IOC Report
kYXIeLflel.exe

loading gif

Files

File Path
Type
Category
Malicious
kYXIeLflel.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\Office16\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\Modules\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\jDownloader\config\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Defender\Offline\WinStore.App.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Media Player\Visualizations\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\Idle.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\Pictures\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\p82JRgI16Y.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\SKB\LanguageModels\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\SciTE\api\5ea78a9590d30c
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\AutoIt3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Microsoft Office\Office16\9e8d7a4ca61bd9
ASCII text, with very long lines (509), with no line terminators
dropped
C:\Program Files (x86)\Microsoft Office\Office16\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Multimedia Platform\886983d96e3d3e
ASCII text, with very long lines (785), with no line terminators
dropped
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\Modules\5ea78a9590d30c
ASCII text, with very long lines (621), with no line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\Modules\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\jDownloader\config\5ea78a9590d30c
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\jDownloader\config\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\Offline\WinStore.App.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Defender\Offline\fd168b19609dff
ASCII text, with very long lines (606), with no line terminators
dropped
C:\Program Files\Windows Media Player\Visualizations\5ea78a9590d30c
ASCII text, with very long lines (821), with no line terminators
dropped
C:\Program Files\Windows Media Player\Visualizations\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\5ea78a9590d30c
ASCII text, with very long lines (383), with no line terminators
dropped
C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\SoftwareDistribution\5ea78a9590d30c
ASCII text, with very long lines (335), with no line terminators
dropped
C:\ProgramData\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\5ea78a9590d30c
ASCII text, with very long lines (692), with no line terminators
dropped
C:\Recovery\6ccacd8608530f
ASCII text, with very long lines (423), with no line terminators
dropped
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\Idle.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\OneDrive\5ea78a9590d30c
ASCII text, with no line terminators
dropped
C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\Pictures\9e8d7a4ca61bd9
ASCII text, with very long lines (571), with no line terminators
dropped
C:\Users\Default\Pictures\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DcGCAukyUlBjBtCNMvgN.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kYXIeLflel.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\6sws7LH3dX
ASCII text, with no line terminators
dropped
C:\Windows\SKB\LanguageModels\5940a34987c991
ASCII text, with very long lines (663), with no line terminators
dropped
C:\Windows\SKB\LanguageModels\dllhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kYXIeLflel.exe
"C:\Users\user\Desktop\kYXIeLflel.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 13 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 5 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\windowspowershell\Modules\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Modules\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\windowspowershell\Modules\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 7 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 6 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
malicious
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\autoit3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Users\Default\Pictures\RuntimeBroker.exe
"C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files (x86)\autoit3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\autoit3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Users\Default\Pictures\RuntimeBroker.exe
"C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 7 /tr "'C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 14 /tr "'C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Users\All Users\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\jdownloader\config\DcGCAukyUlBjBtCNMvgN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\jdownloader\config\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\SKB\LanguageModels\dllhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\SKB\LanguageModels\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\microsoft office\Office16\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft office\Office16\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\microsoft office\Office16\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://a0950998.xsph.ru/@zd3bk5Wa3RHb1FmZlR0X
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\1eeac47e1570cbf1d06630aabc52dc2dda7d7efb
a684272e718290128734b6b22fa6fb40aa2b3b08
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
3185000
trusted library allocation
page read and write
malicious
2D21000
trusted library allocation
page read and write
malicious
2CFD000
trusted library allocation
page read and write
malicious
3431000
trusted library allocation
page read and write
malicious
2CC1000
trusted library allocation
page read and write
malicious
2A11000
trusted library allocation
page read and write
malicious
2D5D000
trusted library allocation
page read and write
malicious
2A61000
trusted library allocation
page read and write
malicious
12A6D000
trusted library allocation
page read and write
malicious
1AD50000
trusted library allocation
page read and write
1C6FE000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
DB0000
heap
page read and write
1C8D5000
heap
page read and write
1363A000
trusted library allocation
page read and write
12F2D000
trusted library allocation
page read and write
