IOC Report
midyear_statement.exe

loading gif

Files

File Path
Type
Category
Malicious
midyear_statement.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\Public\Dhuirrkw.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Dhuirrkw.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Dhuirrkw.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Windows \System32\2506803.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows \System32\netutils.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\Null
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3luth4im.4e3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cciqjdho.kwp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_imfx2ezv.jpo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5tomrjh.33x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv348F.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xbda68b75, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\jshsresovzeecssjzbcdvgiytb
Unicode text, UTF-16, little-endian text, with no line terminators
modified
C:\Windows \System32\KDECO.bat
DOS batch file, Unicode text, UTF-8 text, with very long lines (432), with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\midyear_statement.exe
"C:\Users\user\Desktop\midyear_statement.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c mkdir "\\?\C:\Windows "
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c mkdir "\\?\C:\Windows \System32"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c "C:\Windows \System32\2506803.exe"
malicious
C:\Windows \System32\2506803.exe
"C:\Windows \System32\2506803.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
malicious
C:\Windows\System32\cmd.exe
cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\midyear_statement.exe C:\\Users\\Public\\Libraries\\Dhuirrkw.PIF
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
C:\Users\Public\Libraries\wkrriuhD.pif
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
C:\Users\Public\Libraries\wkrriuhD.pif /stext "C:\Users\user\AppData\Local\Temp\jshsresovzeecssjzbcdvgiytb"
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
C:\Users\Public\Libraries\wkrriuhD.pif /stext "C:\Users\user\AppData\Local\Temp\tumlrwcijhwjehgnqmoeyldobicnm"
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
C:\Users\Public\Libraries\wkrriuhD.pif /stext "C:\Users\user\AppData\Local\Temp\vozespnjxpoopncrzwbyjypxcpmofmxl"
malicious
C:\Users\Public\Libraries\Dhuirrkw.PIF
"C:\Users\Public\Libraries\Dhuirrkw.PIF"
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
C:\Users\Public\Libraries\wkrriuhD.pif
malicious
C:\Users\Public\Libraries\Dhuirrkw.PIF
"C:\Users\Public\Libraries\Dhuirrkw.PIF"
malicious
C:\Users\Public\Libraries\wkrriuhD.pif
C:\Users\Public\Libraries\wkrriuhD.pif
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://geoplugin.net/json.gp/C
unknown
malicious
xwww.zuckdgreb.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://onedrive.live.com/download?resid=653A5056738F1A02%21264&authkey=!AJnxVlB06nkVKsk
13.107.139.11
https://fp-afd.azurefd.us/apc/trans.gif?a2555e10569a45fe03b885d268c50da9
unknown
http://www.imvu.comr
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://abpoxw.sn.files.1drv.com:443/y4maSSmIiFxHS53VrMh0Wc-KmE9UNGqFMoeO06mE8M1WEFsDmr1AeIzN4LcJU6c
unknown
https://abqscw.sn.files.1drv.com/y4mM5VAFczkoUgXiRkT2NbXnlBwvzcPuKz5AwJErjUwbkEuoWmzy8jSXGy266gPIcJH
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://aborlw.sn.files.1drv.com/y4mdIO5pciNH8fpwGOAAIADTo3pXjwRKPU-X6-J-zpDME1cfDB5-C-zJvJ0Zyx9NPNN
unknown
https://onedrive.live.com/download?resid=653A5056738F1A02%21262&authkey=!ANnz1a3_33sd8v4
13.107.139.11
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?c2fcd52267835a3e34f9ac05
unknown
https://abpoxw.sn.files.1drv.com/y4mVdi6rp2qkaaDX5Txipl4hmgaKma0en0K10OdbofbDqqNgddkNvfFr34Mxc3bQcF3
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://abqscw.sn.files.1drv.com/
unknown
https://onedrive.live.com/
unknown
https://onedrive.live.com/download?resid=653A5056738F1A02%21262&authkey=
unknown
https://www.google.com
unknown
https://abpoxw.sn.files.1drv.com/y4mhwTfeKQ4eY5KLg3nmxa_boO0q7i2wmVFOUDCXUh0ad78865G9-BX4CJ3kGlJVsre
unknown
https://fp-afd.azurefd.us/apc/trans.gif?69c749c200c753dfb00f5bc8299ab8eb
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://live.com/
unknown
https://login.yahoo.com/config/login
unknown
https://abpoxw.sn.files.1drv.com:443/y4ms4H1tLcGEiSUU0ZXyS-1UhN1A1nY0HWv2H1VcTggiyFj5GyqXlnGNUvRGU1y
unknown
http://www.nirsoft.net/
unknown
https://onedrive.live.com/download?resid=653A5056738F1A02%21263&authkey=
unknown
https://aborlw.sn.files.1drv.com/y4mhPCChdz-WmirIkiDV2ww7X8Bbd2o2c6Warvjl_dk_jMmN6VWuryzdoRm3kPHX80_
unknown
https://onedrive.live.co
unknown
https://aborlw.sn.files.1drv.com/
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://abqscw.sn.files.1drv.com/y4mu3pWdZcj6Ve9WuLc8z50Ki8byXob_qMUj9cAdyMI-JlRVlQqz67Is5cy4lCX-g6M
unknown
https://www.office.com/
unknown
https://live.com/W
unknown
https://sectigo.com/CPS0
unknown
https://live.com/X
unknown
http://geoplugin.net/json.gpl
unknown
https://abpoxw.sn.files.1drv.com:443/y4mhwTfeKQ4eY5KLg3nmxa_boO0q7i2wmVFOUDCXUh0ad78865G9-BX4CJ3kGlJ
unknown
http://www.imvu.com
unknown
https://abpoxw.sn.files.1drv.com/y4maSSmIiFxHS53VrMh0Wc-KmE9UNGqFMoeO06mE8M1WEFsDmr1AeIzN4LcJU6cd0Kw
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://aborlw.sn.files.1drv.com/o
unknown
http://www.imvu.comppData
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://abqscw.sn.files.1drv.com:443/y4mu3pWdZcj6Ve9WuLc8z50Ki8byXob_qMUj9cAdyMI-JlRVlQqz67Is5cy4lCX
unknown
https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?bd78002c55888096ce060c58
unknown
https://onedrive.live.com/download?resid=653A5056738F1A02%21264&authkey=
unknown
http://geoplugin.net/json.gpSystem32
unknown
https://aborlw.sn.files.1drv.com/y4mLOg16uNX2Id3t-nfFLVYL7CZhAgTRemSr1q_NX-Mvx_fpOOS9Dz7js9NACEXeYp5
unknown
http://geoplugin.net/
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://aborlw.sn.files.1drv.com/y4mXBt2sSJKJZHlLzI8sH3PFmgRqsPoY_FaTasOJSi4WNTk8bd6AgZ1TzwzQWZ2uDij
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://live.com/a
unknown
https://www.google.com/accounts/servicelogin
unknown
https://live.com/g
unknown
https://onedrive.live.com/download?resid=653A5056738F1A02%21263&authkey=!AN5i5LusLT79ejg
13.107.139.11
