IOC Report
z1Transaction_ID_REF2418_cmd.bat

loading gif

Files

File Path
Type
Category
Malicious
z1Transaction_ID_REF2418_cmd.bat
Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 35 datablocks, 0 compression
initial sample
malicious
C:\Users\Public\Cllyjbrx.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Cllyjbrx.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Cllyjbrx.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\xrbjyllC.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\xrbjyllC.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\sgxIb\Loader.Log
ASCII text, with CRLF line terminators
modified
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\AppData\Local\Temp\x.exe /d C:\\Users\\Public\\Libraries\\Cllyjbrx.PIF /o
malicious
C:\Users\Public\Libraries\xrbjyllC.pif
C:\Users\Public\Libraries\xrbjyllC.pif
malicious
C:\Users\Public\Libraries\Cllyjbrx.PIF
"C:\Users\Public\Libraries\Cllyjbrx.PIF"
malicious
C:\Users\Public\Libraries\xrbjyllC.pif
C:\Users\Public\Libraries\xrbjyllC.pif
malicious
C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
"C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
malicious
C:\Users\Public\Libraries\Cllyjbrx.PIF
"C:\Users\Public\Libraries\Cllyjbrx.PIF"
malicious
C:\Users\Public\Libraries\xrbjyllC.pif
C:\Users\Public\Libraries\xrbjyllC.pif
malicious
C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
"C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\z1Transaction_ID_REF2418_cmd.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\extrac32.exe
extrac32 /y "C:\Users\user\Desktop\z1Transaction_ID_REF2418_cmd.bat" "C:\Users\user\AppData\Local\Temp\x.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\xrbjyllC.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
malicious
https://himalayastrek.com/origins/233_Cllyjbrxmng
50.116.93.185
malicious
https://himalayastrek.com/
unknown
malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ftp.haliza.com.my
unknown
http://ocsp.sectigo.com0
unknown
https://himalayastrek.com/origins/233_CllyjbrxmngHA
unknown
https://himalayastrek.com/-
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://himalayastrek.com/origins/233_Cllyjbrxmngy
unknown
https://himalayastrek.com/origins/233_CllyjbrxmngZ
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://api.ipify.org/t
unknown
https://himalayastrek.com:443/origins/233_CllyjbrxmngP
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
https://himalayastrek.com:443/origins/233_Cllyjbrxmng
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
himalayastrek.com
50.116.93.185
malicious
api.ipify.org
172.67.74.152
malicious
ftp.haliza.com.my
110.4.45.197
malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
50.116.93.185
himalayastrek.com
United States
malicious
110.4.45.197
ftp.haliza.com.my
Malaysia
malicious
172.67.74.152
api.ipify.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Cllyjbrx
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
sgxIb
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xrbjyllC_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20784000
heap
page read and write
malicious
26ABF000
heap
page read and write
malicious
29A80000
trusted library section
page read and write
malicious
22680000
trusted library section
page read and write
malicious
2AC91000
trusted library allocation
page read and write
malicious
2C240000
trusted library section
page read and write
malicious
227AD000
trusted library allocation
page read and write
malicious
26EC0000
trusted library section
page read and write
malicious
24F7D000
heap
page read and write
malicious
25040000
trusted library section
page read and write
malicious
220EF000
heap
page read and write
malicious
299AF000
heap
page read and write
malicious
26FED000
trusted library allocation
page read and write
malicious
23711000
trusted library allocation
page read and write
malicious
2802C000
heap
page read and write
malicious
26FA4000
trusted library allocation
page read and write
malicious
22764000
trusted library allocation
page read and write
malicious
29CE4000
trusted library allocation
page read and write
malicious
2C980000
trusted library section
page read and write
malicious
27F51000
trusted library allocation
page read and write
malicious
79F000
stack
page read and write
26100000
trusted library allocation
page read and write
27DBD000
trusted library allocation
page execute and read and write
5CE000
stack
page read and write
28088000
heap
page read and write
2C290000
heap
page read and write
251E0000
trusted library allocation
page read and write
20520000
trusted library section
page read and write
29CC0000
trusted library allocation
page read and write
2DB70000
trusted library allocation
page read and write
2081E000
heap
page read and write
29B60000
trusted library allocation
page read and write
20696000
trusted library allocation
page execute and read and write
20FBC000
direct allocation
page read and write
2AB70000
trusted library allocation
page read and write
8D6000
heap
page read and write
26110000
trusted library allocation
page read and write
2CBD0000
trusted library allocation
page read and write
2AB10000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
2B0A0000
trusted library allocation
page read and write
540000
unkown
page execute and read and write
2AB40000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
1F0000
heap
page read and write
219D000
direct allocation
page read and write
26FE7000
trusted library allocation
page read and write
20540000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
7EE26000
direct allocation
page read and write
21905000
direct allocation
page read and write
27DAD000
trusted library allocation
page execute and read and write
2ABF000
stack
page read and write
26137000
trusted library allocation
page read and write
225E000
stack
page read and write
31C0000
direct allocation
page readonly
2C03000
heap
page read and write
2AB10000
trusted library allocation
page read and write
252FC000
stack
page read and write
26110000
trusted library allocation
page read and write
2808E000
heap
page read and write
7FBC0000
direct allocation
page read and write
210FE000
stack
page execute and read and write
2C04000
heap
page read and write
674000
heap
page read and write
2AC40000
trusted library allocation
page read and write
2CA30000
trusted library allocation
page read and write
25820000
trusted library allocation
page read and write
26240000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
401000
unkown
page execute read
2C03000
heap
page read and write
2AB20000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
400000
unkown
page readonly
2D80C000
trusted library allocation
page read and write
79170FB000
stack
page read and write
2CAA0000
trusted library allocation
page read and write
20F1D000
direct allocation
page read and write
3004000
heap
page read and write
20FB1000
direct allocation
page read and write
2500C000
heap
page read and write
2D800000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
21771000
heap
page read and write
2AB50000
trusted library allocation
page read and write
24FC3000
heap
page read and write
250C1000
heap
page read and write
2CBB0000
trusted library allocation
page read and write
26140000
trusted library allocation
page read and write
2A75E000
stack
page read and write
25160000
trusted library allocation
page read and write
2AFD0000
trusted library allocation
page read and write
27050000
trusted library allocation
page read and write
26BA0000
heap
page read and write
2D940000
trusted library allocation
page read and write
2AFD0000
trusted library allocation
page read and write
40D000
unkown
page write copy
2AC40000
trusted library allocation
page read and write
24FE3000
heap
page read and write
2C1E000
heap
page read and write
2C05000
heap
page read and write
7FB90000
direct allocation
page read and write
27F80000
heap
page execute and read and write
27DA3000
trusted library allocation
page execute and read and write
2DEC0000
trusted library allocation
page execute and read and write
26110000
trusted library allocation
page read and write
20F9A000
direct allocation
page read and write
445000
remote allocation
page execute and read and write
29AD1000
heap
page read and write
401000
unkown
page execute read
2C2F6000
heap
page read and write
26110000
trusted library allocation
page read and write
26F93000
trusted library allocation
page read and write
29BE0000
trusted library allocation
page read and write
29CCA000
trusted library allocation
page read and write
20EEC000
direct allocation
page read and write
2DD80000
trusted library allocation
page read and write
21940000
trusted library allocation
page read and write
7FCA0000
direct allocation
page read and write
26230000
trusted library allocation
page read and write
40D000
unkown
page read and write
23AE000
stack
page read and write
2D820000
trusted library allocation
page read and write
24FDC000
heap
page read and write
26110000
trusted library allocation
page read and write
21150000
remote allocation
page read and write
29AD1000
heap
page read and write
4DF5000
heap
page read and write
26EB0000
heap
page execute and read and write
265C0000
trusted library allocation
page read and write
29C86000
trusted library allocation
page read and write
8AE000
heap
page read and write
9D8000
unkown
page execute and read and write
24F38000
heap
page read and write
445000
unkown
page execute and read and write
4DFB000
heap
page read and write
2AB10000
trusted library allocation
page read and write
280B0000
heap
page read and write
2DAEF000
stack
page read and write
25280000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
2A61E000
stack
page read and write
20F8D000
direct allocation
page read and write
250C1000
heap
page read and write
26800000
trusted library allocation
page read and write
2F8A000
heap
page read and write
20F98000
direct allocation
page read and write
20530000
trusted library section
page read and write
25200000
trusted library allocation
page read and write
250F0000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
2A230000
trusted library allocation
page read and write
265C0000
trusted library allocation
page read and write
2B1E0000
trusted library allocation
page read and write
23EE000
stack
page read and write
26110000
trusted library allocation
