IOC Report
reservation .exe

loading gif

Files

File Path
Type
Category
Malicious
reservation .exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\qilq\ast.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\astclient.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\astrct.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\aw_sas32.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\hatls.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-26KIS.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-5KIJJ.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-8MMT6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-9MCCS.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-BFIN6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-BI7PN.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-HE32K.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-K402A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-MGO66.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-OUNKJ.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-PO10S.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-RFQHO.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-SJ8AI.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\is-SSL54.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\libcrypto-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\libcryptoMD.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\libcurl.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\libjpeg-turbo-win.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\libssl-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\opus.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qilq\quartz.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\AstCrp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\ast.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\astclient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\astrct.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\aw_sas32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\hatls.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\libcrypto-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\libcryptoMD.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\libcurl.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\libjpeg-turbo-win.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\libssl-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\opus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fat\quartz.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-4SM5O.tmp\reservation .tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BE9V9.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BE9V9.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-GMPCP.tmp\reservation .tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-I3C98.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-I3C98.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\qilq\2teu9t.cfg (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\qilq\AstCrp.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\qilq\config.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\qilq\fguwrtug.bmp (copy)
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 225x225, components 3
dropped
C:\Users\user\AppData\Local\Temp\qilq\g3ll5lm.bat (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\qilq\is-9LOO0.tmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 225x225, components 3
dropped
C:\Users\user\AppData\Local\Temp\qilq\is-GB3EG.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\qilq\is-LREC4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\qilq\is-O3LDO.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\qilq\is-PDQGE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\qilq\msvcr120.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fat\2teu9t.cfg
data
dropped
C:\Users\user\AppData\Roaming\fat\config.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fat\fguwrtug.bmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 225x225, components 3
dropped
C:\Users\user\AppData\Roaming\fat\g3ll5lm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fat\msvcr120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 54 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\reservation .exe
"C:\Users\user\Desktop\reservation .exe"
malicious
C:\Users\user\Desktop\reservation .exe
"C:\Users\user\Desktop\reservation .exe" /verysilent /password=84t66giu
malicious
C:\Users\user\AppData\Roaming\fat\ast.exe
"C:\Users\user\AppData\Roaming\fat\ast.exe"
malicious
C:\Users\user\AppData\Roaming\fat\ast.exe
"C:\Users\user\AppData\Roaming\fat\ast.exe"
malicious
C:\Users\user\AppData\Roaming\fat\ast.exe
"C:\Users\user\AppData\Roaming\fat\ast.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-GMPCP.tmp\reservation .tmp
"C:\Users\user\AppData\Local\Temp\is-GMPCP.tmp\reservation .tmp" /SL5="$10464,7120736,816128,C:\Users\user\Desktop\reservation .exe"
C:\Users\user\AppData\Local\Temp\is-4SM5O.tmp\reservation .tmp
"C:\Users\user\AppData\Local\Temp\is-4SM5O.tmp\reservation .tmp" /SL5="$2046A,7120736,816128,C:\Users\user\Desktop\reservation .exe" /verysilent /password=84t66giu
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\qilq\g3ll5lm.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\xcopy.exe
xcopy /Y /I /S "C:\Users\user\AppData\Local\Temp\qilq\*" "C:\Users\user\AppData\Roaming\fat\"

URLs

Name
IP
Malicious
https://id.xn--80akicokc0aablc.xn--p1ai:4439c0
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
https://id.xn--80akicokc0aai
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443g
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443lnd
unknown
https://id.xn--80akicokc0aablc.xn--p1aiheGu
unknown
http://crl.sectigo.com/COMODOTimeStampingCA_2.crl0r
unknown
http://www.indyproject.org/
unknown
https://id.xn--80akicokc0aablc.xn--p1aie03
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/stClnstCln
unknown
https://curl.haxx.se/docs/http-cookies.html#
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443lnJm&
unknown
https://datatracker.ietf.org/ipr/1526/
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335-
unknown
https://www.remobjects.com/ps
unknown
https://id.xn--80akicokc0aablc.xn--p1ai4j1
unknown
https://curl.haxx.se/docs/copyright.htmlD
unknown
https://id.xn--80akicokc0aablc.xn--p1aiexe03
unknown
https://id.xn--80akicokc0aablc.xn--p1aifgGu
unknown
https://www.innosetup.com/
unknown
https://id.xn--80akicokc0aablc.xn--p1aim;
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443-
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/
unknown
https://id.xn--80akicokc0aablc.xn--p1aierW
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:4432
unknown
https://id.xn--80akicokc0aablc.xn--p1ait.exeje
unknown
https://id.xn--80akicokc0aablc.xn--p1aiget
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443ln
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443lnmm
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/stClnD956C
unknown
https://id.xn--80akicokc0aablc.xn--p1ai
unknown
https://id.xn--80akicokc0aablc.xn--p1aigiGu
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335y
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.borland.com/namespaces/Typesw
unknown
http://www.borland.com/namespaces/Typesy
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443dm
unknown
http://jrsoftware.github.io/issrc/ISHelp/isxfunc.xml
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...43
unknown
https://id.xn--80akicokc0aablc.xn--p1aiZ
unknown
https://id.xn--80akicokc0aablc.xn--p1ait.exe
unknown
http://schemas.xmlsoap.org/soap/encoding/exe
unknown
http://www.borland.com/namespaces/Typesbcrypt
unknown
https://datatracker.ietf.org/ipr/1524/
unknown
https://id.xn--80akicokc0aablc.xn--p1aid003
unknown
https://id.xn--80akicokc0aablc.xn--p1ainkEx
unknown
https://id.xn--80akicokc0aablc.xn--p1aii
unknown
https://id.xn--80akicokc0aablc.xn--p1aid
unknown
http://www.openssl.org/)
unknown
https://id.xn--80akicokc0aablc.xn--p1aie
unknown
https://id.xn--80akicokc0aablc.xn--p1ai3
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443gE
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443gD
unknown
http://ocsp.sectigo.com0
unknown
http://solicecare.website/de37/update.phph?