12CC1000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1C7EB000
heap
page read and write
12E2A000
trusted library allocation
page read and write
12B05000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
2A30000
trusted library section
page read and write
12F62000
trusted library allocation
page read and write
136E0000
trusted library allocation
page read and write
980000
heap
page read and write
12D4D000
trusted library allocation
page read and write
7FF848FC6000
trusted library allocation
page read and write
13557000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
12E38000
trusted library allocation
page read and write
12C0C000
trusted library allocation
page read and write
7FF8491C1000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
1B602000
heap
page read and write
1B13D000
stack
page read and write
3323000
trusted library allocation
page read and write
3C2000
unkown
page readonly
1BAD0000
heap
page read and write
E44000
heap
page read and write
12AF9000
trusted library allocation
page read and write
136C0000
trusted library allocation
page read and write
12E8E000
trusted library allocation
page read and write
1C8C0000
heap
page read and write
12D36000
trusted library allocation
page read and write
12F62000
trusted library allocation
page read and write
10FF000
stack
page read and write
12B7F000
trusted library allocation
page read and write
12CB4000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
D46000
heap
page read and write
331B000
trusted library allocation
page read and write
12D6E000
trusted library allocation
page read and write
12F65000
trusted library allocation
page read and write
BBE000
heap
page read and write
7FF848E1C000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
12C15000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
1354E000
trusted library allocation
page read and write
12F26000
trusted library allocation
page read and write
1C6F1000
heap
page read and write
12E2B000
trusted library allocation
page read and write
D0C000
heap
page read and write
E00000
heap
page read and write
1BE59000
stack
page read and write
12DCA000
trusted library allocation
page read and write
12E02000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page execute and read and write
E2C000
heap
page read and write
1B490000
trusted library section
page read and write
1165000
heap
page read and write
7FF849088000
trusted library allocation
page read and write
7FF8490F9000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
164D1000
trusted library allocation
page read and write
7B0000
heap
page read and write
12B8D000
trusted library allocation
page read and write
DCF000
heap
page read and write
ED0000
heap
page read and write
1B430000
trusted library section
page read and write
12B9E000
trusted library allocation
page read and write
12A21000
trusted library allocation
page read and write
12C1B000
trusted library allocation
page read and write
12AFC000
trusted library allocation
page read and write
12E9C000
trusted library allocation
page read and write
146D1000
trusted library allocation
page read and write
DE0000
trusted library section
page read and write
12B90000
trusted library allocation
page read and write
1030000
trusted library section
page read and write
2ED5000
trusted library allocation
page read and write
1BD5A000
stack
page read and write
1B8CE000
stack
page read and write
13677000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
12CC0000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
EFE000
stack
page read and write
1B42F000
stack
page read and write
7FF848F41000
trusted library allocation
page execute and read and write
1358D000
trusted library allocation
page read and write
1190000
heap
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
E13000
heap
page read and write
1B702000
heap
page execute and read and write
314D000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
12E0A000
trusted library allocation
page read and write
12D2D000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
13668000
trusted library allocation
page read and write
1B4E0000
heap
page read and write
3137000
trusted library allocation
page read and write
7FF409510000
trusted library allocation
page execute and read and write
2F7C000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page execute and read and write
2F58000
trusted library allocation
page read and write
1C7A9000
heap
page read and write
1367F000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
FC0000
trusted library section
page read and write
12DEA000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
9E0000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
1202000
heap
page read and write
12F48000
trusted library allocation
page read and write
159B000
heap
page read and write
1BCFE000
stack
page read and write
1BF50000
heap
page execute and read and write
12EAC000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
12B01000
trusted library allocation
page read and write
7FF8492BA000
trusted library allocation
page read and write
7FF849112000
trusted library allocation
page read and write
29F0000
heap
page execute and read and write
2F82000
trusted library allocation
page read and write
1B500000
heap
page execute and read and write
12C63000
trusted library allocation
page read and write
1C7EF000
heap
page read and write
D2A000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
135A7000
trusted library allocation
page read and write
1354A000
trusted library allocation
page read and write
1BE60000
trusted library section
page read and write
1B4C0000
heap
page read and write
1B4C0000
trusted library allocation
page read and write
1AA60000
trusted library allocation
page read and write
12D28000
trusted library allocation
page read and write
1BBF3000
stack
page read and write
12BDF000
trusted library allocation
page read and write
12E72000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page read and write
1C81F000
heap
page read and write
946000
stack
page read and write
12D34000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
7FF84912D000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
12EDD000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
136C6000
trusted library allocation
page read and write
