IOC Report
#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\gz.txt
ASCII text, with no line terminators
dropped
C:\Users\Public\BRBUAU
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\Public\Documents\A9Q9P9\TASLogin.KInf
data
dropped
C:\Users\Public\Documents\A9Q9P9\TASLoginBase.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\Public\Documents\A9Q9P9\gii.png
data
dropped
C:\Users\Public\Documents\A9Q9P9\lee0923.hwp
Hangul (Korean) Word Processor File 5.x
dropped
C:\Users\Public\Music\LI1L1K\1YH1H1.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\4N7N6N.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\52M2L5.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\84O4N7.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\96P9P8.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\ARAUAU.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\CSBSBV.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\DXGXG0.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\N6M6P6.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\QAT9TC.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\SBRBRB.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\T9SCSC.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\WS8SBS.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\LI1L1K\WTCWCW.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
"C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe C:\Users\Public\Music\LI1L1K
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
"C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
"C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
"C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
malicious
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://schemas.mDD
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://support.google.com/chrome/?p=usage_stats_crash_reports
unknown
http://schemas.microsof
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://ocsp.sectigo.com04
unknown

Domains

Name
IP
Malicious
24818.windows-updata.com
137.220.137.85
malicious

IPs

IP
Domain
Country
Malicious
137.220.137.85
24818.windows-updata.com
Singapore
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
IFfmsjhgsda
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0\0
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1\1\0\0\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\Shell
SniffedFolderType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\OpenWith.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\OpenWith.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5BB1000
heap
page read and write
5BBB000
heap
page read and write
664B000
heap
page read and write
2276000
direct allocation
page read and write
6D9C000
heap
page read and write
11D0A000
unkown
page readonly
639000
heap
page read and write
24C0000
unkown
page readonly
12133000
unkown
page readonly
2201B40F000
heap
page read and write
6748000
heap
page read and write
9C0000
heap
page read and write
2201B4F1000
heap
page read and write
4E0000
unkown
page readonly
401000
unkown
page execute read
5F27000
heap
page read and write
2BAF000
unkown
page readonly
11239000
unkown
page readonly
2201B3F1000
heap
page read and write
2201B40A000
heap
page read and write
2290000
heap
page read and write
9E4000
direct allocation
page read and write
114FF000
unkown
page readonly
661F000
heap
page read and write
650000
heap
page read and write
12D24000
unkown
page readonly
2A7C000
stack
page read and write
10000000
unkown
page readonly
10FBA000
unkown
page readonly
11853000
unkown
page readonly
B64000
heap
page read and write
100D6000
unkown
page execute read
5D4F000
heap
page read and write
10E57000
unkown
page readonly
A1D000
direct allocation
page read and write
2201B41E000
heap
page read and write
6774000
heap
page read and write
401000
unkown
page execute read
11737000
unkown
page readonly
673B000
heap
page read and write
2201B4F6000
heap
page read and write
2930000
unkown
page readonly
11546000
unkown
page readonly
12208000
unkown
page readonly
1142A000
unkown
page readonly
118E1000
unkown
page readonly
66AD000
heap
page read and write
2D59000
unkown
page readonly
2125000
unkown
page readonly
11A8B000
unkown
page readonly
11F42000
unkown
page readonly
101E9000
unkown
page execute read
6CD0000
heap
page read and write
44A000
unkown
page readonly
11280000
unkown
page readonly
639000
heap
page read and write
75A000
heap
page read and write
A66000
direct allocation
page read and write
486000
remote allocation
page execute and read and write
5D98000
heap
page read and write
6D1A000
heap
page read and write
2FBE000
stack
page read and write
11EB4000
unkown
page readonly
9DD000
direct allocation
page read and write
71C5000
heap
page read and write
111F2000
unkown
page readonly
2201B42D000
heap
page read and write
1E5F000
unkown
page readonly
11471000
unkown
page readonly
4E0000
unkown
page readonly
717539E000
stack
page read and write
63C000
heap
page read and write
2930000
unkown
page readonly
48C000
unkown
page execute read
2201B575000
heap
page read and write
21E0000
heap
page read and write
610000
heap
page read and write
10383000
unkown
page read and write
115D4000
unkown
page readonly
11471000
unkown
page readonly
2A05000
unkown
page readonly
197000
stack
page read and write
2259000
direct allocation
page read and write
2201B41A000
heap
page read and write
2E2E000
unkown
page readonly
1AC4000
unkown
page readonly
2430000
heap
page read and write
2201B42D000
heap
page read and write
26D0000
heap
page read and write
4E3000
unkown
page execute and write copy
47B000
unkown
page read and write
2474000
heap
page read and write
75F000
stack
page read and write
4E0000
unkown
page readonly
633000
heap
page read and write
11280000
unkown
page readonly
633000
heap
page read and write
