IOC Report
KBvv1g0Ihn.exe

loading gif

Files

File Path
Type
Category
Malicious
KBvv1g0Ihn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\build.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\is-3HDQ6.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\is-8C5DR.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\is-K1FQL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\python-3.13.0-amd64.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-PLHR2.tmp\KBvv1g0Ihn.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\build.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Programs\Xavier1\Eazfuscator.NET 2024.2 Setup.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Eazfuscator.NET, Author: Gapotchenko, Keywords: Installer, Comments: This installer database contains the logic and data required to install Eazfuscator.NET version 2024.2.614.14499., Template: Intel;1033, Revision Number: {5F546163-2F0B-4AB1-81C9-D20301E91375}, Create Time/Date: Sat Oct 19 06:12:08 2024, Last Saved Time/Date: Sat Oct 19 06:12:08 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Users\user\AppData\Local\Programs\Xavier1\is-NH14E.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Eazfuscator.NET, Author: Gapotchenko, Keywords: Installer, Comments: This installer database contains the logic and data required to install Eazfuscator.NET version 2024.2.614.14499., Template: Intel;1033, Revision Number: {5F546163-2F0B-4AB1-81C9-D20301E91375}, Create Time/Date: Sat Oct 19 06:12:08 2024, Last Saved Time/Date: Sat Oct 19 06:12:08 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Users\user\AppData\Local\Programs\Xavier1\unins000.dat
InnoSetup Log Xavier1 {E7AB5A61-4710-401C-A801-32A06671F356}, version 0x418, 2450 bytes, 878411\37\user, C:\Users\user\AppData\Local\Programs\
modified
C:\Users\user\AppData\Local\Temp\is-VNJ7M.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Xavier1.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Nov 12 14:42:35 2024, mtime=Tue Nov 12 14:42:35 2024, atime=Sun Nov 10 00:40:14 2024, length=346112, window=hide
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KBvv1g0Ihn.exe
"C:\Users\user\Desktop\KBvv1g0Ihn.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-PLHR2.tmp\KBvv1g0Ihn.tmp
"C:\Users\user~1\AppData\Local\Temp\is-PLHR2.tmp\KBvv1g0Ihn.tmp" /SL5="$10432,41796246,816128,C:\Users\user\Desktop\KBvv1g0Ihn.exe"
malicious
C:\Users\user\AppData\Local\Programs\Xavier1\build.exe
"C:\Users\user\AppData\Local\Programs\Xavier1\build.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://www.gapotchenko.com/eazfuscator.net
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://appsyndication.org/2006/appsynapplicationc:
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://www.remobjects.com/ps
unknown
https://www.innosetup.com/
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
https://sectigo.com/CPS0
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\.exe\OpenWithProgids
Xavier1File.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER_Classes\Xavier1File.exe
NULL
HKEY_CURRENT_USER_Classes\Xavier1File.exe\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\Xavier1File.exe\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\Applications\build.exe\SupportedTypes
.myp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
152000
unkown
page readonly
malicious
2614000
trusted library allocation
page read and write
malicious
3FB0000
direct allocation
page read and write
7FFB22710000
unkown
page read and write
860000
heap
page read and write
1BA9E000
heap
page read and write
2970000
trusted library allocation
page read and write
1B657000
heap
page read and write
1C1EF000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
10B000
unkown
page read and write
AFF000
stack
page read and write
7FFAAC680000
trusted library allocation
page execute and read and write
1C1A1000
heap
page read and write
2898000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
28C2000
trusted library allocation
page read and write
7FFAAC5DF000
trusted library allocation
page read and write
123D000
direct allocation
page read and write
7FFAAC3F6000
trusted library allocation
page read and write
29D4000
trusted library allocation
page read and write
7FFAAC549000
trusted library allocation
page read and write
1B653000
heap
page read and write
1B1D0000
heap
page read and write
B9D000
unkown
page read and write
BA5000
unkown
page readonly
2A22000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
5660000
heap
page read and write
29E8000
trusted library allocation
page read and write
2AF7000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
2ADE000
trusted library allocation
page read and write
EBD000
stack
page read and write
1BA46000
heap
page read and write
7FFAAC79A000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
2D8B000
trusted library allocation
page read and write
1276C000
trusted library allocation
page read and write
59B000
heap
page read and write
2E43000
trusted library allocation
page read and write
593000
stack
page read and write
730000
heap
page read and write
11CB000
direct allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
126C0000
trusted library allocation
page read and write
2C8A000
direct allocation
page read and write
7FFAAC340000
trusted library allocation
page read and write
1CA5C000
heap
page read and write
257E000
stack
page read and write
115B000
direct allocation
page read and write