12BC9000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
1BAFF000
stack
page read and write
2ED7000
trusted library allocation
page read and write
EE5000
heap
page read and write
1BA9A000
heap
page read and write
12E4D000
trusted library allocation
page read and write
AF6000
stack
page read and write
135BA000
trusted library allocation
page read and write
7FF848FD3000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
1B5E0000
trusted library section
page read and write
1C7E4000
heap
page read and write
12D40000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
7FF849202000
trusted library allocation
page read and write
10F0000
heap
page execute and read and write
7FF8492BD000
trusted library allocation
page read and write
12E1A000
trusted library allocation
page read and write
136B5000
trusted library allocation
page read and write
7FF848FCB000
trusted library allocation
page read and write
15AD1000
trusted library allocation
page read and write
12EA4000
trusted library allocation
page read and write
1B3A0000
heap
page execute and read and write
7FF848EDC000
trusted library allocation
page execute and read and write
7FF848E13000
trusted library allocation
page execute and read and write
1B602000
heap
page read and write
1B4AF000
stack
page read and write
12AE9000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
1B5CE000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
12AF0000
trusted library allocation
page read and write
12E6F000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF848FD7000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
2A0E000
stack
page read and write
12CC8000
trusted library allocation
page read and write
12CC3000
trusted library allocation
page read and write
12A1D000
trusted library allocation
page read and write
12FC5000
trusted library allocation
page read and write
12ECD000
trusted library allocation
page read and write
DC3000
heap
page read and write
CF6000
stack
page read and write
12CAF000
trusted library allocation
page read and write
EE3000
heap
page read and write
12F54000
trusted library allocation
page read and write
1202000
heap
page read and write
1C82F000
heap
page read and write
1320C000
trusted library allocation
page read and write
E3D000
heap
page read and write
B8C000
heap
page read and write
EF2000
heap
page read and write
2BD0000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
1C708000
heap
page read and write
2F6C000
trusted library allocation
page read and write
12ED0000
trusted library allocation
page read and write
1B480000
trusted library section
page read and write
13682000
trusted library allocation
page read and write
BEA000
heap
page read and write
1C45E000
stack
page read and write
12C24000
trusted library allocation
page read and write
12DC6000
trusted library allocation
page read and write
990000
heap
page read and write
EC1000
heap
page read and write
12CCD000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
1BEFE000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848FD3000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
12E28000
trusted library allocation
page read and write
1B4A0000
heap
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
12B8A000
trusted library allocation
page read and write
7FF848FBC000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
1BD80000
heap
page read and write
12BBE000
trusted library allocation
page read and write
12F5F000
trusted library allocation
page read and write
EC8000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
12E3D000
trusted library allocation
page read and write
12EE1000
trusted library allocation
page read and write
12F0A000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
1355D000
trusted library allocation
page read and write
15E7000
heap
page read and write
1C733000
heap
page read and write
2FE9000
trusted library allocation
page read and write
15E9000
heap
page read and write
1C743000
heap
page read and write
12C99000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1C799000
heap
page read and write
3216000
trusted library allocation
page read and write
2F4E000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
1ADE5000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
12ECC000
trusted library allocation
page read and write
12DA2000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
12CB1000
trusted library allocation
page read and write
12DB0000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848FA3000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
12E9A000
trusted library allocation
page read and write
12E47000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
12B2B000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
331F000
trusted library allocation
page read and write
1B630000
trusted library section
page read and write
1C15A000
stack
page read and write
12DB9000
trusted library allocation
page read and write
1BACE000
stack
page read and write
1C805000
heap
page read and write
12FD0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1020000
trusted library section
page read and write
1B5CF000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
726000
unkown
page readonly
14F6000
stack
page read and write
7FF848FAC000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
1BEA0000
trusted library section
page read and write
9B0000
heap
page read and write
3155000
trusted library allocation
page read and write
135EA000
trusted library allocation
page read and write
1C92D000
heap
page read and write
12F70000
trusted library allocation
page read and write
135F4000
trusted library allocation
page read and write
1C791000
heap
page read and write
7FF8490BB000
trusted library allocation
page read and write
1C7D8000
heap
page read and write
E46000
heap
page read and write
7FF848E27000
trusted library allocation
page read and write
12EC7000
trusted library allocation
page read and write
1C05F000
stack
page read and write
F40000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
1353C000
trusted library allocation
page read and write
E13000
heap
page read and write
1B5B0000
trusted library section
page read and write
12D77000
trusted library allocation
page read and write
12E10000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
12D58000
