IOC Report
Yeni sipari#U015fi onaylay#U0131n - TK176H,pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Yeni sipari#U015fi onaylay#U0131n - TK176H,pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Libraries\Eluiezilfw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\Eluiezilfw.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\wflizeiulE.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Eluiezilfw.exe">), ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\Eluiezilfwmdrgrdfrqpnwmurrnwnhm[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\Eluiezilfwmdrgrdfrqpnwmurrnwnhm[1]
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Yeni sipari#U015fi onaylay#U0131n - TK176H,pdf.exe
"C:\Users\user\Desktop\Yeni sipari#U015fi onaylay#U0131n - TK176H,pdf.exe"
malicious
C:\Windows\SysWOW64\logagent.exe
C:\Windows\System32\logagent.exe
malicious
C:\Users\Public\Libraries\Eluiezilfw.exe
"C:\Users\Public\Libraries\Eluiezilfw.exe"
malicious
C:\Users\Public\Libraries\Eluiezilfw.exe
"C:\Users\Public\Libraries\Eluiezilfw.exe"
malicious
C:\Windows\SysWOW64\logagent.exe
C:\Windows\System32\logagent.exe
malicious
C:\Windows\SysWOW64\DpiScaling.exe
C:\Windows\System32\DpiScaling.exe
malicious

URLs

Name
IP
Malicious
Pw`~hustlelord.ddns.net
malicious
https://cdn.discordapp.com/attachments/990482594137251863/990489253987360768/Eluiezilfwmdrgrdfrqpnwm
unknown
https://cdn.discordapp.com/
unknown
https://cdn.discordapp.com/.
unknown
https://cdn.discordapp.com/attachments/990482594137251863/990489253987360768/Eluiezilfwmdrgrdfrqpnwmurrnwnhm
162.159.130.233
https://cdn.discordapp.com/2y
unknown

Domains

Name
IP
Malicious
blessmyhustlelord.ddns.net
37.0.14.195
malicious
cdn.discordapp.com
162.159.130.233

IPs

IP
Domain
Country
Malicious
37.0.14.195
blessmyhustlelord.ddns.net
Netherlands
malicious
162.159.130.233
cdn.discordapp.com
United States
192.168.2.1
unknown
unknown
162.159.133.233
unknown
United States
162.159.134.233
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Eluiezilfw
HKEY_CURRENT_USER\Software\Remcos-MZPAVR
exepath
HKEY_CURRENT_USER\Software\Remcos-MZPAVR
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
4C00000
heap
page read and write
malicious
31A0000
direct allocation
page read and write
malicious
D80000
heap
page read and write
malicious
401000
unkown
page execute read
malicious
3760000
direct allocation
page read and write
malicious
3C4C000
direct allocation
page read and write
malicious
3610000
direct allocation
page read and write
malicious
31A0000
direct allocation
page read and write
malicious
10540000
remote allocation
page execute and read and write
malicious
10540000
remote allocation
page execute and read and write
malicious
401000
unkown
page execute read
malicious
10540000
remote allocation
page execute and read and write
malicious
401000
unkown
page execute read
malicious
7FDD0000
direct allocation
page read and write
malicious
7FD20000
direct allocation
page read and write
malicious
7FD20000
direct allocation
page read and write
malicious
31F0000
heap
page read and write
malicious
3050000
direct allocation
page read and write
malicious
3AEC000
direct allocation
page read and write
malicious
401000
unkown
page execute read
malicious
7FDD0000
direct allocation
page read and write
malicious
3968000
direct allocation
page read and write
malicious
7FD20000
direct allocation
page read and write
malicious
7FDD0000
direct allocation
page read and write
malicious
3AC8000
direct allocation
page read and write
malicious
401000
unkown
page execute read
malicious
3760000
direct allocation
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
400000
direct allocation
page execute and read and write
malicious
401000
unkown
page execute read
malicious
3C4C000
direct allocation
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
3AC8000
direct allocation
page read and write
malicious
940000
trusted library allocation
page read and write
10540000
direct allocation
page readonly
39BF000
stack
page read and write
3AA8000
direct allocation
page read and write
398C000
direct allocation
page read and write
30B0000
remote allocation
page execute and read and write
3908000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
21030F90000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
3AD0000
direct allocation
page read and write
3AAC000
direct allocation
page read and write
1F2647B000
stack
page read and write
1F865F02000
heap
page read and write
3AD0000
direct allocation
page read and write
2F77000
heap
page read and write
31A0000
heap
page read and write
256DB25F000
heap
page read and write
AAE000
stack
page read and write
3ACC000
direct allocation
page read and write
870000
remote allocation
page execute and read and write
3AE0000
direct allocation
page read and write
5F34C7B000
stack
page read and write
2EEF000
stack
page read and write
D80000
trusted library allocation
page read and write
3AD8000
direct allocation
page read and write
3AF8000
direct allocation
page read and write
196FC940000
trusted library allocation
page read and write
3A10000
remote allocation
page read and write
256DB267000
heap
page read and write
4B0000
unkown
page readonly
2318000
direct allocation
page read and write
3AEC000
direct allocation
page read and write
3934000
direct allocation
page read and write
255D000
stack
page read and write
D3E000
stack
page read and write
9BF000
stack
page read and write
23E8000
direct allocation
page read and write
3830000
direct allocation
page read and write
1E5F0010000
heap
page read and write
395C000
direct allocation
page read and write
4A4000
unkown
page write copy
3AC4000
direct allocation
page read and write
7C1000
heap
page read and write
970000
heap
page read and write
400000
unkown
page readonly
4B0000
unkown
page readonly
3AD0000
direct allocation
page read and write
5F34E7D000
stack
page read and write
1030000
trusted library allocation
page read and write
12D7C641000
heap
page read and write
30B0000
remote allocation
page execute and read and write
3AC8000
direct allocation
page read and write
1E5F0263000
heap
page read and write
AAE000
stack
page read and write
22CD000
stack
page read and write
241F000
direct allocation
page read and write
3AD0000
direct allocation
page readonly
3AC4000
direct allocation
page read and write
1E5F025F000
heap
page read and write
AB0000
heap
page read and write
3964000
direct allocation
page read and write
2102BA93000
heap
page read and write
19C000
stack
page read and write
1030000
trusted library allocation
page read and write
3070000
remote allocation
page execute and read and write
396C000
direct allocation
page read and write
3CE0000
direct allocation
page read and write
3AA8000
direct allocation
page read and write
3CA8000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
4AB000
unkown
page write copy
3ACC000
direct allocation
page read and write
196FC170000
heap
page read and write
313E000
stack
page read and write
2F4F000
stack
page read and write
38D0000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
978000
heap
page read and write
3970000
direct allocation
page read and write
1E5F0286000
heap
page read and write
BCE000
stack
page read and write
3C90000
direct allocation
page read and write
E9F000
stack
page read and write
3AD4000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
AAE000
stack
page read and write
3B20000
direct allocation
page read and write
2F70000
heap
page read and write
3CA0000
direct allocation
page read and write
12D7C613000
heap
page read and write
D3E000
stack
page read and write
3AA0000
direct allocation
page read and write
2B851D00000
heap
page read and write
4C00000
trusted library allocation
page read and write
AB0000
heap
page read and write
3A30000
direct allocation
page read and write
3C8C000
direct allocation
page read and write
2DAF000
stack
page read and write
2102C970000
trusted library section
page readonly
33AE000
stack
page read and write
21CDDE61000
heap
page read and write
D20000
unkown
page read and write
3ACC000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
5F34D7E000
stack
page read and write
39D0000
direct allocation
page read and write
990000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
3970000
direct allocation
page read and write
2102C113000
heap
page read and write
21030FA0000
trusted library allocation
page read and write
3600000
direct allocation
page read and write
3938000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
970000
heap
page read and write
3AD0000
direct allocation
page read and write
940000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
3A6C000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
8FE000
stack
page read and write
978000
heap
page read and write
29CA000
stack
page read and write
510000
unkown
page read and write
D80000
heap
page read and write
200D9EBE000
heap
page read and write
3970000
direct allocation
page read and write
3C94000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3AEC000
direct allocation
page read and write
3150000
heap
page read and write
30B0000
remote allocation
page execute and read and write
313E000
stack
page read and write
3AC4000
direct allocation
page read and write
3A64000
direct allocation
page read and write
23A8000
direct allocation
page read and write
3CE4000
direct allocation
page read and write
3A68000
direct allocation
page read and write
3964000
direct allocation
page read and write
3964000
direct allocation
page read and write
BCE000
stack
page read and write
136C4400000
heap
page read and write
3AB8000
direct allocation
page read and write
3AB4000
direct allocation
page read and write
3DA0000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
3AC8000
direct allocation
page read and write
396C000
direct allocation
page read and write
3CE4000
direct allocation
page read and write
2102C950000
trusted library section
page readonly
940000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
3CC0000
direct allocation
page read and write
31A0000
heap
page read and write
2F77000
heap
page read and write
2310000
heap
page read and write
33EE000
stack
page read and write
2443000
direct allocation
page read and write
2F4F000
stack
page read and write
1E5F027A000
heap
page read and write
850000
remote allocation
page execute and read and write
400000
unkown
page readonly
25B8000
direct allocation
page read and write
200D9EE5000
heap
page read and write
510000
unkown
page read and write
3AE4000
direct allocation
page read and write
3A98000
direct allocation
page read and write
319F000
stack
page read and write
31A8000
heap
page read and write
5F0000
remote allocation
page execute and read and write
3AA0000
direct allocation
page read and write
3150000
heap
page read and write
4C00000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
780000
heap
page read and write
395C000
direct allocation
page read and write
256DB24D000
heap
page read and write
3A30000
direct allocation
page read and write
31A0000
heap
page read and write
56F000
heap
page read and write
256DB200000
heap
page read and write
810000
remote allocation
page execute and read and write
940000
trusted library allocation
page read and write
394C000
direct allocation
page read and write
3A74000
direct allocation
page read and write
8FE000
stack
page read and write
3C88000
direct allocation
page read and write
3980000
direct allocation
page read and write
3A98000
direct allocation
page read and write
2103103D000
heap
page read and write
2426000
direct allocation
page read and write
3CA0000
direct allocation
page read and write
D3E000
stack
page read and write
D80000