3230000
heap
page read and write
28FC000
trusted library allocation
page read and write
12721000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
7FFAAC626000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
1BA32000
heap
page read and write
12757000
trusted library allocation
page read and write
1B65F000
heap
page read and write
1BA00000
heap
page read and write
12712000
trusted library allocation
page read and write
1BA2D000
heap
page read and write
7FFAAC500000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
11D6000
direct allocation
page read and write
1B5E8000
heap
page read and write
2E3F000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page read and write
7FFAAC7C6000
trusted library allocation
page read and write
7FA90000
direct allocation
page read and write
28F1000
trusted library allocation
page read and write
B8E000
unkown
page write copy
12581000
trusted library allocation
page read and write
1219000
direct allocation
page read and write
2CA7000
trusted library allocation
page read and write
2D9C000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
1204000
direct allocation
page read and write
1CF70000
heap
page read and write
2A93000
trusted library allocation
page read and write
29A5000
trusted library allocation
page read and write
29C5000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
1BBF1000
heap
page read and write
1B6CF000
heap
page read and write
1BA29000
heap
page read and write
112000
unkown
page read and write
1BAEA000
heap
page read and write
7FFAAC460000
trusted library allocation
page execute and read and write
1BA4B000
heap
page read and write
11DD000
direct allocation
page read and write
2C5F000
direct allocation
page read and write
23B0000
heap
page execute and read and write
7FFAAC810000
trusted library allocation
page read and write
1BAA2000
heap
page read and write
7FFAAC795000
trusted library allocation
page read and write
122F000
direct allocation
page read and write
12A9000
heap
page read and write
1BBFE000
heap
page read and write
1259B000
trusted library allocation
page read and write
1081000
heap
page read and write
1081000
heap
page read and write
11A1000
direct allocation
page read and write
7FFAAC35D000
trusted library allocation
page execute and read and write
2A40000
trusted library allocation
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
28FE000
trusted library allocation
page read and write
38B0000
direct allocation
page read and write
2CA5000
trusted library allocation
page read and write
2C83000
direct allocation
page read and write
1087000
heap
page read and write
119000
unkown
page readonly
1BAC2000
heap
page read and write
2990000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
7FFAAC767000
trusted library allocation
page read and write
126CA000
trusted library allocation
page read and write
12630000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
38C4000
direct allocation
page read and write
755000
heap
page read and write
2C81000
trusted library allocation
page read and write
28D8000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page read and write
7FFAAC79D000
trusted library allocation
page read and write
1271E000
trusted library allocation
page read and write
1051000
heap
page read and write
1B3DE000
stack
page read and write
1BB24000
heap
page read and write
109B000
heap
page read and write
2DC2000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
22E0000
heap
page read and write
EF8000
heap
page read and write
2E30000
trusted library allocation
page read and write
1BAB4000
heap
page read and write
1169000
direct allocation
page read and write
1275D000
trusted library allocation
page read and write
28BE000
trusted library allocation
page read and write
1094000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
1AFE0000
heap
page read and write
2BCD000
direct allocation
page read and write
2D6F000
trusted library allocation
page read and write
1261000
direct allocation
page read and write
2A52000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
12991000
trusted library allocation
page read and write
1154000
direct allocation
page read and write
E80000
heap
page read and write
262D000
trusted library allocation
page read and write
1276F000
trusted library allocation
page read and write
126DE000
trusted library allocation
page read and write
2BE3000
direct allocation
page read and write
2A6D000
trusted library allocation
page read and write
7FFAAC36B000
trusted library allocation
page execute and read and write
2AE8000
trusted library allocation
page read and write
7FFB226F1000
unkown
page execute read
BF8000
unkown
page readonly
2B9B000
direct allocation
page read and write
2B3D000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
126BA000
trusted library allocation
page read and write
38B0000
direct allocation
page read and write
3BF5000
direct allocation
page read and write
7FAAB000
direct allocation
page read and write
2A2B000
trusted library allocation
page read and write
1095000
heap
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
109A000
heap
page read and write
11B2000
direct allocation
page read and write
2D92000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
8E0000
unkown
page readonly
38CD000
direct allocation
page read and write
7FFAAC3FC000
trusted library allocation
page execute and read and write
2E39000
trusted library allocation
page read and write
7FFAAC353000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