page read and write
49B9000
heap
page read and write
2384000
direct allocation
page read and write
2C2BE000
heap
page read and write
20FD1000
direct allocation
page read and write
23815000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
26101000
trusted library allocation
page read and write
2CBB6000
trusted library allocation
page read and write
8B0000
unkown
page execute and read and write
2AB20000
trusted library allocation
page read and write
20F9C000
direct allocation
page read and write
21C0000
direct allocation
page read and write
2D170000
heap
page read and write
21B96019000
heap
page read and write
2D800000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
2C1E000
heap
page read and write
2255E000
stack
page read and write
2B1D0000
trusted library allocation
page read and write
24FDC000
heap
page read and write
2C1E000
heap
page read and write
2D840000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
20FA6000
direct allocation
page read and write
24FE5000
heap
page read and write
2A3DC000
heap
page read and write
267F0000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
2F61000
heap
page read and write
207CF000
heap
page read and write
29C90000
trusted library allocation
page read and write
7F220000
direct allocation
page read and write
2DB70000
trusted library allocation
page read and write
26BC4000
heap
page read and write
4E03000
heap
page read and write
40D000
unkown
page write copy
2D800000
trusted library allocation
page read and write
7F0000
heap
page read and write
2CAF0000
trusted library allocation
page read and write
4A0000
unkown
page execute and read and write
2129F000
stack
page read and write
416000
unkown
page readonly
295F000
stack
page read and write
2AB40000
trusted library allocation
page read and write
2AEBE000
stack
page read and write
2D846000
trusted library allocation
page read and write
259CE000
stack
page read and write
207E6000
heap
page read and write
2B1D0000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
2ACFE000
unkown
page read and write
265B0000
heap
page read and write
85E000
heap
page read and write
2C05000
heap
page read and write
6FA000
heap
page read and write
49EC000
heap
page read and write
2D800000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
25012000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
BF6000
heap
page read and write
20738000
heap
page read and write
695000
heap
page read and write
20FB4000
direct allocation
page read and write
2BCE000
stack
page read and write
26150000
trusted library allocation
page read and write
7FA6F000
direct allocation
page read and write
19D000
stack
page read and write
267C0000
trusted library allocation
page read and write
20F59000
direct allocation
page read and write
7EF50000
direct allocation
page read and write
2CB3C000
stack
page read and write
2C952000
trusted library allocation
page read and write
26D50000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
29A4E000
trusted library allocation
page read and write
2E7E000
stack
page read and write
848000
heap
page read and write
860000
unkown
page execute and read and write
1F0000
heap
page read and write
2D1E000
stack
page read and write
2140B000
heap
page read and write
2C1E000
heap
page read and write
426000
unkown
page execute and read and write
2AB10000
trusted library allocation
page read and write
20782000
heap
page read and write
2DF00000
trusted library allocation
page read and write
2AB23000
trusted library allocation
page read and write
20F93000
direct allocation
page read and write
2DB70000
trusted library allocation
page read and write
25AFE000
heap
page read and write
21B9601C000
heap
page read and write
2CB80000
trusted library allocation
page read and write
4F0000
unkown
page execute and read and write
267C0000
heap
page read and write
2AB2C000
trusted library allocation
page read and write
478000
unkown
page read and write
29BD0000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
7F340000
direct allocation
page read and write
26110000
trusted library allocation
page read and write
24EE7000
trusted library allocation
page execute and read and write
333E000
direct allocation
page execute and read and write
660000
heap
page read and write
2AB10000
trusted library allocation
page read and write
5EA000
heap
page read and write
2C360000
heap
page read and write
820000
unkown
page execute and read and write
21330000
heap
page read and write
590000
remote allocation
page execute and read and write
2D800000
trusted library allocation
page read and write
2F6B000
heap
page read and write
261A0000
trusted library allocation
page read and write
24EBD000
trusted library allocation
page execute and read and write
28085000
heap
page read and write
2D68F000
stack
page read and write
267C0000
trusted library allocation
page read and write
21C8000
direct allocation
page read and write
450000
unkown
page execute and read and write
530F000
direct allocation
page read and write
2C01000
heap
page read and write
20F82000
direct allocation
page read and write
2A480000
trusted library allocation
page read and write
2393000
direct allocation
page read and write
26D60000
heap
page read and write
25000000
trusted library allocation
page read and write
7EE50000
direct allocation
page read and write
4B70000
heap
page read and write
26112000
trusted library allocation
page read and write
2C120000
trusted library allocation
page read and write
26120000
trusted library allocation
page read and write
19D000
stack
page read and write
2C23F000
stack
page read and write
2C96D000
trusted library allocation
page read and write
226F6000
trusted library allocation
page read and write
2C01000
heap
page read and write
3227000
direct allocation
page execute and read and write
20F78000
direct allocation
page read and write
79171FE000
stack
page read and write
234F000
stack
page read and write
26690000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
21B95FE6000
heap
page read and write
49CB000
heap
page read and write
8AF000
stack
page read and write
A1F000
stack
page read and write
2AADE000
stack
page read and write
2DEB0000
trusted library allocation
page read and write
669000
heap
page read and write
2D800000
trusted library allocation
page read and write
7EEF0000
direct allocation
page read and write
2C05000
heap
page read and write
400000
unkown
page readonly
2D930000
trusted library allocation
page read and write
26130000
trusted library allocation
page read and write
265C0000
trusted library allocation
page read and write
21580000
trusted library allocation
page read and write
2D810000
trusted library allocation
page read and write
21531000
heap
page read and write
2DB70000
trusted library allocation
page read and write
206E0000
heap
page execute and read and write
2111B000
stack
page read and write
2C06000
heap
page read and write
2D810000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
212DE000
stack
page read and write
26E90000
trusted library allocation
page read and write
2D30E000
stack
page read and write
21B95FFB000
heap
page read and write
26D2F000
stack
page read and write
2155B000
heap
page read and write
2AB20000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2CDF000
stack
page read and write
7F53E000
direct allocation
page read and write
26111000
trusted library allocation
page read and write
26FA0000
trusted library allocation
page read and write
540000
remote allocation
page execute and read and write
265C0000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2C2A7000
heap
page read and write
2C2DE000
heap
page read and write
2360000
direct allocation
page read and write
2AB10000
trusted library allocation
page read and write
2CB20000
trusted library allocation
page read and write
7F580000
direct allocation
page read and write
26100000
trusted library allocation
page read and write
7FB00000
direct allocation
page read and write
251D0000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2A470000
trusted library allocation
page read and write
49EC000
heap
page read and write
820000
remote allocation
page execute and read and write
2626E000
stack
page read and write
263EF000
stack
page read and write
570000
heap
page read and write
8F0000
unkown
page execute and read and write
2AB10000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
401000
unkown
page execute read
2D9EE000
unkown
page read and write
632000
heap
page read and write
24F30000
heap
page read and write
21B9601C000
heap
page read and write
2C04000
heap
page read and write
27F5E000
stack
page read and write
2C2A9000
heap
page read and write
450000
remote allocation
page execute and read and write
2AB60000
trusted library allocation
page read and write
2C9F0000
trusted library allocation
page read and write
2B1E0000
trusted library allocation
page read and write
26120000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
2280F000
trusted library allocation
page read and write
7FE2F000
direct allocation
page read and write
473000
unkown
page read and write
2A5F000
stack
page read and write
250C1000
heap
page read and write
25B3C000
heap
page read and write
2D820000
trusted library allocation
page read and write
29980000
heap
page read and write
450000
unkown
page execute and read and write
24EE0000
trusted library allocation
page read and write
27EDF000
stack
page read and write
29CB0000
trusted library allocation
page read and write
4DFB000
heap
page read and write
21150000
remote allocation
page read and write
210EE000
stack
page execute and read and write
26120000
trusted library allocation
page read and write
21B95F70000
heap
page read and write
26FEB000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2AFD0000
trusted library allocation
page read and write
401000
unkown
page execute read
270A2000
trusted library allocation
page read and write
4DDA000
heap
page read and write
2D840000
trusted library allocation
page read and write
26690000
trusted library allocation
page read and write
26F20000
trusted library allocation
page read and write
2324000
direct allocation
page read and write
2AFD0000
trusted library allocation
page read and write
2BD0000
heap
page read and write
445000
unkown
page execute and read and write
26820000
trusted library allocation
page read and write
BB6000
heap
page read and write
29AD0000
heap
page read and write
22500000
heap
page read and write