22019465000
heap
page read and write
489000
remote allocation
page execute and read and write
11A8B000
unkown
page readonly
2A10000
direct allocation
page read and write
223B000
direct allocation
page read and write
2201B5CB000
heap
page read and write
11662000
unkown
page readonly
1F34000
unkown
page readonly
63C000
heap
page read and write
262D000
stack
page read and write
6C39000
heap
page read and write
2201B557000
heap
page read and write
7DF444471000
trusted library allocation
page execute read
640000
heap
page read and write
4E0000
unkown
page readonly
22D0000
heap
page read and write
254E000
unkown
page readonly
2201B40B000
heap
page read and write
113E3000
unkown
page readonly
111AB000
unkown
page readonly
48C000
unkown
page execute read
1139C000
unkown
page readonly
2A4C000
unkown
page readonly
520000
heap
page read and write
10122000
unkown
page execute read
23C9000
direct allocation
page execute and read and write
1189A000
unkown
page readonly
1139C000
unkown
page readonly
226F000
direct allocation
page read and write
2201948F000
heap
page read and write
2201B584000
heap
page read and write
220194BB000
heap
page read and write
112C7000
unkown
page readonly
9A000
stack
page read and write
10205000
unkown
page execute read
2201B42D000
heap
page read and write
2DE7000
unkown
page readonly
44A000
unkown
page readonly
10175000
unkown
page execute read
2CCB000
unkown
page readonly
285B000
unkown
page readonly
48C000
unkown
page execute read
2201B42D000
heap
page read and write
24CE000
stack
page read and write
10DC9000
unkown
page readonly
1BE0000
unkown
page readonly
A7A000
stack
page read and write
9A000
stack
page read and write
B83000
heap
page read and write
22A1000
direct allocation
page read and write
7253000
heap
page read and write
48C000
unkown
page execute read
486000
remote allocation
page execute and read and write
2201B410000
heap
page read and write
654A000
heap
page read and write
63C000
heap
page read and write
2CCB000
unkown
page readonly
5F6000
heap
page read and write
65D0000
heap
page read and write
2201B41E000
heap
page read and write
23EB000
unkown
page readonly
2201B429000
heap
page read and write
70A9000
heap
page read and write
585000
heap
page read and write
22019488000
heap
page read and write
489000
remote allocation
page execute and read and write
11CC3000
unkown
page readonly
11001000
unkown
page readonly
23C0000
trusted library allocation
page read and write
2201B424000
heap
page read and write
2201B438000
heap
page read and write
28A2000
unkown
page readonly
1F0000
heap
page read and write
112C7000
unkown
page readonly
6785000
heap
page read and write
2201B5D8000
heap
page read and write
6FE000
heap
page read and write
2201B40F000
heap
page read and write
2201E140000
heap
page read and write
22019470000
heap
page read and write
11A8B000
unkown
page readonly
2623000
unkown
page readonly
2201DCB5000
heap
page read and write
3230000
heap
page read and write
6B64000
heap
page read and write
273F000
unkown
page readonly
95F000
stack
page read and write
2241000
unkown
page readonly
101A0000
unkown
page execute read
2201B575000
heap
page read and write
121C1000
unkown
page readonly
2201B568000
heap
page read and write
A10000
direct allocation
page read and write
10000000
unkown
page readonly
5FE000
stack
page read and write
358F000
stack
page read and write
121C1000
unkown
page readonly
2A30000
trusted library allocation
page read and write
2201944E000
heap
page read and write
2B21000
unkown
page readonly
7C8000
heap
page read and write
2D12000
unkown
page readonly
2201B413000
heap
page read and write
1C6E000
unkown
page readonly
12296000
unkown
page readonly
2814000
unkown
page readonly
2201B42D000
heap
page read and write
620000
heap
page read and write
1130E000
unkown
page readonly
5AE000
heap
page read and write
73B6000
heap
page read and write
22019459000
heap
page read and write
2840000
direct allocation
page execute and read and write
121C1000
unkown
page readonly
1C27000
unkown
page readonly
1D43000
unkown
page readonly
10205000
unkown
page execute read
2284000
direct allocation
page read and write
11471000
unkown
page readonly
19C000
stack
page read and write
5C9B000
heap
page read and write
47E000
unkown
page readonly
720C000
heap
page read and write
61F6000
heap
page read and write
A2D000
direct allocation
page read and write
11B19000
unkown
page readonly
7289000
stack
page read and write
B80000
heap
page read and write
48C000
unkown
page execute read
45F000
remote allocation
page execute and read and write
623D000
heap
page read and write
12208000
unkown
page readonly
664B000
heap
page read and write
2201B3FB000
heap
page read and write
44A000
unkown
page readonly
2201B429000
heap
page read and write
10383000
unkown
page read and write
112C7000
unkown
page readonly
633000
heap
page read and write
23A4000
unkown
page readonly
1205E000
unkown
page readonly
47E000
unkown
page readonly
1196F000
unkown
page readonly
1A7D000
unkown
page readonly
2201944A000
heap
page read and write
11A44000
unkown
page readonly
2201B438000
heap
page read and write
110D6000
unkown
page readonly
2201B432000
heap
page read and write
10E9E000
unkown
page readonly
1F34000
unkown
page readonly
633000
heap
page read and write
4840000
heap
page read and write
5B7000
heap
page read and write
4E5000
heap
page read and write
960000
heap
page read and write
2E2F000
stack
page read and write
12324000
unkown
page readonly
2201B5A4000
heap
page read and write
2E75000
unkown
page readonly
2268000
direct allocation
page read and write
63C000
heap
page read and write
11048000
unkown
page readonly
2201B574000
heap
page read and write
11B60000
unkown
page readonly
23C7000
direct allocation
page execute and read and write
65D8000
heap
page read and write
672E000
heap
page read and write
401000
unkown