1020000
direct allocation
page execute and read and write
7FFAAC7A3000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
1B4DC000
stack
page read and write
1BBD4000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
347F000
stack
page read and write
12775000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
288B000
trusted library allocation
page read and write
2C49000
direct allocation
page read and write
11E4000
direct allocation
page read and write
2DEE000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
750000
heap
page read and write
12633000
trusted library allocation
page read and write
7FFAAC789000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
2BD4000
direct allocation
page read and write
1BE7E000
stack
page read and write
1C19F000
heap
page read and write
2C1E000
direct allocation
page read and write
710000
heap
page read and write
289E000
trusted library allocation
page read and write
38E0000
direct allocation
page read and write
61000
unkown
page execute read
3120000
direct allocation
page read and write
129A3000
trusted library allocation
page read and write
9F0000
heap
page read and write
12761000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
1BB8B000
heap
page read and write
288E000
trusted library allocation
page read and write
ACB000
stack
page read and write
1AB0B000
stack
page read and write
2856000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
129B5000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
54EE000
stack
page read and write
2A0D000
trusted library allocation
page read and write
1220000
direct allocation
page read and write
2A3C000
trusted library allocation
page read and write
28DE000
trusted library allocation
page read and write
1AF60000
heap
page execute and read and write
129F3000
trusted library allocation
page read and write
7FFAAC820000
trusted library allocation
page read and write
150000
unkown
page readonly
1268000
direct allocation
page read and write
126D0000
trusted library allocation
page read and write
2C16000
direct allocation
page read and write
2C98000
direct allocation
page read and write
128E000
stack
page read and write
129E0000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
1BA85000
heap
page read and write
2B06000
trusted library allocation
page read and write
12688000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
2B1B000
trusted library allocation
page read and write
29A7000
trusted library allocation
page read and write
10C7000
heap
page read and write
7FFAAC344000
trusted library allocation
page read and write
129D9000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
125B9000
trusted library allocation
page read and write
1A90B000
heap
page read and write
12641000
trusted library allocation
page read and write
12766000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
2B5F000
stack
page read and write
7FFAAC720000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
2CB8000
trusted library allocation
page read and write
2C42000
direct allocation
page read and write
7FFAAC7E7000
trusted library allocation
page read and write
2BEA000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
7FFAAC360000
trusted library allocation
page read and write
150000
unkown
page readonly
2E5B000
trusted library allocation
page read and write
413D000
stack
page read and write
2D31000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
1A5B0000
trusted library allocation
page read and write
E60000
heap
page read and write
11B9000
direct allocation
page read and write
117000
unkown
page readonly
7FFAAC774000
trusted library allocation
page read and write
1228000
direct allocation
page read and write
125A7000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
53C000
heap
page read and write
12B0000
heap
page read and write
115000
unkown
page write copy
1264C000
trusted library allocation
page read and write
1263F000
trusted library allocation
page read and write
1272E000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
125B2000
trusted library allocation
page read and write
7FFAAC426000
trusted library allocation
page execute and read and write
127AC000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
E5E000
stack
page read and write
108B000
heap
page read and write
12647000
trusted library allocation
page read and write
10B1000
heap
page read and write
2A84000
trusted library allocation
page read and write
7FFAAC364000
trusted library allocation
page read and write
2C50000
direct allocation
page read and write
2C94000
trusted library allocation
page read and write
126D5000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page execute and read and write
1BB16000
heap
page read and write
60000
unkown
page readonly
12715000
trusted library allocation
page read and write
296A000
trusted library allocation
page read and write
2D4B000
trusted library allocation
page read and write
2973000
trusted library allocation
page read and write
9F5000
heap
page read and write
2BB0000
direct allocation
page read and write
7FFAAC555000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
10C8000
heap
page read and write
5A3000
heap
page read and write
1AFE3000
heap
page read and write
1086000
heap
page read and write
28CD000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
11AD000
direct allocation
page read and write
2581000
trusted library allocation
page read and write
1240000
heap
page read and write
2AC8000
trusted library allocation