trusted library allocation
page read and write
31A0000
heap
page read and write
390C000
direct allocation
page read and write
3070000
remote allocation
page execute and read and write
3AC8000
direct allocation
page read and write
3CA4000
direct allocation
page read and write
3960000
direct allocation
page read and write
210310E9000
heap
page read and write
3AC0000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
3C88000
direct allocation
page read and write
E9F000
stack
page read and write
3AF8000
direct allocation
page read and write
31A0000
heap
page read and write
9B0000
heap
page read and write
3F1BFFE000
stack
page read and write
1E5F026F000
heap
page read and write
2103106D000
heap
page read and write
3D56000
direct allocation
page read and write
319F000
stack
page read and write
3150000
heap
page read and write
2C8F000
stack
page read and write
3C9C000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
33EE000
stack
page read and write
3964000
direct allocation
page read and write
3970000
direct allocation
page read and write
3ADC000
direct allocation
page read and write
3C98000
direct allocation
page read and write
D20000
heap
page read and write
3ABC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
930000
remote allocation
page read and write
8B94A7C000
stack
page read and write
3B9C97D000
stack
page read and write
21CDDF00000
heap
page read and write
3AE0000
direct allocation
page read and write
2B6E000
stack
page read and write
2DBF000
stack
page read and write
2FAB000
trusted library allocation
page read and write
3978000
direct allocation
page read and write
C60000
trusted library allocation
page read and write
1D4FF1D5000
heap
page read and write
3CA4000
direct allocation
page read and write
3A30000
direct allocation
page read and write
4A4000
unkown
page read and write
8FE000
stack
page read and write
239E000
direct allocation
page read and write
7C0000
heap
page read and write
3A30000
direct allocation
page read and write
C0E000
stack
page read and write
3ACC000
direct allocation
page read and write
3CBC000
direct allocation
page read and write
510000
unkown
page read and write
4A9F000
stack
page read and write
3C9C000
direct allocation
page read and write
395C000
direct allocation
page read and write
CFE000
stack
page read and write
5F350F7000
stack
page read and write
DF0000
remote allocation
page read and write
D20000
unkown
page read and write
3F1BDFE000
stack
page read and write
3AE0000
direct allocation
page read and write
635000
heap
page read and write
31F0000
trusted library allocation
page read and write
3980000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
2102C840000
trusted library allocation
page read and write
10563000
remote allocation
page execute and read and write
3070000
remote allocation
page execute and read and write
940000
remote allocation
page execute and read and write
1F866712000
heap
page read and write
3ABC000
direct allocation
page read and write
3CB8000
direct allocation
page read and write
210310FA000
heap
page read and write
E9F000
stack
page read and write
3960000
direct allocation
page read and write
10541000
direct allocation
page execute read
3944000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
868000
heap
page read and write
2102C940000
trusted library section
page readonly
3970000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
2B851C13000
heap
page read and write
3AC4000
direct allocation
page read and write
3988000
direct allocation
page read and write
51D000
heap
page read and write
3A70000
direct allocation
page read and write
256DB25A000
heap
page read and write
3C88000
direct allocation
page read and write
21CDDE62000
heap
page read and write
1F865D80000
heap
page read and write
7B5000
heap
page read and write
21CDDE49000
heap
page read and write
3AC8000
direct allocation
page read and write
3978000
direct allocation
page read and write
8CC88FE000
stack
page read and write
3C88000
direct allocation
page read and write
3CB4000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
21030FD0000
remote allocation
page read and write
3AB8000
direct allocation
page read and write
93F000
stack
page read and write
6A0000
trusted library allocation
page read and write
AAE000
stack
page read and write
2B851D09000
heap
page read and write
3AA4000
direct allocation
page read and write
2102BA79000
heap
page read and write
313E000
stack
page read and write
3998000
direct allocation
page read and write
3A70000
direct allocation
page read and write
25C3000
heap
page read and write
3974000
direct allocation
page read and write
3A60000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
1F25EAC000
stack
page read and write
33EE000
stack
page read and write
3AC0000
direct allocation
page read and write
3CB0000
direct allocation
page read and write
38D0000
direct allocation
page read and write
319F000
stack
page read and write
19C000
stack
page read and write
3D40000
trusted library allocation
page read and write
3CAC000
direct allocation
page read and write
3AD8000
direct allocation
page read and write
1D4FEE30000
heap
page read and write
3960000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
93F000
stack
page read and write
136C445C000
heap
page read and write
8FE000
stack
page read and write
2358000
direct allocation
page read and write
3A70000
direct allocation
page read and write
21030E78000
trusted library allocation
page read and write
C4E000
stack
page read and write
395C000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
31F0000
trusted library allocation
page read and write
3AD4000
direct allocation
page read and write
200D9E00000
heap
page read and write
313E000
stack
page read and write
2410000
direct allocation
page read and write
3970000
direct allocation
page read and write
3D0C000
direct allocation
page read and write
2FAF000
unkown
page read and write
1F865E67000
heap
page read and write
3980000
direct allocation
page read and write
2102B9F0000
trusted library section
page read and write
3AA0000
direct allocation
page read and write
DF0000
remote allocation
page read and write
200DA602000
trusted library allocation
page read and write
3964000
direct allocation
page read and write
12D7C682000
heap
page read and write
396C000
direct allocation
page read and write
860000
unkown
page read and write
49699FB000
stack
page read and write
3964000
direct allocation
page read and write
E4009FA000
stack
page read and write
1F26577000
stack
page read and write
7C1000
heap
page read and write
3AE0000
direct allocation
page read and write
1F865D10000
heap
page read and write
31F0000
trusted library allocation
page read and write
850000
remote allocation
page execute and read and write
3A70000
direct allocation
page read and write
1E5F0A02000
trusted library allocation
page read and write
C00000
remote allocation
page execute and read and write
33AE000
stack
page read and write
30D0000
remote allocation
page execute and read and write
8B94979000
stack
page read and write
AB0000
heap
page read and write
3A6C000
direct allocation
page read and write
397C000
direct allocation
page read and write
2A7D000
stack
page read and write
3AD4000
direct allocation
page read and write
2434000
direct allocation
page read and write
1E5F0298000
heap
page read and write
BCE000
stack
page read and write
E9F000
stack
page read and write
21030FD0000
remote allocation
page read and write
5F34CFE000
stack
page read and write
3ABC000
direct allocation
page read and write
3950000
direct allocation
page read and write
D3E000
stack
page read and write
3A30000
direct allocation
page read and write
18052EB000
stack
page read and write
4C00000
trusted library allocation
page read and write
2370000
heap
page read and write
3A30000
direct allocation
page read and write
136C4360000
heap
page read and write
3C88000
direct allocation
page read and write
3A98000
direct allocation
page read and write
3C98000
direct allocation
page read and write
940000
remote allocation
page execute and read and write
3AD0000
direct allocation
page read and write
5F34EFE000
stack
page read and write
4969AFD000
stack
page read and write
D3E000
stack
page read and write
3C88000
direct allocation
page read and write
3ADC000
direct allocation
page read and write
303F000
stack
page read and write
797000
heap
page read and write
12D7C600000
heap
page read and write
319F000
stack
page read and write
BCE000
stack
page read and write
390C000
direct allocation
page read and write
3948000
direct allocation
page read and write
93F000
stack
page read and write
3CA0000
direct allocation
page read and write
1F865EE0000
heap
page read and write
3A64000
direct allocation
page read and write
3968000
direct allocation
page read and write
1D4FEFB7000
heap
page read and write
3AD8000
direct allocation
page read and write
C4E000
stack
page read and write
395C000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
33EE000
stack
page read and write
2102BA3D000
heap
page read and write
21030FC0000
trusted library allocation
page read and write
3A9C000
direct allocation
page read and write
2633000
heap
page read and write
8CC7F0C000
stack
page read and write
10540000
remote allocation
page execute and read and write
196FC229000
heap
page read and write
3AC0000
direct allocation
page read and write
398C000
direct allocation
page read and write
31F0000
trusted library allocation
page read and write
3AD4000
direct allocation
page read and write
C4E000
stack
page read and write
850000
remote allocation
page execute and read and write
3AA8000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
3908000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
38D0000
direct allocation
page read and write
3C88000
direct allocation
page read and write
1E5F027B000
heap
page read and write
594000
heap
page read and write
2F77000
heap
page read and write
3AA0000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3AB8000
direct allocation
page read and write
393C000
direct allocation
page read and write
930000
remote allocation
page read and write
8FE000
stack
page read and write
3AA4000
direct allocation
page read and write
3974000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3978000
direct allocation
page read and write
1805C7F000
stack
page read and write
400000
unkown
page readonly
196FC302000
heap
page read and write
85D000
heap
page read and write
3AF8000
direct allocation
page read and write
3D56000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
12D7C67B000
heap
page read and write
1E5F0232000
heap
page read and write
33AE000
stack
page read and write
2F0E000
stack
page read and write
38D0000
direct allocation
page read and write
1F865E44000
heap
page read and write
1000000
remote allocation
page execute and read and write
33AE000
stack
page read and write
1805BFB000
stack
page read and write
1F865E13000
heap
page read and write
3D90000
trusted library allocation
page read and write
3A74000
direct allocation
page read and write
860000
unkown
page read and write
1000000
remote allocation
page execute and read and write
2F70000
heap
page read and write
C4E000
stack
page read and write
970000
heap
page read and write
870000
remote allocation
page execute and read and write
200D9EB3000
heap
page read and write
3150000
heap
page read and write
31A0000
heap
page read and write
3954000
direct allocation
page read and write
5F352FA000
stack
page read and write
3AC4000
direct allocation
page read and write
CFE000
stack
page read and write
1805F7A000
stack
page read and write
3168000
direct allocation
page read and write
3C88000
direct allocation
page read and write