https://abpoxw.sn.files.1drv.com/y4ms4H1tLcGEiSUU0ZXyS-1UhN1A1nY0HWv2H1VcTggiyFj5GyqXlnGNUvRGU1yWLZH
unknown
https://abpoxw.sn.files.1drv.com/
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
http://www.ebuddy.com
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.zuckdgreb.duckdns.org
192.3.109.132
malicious
dual-spov-0006.spov-msedge.net
13.107.139.11
geoplugin.net
178.237.33.50
onedrive.live.com
unknown
abpoxw.sn.files.1drv.com
unknown
aborlw.sn.files.1drv.com
unknown
abqscw.sn.files.1drv.com
unknown

IPs

IP
Domain
Country
Malicious
192.3.109.132
www.zuckdgreb.duckdns.org
United States
malicious
13.107.139.11
dual-spov-0006.spov-msedge.net
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Dhuirrkw
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-W5UGP5
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-W5UGP5
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-W5UGP5
time

Memdumps

Base Address
Regiontype
Protect
Malicious
7FD60000
direct allocation
page read and write
malicious
12330000
direct allocation
page execute and read and write
malicious
13EEF000
stack
page read and write
malicious
40A1000
direct allocation
page execute read
malicious
590000
remote allocation
page execute and read and write
malicious
124A0000
heap
page read and write
malicious
24140000
direct allocation
page execute and read and write
malicious
590000
remote allocation
page execute and read and write
malicious
1245D000
heap
page read and write
malicious
2A46000
direct allocation
page read and write
malicious
2656000
direct allocation
page read and write
malicious
4F0000
direct allocation
page execute and read and write
malicious
1248D000
heap
page read and write
malicious
4171000
direct allocation
page execute read
malicious
2427B000
heap
page read and write
malicious
124A0000
heap
page read and write
malicious
590000
remote allocation
page execute and read and write
malicious
40F1000
direct allocation
page execute read
malicious
244BA000
heap
page read and write
malicious
7EB000
heap
page read and write
789000
heap
page read and write
80D000
heap
page read and write
A53000
heap
page read and write
15F3F000
heap
page read and write
21F6000
heap
page read and write
568000
direct allocation
page execute and read and write
2370000
heap
page read and write
400000
system
page execute and read and write
675000
heap
page read and write
2AAE000
stack
page read and write
28AC000
heap
page read and write
7F1FF000
direct allocation
page read and write
416000
unkown
page readonly
41D0000
direct allocation
page execute and read and write
1441E000
stack
page read and write
21F6000
heap
page read and write
15C44000
heap
page read and write
2AA0000
trusted library allocation
page read and write
82F000
heap
page read and write
124CA000
heap
page read and write
124CA000
heap
page read and write
25B1000
heap
page read and write
2B6F000
stack
page read and write
25B1000
heap
page read and write
1EFA3E60000
heap
page read and write
1AB787F0000
heap
page readonly
40CC000
direct allocation
page read and write
28A8000
heap
page read and write
7ECF0000
direct allocation
page read and write
9C000
stack
page read and write
15E86000
heap
page read and write
594000
heap
page read and write
7ED00000
direct allocation
page read and write
15BFA000
heap
page read and write
26BC2102000
heap
page read and write
2B86000
direct allocation
page read and write
2640000
heap
page read and write
540000
heap
page read and write
4F0000
heap
page read and write
1549F000
stack
page read and write
7EC80000
direct allocation
page read and write
8A7000
heap
page read and write
21F0000
heap
page read and write
16039000
heap
page read and write
842000
heap
page read and write
594000
heap
page read and write
E7FBBFE000
stack
page readonly
401000
unkown
page execute read
5EE000
stack
page read and write
1EFA3E63000
heap
page read and write
28AC000
heap
page read and write
15CE8000
heap
page read and write
22ED000
direct allocation
page read and write
22D2000
direct allocation
page read and write
26BC2615000
heap
page read and write
3B7C000
direct allocation
page read and write
14FEF000
stack
page read and write
503000
unkown
page read and write
28A1000
heap
page read and write
2DBF000
stack
page read and write
7EC4F000
direct allocation
page read and write
65E000
stack
page read and write
798000
heap
page read and write
2906000
heap
page read and write
15C60000
unclassified section
page execute and read and write
674000
heap
page read and write
15930000
remote allocation
page read and write
960000
heap
page read and write
1EFA3E30000
heap
page read and write
836000
heap
page read and write
7CF000
heap
page read and write
2303000
direct allocation
page read and write
21ED000
heap
page read and write
818000
heap
page read and write
7F550000
direct allocation
page read and write
21FA000
heap
page read and write
7EC30000
direct allocation
page read and write
594000
heap
page read and write
2311000
direct allocation
page read and write
27AE000
stack
page read and write
28A7000
heap
page read and write
21F6000
heap
page read and write
7F2000
heap
page read and write
15BF0000
heap
page read and write
24310000
heap
page read and write
7D1000
heap
page read and write
827000
heap
page read and write
833000
heap
page read and write
710000
heap
page read and write
28B9000
heap
page read and write
2906000
heap
page read and write
7D1000
heap
page read and write
28AF000
unkown
page read and write
7E0000
heap
page read and write
292C000
stack
page read and write
28AC000
heap
page read and write
401000
unkown
page execute read
15BE0000
heap
page read and write
7C4000
heap
page read and write
2906000
heap
page read and write
21F8000
heap
page read and write
400000
unkown
page readonly
674000
heap
page read and write
2702000
direct allocation
page read and write
21E0000
heap
page read and write
21F8000
heap
page read and write
804000
heap
page read and write
7B6000
heap
page read and write
22AC000
direct allocation
page read and write
7FD000
heap
page read and write
79C000
heap
page read and write
793000
heap
page read and write
2A80000
direct allocation
page read and write
1BC000
stack
page read and write
290E000
stack
page read and write
28A8000
direct allocation
page read and write
77D000
heap
page read and write
2743000
direct allocation
page read and write
675000
heap
page read and write
156CE000
stack
page read and write
76B000
heap
page read and write