trusted library allocation
page read and write
13610000
trusted library allocation
page read and write
12C18000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
12F30000
trusted library allocation
page read and write
3C0000
unkown
page readonly
12B2F000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
12D89000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
BEC000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF848EC6000
trusted library allocation
page read and write
7FF8492B6000
trusted library allocation
page read and write
12DB4000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
1C83B000
heap
page read and write
12ECA000
trusted library allocation
page read and write
12BE9000
trusted library allocation
page read and write
7FF848F35000
trusted library allocation
page execute and read and write
7FF8492C0000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
321A000
trusted library allocation
page read and write
12B1D000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1AA90000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
13619000
trusted library allocation
page read and write
12D28000
trusted library allocation
page read and write
12DA8000
trusted library allocation
page read and write
12ED3000
trusted library allocation
page read and write
1B610000
trusted library section
page read and write
12E00000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
12A91000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
1BC8E000
stack
page read and write
12B0E000
trusted library allocation
page read and write
EAE000
heap
page read and write
2A20000
trusted library section
page read and write
131AB000
trusted library allocation
page read and write
12D45000
trusted library allocation
page read and write
12E4F000
trusted library allocation
page read and write
13542000
trusted library allocation
page read and write
1BD8E000
stack
page read and write
12EF8000
trusted library allocation
page read and write
1B620000
trusted library section
page read and write
2C00000
heap
page read and write
1C91E000
heap
page read and write
7FF848DE4000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
18E5000
heap
page read and write
3325000
trusted library allocation
page read and write
12D47000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
F50000
trusted library section
page read and write
E93000
heap
page read and write
7FF848DF7000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
E00000
heap
page read and write
12BB3000
trusted library allocation
page read and write
1C761000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
12E3E000
trusted library allocation
page read and write
1588000
heap
page read and write
9A0000
heap
page read and write
2BB0000
heap
page execute and read and write
12EA9000
trusted library allocation
page read and write
9D0000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF8491D0000
trusted library allocation
page read and write
E40000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849070000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
12F59000
trusted library allocation
page read and write
1C81A000
heap
page read and write
1359B000
trusted library allocation
page read and write
1B520000
trusted library allocation
page read and write
12ED0000
trusted library allocation
page read and write
328F000
stack
page read and write
2F74000
trusted library allocation
page read and write
2A10000
trusted library section
page read and write
E40000
heap
page read and write
7FF8492B3000
trusted library allocation
page read and write
12DA6000
trusted library allocation
page read and write
1AF9D000
stack
page read and write
7FF8491CF000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
2A50000
heap
page read and write
12D30000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848E2B000
trusted library allocation
page execute and read and write
2C01000
trusted library allocation
page read and write
12A68000
trusted library allocation
page read and write
12D32000
trusted library allocation
page read and write
12D9D000
trusted library allocation
page read and write
130A9000
trusted library allocation
page read and write
12F4B000
trusted library allocation
page read and write
12DF3000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
347B000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
1C77A000
heap
page read and write
12E05000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
13573000
trusted library allocation
page read and write
12CD1000
trusted library allocation
page read and write
12C21000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
12DD1000
trusted library allocation
page read and write
12B57000
trusted library allocation
page read and write
12BFD000
trusted library allocation
page read and write
12FB7000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
136BD000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
DE0000
heap
page read and write
12C96000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
16ED1000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
3141000
trusted library allocation
page read and write
D00000
heap
page read and write
12ADC000
trusted library allocation
page read and write
12E37000
trusted library allocation
page read and write
12AC1000
trusted library allocation
page read and write
1B9FE000
stack
page read and write
F02000
heap
page read and write
135A3000
trusted library allocation
page read and write
12DB6000
trusted library allocation
page read and write
12BF2000
trusted library allocation
page read and write
F90000
trusted library section
page read and write
12D8C000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
12BD0000
trusted library allocation
page read and write
19EF000
stack
page read and write
15EC000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1BE80000
trusted library section
page read and write
12AE4000
trusted library allocation
page read and write
1D005000
heap
page read and write
7FF848E27000
trusted library allocation
page read and write
1B8AD000
stack
page read and write
1AA40000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
12F29000
trusted library allocation
page read and write
1C747000
heap
page read and write
12DA4000
trusted library allocation
page read and write