395C000
direct allocation
page read and write
2102C002000
heap
page read and write
3C1C000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
1F866602000
heap
page read and write
1E5F027D000
heap
page read and write
3AE0000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
3AC0000
direct allocation
page read and write
21CDDE4B000
heap
page read and write
2F77000
heap
page read and write
E4004FC000
stack
page read and write
3AC0000
direct allocation
page read and write
31A8000
heap
page read and write
930000
remote allocation
page read and write
3980000
direct allocation
page read and write
400000
unkown
page readonly
AB0000
heap
page read and write
3AC4000
direct allocation
page read and write
D3E000
stack
page read and write
319F000
stack
page read and write
3AC0000
direct allocation
page read and write
2B851C67000
heap
page read and write
21CDDC10000
heap
page read and write
12D7C628000
heap
page read and write
3AD0000
direct allocation
page read and write
978000
heap
page read and write
C4E000
stack
page read and write
3A30000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
4B1F000
stack
page read and write
978000
heap
page read and write
31A0000
heap
page read and write
1E5F0241000
heap
page read and write
AAE000
stack
page read and write
3AF8000
direct allocation
page read and write
3AF8000
direct allocation
page read and write
2F0F000
stack
page read and write
3964000
direct allocation
page read and write
BCE000
stack
page read and write
810000
remote allocation
page execute and read and write
178E9FB000
stack
page read and write
3AD0000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3AD8000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3A30000
direct allocation
page read and write
196FC200000
heap
page read and write
3C31000
direct allocation
page execute read
21030E91000
trusted library allocation
page read and write
31A8000
heap
page read and write
33EE000
stack
page read and write
3AD0000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
390C000
direct allocation
page read and write
3D04000
direct allocation
page read and write
39BF000
stack
page read and write
3AC0000
direct allocation
page read and write
4A4000
unkown
page write copy
3AE4000
direct allocation
page read and write
8B945EF000
stack
page read and write
396C000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
23C9000
direct allocation
page read and write
5E0000
remote allocation
page read and write
3AD0000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
31A0000
heap
page read and write
3940000
direct allocation
page read and write
4A5E000
stack
page read and write
1E5F0070000
heap
page read and write
2343000
direct allocation
page read and write
256DB213000
heap
page read and write
3AC4000
direct allocation
page read and write
23D4000
direct allocation
page read and write
3ADC000
direct allocation
page read and write
2103104A000
heap
page read and write
3AD8000
direct allocation
page read and write
259D000
stack
page read and write
3AE0000
direct allocation
page read and write
3980000
direct allocation
page read and write
8CC827D000
stack
page read and write
2102BA9F000
heap
page read and write
3AC4000
direct allocation
page read and write
3DA0000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
2B851C68000
heap
page read and write
4969BFE000
stack
page read and write
3AD8000
direct allocation
page read and write
3A60000
direct allocation
page read and write
397C000
direct allocation
page read and write
21030CD0000
trusted library allocation
page read and write
2102CCD0000
trusted library allocation
page read and write
3AAC000
direct allocation
page read and write
2103101A000
heap
page read and write
200D9EE1000
heap
page read and write
2B851C29000
heap
page read and write
21031061000
heap
page read and write
3C98000
direct allocation
page read and write
38D0000
direct allocation
page read and write
398C000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
1F0000
trusted library allocation
page read and write
D80000
heap
page read and write
C0E000
stack
page read and write
978000
heap
page read and write
3070000
remote allocation
page execute and read and write
2630000
heap
page read and write
3AA0000
direct allocation
page read and write
2102BA75000
heap
page read and write
3968000
direct allocation
page read and write
319F000
stack
page read and write
2102CCC3000
trusted library allocation
page read and write
3AB4000
direct allocation
page read and write
23DC000
direct allocation
page read and write
1E5F0000000
heap
page read and write
3AA0000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
2102C118000
heap
page read and write
3958000
direct allocation
page read and write
3CBC000
direct allocation
page read and write
210310F6000
heap
page read and write
3AB4000
direct allocation
page read and write
3938000
direct allocation
page read and write
E9F000
stack
page read and write
3AEC000
direct allocation
page read and write
12D7C4E0000
heap
page read and write
56E000
stack
page read and write
38D0000
direct allocation
page read and write
21030E90000
trusted library allocation
page read and write
4969DFF000
stack
page read and write
93F000
stack
page read and write
4C00000
trusted library allocation
page read and write
970000
heap
page read and write
7FD000
heap
page read and write
1F865E00000
heap
page read and write
396C000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
2B851D13000
heap
page read and write
978000
heap
page read and write
940000
remote allocation
page execute and read and write
3ADC000
direct allocation
page read and write
D20000
unkown
page read and write
3830000
direct allocation
page read and write
2F4F000
stack
page read and write
F3F57D000
stack
page read and write
3910000
direct allocation
page read and write
970000
heap
page read and write
D80000
trusted library allocation
page read and write
7C1000
heap
page read and write
200DA717000
trusted library allocation
page read and write
3ABC000
direct allocation
page read and write
2F77000
heap
page read and write
87D000
heap
page read and write
3A9C000
direct allocation
page read and write
397C000
direct allocation
page read and write
940000
trusted library allocation
page read and write
136C446B000
heap
page read and write
AAE000
stack
page read and write
396C000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
1805DFF000
stack
page read and write
10540000
direct allocation
page readonly
3AA0000
direct allocation
page read and write
18058F9000
stack
page read and write
1030000
trusted library allocation
page read and write
200DA74D000
trusted library allocation
page read and write
3150000
heap
page read and write
395C000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
884000
heap
page read and write
C4E000
stack
page read and write
3AB0000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
38BE000
stack
page read and write
AB0000
heap
page read and write
93F000
stack
page read and write
D80000
trusted library allocation
page read and write
3AD8000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
1E5F0200000
heap
page read and write
3ABC000
direct allocation
page read and write
1F865DB0000
trusted library allocation
page read and write
A2F000
stack
page read and write
2EC0000
trusted library allocation
page read and write
136C4502000
heap
page read and write
5E0000
remote allocation
page read and write
12D7C700000
heap
page read and write
E9F000
stack
page read and write
21CDDF13000
heap
page read and write
313E000
stack
page read and write
D80000
heap
page read and write
3ADC000
direct allocation
page read and write
3A68000
direct allocation
page read and write
200D9EF4000
heap
page read and write
3AC4000
direct allocation
page read and write
970000
heap
page read and write
2F70000
heap
page read and write
2F4F000
stack
page read and write
2F77000
heap
page read and write
21CDDE00000
heap
page read and write
940000
trusted library allocation
page read and write
930000
remote allocation
page read and write
3AD0000
direct allocation
page read and write
3A30000
direct allocation
page read and write
231F000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
136C4451000
heap
page read and write
136C42F0000
heap
page read and write
3CB8000
direct allocation
page read and write
2FA7000
trusted library allocation
page read and write
2458000
direct allocation
page read and write
8CC7F8E000
stack
page read and write
BCE000
stack
page read and write
31A8000
heap
page read and write
3C98000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
21030FB0000
trusted library allocation
page read and write
3AC0000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
210310DF000
heap
page read and write
395C000
direct allocation
page read and write
395C000
direct allocation
page read and write
3A30000
direct allocation
page read and write
8CC84FE000
stack
page read and write
3AD0000
direct allocation
page read and write
1E5F023E000
heap
page read and write
3968000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
178E7FB000
stack
page read and write
9A0000
trusted library allocation
page read and write
3968000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
136C4413000
heap
page read and write
3A70000
direct allocation
page read and write
12D7C713000
heap
page read and write
31A8000
heap
page read and write
3830000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
93F000
stack
page read and write
200D9E13000
heap
page read and write
3960000
direct allocation
page read and write
3830000
direct allocation
page read and write
3AAC000
direct allocation
page read and write
2F4F000
stack
page read and write
3A68000
direct allocation
page read and write
1E5F0229000
heap
page read and write
319F000
stack
page read and write
3988000
direct allocation
page read and write
395C000
direct allocation
page read and write
31F0000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
C4E000
stack
page read and write
3AC0000
direct allocation
page read and write
3A98000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
970000
remote allocation
page execute and read and write
970000
heap
page read and write
319F000
stack
page read and write
395C000
direct allocation
page read and write
3A64000
direct allocation
page read and write
3940000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
3900000
direct allocation
page read and write
247D000
stack
page read and write
3ABC000
direct allocation
page read and write
3CAC000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
394C000
direct allocation
page read and write
3860000
direct allocation
page read and write
2F0E000
stack
page read and write
3A64000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
4D0E000
stack
page read and write
31F0000
trusted library allocation
page read and write
3A6C000
direct allocation
page read and write
BCE000
stack
page read and write
3AD4000
direct allocation
page read and write
33EE000
stack
page read and write
18061FF000
stack
page read and write
12D7C602000
heap
page read and write
21031020000
heap
page read and write
DF0000
remote allocation
page read and write
3AD8000
direct allocation
page read and write
3A6C000
direct allocation
page read and write
3CD4000
direct allocation
page read and write
3C4E000
direct allocation
page read and write
3AA0000
direct allocation
page read and write
21CDDE64000
heap
page read and write
41D000
direct allocation
page execute and read and write
390C000
direct allocation
page read and write
21032000000
heap
page read and write
395C000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
2102B7B0000
heap
page read and write
23DE000
direct allocation