21E1000
heap
page read and write
7F639000
direct allocation
page read and write
2906000
heap
page read and write
7E7000
heap
page read and write
90E000
heap
page read and write
A5C000
heap
page read and write
28E8000
heap
page read and write
1EFA3E3B000
heap
page read and write
28C9000
heap
page read and write
26BC2600000
heap
page read and write
8C2000
heap
page read and write
7EAF0000
direct allocation
page read and write
2734000
direct allocation
page read and write
21F5000
heap
page read and write
54E000
stack
page read and write
806000
heap
page read and write
26BC2013000
heap
page read and write
4CB0000
heap
page read and write
8A3000
heap
page read and write
836000
heap
page read and write
3C28000
direct allocation
page read and write
15F36000
heap
page read and write
8BB000
heap
page read and write
15861000
heap
page read and write
124CA000
heap
page read and write
7FB20000
direct allocation
page read and write
28B9000
heap
page read and write
660000
heap
page read and write
7FD30000
direct allocation
page read and write
2650000
heap
page read and write
21F8000
heap
page read and write
7FD50000
direct allocation
page read and write
7FCB0000
direct allocation
page read and write
3C19000
direct allocation
page read and write
590000
heap
page read and write
21F8000
heap
page read and write
124A0000
heap
page read and write
838000
heap
page read and write
28A1000
heap
page read and write
15F25000
heap
page read and write
96D000
heap
page read and write
620000
remote allocation
page execute and read and write
231A000
direct allocation
page read and write
2906000
heap
page read and write
15660000
heap
page read and write
1AB786F0000
heap
page read and write
2293000
direct allocation
page read and write
401000
unkown
page execute read
25B0000
heap
page read and write
7F20F000
direct allocation
page read and write
470000
heap
page read and write
670000
heap
page read and write
14641000
direct allocation
page execute and read and write
28B6000
direct allocation
page read and write
400000
system
page execute and read and write
1EFA406C000
heap
page read and write
5D718FE000
stack
page read and write
81D000
heap
page read and write
53E000
stack
page read and write
124CA000
heap
page read and write
77F000
heap
page read and write
1AB786A0000
heap
page read and write
AA9000
heap
page read and write
2304000
direct allocation
page read and write
7BA000
heap
page read and write
28DB000
heap
page read and write
242BE000
stack
page read and write
124CA000
heap
page read and write
124E9000
heap
page read and write
674000
heap
page read and write
157CD000
stack
page read and write
610000
heap
page read and write
28B9000
heap
page read and write
15BDF000
stack
page read and write
28CD000
heap
page read and write
21F8000
heap
page read and write
45D000
system
page execute and read and write
15F4A000
heap
page read and write
5B7000
heap
page read and write
7ECD0000
direct allocation
page read and write
96D000
heap
page read and write
2906000
heap
page read and write
2C2E000
stack
page read and write
77F000
stack
page read and write
15BCD000
stack
page read and write
675000
heap
page read and write
1EFA3E60000
heap
page read and write
7F27F000
direct allocation
page read and write
832000
heap
page read and write
21E1000
heap
page read and write
15F47000
heap
page read and write
7C0000
remote allocation
page execute and read and write
61E000
stack
page read and write
85C000
heap
page read and write
28B9000
heap
page read and write
80F000
heap
page read and write
650000
heap
page read and write
8F7000
heap
page read and write
77C000
heap
page read and write
7F2A0000
direct allocation
page read and write
7A0000
remote allocation
page execute and read and write
28D6000
heap
page read and write
123FE000
stack
page read and write
241B4000
direct allocation
page execute and read and write
124E0000
heap
page read and write
28AC000
heap
page read and write
674000
heap
page read and write
613C9000
unkown
page readonly
15A80000
heap
page read and write
2223000
heap
page read and write
1625B000
heap
page read and write
9C000
stack
page read and write
1EFA3E00000
heap
page read and write
28B9000
heap
page read and write
12560000
heap
page read and write
124BD000
heap
page read and write
7ED4F000
direct allocation
page read and write
7EB70000
direct allocation
page read and write
2906000
heap
page read and write
1EFA3E60000
heap
page read and write
848000
heap
page read and write
27AE000
heap
page read and write
7F2F0000
direct allocation
page read and write
7B1000
heap
page read and write
8BE000
heap
page read and write
400000
unkown
page readonly
4100000
direct allocation
page execute and read and write
19D000
stack
page read and write
22E0000
direct allocation
page read and write
28A8000
heap
page read and write
416000
unkown
page readonly
1250A000
heap
page read and write
3F2E000
stack
page read and write
9C000
stack
page read and write
12522000
heap
page read and write
400000
unkown
page readonly
2906000
heap
page read and write
674000
heap
page read and write
28AC000
heap
page read and write
674000
heap
page read and write
220E000
heap
page read and write
838000
heap
page read and write
AAA000
heap
page read and write
7F6000
heap
page read and write
28A7000
heap
page read and write
22D0000
direct allocation
page read and write
416000
unkown
page readonly
8CC000
heap
page read and write
124E0000
heap
page read and write
21F1000
heap
page read and write
2350000
heap
page read and write
827000
heap
page read and write
7CC000
heap
page read and write
780000
heap
page read and write
27A1000
heap
page read and write
28AA000
heap
page read and write
15D0F000
heap
page read and write
503000
unkown
page read and write
3C36000
direct allocation
page read and write
7C4000
heap
page read and write
224C000
stack
page read and write
22F4000
direct allocation
page read and write
820000
heap
page read and write
7C8000
heap
page read and write
1EFA3E60000
heap
page read and write
15CBC000
heap
page read and write
13F2C000
stack
page read and write
806000
heap
page read and write
41AD000
direct allocation
page read and write
823000
heap
page read and write
8D2000
heap
page read and write
7ECFF000
direct allocation
page read and write
2906000
heap
page read and write
15BF5000
heap
page read and write
27D3000
heap
page read and write
15A9F000
stack
page read and write
8B2000
heap
page read and write
