IOC Report

loading gif

Files

File Path
Type
Category
Malicious
W6902.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\gntek[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
downloaded
malicious
C:\Users\user\AppData\Local\Temp\nsjBE61.tmp\npsx.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1D23A896.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\26A1539F.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2C2EB30D.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\491E45A3.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55FB45AA.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68099914.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C3F2A9.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\724DFD67.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83D9E331.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\93337B48.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9FFBE83C.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B25F0F7E.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E6EBE05.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\mgyagjb
data
dropped
C:\Users\user\AppData\Local\Temp\nsjBE60.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\wgtx82tpscdlgb4zlyrg
data
dropped
C:\Users\user\AppData\Local\Temp\~DF053AF007E74E92C3.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF1370C3F6023AC29F.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DF4ACF9BE7D0DFD87B.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF9B5A417AA5C9FB99.TMP
data
dropped
C:\Users\user\Desktop\~$W6902.xlsx
data
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\SysWOW64\msdt.exe
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\Public\vbc.exe"

URLs

Name
IP
Malicious
http://www.zoharfine.com/b80i/?SZ5TuL=WIyhNSWdz3ksnrxMd9FPgtApU7fAeJTF2OsSNfT/loR2Vp0doC/CWPkVmL0jl9ASIxbbNA==&bZ30xx=0lLLAPA89
194.5.156.29
malicious
www.dreamschools.online/b80i/
malicious
http://www.teentykarm.quest/b80i/?SZ5TuL=J+u8pU8GtC7Crrbw9NxHruIy2NemieD/+UtpUO8UjTwhviPWCSXqrJc4wu/Y5neCzW0Lig==&bZ30xx=0lLLAPA89
37.123.118.150
malicious
http://www.927291.com/b80i/?SZ5TuL=UugCFIKTrsouekFBGpmjj1lYYuG7Sqq7seOoZgmvymuhpKhoJBysXVQ1tfM8JEdSTWsNrA==&bZ30xx=0lLLAPA89
1.32.255.137
malicious
http://212.192.246.120/gntek.exe
212.192.246.120
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.mollyagee.com/b80i/?SZ5TuL=XkBoiSzcHlsmqFkYMGKyxhKE5R0ucNDlHWw1mrTAF5aGMvlxAg1/o3H+/I9n3Xzt0JsmTA==&bZ30xx=0lLLAPA89
172.217.168.19
http://www.iis.fhg.de/audioPA
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
https://mollyagee.remax.com/b80i/?SZ5TuL=XkBoiSzcHlsmqFkYMGKyxhKE5R0ucNDlHWw1mrTAF5aGMvlxAg1/o3H
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://servername/isapibackend.dll
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.teentykarm.quest
37.123.118.150
malicious
www.927291.com
1.32.255.137
malicious
zoharfine.com
194.5.156.29
malicious
www.zoharfine.com
unknown
malicious
www.mollyagee.com
unknown
malicious
www.youngliving1.com
unknown
malicious
ghs.googlehosted.com
172.217.168.19
www.frentags.art
44.227.76.166

IPs

IP
Domain
Country
Malicious
212.192.246.120
unknown
Russian Federation
malicious
1.32.255.137
www.927291.com
Singapore
malicious
37.123.118.150
www.teentykarm.quest
United Kingdom
malicious
194.5.156.29
zoharfine.com
Germany
malicious
172.217.168.19
ghs.googlehosted.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
>q.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2DD83
2DD83
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
+y.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32858
32858
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33987
33987
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32858
32858
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
530000
unclassified section
page execute and read and write
malicious
80000
system
page execute and read and write
malicious
97E3000
unkown
page execute and read and write
malicious
220000
unclassified section
page execute and read and write
malicious
97E3000
unkown
page execute and read and write
malicious
4E0000
trusted library allocation
page read and write
malicious
330000
trusted library allocation
page read and write
malicious
2380000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
814000
trusted library allocation
page execute and read and write
4300000
stack
page read and write
3E50000
unkown
page readonly
4C7A000
heap
page read and write
324A000
trusted library allocation
page read and write
2500000
unkown
page readonly
275F000
stack
page read and write
5C0000
trusted library allocation
page execute and read and write
73B9000
stack
page read and write
4B00000
unkown
page readonly
429000
unkown
page read and write
600000
heap
page read and write
330000
unkown
page read and write
447A000
unkown
page read and write
6E18000
stack
page read and write
34E000
unkown
page read and write
1B83000
heap
page read and write
7EFE0000
unkown
page readonly
4220000
unkown
page read and write
3D90000
unkown
page read and write
255000
heap
page read and write
3CC0000
unkown
page readonly
4C70000
heap
page read and write
880000
trusted library allocation
page execute and read and write
422000
unkown
page read and write
729A000
stack
page read and write
401000
unkown
page execute read
2942000
unkown
page read and write
7839000
stack
page read and write
409000
unkown
page write copy
79F0000
heap
page read and write
3C90000
unkown
page read and write
190000
trusted library allocation
page read and write
430000
unkown
page readonly
2F80000
unkown
page read and write
30A8000
stack
page read and write
2540000
unkown
page read and write
834B000
unkown
page read and write
400000
unkown
page readonly
237000
heap