page read and write
33EE000
stack
page read and write
970000
heap
page read and write
3AC0000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
3D58000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
21CDDE4E000
heap
page read and write
3ABC000
direct allocation
page read and write
D7E000
stack
page read and write
2A2E000
stack
page read and write
22E8000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
232A000
direct allocation
page read and write
3968000
direct allocation
page read and write
38D0000
direct allocation
page read and write
4C00000
trusted library allocation
page read and write
21CDDC80000
heap
page read and write
4AB000
unkown
page write copy
3958000
direct allocation
page read and write
31A8000
heap
page read and write
3AC4000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
3964000
direct allocation
page read and write
3948000
direct allocation
page read and write
3AAC000
direct allocation
page read and write
31A8000
heap
page read and write
3A30000
direct allocation
page read and write
E400CFF000
stack
page read and write
2B7A000
stack
page read and write
8B948F9000
stack
page read and write
940000
remote allocation
page execute and read and write
30B0000
remote allocation
page execute and read and write
3A64000
direct allocation
page read and write
200D9E7E000
heap
page read and write
3AB0000
direct allocation
page read and write
3A94000
direct allocation
page read and write
863000
heap
page read and write
12D7CE02000
trusted library allocation
page read and write
3AC4000
direct allocation
page read and write
395C000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
22DE000
direct allocation
page read and write
1E5F0225000
heap
page read and write
3904000
direct allocation
page read and write
2102BA13000
heap
page read and write
3A6C000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3AA8000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3944000
direct allocation
page read and write
AAE000
stack
page read and write
1F865EBD000
heap
page read and write
F3FA7F000
stack
page read and write
510000
unkown
page read and write
3AE0000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
395C000
direct allocation
page read and write
1D4FEFB1000
heap
page read and write
3970000
direct allocation
page read and write
21030FD0000
trusted library allocation
page read and write
D7E000
stack
page read and write
2450000
heap
page read and write
256DB25D000
heap
page read and write
21CDDE29000
heap
page read and write
970000
heap
page read and write
395C000
direct allocation
page read and write
59F000
heap
page read and write
8CC87FE000
stack
page read and write
3181000
direct allocation
page execute read
3ABC000
direct allocation
page read and write
8B9456A000
stack
page read and write
2DFE000
stack
page read and write
5F0000
remote allocation
page execute and read and write
1F865E29000
heap
page read and write
2B851A60000
heap
page read and write
3ABC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
33AE000
stack
page read and write
21CDDC20000
heap
page read and write
3968000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3988000
direct allocation
page read and write
3CA8000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
3ADC000
direct allocation
page read and write
F3FC7E000
stack
page read and write
3B9C6FD000
stack
page read and write
3970000
direct allocation
page read and write
4B0000
unkown
page readonly
396C000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
3150000
heap
page read and write
3ABC000
direct allocation
page read and write
3CA0000
direct allocation
page read and write
21030EB4000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
33AE000
stack
page read and write
1805D7F000
stack
page read and write
396C000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3968000
direct allocation
page read and write
3AEC000
direct allocation
page read and write
3964000
direct allocation
page read and write
2F77000
heap
page read and write
3ADC000
direct allocation
page read and write
3CA0000
direct allocation
page read and write
3974000
direct allocation
page read and write
3AE8000
direct allocation
page read and write
256DB170000
trusted library allocation
page read and write
3D78000
direct allocation
page read and write
200D9D50000
trusted library allocation
page read and write
1000000
remote allocation
page execute and read and write
3AC0000
direct allocation
page read and write
21030E70000
trusted library allocation
page read and write
395C000
direct allocation
page read and write
136C4429000
heap
page read and write
AB0000
heap
page read and write
31A0000
heap
page read and write
3968000
direct allocation
page read and write
3950000
direct allocation
page read and write
2240000
direct allocation
page execute and read and write
3AD4000
direct allocation
page read and write
D20000
unkown
page read and write
3980000
direct allocation
page read and write
200D9E70000
heap
page read and write
3CE8000
direct allocation
page read and write
3AE4000
direct allocation
page read and write
1E5F026C000
heap
page read and write
3A30000
direct allocation
page read and write
23E0000
direct allocation
page read and write
1F865F13000
heap
page read and write
38D0000
direct allocation
page read and write
31F0000
trusted library allocation
page read and write
23FB000
direct allocation
page read and write
AB0000
heap
page read and write
93F000
stack
page read and write
21030D50000
trusted library allocation
page read and write
1000000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3910000
direct allocation
page read and write
1E5F0269000
heap
page read and write
196FCA02000
trusted library allocation
page read and write
F3EF0B000
stack
page read and write
AB0000
heap
page read and write
2210000
heap
page read and write
570000
heap
page read and write
397C000
direct allocation
page read and write
196FC970000
remote allocation
page read and write
3AC4000
direct allocation
page read and write
2CAE000
stack
page read and write
AAE000
stack
page read and write
3AEC000
direct allocation
page read and write
930000
remote allocation
page read and write
3AC4000
direct allocation
page read and write
2F70000
heap
page read and write
3B30000
direct allocation
page read and write
3181000
direct allocation
page execute read
C00000
remote allocation
page execute and read and write
2FA9000
trusted library allocation
page read and write
3AE0000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
8FE000
stack
page read and write
3AD0000
direct allocation
page read and write
D80000
heap
page read and write
200DA791000
trusted library allocation
page read and write
2102BA00000
heap
page read and write
3ABC000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
3AEC000
direct allocation
page read and write
D85000
heap
page read and write
2F3E000
stack
page read and write
1F2667F000
stack
page read and write
3195000
direct allocation
page read and write
328A000
stack
page read and write
1F262FB000
stack
page read and write
3AC8000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
3ABC000
direct allocation
page read and write
CFE000
stack
page read and write
3A30000
direct allocation
page read and write
22E0000
direct allocation
page read and write
3B9C4FE000
stack
page read and write
3AA8000
direct allocation
page read and write
38D0000
direct allocation
page read and write
D20000
unkown
page read and write
3980000
direct allocation
page read and write
232D000
direct allocation
page read and write
12D7C540000
heap
page read and write
33AE000
stack
page read and write
3AD8000
direct allocation
page read and write
136C4455000
heap
page read and write
4C00000
trusted library allocation
page read and write
3964000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
316C000
stack
page read and write
3CC4000
direct allocation
page read and write
256DB28E000
heap
page read and write
2451000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
5F0000
remote allocation
page execute and read and write
2102C100000
heap
page read and write
3910000
direct allocation
page read and write
2102C118000
heap
page read and write
3978000
direct allocation
page read and write
730000
heap
page read and write
BCE000
stack
page read and write
8FE000
stack
page read and write
256DB313000
heap
page read and write
3ABC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
C0E000
stack
page read and write
3AA8000
direct allocation
page read and write
3A10000
remote allocation
page read and write
3A64000
direct allocation
page read and write
4FA000
heap
page read and write
3710000
direct allocation
page read and write
3F1B9CE000
stack
page read and write
59B000
heap
page read and write
DCE000
stack
page read and write
BCE000
stack
page read and write
313E000
stack
page read and write
3AC8000
direct allocation
page read and write
3A30000
direct allocation
page read and write
32DD000
stack
page read and write
3A68000
direct allocation
page read and write
7B5000
heap
page read and write
3C30000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
239C000
direct allocation
page read and write
3A64000
direct allocation
page read and write
3950000
direct allocation
page read and write
630000
heap
page read and write
3150000
heap
page read and write
3ABC000
direct allocation
page read and write
3150000
heap
page read and write
2351000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
396C000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
F3F97F000
stack
page read and write
256DB22F000
heap
page read and write
3960000
direct allocation
page read and write
7BC000
heap
page read and write
6B0000
direct allocation
page execute and read and write
25B5000
direct allocation
page read and write
4ADE000
stack
page read and write
C0E000
stack
page read and write
3AC0000
direct allocation
page read and write
F3F37B000
stack
page read and write
1030000
trusted library allocation
page read and write
21CDDE4D000
heap
page read and write
3974000
direct allocation
page read and write
4AC000
unkown
page write copy
30000
heap
page read and write
2F0E000
stack
page read and write
3750000
direct allocation
page read and write
3CC0000
direct allocation
page read and write
F3F87F000
stack
page read and write
2309000
direct allocation
page read and write
21CDDE4C000
heap
page read and write
810000
remote allocation
page execute and read and write
31EF000
stack
page read and write
E0D000
stack
page read and write
3ACC000
direct allocation
page read and write
7C8000
heap
page read and write
200DA700000
trusted library allocation
page read and write
3830000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3AE4000
direct allocation
page read and write
940000
remote allocation
page execute and read and write
196FC180000
heap
page read and write
136C4513000
heap
page read and write
3CA4000
direct allocation
page read and write
3AEC000
direct allocation
page read and write
31A8000
heap
page read and write
3948000
direct allocation
page read and write
3960000
direct allocation
page read and write
1E5F0233000
heap
page read and write
510000
unkown
page read and write
3AD0000
direct allocation
page read and write
200D9E3C000
heap
page read and write
3AD8000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
395C000
direct allocation
page read and write
86F000
heap
page read and write
3C88000
direct allocation
page read and write
3860000
direct allocation
page read and write
178E8FE000
stack
page read and write
3ACC000
direct allocation
page read and write
396C000
direct allocation
page read and write
397C000
direct allocation
page read and write
978000
heap
page read and write
1F0000