22C9000
direct allocation
page read and write
78E000
heap
page read and write
7FCD0000
direct allocation
page read and write
2906000
heap
page read and write
1628A000
heap
page read and write
21F1000
heap
page read and write
21F5000
heap
page read and write
28C4000
direct allocation
page read and write
1EFA3E63000
heap
page read and write
7D9000
heap
page read and write
28A9000
heap
page read and write
28FC000
heap
page read and write
2906000
heap
page read and write
594000
heap
page read and write
28D0000
heap
page read and write
775000
heap
page read and write
730000
heap
page read and write
8EE000
heap
page read and write
963000
heap
page read and write
78C000
heap
page read and write
15C05000
heap
page read and write
7FD30000
direct allocation
page read and write
13FD0000
heap
page read and write
40D000
unkown
page write copy
7ED00000
direct allocation
page read and write
3C12000
direct allocation
page read and write
28A8000
heap
page read and write
28B0000
heap
page read and write
821000
heap
page read and write
784000
heap
page read and write
26F7000
direct allocation
page read and write
564000
direct allocation
page execute and read and write
AD8CAFE000
stack
page read and write
462000
unkown
page read and write
15BF6000
heap
page read and write
28B1000
heap
page read and write
2BB8000
direct allocation
page read and write
8AE000
heap
page read and write
788000
heap
page read and write
124E0000
heap
page read and write
28A9000
heap
page read and write
2906000
heap
page read and write
160C7000
heap
page read and write
1EFA3E60000
heap
page read and write
155B8000
heap
page read and write
2530000
heap
page read and write
7ED00000
direct allocation
page read and write
675000
heap
page read and write
41F4000
direct allocation
page read and write
15BD6000
heap
page read and write
1F0000
heap
page read and write
8F7000
heap
page read and write
645000
heap
page read and write
650000
heap
page read and write
7BA000
heap
page read and write
768000
heap
page read and write
821000
heap
page read and write
1558E000
stack
page read and write
2A60000
heap
page read and write
600000
trusted library allocation
page read and write
2236000
heap
page read and write
15540000
heap
page read and write
1EFA3E60000
heap
page read and write
501000
unkown
page read and write
A1F000
stack
page read and write
12450000
heap
page read and write
628000
heap
page read and write
AA0000
heap
page read and write
459000
system
page execute and read and write
41CC000
direct allocation
page read and write
28A9000
heap
page read and write
15661000
heap
page read and write
28A1000
heap
page read and write
3C53000
direct allocation
page read and write
910000
heap
page read and write
22A3000
direct allocation
page read and write
3C5A000
direct allocation
page read and write
28AC000
heap
page read and write
28A0000
heap
page read and write
7F6000
heap
page read and write
4150000
direct allocation
page execute and read and write
7ECCF000
direct allocation
page read and write
2BB1000
direct allocation
page read and write
857000
heap
page read and write
74A000
heap
page read and write
15A5E000
stack
page read and write
1458D000
unclassified section
page execute and read and write
26C2000
heap
page read and write
630000
heap
page read and write
7DD000
heap
page read and write
15A7F000
stack
page read and write
124BD000
heap
page read and write
28CC000
heap
page read and write
78C000
heap
page read and write
400000
unkown
page readonly
2906000
heap
page read and write
594000
heap
page read and write
3EEF000
stack
page read and write
26BC2602000
heap
page read and write
124CA000
heap
page read and write
2417E000
stack
page read and write
1581E000
stack
page read and write
2C8E000
stack
page read and write
7F140000
direct allocation
page read and write
21E0000
heap
page read and write
7A1000
heap
page read and write
50A000
unkown
page readonly
1AB786C0000
heap
page read and write
21F8000
heap
page read and write
21E9000
heap
page read and write
7ECFF000
direct allocation
page read and write
21FA000
heap
page read and write
8A2000
heap
page read and write
675000
heap
page read and write
28BC000
heap
page read and write
124F2000
heap
page read and write
21F8000
heap
page read and write
2BAF000
stack
page read and write
14589000
unclassified section
page execute and read and write
21F8000
heap
page read and write
6FE000
stack
page read and write
28C6000
heap
page read and write
28AC000
heap
page read and write
15AEE000
stack
page read and write
420000
heap
page read and write
7ECFF000
direct allocation
page read and write
22E8000
direct allocation
page read and write
1EFA3E60000
heap
page read and write
1636C000
heap
page read and write
7FE40000
direct allocation
page read and write
256E000
stack
page read and write
156DE000
stack
page read and write
613CA000
unkown
page read and write
7DE000
heap
page read and write
8FF000
heap
page read and write
2BEE000
stack
page read and write
21F6000
heap
page read and write
2260000
heap
page read and write
660000
heap
page read and write
2B78000
direct allocation
page read and write
7ECF0000
direct allocation
page read and write
6E0000
heap
page read and write
15F3B000
heap
page read and write
229C000
direct allocation
page read and write
15BD6000
heap
page read and write
907000
heap
page read and write
21E0000
heap
page read and write
1EFA3E60000
heap
page read and write
21EC000
heap
page read and write
7F1A0000
direct allocation
page read and write
7F501000
direct allocation
page read and write
277C000
heap
page read and write
124E0000
heap
page read and write
25E0000
heap
page read and write
272D000
direct allocation
page read and write
1EFA3E60000
heap
page read and write
27A0000
heap
page read and write
828000
heap
page read and write
600000
heap
page read and write
8B8000
heap
page read and write
401000
unkown
page execute read
80D000
heap
page read and write
2BB0000
heap
page read and write
15F4F000
heap
page read and write
A3F000
stack
page read and write
21FA000
heap
page read and write
6FE000
stack
page read and write
8C0000
heap
page read and write
12491000
heap
page read and write
414C000
direct allocation
page read and write
2B8D000
direct allocation
page read and write
1250A000
heap
page read and write
1562E000
heap
page read and write
15F30000
heap
page read and write
25ED000
stack
page read and write
1AB786FC000
heap
page read and write
1559E000