2C01000
heap
page read and write
237D000
direct allocation
page read and write
2CA40000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
2CFF000
stack
page read and write
27DD5000
heap
page read and write
29BDE000
trusted library allocation
page read and write
2119E000
stack
page read and write
2A230000
trusted library allocation
page read and write
27D70000
trusted library section
page read and write
2D860000
trusted library allocation
page read and write
2C01000
heap
page read and write
24E90000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
30A6000
heap
page read and write
2D940000
trusted library allocation
page read and write
2D7F0000
remote allocation
page read and write
2D830000
trusted library allocation
page read and write
207EC000
heap
page read and write
67E000
stack
page read and write
2D930000
trusted library allocation
page read and write
20EA7000
direct allocation
page read and write
29C10000
trusted library allocation
page read and write
2A451000
heap
page read and write
2CBC0000
trusted library allocation
page read and write
2AB80000
trusted library allocation
page read and write
227C0000
trusted library allocation
page read and write
222EF000
stack
page read and write
6FE000
heap
page read and write
27DB0000
trusted library allocation
page read and write
21700000
heap
page read and write
2158F000
trusted library allocation
page read and write
29D6E000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
25B6E000
heap
page read and write
26130000
trusted library allocation
page read and write
2B1E0000
trusted library allocation
page read and write
29BC0000
trusted library allocation
page read and write
450000
unkown
page execute and read and write
29DC8000
trusted library allocation
page read and write
25140000
trusted library allocation
page read and write
91F000
stack
page read and write
20FA3000
direct allocation
page read and write
2D9AF000
unkown
page read and write
2500C000
heap
page read and write
25960000
trusted library allocation
page read and write
27EF0000
trusted library allocation
page read and write
21479000
heap
page read and write
3000000
heap
page read and write
2D930000
trusted library allocation
page read and write
20FB8000
direct allocation
page read and write
20575000
heap
page read and write
2A22E000
stack
page read and write
2C01000
heap
page read and write
28090000
heap
page read and write
2F6A000
heap
page read and write
26113000
trusted library allocation
page read and write
3020000
heap
page read and write
2AB20000
trusted library allocation
page read and write
210FB000
stack
page read and write
2AC40000
trusted library allocation
page read and write
2D890000
trusted library allocation
page read and write
2DD80000
trusted library allocation
page read and write
2069A000
trusted library allocation
page execute and read and write
2AB20000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2ABB0000
trusted library allocation
page read and write
20760000
heap
page read and write
2D6CE000
stack
page read and write
2E000000
heap
page read and write
2AC40000
trusted library allocation
page read and write
2341000
direct allocation
page read and write
227A7000
trusted library allocation
page read and write
260F0000
remote allocation
page read and write
26F10000
trusted library allocation
page read and write
24E70000
trusted library section
page read and write
25B99000
heap
page read and write
2CA20000
trusted library allocation
page read and write
2C1E000
heap
page read and write
7EEF0000
direct allocation
page read and write
2AE7F000
stack
page read and write
4F70000
heap
page read and write
267D0000
trusted library allocation
page read and write
25970000
heap
page read and write
2AFD0000
trusted library allocation
page read and write
64E000
heap
page read and write
9A000
stack
page read and write
4D8F000
stack
page read and write
29AD1000
heap
page read and write
2DD80000
trusted library allocation
page read and write
2CA01000
heap
page read and write
2D810000
trusted library allocation
page read and write
2B6C000
stack
page read and write
2F5D000
stack
page read and write
2082A000
heap
page read and write
2AD96000
trusted library allocation
page read and write
2DB70000
trusted library allocation
page read and write
217F1000
heap
page read and write
26D40000
trusted library allocation
page read and write
27F60000
trusted library allocation
page execute and read and write
2C2DA000
heap
page read and write
2A0EF000
stack
page read and write
2AB10000
trusted library allocation
page read and write
5D0000
heap
page read and write
2AC40000
trusted library allocation
page read and write
2D809000
trusted library allocation
page read and write
2C1E000
heap
page read and write
2D930000
trusted library allocation
page read and write
4DF5000
heap
page read and write
26190000
trusted library allocation
page read and write
210EB000
stack
page read and write
28099000
heap
page read and write
2D800000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
266B0000
trusted library allocation
page read and write
20800000
heap
page read and write
20690000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
2BF0000
heap
page read and write
26800000
trusted library allocation
page read and write
4AB0000
heap
page read and write
2AD57000
trusted library allocation
page read and write
25290000
trusted library allocation
page read and write
29B20000
trusted library allocation
page read and write
26140000
trusted library allocation
page read and write
2C961000
trusted library allocation
page read and write
29986000
heap
page read and write
1F0000
heap
page read and write
223FC000
stack
page read and write
2611C000
trusted library allocation
page read and write
226D0000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
2314000
direct allocation
page read and write
2CF1E000
stack
page read and write
29C0C000
stack
page read and write
988000
remote allocation
page execute and read and write
26230000
trusted library allocation
page read and write
49EC000
heap
page read and write
2ABA0000
trusted library allocation
page read and write
7D0000
unkown
page execute and read and write
26110000
trusted library allocation
page read and write
20683000
trusted library allocation
page read and write
25A0E000
stack
page read and write
2C1E000
heap
page read and write
267C0000
trusted library allocation
page read and write
2141E000
stack
page read and write
28094000
heap
page read and write
400000
unkown
page readonly
2500C000
heap
page read and write
21C1000
direct allocation
page read and write
4A0000
remote allocation
page execute and read and write
2DEB0000
trusted library allocation
page read and write
2C01000
heap
page read and write
2D96E000
stack
page read and write
2A1F000
stack
page read and write
26110000
trusted library allocation
page read and write
49D5000
heap
page read and write
26230000
trusted library allocation
page read and write
28091000
heap
page read and write
2AB00000
remote allocation
page read and write
2DED0000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
26190000
trusted library allocation
page read and write
260F0000
remote allocation
page read and write
2AC40000
trusted library allocation
page read and write
26120000
trusted library allocation
page read and write
47F000
unkown
page readonly
22328000
trusted library allocation
page read and write
250D0000
trusted library allocation
page read and write
58E000
stack
page read and write
2D170000
trusted library allocation
page read and write
22700000
heap
page read and write
2CB00000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
2B210000
trusted library allocation
page read and write
29FEE000
stack
page read and write
89B000
heap
page read and write
2AB10000
trusted library allocation
page read and write
473000
unkown
page read and write
2AB56000
trusted library allocation
page read and write
29A52000
trusted library allocation
page read and write
2C940000
trusted library allocation
page read and write
20F84000
direct allocation
page read and write
26EA0000
heap
page execute and read and write
267C0000
trusted library allocation
page read and write
29B30000
heap
page read and write
BF0000
heap
page read and write
A76000
heap
page read and write
265C0000
trusted library allocation
page read and write
8F0000
remote allocation
page execute and read and write
2B0A0000
trusted library allocation
page read and write
2DB70000
trusted library allocation
page read and write
280A2000
heap
page read and write
62E000
stack
page read and write
2AC40000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2AB50000
trusted library allocation
page read and write
207E1000
heap
page read and write
26110000
trusted library allocation
page read and write
2AB19000
trusted library allocation
page read and write
24EDA000
trusted library allocation
page execute and read and write
2A6D000
stack
page read and write
24E80000
trusted library section
page read and write
24EAD000
trusted library allocation
page execute and read and write
31BE000
direct allocation
page read and write
2D821000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
264AE000
stack
page read and write
445000
remote allocation
page execute and read and write
49D5000
heap
page read and write
26D78000
trusted library allocation
page read and write
860000
remote allocation
page execute and read and write
2D880000
trusted library allocation
page read and write
2B0C0000
trusted library allocation
page read and write
2573000
heap
page read and write
628000
heap
page read and write
26100000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
2D810000
trusted library allocation
page read and write
2A373000
heap
page read and write
2A480000
heap
page read and write
445000
unkown
page execute and read and write
2DEE0000
trusted library allocation
page read and write
5F0000
heap
page read and write
216DA000
heap
page read and write
2DB6F000
stack
page read and write
5CF000
stack
page read and write
25170000
trusted library allocation
page read and write
2AB10000
trusted library allocation
page read and write
2C1E000
heap
page read and write
24FE1000
heap
page read and write
31EE000
direct allocation
page read and write
535E000
direct allocation
page read and write
2CDDE000
stack
page read and write
26690000
trusted library allocation
page read and write
20FFC000
stack
page read and write