trusted library allocation
page read and write
3AA4000
direct allocation
page read and write
AB0000
heap
page read and write
88A000
heap
page read and write
3AC8000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
136C446F000
heap
page read and write
3AB0000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
940000
trusted library allocation
page read and write
38D0000
direct allocation
page read and write
978000
heap
page read and write
3CC8000
direct allocation
page read and write
3960000
direct allocation
page read and write
940000
remote allocation
page execute and read and write
1E5F0248000
heap
page read and write
22DC000
direct allocation
page read and write
31AE000
stack
page read and write
210310AC000
heap
page read and write
256DB25C000
heap
page read and write
8FE000
stack
page read and write
3CB0000
direct allocation
page read and write
3904000
direct allocation
page read and write
319F000
stack
page read and write
3A68000
direct allocation
page read and write
3AA8000
direct allocation
page read and write
2403000
direct allocation
page read and write
77E000
stack
page read and write
E9F000
stack
page read and write
395C000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
D80000
trusted library allocation
page read and write
25A1000
direct allocation
page execute read
3C80000
direct allocation
page read and write
196FC213000
heap
page read and write
3ADC000
direct allocation
page read and write
81F000
heap
page read and write
22DE000
stack
page read and write
3ABC000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
2FA9000
trusted library allocation
page read and write
3AD0000
direct allocation
page read and write
850000
remote allocation
page execute and read and write
3ABC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3948000
direct allocation
page read and write
CFE000
stack
page read and write
1805CFF000
stack
page read and write
2217000
heap
page read and write
3A30000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3904000
direct allocation
page read and write
4C00000
trusted library allocation
page read and write
3CDC000
direct allocation
page read and write
860000
unkown
page read and write
5BD000
heap
page read and write
3CA8000
direct allocation
page read and write
650000
heap
page read and write
2102C015000
heap
page read and write
3964000
direct allocation
page read and write
2CCE000
stack
page read and write
3964000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
256DB281000
heap
page read and write
1030000
trusted library allocation
page read and write
3AD4000
direct allocation
page read and write
21CDDF02000
heap
page read and write
313E000
stack
page read and write
2F70000
heap
page read and write
3AB0000
direct allocation
page read and write
3AB8000
direct allocation
page read and write
2B2F000
stack
page read and write
3A70000
direct allocation
page read and write
3948000
direct allocation
page read and write
D86000
heap
page read and write
3A98000
direct allocation
page read and write
2F70000
heap
page read and write
3AE8000
direct allocation
page read and write
2334000
direct allocation
page read and write
810000
remote allocation
page execute and read and write
73A000
heap
page read and write
31F0000
trusted library allocation
page read and write
98000
stack
page read and write
3ADC000
direct allocation
page read and write
30B0000
remote allocation
page execute and read and write
3A30000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
7E2000
heap
page read and write
3AC4000
direct allocation
page read and write
23A0000
direct allocation
page read and write
3998000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
10540000
remote allocation
page execute and read and write
3940000
direct allocation
page read and write
2F4F000
stack
page read and write
22D7000
heap
page read and write
1E5F0271000
heap
page read and write
810000
remote allocation
page execute and read and write
396C000
direct allocation
page read and write
395C000
direct allocation
page read and write
3964000
direct allocation
page read and write
2302000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
3AC8000
direct allocation
page read and write
12D7C4D0000
heap
page read and write
3ACC000
direct allocation
page read and write
3ADC000
direct allocation
page read and write
1E5F0277000
heap
page read and write
AAD000
stack
page read and write
3AD8000
direct allocation
page read and write
255F000
stack
page read and write
244A000
direct allocation
page read and write
3968000
direct allocation
page read and write
2394000
direct allocation
page read and write
860000
unkown
page read and write
870000
remote allocation
page execute and read and write
259D000
stack
page read and write
3950000
direct allocation
page read and write
3830000
direct allocation
page read and write
49697FE000
stack
page read and write
2B851C80000
heap
page read and write
2CBE000
stack
page read and write
3964000
direct allocation
page read and write
3970000
direct allocation
page read and write
1E5F0170000
trusted library allocation
page read and write
23D0000
direct allocation
page read and write
810000
remote allocation
page execute and read and write
AB0000
heap
page read and write
379E000
stack
page read and write
2102B9E0000
trusted library allocation
page read and write
3CB4000
direct allocation
page read and write
2310000
direct allocation
page read and write
F3F77D000
stack
page read and write
5FE000
stack
page read and write
3A9C000
direct allocation
page read and write
3B9C47E000
stack
page read and write
3AE0000
direct allocation
page read and write
655000
heap
page read and write
2102BA26000
heap
page read and write
23F4000
direct allocation
page read and write
3A30000
direct allocation
page read and write
8CC86FC000
stack
page read and write
510000
unkown
page read and write
21030D60000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
3908000
direct allocation
page read and write
313E000
stack
page read and write
970000
remote allocation
page execute and read and write
256DB264000
heap
page read and write
2F4F000
stack
page read and write
33EE000
stack
page read and write
3CD0000
direct allocation
page read and write
2DEE000
stack
page read and write
3B9BFEB000
stack
page read and write
940000
remote allocation
page execute and read and write
38BE000
stack
page read and write
2102BA29000
heap
page read and write
3760000
remote allocation
page read and write
1030000
trusted library allocation
page read and write
3AC0000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3AB8000
direct allocation
page read and write
200D9BF0000
heap
page read and write
93E000
stack
page read and write
496957C000
stack
page read and write
395C000
direct allocation
page read and write
AB0000
heap
page read and write
3CBC000
direct allocation
page read and write
393C000
direct allocation
page read and write
3950000
direct allocation
page read and write
D80000
heap
page read and write
3CA4000
direct allocation
page read and write
3960000
direct allocation
page read and write
2326000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
1F865ECE000
heap
page read and write
3F1B94B000
stack
page read and write
3964000
direct allocation
page read and write
3960000
direct allocation
page read and write
3195000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
860000
unkown
page read and write
256DBA02000
trusted library allocation
page read and write
3AC4000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
21030EB0000
trusted library allocation
page read and write
31A0000
heap
page read and write
8FE000
stack
page read and write
1030000
trusted library allocation
page read and write
3830000
direct allocation
page read and write
21030E70000
trusted library allocation
page read and write
BCE000
stack
page read and write
3ABC000
direct allocation
page read and write
3C40000
direct allocation
page read and write
510000
unkown
page read and write
3968000
direct allocation
page read and write
21CDDF08000
heap
page read and write
38D0000
direct allocation
page read and write
940000
trusted library allocation
page read and write
3980000
direct allocation
page read and write
2F77000
unkown
page read and write
C00000
remote allocation
page execute and read and write
396C000
direct allocation
page read and write
F3FB7E000
stack
page read and write
2220000
trusted library allocation
page read and write
12D7C570000
trusted library allocation
page read and write
3ABC000
direct allocation
page read and write
196FC202000
heap
page read and write
23DF000
direct allocation
page read and write
D20000
unkown
page read and write
D3E000
stack
page read and write
3978000
direct allocation
page read and write
12D7C66A000
heap
page read and write
3998000
direct allocation
page read and write
318D000
stack
page read and write
3ABC000
direct allocation
page read and write
3968000
direct allocation
page read and write
33AE000
stack
page read and write
3A30000
direct allocation
page read and write
AB0000
heap
page read and write
398C000
direct allocation
page read and write
3AD8000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
3C4E000
direct allocation
page read and write
C0E000
stack
page read and write
1000000
remote allocation
page execute and read and write
3AC8000
direct allocation
page read and write
1E5F026B000
heap
page read and write
1805E7F000
stack
page read and write
8CC85F7000
stack
page read and write
3070000
remote allocation
page execute and read and write
21CDDE66000
heap
page read and write
AAE000
stack
page read and write
3C90000
direct allocation
page read and write
3A68000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3960000
direct allocation
page read and write
243C000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
397C000
direct allocation
page read and write
4AB000
unkown
page write copy
395C000
direct allocation
page read and write
3A10000
remote allocation
page read and write
3AB4000
direct allocation
page read and write
3C18000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
3750000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
400000
unkown
page readonly
1D4FEF80000
heap
page read and write
93F000
stack
page read and write
3AC4000
direct allocation
page read and write
303F000
stack
page read and write
10563000
remote allocation
page execute and read and write
31A8000
heap
page read and write
8CC847B000
stack
page read and write
3AE8000
direct allocation
page read and write
3A30000
direct allocation
page read and write
41D000
direct allocation
page execute and read and write
3AC4000
direct allocation
page read and write
30DC000
stack
page read and write
C00000
remote allocation
page execute and read and write
256DB0D0000
heap
page read and write
3D24000
direct allocation
page read and write
4A1E000
stack
page read and write
31A0000
heap
page read and write
860000
unkown
page read and write
3C98000
direct allocation
page read and write
970000
heap
page read and write
2B851C51000
heap
page read and write
3CB8000
direct allocation
page read and write
3960000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
970000
heap
page read and write
21CDE602000
trusted library allocation
page read and write
3AD8000
direct allocation
page read and write
3964000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
36E0000
direct allocation
page read and write
970000
remote allocation
page execute and read and write
3970000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
2F4F000
stack
page read and write
2102BAB4000
heap
page read and write
3A30000
direct allocation
page read and write
3970000
direct allocation
page read and write
3910000