stack
page read and write
1F0000
heap
page read and write
460000
heap
page read and write
7E9D0000
direct allocation
page read and write
1614E000
heap
page read and write
610000
heap
page read and write
26BC2100000
heap
page read and write
1F0000
heap
page read and write
808000
heap
page read and write
244A0000
heap
page read and write
7EC000
heap
page read and write
28D7000
heap
page read and write
730000
remote allocation
page execute and read and write
230A000
direct allocation
page read and write
17A000
stack
page read and write
22BC000
direct allocation
page read and write
2313000
direct allocation
page read and write
824000
heap
page read and write
3C68000
direct allocation
page read and write
90E000
heap
page read and write
124E9000
heap
page read and write
22FD000
direct allocation
page read and write
2AAF000
unkown
page read and write
21F8000
heap
page read and write
8E0000
heap
page read and write
8FB000
heap
page read and write
28AA000
heap
page read and write
7F3C0000
direct allocation
page read and write
831000
heap
page read and write
26BC208D000
heap
page read and write
2AA0000
trusted library allocation
page read and write
28B9000
heap
page read and write
2AA0000
trusted library allocation
page read and write
3CAC000
stack
page read and write
220A000
heap
page read and write
651000
heap
page read and write
400000
unkown
page readonly
7EBF0000
direct allocation
page read and write
45C000
system
page execute and read and write
6BD000
heap
page read and write
14640000
direct allocation
page read and write
12522000
heap
page read and write
26BC2590000
trusted library allocation
page read and write
28B1000
heap
page read and write
1451F000
stack
page read and write
15F27000
heap
page read and write
5C1000
heap
page read and write
21F5000
heap
page read and write
7EA70000
direct allocation
page read and write
25AF000
stack
page read and write
21ED000
heap
page read and write
400000
unkown
page readonly
7EB70000
direct allocation
page read and write
28E1000
direct allocation
page read and write
7F7000
heap
page read and write
28B9000
heap
page read and write
124A0000
heap
page read and write
416000
unkown
page readonly
7F070000
direct allocation
page read and write
18F000
stack
page read and write
28C6000
heap
page read and write
818000
heap
page read and write
2AC3000
direct allocation
page read and write
6A0000
remote allocation
page execute and read and write
7FB20000
direct allocation
page read and write
241B8000
direct allocation
page execute and read and write
21FA000
heap
page read and write
15ADE000
stack
page read and write
675000
heap
page read and write
6A0000
heap
page read and write
5BE000
heap
page read and write
193000
stack
page read and write
40A0000
direct allocation
page readonly
7D1000
heap
page read and write
28D4000
heap
page read and write
81F000
stack
page read and write
2A2A000
stack
page read and write
124BD000
heap
page read and write
7EF000
heap
page read and write
E7FBAFE000
stack
page read and write
74E000
heap
page read and write
1593A000
heap
page read and write
7D1000
heap
page read and write
22D8000
direct allocation
page read and write
8CD000
heap
page read and write
2AD0000
heap
page read and write
2906000
heap
page read and write
1EFA3E60000
heap
page read and write
123A4000
direct allocation
page execute and read and write
501000
unkown
page read and write
7FCAF000
direct allocation
page read and write
21E0000
heap
page read and write
7F270000
direct allocation
page read and write
12500000
heap
page read and write
7FF790071000
unkown
page execute read
2810000
heap
page read and write
21E5000
heap
page read and write
28AA000
heap
page read and write
279F000
stack
page read and write
28AC000
heap
page read and write
7FF790070000
unkown
page readonly
7EC90000
direct allocation
page read and write
674000
heap
page read and write
2933000
heap
page read and write
15F42000
heap
page read and write
7A6000
heap
page read and write
FD000
stack
page read and write
1568F000
stack
page read and write
28AA000
heap
page read and write
27D0000
heap
page read and write
7E4000
heap
page read and write
585000
heap
page read and write
24270000
heap
page read and write
7F270000
direct allocation
page read and write
820000
remote allocation
page execute and read and write
821000
heap
page read and write
2906000
heap
page read and write
141DF000
stack
page read and write
40D000
unkown
page write copy
28BA000
heap
page read and write
8B5000
heap
page read and write
28B0000
heap
page read and write
28A9000
heap
page read and write
15CD6000
heap
page read and write
9C000
stack
page read and write
723000
heap
page read and write
462000
unkown
page read and write
28AA000
heap
page read and write
26BC203B000
heap
page read and write
610000
heap
page read and write
2340000
heap
page read and write
7EC90000
direct allocation
page read and write
28AC000
heap
page read and write
740000
direct allocation
page execute and read and write
780000
heap
page read and write
829000
heap
page read and write
22C7000
direct allocation
page read and write
8D6000
heap
page read and write
44B0000
trusted library allocation
page read and write
21E5000
heap
page read and write
1EFA3E60000
heap
page read and write
7F2BF000
direct allocation
page read and write
28AA000
heap
page read and write
780000
heap
page read and write
21F8000
heap
page read and write
2718000
direct allocation
page read and write
15541000
heap
page read and write
124D4000
heap
page read and write
28A7000
heap
page read and write
15D03000
heap
page read and write
613C1000
unkown
page execute read
15939000
heap
page read and write
28B9000
heap
page read and write
2AE0000
heap
page read and write
15CF9000
heap
page read and write
803000
heap
page read and write
501000
unkown
page read and write
28A7000
heap
page read and write
7FF790070000
unkown
page readonly
21EE000
heap
page read and write
21F8000
heap
page read and write
124BD000
heap
page read and write
1F0000
heap
page read and write
68E000
stack
page read and write
2906000
heap
page read and write
22C2000
direct allocation
page read and write
124D2000
heap
page read and write
276E000
unkown
page read and write
15861000
heap
page read and write
1EFA3E60000
heap
page read and write
28D3000
direct allocation
page read and write
21F1000
heap
page read and write
41B000
system
page execute and read and write
16137000
direct allocation