page read and write
50A000
trusted library allocation
page read and write
2740000
unkown
page readonly
1B9B0000
trusted library allocation
page read and write
285F000
stack
page read and write
4B9D000
stack
page read and write
4255000
heap
page read and write
10000
heap
page read and write
2F10000
unkown
page read and write
37E000
unkown
page read and write
4AF0000
unkown
page readonly
3200000
unkown
page read and write
1CE000
stack
page read and write
8355000
unkown
page read and write
A10000
trusted library allocation
page execute and read and write
5B0000
unkown
page readonly
1FC000
stack
page read and write
4D60000
unkown
page readonly
2AE0000
unkown
page readonly
127000
heap
page read and write
6A60000
heap
page read and write
74B4000
heap
page read and write
9362000
unkown
page read and write
243000
heap
page read and write
73B9000
stack
page read and write
45CB000
unkown
page read and write
43B0000
heap
page read and write
230000
heap
page read and write
8720000
unkown
page read and write
32A0000
heap
page read and write
2EF0000
unkown
page read and write
8374000
unkown
page read and write
1B9C4000
trusted library allocation
page read and write
6D48000
stack
page read and write
2960000
trusted library allocation
page read and write
41F0000
stack
page read and write
330000
unkown
page read and write
45BE000
unkown
page read and write
220000
unkown
page readonly
74B0000
heap
page read and write
32A0000
heap
page read and write
27C0000
unkown
page read and write
687000
trusted library allocation
page read and write
20B6000
unkown
page read and write
60000
unkown
page readonly
2550000
unkown
page read and write
4255000
heap
page read and write
2CC7000
unkown
page readonly
73B9000
stack
page read and write
4593000
unkown
page read and write
45D6000
unkown
page read and write
8320000
unkown
page read and write
D0000
unkown
page readonly
20000
unkown
page readonly
980000
trusted library allocation
page execute and read and write
18B000
stack
page read and write
9362000
unkown
page read and write
430000
trusted library allocation
page read and write
4593000
unkown
page read and write
212B000
unkown
page read and write
37E000
unkown
page read and write
324D000
trusted library allocation
page read and write
5360000
unkown
page read and write
2F20000
unkown
page read and write
962F000
stack
page read and write
79C3000
stack
page read and write
3E0000
heap
page read and write
43B0000
heap
page read and write
3290000
unkown
page read and write
3CC0000
unkown
page readonly
3C90000
unkown
page read and write
7B40000
stack
page read and write
4B00000
unkown
page readonly
4DD0000
heap
page read and write
60000
unkown
page readonly
31D000
heap
page read and write
2900000
trusted library allocation
page execute and read and write
213B000
unkown
page read and write
750000
unkown
page readonly
1B8C0000
trusted library allocation
page read and write
2F80000
unkown
page read and write
45CF000
unkown
page read and write
2860000
trusted library allocation
page read and write
45BE000
unkown
page read and write
324A000
trusted library allocation
page read and write
2923000
unkown
page read and write
2704000
trusted library allocation
page execute and read and write
1BA30000
trusted library allocation
page read and write
330000
unkown
page read and write
1B50000
unkown
page read and write
2942000
unkown
page read and write
41F0000
stack
page read and write
407000
unkown
page readonly
2130000
unkown
page read and write
27E0000
unkown
page read and write
2760000
unkown
page readonly
2F00000
unkown
page read and write
4308000
stack
page read and write
59F000
stack
page read and write
20000
heap
page read and write
7EE0000
stack
page read and write
1B8C0000
trusted library allocation
page read and write
226E000
stack
page read and write
7938000
stack
page read and write
25C3000
unkown
page read and write
457A000
unkown
page read and write
430000
unkown
page readonly
10000
heap
page read and write
2580000
unclassified section
page execute and read and write
1B9C7000
trusted library allocation
page read and write
27D0000
unkown
page read and write
3DF8000
unkown
page read and write
93E3000
unkown
page read and write
460000
trusted library allocation
page execute and read and write
263C000
unkown
page read and write
93A0000
unkown
page read and write
1C0000
heap
page read and write
237000
heap
page read and write
79C8000
stack
page read and write
729A000
stack
page read and write
4D60000
unkown
page readonly
4575000
unkown
page read and write
AD000
stack
page read and write
3D50000
unkown
page read and write
324A000
trusted library allocation
page read and write
36B000
unkown
page read and write
2750000
unkown
page read and write
4450000
unkown
page read and write
31E000
stack
page read and write
560000
heap
page read and write
2C7000
heap
page read and write
962F000
stack
page read and write
728E000
stack
page read and write
3250000
unkown
page read and write
457A000
unkown
page read and write
230000
heap
page read and write
3DF8000
unkown
page read and write
1CE000
stack
page read and write
400000
unkown
page readonly
309E000
stack
page read and write
7D20000
heap
page read and write
4D70000
unkown
page readonly
2F00000
unkown
page read and write
263C000
unkown
page read and write
800000
trusted library allocation
page execute and read and write
7B50000
heap
page read and write
81AE000
stack
page read and write
23D000
heap
page read and write
2887000
trusted library allocation
page execute and read and write
7938000
stack
page read and write
449C000
unkown
page read and write
E4000
heap
page read and write
3020000
unkown
page read and write
3CA0000
unkown
page read and write
2610000
trusted library allocation
page execute and read and write
782F000
stack
