IOC Report

loading gif

Files

File Path
Type
Category
Malicious
Deposit_Receipt.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Temp\tmp61B1.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ubRPPGAHBbheAf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$Deposit_Receipt.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\159964C3.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1E44DA87.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1F5A391E.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4FBFE2DC.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\794B59B2.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A89E2D2D.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B0240636.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C4039490.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DFACFE8.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E36FEB51.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F0F27A0B.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F23AFEC9.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF6D394A.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Temp\~DF00A5B0EC803B9B70.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF2A38FE4C5E5041D0.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF850B687FF2085A29.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DFD5247EB1AF79E01C.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1MOS2SVVYB0YEMT6042A.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ubRPPGAHBbheAf.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ubRPPGAHBbheAf" /XML "C:\Users\user\AppData\Local\Temp\tmp61B1.tmp
malicious
C:\Users\Public\vbc.exe
C:\Users\Public\vbc.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

URLs

Name
IP
Malicious
www.eagle-meter.com/nt3f/
malicious
http://www.saprove.com/nt3f/?1bNHY2=e6AHDh_0Bf6p6lIp&4hfxh=roQyhHJwfVxU2zOZOCh4/5oE96lXlhEDqwlN10SvmnnZcGUgQE2W+6Ro0cAGYyc6bdur0A==
37.187.180.144
malicious
http://www.eagle-meter.com/nt3f/?4hfxh=nOM9fgGIZ+TfVsUq2Sm955WWmPaXUcfoEc+b9olF9adUCvzkQycvr3NYcYX3ACxTInTmwA==&1bNHY2=e6AHDh_0Bf6p6lIp
147.255.135.250
malicious
http://www.libertadysarmiento.online/nt3f/?1bNHY2=e6AHDh_0Bf6p6lIp&4hfxh=XQiqgSh3QMW0nePllWUsxZUxyZ7Wg3kP4uBvWEaTkPp74lNhmE95Km3+29PmuNVvDyLfVA==
200.58.101.200
malicious
http://www.getinteriorsolution.com/nt3f/?4hfxh=VPDo/gGljWIAkXRpnf2851ahKkwJgNah2gT2Xhg3gSLEGk9Hcz2Z/bSczfFocrENcd4Lnw==&1bNHY2=e6AHDh_0Bf6p6lIp
162.241.169.207
malicious
http://65.2.143.8/30/vbc.exe
65.2.143.8
malicious
http://www.the-thanks.com/nt3f/?4hfxh=JbDy7TRIU32tRRiWfFaEbpGMnCQxB75OBjVGZWj4WfhFoU9oPzFDuRetfANWR0lEorWalg==&1bNHY2=e6AHDh_0Bf6p6lIp
27.0.236.139
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://blog.iandreev.com/
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.iis.fhg.de/audioPA
unknown
http://blog.iandreev.com
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://www.primerepro.com/nt3f/?1bNHY2=e6AHDh_0Bf6p6lIp&4hfxh=zh9ZJvQDpuJ8FzfOF5/13POSojXlenAN5Q6v9e/Np9zFVZ+T+GW/a5eB04ukDkIff9AcOQ==
34.102.136.180
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://servername/isapibackend.dll
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
blog-tistory-l51ybqnn.kgslb.com
27.0.236.139
malicious
getinteriorsolution.com
162.241.169.207
malicious
www.eagle-meter.com
147.255.135.250
malicious
libertadysarmiento.online
200.58.101.200
malicious
saprove.com
37.187.180.144
malicious
www.the-thanks.com
unknown
malicious
www.libertadysarmiento.online
unknown
malicious
www.getinteriorsolution.com
unknown
malicious
www.primerepro.com
unknown
malicious
www.saprove.com
unknown
malicious
primerepro.com
34.102.136.180
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.241.169.207
getinteriorsolution.com
United States
malicious
37.187.180.144
saprove.com
France
malicious
27.0.236.139
blog-tistory-l51ybqnn.kgslb.com
Korea Republic of
malicious
200.58.101.200
libertadysarmiento.online
Argentina
malicious
147.255.135.250
www.eagle-meter.com
United States
malicious
65.2.143.8
unknown
United States
malicious
34.102.136.180
primerepro.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
p`+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2F0B5
2F0B5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
.h+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33B6B
33B6B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35467
35467
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33B6B
33B6B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
200000
unclassified section
page execute and read and write
malicious
97A6000
unkown
page execute and read and write
malicious
97A6000
unkown
page execute and read and write
malicious
230000
trusted library allocation
page read and write
malicious
D0000
system
page execute and read and write
malicious
21F1000
trusted library allocation
page read and write
malicious
1D0000
unclassified section
page execute and read and write