unknown
http://www.openssl.org/V
unknown
https://id.xn--80akicokc0aa
unknown
https://id.xn--8X
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443g=
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443gW
unknown
https://id.xn--80akicokc0aablc.xn--p1aiI
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://id.xn--80akicokc0aablc.xn--p1ai.dllC;1
unknown
http://www.borland.com/namespaces/TypesE
unknown
https://id.xn--80akicokc0aablc.xn--p1ai.dllM
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://id.xn--80akicokc0aablc.xn--p1ai.dllI
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443ata
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443gK
unknown
http://www.borland.com/namespaces/Typesn
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443mm
unknown
http://www.borland.com/namespaces/Types
unknown
https://sectigo.com/CPS0B
unknown
http://www.borland.com/namespaces/Typesu
unknown
https://curl.haxx.se/V
unknown
https://datatracker.ietf.org/ipr/1914/
unknown
https://sectigo.com/CPS0C
unknown
https://sectigo.com/CPS0D
unknown
https://id.xn--80akicokc0aablc.xn--p1ai)
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443lnw#
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443g1
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443lndm
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...4335AW
unknown
http://crt.sectigo.com/COMODOTimeStampingCA_2.crt0#
unknown
http://www.sqlite.org/copyright.html.
unknown
https://id.xn--80akicokc0aablc.xn--p1ai00
unknown
https://sectigo.com/CPS0
unknown
https://www.openssl.org/docs/faq.html
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/api/exec
212.193.169.65
https://id.xn--80akicokc0aablc.xn--p1aieY
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335...
unknown
https://id.xn--80akicokc0aablc.xn--p1aidll
unknown
https://id.xn--80akicokc0aablc.xn--p1aidllm
unknown
https://id.xn-
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443gh
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
id.xn--80akicokc0aablc.xn--p1ai
212.193.169.65

IPs

IP
Domain
Country
Malicious
212.193.169.65
id.xn--80akicokc0aablc.xn--p1ai
Russian Federation
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.FixPass
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Main.Autorun
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Main.CloseButtonOperation
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Main.CheckUpdates
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.UseLocalSecuritySettings
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.DynPassKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.PassLifetime
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.CanWinAuth
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.AccessKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.CanWinLoginAnotherUser
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.UNCONTROLLED_ACCESS
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.CanWinLoginNotAdmin
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.DenyRemoteSettingsControl
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Security.DenyLockControls
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Log.ServerStoreTechLog
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Main.AWAYMODE_REQUIRED
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Main.LogsLifetime
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Main.LogsForMail2Support
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
ProxySettings.UseKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
ProxySettings.StoreUserAndPassw
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
fat
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
Values.HDD
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
IEProxyAttributes.Server
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
IEProxyAttributes.Port
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SSc
IEProxyAttributes.ProxyBypass
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown
page execute read
malicious
2790000
heap
page read and write
5C39000
heap
page read and write
2485000
direct allocation
page read and write
3416000
direct allocation
page read and write
6C1F9000
unkown
page execute read
720000
heap
page read and write
21B2000
direct allocation
page read and write
7A4000
heap
page read and write
8C8000
unkown
page read and write
618E000
stack
page read and write
9DF000
stack
page read and write
34D0000
direct allocation
page read and write
7A4000
heap
page read and write
34BE000
direct allocation
page read and write
34E9000
direct allocation
page read and write
6520000
heap
page read and write
3501000
direct allocation
page read and write
7FE26000
direct allocation
page read and write
6B741000
unkown
page read and write
3129000
direct allocation
page read and write
5C64000
heap
page read and write
3108000
heap
page read and write
5C1E000
heap
page read and write
C9A000
direct allocation
page read and write
6C0BE000
unkown
page readonly
2FD7000
direct allocation
page read and write
1F7000
heap
page read and write
BBE000
stack
page read and write
5C78000
heap
page read and write
30E3000
direct allocation
page read and write
7088000
unkown
page read and write
22AC000
direct allocation
page read and write
3461000
direct allocation
page read and write
5BFC000
heap
page read and write
2D8C000
direct allocation
page read and write
D78000
heap
page read and write
8C3000
unkown
page read and write
7A4000
heap
page read and write
21DF000
direct allocation
page read and write
3A5F000
stack
page read and write
2229000
direct allocation
page read and write
5C35000
heap
page read and write
740000
heap
page read and write
9B000
stack
page read and write
21C3000
direct allocation
page read and write
8B2000
heap
page read and write
3474000
direct allocation
page read and write
2D7D000
direct allocation
page read and write
2301000
direct allocation
page read and write
5000000
heap
page read and write
3786000
direct allocation
page read and write
5C53000
heap
page read and write
CA1000
direct allocation
page read and write
88B000
heap
page read and write
21F5000
direct allocation
page read and write
2F16000
direct allocation
page read and write
5C63000
heap
page read and write
5C31000
heap
page read and write
2271000
direct allocation
page read and write
245A000
direct allocation
page read and write
6C0CE000
unkown
page readonly
4384000
direct allocation
page read and write
3147000
heap
page read and write
43B6000
direct allocation
page read and write
3403000
direct allocation