page read and write
40D000
unkown
page write copy
2510000
heap
page read and write
21F8000
heap
page read and write
401000
unkown
page execute read
1461C000
unclassified section
page execute and read and write
1F0000
heap
page read and write
15F2A000
heap
page read and write
1569F000
stack
page read and write
22B7000
direct allocation
page read and write
15F25000
heap
page read and write
2318000
direct allocation
page read and write
804000
heap
page read and write
580000
heap
page read and write
2906000
heap
page read and write
2906000
heap
page read and write
15ACE000
stack
page read and write
E7FB68B000
stack
page read and write
1EFA3E63000
heap
page read and write
58E000
stack
page read and write
143DF000
stack
page read and write
88A000
heap
page read and write
242E0000
heap
page read and write
7EAE0000
direct allocation
page read and write
909000
heap
page read and write
28DA000
direct allocation
page read and write
28A8000
heap
page read and write
845000
heap
page read and write
273C000
direct allocation
page read and write
594000
heap
page read and write
3C44000
direct allocation
page read and write
1559F000
stack
page read and write
401000
unkown
page execute read
912000
heap
page read and write
594000
heap
page read and write
21C0000
heap
page read and write
402F000
stack
page read and write
1251E000
heap
page read and write
416000
unkown
page readonly
16068000
heap
page read and write
416000
unkown
page readonly
19D000
stack
page read and write
28E8000
direct allocation
page read and write
3C3D000
direct allocation
page read and write
1EFA3E60000
heap
page read and write
2AA0000
trusted library allocation
page read and write
1615C000
heap
page read and write
8DE000
heap
page read and write
26BC1E00000
heap
page read and write
157DE000
stack
page read and write
26EA000
direct allocation
page read and write
124E9000
heap
page read and write
24C0000
heap
page read and write
590000
heap
page read and write
2906000
heap
page read and write
419C000
direct allocation
page read and write
21E1000
heap
page read and write
836000
heap
page read and write
7EBCF000
direct allocation
page read and write
25B0000
heap
page read and write
674000
heap
page read and write
7D6000
heap
page read and write
15AA0000
heap
page read and write
8C7000
heap
page read and write
287E000
direct allocation
page read and write
79E000
heap
page read and write
21FA000
heap
page read and write
7E3000
heap
page read and write
7FD30000
direct allocation
page read and write
2AA0000
trusted library allocation
page read and write
400000
unkown
page readonly
1554F000
stack
page read and write
594000
heap
page read and write
2906000
heap
page read and write
82E000
heap
page read and write
7DD000
heap
page read and write
7F440000
direct allocation
page read and write
818000
heap
page read and write
1591D000
stack
page read and write
28C3000
heap
page read and write
15BE0000
heap
page read and write
2650000
heap
page read and write
76F000
stack
page read and write
2906000
heap
page read and write
28B9000
heap
page read and write
2441F000
stack
page read and write
1AB785C0000
heap
page read and write
28CD000
heap
page read and write
97000
stack
page read and write
1603C000
heap
page read and write
AA6000
heap
page read and write
27FC000
direct allocation
page read and write
7E3000
heap
page read and write
15D01000
heap
page read and write
907000
heap
page read and write
21F8000
heap
page read and write
15CD7000
heap
page read and write
913000
heap
page read and write
21ED000
heap
page read and write
2751000
direct allocation
page read and write
1545E000
stack
page read and write
85A000
heap
page read and write
2709000
direct allocation
page read and write
674000
heap
page read and write
21ED000
heap
page read and write
14EEE000
stack
page read and write
8B8000
heap
page read and write
28AC000
heap
page read and write
15BEE000
stack
page read and write
15BF9000
heap
page read and write
16271000
heap
page read and write
7C4000
heap
page read and write
550000
heap
page read and write
28CD000
heap
page read and write
58F000
stack
page read and write
8EE000
heap
page read and write
594000
heap
page read and write
28A1000
heap
page read and write
6A0000
remote allocation
page execute and read and write
613CE000
unkown
page readonly
674000
heap
page read and write
257E000
stack
page read and write
786000
heap
page read and write
2217000
heap
page read and write
26BC2080000
heap
page read and write
40D000
unkown
page write copy
2906000
heap
page read and write
1595E000
stack
page read and write
829000
heap
page read and write
1581E000
stack
page read and write
911000
heap
page read and write
7F440000
direct allocation
page read and write
594000
heap
page read and write
7E0000
heap
page read and write
1F0000
heap
page read and write
1590E000
stack
page read and write
21E5000
heap
page read and write
21E1000
heap
page read and write
21F8000
heap
page read and write
157CC000
heap
page read and write
9C000
stack
page read and write
85D000
heap
page read and write
78F000
heap
page read and write
675000
heap
page read and write
19D000
stack
page read and write
1243C000
stack
page read and write
2E3E000
stack
page read and write
97000
stack
page read and write
7FB20000
direct allocation
page read and write
21F8000
heap
page read and write
83E000
heap
page read and write
7EC90000
direct allocation
page read and write
77C000
heap
page read and write
7F410000
direct allocation
page read and write
473000
system
page execute and read and write
244AB000
heap
page read and write
2780000
direct allocation
page execute and read and write
461000
unkown
page execute read
7ECF0000
direct allocation
page read and write
2906000
heap
page read and write
594000
heap
page read and write
2BAF000
stack
page read and write
7FF79008D000
unkown
page readonly
21EE000
heap
page read and write
27A1000
heap
page read and write
7EC70000
direct allocation
page read and write
80B000
heap
page read and write
28AA000
heap
page read and write
19D000
stack
page read and write
124D4000
heap
page read and write
15930000
remote allocation
page read and write
28CD000
heap
page read and write
2814000
heap
page read and write
19D000
stack
page read and write
6A8000
heap
page read and write
613C0000
unkown
page readonly
840000
heap
page read and write
903000
heap
page read and write
907000
heap
page read and write
7EA60000
direct allocation
page read and write