page read and write
6D48000
stack
page read and write
3D40000
stack
page read and write
5EF000
heap
page read and write
2F70000
unkown
page read and write
30C0000
unkown
page read and write
5E0000
heap
page read and write
2240000
trusted library allocation
page read and write
2F10000
unkown
page read and write
1B9C1000
trusted library allocation
page read and write
243000
heap
page read and write
211B000
unkown
page read and write
401000
unkown
page execute read
F0000
unkown
page read and write
5A0000
trusted library allocation
page execute and read and write
3CA0000
unkown
page read and write
42C000
unkown
page readonly
820000
trusted library allocation
page execute and read and write
1B0000
trusted library allocation
page read and write
5270000
unkown
page execute read
3210000
unkown
page read and write
4E5E000
stack
page read and write
32AE000
heap
page read and write
3EF000
stack
page read and write
4D40000
unkown
page readonly
79C3000
stack
page read and write
5270000
unkown
page execute read
9823000
unkown
page execute and read and write
1E0000
unkown
page read and write
110000
unkown
page read and write
2470000
trusted library allocation
page read and write
890000
trusted library allocation
page execute and read and write
4D50000
unkown
page readonly
73060000
unkown
page readonly
20000
unkown
page readonly
23D000
heap
page read and write
371000
unkown
page read and write
78BE000
stack
page read and write
7839000
stack
page read and write
2550000
unkown
page read and write
32AE000
heap
page read and write
4250000
heap
page read and write
407000
unkown
page readonly
45B4000
unkown
page read and write
241E000
stack
page read and write
213B000
unkown
page read and write
45CF000
unkown
page read and write
7E1E000
stack
page read and write
3CC0000
unkown
page readonly
684000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
4593000
unkown
page read and write
7EE9000
stack
page read and write
2F90000
unkown
page read and write
27E0000
unkown
page read and write
263C000
unkown
page read and write
220000
unkown
page readonly
447A000
unkown
page read and write
2F70000
unkown
page read and write
6A60000
heap
page read and write
4E0000
trusted library allocation
page read and write
78BE000
stack
page read and write
237000
heap
page read and write
4D30000
unkown
page readonly
6E10000
stack
page read and write
2CC7000
unkown
page readonly
4D80000
unkown
page readonly
45BE000
unkown
page read and write
532E000
stack
page read and write
2AE0000
unkown
page readonly
45A1000
unkown
page read and write
320000
heap
page read and write
34E000
unkown
page read and write
30C0000
unkown
page read and write
110000
unkown
page read and write
7FE8000
stack
page read and write
1FD0000
unkown
page readonly
6D40000
stack
page read and write
532E000
stack
page read and write
720000
trusted library allocation
page execute and read and write
4D60000
unkown
page readonly
1FB0000
trusted library allocation
page read and write
3210000
unkown
page read and write
2130000
unkown
page read and write
4D60000
unkown
page readonly
4170000
unkown
page read and write
2F20000
unkown
page read and write
6BBE000
stack
page read and write
3D50000
unkown
page read and write
21BF000
stack
page read and write
1B9D0000
trusted library allocation
page read and write
A0E000
stack
page read and write
1B9C7000
trusted library allocation
page read and write
407000
unkown
page readonly
1B9C1000
trusted library allocation
page read and write
29B000
heap
page read and write
30A8000
stack
page read and write
6D40000
stack
page read and write
45CF000
unkown
page read and write
4450000
unkown
page read and write
249000
heap
page read and write
270000
heap
page read and write
1B0000
trusted library allocation
page read and write
30D0000
unkown
page readonly
2F90000
unkown
page read and write
5270000
unkown
page execute read
5390000
heap
page read and write
4150000
unkown
page readonly
8320000
unkown
page read and write
1B9C7000
trusted library allocation
page read and write
5390000
heap
page read and write
7FE8000
stack
page read and write
6E18000
stack
page read and write
2540000
unkown
page read and write
2F50000
unkown
page read and write
7E1E000
stack
page read and write
324D000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
9020000
unkown
page read and write
7EE9000
stack
page read and write
35B000
heap
page read and write
782F000
stack
page read and write
69B8000
stack
page read and write
4AC0000
unkown
page read and write
4650000
unkown
page readonly
31D000
heap
page read and write
3EF000
stack
page read and write
2533000
unkown
page read and write
400000
unkown
page readonly
728E000
stack
page read and write
21BF000
stack
page read and write
25D0000
unclassified section
page execute and read and write
2F60000
unkown
page read and write
41F0000
stack
page read and write
556F000
stack
page read and write
602000
heap
page read and write
1FD0000
unkown
page readonly
4160000
unkown
page read and write
2F50000
unkown
page read and write
4BB0000
heap
page read and write
B2F000
system
page execute and read and write
2F50000
unkown
page read and write
20000
trusted library allocation
page read and write
3170000
unkown
page read and write
5A7000
heap
page read and write
3170000
trusted library allocation
page read and write
4B9D000
stack
page read and write
140000
unkown
page readonly
32A0000
heap
page read and write
6BBE000
stack
page read and write
1D7000
stack
page read and write
8374000
unkown
page read and write
4D20000
unkown
page execute and read and write
213B000
unkown
page read and write
1B8D0000
trusted library allocation
page read and write
2480000
trusted library allocation
page read and write
44E7000
unkown
page read and write
430000
unkown
page readonly
1CE000
stack