page read and write
438A000
direct allocation
page read and write
CE3000
direct allocation
page read and write
2F80000
heap
page read and write
386F000
stack
page read and write
2DB9000
direct allocation
page read and write
5C00000
heap
page read and write
5C34000
heap
page read and write
5C1E000
heap
page read and write
33E6000
direct allocation
page read and write
6BC52000
unkown
page readonly
68CF000
stack
page read and write
5C1C000
heap
page read and write
61E9D000
unkown
page read and write
5C1F000
heap
page read and write
5C8D000
heap
page read and write
5C7B000
heap
page read and write
2FA1000
direct allocation
page read and write
5BC1000
heap
page read and write
6C1FF000
unkown
page execute read
5BFD000
heap
page read and write
7A4000
heap
page read and write
7FDDB000
direct allocation
page read and write
2DDD000
direct allocation
page read and write
382F000
stack
page read and write
2F30000
heap
page read and write
5C35000
heap
page read and write
5BFB000
heap
page read and write
7A4000
heap
page read and write
1E0000
heap
page read and write
64B000
heap
page read and write
437B000
direct allocation
page read and write
5BFB000
heap
page read and write
34F3000
direct allocation
page read and write
5C95000
heap
page read and write
4C2000
unkown
page write copy
61E000
stack
page read and write
6C8C0000
unkown
page readonly
D87000
heap
page read and write
C0F000
direct allocation
page read and write
CA8000
direct allocation
page read and write
7A4000
heap
page read and write
24FA000
direct allocation
page read and write
43A0000
direct allocation
page read and write
6E8000
heap
page read and write
7F8000
heap
page read and write
3578000
direct allocation
page read and write
6C949000
unkown
page readonly
5C3D000
heap
page read and write
2DC8000
direct allocation
page read and write
30E6000
heap
page read and write
3C40000
trusted library allocation
page read and write
2EE8000
heap
page read and write
6C110000
unkown
page readonly
6B72B000
unkown
page readonly
5C51000
heap
page read and write
2935000
heap
page read and write
5C4F000
heap
page read and write
2DAB000
direct allocation
page read and write
5BA1000
heap
page read and write
34F3000
direct allocation
page read and write
5C0D000
heap
page read and write
5C7E000
heap
page read and write
34F1000
direct allocation
page read and write
482C000
stack
page read and write
5C58000
heap
page read and write
2F3A000
direct allocation
page read and write
910000
heap
page read and write
2EA8000
heap
page read and write
34A6000
direct allocation
page read and write
937000
unkown
page read and write
4B9000
unkown
page read and write
2EA9000
heap
page read and write
2F1D000
direct allocation
page read and write
6C120000
unkown
page readonly
5C74000
heap
page read and write
19D000
stack
page read and write
5C1F000
heap
page read and write
5BFD000
heap
page read and write
CC0000
heap
page read and write
6C0A5000
unkown
page readonly
2F70000
direct allocation
page execute and read and write
C98000
heap
page read and write
5C7D000
heap
page read and write
24DD000
direct allocation
page read and write
34A2000
direct allocation
page read and write
2930000
heap
page read and write
19A000
stack
page read and write
19A000
stack
page read and write
401000
unkown
page execute read
3452000
direct allocation
page read and write
CBC000
heap
page read and write
6522000
heap
page read and write
5FE2000
direct allocation
page read and write
3119000
heap
page read and write
372F000
stack
page read and write
7089000
unkown
page write copy
708A000
unkown
page readonly
61EA0000
unkown
page write copy
333E000
stack
page read and write
30DC000
heap
page read and write
5C4F000
heap
page read and write
2FF9000
direct allocation
page read and write
42C8000
direct allocation
page read and write
2900000
direct allocation
page read and write
6A20000
heap
page read and write
6C923000
unkown
page readonly
D73000
heap
page read and write
43A2000
direct allocation
page read and write
6E0000
unkown
page readonly
226A000
direct allocation
page read and write
2D7D000
direct allocation
page read and write
6D1000
unkown
page read and write
22A4000
direct allocation
page read and write
7F0000
heap
page read and write
214F000
stack
page read and write
37A0000
direct allocation
page read and write
37ED000
direct allocation
page read and write
34FD000
direct allocation
page read and write
34B0000
direct allocation
page read and write
2EC8000
heap
page read and write
4386000
direct allocation
page read and write
7EE000
stack
page read and write
67CD000
stack
page read and write
3A9E000
stack
page read and write
6A11000
heap
page read and write
3462000
direct allocation
page read and write
8A6000
heap
page read and write
6C6A1000
unkown
page execute read
2D9C000
direct allocation
page read and write
5C2C000
heap
page read and write
3468000
direct allocation
page read and write
3350000
heap
page read and write
295F000
stack
page read and write
937000
unkown
page read and write
2ED6000
heap
page read and write
4B7000
unkown
page read and write
2FA7000
direct allocation
page read and write
8CA000
unkown
page read and write
2A40000
heap
page read and write
6D4D000
stack
page read and write
2AB0000
heap
page read and write
5C35000
heap
page read and write
3476000
direct allocation
page read and write
2C7D000
stack
page read and write
4394000
direct allocation
page read and write
4382000
direct allocation
page read and write
5FEA000
direct allocation
page read and write
5C69000
heap
page read and write
2850000
heap
page read and write
610000
heap
page read and write
2E01000
direct allocation
page read and write
254A000
direct allocation
page read and write
5C4E000
heap
page read and write
2180000
heap
page read and write
3106000
heap
page read and write
220B000
direct allocation
page read and write
2EF2000
direct allocation
page read and write
3494000
direct allocation
page read and write
8CB000
heap
page read and write
242C000
direct allocation
page read and write
CBE000
stack
page read and write
400000
unkown
page readonly
2DFA000
direct allocation
page read and write
2E10000
direct allocation
page read and write
5BD1000
heap
page read and write
5C1F000
heap
page read and write
43CE000
direct allocation
page read and write
42D0000
direct allocation
page read and write
6BA41000
unkown
page execute read
3014000
direct allocation
page read and write
75E000
stack
page read and write
5BD1000
heap
page read and write
6BC70000
unkown
page readonly
3A5F000
stack
page read and write
5C46000
heap
page read and write
3525000
direct allocation