direct allocation
page read and write
36E0000
direct allocation
page read and write
200D9F13000
heap
page read and write
850000
remote allocation
page execute and read and write
8CC837C000
stack
page read and write
200DA750000
trusted library allocation
page read and write
3AD8000
direct allocation
page read and write
3964000
direct allocation
page read and write
990000
remote allocation
page execute and read and write
3F1BEFE000
stack
page read and write
319F000
stack
page read and write
2418000
direct allocation
page read and write
3AA8000
direct allocation
page read and write
3CA8000
direct allocation
page read and write
256DB308000
heap
page read and write
3AD8000
direct allocation
page read and write
3CC8000
direct allocation
page read and write
93F000
stack
page read and write
3150000
heap
page read and write
3A6C000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
87C000
stack
page read and write
3974000
direct allocation
page read and write
3CCC000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
1000000
remote allocation
page execute and read and write
41D000
direct allocation
page execute and read and write
3AC8000
direct allocation
page read and write
3974000
direct allocation
page read and write
3A10000
remote allocation
page read and write
3AE0000
direct allocation
page read and write
390C000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
38D0000
direct allocation
page read and write
4F0000
heap
page read and write
1F25F2E000
stack
page read and write
312D000
stack
page read and write
3ABC000
direct allocation
page read and write
2230000
heap
page read and write
3198000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
3A30000
direct allocation
page read and write
3CEC000
direct allocation
page read and write
3CA8000
direct allocation
page read and write
4C00000
trusted library allocation
page read and write
3970000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
860000
unkown
page read and write
3AC4000
direct allocation
page read and write
940000
trusted library allocation
page read and write
136C4402000
heap
page read and write
33EE000
stack
page read and write
3AD4000
direct allocation
page read and write
3970000
direct allocation
page read and write
D7E000
stack
page read and write
222A000
direct allocation
page read and write
319F000
stack
page read and write
21CDDE47000
heap
page read and write
AB0000
heap
page read and write
1F0000
trusted library allocation
page read and write
31A0000
heap
page read and write
2102BA56000
heap
page read and write
810000
remote allocation
page execute and read and write
3ABC000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3984000
direct allocation
page read and write
23D8000
direct allocation
page read and write
31A8000
heap
page read and write
510000
unkown
page read and write
1E5F023B000
heap
page read and write
C0E000
stack
page read and write
3AF8000
direct allocation
page read and write
3CFC000
direct allocation
page read and write
BCE000
stack
page read and write
3A9C000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
10540000
direct allocation
page readonly
930000
remote allocation
page read and write
2B851A00000
heap
page read and write
33DA000
stack
page read and write
395C000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
31F6000
heap
page read and write
2EC0000
trusted library allocation
page read and write
3ADC000
direct allocation
page read and write
12D7C702000
heap
page read and write
978000
heap
page read and write
196FC970000
remote allocation
page read and write
30B0000
remote allocation
page execute and read and write
2B851C72000
heap
page read and write
3AC4000
direct allocation
page read and write
256DB140000
heap
page read and write
3070000
remote allocation
page execute and read and write
978000
heap
page read and write
33EE000
stack
page read and write
3ABC000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
21030E7E000
trusted library allocation
page read and write
AAE000
stack
page read and write
5E0000
remote allocation
page read and write
3CC4000
direct allocation
page read and write
23BB000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
3AE8000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
12D7C656000
heap
page read and write
4D4E000
stack
page read and write
E400AF7000
stack
page read and write
33EE000
stack
page read and write
38D0000
direct allocation
page read and write
3960000
direct allocation
page read and write
38D0000
direct allocation
page read and write
256DB262000
heap
page read and write
CFE000
stack
page read and write
3AF0000
direct allocation
page read and write
7BE000
heap
page read and write
3ACC000
direct allocation
page read and write
3904000
direct allocation
page read and write
3960000
direct allocation
page read and write
978000
heap
page read and write
3A10000
remote allocation
page read and write
1F25FAE000
stack
page read and write
3AC8000
direct allocation
page read and write
3948000
direct allocation
page read and write
3C31000
direct allocation
page execute read
1E5F0213000
heap
page read and write
396C000
direct allocation
page read and write
3984000
direct allocation
page read and write
2C6F000
stack
page read and write
3AC4000
direct allocation
page read and write
38D0000
direct allocation
page read and write
496913B000
stack
page read and write
2102BA8D000
heap
page read and write
2F77000
heap
page read and write
3C88000
direct allocation
page read and write
1E5F0302000
heap
page read and write
C4E000
stack
page read and write
3ACC000
direct allocation
page read and write
2DCF000
stack
page read and write
3AE0000
direct allocation
page read and write
4A4000
unkown
page write copy
3AC0000
direct allocation
page read and write
21CDDE67000
heap
page read and write
200D9C50000
heap
page read and write
3C94000
direct allocation
page read and write
D80000
heap
page read and write
3D58000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
3AC0000
direct allocation
page read and write
1D4FF1D0000
heap
page read and write
BCE000
stack
page read and write
3CD4000
direct allocation
page read and write
D20000
unkown
page read and write
D80000
trusted library allocation
page read and write
3ABC000
direct allocation
page read and write
395C000
direct allocation
page read and write
8FE000
stack
page read and write
38D0000
direct allocation
page read and write
396C000
direct allocation
page read and write
3998000
direct allocation
page read and write
3974000
direct allocation
page read and write
2B851C3C000
heap
page read and write
3960000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
136C4C02000
trusted library allocation
page read and write
3AD8000
direct allocation
page read and write
397C000
direct allocation
page read and write
3AF8000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
3ABC000
direct allocation
page read and write
3B9C87D000
stack
page read and write
3C88000
direct allocation
page read and write
2483000
heap
page read and write
3D10000
direct allocation
page read and write
31A0000
heap
page read and write
3150000
heap
page read and write
5F0000
remote allocation
page execute and read and write
2360000
heap
page read and write
3AD4000
direct allocation
page read and write
496987C000
stack
page read and write
D20000
unkown
page read and write
D7E000
stack
page read and write
3ACC000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
2102BA8F000
heap
page read and write
2F70000
heap
page read and write
2102C102000
heap
page read and write
3ACC000
direct allocation
page read and write
2200000
trusted library allocation
page read and write
3C9C000
direct allocation
page read and write
4C00000
trusted library allocation
page read and write
256DB302000
heap
page read and write
2102BA6F000
heap
page read and write
23E6000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
4C00000
trusted library allocation
page read and write
3AEE000
direct allocation
page read and write
C00000
remote allocation
page execute and read and write
C4E000
stack
page read and write
200D9E86000
heap
page read and write
22EA000
direct allocation
page read and write
22FB000
direct allocation
page read and write
D20000
unkown
page read and write
3940000
direct allocation
page read and write
3A30000
direct allocation
page read and write
AAE000
stack
page read and write
319F000
stack
page read and write
2F0E000
stack
page read and write
3A70000
direct allocation
page read and write
4A4000
unkown
page read and write
1000000
remote allocation
page execute and read and write
83D000
stack
page read and write
3A64000
direct allocation
page read and write
98000
stack
page read and write
3964000
direct allocation
page read and write
31F0000
trusted library allocation
page read and write
3B30000
direct allocation
page read and write
38D0000
direct allocation
page read and write
3984000
direct allocation
page read and write
3940000
direct allocation
page read and write
2E0E000
stack
page read and write
3980000
direct allocation
page read and write
3A6C000
direct allocation
page read and write
2402000
direct allocation
page read and write
7BD000
heap
page read and write
D80000
trusted library allocation
page read and write
2F0E000
stack
page read and write
3AE4000
direct allocation
page read and write
850000
remote allocation
page execute and read and write
AB0000
heap
page read and write
D20000
unkown
page read and write
3A10000
remote allocation
page read and write
CFE000
stack
page read and write
93F000
stack
page read and write
3AF8000
direct allocation
page read and write
2B8519F0000
heap
page read and write
313E000
stack
page read and write
3970000
direct allocation
page read and write
319F000
stack
page read and write
178EAFE000
stack
page read and write
3AD0000
direct allocation
page read and write
5B1000
heap
page read and write
C0E000
stack
page read and write
28CD000
stack
page read and write
2FAB000
unkown
page read and write
8FE000
stack
page read and write
3AC0000
direct allocation
page read and write
200D9F02000
heap
page read and write
3ABC000
direct allocation
page read and write
200DA721000
trusted library allocation
page read and write
2F3E000
stack
page read and write
3AEC000
direct allocation
page read and write
10563000
remote allocation
page execute and read and write
970000
heap
page read and write
5B8000
heap
page read and write
3D90000
trusted library allocation
page read and write
3AE0000
direct allocation
page read and write
3970000
direct allocation
page read and write
21030F40000
trusted library allocation
page read and write
C0E000
stack
page read and write
3198000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3904000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3CA4000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3CC0000
direct allocation
page read and write
3C30000
direct allocation
page readonly
3AC4000
direct allocation
page read and write
3AA8000
direct allocation
page read and write
3A30000
direct allocation
page read and write
850000
remote allocation
page execute and read and write
21CDDE3C000
heap
page read and write
940000
trusted library allocation
page read and write
3A70000
direct allocation
page read and write
3978000
direct allocation
page read and write
3CC0000
direct allocation
page read and write
D80000
trusted library allocation
page read and write
3CD8000
direct allocation
page read and write
DF0000
remote allocation
page read and write
3760000
remote allocation
page read and write
2237000
heap
page read and write
3AD0000
direct allocation
page read and write
22D4000
direct allocation
page read and write
3150000
heap
page read and write
4B0000
unkown
page readonly