page read and write
126E3000
trusted library allocation
page read and write
1B625000
heap
page read and write
126D3000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
7FD9B000
direct allocation
page read and write
10AC000
heap
page read and write
7FFB22712000
unkown
page readonly
10AF000
heap
page read and write
1B615000
heap
page read and write
28BA000
trusted library allocation
page read and write
2C66000
direct allocation
page read and write
107A000
heap
page read and write
12A02000
trusted library allocation
page read and write
2867000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
1B63F000
heap
page read and write
2ADB000
trusted library allocation
page read and write
29E5000
trusted library allocation
page read and write
59D000
heap
page read and write
2B19000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
289C000
trusted library allocation
page read and write
1267F000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
1298D000
trusted library allocation
page read and write
38E0000
heap
page read and write
11C0000
direct allocation
page read and write
10C1000
heap
page read and write
2911000
trusted library allocation
page read and write
2D49000
trusted library allocation
page read and write
12705000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
1162000
direct allocation
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
29AC000
trusted library allocation
page read and write
7FFAAC76D000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
3FFE000
stack
page read and write
2A2D000
trusted library allocation
page read and write
1BA7E000
heap
page read and write
2A0F000
trusted library allocation
page read and write
127E0000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
129E6000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
1AF63000
heap
page execute and read and write
7FFAAC542000
trusted library allocation
page read and write
1073000
heap
page read and write
7FFAAC79F000
trusted library allocation
page read and write
1094000
heap
page read and write
3BC8000
direct allocation
page read and write
2A44000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
2B83000
direct allocation
page read and write
1141000
direct allocation
page read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
12692000
trusted library allocation
page read and write
2983000
trusted library allocation
page read and write
11F4000
direct allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAAC34D000
trusted library allocation
page execute and read and write
1178000
direct allocation
page read and write
1058000
heap
page read and write
2885000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
7FFAAC7C4000
trusted library allocation
page read and write
28B1000
trusted library allocation
page read and write
1BAB0000
heap
page read and write
1193000
direct allocation
page read and write
1B60A000
heap
page read and write
129F5000
trusted library allocation
page read and write
298E000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
2B28000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
12724000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
1071000
heap
page read and write
2A9C000
trusted library allocation
page read and write
1054000
heap
page read and write
7FFAAC55B000
trusted library allocation
page read and write
12750000
trusted library allocation
page read and write
1090000
heap
page read and write
2B35000
trusted library allocation
page read and write
1030000
heap
page read and write
29E1000
trusted library allocation
page read and write
3EA0000
heap
page read and write
3BA8000
direct allocation
page read and write
1C97D000
stack
page read and write
1263C000
trusted library allocation
page read and write
2C58000
direct allocation
page read and write
2BF1000
direct allocation
page read and write
2DD0000
heap
page read and write
2E1B000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
333F000
stack
page read and write
2C01000
direct allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
10C1000
heap
page read and write
1B61F000
heap
page read and write
129A9000
trusted library allocation
page read and write
1BD7C000
stack
page read and write
2A5E000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
2872000
trusted library allocation
page read and write
1236000
direct allocation
page read and write
3DDD000
heap
page read and write
2C8A000
trusted library allocation
page read and write
3DDF000
heap
page read and write
571000
heap
page read and write
2D9E000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
3D8F000
stack
page read and write
2B0C000
trusted library allocation
page read and write
54F0000
heap
page read and write
2AB9000
trusted library allocation
page read and write
2BA2000
direct allocation
page read and write
1097000
heap
page read and write
1074000
heap
page read and write
2B0A000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
58F0000
direct allocation
page read and write
2C0F000
direct allocation
page read and write
9FC000
heap
page read and write
1C180000
heap
page read and write
28DA000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
E76000
heap
page read and write
1CA50000
heap
page read and write
108B000
heap
page read and write
28EB000
trusted library allocation
page read and write
1070000
heap
page read and write
1073000
heap
page read and write
2C85000
trusted library allocation
page read and write
114C000
direct allocation
page read and write