page read and write
8BA000
heap
page read and write
5BC3000
heap
page read and write
5C0C000
heap
page read and write
4C0000
unkown
page read and write
22FA000
direct allocation
page read and write
2D20000
heap
page read and write
2428000
direct allocation
page read and write
4C0000
unkown
page read and write
5C97000
heap
page read and write
349C000
direct allocation
page read and write
2CD0000
trusted library allocation
page read and write
7A4000
heap
page read and write
9A8000
unkown
page readonly
5BFF000
heap
page read and write
8C3000
unkown
page read and write
6C71C000
unkown
page readonly
39F0000
direct allocation
page execute and read and write
3EBE000
stack
page read and write
61E00000
unkown
page readonly
361E000
stack
page read and write
6BAA5000
unkown
page execute read
34D4000
direct allocation
page read and write
358F000
stack
page read and write
92A000
unkown
page read and write
34EF000
direct allocation
page read and write
1F5000
heap
page read and write
6B744000
unkown
page readonly
5BFC000
heap
page read and write
8AC000
heap
page read and write
34D1000
heap
page read and write
43FE000
direct allocation
page read and write
8C3000
unkown
page read and write
2DC1000
direct allocation
page read and write
6D9E1000
unkown
page execute read
95000
stack
page read and write
6A28000
heap
page read and write
7A4000
heap
page read and write
2477000
direct allocation
page read and write
90A000
heap
page read and write
2F30000
heap
page read and write
5BB3000
heap
page read and write
65E000
stack
page read and write
2750000
heap
page read and write
5C1E000
heap
page read and write
3589000
direct allocation
page read and write
19A000
stack
page read and write
34CE000
direct allocation
page read and write
7E9D000
stack
page read and write
5C23000
heap
page read and write
5C35000
heap
page read and write
C49000
direct allocation
page read and write
2EA8000
heap
page read and write
3412000
direct allocation
page read and write
37BA000
direct allocation
page read and write
37C6000
direct allocation
page read and write
2FAB000
direct allocation
page read and write
CE0000
heap
page read and write
3464000
direct allocation
page read and write
7A4000
heap
page read and write
43C5000
direct allocation
page read and write
103E000
stack
page read and write
6C3F7000
unkown
page readonly
3DD0000
heap
page read and write
6C3F3000
unkown
page read and write
372E000
stack
page read and write
5C5B000
heap
page read and write
2E5E000
stack
page read and write
21E7000
direct allocation
page read and write
5C35000
heap
page read and write
61EA1000
unkown
page readonly
347E000
direct allocation
page read and write
355B000
direct allocation
page read and write
3459000
direct allocation
page read and write
6BAAA000
unkown
page execute read
395F000
stack
page read and write
32FC000
stack
page read and write
5C68000
heap
page read and write
2DB2000
direct allocation
page read and write
315E000
heap
page read and write
2526000
direct allocation
page read and write
5FE4000
direct allocation
page read and write
6C3F1000
unkown
page write copy
438E000
direct allocation
page read and write
24C6000
direct allocation
page read and write
34B8000
direct allocation
page read and write
5C70000
heap
page read and write
21D8000
direct allocation
page read and write
61E9B000
unkown
page readonly
5BEC000
heap
page read and write
24A9000
direct allocation
page read and write
2E70000
heap
page read and write
4398000
direct allocation
page read and write
21FC000
direct allocation
page read and write
3492000
direct allocation
page read and write
5C36000
heap
page read and write
2DF3000
direct allocation
page read and write
6DA09000
unkown
page readonly
2FCC000
direct allocation
page read and write
19A000
stack
page read and write
2970000
heap
page read and write
BEB000
direct allocation
page read and write
8E0000
unkown
page read and write
5C3F000
heap
page read and write
C84000
direct allocation
page read and write
21EE000
direct allocation
page read and write
3756000
direct allocation
page read and write
2EA8000
heap
page read and write
2DB4000
direct allocation
page read and write
8BB000
unkown
page read and write
630000
heap
page read and write
2640000
direct allocation
page read and write
24EB000
direct allocation
page read and write
2ECC000
direct allocation
page read and write
6E4E000
stack
page read and write
3538000
direct allocation
page read and write
37F7000
direct allocation
page read and write
6CE000
unkown
page read and write
401000
unkown
page execute read
34FF000
direct allocation
page read and write
BA0000
heap
page read and write
365E000
stack
page read and write
8E2000
unkown
page read and write
5C8D000
heap
page read and write
24B4000
direct allocation
page read and write
43DB000
direct allocation
page read and write
7000000
unkown
page readonly
244B000
direct allocation
page read and write
2EBC000
direct allocation
page read and write
312D000
heap
page read and write
5FEE000
direct allocation
page read and write
5FF2000
direct allocation
page read and write
6E0E3000
unkown
page readonly
2FA9000
direct allocation
page read and write
3468000
direct allocation
page read and write
21AA000
direct allocation
page read and write
5C51000
heap
page read and write
5C68000
heap
page read and write
5C20000
heap
page read and write
34CC000
direct allocation
page read and write
2FD0000
direct allocation
page read and write
62CE000
stack
page read and write
7A4000
heap
page read and write
5C82000
heap
page read and write
D3E000
stack
page read and write
27C0000
heap
page read and write
34E1000
direct allocation
page read and write
5C75000
heap
page read and write
348A000
direct allocation
page read and write
6C10E000
unkown
page read and write
5C59000
heap
page read and write
5C4E000
heap
page read and write
2FD4000
direct allocation
page read and write
93A000
unkown
page read and write
5C86000
heap
page read and write
45E0000
remote allocation
page read and write
2760000
direct allocation
page read and write
34B4000
direct allocation
page read and write
33D6000
direct allocation
page read and write
5C15000
heap
page read and write
2EA9000
heap
page read and write
2DC8000
direct allocation
page read and write
61E8A000
unkown
page read and write
346E000
direct allocation
page read and write
6C9000
unkown
page read and write
2FA0000
heap
page read and write
37B6000
direct allocation
page read and write
301B000
direct allocation
page read and write
3A02000
heap
page read and write
34AC000
direct allocation
page read and write
2453000
direct allocation
page read and write
B30000
unkown