2AB20000
trusted library allocation
page read and write
4E03000
heap
page read and write
20550000
trusted library allocation
page read and write
29C91000
trusted library allocation
page read and write
5E0000
heap
page read and write
2D800000
trusted library allocation
page read and write
20FCA000
direct allocation
page read and write
26230000
trusted library allocation
page read and write
21B96034000
heap
page read and write
2D890000
trusted library allocation
page read and write
333B000
direct allocation
page execute and read and write
450000
remote allocation
page execute and read and write
25AC3000
heap
page read and write
2AB10000
trusted library allocation
page read and write
26E8E000
stack
page read and write
2C1E000
heap
page read and write
207F7000
heap
page read and write
29A66000
trusted library allocation
page read and write
2CB70000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
2117E000
stack
page read and write
22753000
trusted library allocation
page read and write
213F0000
heap
page read and write
416000
unkown
page readonly
26100000
trusted library allocation
page read and write
499A000
stack
page read and write
4DF5000
heap
page read and write
2C04000
heap
page read and write
26110000
trusted library allocation
page read and write
2AFD0000
trusted library allocation
page read and write
2B220000
trusted library allocation
page read and write
2CC9E000
stack
page read and write
7FDF0000
trusted library allocation
page execute and read and write
2D160000
trusted library allocation
page read and write
25B6B000
heap
page read and write
4DFB000
heap
page read and write
7F250000
direct allocation
page read and write
9B000
stack
page read and write
2D800000
trusted library allocation
page read and write
24FF9000
heap
page read and write
265C7000
trusted library allocation
page read and write
1F0000
heap
page read and write
27FD0000
heap
page read and write
2119E000
stack
page read and write
6BE000
stack
page read and write
2D800000
trusted library allocation
page read and write
21B95F7C000
heap
page read and write
29FAF000
stack
page read and write
1F0000
heap
page read and write
2AFD7000
trusted library allocation
page read and write
A10000
heap
page read and write
2D800000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
2D804000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
2A373000
heap
page read and write
2AB20000
trusted library allocation
page read and write
22F2000
direct allocation
page read and write
2C291000
heap
page read and write
4A0000
remote allocation
page execute and read and write
26140000
trusted library allocation
page read and write
260F0000
remote allocation
page read and write
2D810000
trusted library allocation
page read and write
2B0A0000
trusted library allocation
page read and write
207E9000
heap
page read and write
265C0000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
2D30000
heap
page read and write
20800000
heap
page read and write
2B5F000
stack
page read and write
2DB70000
trusted library allocation
page read and write
26C0E000
stack
page read and write
2F86000
heap
page read and write
53E000
stack
page read and write
24F20000
trusted library allocation
page read and write
2D44E000
stack
page read and write
26140000
trusted library allocation
page read and write
2A490000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
29AE0000
trusted library allocation
page read and write
2CAC0000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
4DFB000
heap
page read and write
2DEB0000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2C966000
trusted library allocation
page read and write
29B50000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2AB00000
remote allocation
page read and write
2D800000
trusted library allocation
page read and write
21B98640000
heap
page read and write
29D0C000
stack
page read and write
29D1F000
trusted library allocation
page read and write
2A386000
heap
page read and write
540000
heap
page read and write
2B1D0000
trusted library allocation
page read and write
25210000
trusted library allocation
page read and write
21B95E00000
heap
page read and write
2D8A0000
trusted library allocation
page read and write
255DE000
stack
page read and write
206A7000
trusted library allocation
page execute and read and write
2352000
direct allocation
page read and write
2111E000
stack
page execute and read and write
2DEC0000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
215BF000
heap
page read and write
237D7000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
29E6F000
stack
page read and write
27EEA000
trusted library allocation
page execute and read and write
27FDA000
heap
page read and write
2AC50000
trusted library allocation
page read and write
21B95F75000
heap
page read and write
3024000
heap
page read and write
8A1000
heap
page read and write
2DEF0000
trusted library allocation
page read and write
26690000
trusted library allocation
page read and write
2A71F000
stack
page read and write
4F0000
unkown
page execute and read and write
2B1E0000
trusted library allocation
page read and write
21720000
heap
page read and write
24DFE000
stack
page read and write
2DB80000
trusted library allocation
page execute and read and write
4E03000
heap
page read and write
520000
heap
page read and write
26800000
trusted library allocation
page read and write
251CE000
trusted library allocation
page read and write
620000
heap
page read and write
29A6D000
trusted library allocation
page read and write
7F460000
direct allocation
page read and write
2C1E000
heap
page read and write
9B000
stack
page read and write
401000
unkown
page execute read
40D000
unkown
page write copy
2C05000
heap
page read and write
2AB20000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
20F70000
direct allocation
page read and write
2D800000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
24E4E000
stack
page read and write
265C0000
trusted library allocation
page read and write
280A4000
heap
page read and write
26FF3000
trusted library allocation
page read and write
26810000
heap
page read and write
49EC000
heap
page read and write
2A3DC000
heap
page read and write
29B00000
trusted library allocation
page read and write
7D0000
unkown
page execute and read and write
21B9601C000
heap
page read and write
2B210000
trusted library allocation
page read and write
2AFE0000
trusted library allocation
page execute and read and write
2D800000
trusted library allocation
page read and write
21533000
heap
page read and write
25B91000
heap
page read and write
2D800000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
28076000
heap
page read and write
2F5E000
stack
page read and write
20F55000
direct allocation
page read and write
25B82000
heap
page read and write
26100000
trusted library allocation
page read and write
2C01000
heap
page read and write
26C20000
heap
page read and write
24FEF000
heap
page read and write
2C296000
heap
page read and write
28013000
heap
page read and write
24F6C000
heap
page read and write
20FA8000
direct allocation
page read and write
19C000
stack
page read and write
4DDC000
heap
page read and write
26110000
trusted library allocation
page read and write
829000
heap
page read and write
26110000
trusted library allocation
page read and write
216D0000
trusted library allocation
page read and write
2D54F000
stack
page read and write
2D800000
trusted library allocation
page read and write
7F4BA000
direct allocation
page read and write
2A5E000
stack
page read and write
2642E000
stack
page read and write
20FAA000
direct allocation
page read and write
2535E000
stack
page read and write
4A0000
remote allocation
page execute and read and write
2A44A000
heap
page read and write
7FE0F000
direct allocation
page read and write
26110000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2C2F6000
heap
page read and write
2C01000
heap
page read and write
2B1D0000
trusted library allocation
page read and write
2C94B000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2DB90000
trusted library allocation
page execute and read and write
2AFD0000
trusted library allocation
page read and write
29D16000
trusted library allocation
page read and write
4DFD000
heap
page read and write
2B1D0000
trusted library allocation
page read and write
2A9DE000
stack
page read and write
24F6A000
heap
page read and write
21AC000
direct allocation
page read and write
590000
unkown
page execute and read and write
291F000
stack
page read and write
2AFD0000
trusted library allocation
page read and write
2C05000
heap
page read and write
7F3D8000
direct allocation
page read and write
2076A000
heap
page read and write
226E0000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
40D000
unkown
page write copy
198000
stack
page read and write
26C27000
heap
page read and write
2C1E000
heap
page read and write
26F30000
trusted library allocation
page read and write
27DA4000
trusted library allocation
page read and write
4DC8000
heap
page read and write
24F60000
heap
page read and write
232C000
direct allocation
page read and write
221E0000
heap
page read and write
2C05000
heap
page read and write
874000
heap
page read and write
940000
remote allocation
page execute and read and write
26121000
trusted library allocation
page read and write
2DD90000
trusted library allocation
page read and write
416000
unkown
page readonly
3024000
heap
page read and write
2AB28000
trusted library allocation
page read and write
20FA1000
direct allocation
page read and write
2D800000
trusted library allocation
page read and write
25021000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
426000
unkown
page execute and read and write
5290000
trusted library allocation
page read and write
29B60000
trusted library allocation
page read and write
540000
unkown
page execute and read and write
2BBF000
stack
page read and write
24ED2000
trusted library allocation
page read and write
690000
heap
page read and write
2423000
heap
page read and write
2AB22000
trusted library allocation
page read and write
251FC000
stack
page read and write
2240000
heap
page read and write
26100000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
2ACBF000
unkown
page read and write
25960000
trusted library allocation
page read and write
2CEDF000
stack
page read and write
7FDF0000
trusted library allocation
page execute and read and write