28A7000
heap
page read and write
8AB000
heap
page read and write
14656000
direct allocation
page execute and read and write
640000
heap
page read and write
2BAA000
direct allocation
page read and write
1FD000
stack
page read and write
7FF79008D000
unkown
page readonly
740000
heap
page read and write
40D000
unkown
page write copy
15BD0000
heap
page read and write
26BC2000000
heap
page read and write
7D0000
heap
page read and write
594000
heap
page read and write
12550000
heap
page read and write
620000
remote allocation
page execute and read and write
1EFA3E63000
heap
page read and write
1EFA4000000
heap
page read and write
145C0000
unclassified section
page execute and read and write
7F1B0000
direct allocation
page read and write
19C000
stack
page read and write
675000
heap
page read and write
7ED4F000
direct allocation
page read and write
2328000
direct allocation
page read and write
7F8000
heap
page read and write
78E000
heap
page read and write
25FE000
unkown
page read and write
123A8000
direct allocation
page execute and read and write
7E3000
heap
page read and write
8DC000
heap
page read and write
1EFA3DD0000
heap
page read and write
21F8000
heap
page read and write
905000
heap
page read and write
15CE9000
heap
page read and write
7EB000
heap
page read and write
26BC2022000
heap
page read and write
7FDB0000
direct allocation
page read and write
7F2000
heap
page read and write
401000
unkown
page execute read
1EFA3E60000
heap
page read and write
2B69000
direct allocation
page read and write
14616000
unclassified section
page execute and read and write
28CD000
heap
page read and write
12491000
heap
page read and write
7E9E0000
direct allocation
page read and write
5B7000
heap
page read and write
2906000
heap
page read and write
674000
heap
page read and write
2930000
heap
page read and write
7FA000
heap
page read and write
83A000
heap
page read and write
124E0000
heap
page read and write
2906000
heap
page read and write
7E9D0000
direct allocation
page read and write
620000
heap
page read and write
28E0000
heap
page read and write
124BD000
heap
page read and write
16036000
heap
page read and write
16170000
heap
page read and write
839000
heap
page read and write
760000
heap
page read and write
674000
heap
page read and write
768000
heap
page read and write
40D000
unkown
page write copy
7EC30000
direct allocation
page read and write
824000
heap
page read and write
1EFA3DE0000
heap
page read and write
228C000
direct allocation
page read and write
28AC000
heap
page read and write
89F000
stack
page read and write
7EC30000
direct allocation
page read and write
2899000
direct allocation
page read and write
124A0000
heap
page read and write
15BD4000
heap
page read and write
412D000
direct allocation
page read and write
8FA000
heap
page read and write
21E0000
heap
page read and write
594000
heap
page read and write
7A9000
heap
page read and write
2236000
heap
page read and write
21EE000
heap
page read and write
21F8000
heap
page read and write
90D000
heap
page read and write
28AE000
heap
page read and write
620000
remote allocation
page execute and read and write
19C000
stack
page read and write
158D9000
heap
page read and write
28B9000
heap
page read and write
401000
unkown
page execute read
220F000
stack
page read and write
7AE000
stack
page read and write
2830000
heap
page read and write
156DA000
heap
page read and write
40D000
unkown
page write copy
2321000
direct allocation
page read and write
15969000
heap
page read and write
8D0000
heap
page read and write
7FC60000
direct allocation
page read and write
21E1000
heap
page read and write
2906000
heap
page read and write
594000
heap
page read and write
1EFA41A9000
heap
page read and write
7F8000
heap
page read and write
16252000
heap
page read and write
7F8000
heap
page read and write
594000
heap
page read and write
5D0000
heap
page read and write
82A000
heap
page read and write
84B000
heap
page read and write
A50000
heap
page read and write
456000
system
page execute and read and write
57E000
stack
page read and write
25CE0000
heap
page read and write
2906000
heap
page read and write
7D2000
heap
page read and write
A5C000
heap
page read and write
42C4000
direct allocation
page read and write
21F1000
heap
page read and write
1EFA3E62000
heap
page read and write
2A6F000
stack
page read and write
400000
unkown
page readonly
155B8000
heap
page read and write
2770000
heap
page read and write
674000
heap
page read and write
795000
heap
page read and write
67E000
stack
page read and write
21EE000
heap
page read and write
28BD000
direct allocation
page read and write
16069000
heap
page read and write
2906000
heap
page read and write
28D6000
heap
page read and write
AAA000
heap
page read and write
1597E000
stack
page read and write
28AA000
heap
page read and write
7FA000
heap
page read and write
2906000
heap
page read and write
7D9000
heap
page read and write
21E9000
heap
page read and write
3DEE000
stack
page read and write
28B9000
heap
page read and write
28B7000
heap
page read and write
7EC00000
direct allocation
page read and write
158D9000
heap
page read and write
2906000
heap
page read and write
1245A000
heap
page read and write
15C01000
heap
page read and write
14530000
unclassified section
page execute and read and write
2427F000
stack
page read and write
2218000
heap
page read and write
26BC2002000
heap
page read and write
15860000
heap
page read and write
594000
heap
page read and write
2CBA000
stack
page read and write
15752000
heap
page read and write
1637F000
heap
page read and write
73F000
stack
page read and write
145A3000
unclassified section
page execute and read and write
25EC000
heap
page read and write
15C7B000
unclassified section
page execute and read and write
7B3000
heap
page read and write
400000
unkown
page readonly
26BC1F00000
heap
page read and write
2AA0000
trusted library allocation
page read and write
1599E000
stack
page read and write
803000
heap
page read and write
1EFA3E5F000
heap
page read and write
1EFA3E60000
heap
page read and write
156DE000
stack
page read and write
674000
heap
page read and write
7F010000
direct allocation
page read and write
7D5000
heap
page read and write
177000
stack
page read and write
8A7000
heap
page read and write
1AB788D0000
heap
page read and write
8FB000
heap
page read and write
81A000
heap
page read and write
13F6E000
stack
page read and write