page read and write
1B83000
heap
page read and write
4DB1000
unkown
page read and write
45A1000
unkown
page read and write
45A1000
unkown
page read and write
4DD0000
heap
page read and write
400000
unkown
page readonly
81AE000
stack
page read and write
3E50000
unkown
page readonly
4B4000
heap
page read and write
237000
heap
page read and write
4593000
unkown
page read and write
E0000
heap
page read and write
2923000
unkown
page read and write
2740000
unkown
page readonly
41F7000
stack
page read and write
460B000
unkown
page read and write
2520000
unkown
page read and write
30C0000
unkown
page read and write
810000
trusted library allocation
page execute and read and write
4228000
unkown
page read and write
30C0000
unkown
page read and write
1B0000
trusted library allocation
page read and write
31FF000
stack
page read and write
430000
unkown
page readonly
140000
unkown
page readonly
212B000
unkown
page read and write
4650000
unkown
page readonly
2540000
unkown
page read and write
4150000
unkown
page readonly
7EE0000
stack
page read and write
4170000
unkown
page read and write
74D3000
heap
page read and write
4D30000
unkown
page readonly
7D20000
heap
page read and write
409000
unkown
page write copy
4D40000
unkown
page readonly
255000
heap
page read and write
2B0000
heap
page read and write
456F000
unkown
page read and write
3C90000
unkown
page read and write
1B9C7000
trusted library allocation
page read and write
20000
unkown
page readonly
8A0000
trusted library allocation
page execute and read and write
1B9B0000
trusted library allocation
page read and write
D0000
unkown
page readonly
309E000
stack
page read and write
92A0000
unkown
page read and write
4D50000
unkown
page readonly
6D48000
stack
page read and write
3DF8000
unkown
page read and write
C2F000
stack
page read and write
42C000
unkown
page readonly
3210000
unkown
page read and write
69AF000
stack
page read and write
4170000
unkown
page read and write
1B9C1000
trusted library allocation
page read and write
2881000
trusted library allocation
page execute and read and write
5B0000
unkown
page readonly
45A1000
unkown
page read and write
24F000
heap
page read and write
843A000
unkown
page read and write
45B4000
unkown
page read and write
4220000
unkown
page read and write
20000
unkown
page readonly
1BA30000
trusted library allocation
page read and write
36F000
unkown
page read and write
A40000
system
page execute and read and write
7BD0000
heap
page read and write
A90000
system
page execute and read and write
32A5000
heap
page read and write
41F7000
stack
page read and write
6A3E000
stack
page read and write
79C3000
stack
page read and write
1E0000
unkown
page read and write
2100000
unkown
page readonly
27E0000
unkown
page read and write
6D48000
stack
page read and write
10000
heap
page read and write
36F000
unkown
page read and write
8320000
unkown
page read and write
7B50000
heap
page read and write
50000
unkown
page readonly
2F00000
unkown
page read and write
2960000
trusted library allocation
page read and write
231A000
trusted library allocation
page read and write
1D7000
stack
page read and write
6D40000
stack
page read and write
2533000
unkown
page read and write
168000
heap
page read and write
7B40000
stack
page read and write
4308000
stack
page read and write
2F50000
unkown
page read and write
744D000
stack
page read and write
32A5000
heap
page read and write
E4000
heap
page read and write
354000
heap
page read and write
2AE0000
unkown
page readonly
2C7000
heap
page read and write
1FCD000
trusted library allocation
page read and write
2533000
unkown
page read and write
396000
heap
page read and write
220000
unkown
page readonly
6E50000
heap
page read and write
1B9C4000
trusted library allocation
page read and write
556F000
stack
page read and write
3D4B000
stack
page read and write
73061000
unkown
page execute read
36B000
unkown
page read and write
2890000
trusted library allocation
page execute and read and write
4FD000
trusted library allocation
page read and write
30F0000
unkown
page readonly
4A4000
heap
page read and write
2520000
unkown
page read and write
2120000
unkown
page read and write
782F000
stack
page read and write
2760000
unkown
page readonly
6A60000
heap
page read and write
782F000
stack
page read and write
3020000
unkown
page read and write
301E000
stack
page read and write
350000
heap
page read and write
32A9000
heap
page read and write
6A3E000
stack
page read and write
9723000
heap
page read and write
426000
heap
page read and write
2780000
trusted library allocation
page execute and read and write
2500000
unkown
page readonly
2100000
unkown
page readonly
2C92000
unclassified section
page read and write
73065000
unkown
page readonly
4160000
unkown
page read and write
39F000
stack
page read and write
1B60000
heap
page read and write
2EC1000
unkown
page read and write
447A000
unkown
page read and write
2520000
unkown
page read and write
401000
unkown
page execute read
29B000
heap
page read and write
41F0000
stack
page read and write
4228000
unkown
page read and write
1B50000
unkown
page read and write
2646000
unkown
page read and write
110000
unkown
page read and write
360000
heap
page read and write
4DC0000
unkown
page read and write
45B4000
unkown
page read and write
4AC0000
unkown
page read and write
4AC0000
unkown
page read and write
24A000
heap
page read and write
7E1E000
stack
page read and write
301E000
stack
page read and write
9020000
unkown
page read and write
300000
heap
page read and write
4E60000
unkown
page read and write
32A9000
heap
page read and write
66F000
stack
page read and write
729A000
stack
page read and write
690000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
3250000
unkown
page read and write
1B60000
heap
page read and write