page readonly
5D8C000
stack
page read and write
27C3000
heap
page read and write
300C000
direct allocation
page read and write
61E89000
unkown
page write copy
6A20000
heap
page read and write
5C1C000
heap
page read and write
5C69000
heap
page read and write
34B6000
direct allocation
page read and write
5C3A000
heap
page read and write
36CE000
stack
page read and write
8D3000
unkown
page read and write
3A00000
heap
page read and write
8C9000
heap
page read and write
BFA000
direct allocation
page read and write
C5F000
direct allocation
page read and write
2D30000
heap
page read and write
2D40000
heap
page read and write
5C68000
heap
page read and write
6BA4D000
unkown
page execute read
43D4000
direct allocation
page read and write
45E0000
remote allocation
page read and write
3428000
direct allocation
page read and write
34AE000
direct allocation
page read and write
2FC0000
heap
page read and write
6BA8F000
unkown
page execute read
DBB000
heap
page read and write
DB7000
heap
page read and write
6A32000
heap
page read and write
5C03000
heap
page read and write
7EA0000
trusted library allocation
page read and write
6C0DF000
unkown
page readonly
8DE000
unkown
page read and write
BEE000
stack
page read and write
30D7000
direct allocation
page read and write
8BF000
unkown
page read and write
2491000
direct allocation
page read and write
2F50000
heap
page read and write
2EA9000
heap
page read and write
42CE000
direct allocation
page read and write
6BF70000
unkown
page readonly
3340000
heap
page read and write
DCF000
heap
page read and write
5BCA000
heap
page read and write
6BF71000
unkown
page execute read
351B000
direct allocation
page read and write
2288000
direct allocation
page read and write
2493000
direct allocation
page read and write
8E2000
unkown
page read and write
439E000
direct allocation
page read and write
3598000
direct allocation
page read and write
349A000
direct allocation
page read and write
99000
stack
page read and write
8C8000
unkown
page read and write
690D000
stack
page read and write
7FE00000
direct allocation
page read and write
5C58000
heap
page read and write
3571000
direct allocation
page read and write
5BBB000
heap
page read and write
2237000
direct allocation
page read and write
5C4F000
heap
page read and write
C08000
direct allocation
page read and write
45E0000
remote allocation
page read and write
C54000
direct allocation
page read and write
346A000
direct allocation
page read and write
35DE000
stack
page read and write
2970000
heap
page read and write
C1E000
direct allocation
page read and write
5C8C000
heap
page read and write
1E7000
heap
page read and write
5C5D000
heap
page read and write
243D000
direct allocation
page read and write
26A0000
heap
page read and write
2FF6000
direct allocation
page read and write
8C2000
heap
page read and write
F1E000
stack
page read and write
34F5000
direct allocation
page read and write
7062000
unkown
page execute and read and write
5C83000
heap
page read and write
7CE000
stack
page read and write
4BA000
unkown
page read and write
2D9C000
direct allocation
page read and write
7A0000
heap
page read and write
22DA000
direct allocation
page read and write
5E8F000
stack
page read and write
6DE000
unkown
page readonly
22BA000
direct allocation
page read and write
34C0000
direct allocation
page read and write
923000
unkown
page read and write
8C6000
heap
page read and write
2219000
direct allocation
page read and write
5C6D000
heap
page read and write
3470000
direct allocation
page read and write
5D0000
heap
page read and write
6BC97000
unkown
page read and write
343C000
direct allocation
page read and write
8DE000
unkown
page read and write
CF8000
direct allocation
page read and write
1E0000
heap
page read and write
D98000
heap
page read and write
248B000
direct allocation
page read and write
6A10000
heap
page read and write
3029000
direct allocation
page read and write
5C3C000
heap
page read and write
345E000
stack
page read and write
314A000
heap
page read and write
5C83000
heap
page read and write
2EB5000
direct allocation
page read and write
8CC000
heap
page read and write
5BEF000
heap
page read and write
DBB000
heap
page read and write
6C7000
unkown
page read and write
5C9B000
heap
page read and write
C41000
direct allocation
page read and write
870000
heap
page read and write
D30000
heap
page read and write
2FC3000
heap
page read and write
2FE9000
direct allocation
page read and write
2AA0000
heap
page read and write
34C4000
direct allocation
page read and write
34A8000
direct allocation
page read and write
34F9000
direct allocation
page read and write
BC0000
direct allocation
page read and write
7083000
unkown
page execute and write copy
21D1000
direct allocation
page read and write
736000
unkown
page execute read
CC0000
heap
page read and write
6D6000
unkown
page read and write
8BB000
unkown
page write copy
3A01000
heap
page read and write
8B0000
heap
page read and write
5C8E000
heap
page read and write
3486000
direct allocation
page read and write
247E000
direct allocation
page read and write
CB8000
direct allocation
page read and write
4B7000
unkown
page read and write
5C3B000
heap
page read and write
C30000
heap
page read and write
42D4000
direct allocation
page read and write
8BB000
unkown
page read and write
19D000
stack
page read and write
8D7000
unkown
page read and write
6BADE000
unkown
page execute read
1D7000
heap
page read and write
2543000
direct allocation
page read and write
34C6000
direct allocation
page read and write
30DF000
heap
page read and write
5041000
heap
page read and write
614D000
stack
page read and write
344B000
direct allocation
page read and write
C6D000
direct allocation
page read and write
42F4000
direct allocation
page read and write
860000
heap
page read and write
8D3000
unkown
page read and write
2DA3000
direct allocation
page read and write
2F50000
heap
page read and write
7088000
unkown
page read and write
B3E000
stack
page read and write
4C6000
unkown
page readonly
5BF1000
heap
page read and write
4303000
direct allocation
page read and write
5C7C000
heap
page read and write
5041000
heap
page read and write
5C1F000
heap
page read and write
830000
direct allocation
page execute and read and write
CF1000
direct allocation
page read and write
432E000
direct allocation
page read and write
311B000
direct allocation
page read and write
2EEB000
direct allocation
page read and write
C76000
direct allocation
page read and write
2D75000
direct allocation
page read and write
5041000
heap
page read and write
6BCA0000
unkown
page readonly
3122000