B86000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
12DCF000
trusted library allocation
page read and write
2C7A000
trusted library allocation
page read and write
12E94000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
1B8FE000
stack
page read and write
2F72000
trusted library allocation
page read and write
1D002000
heap
page read and write
12D65000
trusted library allocation
page read and write
7FF848F8C000
trusted library allocation
page read and write
135E5000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
12CA5000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
12E74000
trusted library allocation
page read and write
12E79000
trusted library allocation
page read and write
1B7C3000
stack
page read and write
184F000
stack
page read and write
7FF8492B0000
trusted library allocation
page read and write
12B98000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1BE8E000
stack
page read and write
7FF848FC3000
trusted library allocation
page read and write
1D002000
heap
page read and write
12DD8000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
1195000
heap
page read and write
7FF848E3C000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
135E8000
trusted library allocation
page read and write
D30000
heap
page read and write
12E7F000
trusted library allocation
page read and write
1C970000
heap
page read and write
12C13000
trusted library allocation
page read and write
1160000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
12F5F000
trusted library allocation
page read and write
12DAB000
trusted library allocation
page read and write
1785C000
trusted library allocation
page read and write
E20000
heap
page read and write
2F78000
trusted library allocation
page read and write
2CBE000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
12D55000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
3420000
heap
page execute and read and write
150D1000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
29EE000
stack
page read and write
12FAA000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
1B4A0000
heap
page read and write
DA4000
heap
page read and write
7FF849210000
trusted library allocation
page execute and read and write
12F57000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
E79000
heap
page read and write
12DB2000
trusted library allocation
page read and write
F4E000
stack
page read and write
12D73000
trusted library allocation
page read and write
12E44000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
1170000
heap
page read and write
1BA61000
heap
page read and write
12AAA000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
1302000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
12DEA000
trusted library allocation
page read and write
1150000
heap
page read and write
18266000
trusted library allocation
page read and write
1B480000
heap
page read and write
1BB0D000
heap
page read and write
9C0000
heap
page read and write
2A40000
trusted library section
page read and write
13575000
trusted library allocation
page read and write
D40000
heap
page read and write
2CBA000
trusted library allocation
page read and write
EC9000
heap
page read and write
12C8D000
trusted library allocation
page read and write
15BD000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1CFBE000
stack
page read and write
11FF000
stack
page read and write
EFB000
heap
page read and write
135E1000
trusted library allocation
page read and write
12FA7000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
1130000
heap
page read and write
CF0000
trusted library allocation
page read and write
12C7A000
trusted library allocation
page read and write
7FF848DE2000
trusted library allocation
page read and write
E4A000
heap
page read and write
7FF848FBB000
trusted library allocation
page read and write
EB6000
heap
page read and write
12FC3000
trusted library allocation
page read and write
12D91000
trusted library allocation
page read and write
12DAA000
trusted library allocation
page read and write
331D000
trusted library allocation
page read and write
12E4B000
trusted library allocation
page read and write
1343D000
trusted library allocation
page read and write
12D39000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
1C904000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
12C31000
trusted library allocation
page read and write
1BE70000
trusted library section
page read and write
7FF848E96000
trusted library allocation
page read and write
1C95C000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
1C8FA000
heap
page read and write
D00000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
12C5B000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
D06000
heap
page read and write
12EDB000
trusted library allocation
page read and write
DF0000
trusted library section
page read and write
2DE0000
trusted library allocation
page read and write
1BDFE000
stack
page read and write
1C8C5000
heap
page read and write
2BCA000
trusted library allocation
page read and write
1C254000
stack
page read and write
2F7E000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
12ED6000
trusted library allocation
page read and write
13441000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
12A18000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
12D70000
trusted library allocation
page read and write
12D95000
trusted library allocation
page read and write
12E55000
trusted library allocation
page read and write
12AD7000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848E4B000
trusted library allocation
page execute and read and write
2F76000
trusted library allocation
page read and write
114E000
stack
page read and write
12F00000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
1BE90000
trusted library section
page read and write
EFF000
heap
page read and write
13431000
trusted library allocation
page read and write
1AFED000
stack
page read and write
7FF848DFC000
trusted library allocation
page read and write
12DFE000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
2F6A000
trusted library allocation
page read and write
132D1000
trusted library allocation
page read and write
1C7FB000
heap
page read and write
12D2A000
trusted library allocation
page read and write