4DD0000
heap
page read and write
212B000
unkown
page read and write
4650000
unkown
page readonly
73BB000
stack
page read and write
4DC0000
unkown
page read and write
45BE000
unkown
page read and write
45F000
heap
page read and write
30F0000
unkown
page readonly
69AF000
stack
page read and write
3E7000
heap
page read and write
25C3000
unkown
page read and write
17C000
stack
page read and write
6E50000
heap
page read and write
324D000
trusted library allocation
page read and write
4AAD000
stack
page read and write
74B0000
heap
page read and write
7B4B000
stack
page read and write
27A0000
unkown
page readonly
670000
trusted library allocation
page read and write
2F60000
unkown
page read and write
34E000
unkown
page read and write
4BB0000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
36B000
unkown
page read and write
324A000
trusted library allocation
page read and write
2790000
trusted library allocation
page execute and read and write
30A8000
stack
page read and write
211B000
unkown
page read and write
255000
heap
page read and write
F0000
unkown
page read and write
36F000
unkown
page read and write
497000
heap
page read and write
28F0000
trusted library allocation
page execute and read and write
92E4000
unkown
page read and write
903E000
unkown
page read and write
3E50000
unkown
page readonly
291A000
unclassified section
page read and write
330000
unkown
page read and write
7938000
stack
page read and write
211B000
unkown
page read and write
3D90000
unkown
page read and write
73BB000
stack
page read and write
2F90000
unkown
page read and write
2D6000
heap
page read and write
2923000
unkown
page read and write
32F1000
heap
page read and write
401000
unkown
page execute read
6A3E000
stack
page read and write
2707000
trusted library allocation
page execute and read and write
4D20000
unkown
page execute and read and write
50000
unkown
page readonly
6BBE000
stack
page read and write
92A0000
unkown
page read and write
41F7000
stack
page read and write
27C0000
unkown
page read and write
93A0000
unkown
page read and write
301E000
stack
page read and write
4228000
unkown
page read and write
1BE0000
unkown
page readonly
18C000
stack
page read and write
2100000
unkown
page readonly
21BF000
stack
page read and write
45D6000
unkown
page read and write
2646000
unkown
page read and write
36B000
unkown
page read and write
5360000
unkown
page read and write
6E10000
stack
page read and write
2646000
unkown
page read and write
3200000
unkown
page read and write
930000
trusted library allocation
page execute and read and write
2310000
trusted library allocation
page execute and read and write
42C000
unkown
page readonly
2750000
unkown
page read and write
1B0000
trusted library allocation
page read and write
140000
unkown
page readonly
43B0000
heap
page read and write
371000
unkown
page read and write
3250000
unkown
page read and write
409000
unkown
page write copy
1B8D0000
trusted library allocation
page read and write
1B9D0000
trusted library allocation
page read and write
3D40000
stack
page read and write
4250000
heap
page read and write
74B4000
heap
page read and write
1B9C4000
trusted library allocation
page read and write
4E5E000
stack
page read and write
1B9C4000
trusted library allocation
page read and write
2110000
unkown
page read and write
92E4000
unkown
page read and write
401000
unkown
page execute read
1B9C4000
trusted library allocation
page read and write
24E000
heap
page read and write
834B000
unkown
page read and write
269000
heap
page read and write
230000
heap
page read and write
2C7000
heap
page read and write
3200000
unkown
page read and write
2884000
trusted library allocation
page execute and read and write
4DB1000
unkown
page read and write
240000
heap
page read and write
9362000
unkown
page read and write
456F000
unkown
page read and write
2F60000
unkown
page read and write
4B00000
unkown
page readonly
693000
unclassified section
page execute and read and write
10000
heap
page read and write
20DA000
unkown
page read and write
1B65000
heap
page read and write
6E50000
heap
page read and write
45CF000
unkown
page read and write
556F000
stack
page read and write
2380000
trusted library allocation
page read and write
79F0000
heap
page read and write
32A5000
heap
page read and write
4C70000
heap
page read and write
120000
heap
page read and write
4DB1000
unkown
page read and write
20B6000
unkown
page read and write
43A0000
unkown
page readonly
9263000
unkown
page read and write
3170000
trusted library allocation
page read and write
1E0000
unkown
page read and write
456F000
unkown
page read and write
4DC0000
unkown
page read and write
4D80000
unkown
page readonly
A00000
trusted library allocation
page execute and read and write
324A000
trusted library allocation
page read and write
400000
unkown
page readonly
24F0000
unkown
page readonly
5A0000
heap
page read and write
256D000
stack
page read and write
1B50000
unkown
page read and write
1B83000
heap
page read and write
220000
unkown
page readonly
74B4000
heap
page read and write
79C8000
stack
page read and write
5B0000
unkown
page readonly
2120000
unkown
page read and write
32A0000
heap
page read and write
407000
unkown
page readonly
2130000
unkown
page read and write
34E000
unkown
page read and write
263C000
unkown
page read and write
8404000
unkown
page read and write
7CFE000
stack
page read and write
6D40000
stack
page read and write
4170000
unkown
page read and write
843A000
unkown
page read and write
4150000
unkown
page readonly
4C70000
heap
page read and write
5270000
unkown
page execute read
4AC0000
unkown
page read and write
32A5000
heap
page read and write
2F60000
unkown
page read and write
24F0000
unkown
page readonly
1BE0000
unkown
page readonly
3D4B000