direct allocation
page read and write
272A000
direct allocation
page read and write
30D6000
heap
page read and write
6B6C0000
unkown
page readonly
2EBF000
heap
page read and write
5C50000
heap
page read and write
6D9000
unkown
page write copy
2CD0000
direct allocation
page read and write
308E000
stack
page read and write
34D0000
direct allocation
page read and write
2558000
direct allocation
page read and write
BA0000
heap
page read and write
5C1C000
heap
page read and write
2FA5000
direct allocation
page read and write
21BA000
direct allocation
page read and write
650D000
stack
page read and write
2EDC000
direct allocation
page read and write
348E000
stack
page read and write
C70000
heap
page read and write
6D9F9000
unkown
page readonly
3114000
direct allocation
page read and write
34FB000
direct allocation
page read and write
4379000
direct allocation
page read and write
7A4000
heap
page read and write
6D6000
unkown
page read and write
2FB0000
direct allocation
page execute and read and write
362E000
stack
page read and write
ABF000
stack
page read and write
8D9000
unkown
page read and write
2FC3000
heap
page read and write
5C39000
heap
page read and write
2DE4000
direct allocation
page read and write
640C000
stack
page read and write
42C4000
direct allocation
page read and write
6BC2C000
unkown
page readonly
889D000
stack
page read and write
82D000
heap
page read and write
CBF000
direct allocation
page read and write
BF3000
direct allocation
page read and write
3761000
direct allocation
page read and write
5C29000
heap
page read and write
5C25000
heap
page read and write
2E10000
direct allocation
page read and write
368E000
stack
page read and write
65BE000
direct allocation
page read and write
2F97000
direct allocation
page read and write
6C944000
unkown
page write copy
5FE6000
direct allocation
page read and write
5BB9000
heap
page read and write
5C9E000
heap
page read and write
3F0E000
stack
page read and write
6C7000
unkown
page write copy
EDF000
stack
page read and write
5C93000
heap
page read and write
2CBA000
stack
page read and write
6C1E7000
unkown
page execute read
3480000
direct allocation
page read and write
5BAC000
heap
page read and write
3553000
direct allocation
page read and write
8C6000
heap
page read and write
7F0000
heap
page read and write
8C7000
heap
page read and write
2203000
direct allocation
page read and write
42D8000
direct allocation
page read and write
400000
unkown
page readonly
22B0000
heap
page read and write
5C8B000
heap
page read and write
2FC5000
direct allocation
page read and write
3562000
direct allocation
page read and write
30EB000
direct allocation
page read and write
24BF000
direct allocation
page read and write
6BC9D000
unkown
page readonly
42C6000
direct allocation
page read and write
5C68000
heap
page read and write
246F000
direct allocation
page read and write
42D2000
direct allocation
page read and write
2760000
direct allocation
page read and write
400F000
stack
page read and write
939000
unkown
page write copy
6C7000
unkown
page read and write
D35000
heap
page read and write
61E8B000
unkown
page readonly
2E20000
trusted library allocation
page read and write
6CA000
unkown
page read and write
310C000
direct allocation
page read and write
431E000
direct allocation
page read and write
6A2A000
heap
page read and write
5C29000
heap
page read and write
34E9000
direct allocation
page read and write
C58000
direct allocation
page read and write
2FDB000
direct allocation
page read and write
30E5000
heap
page read and write
115F000
stack
page read and write
7A4000
heap
page read and write
8E2000
unkown
page read and write
942000
unkown
page readonly
6B6C1000
unkown
page execute read
228F000
direct allocation
page read and write
927000
unkown
page read and write
7088000
unkown
page read and write
33FC000
direct allocation
page read and write
3466000
direct allocation
page read and write
43ED000
direct allocation
page read and write
43A8000
direct allocation
page read and write
304F000
stack
page read and write
5C68000
heap
page read and write
5C30000
heap
page read and write
5BA0000
heap
page read and write
30D0000
direct allocation
page read and write
6C942000
unkown
page read and write
4C4000
unkown
page readonly
B8B000
unkown
page readonly
21CA000
direct allocation
page read and write
6BA5E000
unkown
page execute read
9B000
stack
page read and write
5C65000
heap
page read and write
2230000
direct allocation
page read and write
7FB40000
direct allocation
page read and write
2DD6000
direct allocation
page read and write
937000
unkown
page read and write
6E0E0000
unkown
page read and write
2F60000
heap
page read and write
5C0A000
heap
page read and write
3496000
direct allocation
page read and write
2FE2000
direct allocation
page read and write
89B000
heap
page read and write
DD0000
heap
page read and write
5C11000
heap
page read and write
7A4000
heap
page read and write
5C57000
heap
page read and write
372F000
stack
page read and write
2F08000
direct allocation
page read and write
5C1E000
heap
page read and write
63CF000
stack
page read and write
101F000
stack
page read and write
2261000
direct allocation
page read and write
6C718000
unkown
page write copy
36DD000
stack
page read and write
5BEA000
heap
page read and write
5C0B000
heap
page read and write
5C53000
heap
page read and write
3758000
direct allocation
page read and write
5C5A000
heap
page read and write
24E4000
direct allocation
page read and write
2DE4000
direct allocation
page read and write
5C93000
heap
page read and write
D2A000
heap
page read and write
2DB2000
direct allocation
page read and write
4388000
direct allocation
page read and write
CEA000
direct allocation
page read and write
DC9000
heap
page read and write
CE8000
heap
page read and write
3448000
direct allocation
page read and write
2DCF000
direct allocation
page read and write
6C108000
unkown
page write copy
5C82000
heap
page read and write
34C2000
direct allocation
page read and write
1D5000
heap
page read and write
253C000
direct allocation
page read and write
6E0D000
stack
page read and write
5FEC000
direct allocation
page read and write
926000
unkown
page read and write
6C4D000
stack
page read and write
61E8A000
unkown
page read and write
7A4000
heap
page read and write
7087000
unkown
page execute read
2E07000
direct allocation
page read and write
2F53000
heap
page read and write
3478000
direct allocation
page read and write
105E000
stack
page read and write
7A4000
heap
page read and write
24F2000
direct allocation
page read and write
5C4E000
heap
page read and write