33EE000
stack
page read and write
3960000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
2B8E000
stack
page read and write
21CDDE48000
heap
page read and write
200D9EAE000
heap
page read and write
3D78000
direct allocation
page read and write
C0E000
stack
page read and write
D80000
heap
page read and write
775000
heap
page read and write
860000
unkown
page read and write
3830000
direct allocation
page read and write
3B9C37F000
stack
page read and write
AB0000
heap
page read and write
200D9E29000
heap
page read and write
3AD8000
direct allocation
page read and write
8B9487E000
stack
page read and write
3A68000
direct allocation
page read and write
5BD000
heap
page read and write
3AF8000
direct allocation
page read and write
3ADC000
direct allocation
page read and write
940000
trusted library allocation
page read and write
49696FF000
stack
page read and write
2102C930000
trusted library section
page readonly
23C2000
direct allocation
page read and write
AAE000
stack
page read and write
3CC8000
direct allocation
page read and write
136C4463000
heap
page read and write
319F000
stack
page read and write
256DB300000
heap
page read and write
BCE000
stack
page read and write
C0E000
stack
page read and write
3C9C000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
D20000
unkown
page read and write
1E5F024C000
heap
page read and write
D80000
heap
page read and write
D80000
trusted library allocation
page read and write
36E0000
direct allocation
page read and write
3070000
remote allocation
page execute and read and write
3ABC000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
978000
heap
page read and write
2B4F000
stack
page read and write
C4E000
stack
page read and write
3A68000
direct allocation
page read and write
2103102D000
heap
page read and write
3AE4000
direct allocation
page read and write
196FC970000
remote allocation
page read and write
3150000
heap
page read and write
313E000
stack
page read and write
860000
unkown
page read and write
3A6C000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
1F865E89000
heap
page read and write
3AEC000
direct allocation
page read and write
2FAF000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
395C000
direct allocation
page read and write
3A6C000
direct allocation
page read and write
3AB8000
direct allocation
page read and write
4B0000
unkown
page readonly
2F70000
heap
page read and write
3150000
heap
page read and write
3ABC000
direct allocation
page read and write
7A0000
heap
page read and write
3CF4000
direct allocation
page read and write
810000
remote allocation
page execute and read and write
3AC4000
direct allocation
page read and write
3994000
direct allocation
page read and write
30D0000
remote allocation
page execute and read and write
21CDDE50000
heap
page read and write
3F1C0FE000
stack
page read and write
866000
heap
page read and write
400000
unkown
page readonly
3974000
direct allocation
page read and write
319F000
stack
page read and write
3AC4000
direct allocation
page read and write
1E5F0274000
heap
page read and write
3A30000
direct allocation
page read and write
93F000
stack
page read and write
33AE000
stack
page read and write
940000
trusted library allocation
page read and write
3B9C77E000
stack
page read and write
3A30000
direct allocation
page read and write
18056F7000
stack
page read and write
3AA0000
direct allocation
page read and write
3A30000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
395C000
direct allocation
page read and write
970000
heap
page read and write
2EC0000
trusted library allocation
page read and write
810000
remote allocation
page execute and read and write
E9F000
stack
page read and write
3AD4000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
5F0000
remote allocation
page execute and read and write
C0E000
stack
page read and write
3ABC000
direct allocation
page read and write
3CCC000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
3970000
direct allocation
page read and write
256DB22A000
heap
page read and write
93F000
stack
page read and write
3978000
direct allocation
page read and write
10540000
remote allocation
page execute and read and write
5F34FFB000
stack
page read and write
D80000
heap
page read and write
3AC8000
direct allocation
page read and write
940000
trusted library allocation
page read and write
3F1BC7E000
stack
page read and write
92F000
stack
page read and write
3914000
direct allocation
page read and write
395C000
direct allocation
page read and write
BCE000
stack
page read and write
3978000
direct allocation
page read and write
3974000
direct allocation
page read and write
2102C960000
trusted library section
page readonly
510000
heap
page read and write
3AC4000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3968000
direct allocation
page read and write
33AE000
stack
page read and write
31A8000
heap
page read and write
21030F80000
trusted library allocation
page read and write
398C000
direct allocation
page read and write
21030EA0000
trusted library allocation
page read and write
3980000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
3A30000
direct allocation
page read and write
510000
unkown
page read and write
1F2677A000
stack
page read and write
3ABC000
direct allocation
page read and write
196FC240000
heap
page read and write
31A8000
heap
page read and write
18059FF000
stack
page read and write
93F000
stack
page read and write
2F4F000
stack
page read and write
10540000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
940000
remote allocation
page execute and read and write
3960000
direct allocation
page read and write
38D0000
direct allocation
page read and write
510000
unkown
page read and write
3C94000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3A70000
direct allocation
page read and write
BCE000
stack
page read and write
940000
remote allocation
page execute and read and write
36E0000
direct allocation
page read and write
33AE000
stack
page read and write
3070000
remote allocation
page execute and read and write
2F0E000
stack
page read and write
3AD0000
direct allocation
page read and write
1F2637E000
stack
page read and write
3ABC000
direct allocation
page read and write
C4E000
stack
page read and write
3C90000
direct allocation
page read and write
2418000
direct allocation
page read and write
3938000
direct allocation
page read and write
2102B810000
heap
page read and write
1F865EC6000
heap
page read and write
3950000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
395C000
direct allocation
page read and write
3CFC000
direct allocation
page read and write
200DA770000
trusted library allocation
page read and write
2B851B60000
trusted library allocation
page read and write
3964000
direct allocation
page read and write
256DB23C000
heap
page read and write
256DB266000
heap
page read and write
395C000
direct allocation
page read and write
1F865D20000
heap
page read and write
3AC8000
direct allocation
page read and write
200D9EC5000
heap
page read and write
F3F67F000
stack
page read and write
D7E000
stack
page read and write
2B851C5C000
heap
page read and write
3AE0000
direct allocation
page read and write
3AE8000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
196FC1E0000
heap
page read and write
98000
stack
page read and write
3AD4000
direct allocation
page read and write
1805AFA000
stack
page read and write
21CDDD80000
trusted library allocation
page read and write
1E5F0261000
heap
page read and write
243D000
stack
page read and write
25DD000
stack
page read and write
3ABC000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
1F865E23000
heap
page read and write
D80000
trusted library allocation
page read and write
3AF4000
direct allocation
page read and write
30000
heap
page read and write
21CDDE13000
heap
page read and write
3AD0000
direct allocation
page read and write
136C4300000
heap
page read and write
3070000
remote allocation
page execute and read and write
3CDC000
direct allocation
page read and write
3150000
heap
page read and write
2B851C00000
heap
page read and write
C0E000
stack
page read and write
8FE000
stack
page read and write
3150000
heap
page read and write
810000
remote allocation
page execute and read and write
3ABC000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
3B9C5FE000
stack
page read and write
930000
remote allocation
page read and write
73E000
stack
page read and write
5E0000
remote allocation
page read and write
D3E000
stack
page read and write
3AD0000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3AEC000
direct allocation
page read and write
2102B7A0000
heap
page read and write
3AD0000
direct allocation
page read and write
3908000
direct allocation
page read and write
178E2BB000
stack
page read and write
38D0000
direct allocation
page read and write
2B851C7A000
heap
page read and write
88A000
heap
page read and write
313E000
stack
page read and write
33EE000
stack
page read and write
510000
unkown
page read and write
32DD000
stack
page read and write
C0E000
stack
page read and write
3A94000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
396C000
direct allocation
page read and write
930000
remote allocation
page read and write
3958000
direct allocation
page read and write
E4008FB000
stack
page read and write
3954000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3990000
direct allocation
page read and write
396C000
direct allocation
page read and write
978000
heap
page read and write
3BF6000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
395C000
direct allocation
page read and write
396C000
direct allocation
page read and write
398C000
direct allocation
page read and write
2B851D02000
heap
page read and write
200D9BE0000
heap
page read and write
978000
heap
page read and write
2102CCC0000
trusted library allocation
page read and write
5E0000
remote allocation
page read and write
2B851C77000
heap
page read and write
930000
remote allocation
page read and write
3AD8000
direct allocation
page read and write
2102BAFD000
heap
page read and write
2102BB02000
heap
page read and write
8FE000
stack
page read and write
3AD0000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
3038000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
3940000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
210310F0000
heap
page read and write
3C30000
direct allocation
page readonly
940000
remote allocation
page execute and read and write
D7E000
stack
page read and write
5BD000
heap
page read and write
25C0000
heap
page read and write
3ABC000
direct allocation
page read and write
31A0000
heap
page read and write
3A64000
direct allocation
page read and write
3A30000
direct allocation
page read and write
21031076000
heap
page read and write
3AD0000
direct allocation
page read and write
3984000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
4BB0000
trusted library allocation
page read and write
3974000
direct allocation
page read and write
4AC000
unkown
page write copy
21CDDE81000
heap
page read and write
1E5F027F000
heap
page read and write
510000
unkown
page read and write
96E000
stack
page read and write
D20000
unkown
page read and write
3C90000
direct allocation
page read and write
38D0000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
33AE000
stack
page read and write
3AA0000
direct allocation
page read and write
C4E000
stack
page read and write
940000
remote allocation
page execute and read and write
233C000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
10541000
direct allocation
page execute read
196FC25C000
heap
page read and write
396C000
direct allocation
page read and write
86E000
stack
page read and write