page execute read
1196F000
unkown
page readonly
11D0A000
unkown
page readonly
2201B3F1000
heap
page read and write
2B1E000
stack
page read and write
2D59000
unkown
page readonly
2450000
heap
page read and write
1180C000
unkown
page readonly
2201DC94000
heap
page read and write
2201946A000
heap
page read and write
22019482000
heap
page read and write
6973000
heap
page read and write
400000
unkown
page readonly
A42000
direct allocation
page read and write
5AE000
stack
page read and write
2201B55B000
heap
page read and write
2201B41E000
heap
page read and write
2201B424000
heap
page read and write
10389000
unkown
page readonly
9C000
stack
page read and write
22D4C480000
heap
page read and write
A51000
direct allocation
page read and write
45F000
remote allocation
page execute and read and write
2009000
unkown
page readonly
1130E000
unkown
page readonly
1B52000
unkown
page readonly
2201DCBF000
heap
page read and write
11737000
unkown
page readonly
10FBA000
unkown
page readonly
10E57000
unkown
page readonly
11853000
unkown
page readonly
22A8000
direct allocation
page read and write
1961000
unkown
page readonly
2201B432000
heap
page read and write
692C000
heap
page read and write
19F000
stack
page read and write
2201B50D000
heap
page read and write
2201B586000
heap
page read and write
110D6000
unkown
page readonly
348E000
stack
page read and write
264A000
stack
page read and write
348000
stack
page read and write
72E1000
heap
page read and write
2D12000
unkown
page readonly
10382000
unkown
page write copy
63C000
heap
page read and write
1F7B000
unkown
page readonly
627000
heap
page read and write
2201B5A4000
heap
page read and write
11BA7000
unkown
page readonly
6CF000
stack
page read and write
45F000
remote allocation
page execute and read and write
10E9E000
unkown
page readonly
2977000
unkown
page readonly
401000
unkown
page execute read
2201B429000
heap
page read and write
11DDF000
unkown
page readonly
1196F000
unkown
page readonly
266A000
unkown
page readonly
9C000
stack
page read and write
2201B563000
heap
page read and write
7062000
heap
page read and write
22019459000
heap
page read and write
2201947A000
heap
page read and write
4E3000
unkown
page execute and write copy
310E000
stack
page read and write
954000
heap
page read and write
DFE000
stack
page read and write
620000
heap
page read and write
11B19000
unkown
page readonly
10116000
unkown
page execute read
A4A000
direct allocation
page read and write
1EED000
unkown
page readonly
47E000
unkown
page readonly
2201B432000
heap
page read and write
635000
heap
page read and write
480000
unkown
page readonly
2050000
unkown
page readonly
2201B58D000
heap
page read and write
70F0000
heap
page read and write
400000
unkown
page readonly
1224F000
unkown
page readonly
11DDF000
unkown
page readonly
464000
remote allocation
page execute and read and write
2C3D000
unkown
page readonly
2201B51B000
heap
page read and write
2201B40B000
heap
page read and write
116F0000
unkown
page readonly
11C7C000
unkown
page readonly
A60000
unkown
page read and write
5878000
heap
page read and write
587C000
heap
page read and write
28A2000
unkown
page readonly
10122000
unkown
page execute read
2201B4E0000
heap
page read and write
10297000
unkown
page execute read
2201DCC3000
heap
page read and write
12296000
unkown
page readonly
62F000
heap
page read and write
2201B5AD000
heap
page read and write
11D51000
unkown
page readonly
28E9000
unkown
page readonly
111F2000
unkown
page readonly
11C7C000
unkown
page readonly
192000
stack
page read and write
63B000
heap
page read and write
480000
unkown
page readonly
400000
remote allocation
page execute and read and write
101B2000
unkown
page execute read
6782000
heap
page read and write
950000
heap
page read and write
1F0000
heap
page read and write
119FD000
unkown
page readonly
6F46000
heap
page read and write
2293000
direct allocation
page read and write
1177E000
unkown
page readonly
10F73000
unkown
page readonly
6857000
heap
page read and write
2479000
unkown
page readonly
220194B1000
heap
page read and write
11C7C000
unkown
page readonly
2201B513000
heap
page read and write
5BB2000
heap
page read and write
580000
heap
page read and write
1B52000
unkown
page readonly
100EC000
unkown
page execute read
53E000
stack
page read and write
5BBC000
heap
page read and write
480000
unkown
page readonly
A3C000
direct allocation
page read and write
6A8F000
heap
page read and write
4E3000
unkown
page execute and read and write
A58000
direct allocation
page read and write
A02000
direct allocation
page read and write
1CB5000
unkown
page readonly
2AFE000
stack
page read and write
19EF000
unkown
page readonly
F90000
heap
page read and write
47E000
unkown
page readonly
642E000
heap
page read and write
2201B5CB000
heap
page read and write
2201B429000
heap
page read and write
660A000
heap
page read and write
2097000
unkown
page readonly
10299000
unkown
page readonly
2B21000
unkown
page readonly
5F6000
heap
page read and write
229C000
direct allocation
page execute and read and write
117C5000
unkown
page readonly
22019466000
heap
page read and write
10F73000
unkown
page readonly
674C000
heap
page read and write
4F0000
heap
page read and write
63C000
heap
page read and write
2201DCB2000
heap
page read and write
A09000
direct allocation
page read and write
1FC2000
unkown
page readonly
6B1D000
heap
page read and write
1F0000
heap
page read and write
5BBB000
heap
page read and write
11355000
unkown
page readonly
9A000
stack
page read and write
10385000
unkown
page write copy
2201B41E000
heap
page read and write
220194BC000
heap
page read and write
6CC7000
heap
page read and write
2201B3FB000
heap
page read and write
11546000
unkown
page readonly
6AD6000
heap
page read and write
633000
heap
page read and write
2201B503000
heap
page read and write
2201B432000
heap