12F1D000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
12F22000
trusted library allocation
page read and write
1CDBE000
stack
page read and write
1C83F000
heap
page read and write
135B3000
trusted library allocation
page read and write
12D95000
trusted library allocation
page read and write
7FF8490AE000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
E20000
trusted library section
page read and write
1BE8E000
stack
page read and write
12A9E000
trusted library allocation
page read and write
12F04000
trusted library allocation
page read and write
1BEEE000
stack
page read and write
1C6C0000
heap
page read and write
7FF848FB3000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
12C53000
trusted library allocation
page read and write
12DCE000
trusted library allocation
page read and write
12D8F000
trusted library allocation
page read and write
1C942000
heap
page read and write
3153000
trusted library allocation
page read and write
1B8FF000
stack
page read and write
313D000
trusted library allocation
page read and write
1366E000
trusted library allocation
page read and write
1B6CE000
stack
page read and write
15A5000
heap
page read and write
E51000
heap
page read and write
D73000
heap
page read and write
12C7F000
trusted library allocation
page read and write
1C73C000
heap
page read and write
1326E000
trusted library allocation
page read and write
1C822000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2ACC000
trusted library allocation
page read and write
1C6ED000
heap
page read and write
12D89000
trusted library allocation
page read and write
12AA7000
trusted library allocation
page read and write
12EA2000
trusted library allocation
page read and write
12F60000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF848EC6000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
2A00000
trusted library section
page read and write
BF3000
heap
page read and write
1D0BE000
stack
page read and write
7FF84920B000
trusted library allocation
page read and write
1BACB000
heap
page read and write
12C9C000
trusted library allocation
page read and write
3327000
trusted library allocation
page read and write
12B54000
trusted library allocation
page read and write
12A61000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
12F71000
trusted library allocation
page read and write
12D51000
trusted library allocation
page read and write
E45000
heap
page read and write
135A9000
trusted library allocation
page read and write
12DB4000
trusted library allocation
page read and write
F80000
trusted library section
page read and write
E44000
heap
page read and write
12EB0000
trusted library allocation
page read and write
12D21000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
329C000
trusted library allocation
page read and write
135DB000
trusted library allocation
page read and write
1C721000
heap
page read and write
12F10000
trusted library allocation
page read and write
E40000
heap
page read and write
7FF848FBE000
trusted library allocation
page read and write
7FF849057000
trusted library allocation
page read and write
7FF848FDB000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848E37000
trusted library allocation
page read and write
1B955000
stack
page read and write
F10000
trusted library allocation
page read and write
1B853000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848FF8000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
F02000
heap
page read and write
1361E000
trusted library allocation
page read and write
1BCEE000
stack
page read and write
DC0000
trusted library section
page read and write
12E30000
trusted library allocation
page read and write
1BB16000
heap
page read and write
E2E000
heap
page read and write
12B95000
trusted library allocation
page read and write
12A9C000
trusted library allocation
page read and write
12E5F000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
12F0F000
trusted library allocation
page read and write
1045000
heap
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
12DED000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
1B650000
heap
page execute and read and write
E75000
heap
page read and write
EB0000
heap
page read and write
12E1C000
trusted library allocation
page read and write
12DF6000
trusted library allocation
page read and write
1353F000
trusted library allocation
page read and write
12A11000
trusted library allocation
page read and write
D43000
heap
page read and write
E39000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
12D31000
trusted library allocation
page read and write
B00000
heap
page read and write
13433000
trusted library allocation
page read and write
D6D000
heap
page read and write
12B7C000
trusted library allocation
page read and write
7FF849198000
trusted library allocation
page read and write
1B9CE000
stack
page read and write
10FE000
stack
page read and write
1B5AF000
stack
page read and write
11FF000
stack
page read and write
12E41000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
12DC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
7FF848FE3000
trusted library allocation
page read and write
1B600000
trusted library section
page read and write
DD0000
trusted library allocation
page read and write
12DFF000
trusted library allocation
page read and write
12DF0000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
2C10000
heap
page execute and read and write
12F8E000
trusted library allocation
page read and write
15BB000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
FA0000
trusted library section
page read and write
30BF000
trusted library allocation
page read and write
BC1000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1B702000
heap
page execute and read and write
7FF848F00000
trusted library allocation
page execute and read and write
12F39000
trusted library allocation
page read and write
12C4A000
trusted library allocation
page read and write
12E55000
trusted library allocation
page read and write
1C719000
heap
page read and write
13657000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
CF6000
stack
page read and write
1BC5A000
stack
page read and write
7FF849296000
trusted library allocation
page read and write
12B0B000
trusted library allocation
page read and write
7FF848F9B000
trusted library allocation
page read and write