207C1000
heap
page read and write
2D870000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
25980000
trusted library allocation
page execute and read and write
2AC40000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
2C296000
heap
page read and write
24EE2000
trusted library allocation
page read and write
59E000
stack
page read and write
227AB000
trusted library allocation
page read and write
221E7000
heap
page read and write
26230000
trusted library allocation
page read and write
82E000
heap
page read and write
26F40000
heap
page read and write
26120000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
2B1F0000
trusted library allocation
page read and write
23E3000
heap
page read and write
29B80000
trusted library allocation
page read and write
207FA000
heap
page read and write
21406000
heap
page read and write
27D94000
heap
page read and write
3210000
heap
page read and write
2C03000
heap
page read and write
7F468000
direct allocation
page read and write
29B50000
trusted library allocation
page read and write
27FDE000
heap
page read and write
20FAD000
direct allocation
page read and write
207EE000
heap
page read and write
840000
heap
page read and write
26230000
trusted library allocation
page read and write
2AFD0000
trusted library allocation
page read and write
2D830000
trusted library allocation
page read and write
25AFE000
heap
page read and write
2AB20000
trusted library allocation
page read and write
265AF000
stack
page read and write
26100000
trusted library allocation
page read and write
21B95F90000
heap
page read and write
24EB0000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2DEC0000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
27DA0000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
2C05000
heap
page read and write
2C01000
heap
page read and write
29DC0000
trusted library allocation
page read and write
2129F000
stack
page read and write
27D80000
trusted library allocation
page read and write
26800000
trusted library allocation
page read and write
265D0000
trusted library allocation
page read and write
2151E000
stack
page read and write
24ED0000
trusted library allocation
page read and write
22570000
heap
page execute and read and write
29A4B000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
7FE4F000
direct allocation
page read and write
216DF000
trusted library allocation
page read and write
2A99F000
stack
page read and write
2D800000
trusted library allocation
page read and write
2300000
direct allocation
page read and write
2D820000
trusted library allocation
page read and write
2AB31000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2D820000
trusted library allocation
page read and write
3028000
heap
page read and write
27DB3000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2BFE000
stack
page read and write
2D7F0000
remote allocation
page read and write
20500000
heap
page read and write
2D01F000
stack
page read and write
2127F000
stack
page read and write
2AB30000
trusted library allocation
page read and write
252B0000
trusted library allocation
page read and write
24FEA000
heap
page read and write
21F0000
direct allocation
page execute and read and write
25B8C000
heap
page read and write
2C1E000
heap
page read and write
21B97E40000
trusted library allocation
page read and write
207F0000
heap
page read and write
3217000
direct allocation
page execute and read and write
2CA01000
heap
page read and write
27FCC000
stack
page read and write
267C0000
trusted library allocation
page read and write
2DCDF000
stack
page read and write
2E1D000
stack
page read and write
7D0000
heap
page read and write
2DB70000
trusted library allocation
page read and write
2DEC0000
trusted library allocation
page read and write
7EEA0000
direct allocation
page read and write
7FE18000
direct allocation
page read and write
2177F000
heap
page read and write
83E000
stack
page read and write
2172000
direct allocation
page read and write
21BA000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
28095000
heap
page read and write
2AFD0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
2AB90000
trusted library allocation
page read and write
29BF000
stack
page read and write
2A402000
heap
page read and write
26111000
trusted library allocation
page read and write
40D000
unkown
page write copy
331B000
direct allocation
page execute and read and write
250C0000
heap
page read and write
21751000
heap
page read and write
2C03000
heap
page read and write
2194F000
trusted library allocation
page read and write
4E03000
heap
page read and write
21B95FEA000
heap
page read and write
2AFF0000
trusted library allocation
page execute and read and write
20F9F000
direct allocation
page read and write
7F4C0000
direct allocation
page read and write
26240000
trusted library allocation
page read and write
2E5E000
stack
page read and write
2D7F0000
remote allocation
page read and write
40D000
unkown
page read and write
2B220000
trusted library allocation
page read and write
2C01000
heap
page read and write
2D930000
trusted library allocation
page read and write
3086000
heap
page read and write
2D800000
trusted library allocation
page read and write
26F8A000
trusted library allocation
page read and write
25130000
trusted library allocation
page read and write
7FBDF000
direct allocation
page read and write
21B95FE3000
heap
page read and write
2AC40000
trusted library allocation
page read and write
265D0000
trusted library allocation
page execute and read and write
2AFD0000
trusted library allocation
page read and write
29B90000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
4E03000
heap
page read and write
25AB9000
heap
page read and write
7EF90000
direct allocation
page read and write
26690000
trusted library allocation
page read and write
27F10000
trusted library allocation
page read and write
20F60000
direct allocation
page read and write
29A5E000
trusted library allocation
page read and write
261A0000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
252A0000
trusted library allocation
page read and write
2DEB0000
heap
page read and write
2DB70000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
26820000
trusted library allocation
page read and write
2D820000
trusted library allocation
page read and write
23CE000
stack
page read and write
29CD3000
trusted library allocation
page read and write
29A40000
trusted library allocation
page read and write
2BDE000
stack
page read and write
226F0000
trusted library allocation
page read and write
2C1E000
heap
page read and write
20F94000
direct allocation
page read and write
52E000
stack
page read and write
2D810000
trusted library allocation
page read and write
2D810000
trusted library allocation
page read and write
29B30000
trusted library allocation
page read and write
21559000
heap
page read and write
2D800000
trusted library allocation
page read and write
25FEF000
stack
page read and write
27EFB000
trusted library allocation
page execute and read and write
2DBDE000
stack
page read and write
26100000
trusted library allocation
page read and write
221D0000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
19C000
stack
page read and write
26120000
trusted library allocation
page read and write
2AFBF000
stack
page read and write
2A44D000
heap
page read and write
2AB10000
trusted library allocation
page read and write
2F6B000
heap
page read and write
2AB2D000
trusted library allocation
page read and write
4DDC000
heap
page read and write
2AFD0000
trusted library allocation
page read and write
7FDC0000
direct allocation
page read and write
860000
unkown
page execute and read and write
2AC40000
trusted library allocation
page read and write
8F0000
unkown
page execute and read and write
2C95E000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
7FDC0000
direct allocation
page read and write
2D850000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2D160000
trusted library allocation
page read and write
2DEF0000
trusted library allocation
page read and write
3050000
heap
page read and write
4F0000
remote allocation
page execute and read and write
7F9E0000
direct allocation
page read and write
265C0000
trusted library allocation
page read and write
21B95FEA000
heap
page read and write
2CA00000
trusted library allocation
page read and write
24FCC000
heap
page read and write
2AB20000
trusted library allocation
page read and write
2D820000
trusted library allocation
page read and write
2C1E000
heap
page read and write
2C10E000
stack
page read and write
4DFD000
heap
page read and write
2D15C000
stack
page read and write
29C20000
trusted library allocation
page read and write
2611D000
trusted library allocation
page read and write
2111F000
stack
page read and write
2C2DA000
heap
page read and write
25026000
trusted library allocation
page read and write
21779000
heap
page read and write
20FD8000
direct allocation
page read and write
25820000
trusted library allocation
page read and write
416000
unkown
page readonly
21B95FE6000
heap
page read and write
7EEA0000
direct allocation
page read and write
2D850000
trusted library allocation
page read and write
24EC0000
heap
page read and write
24E60000
heap
page read and write
26800000
trusted library allocation
page read and write
2C01000
heap
page read and write
2D3E000
stack
page read and write
4E40000
direct allocation
page read and write
2B1E0000
trusted library allocation
page read and write
2500B000
trusted library allocation
page read and write
31CE000
direct allocation
page read and write
27EE2000
trusted library allocation
page read and write
2CAB0000
trusted library allocation
page read and write
416000
unkown
page readonly
2D801000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
2596D000
trusted library allocation
page read and write
2AB80000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
260EE000
stack
page read and write
20570000
heap
page read and write
476000
unkown
page read and write
2CB40000
trusted library allocation
page read and write
2D180000
trusted library allocation
page execute and read and write
20F8C000
direct allocation
page read and write
3082000
heap
page read and write
26F20000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
26110000
trusted library allocation
page read and write
630000
heap
page read and write
2AB30000
trusted library allocation
page read and write