page read and write
11D98000
unkown
page readonly
400000
unkown
page readonly
119B6000
unkown
page readonly
A3B000
direct allocation
page read and write
5F4000
heap
page read and write
2201B432000
heap
page read and write
21FA000
unkown
page readonly
2201944F000
heap
page read and write
2201B58D000
heap
page read and write
10D3B000
unkown
page readonly
11001000
unkown
page readonly
480000
unkown
page readonly
119B6000
unkown
page readonly
E7B000
unkown
page readonly
2F03000
unkown
page readonly
60DA000
heap
page read and write
460000
unkown
page readonly
114FF000
unkown
page readonly
2A4C000
unkown
page readonly
A6D000
direct allocation
page read and write
28CC000
direct allocation
page execute and read and write
334F000
stack
page read and write
4E3000
unkown
page execute and write copy
548000
heap
page read and write
122DD000
unkown
page readonly
11164000
unkown
page readonly
2201AD30000
heap
page read and write
2201B5CB000
heap
page read and write
12296000
unkown
page readonly
2201B505000
heap
page read and write
1217A000
unkown
page readonly
480000
unkown
page readonly
2201DC93000
heap
page read and write
2201DCA8000
heap
page read and write
2201FE90000
heap
page readonly
2201DCC2000
heap
page read and write
2201B3E0000
heap
page read and write
7D7000
heap
page read and write
2201DC98000
heap
page read and write
6503000
heap
page read and write
3991000
unkown
page readonly
401000
unkown
page execute read
2201B3F0000
heap
page read and write
19A8000
unkown
page readonly
2BF6000
unkown
page readonly
11BA7000
unkown
page readonly
2201B58D000
heap
page read and write
5875000
heap
page read and write
10382000
unkown
page write copy
28E9000
unkown
page readonly
2201B5A4000
heap
page read and write
49A053F000
stack
page read and write
47B000
unkown
page readonly
26B1000
unkown
page readonly
75CD000
stack
page read and write
5C84000
heap
page read and write
220193C0000
heap
page read and write
22019370000
heap
page read and write
62E000
heap
page read and write
2201DC9F000
heap
page read and write
2316000
unkown
page readonly
2201B509000
heap
page read and write
2201B3F4000
heap
page read and write
7A6000
heap
page read and write
2201B4E2000
heap
page read and write
10DC9000
unkown
page readonly
11E26000
unkown
page readonly
30BF000
stack
page read and write
B53000
heap
page read and write
587C000
heap
page read and write
11EB4000
unkown
page readonly
2201B558000
heap
page read and write
2201AFF0000
heap
page read and write
775E000
stack
page read and write
2201B429000
heap
page read and write
10EE5000
unkown
page readonly
29ED000
stack
page read and write
1142A000
unkown
page readonly
117C5000
unkown
page readonly
68E5000
heap
page read and write
22CF000
unkown
page readonly
273F000
unkown
page readonly
10000000
unkown
page readonly
28C9000
direct allocation
page execute and read and write
401000
unkown
page execute read
2D0F000
stack
page read and write
11BA7000
unkown
page readonly
220194BB000
heap
page read and write
63C000
heap
page read and write
5CC5000
heap
page read and write
6CFB000
heap
page read and write
6719000
heap
page read and write
2201B55A000
heap
page read and write
5BBB000
heap
page read and write
1161B000
unkown
page readonly
6D3B000
heap
page read and write
5F7D000
stack
page read and write
22D4C3A0000
heap
page read and write
1037E000
unkown
page read and write
10CF4000
unkown
page readonly
116F0000
unkown
page readonly
1224F000
unkown
page readonly
67B1000
heap
page read and write
633000
heap
page read and write
9EB000
direct allocation
page read and write
1161B000
unkown
page readonly
1EED000
unkown
page readonly
641000
heap
page read and write
113E3000
unkown
page readonly
5875000
heap
page read and write
4E0000
unkown
page readonly
48C000
remote allocation
page execute and read and write
590000
heap
page read and write
5D61000
heap
page read and write
6E8000
heap
page read and write
12017000
unkown
page readonly
400000
unkown
page readonly
100EC000
unkown
page execute read
2201B41A000
heap
page read and write
2201B584000
heap
page read and write
320E000
stack
page read and write
10D82000
unkown
page readonly
101B2000
unkown
page execute read
1161B000
unkown
page readonly
4E3000
unkown
page execute and read and write
2201B43E000
heap
page read and write
11D98000
unkown
page readonly
1CFC000
unkown
page readonly
23CC000
direct allocation
page execute and read and write
10DC9000
unkown
page readonly
3A0000
heap
page read and write
2201946B000
heap
page read and write
F95000
heap
page read and write
47E000
unkown
page readonly
2201B55C000
heap
page read and write
1961000
unkown
page readonly
1B0B000
unkown
page readonly
587C000
heap
page read and write
6E8000
heap
page read and write
11355000
unkown
page readonly
7175AFF000
stack
page read and write
AE0000
heap
page read and write
4E0000
unkown
page readonly
1C6E000
unkown
page readonly
B30000
heap
page read and write
12133000
unkown
page readonly
560000
heap
page read and write
10CF4000
unkown
page readonly
2B68000
unkown
page readonly
63C000
heap
page read and write
2330000
heap
page read and write
2201B41A000
heap
page read and write
10389000
unkown
page readonly
47B000
unkown
page write copy
2786000
unkown
page readonly
2201B505000
heap
page read and write
4DE000
stack
page read and write
5FBE000
heap
page read and write
11D51000
unkown
page readonly
2201B41A000
heap
page read and write
2201B58D000
heap
page read and write
11928000
unkown
page readonly
114B8000
unkown
page readonly
10205000
unkown
page execute read
400000
unkown
page readonly
2C2F000
stack
page read and write
598000
heap
page read and write
11FD0000
unkown
page readonly
635000
heap
page read and write
2288000
unkown
page readonly
19F000
stack
page read and write
2201DCA1000
heap
page read and write
58EE000
heap
page read and write
2201B41E000
heap
page read and write