1C354000
stack
page read and write
13CD1000
trusted library allocation
page read and write
12BEE000
trusted library allocation
page read and write
1B9FE000
stack
page read and write
2BC8000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
DF0000
heap
page read and write
12E13000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page read and write
162E000
heap
page read and write
12F25000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7A0000
heap
page read and write
2DD7000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
12AE0000
trusted library allocation
page read and write
17866000
trusted library allocation
page read and write
1BB1E000
heap
page read and write
1C7C6000
heap
page read and write
315B000
trusted library allocation
page read and write
12D49000
trusted library allocation
page read and write
12E6C000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
F80000
heap
page read and write
12EC4000
trusted library allocation
page read and write
12F32000
trusted library allocation
page read and write
18E0000
heap
page read and write
7FF8492F0000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
12B9B000
trusted library allocation
page read and write
7FF848F3F000
trusted library allocation
page execute and read and write
12AA2000
trusted library allocation
page read and write
12D9E000
trusted library allocation
page read and write
12A8A000
trusted library allocation
page read and write
DD0000
trusted library section
page read and write
130E8000
trusted library allocation
page read and write
12E77000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
1C6E5000
heap
page read and write
30C5000
trusted library allocation
page read and write
13438000
trusted library allocation
page read and write
1C914000
heap
page read and write
303D000
trusted library allocation
page read and write
1BB43000
stack
page read and write
12AEE000
trusted library allocation
page read and write
1140000
heap
page read and write
7FF848E17000
trusted library allocation
page read and write
12E96000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
1B75F000
stack
page read and write
3C0000
unkown
page readonly
F60000
trusted library section
page read and write
12B07000
trusted library allocation
page read and write
1BFE5000
stack
page read and write
7FF848FCC000
trusted library allocation
page read and write
2BA0000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
12E61000
trusted library allocation
page read and write
12E06000
trusted library allocation
page read and write
12DE6000
trusted library allocation
page read and write
12E18000
trusted library allocation
page read and write
12EA8000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
12DE8000
trusted library allocation
page read and write
12DD2000
trusted library allocation
page read and write
12E3B000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
314F000
trusted library allocation
page read and write
E98000
heap
page read and write
12B12000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
7FF849300000
trusted library allocation
page read and write
13647000
trusted library allocation
page read and write
2F6E000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
1302000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
2F68000
trusted library allocation
page read and write
12C9F000
trusted library allocation
page read and write
12FA2000
trusted library allocation
page read and write
7FF848FBC000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
135EE000
trusted library allocation
page read and write
12E83000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1B640000
trusted library section
page read and write
32B0000
heap
page read and write
E3B000
heap
page read and write
2D70000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
12D3C000
trusted library allocation
page read and write
7FF8492A0000
trusted library allocation
page read and write
13149000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
12B19000
trusted library allocation
page read and write
1ACF0000
trusted library allocation
page read and write
1BA5D000
stack
page read and write
12E9F000
trusted library allocation
page read and write
2D1E000
stack
page read and write
1540000
trusted library allocation
page read and write
135C1000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FF8492D0000
trusted library allocation
page read and write
E4F000
heap
page read and write
1040000
heap
page read and write
7FF848DF3000
trusted library allocation
page read and write
B80000
heap
page read and write
12E66000
trusted library allocation
page read and write
12D23000
trusted library allocation
page read and write
12F6C000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
135D4000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
E30000
trusted library section
page read and write
1B460000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
1C78D000
heap
page read and write
12A13000
trusted library allocation
page read and write
108E000
stack
page read and write
12C11000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
1B19D000
stack
page read and write
12D8B000
trusted library allocation
page read and write
12F0D000
trusted library allocation
page read and write
12D98000
trusted library allocation
page read and write
F85000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849062000
trusted library allocation
page read and write
1B5F0000
trusted library section
page read and write
7FF848E20000
trusted library allocation
page read and write
EFD000
heap
page read and write
12D4B000
trusted library allocation
page read and write
15A8000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1C704000
heap
page read and write
12F4E000
trusted library allocation
page read and write
329A000
trusted library allocation
page read and write
13591000
trusted library allocation
page read and write
12D93000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
12B20000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
12EC0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
980000
heap
page read and write
1D2EC000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
12E7C000
trusted library allocation
page read and write
There are 953 hidden memdumps, click here to show them.