630000
heap
page read and write
24FFF000
heap
page read and write
25A4E000
stack
page read and write
26E4C000
stack
page read and write
267E0000
trusted library allocation
page read and write
21B95FD0000
heap
page read and write
26110000
trusted library allocation
page read and write
28056000
trusted library allocation
page read and write
222F0000
heap
page read and write
635000
heap
page read and write
2131E000
heap
page read and write
26140000
trusted library allocation
page read and write
24E00000
heap
page read and write
2C324000
heap
page read and write
7F580000
direct allocation
page read and write
2AB40000
trusted library allocation
page read and write
20F76000
direct allocation
page read and write
8F0000
remote allocation
page execute and read and write
495D000
stack
page read and write
7FC80000
direct allocation
page read and write
2D800000
trusted library allocation
page read and write
26109000
trusted library allocation
page read and write
2B210000
trusted library allocation
page read and write
210EF000
stack
page read and write
7FDC8000
direct allocation
page read and write
2CA50000
trusted library allocation
page read and write
24FDD000
heap
page read and write
21B95FFB000
heap
page read and write
206AB000
trusted library allocation
page execute and read and write
26112000
trusted library allocation
page read and write
29BA0000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
280B0000
heap
page read and write
224FE000
stack
page read and write
26110000
trusted library allocation
page read and write
2A47D000
trusted library allocation
page read and write
2D820000
trusted library allocation
page read and write
A3F000
stack
page read and write
20FC3000
direct allocation
page read and write
24EE5000
trusted library allocation
page execute and read and write
A60000
heap
page read and write
2D820000
trusted library allocation
page read and write
2C05000
heap
page read and write
2D800000
trusted library allocation
page read and write
2DEC0000
trusted library allocation
page read and write
400000
unkown
page readonly
527F000
stack
page read and write
25276000
trusted library allocation
page read and write
2CA00000
heap
page read and write
2D800000
trusted library allocation
page read and write
7FD30000
direct allocation
page read and write
2AB11000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
2C1E000
heap
page read and write
207DD000
heap
page read and write
445000
remote allocation
page execute and read and write
4AFF000
stack
page read and write
4DFB000
heap
page read and write
26E96000
trusted library allocation
page read and write
401000
unkown
page execute read
2DEC0000
trusted library allocation
page read and write
56E000
stack
page read and write
887000
heap
page read and write
2B0A0000
trusted library allocation
page read and write
304F000
stack
page read and write
210FF000
stack
page read and write
2D8A0000
trusted library allocation
page read and write
21B95FD8000
heap
page read and write
28097000
heap
page read and write
26D30000
trusted library allocation
page read and write
20554000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
239A000
direct allocation
page read and write
2B1F0000
trusted library allocation
page read and write
49B0000
heap
page read and write
2CB10000
trusted library allocation
page read and write
27EE6000
trusted library allocation
page execute and read and write
2D840000
trusted library allocation
page read and write
2DF00000
trusted library allocation
page read and write
2CB50000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
265C0000
trusted library allocation
page read and write
21B97900000
heap
page read and write
2C94E000
trusted library allocation
page read and write
20F68000
direct allocation
page read and write
2D16D000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
207DD000
heap
page read and write
2AB50000
trusted library allocation
page read and write
26160000
trusted library allocation
page read and write
216D7000
heap
page read and write
2D800000
trusted library allocation
page read and write
29AD0000
trusted library allocation
page read and write
4C00000
heap
page read and write
2AB20000
trusted library allocation
page read and write
23E0000
heap
page read and write
8CA000
heap
page read and write
26110000
trusted library allocation
page read and write
2260000
heap
page read and write
81F000
stack
page read and write
24ED6000
trusted library allocation
page execute and read and write
2D940000
trusted library allocation
page read and write
29CE0000
trusted library allocation
page read and write
2C29C000
heap
page read and write
2AB20000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
2AB10000
trusted library allocation
page read and write
2AB24000
trusted library allocation
page read and write
20EA0000
direct allocation
page read and write
330B000
direct allocation
page execute and read and write
400000
remote allocation
page execute and read and write
2AB20000
trusted library allocation
page read and write
265C0000
trusted library allocation
page read and write
2D58E000
stack
page read and write
20EED000
direct allocation
page read and write
29D6E000
stack
page read and write
19C000
stack
page read and write
26120000
trusted library allocation
page read and write
2D801000
trusted library allocation
page read and write
2DEF0000
trusted library allocation
page read and write
7FC30000
direct allocation
page read and write
2AFE0000
trusted library allocation
page read and write
31F5000
direct allocation
page read and write
26110000
trusted library allocation
page read and write
7FBA0000
direct allocation
page read and write
2285D000
trusted library allocation
page read and write
29B70000
heap
page read and write
24FE2000
heap
page read and write
250A0000
trusted library allocation
page read and write
25230000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2B210000
trusted library allocation
page read and write
7FC10000
direct allocation
page read and write
25AB0000
heap
page read and write
7EE00000
direct allocation
page read and write
2570000
heap
page read and write
2E5E000
stack
page read and write
2D802000
trusted library allocation
page read and write
29BF0000
trusted library allocation
page read and write
29B80000
heap
page read and write
24F00000
trusted library allocation
page read and write
22314000
heap
page read and write
416000
unkown
page readonly
2A85F000
stack
page read and write
250B0000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2B1D0000
heap
page read and write
7D0000
remote allocation
page execute and read and write
2904E000
stack
page read and write
2AB30000
trusted library allocation
page read and write
988000
unkown
page execute and read and write
426000
remote allocation
page execute and read and write
4DFD000
heap
page read and write
473000
unkown
page write copy
238C000
direct allocation
page read and write
26118000
trusted library allocation
page read and write
2D2E000
unkown
page read and write
29C50000
trusted library allocation
page read and write
67E000
stack
page read and write
400000
unkown
page execute and read and write
26110000
trusted library allocation
page read and write
2C1E000
heap
page read and write
2DD80000
trusted library allocation
page read and write
29CA0000
trusted library allocation
page read and write
67F000
stack
page read and write
21746000
heap
page read and write
6F0000
heap
page read and write
2B210000
trusted library allocation
page read and write
2DB70000
trusted library allocation
page read and write
4DA000
stack
page read and write
401000
unkown
page execute read
267C0000
trusted library allocation
page read and write
4DFD000
heap
page read and write
2DB70000
trusted library allocation
page read and write
28085000
heap
page read and write
2B9F000
stack
page read and write
2C1E000
heap
page read and write
2AB20000
trusted library allocation
page read and write
24F8A000
heap
page read and write
820000
heap
page read and write
540000
remote allocation
page execute and read and write
5280000
direct allocation
page read and write
7F31F000
direct allocation
page read and write
26110000
trusted library allocation
page read and write
2ADFF000
stack
page read and write
2DEB0000
trusted library allocation
page read and write
22560000
trusted library allocation
page read and write
26114000
trusted library allocation
page read and write
2D808000
trusted library allocation
page read and write
26F51000
trusted library allocation
page read and write
2DB70000
trusted library allocation
page read and write
29C8F000
stack
page read and write
7FD38000
direct allocation
page read and write
2348000
direct allocation
page read and write
49E6000
heap
page read and write
476000
unkown
page read and write
BB0000
heap
page read and write
450000
remote allocation
page execute and read and write
A70000
heap
page read and write
9C000
stack
page read and write
26120000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2D801000
trusted library allocation
page read and write
25DEF000
stack
page read and write
2500E000
trusted library allocation
page read and write
2C1E000
heap
page read and write
26150000
trusted library allocation
page read and write
2C05000
heap
page read and write
29EAE000
stack
page read and write
2AB20000
trusted library allocation
page read and write
2AB50000
trusted library allocation
page read and write
2CBF0000
trusted library allocation
page read and write
426000
unkown
page execute and read and write
2174F000
heap
page read and write
2AB20000
trusted library allocation
page read and write
31C1000
direct allocation
page execute read
2545F000
stack
page read and write
2C1E000
heap
page read and write
2D80D000
trusted library allocation
page read and write
27001000
trusted library allocation
page read and write
7F9E0000
direct allocation
page read and write
2C01000
heap
page read and write
1F0000
heap
page read and write
4C50000
heap
page read and write
24FDC000
heap
page read and write
7FE00000
direct allocation
page read and write
791717E000
stack
page read and write
860000
remote allocation
page execute and read and write
2E1E000
stack
page read and write
206A5000
trusted library allocation
page execute and read and write
2072E000
stack
page read and write
26130000
trusted library allocation
page read and write
26230000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