21F5000
heap
page read and write
21F8000
heap
page read and write
462000
unkown
page write copy
610000
trusted library allocation
page read and write
124D2000
heap
page read and write
157DD000
stack
page read and write
7EA60000
direct allocation
page read and write
1569F000
stack
page read and write
22D0000
heap
page read and write
1ED000
stack
page read and write
2B9C000
direct allocation
page read and write
2906000
heap
page read and write
580000
heap
page read and write
674000
heap
page read and write
401000
unkown
page execute read
1EFA41A0000
heap
page read and write
7FF79008C000
unkown
page write copy
2710000
direct allocation
page read and write
26D3000
direct allocation
page read and write
15CF3000
heap
page read and write
28A9000
heap
page read and write
7F230000
direct allocation
page read and write
416000
unkown
page readonly
274A000
direct allocation
page read and write
5D7187C000
stack
page read and write
8D6000
heap
page read and write
1F0000
heap
page read and write
847000
heap
page read and write
263E000
stack
page read and write
9C000
stack
page read and write
8E0000
heap
page read and write
53E000
stack
page read and write
15D00000
heap
page read and write
720000
heap
page read and write
2201000
heap
page read and write
28D6000
heap
page read and write
5DE000
stack
page read and write
21E0000
heap
page read and write
15BF6000
heap
page read and write
40D000
unkown
page write copy
1EFA3E60000
heap
page read and write
26EC000
direct allocation
page read and write
1544F000
stack
page read and write
1590A000
heap
page read and write
7F2E9000
direct allocation
page read and write
28B9000
heap
page read and write
17C000
stack
page read and write
15752000
heap
page read and write
7F0E0000
direct allocation
page read and write
830000
heap
page read and write
5A0000
heap
page read and write
296F000
unkown
page read and write
7FA000
heap
page read and write
2906000
heap
page read and write
95F000
stack
page read and write
3C61000
direct allocation
page read and write
16063000
heap
page read and write
21EE000
heap
page read and write
7ED4F000
direct allocation
page read and write
7F2000
heap
page read and write
AD8C8FB000
stack
page read and write
782000
heap
page read and write
2906000
heap
page read and write
401000
unkown
page execute read
63F000
heap
page read and write
7FCB0000
direct allocation
page read and write
1F0000
heap
page read and write
5A8000
heap
page read and write
15BF5000
heap
page read and write
124D4000
heap
page read and write
15F36000
heap
page read and write
730000
remote allocation
page execute and read and write
140DF000
stack
page read and write
26BC202B000
heap
page read and write
27D0000
heap
page read and write
580000
heap
page read and write
1EFA3E60000
heap
page read and write
21C0000
direct allocation
page execute and read and write
2B94000
direct allocation
page read and write
800000
heap
page read and write
80F000
heap
page read and write
7FF790071000
unkown
page execute read
26BC204B000
heap
page read and write
27B0000
heap
page read and write
28B9000
heap
page read and write
7F230000
direct allocation
page read and write
40D000
unkown
page write copy
24ED000
stack
page read and write
26BC2113000
heap
page read and write
27A0000
heap
page read and write
2260000
heap
page read and write
77B000
heap
page read and write
1606F000
heap
page read and write
21E1000
heap
page read and write
810000
heap
page read and write
21E1000
heap
page read and write
28A8000
heap
page read and write
21FA000
heap
page read and write
142DF000
stack
page read and write
505000
unkown
page write copy
2320000
heap
page read and write
19A000
stack
page read and write
3BFE000
direct allocation
page read and write
416000
unkown
page readonly
7F0000
heap
page read and write
15F30000
heap
page read and write
81F000
heap
page read and write
21F8000
heap
page read and write
613C5000
unkown
page readonly
28C6000
heap
page read and write
814000
heap
page read and write
15930000
remote allocation
page read and write
80F000
heap
page read and write
814000
heap
page read and write
5D7197E000
stack
page read and write
AD8C9FE000
unkown
page read and write
7A6000
heap
page read and write
720000
remote allocation
page execute and read and write
902000
heap
page read and write
730000
heap
page read and write
2758000
direct allocation
page read and write
1EFA3E60000
heap
page read and write
2906000
heap
page read and write
2906000
heap
page read and write
26BC2064000
heap
page read and write
594000
heap
page read and write
7FF79008C000
unkown
page read and write
674000
heap
page read and write
904000
heap
page read and write
15BEF000
heap
page read and write
22FC000
direct allocation
page read and write
416000
unkown
page readonly
3DAA000
stack
page read and write
82E000
heap
page read and write
26BC1E20000
heap
page read and write
1591E000
stack
page read and write
15C00000
heap
page read and write
124BD000
heap
page read and write
8B1000
heap
page read and write
4244000
direct allocation
page read and write
21BF000
stack
page read and write
22D9000
direct allocation
page read and write
7F2F0000
direct allocation
page read and write
1EFA3E63000
heap
page read and write
27A1000
heap
page read and write
21EE000
heap
page read and write
97000
stack
page read and write
93F000
stack
page read and write
124E5000
heap
page read and write
411C000
direct allocation
page read and write
7C0000
remote allocation
page execute and read and write
1555F000
stack
page read and write
7BF000
heap
page read and write
84B000
heap
page read and write
2DFE000
stack
page read and write
836000
heap
page read and write
400000
unkown
page readonly
15BF7000
heap
page read and write
6BE000
stack
page read and write
6A0000
remote allocation
page execute and read and write
462000
unkown
page read and write
400000
system
page execute and read and write
2BA3000
direct allocation
page read and write
26BC2092000
heap
page read and write
635000
heap
page read and write
7C0000
heap
page read and write
2906000
heap
page read and write
770000
heap
page read and write
500000
heap
page read and write
1603C000
heap
page read and write
230C000
direct allocation
page read and write
1EFA3E60000
heap
page read and write
590000
heap
page read and write
1580E000
stack
page read and write
1F0000
heap
page read and write
250E000
unkown
page read and write
There are 1189 hidden memdumps, click here to show them.