stack
page read and write
9780000
unkown
page execute and read and write
45D6000
unkown
page read and write
2F10000
unkown
page read and write
59C000
stack
page read and write
962F000
stack
page read and write
32AE000
heap
page read and write
4D20000
unkown
page execute and read and write
2110000
unkown
page read and write
43A0000
unkown
page readonly
3210000
unkown
page read and write
6BBE000
stack
page read and write
7CFE000
stack
page read and write
834B000
unkown
page read and write
1B65000
heap
page read and write
4A0000
heap
page read and write
74D3000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
2430000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
4E5E000
stack
page read and write
36F000
unkown
page read and write
3CA0000
unkown
page read and write
2EC1000
unkown
page read and write
7839000
stack
page read and write
1FD0000
unkown
page readonly
324D000
trusted library allocation
page read and write
7839000
stack
page read and write
2EF0000
unkown
page read and write
3170000
unkown
page read and write
2480000
trusted library allocation
page read and write
230E000
stack
page read and write
457A000
unkown
page read and write
5390000
heap
page read and write
42C000
unkown
page readonly
1BE0000
unkown
page readonly
10000
heap
page read and write
4C7A000
heap
page read and write
2D0000
heap
page read and write
3DF8000
unkown
page read and write
2F90000
unkown
page read and write
74D3000
heap
page read and write
2750000
unkown
page read and write
27A0000
unkown
page readonly
750000
unkown
page readonly
74B0000
heap
page read and write
409000
unkown
page read and write
1B9D0000
trusted library allocation
page read and write
1B65000
heap
page read and write
6A60000
heap
page read and write
10000
heap
page read and write
4250000
heap
page read and write
1BE0000
unkown
page readonly
73BB000
stack
page read and write
532E000
stack
page read and write
9700000
heap
page read and write
3200000
unkown
page read and write
306000
heap
page read and write
7D20000
heap
page read and write
E0000
heap
page read and write
42C000
unkown
page readonly
4248000
unkown
page read and write
2F70000
unkown
page read and write
2100000
unkown
page readonly
25C3000
unkown
page read and write
243000
heap
page read and write
817000
trusted library allocation
page execute and read and write
B5F000
stack
page read and write
266F000
unclassified section
page execute and read and write
750000
unkown
page readonly
37E000
unkown
page read and write
10000
heap
page read and write
78BE000
stack
page read and write
213B000
unkown
page read and write
6F0000
trusted library allocation
page read and write
5360000
unkown
page read and write
60000
unkown
page readonly
2F00000
unkown
page read and write
2F80000
unkown
page read and write
3170000
unkown
page read and write
1CE000
stack
page read and write
C5F000
stack
page read and write
1B9B0000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
32D4000
heap
page read and write
404000
heap
page read and write
4C70000
heap
page read and write
79C3000
stack
page read and write
309E000
stack
page read and write
60000
unkown
page readonly
4BB0000
heap
page read and write
449C000
unkown
page read and write
7B4B000
stack
page read and write
9700000
heap
page read and write
5F0000
unclassified section
page execute and read and write
8720000
unkown
page read and write
B1E000
stack
page read and write
2646000
unkown
page read and write
9263000
unkown
page read and write
15D000
heap
page read and write
44E7000
unkown
page read and write
8320000
unkown
page read and write
45CB000
unkown
page read and write
1B65000
heap
page read and write
2770000
trusted library allocation
page execute and read and write
1B0000
trusted library allocation
page read and write
2F70000
unkown
page read and write
2110000
unkown
page read and write
2AE0000
unkown
page readonly
32A9000
heap
page read and write
409000
unkown
page write copy
4AAD000
stack
page read and write
30E0000
unkown
page readonly
24A000
heap
page read and write
728E000
stack
page read and write
2942000
unkown
page read and write
4AAD000
stack
page read and write
4248000
unkown
page read and write
110000
unkown
page read and write
29B000
heap
page read and write
1FD0000
unkown
page readonly
834B000
unkown
page read and write
3D90000
unkown
page read and write
4255000
heap
page read and write
7B4B000
stack
page read and write
843A000
unkown
page read and write
400000
unkown
page readonly
997000
trusted library allocation
page execute and read and write
4D70000
unkown
page readonly
69B8000
stack
page read and write
7FE8000
stack
page read and write
750000
unkown
page readonly
30E0000
unkown
page readonly
4E5E000
stack
page read and write
22AF000
stack
page read and write
301E000
stack
page read and write
1B8C0000
trusted library allocation
page read and write
1B83000
heap
page read and write
2942000
unkown
page read and write
4575000
unkown
page read and write
50000
unkown
page readonly
4E60000
unkown
page read and write
2EC1000
unkown
page read and write
8355000
unkown
page read and write
3CA0000
unkown
page read and write
409000
unkown
page write copy
556F000
stack
page read and write
2760000
unkown
page readonly
B1F000
stack
page read and write
1B0000
trusted library allocation
page read and write
8720000
unkown
page read and write
5360000
unkown
page read and write
79C8000
stack
page read and write
4D30000
unkown
page readonly
31FF000
stack
page read and write
4300000
stack
page read and write
F0000
unkown
page read and write
256F000
trusted library allocation
page read and write
4AF0000
unkown
page readonly
2550000
unkown
page read and write
2540000
unkown
page read and write
2CC7000
unkown
page readonly
2AE000
stack
page read and write
3290000
unkown
page read and write