malicious
31F9000
trusted library allocation
page read and write
malicious
2280000
trusted library allocation
page read and write
malicious
4300000
stack
page read and write
649A000
trusted library allocation
page read and write
5360000
unkown
page read and write
2A80000
unkown
page read and write
9F0000
trusted library allocation
page execute and read and write
34E000
unkown
page read and write
2D6000
heap
page read and write
6728000
trusted library allocation
page read and write
4D60000
unkown
page readonly
430000
unkown
page readonly
6C8C000
trusted library allocation
page read and write
8720000
unkown
page read and write
1B83000
heap
page read and write
4D20000
unkown
page execute and read and write
2A10000
unkown
page read and write
26A0000
trusted library allocation
page execute and read and write
130000
trusted library allocation
page read and write
511E000
stack
page read and write
69F1000
trusted library allocation
page read and write
3298000
unkown
page read and write
29F0000
unkown
page read and write
5B0000
unkown
page readonly
64A5000
trusted library allocation
page read and write
2AE0000
unkown
page readonly
21BF000
stack
page read and write
7330000
stack
page read and write
2110000
unkown
page read and write
2740000
unkown
page readonly
6281000
trusted library allocation
page read and write
4DD0000
heap
page read and write
5B7000
heap
page read and write
9522000
unkown
page read and write
32AE000
heap
page read and write
7BD0000
heap
page read and write
8C20000
unkown
page read and write
2EF0000
unkown
page read and write
301E000
stack
page read and write
21BF000
stack
page read and write
2500000
unkown
page readonly
528E000
trusted library allocation
page read and write
1CE000
stack
page read and write
653A000
trusted library allocation
page read and write
B50000
trusted library allocation
page execute and read and write
B54000
trusted library allocation
page execute and read and write
9900000
heap
page read and write
5C2000
heap
page read and write
1E0000
unkown
page read and write
6CB0000
stack
page read and write
51D2000
trusted library allocation
page read and write
4428000
stack
page read and write
3D4B000
stack
page read and write
10000
heap
page read and write
94E0000
unkown
page read and write
2AC0000
unkown
page read and write
4DC0000
unkown
page read and write
6BEB000
trusted library allocation
page read and write
744D000
stack
page read and write
2533000
unkown
page read and write
2A20000
unkown
page read and write
2AE0000
unkown
page readonly
6FC5000
trusted library allocation
page read and write
1FD0000
unkown
page readonly
68D5000
trusted library allocation
page read and write
160000
heap
page read and write
61B0000
trusted library allocation
page read and write
4D80000
unkown
page readonly
66A000
trusted library allocation
page read and write
834B000
unkown
page read and write
2550000
unkown
page read and write
447A000
unkown
page read and write
2646000
unkown
page read and write
AE0000
trusted library allocation
page read and write
27E0000
unkown
page read and write
2130000
unkown
page read and write
305000
unkown
page execute read
6BA2000
trusted library allocation
page read and write
211F000
unkown
page read and write
4D50000
unkown
page readonly
2797000
trusted library allocation
page execute and read and write
456F000
unkown
page read and write
44E7000
unkown
page read and write
4D40000
unkown
page readonly
6BBE000
stack
page read and write
9623000
unkown
page read and write
20B6000
unkown
page read and write
81AE000
stack
page read and write
50000
unkown
page readonly
728E000
stack
page read and write
7D20000
heap
page read and write
5410000
heap
page read and write
305000
unkown
page execute read
64D7000
trusted library allocation
page read and write
4450000
unkown
page read and write
5410000
heap
page read and write
6D40000
stack
page read and write
5390000
heap
page read and write
2100000
unkown
page readonly
66B1000
trusted library allocation
page read and write
CB0000
heap
page read and write
330000
unkown
page read and write
4C7A000
heap
page read and write
6207000
trusted library allocation
page read and write
1B65000
heap
page read and write
4AF0000
unkown
page readonly
3DF8000
unkown
page read and write
6A0000
heap
page read and write
51A7000
trusted library allocation
page read and write
356000
unkown
page write copy
305000
unkown
page execute read
669A000
trusted library allocation
page read and write
3B8000
unkown
page read and write
7CFE000
stack
page read and write
6AF4000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
757D000
trusted library allocation
page read and write
305000
unkown
page execute read
6779000
trusted library allocation
page read and write
3C90000
unkown
page read and write
959000
heap
page read and write
30C0000
unkown
page read and write
602E000
stack
page read and write
4C70000
heap
page read and write
307000
heap
page read and write
2C7000
heap