2201B568000
heap
page read and write
22019498000
heap
page read and write
1111D000
unkown
page readonly
685000
heap
page read and write
2623000
unkown
page readonly
2210000
direct allocation
page execute and read and write
B39000
heap
page read and write
2201AFE0000
trusted library allocation
page read and write
689E000
heap
page read and write
63C000
heap
page read and write
4E3000
unkown
page execute and read and write
A74000
direct allocation
page read and write
1111D000
unkown
page readonly
480000
unkown
page readonly
717567F000
stack
page read and write
26F8000
unkown
page readonly
10E10000
unkown
page readonly
1158D000
unkown
page readonly
5E48000
heap
page read and write
120A5000
unkown
page readonly
10CF4000
unkown
page readonly
401000
unkown
page execute read
6602000
heap
page read and write
2252000
direct allocation
page read and write
2201B3F4000
heap
page read and write
AC0000
heap
page read and write
2234000
direct allocation
page read and write
2201B513000
heap
page read and write
1EA6000
unkown
page readonly
6D10000
heap
page read and write
786000
heap
page read and write
7328000
heap
page read and write
2201B576000
heap
page read and write
10E10000
unkown
page readonly
7444000
heap
page read and write
2201B432000
heap
page read and write
69BA000
heap
page read and write
23B0000
heap
page read and write
2201B429000
heap
page read and write
640000
heap
page read and write
1130E000
unkown
page readonly
5B81000
heap
page read and write
11F42000
unkown
page readonly
10116000
unkown
page execute read
10EE5000
unkown
page readonly
965000
heap
page read and write
62A000
heap
page read and write
6E2A000
heap
page read and write
633000
heap
page read and write
235D000
unkown
page readonly
114B8000
unkown
page readonly
119FD000
unkown
page readonly
47B000
unkown
page write copy
E7B000
unkown
page readonly
48C000
unkown
page execute read
9C000
stack
page read and write
25DC000
unkown
page readonly
2201B507000
heap
page read and write
24C0000
unkown
page readonly
6E71000
heap
page read and write
2977000
unkown
page readonly
11F89000
unkown
page readonly
2201B42D000
heap
page read and write
2201B513000
heap
page read and write
4E0000
unkown
page readonly
2201B42D000
heap
page read and write
2201B421000
heap
page read and write
6CF0000
heap
page read and write
2201B575000
heap
page read and write
11EFB000
unkown
page readonly
10122000
unkown
page execute read
6700000
heap
page read and write
9EF000
stack
page read and write
5B81000
heap
page read and write
25DC000
unkown
page readonly
11164000
unkown
page readonly
48C000
unkown
page execute read
11662000
unkown
page readonly
10D3B000
unkown
page readonly
44A000
unkown
page readonly
2297000
direct allocation
page execute and read and write
B7F000
heap
page read and write
570000
heap
page read and write
641000
heap
page read and write
227D000
direct allocation
page read and write
570000
unkown
page read and write
10F2C000
unkown
page readonly
47B000
unkown
page read and write
1177E000
unkown
page readonly
2201B424000
heap
page read and write
680000
heap
page read and write
11B60000
unkown
page readonly
AB0000
heap
page read and write
6D41000
heap
page read and write
633000
heap
page read and write
216C000
unkown
page readonly
10299000
unkown
page readonly
3350000
heap
page read and write
10187000
unkown
page execute read
674E000
heap
page read and write
2201948C000
heap
page read and write
96E000
heap
page read and write
118E1000
unkown
page readonly
6F8D000
heap
page read and write
6D55000
heap
page read and write
49A04BC000
stack
page read and write
2201DCB5000
heap
page read and write
10297000
unkown
page execute read
6121000
heap
page read and write
10175000
unkown
page execute read
2201B41E000
heap
page read and write
2595000
unkown
page readonly
11C35000
unkown
page readonly
2814000
unkown
page readonly
11853000
unkown
page readonly
2ADA000
unkown
page readonly
11BEE000
unkown
page readonly
2201B4FD000
heap
page read and write
2220000
heap
page read and write
47E000
unkown
page readonly
2C84000
unkown
page readonly
26C6000
stack
page read and write
122DD000
unkown
page readonly
2201B438000
heap
page read and write
228C000
direct allocation
page read and write
701B000
heap
page read and write
633000
heap
page read and write
2201B424000
heap
page read and write
81E000
stack
page read and write
10F2C000
unkown
page readonly
2201B413000
heap
page read and write
730E000
stack
page read and write
2288000
unkown
page readonly
10F2C000
unkown
page readonly
2201B507000
heap
page read and write
235D000
unkown
page readonly
20DE000
unkown
page readonly
2201B4FD000
heap
page read and write
1B99000
unkown
page readonly
6BAB000
heap
page read and write
2201B4EA000
heap
page read and write
400000
unkown
page readonly
620000
heap
page read and write
587C000
heap
page read and write
2A93000
unkown
page readonly
1F7B000
unkown
page readonly
44A000
unkown
page readonly
2299000
direct allocation
page execute and read and write
400000
unkown
page readonly
1158D000
unkown
page readonly
2330000
heap
page read and write
6721000
heap
page read and write
400000
remote allocation
page execute and read and write
2201B424000
heap
page read and write
26F8000
unkown
page readonly
639000
heap
page read and write
47B000
unkown
page readonly
116A9000
unkown
page readonly
229A000
direct allocation
page read and write
2201DCBD000
heap
page read and write
7175298000
stack
page read and write
101B2000
unkown
page execute read
5F6000
heap
page read and write
11EFB000
unkown
page readonly
704000
heap
page read and write
2201B5A4000
heap
page read and write
62CB000
heap
page read and write
1108F000
unkown
page readonly
7A7000
heap
page read and write
1E18000
unkown
page readonly
10175000
unkown
page execute read
736F000
heap
page read and write
1B99000
unkown
page readonly
11E26000
unkown