3290000
unkown
page read and write
3170000
trusted library allocation
page read and write
20B6000
unkown
page read and write
4248000
unkown
page read and write
4C7A000
heap
page read and write
5410000
heap
page read and write
69AF000
stack
page read and write
4D40000
unkown
page readonly
30F0000
unkown
page readonly
212B000
unkown
page read and write
23D000
heap
page read and write
729A000
stack
page read and write
4300000
stack
page read and write
449C000
unkown
page read and write
1B8D0000
trusted library allocation
page read and write
7CFE000
stack
page read and write
3C90000
unkown
page read and write
2740000
unkown
page readonly
27E0000
unkown
page read and write
3D4B000
stack
page read and write
81AE000
stack
page read and write
3D50000
unkown
page read and write
5410000
heap
page read and write
456F000
unkown
page read and write
92E4000
unkown
page read and write
407000
unkown
page readonly
4D30000
unkown
page readonly
1BA30000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
31FF000
stack
page read and write
43A0000
unkown
page readonly
1B8C0000
trusted library allocation
page read and write
4AF0000
unkown
page readonly
4E60000
unkown
page read and write
4DB1000
unkown
page read and write
9700000
heap
page read and write
26F0000
trusted library allocation
page execute and read and write
43B0000
heap
page read and write
3170000
trusted library allocation
page read and write
7B40000
stack
page read and write
45B4000
unkown
page read and write
4575000
unkown
page read and write
4DC0000
unkown
page read and write
10000
heap
page read and write
2CC7000
unkown
page readonly
8404000
unkown
page read and write
2EF0000
unkown
page read and write
8B000
stack
page read and write
449C000
unkown
page read and write
25C3000
unkown
page read and write
3250000
unkown
page read and write
407000
unkown
page readonly
31D000
heap
page read and write
400000
unkown
page readonly
409000
unkown
page write copy
4AAD000
stack
page read and write
24D0000
trusted library allocation
page read and write
2750000
unkown
page read and write
903E000
unkown
page read and write
8404000
unkown
page read and write
93E3000
unkown
page read and write
4450000
unkown
page read and write
2571000
trusted library allocation
page read and write
2C7000
heap
page read and write
A40000
system
page execute and read and write
1B9D0000
trusted library allocation
page read and write
457A000
unkown
page read and write
3E50000
unkown
page readonly
8404000
unkown
page read and write
E4000
heap
page read and write
371000
unkown
page read and write
140000
unkown
page readonly
8374000
unkown
page read and write
3160000
unkown
page readonly
25AF000
stack
page read and write
20DA000
unkown
page read and write
447A000
unkown
page read and write
4C2000
heap
page read and write
247000
heap
page read and write
4220000
unkown
page read and write
400000
remote allocation
page execute and read and write
6E18000
stack
page read and write
2600000
trusted library allocation
page execute and read and write
30E0000
unkown
page readonly
2550000
unkown
page read and write
20DA000
unkown
page read and write
4AF0000
unkown
page readonly
7B40000
stack
page read and write
3020000
unkown
page read and write
78BE000
stack
page read and write
1B9D0000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
6E50000
heap
page read and write
42C000
unkown
page readonly
4E60000
unkown
page read and write
31D000
heap
page read and write
7EE9000
stack
page read and write
200000
trusted library allocation
page read and write
45D6000
unkown
page read and write
32A9000
heap
page read and write
3160000
unkown
page readonly
606000
heap
page read and write
9723000
heap
page read and write
74D3000
heap
page read and write
3D50000
unkown
page read and write
710000
trusted library allocation
page execute and read and write
27A0000
unkown
page readonly
7E1E000
stack
page read and write
4B9D000
stack
page read and write
3160000
unkown
page readonly
45CB000
unkown
page read and write
9263000
unkown
page read and write
74B4000
heap
page read and write
8D000
stack
page read and write
E4000
heap
page read and write
744D000
stack
page read and write
92A0000
unkown
page read and write
1B0000
trusted library allocation
page read and write
31FF000
stack
page read and write
845F000
unkown
page read and write
255000
heap
page read and write
7CFE000
stack
page read and write
4BB0000
heap
page read and write
4D40000
unkown
page readonly
4D20000
unkown
page execute and read and write
7BD0000
heap
page read and write
D0000
unkown
page readonly
401000
unkown
page execute read
4B00000
unkown
page readonly
2960000
trusted library allocation
page read and write
1B60000
heap
page read and write
9705000
heap
page read and write
24F0000
unkown
page readonly
1B50000
unkown
page read and write
3D40000
stack
page read and write
467000
heap
page read and write
6E10000
stack
page read and write
4DD0000
heap
page read and write
166000
heap
page read and write
45CB000
unkown
page read and write
8720000
unkown
page read and write
1B9C1000
trusted library allocation
page read and write
2EF0000
unkown
page read and write
B2F000
system
page execute and read and write
4B9D000
stack
page read and write
4D70000
unkown
page readonly
4D80000
unkown
page readonly
30A8000
stack
page read and write
5410000
heap
page read and write
30D0000
unkown
page readonly
4248000
unkown
page read and write
2F20000
unkown
page read and write
D0000
unkown
page readonly
2577000
trusted library allocation
page read and write
52F000
stack
page read and write
460B000
unkown
page read and write
3D90000
unkown
page read and write
27D0000
unkown
page read and write
24EE000
stack
page read and write
371000
unkown
page read and write
2580000
trusted library allocation