2AB5000
heap
page read and write
859000
heap
page read and write
34D2000
direct allocation
page read and write
5C41000
heap
page read and write
9B000
stack
page read and write
5C0000
heap
page read and write
3B30000
direct allocation
page execute and read and write
6C8C1000
unkown
page execute read
61E8A000
unkown
page read and write
8CC000
heap
page read and write
34D0000
direct allocation
page read and write
42CA000
direct allocation
page read and write
2534000
direct allocation
page read and write
3488000
direct allocation
page read and write
8C0000
heap
page read and write
6BA40000
unkown
page readonly
878000
heap
page read and write
5C93000
heap
page read and write
6E0D0000
unkown
page readonly
2551000
direct allocation
page read and write
5C4F000
heap
page read and write
5C5A000
heap
page read and write
5C65000
heap
page read and write
D39000
heap
page read and write
24A1000
direct allocation
page read and write
5C23000
heap
page read and write
5C35000
heap
page read and write
6C3FC000
unkown
page readonly
1F0000
heap
page read and write
8E2000
heap
page read and write
5C35000
heap
page read and write
2245000
direct allocation
page read and write
42D6000
direct allocation
page read and write
8DE000
unkown
page read and write
3421000
direct allocation
page read and write
5C2E000
heap
page read and write
3022000
direct allocation
page read and write
6BAA0000
unkown
page execute read
604D000
stack
page read and write
9BC000
unkown
page readonly
638000
heap
page read and write
6DA07000
unkown
page read and write
6C3F0000
unkown
page read and write
2DEC000
direct allocation
page read and write
5C36000
heap
page read and write
42C0000
direct allocation
page read and write
438C000
direct allocation
page read and write
3498000
direct allocation
page read and write
8DF000
stack
page read and write
3490000
direct allocation
page read and write
6D8D000
unkown
page read and write
30F9000
direct allocation
page read and write
CC6000
direct allocation
page read and write
5BA9000
heap
page read and write
5C68000
heap
page read and write
30DD000
heap
page read and write
5C10000
heap
page read and write
C66000
direct allocation
page read and write
8A0000
heap
page read and write
CDC000
direct allocation
page read and write
32F0000
heap
page read and write
3426000
direct allocation
page read and write
3545000
direct allocation
page read and write
5C5E000
heap
page read and write
3B9F000
stack
page read and write
3505000
direct allocation
page read and write
2D6E000
direct allocation
page read and write
5C70000
heap
page read and write
2220000
direct allocation
page read and write
251F000
direct allocation
page read and write
22B3000
direct allocation
page read and write
22C1000
direct allocation
page read and write
348E000
direct allocation
page read and write
5C98000
heap
page read and write
5C85000
heap
page read and write
5C90000
heap
page read and write
3460000
direct allocation
page read and write
5C1F000
heap
page read and write
1D0000
heap
page read and write
400000
unkown
page readonly
8C6000
heap
page read and write
5BFE000
heap
page read and write
5C31000
heap
page read and write
BCB000
direct allocation
page read and write
5BA9000
heap
page read and write
5C02000
heap
page read and write
96000
stack
page read and write
34ED000
direct allocation
page read and write
5C37000
heap
page read and write
34BA000
direct allocation
page read and write
6A11000
heap
page read and write
4E0000
heap
page read and write
5C1A000
heap
page read and write
2420000
direct allocation
page read and write
955000
heap
page read and write
5C9D000
heap
page read and write
4392000
direct allocation
page read and write
2EE3000
direct allocation
page read and write
5C10000
heap
page read and write
3DBD000
stack
page read and write
358F000
stack
page read and write
6F4000
unkown
page readonly
313E000
heap
page read and write
2F24000
direct allocation
page read and write
5C7E000
heap
page read and write
24B8000
direct allocation
page read and write
5C7A000
heap
page read and write
5C95000
heap
page read and write
30E7000
direct allocation
page read and write
2DDD000
direct allocation
page read and write
2518000
direct allocation
page read and write
78E000
stack
page read and write
42BE000
stack
page read and write
34B2000
direct allocation
page read and write
2CD0000
direct allocation
page read and write
2850000
heap
page read and write
93A000
unkown
page read and write
5BE5000
heap
page read and write
5041000
heap
page read and write
2F0F000
direct allocation
page read and write
2DB9000
direct allocation
page read and write
2DE9000
direct allocation
page read and write
24CD000
direct allocation
page read and write
34A4000
direct allocation
page read and write
34EB000
direct allocation
page read and write
6A0C000
unkown
page read and write
C33000
direct allocation
page read and write
C3F000
stack
page read and write
2E98000
heap
page read and write
4313000
direct allocation
page read and write
346C000
direct allocation
page read and write
376E000
stack
page read and write
5C82000
heap
page read and write
8CA000
unkown
page read and write
628F000
stack
page read and write
BD0000
heap
page read and write
1E5000
heap
page read and write
229D000
direct allocation
page read and write
3105000
direct allocation
page read and write
6C722000
unkown
page readonly
22F3000
direct allocation
page read and write
9B000
stack
page read and write
4F0000
heap
page read and write
F3F000
stack
page read and write
5C19000
heap
page read and write
5C0E000
heap
page read and write
C01000
direct allocation
page read and write
5C4F000
heap
page read and write
3C40000
trusted library allocation
page read and write
6A33000
heap
page read and write
439A000
direct allocation
page read and write
34F7000
direct allocation
page read and write
5C58000
heap
page read and write
894000
heap
page read and write
5C3D000
heap
page read and write
3B00000
trusted library allocation
page read and write
5C4F000
heap
page read and write
6BC07000
unkown
page readonly
5C08000
heap
page read and write
310F000
heap
page read and write
2D6E000
direct allocation
page read and write
6A3B000
heap
page read and write
8BB000
unkown
page read and write
5C1F000
heap
page read and write
4FC0000
heap
page read and write
376B000
direct allocation
page read and write
5C10000
heap
page read and write
E00000
heap
page read and write
F6F000
stack
page read and write
5C19000
heap
page read and write
2FE9000
direct allocation
page read and write
5C02000
heap
page read and write
6C946000
unkown
page read and write
D70000
heap