page read and write
6B9A000
trusted library allocation
page read and write
2A00000
unkown
page read and write
782F000
stack
page read and write
50000
unkown
page readonly
647A000
trusted library allocation
page read and write
28F2000
unkown
page read and write
1B60000
heap
page read and write
8374000
unkown
page read and write
6705000
trusted library allocation
page read and write
4428000
stack
page read and write
6233000
trusted library allocation
page read and write
7330000
stack
page read and write
86F000
stack
page read and write
5CAE000
stack
page read and write
8C3E000
unkown
page read and write
32AE000
heap
page read and write
5B0000
trusted library section
page read and write
66F7000
trusted library allocation
page read and write
2CD000
heap
page read and write
2800000
trusted library allocation
page execute and read and write
6BD9000
trusted library allocation
page read and write
28F2000
unkown
page read and write
27C0000
unkown
page read and write
6622000
trusted library allocation
page read and write
66A6000
trusted library allocation
page read and write
2500000
unkown
page readonly
66FE000
trusted library allocation
page read and write
29B000
heap
page read and write
BF0000
trusted library allocation
page read and write
6B36000
trusted library allocation
page read and write
682E000
trusted library allocation
page read and write
457A000
unkown
page read and write
2A70000
unkown
page read and write
3B8000
unkown
page read and write
650000
trusted library allocation
page read and write
43A0000
unkown
page readonly
305000
unkown
page execute read
130000
trusted library allocation
page read and write
20B6000
unkown
page read and write
1B65000
heap
page read and write
74D3000
heap
page read and write
3145000
heap
page read and write
6CB9000
stack
page read and write
4C1E000
stack
page read and write
292000
unkown
page execute read
74B0000
heap
page read and write
22F000
stack
page read and write
7E1E000
stack
page read and write
47E0000
trusted library allocation
page read and write
4575000
unkown
page read and write
2A40000
unkown
page read and write
3298000
unkown
page read and write
6BAD000
trusted library allocation
page read and write
449C000
unkown
page read and write
6C38000
stack
page read and write
3C6000
heap
page read and write
2AD0000
unkown
page read and write
32A0000
heap
page read and write
764A000
trusted library allocation
page read and write
556F000
stack
page read and write
2750000
unkown
page read and write
4D50000
unkown
page readonly
6BC000
stack
page read and write
9FA000
trusted library allocation
page read and write
2F00000
unkown
page read and write
220000
unkown
page readonly
4593000
unkown
page read and write
32AE000
heap
page read and write
BD0000
trusted library allocation
page read and write
2CC7000
unkown
page readonly
2520000
unkown
page read and write
974000
heap
page read and write
3D90000
unkown
page read and write
6972000
trusted library allocation
page read and write
21BF000
stack
page read and write
558E000
stack
page read and write
4D20000
unkown
page execute and read and write
744D000
stack
page read and write
4650000
unkown
page readonly
2A40000
unkown
page read and write
55EE000
stack
page read and write
6A38000
stack
page read and write
358000
unkown
page readonly
10000
heap
page read and write
4C7A000
heap
page read and write
6B34000
trusted library allocation
page read and write
D0000
unkown
page readonly
5202000
trusted library allocation
page read and write
5B0000
unkown
page readonly
4AAD000
stack
page read and write
E0000
heap
page read and write
3270000
unkown
page read and write
1CE000
stack
page read and write
2540000
unkown
page read and write
5C0000
trusted library allocation
page read and write
6E50000
heap
page read and write
3D50000
unkown
page read and write
73B9000
stack
page read and write
292000
unkown
page execute read
1A7000
trusted library allocation
page execute and read and write
212F000
unkown
page read and write
3298000
unkown
page read and write
390000
heap
page read and write
83D8000
unkown
page read and write
30F0000
unkown
page readonly
2AD0000
unkown
page read and write
130000
trusted library allocation
page read and write
3D50000
unkown
page read and write
4D50000
unkown
page readonly
2951000
unkown
page read and write
20E0000
trusted library allocation
page read and write
7338000
stack
page read and write
2AC0000
unkown
page read and write
358000
unkown
page readonly
AD6000
system
page execute and read and write
6A38000
stack
page read and write
29E0000
unkown
page read and write
7E1E000
stack
page read and write
45CF000
unkown
page read and write
2780000
trusted library allocation
page execute and read and write
7BD0000
heap
page read and write
808E000
stack
page read and write
4E60000
unkown
page read and write
4AC0000
heap
page read and write
6898000
trusted library allocation
page read and write
AB0000
heap
page execute and read and write
D0000
unkown
page readonly