page readonly
2432000
unkown
page readonly
603000
heap
page read and write
11EFB000
unkown
page readonly
22D4C750000
heap
page read and write
2BF6000
unkown
page readonly
118E1000
unkown
page readonly
11E6D000
unkown
page readonly
2201DC9F000
heap
page read and write
5CE000
stack
page read and write
11280000
unkown
page readonly
22019480000
heap
page read and write
2201B41E000
heap
page read and write
635000
heap
page read and write
12D24000
unkown
page readonly
63A0000
heap
page read and write
2201B438000
heap
page read and write
2201B529000
heap
page read and write
22019360000
heap
page read and write
10378000
unkown
page read and write
5F6000
heap
page read and write
4E3000
unkown
page execute and write copy
22D4C4A0000
heap
page read and write
4E3000
unkown
page execute and write copy
1189A000
unkown
page readonly
11BEE000
unkown
page readonly
1180C000
unkown
page readonly
48C000
remote allocation
page execute and read and write
6A01000
heap
page read and write
639000
heap
page read and write
6005000
heap
page read and write
48C000
unkown
page execute read
2201B425000
heap
page read and write
2201B4FD000
heap
page read and write
10378000
unkown
page read and write
115D4000
unkown
page readonly
192000
stack
page read and write
11F42000
unkown
page readonly
660000
heap
page read and write
2201B41B000
heap
page read and write
71757FB000
stack
page read and write
116A9000
unkown
page readonly
5FE000
stack
page read and write
2201B413000
heap
page read and write
2786000
unkown
page readonly
2F91000
unkown
page readonly
2201B41E000
heap
page read and write
10E10000
unkown
page readonly
7175B7E000
stack
page read and write
9FB000
direct allocation
page read and write
67C9000
heap
page read and write
63D000
heap
page read and write
A1F000
direct allocation
page read and write
11FD0000
unkown
page readonly
2009000
unkown
page readonly
2201B429000
heap
page read and write
480000
unkown
page readonly
1180C000
unkown
page readonly
2201B513000
heap
page read and write
2201DC98000
heap
page read and write
2201B439000
heap
page read and write
2316000
unkown
page readonly
2201B42D000
heap
page read and write
11DDF000
unkown
page readonly
2201B41A000
heap
page read and write
22019459000
heap
page read and write
19F000
stack
page read and write
390000
heap
page read and write
2201945A000
heap
page read and write
1217A000
unkown
page readonly
2201B429000
heap
page read and write
111AB000
unkown
page readonly
2201B410000
heap
page read and write
707000
heap
page read and write
626C000
stack
page read and write
11546000
unkown
page readonly
A83000
direct allocation
page read and write
1E18000
unkown
page readonly
7F8000
heap
page read and write
2201B41E000
heap
page read and write
5F6000
heap
page read and write
AE5000
heap
page read and write
1BE0000
unkown
page readonly
11F89000
unkown
page readonly
10378000
unkown
page read and write
1D43000
unkown
page readonly
633000
heap
page read and write
63C000
heap
page read and write
11239000
unkown
page readonly
623000
heap
page read and write
6A8000
heap
page read and write
254E000
unkown
page readonly
635000
heap
page read and write
2201B42A000
heap
page read and write
11D0A000
unkown
page readonly
2310000
heap
page read and write
11D51000
unkown
page readonly
2201B41E000
heap
page read and write
5F6000
heap
page read and write
486000
remote allocation
page execute and read and write
29BE000
unkown
page readonly
89F000
stack
page read and write
116A9000
unkown
page readonly
587C000
heap
page read and write
2201B501000
heap
page read and write
11AD2000
unkown
page readonly
23EB000
unkown
page readonly
49A05BF000
stack
page read and write
12133000
unkown
page readonly
266A000
unkown
page readonly
44A000
unkown
page readonly
2201B503000
heap
page read and write
22D4C785000
heap
page read and write
63E000
heap
page read and write
2201B523000
heap
page read and write
10F73000
unkown
page readonly
48C000
remote allocation
page execute and read and write
A5F000
direct allocation
page read and write
11BEE000
unkown
page readonly
47B000
unkown
page write copy
6A0000
heap
page read and write
9BF000
stack
page read and write
3C0000
heap
page read and write
679A000
heap
page read and write
1224F000
unkown
page readonly
44A000
unkown
page readonly
11E26000
unkown
page readonly
A2B000
direct allocation
page read and write
1D8A000
unkown
page readonly
401000
unkown
page execute read
528000
heap
page read and write
5F6000
heap
page read and write
6C80000
heap
page read and write
22019471000
heap
page read and write
5D36000
heap
page read and write
2201B424000
heap
page read and write
A26000
direct allocation
page read and write
25C9000
stack
page read and write
1205E000
unkown
page readonly
11E6D000
unkown
page readonly
2125000
unkown
page readonly
47B000
unkown
page write copy
A98000
direct allocation
page read and write
1DD1000
unkown
page readonly
63E7000
heap
page read and write
2201B523000
heap
page read and write
474000
unkown
page write copy
2201B424000
heap
page read and write
2201B509000
heap
page read and write
2F6F000
stack
page read and write
2201B42D000
heap
page read and write
633000
heap
page read and write
47B000
unkown
page write copy
664B000
heap
page read and write
A43000
direct allocation
page read and write
B68000
heap
page read and write
2201B51B000
heap
page read and write
29BE000
unkown
page readonly
2201947C000
heap
page read and write
220194BD000
heap
page read and write
100EC000
unkown
page execute read
B5E000
heap
page read and write
2201B50D000
heap
page read and write
5E30000
heap
page read and write
2E2E000
unkown
page readonly
635000
heap
page read and write
1A36000
unkown
page readonly
3360000
heap
page read and write
47B000
unkown
page read and write
2201B3F5000
heap
page read and write
2201B568000
heap
page read and write
10389000
unkown
page readonly