page read and write
30E9000
direct allocation
page read and write
D20000
heap
page read and write
347A000
direct allocation
page read and write
2DFA000
direct allocation
page read and write
2DEC000
direct allocation
page read and write
2E01000
direct allocation
page read and write
C92000
direct allocation
page read and write
43A4000
direct allocation
page read and write
7A4000
heap
page read and write
5C02000
heap
page read and write
2FCE000
stack
page read and write
6D1000
unkown
page read and write
2461000
direct allocation
page read and write
5BEC000
heap
page read and write
492C000
stack
page read and write
61E01000
unkown
page execute read
5C57000
heap
page read and write
34A0000
direct allocation
page read and write
6A19000
heap
page read and write
5C5B000
heap
page read and write
5C2C000
heap
page read and write
C2E000
stack
page read and write
2FC0000
heap
page read and write
5BEA000
heap
page read and write
5BF2000
heap
page read and write
439C000
direct allocation
page read and write
C17000
direct allocation
page read and write
710000
heap
page read and write
37CA000
direct allocation
page read and write
347C000
direct allocation
page read and write
68C5000
stack
page read and write
30E1000
direct allocation
page read and write
395E000
stack
page read and write
3B40000
heap
page read and write
BC8000
direct allocation
page read and write
3472000
direct allocation
page read and write
5C80000
heap
page read and write
6C380000
unkown
page execute read
5C4A000
heap
page read and write
34C8000
direct allocation
page read and write
5C70000
heap
page read and write
6E0E1000
unkown
page readonly
8D0000
unkown
page read and write
C25000
direct allocation
page read and write
2EA8000
heap
page read and write
380D000
direct allocation
page read and write
5C35000
heap
page read and write
37C8000
direct allocation
page read and write
34BC000
direct allocation
page read and write
26D0000
direct allocation
page execute and read and write
5C37000
heap
page read and write
42CC000
direct allocation
page read and write
5C57000
heap
page read and write
2800000
heap
page read and write
2E90000
heap
page read and write
30E5000
direct allocation
page read and write
5C0B000
heap
page read and write
913000
heap
page read and write
5C96000
heap
page read and write
E09000
heap
page read and write
6C392000
unkown
page readonly
5C5E000
heap
page read and write
2468000
direct allocation
page read and write
3BDC000
stack
page read and write
5C19000
heap
page read and write
8BD000
heap
page read and write
349E000
direct allocation
page read and write
710000
heap
page read and write
2C90000
trusted library allocation
page read and write
90B000
heap
page read and write
5C61000
heap
page read and write
8D0000
unkown
page read and write
4390000
direct allocation
page read and write
BA0000
heap
page read and write
2296000
direct allocation
page read and write
300E000
stack
page read and write
5BF5000
heap
page read and write
6C6A0000
unkown
page readonly
30F6000
direct allocation
page read and write
43A6000
direct allocation
page read and write
760000
heap
page read and write
6F4F000
stack
page read and write
22C8000
direct allocation
page read and write
3488000
direct allocation
page read and write
6A33000
heap
page read and write
3CDD000
stack
page read and write
2F60000
direct allocation
page execute and read and write
5C32000
heap
page read and write
252D000
direct allocation
page read and write
3439000
direct allocation
page read and write
DC4000
heap
page read and write
6D9E0000
unkown
page readonly
3B40000
heap
page read and write
34D0000
heap
page read and write
204E000
stack
page read and write
3484000
direct allocation
page read and write
7FD90000
direct allocation
page read and write
2FB6000
direct allocation
page read and write
7A4000
heap
page read and write
3482000
direct allocation
page read and write
6E0D1000
unkown
page execute read
3443000
direct allocation
page read and write
223E000
direct allocation
page read and write
5C28000
heap
page read and write
6C10A000
unkown
page read and write
910000
heap
page read and write
5C5F000
heap
page read and write
6C701000
unkown
page readonly
3B41000
heap
page read and write
7001000
unkown
page execute and read and write
C7D000
direct allocation
page read and write
C78000
heap
page read and write
18D000
stack
page read and write
340B000
direct allocation
page read and write
5C66000
heap
page read and write
6CE000
unkown
page read and write
43D6000
direct allocation
page read and write
2E9B000
heap
page read and write
30FC000
heap
page read and write
3479000
direct allocation
page read and write
3B41000
heap
page read and write
35D0000
direct allocation
page read and write
5C69000
heap
page read and write
4B7000
unkown
page write copy
3419000
direct allocation
page read and write
5C27000
heap
page read and write
30CF000
stack
page read and write
2640000
direct allocation
page read and write
7064000
unkown
page execute and read and write
6C71B000
unkown
page read and write
7F3000
heap
page read and write
2DC0000
direct allocation
page read and write
41BC000
stack
page read and write
CD4000
direct allocation
page read and write
90A000
heap
page read and write
2855000
heap
page read and write
6E0000
heap
page read and write
CCD000
direct allocation
page read and write
896000
heap
page read and write
6C107000
unkown
page read and write
2F00000
direct allocation
page read and write
820000
heap
page read and write
2DCF000
direct allocation
page read and write
3B30000
direct allocation
page execute and read and write
354C000
direct allocation
page read and write
3776000
direct allocation
page read and write
2212000
direct allocation
page read and write
E05000
heap
page read and write
2FB9000
direct allocation
page read and write
C8B000
direct allocation
page read and write
348C000
direct allocation
page read and write
94D000
heap
page read and write
312B000
heap
page read and write
362E000
stack
page read and write
5C3F000
heap
page read and write
5C57000
heap
page read and write
5C35000
heap
page read and write
372F000
direct allocation
page read and write
2EA3000
heap
page read and write
CBE000
stack
page read and write
2FEB000
direct allocation
page read and write
2278000
direct allocation
page read and write
4396000
direct allocation
page read and write
5C39000
heap
page read and write
2F90000
direct allocation
page read and write
34CA000
direct allocation
page read and write
3005000
direct allocation
page read and write
34AA000
direct allocation
page read and write
There are 1090 hidden memdumps, click here to show them.