
1B75C000
stack
page read and write
30AF000
trusted library allocation
page read and write
6832000
trusted library allocation
page read and write
8F0000
heap
page read and write
21757380000
heap
page read and write
7FFD9B193000
trusted library allocation
page execute and read and write
217574C3000
heap
page read and write
7660000
heap
page read and write
4EDD000
stack
page read and write
66B8000
trusted library allocation
page read and write
2173D322000
heap
page read and write
42F000
unkown
page read and write
1A706D02000
heap
page read and write
782C000
heap
page read and write
1A70632F000
heap
page read and write
2173ED44000
heap
page read and write
16A000
stack
page read and write
66C5000
trusted library allocation
page read and write
1A7058A5000
heap
page read and write
1A706AB1000
heap
page read and write
643C000
heap
page read and write
77CA000
heap
page read and write
400B000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
7FFD9B2B0000
trusted library allocation
page execute and read and write
7FFD9B350000
trusted library allocation
page execute and read and write
1A77F213000
heap
page read and write
7FFD9B350000
trusted library allocation
page execute and read and write
783E000
heap
page read and write
5500000
trusted library allocation
page read and write
1A706B5F000
heap
page read and write
21757567000
heap
page read and write
20580AA0000
heap
page read and write
2173D33E000
heap
page read and write
1A7061D0000
heap
page read and write
There are 1067 hidden memdumps, click here to show them.