9C000
stack
page read and write
20F90000
direct allocation
page read and write
2501C000
heap
page read and write
401000
unkown
page execute read
21150000
remote allocation
page read and write
7BE000
stack
page read and write
2078D000
heap
page read and write
810000
direct allocation
page execute and read and write
7C0000
heap
page read and write
265C0000
trusted library allocation
page read and write
27F70000
trusted library allocation
page read and write
2C2A8000
heap
page read and write
24F98000
heap
page read and write
2C9E0000
trusted library allocation
page read and write
8C6000
heap
page read and write
2C130000
heap
page execute and read and write
2D830000
trusted library allocation
page read and write
2996F000
stack
page read and write
77F000
stack
page read and write
2AD3F000
trusted library allocation
page read and write
2CB30000
trusted library allocation
page read and write
4F0000
remote allocation
page execute and read and write
2AB20000
trusted library allocation
page read and write
7D0000
remote allocation
page execute and read and write
2C2DE000
heap
page read and write
530000
heap
page read and write
28017000
trusted library allocation
page read and write
2D160000
trusted library allocation
page read and write
29C00000
trusted library allocation
page read and write
2ABB0000
trusted library allocation
page read and write
256DF000
stack
page read and write
4C4E000
stack
page read and write
2CD9F000
stack
page read and write
198000
stack
page read and write
26120000
trusted library allocation
page read and write
2805F000
heap
page read and write
265C0000
trusted library allocation
page read and write
2D160000
trusted library allocation
page read and write
21B95EE0000
heap
page read and write
2AB70000
trusted library allocation
page read and write
4F0000
unkown
page execute and read and write
2DEF0000
trusted library allocation
page read and write
2C1E000
heap
page read and write
2DB80000
trusted library allocation
page read and write
2AB10000
trusted library allocation
page read and write
2C1E000
heap
page read and write
20560000
heap
page read and write
2C110000
trusted library allocation
page read and write
4DFB000
heap
page read and write
28009000
heap
page read and write
7FC96000
direct allocation
page read and write
2D7CE000
stack
page read and write
265C0000
trusted library allocation
page read and write
7EF90000
direct allocation
page read and write
2D800000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
7EE50000
direct allocation
page read and write
251C0000
trusted library allocation
page read and write
2C06000
heap
page read and write
400000
unkown
page readonly
2170A000
heap
page read and write
1F0000
heap
page read and write
2D930000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
252FF000
stack
page read and write
2AB10000
trusted library allocation
page read and write
2DB77000
trusted library allocation
page read and write
2C01000
heap
page read and write
498000
unkown
page readonly
49CA000
heap
page read and write
988000
unkown
page execute and read and write
2DD80000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
24EA4000
trusted library allocation
page read and write
2C01000
heap
page read and write
800000
heap
page read and write
237BF000
trusted library allocation
page read and write
20553000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
2D800000
trusted library allocation
page read and write
2D810000
trusted library allocation
page read and write
8BC000
heap
page read and write
2177E000
heap
page read and write
25820000
trusted library allocation
page read and write
9B000
stack
page read and write
26100000
trusted library allocation
page read and write
26100000
trusted library allocation
page execute and read and write
2C05000
heap
page read and write
21D0000
heap
page read and write
2055D000
trusted library allocation
page execute and read and write
24F10000
trusted library allocation
page execute and read and write
2CA60000
trusted library allocation
page read and write
940000
unkown
page execute and read and write
262EE000
unkown
page read and write
20692000
trusted library allocation
page read and write
7F4B8000
direct allocation
page read and write
2CCF000
stack
page read and write
2D800000
trusted library allocation
page read and write
2A26E000
stack
page read and write
3028000
heap
page read and write
250E0000
trusted library allocation
page read and write
29A98000
trusted library allocation
page read and write
29BB0000
trusted library allocation
page read and write
2333000
direct allocation
page read and write
227B3000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29C40000
trusted library allocation
page read and write
7F470000
direct allocation
page read and write
2AB22000
trusted library allocation
page read and write
2646F000
stack
page read and write
2AB20000
trusted library allocation
page read and write
2AFC0000
heap
page read and write
26110000
trusted library allocation
page read and write
21B95F00000
heap
page read and write
3223000
direct allocation
page read and write
2500C000
heap
page read and write
2AB20000
trusted library allocation
page read and write
206A2000
trusted library allocation
page read and write
2CB60000
trusted library allocation
page read and write
23A8000
direct allocation
page read and write
26180000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2AC50000
trusted library allocation
page read and write
4DC0000
heap
page read and write
7EF40000
direct allocation
page read and write
2B210000
trusted library allocation
page read and write
2AB47000
trusted library allocation
page read and write
A90000
heap
page read and write
26230000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
2AB21000
trusted library allocation
page read and write
4DF5000
heap
page read and write
4C70000
heap
page read and write
31E5000
direct allocation
page read and write
5380000
direct allocation
page read and write
25270000
trusted library allocation
page read and write
2A44B000
heap
page read and write
25100000
trusted library allocation
page read and write
25180000
trusted library allocation
page read and write
49E6000
heap
page read and write
2AC50000
trusted library allocation
page read and write
2A230000
trusted library allocation
page read and write
29A61000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
8AC000
heap
page read and write
262AF000
unkown
page read and write
21540000
heap
page read and write
26110000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
2D840000
trusted library allocation
page read and write
26100000
trusted library allocation
page read and write
2E3D000
stack
page read and write
238E000
stack
page read and write
2DEF0000
trusted library allocation
page read and write
2D837000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2B0A0000
trusted library allocation
page read and write
280C8000
heap
page read and write
26110000
trusted library allocation
page read and write
2C1E000
heap
page read and write
25A8E000
stack
page read and write
251E000
stack
page read and write
2267F000
stack
page read and write
2AB30000
trusted library allocation
page read and write
25110000
trusted library allocation
page read and write
2B1E0000
trusted library allocation
page execute and read and write
2DB70000
trusted library allocation
page read and write
23A1000
direct allocation
page read and write
2809B000
heap
page read and write
2AB20000
trusted library allocation
page read and write
2AB21000
trusted library allocation
page read and write
2AB10000
trusted library allocation
page read and write
206C0000
trusted library allocation
page read and write
2C01000
heap
page read and write
2AB10000
trusted library allocation
page execute and read and write
4F0000
heap
page read and write
2BFC000
heap
page read and write
29B40000
trusted library allocation
page read and write
198000
stack
page read and write
24EA3000
trusted library allocation
page execute and read and write
8F0000
heap
page read and write
25ADE000
heap
page read and write
2180000
direct allocation
page read and write
2AB40000
trusted library allocation
page read and write
21B3000
direct allocation
page read and write
2CBE0000
trusted library allocation
page read and write
5EE000
heap
page read and write
2A3DC000
heap
page read and write
250A0000
trusted library allocation
page read and write
26120000
trusted library allocation
page read and write
29AF0000
trusted library allocation
page read and write
2A456000
heap
page read and write
2DB70000
trusted library allocation
page read and write
4DF5000
heap
page read and write
2C04000
heap
page read and write
800000
direct allocation
page execute and read and write
2D800000
trusted library allocation
page read and write
2808E000
heap
page read and write
400000
unkown
page readonly
29B10000
trusted library allocation
page read and write
27EF5000
trusted library allocation
page execute and read and write
26800000
trusted library allocation
page read and write
2C1E000
heap
page read and write
8EF000
stack
page read and write
2B2D0000
heap
page read and write
7FDC0000
direct allocation
page read and write
29C30000
trusted library allocation
page read and write
400000
unkown
page readonly
250C0000
trusted library allocation
page read and write
2068D000
trusted library allocation
page execute and read and write
2AB20000
trusted library allocation
page read and write
2CA10000
trusted library allocation
page read and write
27EF2000
trusted library allocation
page read and write
9A000
stack
page read and write
24EA0000
trusted library allocation
page read and write
3247000
direct allocation
page execute and read and write
988000
remote allocation
page execute and read and write
2D800000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2AB10000
trusted library allocation
page read and write
28016000
heap
page read and write
26D40000
trusted library allocation
page read and write
25ADE000
heap
page read and write
2AC50000
trusted library allocation
page read and write
4A0000
unkown
page execute and read and write
2D800000
trusted library allocation
page read and write
2C126000
trusted library allocation
page read and write
25150000
trusted library allocation
page read and write
2C1E000
heap
page read and write
20FEC000
stack
page read and write
2D870000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2A36B000
stack