page read and write
79F0000
heap
page read and write
2120000
unkown
page read and write
211B000
unkown
page read and write
9705000
heap
page read and write
2120000
unkown
page read and write
2923000
unkown
page read and write
7BD0000
heap
page read and write
7B50000
heap
page read and write
21BF000
stack
page read and write
41F7000
stack
page read and write
230000
heap
page read and write
4308000
stack
page read and write
A90000
system
page execute and read and write
30F0000
unkown
page readonly
1B9C7000
trusted library allocation
page read and write
6E18000
stack
page read and write
4160000
unkown
page read and write
991000
trusted library allocation
page execute and read and write
903E000
unkown
page read and write
9723000
heap
page read and write
50000
unkown
page readonly
1D7000
stack
page read and write
27A0000
unkown
page readonly
243000
heap
page read and write
4220000
unkown
page read and write
4575000
unkown
page read and write
7BD0000
heap
page read and write
32AE000
heap
page read and write
69B8000
stack
page read and write
2760000
unkown
page readonly
4D50000
unkown
page readonly
2110000
unkown
page read and write
30D0000
unkown
page readonly
7EE0000
stack
page read and write
2560000
trusted library allocation
page read and write
79C8000
stack
page read and write
4450000
unkown
page read and write
2F10000
unkown
page read and write
8355000
unkown
page read and write
92A0000
unkown
page read and write
264000
heap
page read and write
25E0000
trusted library allocation
page read and write
2130000
unkown
page read and write
3D40000
stack
page read and write
27D0000
unkown
page read and write
4D80000
unkown
page readonly
744D000
stack
page read and write
41F000
heap
page read and write
43A0000
unkown
page readonly
1BA30000
trusted library allocation
page read and write
1B9C1000
trusted library allocation
page read and write
8374000
unkown
page read and write
44E7000
unkown
page read and write
50D000
trusted library allocation
page read and write
74B0000
heap
page read and write
1D7000
stack
page read and write
44E7000
unkown
page read and write
728E000
stack
page read and write
490000
heap
page read and write
2710000
trusted library allocation
page execute and read and write
F0000
unkown
page read and write
1E0000
unkown
page read and write
20B6000
unkown
page read and write
7FE8000
stack
page read and write
E0000
heap
page read and write
37E000
unkown
page read and write
20DA000
unkown
page read and write
93A0000
unkown
page read and write
7D20000
heap
page read and write
1BA30000
trusted library allocation
page read and write
2700000
trusted library allocation
page execute and read and write
407000
unkown
page readonly
7EE0000
stack
page read and write
8355000
unkown
page read and write
744D000
stack
page read and write
2574000
trusted library allocation
page read and write
309E000
stack
page read and write
2F80000
unkown
page read and write
460B000
unkown
page read and write
81AE000
stack
page read and write
2B17000
unclassified section
page read and write
3020000
unkown
page read and write
9263000
unkown
page read and write
30D0000
unkown
page readonly
93E3000
unkown
page read and write
460B000
unkown
page read and write
7B4B000
stack
page read and write
9705000
heap
page read and write
401000
unkown
page execute read
1B9B0000
trusted library allocation
page read and write
7EE9000
stack
page read and write
3290000
unkown
page read and write
4300000
stack
page read and write
BD000
stack
page read and write
4D50000
unkown
page readonly
4228000
unkown
page read and write
24A000
heap
page read and write
24F0000
unkown
page readonly
1B0000
trusted library allocation
page read and write
30E0000
unkown
page readonly
4308000
stack
page read and write
4650000
unkown
page readonly
24A000
heap
page read and write
29B000
heap
page read and write
2500000
unkown
page readonly
E0000
heap
page read and write
2500000
unkown
page readonly
79F0000
heap
page read and write
73B9000
stack
page read and write
23D000
heap
page read and write
9A0000
trusted library allocation
page execute and read and write
9020000
unkown
page read and write
32D0000
heap
page read and write
7938000
stack
page read and write
2520000
unkown
page read and write
9780000
unkown
page execute and read and write
2533000
unkown
page read and write
4C7A000
heap
page read and write
7B50000
heap
page read and write
10000
heap
page read and write
2870000
trusted library allocation
page execute and read and write
3170000
trusted library allocation
page read and write
1B9B0000
trusted library allocation
page read and write
4150000
unkown
page readonly
73BB000
stack
page read and write
5390000
heap
page read and write
3D4B000
stack
page read and write
994000
trusted library allocation
page execute and read and write
2740000
unkown
page readonly
A3F000
stack
page read and write
5410000
heap
page read and write
324D000
trusted library allocation
page read and write
2EC1000
unkown
page read and write
532E000
stack
page read and write
4160000
unkown
page read and write
330000
heap
page read and write
92E4000
unkown
page read and write
42C000
unkown
page readonly
69B8000
stack
page read and write
9823000
unkown
page execute and read and write
41C000
heap
page read and write
27C0000
unkown
page read and write
6E10000
stack
page read and write
4D70000
unkown
page readonly
5B0000
unkown
page readonly
3CC0000
unkown
page readonly
3170000
unkown
page read and write
231D000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
1B60000
heap
page read and write
5C4000
heap
page read and write
22D000
stack
page read and write
3340000
heap
page read and write
681000
trusted library allocation
page read and write
69AF000
stack
page read and write
There are 1151 hidden memdumps, click here to show them.