4E3000
unkown
page execute and write copy
19EF000
unkown
page readonly
2201B413000
heap
page read and write
2BAF000
unkown
page readonly
2201B3F7000
heap
page read and write
2390000
trusted library allocation
page read and write
2201B429000
heap
page read and write
5D24000
heap
page read and write
2EBC000
unkown
page readonly
120A5000
unkown
page readonly
6359000
heap
page read and write
71759FB000
stack
page read and write
2201B584000
heap
page read and write
10D82000
unkown
page readonly
2201B41E000
heap
page read and write
5DB4000
heap
page read and write
6D44000
heap
page read and write
2201B41E000
heap
page read and write
22B0000
trusted library allocation
page read and write
11928000
unkown
page readonly
6810000
heap
page read and write
12017000
unkown
page readonly
2241000
unkown
page readonly
610000
heap
page read and write
2E6E000
stack
page read and write
6475000
heap
page read and write
187B000
unkown
page readonly
120A5000
unkown
page readonly
6BF2000
heap
page read and write
11AD2000
unkown
page readonly
2201B5D8000
heap
page read and write
2201B432000
heap
page read and write
11CC3000
unkown
page readonly
7C0000
heap
page read and write
11AD2000
unkown
page readonly
26B1000
unkown
page readonly
401000
unkown
page execute read
1A7D000
unkown
page readonly
2201B40F000
heap
page read and write
6D0E000
heap
page read and write
A8A000
direct allocation
page read and write
1177E000
unkown
page readonly
2507000
unkown
page readonly
22019428000
heap
page read and write
2201B3F3000
heap
page read and write
327B000
heap
page read and write
1CFC000
unkown
page readonly
44A000
unkown
page readonly
639000
heap
page read and write
74D2000
heap
page read and write
1158D000
unkown
page readonly
33BF000
stack
page read and write
28EC000
stack
page read and write
2432000
unkown
page readonly
63E000
heap
page read and write
22019484000
heap
page read and write
2050000
unkown
page readonly
641000
heap
page read and write
10EE5000
unkown
page readonly
2B68000
unkown
page readonly
47E000
unkown
page readonly
10385000
unkown
page write copy
119FD000
unkown
page readonly
4E0000
heap
page read and write
A18000
direct allocation
page read and write
2201DFB0000
trusted library allocation
page read and write
2910000
heap
page read and write
2201B424000
heap
page read and write
2201B3F9000
heap
page read and write
22D4C780000
heap
page read and write
2201944F000
heap
page read and write
79E000
stack
page read and write
A7C000
direct allocation
page read and write
23A4000
unkown
page readonly
2201B523000
heap
page read and write
197000
stack
page read and write
2201B50B000
heap
page read and write
63E000
heap
page read and write
62EC000
stack
page read and write
2201B58D000
heap
page read and write
4720000
heap
page read and write
1142A000
unkown
page readonly
27CD000
unkown
page readonly
2201948A000
heap
page read and write
6A48000
heap
page read and write
1F0000
heap
page read and write
117C5000
unkown
page readonly
2201B3F4000
heap
page read and write
73FD000
heap
page read and write
660000
unkown
page read and write
61AF000
heap
page read and write
11928000
unkown
page readonly
1C27000
unkown
page readonly
1F0000
heap
page read and write
1205E000
unkown
page readonly
5878000
heap
page read and write
780000
heap
page read and write
4E0000
unkown
page readonly
22D4C570000
heap
page read and write
101A0000
unkown
page execute read
B83000
heap
page read and write
2DE7000
unkown
page readonly
11D98000
unkown
page readonly
1037E000
unkown
page read and write
2B20000
heap
page read and write
10385000
unkown
page write copy
19A8000
unkown
page readonly
6E0000
heap
page read and write
12208000
unkown
page readonly
187B000
unkown
page readonly
2201B424000
heap
page read and write
2340000
direct allocation
page execute and read and write
110D6000
unkown
page readonly
2507000
unkown
page readonly
2201947B000
heap
page read and write
604C000
heap
page read and write
1189A000
unkown
page readonly
222D000
direct allocation
page read and write
1EA6000
unkown
page readonly
4E0000
unkown
page readonly
12D24000
unkown
page readonly
2C84000
unkown
page readonly
85F000
stack
page read and write
10E57000
unkown
page readonly
114B8000
unkown
page readonly
2201B413000
heap
page read and write
21B3000
unkown
page readonly
610B000
stack
page read and write
11355000
unkown
page readonly
100D6000
unkown
page execute read
22CF000
unkown
page readonly
2ABE000
stack
page read and write
22019496000
heap
page read and write
2F03000
unkown
page readonly
64BC000
heap
page read and write
63C000
heap
page read and write
11048000
unkown
page readonly
2201B42D000
heap
page read and write
11EB4000
unkown
page readonly
AE0000
heap
page read and write
2201DC90000
heap
page read and write
2201DCC9000
heap
page read and write
120EC000
unkown
page readonly
1CB5000
unkown
page readonly
6780000
heap
page read and write
2DA0000
unkown
page readonly
10E9E000
unkown
page readonly
1E5F000
unkown
page readonly
47B000
unkown
page write copy
401000
unkown
page execute read
635000
heap
page read and write
21FA000
unkown
page readonly
12324000
unkown
page readonly
2A9E000
stack
page read and write
489000
remote allocation
page execute and read and write
2201B435000
heap
page read and write
1139C000
unkown
page readonly
27CD000
unkown
page readonly
2510000
heap
page read and write
2201B50B000
heap
page read and write
480000
unkown
page readonly
748B000
heap
page read and write
91F000
stack
page read and write
2201B56A000
heap
page read and write
114FF000
unkown
page readonly
1108F000
unkown
page readonly
1A36000
unkown
page readonly
8EF000
stack
page read and write
10297000
unkown
page execute read
A49000
direct allocation
page read and write
A58000
direct allocation
page read and write
11B60000
unkown
page readonly
717531E000
stack
page read and write
2F91000
unkown