630000
heap
page read and write
1BA12000
heap
page read and write
10C4000
heap
page read and write
2E4C000
trusted library allocation
page read and write
2C3B000
direct allocation
page read and write
129FE000
trusted library allocation
page read and write
2380000
heap
page execute and read and write
127A2000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
7FFAAC665000
trusted library allocation
page read and write
127C0000
trusted library allocation
page read and write
1062000
heap
page read and write
2470000
heap
page read and write
38BB000
direct allocation
page read and write
3EA1000
heap
page read and write
296E000
trusted library allocation
page read and write
7FFB22706000
unkown
page readonly
2981000
trusted library allocation
page read and write
127BA000
trusted library allocation
page read and write
297B000
trusted library allocation
page read and write
1CF81000
heap
page read and write
1130000
direct allocation
page read and write
9B0000
trusted library allocation
page read and write
E30000
heap
page read and write
1B6A0000
heap
page read and write
12A0000
heap
page read and write
2CC9000
trusted library allocation
page read and write
1268A000
trusted library allocation
page read and write
1CF8B000
heap
page read and write
2E41000
trusted library allocation
page read and write
10B9000
heap
page read and write
1267B000
trusted library allocation
page read and write
1BBCF000
heap
page read and write
2AD5000
trusted library allocation
page read and write
127B5000
trusted library allocation
page read and write
7FFAAC610000
trusted library allocation
page read and write
2887000
trusted library allocation
page read and write
2D62000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
12623000
trusted library allocation
page read and write
7FF42BFB0000
trusted library allocation
page execute and read and write
7FFAAC570000
trusted library allocation
page read and write
E77000
heap
page read and write
62C000
heap
page read and write
2996000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
106E000
heap
page read and write
125BF000
trusted library allocation
page read and write
2865000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
EC0000
heap
page read and write
2BA9000
direct allocation
page read and write
2CCC000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
9F9000
heap
page read and write
106A000
heap
page read and write
2B37000
trusted library allocation
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
2BF8000
direct allocation
page read and write
297D000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
29BF000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
2C6D000
direct allocation
page read and write
1279C000
trusted library allocation
page read and write
7FFAAC7DA000
trusted library allocation
page read and write
29BD000
trusted library allocation
page read and write
7FFAAC39C000
trusted library allocation
page execute and read and write
129EF000
trusted library allocation
page read and write
3BE1000
direct allocation
page read and write
2A0B000
trusted library allocation
page read and write
117F000
direct allocation
page read and write
10BF000
heap
page read and write
55B000
heap
page read and write
125AD000
trusted library allocation
page read and write
1170000
direct allocation
page read and write
2E73000
heap
page read and write
E70000
heap
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
85F000
stack
page read and write
530000
heap
page read and write
2B3B000
trusted library allocation
page read and write
2CA9000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
10C7000
heap
page read and write
11FB000
direct allocation
page read and write
2D6D000
trusted library allocation
page read and write
125A1000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
1266E000
trusted library allocation
page read and write
11CE000
direct allocation
page read and write
113A000
direct allocation
page read and write
12697000
trusted library allocation
page read and write
127A9000
trusted library allocation
page read and write
1270B000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
1074000
heap
page read and write
337E000
stack
page read and write
7FFAAC7D1000
trusted library allocation
page read and write
322F000
direct allocation
page read and write
28A0000
trusted library allocation
page read and write
7FFAAC590000
trusted library allocation
page read and write
1BB2B000
heap
page read and write
1BAAC000
heap
page read and write
55E000
heap
page read and write
2BDC000
direct allocation
page read and write
2C96000
trusted library allocation
page read and write
11FE000
stack
page read and write
7FFAAC343000
trusted library allocation
page execute and read and write
1BADA000
heap
page read and write
109000
unkown
page read and write
2A42000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
3BED000
direct allocation
page read and write
2AB5000
trusted library allocation
page read and write
126D8000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
1268D000
trusted library allocation
page read and write
129B0000
trusted library allocation
page read and write
EF0000
heap
page read and write
7FFAAC840000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
1B696000
heap
page read and write
3120000
direct allocation
page read and write
1CF72000
heap
page read and write
1C192000
heap
page read and write
1B600000
heap
page read and write
2B08000
trusted library allocation
page read and write