3AC8000
direct allocation
page read and write
940000
remote allocation
page execute and read and write
940000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
940000
remote allocation
page execute and read and write
3AC4000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
3970000
direct allocation
page read and write
3AA0000
direct allocation
page read and write
1D4FF080000
heap
page read and write
3AD0000
direct allocation
page read and write
31A8000
heap
page read and write
2C7F000
stack
page read and write
52E000
stack
page read and write
136C4489000
heap
page read and write
930000
remote allocation
page read and write
3AC4000
direct allocation
page read and write
2B851C2F000
heap
page read and write
395C000
direct allocation
page read and write
C0E000
stack
page read and write
2F77000
heap
page read and write
3A68000
direct allocation
page read and write
D20000
unkown
page read and write
3ACC000
direct allocation
page read and write
3AA8000
direct allocation
page read and write
33DA000
stack
page read and write
395C000
direct allocation
page read and write
395C000
direct allocation
page read and write
313E000
stack
page read and write
3A30000
direct allocation
page read and write
389F000
stack
page read and write
3978000
direct allocation
page read and write
3CE8000
direct allocation
page read and write
240A000
direct allocation
page read and write
3974000
direct allocation
page read and write
33EE000
stack
page read and write
D80000
trusted library allocation
page read and write
395C000
direct allocation
page read and write
2102BA77000
heap
page read and write
10541000
direct allocation
page execute read
82F000
stack
page read and write
1000000
remote allocation
page execute and read and write
38D0000
direct allocation
page read and write
C0E000
stack
page read and write
75D000
heap
page read and write
3AD0000
direct allocation
page read and write
395C000
direct allocation
page read and write
3998000
direct allocation
page read and write
1F86673A000
heap
page read and write
3AD8000
direct allocation
page read and write
3070000
remote allocation
page execute and read and write
10540000
remote allocation
page execute and read and write
3968000
direct allocation
page read and write
3A30000
direct allocation
page read and write
3AA4000
direct allocation
page read and write
1E5F026D000
heap
page read and write
1D4FEFAF000
heap
page read and write
510000
unkown
page read and write
3ADC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
2A4E000
stack
page read and write
3CD4000
direct allocation
page read and write
33AE000
stack
page read and write
D20000
unkown
page read and write
3ABC000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
3C98000
direct allocation
page read and write
1F865E71000
heap
page read and write
3AC0000
direct allocation
page read and write
30000
heap
page read and write
3960000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3974000
direct allocation
page read and write
2EFF000
stack
page read and write
CFE000
stack
page read and write
4C00000
trusted library allocation
page read and write
3BF8000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
3CA0000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
18057FB000
stack
page read and write
309D000
stack
page read and write
3AB0000
direct allocation
page read and write
1805FFE000
stack
page read and write
261E000
stack
page read and write
AAE000
stack
page read and write
970000
remote allocation
page execute and read and write
E400BFD000
stack
page read and write
3ACC000
direct allocation
page read and write
990000
remote allocation
page execute and read and write
3C80000
direct allocation
page read and write
62E000
stack
page read and write
2FA2000
unkown
page read and write
3ABC000
direct allocation
page read and write
4969CFC000
stack
page read and write
136C4441000
heap
page read and write
93F000
stack
page read and write
33AE000
stack
page read and write
3960000
direct allocation
page read and write
2102C920000
trusted library section
page readonly
C4E000
stack
page read and write
3A98000
direct allocation
page read and write
3C88000
direct allocation
page read and write
3960000
direct allocation
page read and write
21030E94000
trusted library allocation
page read and write
88A000
heap
page read and write
3AD4000
direct allocation
page read and write
3910000
direct allocation
page read and write
3A64000
direct allocation
page read and write
3CAC000
direct allocation
page read and write
3AE8000
direct allocation
page read and write
2102BAA1000
heap
page read and write
5F0000
remote allocation
page execute and read and write
E40057E000
stack
page read and write
3CB0000
direct allocation
page read and write
3AE4000
direct allocation
page read and write
4C06000
heap
page read and write
3AD0000
direct allocation
page read and write
2B852402000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
3C88000
direct allocation
page read and write
242D000
direct allocation
page read and write
3AC8000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3CA8000
direct allocation
page read and write
2411000
direct allocation
page read and write
E9F000
stack
page read and write
2F0E000
stack
page read and write
8B949FE000
stack
page read and write
510000
unkown
page read and write
23ED000
direct allocation
page read and write
31A0000
heap
page read and write
38D0000
direct allocation
page read and write
D80000
trusted library allocation
page read and write
22D0000
heap
page read and write
3168000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
E4005FE000
stack
page read and write
31A8000
heap
page read and write
7C1000
heap
page read and write
33AE000
stack
page read and write
3A68000
direct allocation
page read and write
2480000
heap
page read and write
496997C000
stack
page read and write
3A6C000
direct allocation
page read and write
970000
remote allocation
page execute and read and write
234A000
direct allocation
page read and write
1E5F0280000
heap
page read and write
3AD8000
direct allocation
page read and write
76E000
heap
page read and write
23FC000
direct allocation
page read and write
D80000
trusted library allocation
page read and write
970000
remote allocation
page execute and read and write
3ABC000
direct allocation
page read and write
5F0000
remote allocation
page execute and read and write
810000
remote allocation
page execute and read and write
3AEC000
direct allocation
page read and write
7FC000
heap
page read and write
3AF4000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
C4E000
stack
page read and write
2FAF000
unkown
page read and write
860000
heap
page read and write
940000
remote allocation
page execute and read and write
3AC4000
direct allocation
page read and write
33EE000
stack
page read and write
21030CE0000
trusted library allocation
page read and write
C4E000
stack
page read and write
4B0000
unkown
page readonly
DF0000
remote allocation
page read and write
313E000
stack
page read and write
3ADC000
direct allocation
page read and write
F3F47F000
stack
page read and write
3ACC000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
3070000
remote allocation
page execute and read and write
3974000
direct allocation
page read and write
5F351FF000
stack
page read and write
200DA71A000
trusted library allocation
page read and write
2390000
direct allocation
page execute and read and write
3070000
remote allocation
page execute and read and write
4AC000
unkown
page write copy
3B48000
direct allocation
page read and write
3908000
direct allocation
page read and write
49DE000
stack
page read and write
970000
heap
page read and write
2409000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
30D0000
remote allocation
page execute and read and write
CFE000
stack
page read and write
2F0E000
stack
page read and write
D7E000
stack
page read and write
3AD1000
direct allocation
page execute read
3ABC000
direct allocation
page read and write
3A70000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
313D000
stack
page read and write
3A30000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
3964000
direct allocation
page read and write
3AD4000
direct allocation
page read and write
136C4390000
trusted library allocation
page read and write
3A30000
direct allocation
page read and write
D7E000
stack
page read and write
3AF8000
direct allocation
page read and write
3964000
direct allocation
page read and write
4A4000
unkown
page read and write
3AE4000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
2B851C76000
heap
page read and write
3C88000
direct allocation
page read and write
D7E000
stack
page read and write
8FE000
stack
page read and write
1D4FEF60000
heap
page read and write
3964000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
210310D9000
heap
page read and write
8FE000
stack
page read and write
3AC8000
direct allocation
page read and write
30B0000
remote allocation
page execute and read and write
21030FD0000
remote allocation
page read and write
CFE000
stack
page read and write
2102BFE1000
trusted library allocation
page read and write
2A0A000
stack
page read and write
3AC0000
direct allocation
page read and write
1E5F0243000
heap
page read and write
2102C000000
heap
page read and write
12D7C666000
heap
page read and write
2F70000
heap
page read and write
3AEC000
direct allocation
page read and write
19C000
stack
page read and write
3AC8000
direct allocation
page read and write
3CC4000
direct allocation
page read and write
970000
heap
page read and write
810000
remote allocation
page execute and read and write
3AB0000
direct allocation
page read and write
3978000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
3AA0000
direct allocation
page read and write
978000
heap
page read and write
1000000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
3CA0000
direct allocation
page read and write
2F0E000
stack
page read and write
3CB4000
direct allocation
page read and write
2F70000
unkown
page read and write
200DA480000
unkown
page read and write
3AC4000
direct allocation
page read and write
3AC4000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
3ACC000
direct allocation
page read and write
31A8000
heap
page read and write
3980000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
3C88000
direct allocation
page read and write
256DB0E0000
heap
page read and write
940000
remote allocation
page execute and read and write
3760000
remote allocation
page read and write
1F866700000
heap
page read and write
3AA8000
direct allocation
page read and write
3ACC000
direct allocation
page read and write
21031000000
heap
page read and write
970000
remote allocation
page execute and read and write
3D41000
trusted library allocation
page read and write
1F865E69000
heap
page read and write
3AA8000
direct allocation
page read and write
D80000
heap
page read and write
1E5F027E000
heap
page read and write
21030EA0000
trusted library allocation
page read and write
12D7C658000
heap
page read and write
3AB0000
direct allocation
page read and write
AAE000
stack
page read and write
136C4478000
heap
page read and write
3AE0000
direct allocation
page read and write
1000000
remote allocation
page execute and read and write
3AC4000
direct allocation
page read and write
3A30000
direct allocation
page read and write
2B851D24000
heap
page read and write
D3E000
stack
page read and write
2102BB13000
heap
page read and write
3AD0000
direct allocation
page read and write
395C000
direct allocation
page read and write
313E000
stack
page read and write
5F0000
remote allocation
page execute and read and write
There are 2269 hidden memdumps, click here to show them.