page readonly
1217A000
unkown
page readonly
11048000
unkown
page readonly
A24000
direct allocation
page read and write
10FBA000
unkown
page readonly
6E0000
heap
page read and write
2201B50D000
heap
page read and write
5BBB000
heap
page read and write
11737000
unkown
page readonly
2201B566000
heap
page read and write
6FD4000
heap
page read and write
101A0000
unkown
page execute read
5BBB000
heap
page read and write
637000
heap
page read and write
5D92000
heap
page read and write
20DE000
unkown
page readonly
729A000
heap
page read and write
21B3000
unkown
page readonly
11F89000
unkown
page readonly
11C35000
unkown
page readonly
11CC3000
unkown
page readonly
6168000
heap
page read and write
2201B5AE000
heap
page read and write
21A0000
heap
page read and write
3352000
heap
page read and write
2E75000
unkown
page readonly
101E9000
unkown
page execute read
216C000
unkown
page readonly
2201B584000
heap
page read and write
51E000
stack
page read and write
11B19000
unkown
page readonly
2201B5D8000
heap
page read and write
400000
unkown
page readonly
99F000
stack
page read and write
71756FC000
stack
page read and write
66F4000
heap
page read and write
2201AE95000
heap
page read and write
11E6D000
unkown
page readonly
2201B408000
heap
page read and write
2201B513000
heap
page read and write
2F4A000
unkown
page readonly
66E000
stack
page read and write
2595000
unkown
page readonly
19C000
stack
page read and write
2201B42D000
heap
page read and write
47E000
unkown
page readonly
19C000
stack
page read and write
A34000
direct allocation
page read and write
A70000
heap
page read and write
6DE3000
heap
page read and write
111F2000
unkown
page readonly
6EFF000
heap
page read and write
2C3D000
unkown
page readonly
2A05000
unkown
page readonly
22019483000
heap
page read and write
2549000
stack
page read and write
D7E000
stack
page read and write
5BCE000
heap
page read and write
101E9000
unkown
page execute read
2ADA000
unkown
page readonly
480000
unkown
page readonly
2A00000
heap
page read and write
4F0000
heap
page read and write
44A000
unkown
page readonly
717577E000
stack
page read and write
2201B41A000
heap
page read and write
6D8000
heap
page read and write
63C000
heap
page read and write
10D82000
unkown
page readonly
2097000
unkown
page readonly
11239000
unkown
page readonly
2201B41A000
heap
page read and write
10383000
unkown
page read and write
6D4E000
heap
page read and write
2201B3FB000
heap
page read and write
1FC2000
unkown
page readonly
400000
remote allocation
page execute and read and write
5F6000
heap
page read and write
2201B413000
heap
page read and write
100D6000
unkown
page execute read
1B0B000
unkown
page readonly
5F6000
heap
page read and write
1037E000
unkown
page read and write
2201AE90000
heap
page read and write
2201B575000
heap
page read and write
550000
heap
page read and write
5875000
heap
page read and write
115D4000
unkown
page readonly
2201B568000
heap
page read and write
192000
stack
page read and write
7137000
heap
page read and write
28C7000
direct allocation
page execute and read and write
10299000
unkown
page readonly
6093000
heap
page read and write
11001000
unkown
page readonly
7A6000
heap
page read and write
400000
unkown
page readonly
2D2C000
stack
page read and write
1DD1000
unkown
page readonly
10D3B000
unkown
page readonly
2201B424000
heap
page read and write
B83000
heap
page read and write
2F4A000
unkown
page readonly
5F6000
heap
page read and write
5D90000
heap
page read and write
2A93000
unkown
page readonly
5E5000
heap
page read and write
1AC4000
unkown
page readonly
224B000
direct allocation
page read and write
6645000
heap
page read and write
22D4C578000
heap
page read and write
113E3000
unkown
page readonly
6312000
heap
page read and write
119B6000
unkown
page readonly
400000
unkown
page readonly
2479000
unkown
page readonly
5CD1000
heap
page read and write
11164000
unkown
page readonly
7D7000
heap
page read and write
11662000
unkown
page readonly
324E000
stack
page read and write
2201B5A4000
heap
page read and write
2201B409000
heap
page read and write
111AB000
unkown
page readonly
12324000
unkown
page readonly
1108F000
unkown
page readonly
1D8A000
unkown
page readonly
5E8C000
heap
page read and write
122DD000
unkown
page readonly
1F0000
heap
page read and write
24E0000
heap
page read and write
5E46000
heap
page read and write
197000
stack
page read and write
6284000
heap
page read and write
2201B528000
heap
page read and write
2201B429000
heap
page read and write
721000
heap
page read and write
A91000
direct allocation
page read and write
2201B50D000
heap
page read and write
10187000
unkown
page execute read
220194BB000
heap
page read and write
6666000
heap
page read and write
10116000
unkown
page execute read
2EBC000
unkown
page readonly
48C000
unkown
page execute read
633000
heap
page read and write
2DA0000
unkown
page readonly
2201B40F000
heap
page read and write
641000
heap
page read and write
12017000
unkown
page readonly
7A3000
heap
page read and write
67BD000
heap
page read and write
10187000
unkown
page execute read
63E000
heap
page read and write
2201B591000
heap
page read and write
11A44000
unkown
page readonly
2201947C000
heap
page read and write
5F6000
heap
page read and write
79D000
heap
page read and write
11FD0000
unkown
page readonly
120EC000
unkown
page readonly
120EC000
unkown
page readonly
6EB8000
heap
page read and write
2470000
heap
page read and write
1111D000
unkown
page readonly
10382000
unkown
page write copy
717E000
heap
page read and write
116F0000
unkown
page readonly
285B000
unkown
page readonly
11A44000
unkown
page readonly
11C35000
unkown
page readonly
47E000
unkown
page readonly
6591000
heap
page read and write
2201944D000
heap
page read and write
2201B43E000
heap
page read and write
There are 1294 hidden memdumps, click here to show them.