12600000
trusted library allocation
page read and write
10A1000
heap
page read and write
2C91000
direct allocation
page read and write
1010000
heap
page read and write
2C7C000
direct allocation
page read and write
2C2B000
direct allocation
page read and write
2DAF000
trusted library allocation
page read and write
7FFAAC7F8000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
7FFAAC78B000
trusted library allocation
page read and write
B95000
unkown
page read and write
2E60000
direct allocation
page read and write
2889000
trusted library allocation
page read and write
127B8000
trusted library allocation
page read and write
573000
heap
page read and write
2A6F000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
28FA000
trusted library allocation
page read and write
10CD000
heap
page read and write
1060000
heap
page read and write
29E3000
trusted library allocation
page read and write
10D0000
heap
page read and write
FBE000
stack
page read and write
10A8000
heap
page read and write
2C08000
direct allocation
page read and write
28C7000
trusted library allocation
page read and write
8E1000
unkown
page execute read
1B619000
heap
page read and write
3DA0000
heap
page read and write
7FFAAC7F6000
trusted library allocation
page read and write
800000
heap
page read and write
D0C000
stack
page read and write
B90000
unkown
page read and write
2DCF000
trusted library allocation
page read and write
1B639000
heap
page read and write
2985000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
2C74000
direct allocation
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
1212000
direct allocation
page read and write
3DA1000
heap
page read and write
D5E000
stack
page read and write
1B7DA000
stack
page read and write
29C1000
trusted library allocation
page read and write
104A000
heap
page read and write
29F2000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
7FFB22715000
unkown
page readonly
1B12E000
stack
page read and write
7FFAAC510000
trusted library allocation
page read and write
12675000
trusted library allocation
page read and write
12629000
trusted library allocation
page read and write
2D7E000
trusted library allocation
page read and write
127CD000
trusted library allocation
page read and write
1038000
heap
page read and write
7FFAAC860000
trusted library allocation
page read and write
124C000
direct allocation
page read and write
1B9FB000
stack
page read and write
7FFAAC700000
trusted library allocation
page read and write
3DDD000
heap
page read and write
109000
unkown
page write copy
2DA4000
trusted library allocation
page read and write
12639000
trusted library allocation
page read and write
1073000
heap
page read and write
B8E000
unkown
page read and write
4F4000
stack
page read and write
2D4F000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
1BA04000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
2A34000
trusted library allocation
page read and write
1065000
heap
page read and write
1B5DE000
stack
page read and write
12729000
trusted library allocation
page read and write
97E000
stack
page read and write
1186000
direct allocation
page read and write
28E9000
trusted library allocation
page read and write
1B2DE000
stack
page read and write
1B16E000
stack
page read and write
127B2000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
1B0EF000
stack
page read and write
7FFAAC58C000
trusted library allocation
page read and write
2BBF000
direct allocation
page read and write
2D82000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
126C7000
trusted library allocation
page read and write
3E20000
heap
page read and write
2BC6000
direct allocation
page read and write
2E70000
heap
page read and write
12A5000
heap
page read and write
105E000
heap
page read and write
12684000
trusted library allocation
page read and write
BA7000
unkown
page readonly
2A80000
trusted library allocation
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
129F8000
trusted library allocation
page read and write
40FE000
stack
page read and write
7FFAAC620000
trusted library allocation
page read and write
106A000
heap
page read and write
1BACA000
heap
page read and write
290B000
trusted library allocation
page read and write
2A8F000
trusted library allocation
page read and write
1080000
heap
page read and write
1BBBF000
heap
page read and write
125A000
direct allocation
page read and write
2AB7000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
109F000
heap
page read and write
3A8E000
stack
page read and write
2DBE000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
1BA71000
heap
page read and write
129EA000
trusted library allocation
page read and write
1271B000
trusted library allocation
page read and write
1244000
direct allocation
page read and write
7FFAAC400000
trusted library allocation
page execute and read and write
BCC000
stack
page read and write
BA0000
unkown
page write copy
28BC000
trusted library allocation
page read and write
1276A000
trusted library allocation
page read and write
12779000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
2BB8000
direct allocation
page read and write
3B99000
direct allocation
page read and write
2DE8000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
7FFB226F0000
unkown
page readonly
1253000
direct allocation
page read and write
120B000
direct allocation
page read and write
7FFAAC7EF000
trusted library allocation
page read and write
There are 727 hidden memdumps, click here to show them.