page read and write
2C1E000
heap
page read and write
2F7E000
stack
page read and write
2B0B0000
trusted library allocation
page read and write
2A383000
heap
page read and write
24E65000
heap
page read and write
49E6000
heap
page read and write
26BC0000
heap
page read and write
27D0E000
stack
page read and write
478000
unkown
page read and write
476000
unkown
page read and write
2CAE0000
trusted library allocation
page read and write
4DE5000
heap
page read and write
207EB000
heap
page read and write
29B60000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
2CA70000
trusted library allocation
page read and write
2CA80000
trusted library allocation
page read and write
2A370000
heap
page read and write
2420000
heap
page read and write
265C0000
trusted library allocation
page read and write
20B0000
direct allocation
page read and write
280C7000
heap
page read and write
7F580000
direct allocation
page read and write
2ABA0000
trusted library allocation
page read and write
215B0000
heap
page read and write
2AB00000
remote allocation
page read and write
2C1E000
heap
page read and write
2AB20000
trusted library allocation
page read and write
2AC7E000
stack
page read and write
2AB20000
trusted library allocation
page read and write
2D940000
trusted library allocation
page read and write
2CC3C000
stack
page read and write
2948F000
stack
page read and write
26240000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
20F86000
direct allocation
page read and write
3213000
direct allocation
page read and write
25220000
trusted library allocation
page read and write
2D1E000
stack
page read and write
20EDC000
direct allocation
page read and write
21520000
heap
page read and write
25970000
trusted library allocation
page read and write
21A4000
direct allocation
page read and write
2D800000
trusted library allocation
page read and write
2274A000
trusted library allocation
page read and write
27D60000
trusted library section
page read and write
2559F000
stack
page read and write
56D0000
trusted library allocation
page read and write
2D160000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
231D000
direct allocation
page read and write
7A0000
heap
page read and write
26110000
trusted library allocation
page read and write
2BD8E000
stack
page read and write
31A1000
direct allocation
page execute read
21B95FF6000
heap
page read and write
24FEC000
heap
page read and write
2D840000
trusted library allocation
page read and write
570000
heap
page read and write
27EF7000
trusted library allocation
page execute and read and write
2D820000
trusted library allocation
page read and write
2AB60000
trusted library allocation
page read and write
49E6000
heap
page read and write
26110000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
540000
remote allocation
page execute and read and write
26100000
trusted library allocation
page read and write
4DFD000
heap
page read and write
27FFF000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
2D820000
trusted library allocation
page read and write
2F0F000
unkown
page read and write
26170000
trusted library allocation
page read and write
2B200000
trusted library allocation
page read and write
2076C000
heap
page read and write
2A89E000
stack
page read and write
2AE3E000
stack
page read and write
26110000
trusted library allocation
page read and write
2D810000
trusted library allocation
page execute and read and write
2C05000
heap
page read and write
29C80000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
2DEB0000
trusted library allocation
page read and write
9D8000
remote allocation
page execute and read and write
575000
heap
page read and write
2501E000
trusted library allocation
page read and write
2CAD0000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
26240000
trusted library allocation
page read and write
8B0000
remote allocation
page execute and read and write
540000
unkown
page execute and read and write
2CA90000
trusted library allocation
page read and write
2DB2E000
stack
page read and write
2C9E0000
trusted library allocation
page read and write
21B95FEA000
heap
page read and write
2170B000
heap
page read and write
2549E000
stack
page read and write
21775000
heap
page read and write
25120000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
2B1D0000
trusted library allocation
page read and write
226D0000
trusted library allocation
page read and write
9A000
stack
page read and write
7EEA0000
direct allocation
page read and write
24FF2000
heap
page read and write
473000
unkown
page read and write
2A9E000
stack
page read and write
2AFD0000
trusted library allocation
page read and write
25090000
trusted library allocation
page read and write
2AB50000
trusted library allocation
page read and write
20F7D000
direct allocation
page read and write
4DFD000
heap
page read and write
2AB20000
trusted library allocation
page read and write
7EE50000
direct allocation
page read and write
400000
unkown
page execute and read and write
2D800000
trusted library allocation
page read and write
207DD000
heap
page read and write
2AB10000
trusted library allocation
page read and write
550000
heap
page read and write
266A0000
trusted library allocation
page read and write
2C2F000
heap
page read and write
2D40F000
stack
page read and write
26230000
trusted library allocation
page read and write
47A000
unkown
page write copy
26110000
trusted library allocation
page read and write
2DED0000
trusted library allocation
page read and write
7EF40000
direct allocation
page read and write
26110000
trusted library allocation
page read and write
89F000
heap
page read and write
4E03000
heap
page read and write
2AB20000
trusted library allocation
page read and write
213DE000
stack
page read and write
7F2B0000
direct allocation
page read and write
2AB20000
trusted library allocation
page read and write
4E7000
unkown
page readonly
29B70000
trusted library allocation
page read and write
207DE000
heap
page read and write
2D800000
trusted library allocation
page read and write
2AC40000
trusted library allocation
page read and write
20730000
heap
page read and write
2D800000
trusted library allocation
page read and write
206A0000
trusted library allocation
page read and write
2A12E000
stack
page read and write
27DD0000
heap
page read and write
2CB0E000
trusted library allocation
page read and write
4DDA000
heap
page read and write
27CC0000
heap
page read and write
27DC0000
heap
page read and write
61C000
heap
page read and write
22310000
heap
page read and write
21B96034000
heap
page read and write
2C1E000
heap
page read and write
25240000
trusted library allocation
page read and write
416000
unkown
page readonly
26110000
trusted library allocation
page read and write
2C9D0000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
897000
heap
page read and write
2DEF0000
trusted library allocation
page read and write
20797000
heap
page read and write
2DB70000
trusted library allocation
page read and write
49EC000
heap
page read and write
233A000
direct allocation
page read and write
2809F000
heap
page read and write
267D0000
trusted library allocation
page execute and read and write
2AC40000
trusted library allocation
page read and write
27D90000
heap
page read and write
4A0000
unkown
page execute and read and write
302C000
heap
page read and write
20680000
trusted library allocation
page read and write
27D5E000
stack
page read and write
2808E000
heap
page read and write
22760000
trusted library allocation
page read and write
251FF000
stack
page read and write
2D802000
trusted library allocation
page read and write
251F0000
trusted library allocation
page read and write
2DDA0000
trusted library allocation
page read and write
89F000
heap
page read and write
25EEF000
stack
page read and write
4F0000
remote allocation
page execute and read and write
2D830000
trusted library allocation
page read and write
2D860000
trusted library allocation
page read and write
2D930000
trusted library allocation
page read and write
21B98643000
heap
page read and write
267D0000
trusted library allocation
page read and write
280AC000
heap
page read and write
2D800000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
49D000
stack
page read and write
2D803000
trusted library allocation
page read and write
2D820000
trusted library allocation
page read and write
7FD88000
direct allocation
page read and write
2D05E000
stack
page read and write
2AB20000
trusted library allocation
page read and write
2AB20000
trusted library allocation
page read and write
24EEB000
trusted library allocation
page execute and read and write
25B99000
heap
page read and write
21B97903000
heap
page read and write
26146000
trusted library allocation
page read and write
2D800000
trusted library allocation
page read and write
206D0000
trusted library allocation
page execute and read and write
2AB20000
trusted library allocation
page read and write
2AB30000
trusted library allocation
page read and write
2A437000
heap
page read and write
7FCEF000
direct allocation
page read and write
24EB3000
trusted library allocation
page read and write
7F9E0000
direct allocation
page read and write
3191000
direct allocation
page execute read
26170000
trusted library allocation
page read and write
25190000
trusted library allocation
page read and write
26160000
trusted library allocation
page read and write
2A470000
trusted library allocation
page read and write
24F81000
heap
page read and write
22711000
trusted library allocation
page read and write
265E0000
trusted library allocation
page execute and read and write
523E000
stack
page read and write
265C0000
trusted library allocation
page read and write
26120000
trusted library allocation
page read and write
26110000
trusted library allocation
page read and write
24DE000
stack
page read and write
2D930000
trusted library allocation
page read and write
2502D000
trusted library allocation
page read and write
26130000
trusted library allocation
page read and write
2AFD0000
trusted library allocation
page read and write
2F4E000
stack
page read and write
2C05000
heap
page read and write
2C1E000
heap
page read and write
2C2BE000
heap
page read and write
2101C000
stack
page read and write
400000
unkown
page execute and read and write
2AFD0000
trusted library allocation
page read and write
There are 1839 hidden memdumps, click here to show them.