36F000
unkown
page read and write
AD6000
system
page execute and read and write
78B7000
stack
page read and write
8374000
unkown
page read and write
745A000
trusted library allocation
page read and write
8355000
unkown
page read and write
9905000
heap
page read and write
6AA4000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
24F0000
unkown
page readonly
34E000
unkown
page read and write
513D000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
9663000
unkown
page read and write
31F1000
trusted library allocation
page read and write
4DC0000
unkown
page read and write
73BB000
stack
page read and write
8A0000
heap
page read and write
5164000
trusted library allocation
page read and write
445B000
unkown
page read and write
60000
unkown
page readonly
180000
trusted library allocation
page read and write
9623000
unkown
page read and write
5286000
trusted library allocation
page read and write
8B1000
trusted library allocation
page read and write
808E000
stack
page read and write
2A20000
unkown
page read and write
445B000
unkown
page read and write
19A000
trusted library allocation
page execute and read and write
4AF0000
unkown
page readonly
4A70000
heap
page execute and read and write
5C7000
heap
page read and write
83D8000
unkown
page read and write
372000
unkown
page read and write
7B50000
heap
page read and write
9905000
heap
page read and write
356000
unkown
page write copy
532E000
stack
page read and write
447A000
unkown
page read and write
750000
unkown
page readonly
8720000
unkown
page read and write
1B50000
unkown
page read and write
10000
heap
page read and write
95A0000
unkown
page read and write
263C000
unkown
page read and write
3D90000
unkown
page read and write
7666000
trusted library allocation
page read and write
2810000
trusted library allocation
page execute and read and write
2100000
unkown
page readonly
29F0000
unkown
page read and write
556F000
stack
page read and write
73BB000
stack
page read and write
8C3E000
unkown
page read and write
6627000
trusted library allocation
page read and write
51A9000
trusted library allocation
page read and write
8CB000
heap
page read and write
2A50000
unkown
page read and write
6459000
trusted library allocation
page read and write
447E000
stack
page read and write
8C0000
trusted library allocation
page read and write
3D40000
stack
page read and write
80D000
stack
page read and write
4B00000
unkown
page readonly
6619000
trusted library allocation
page read and write
78B2000
stack
page read and write
8A0000
trusted library allocation
page read and write
3E50000
unkown
page readonly
51D2000
trusted library allocation
page read and write
30C0000
unkown
page read and write
957000
heap
page read and write
4A40000
trusted library allocation
page read and write
31D000
heap
page read and write
27A0000
unkown
page readonly
4360000
heap
page read and write
5270000
unkown
page execute read
6B77000
trusted library allocation
page read and write
6F74000
trusted library allocation
page read and write
96E3000
unkown
page read and write
120000
trusted library allocation
page execute and read and write
74B4000
heap
page read and write
2820000
trusted library allocation
page execute and read and write
2A30000
unkown
page read and write
120000
trusted library allocation
page read and write
309E000
stack
page read and write
95A0000
unkown
page read and write
66BE000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
28F2000
unkown
page read and write
5120000
trusted library allocation
page read and write
456F000
unkown
page read and write
BC0000
trusted library allocation
page execute and read and write
74B4000
heap
page read and write
83D8000
unkown
page read and write
4450000
unkown
page read and write
263C000
unkown
page read and write
2550000
unkown
page read and write
BD0000
trusted library allocation
page execute and read and write
3CA0000
unkown
page read and write
27E0000
unkown
page read and write
36000
unclassified section
page execute and read and write
1E0000
unkown
page read and write
140000
unkown
page readonly
32A9000
heap
page read and write
4AF0000
unkown
page readonly
2110000
unkown
page read and write
3140000
heap
page read and write
834000
heap
page read and write
2AD0000
unkown
page read and write
2550000
unkown
page read and write
2110000
unkown
page read and write
650000
trusted library allocation
page read and write
30F0000
unkown
page readonly
110000
unkown
page read and write
6D15000
trusted library allocation
page read and write
372000
unkown
page read and write
27E0000
unkown
page read and write
220000
unkown
page readonly
4C4000
heap
page read and write
4160000
unkown
page read and write
255000
heap
page read and write
4AAD000
stack
page read and write
7B40000
stack
page read and write
32A5000
heap
page read and write
6CB0000
stack
page read and write
292000
unkown
page execute read
61E000
stack
page read and write
45CB000
unkown
page read and write
2A40000
unkown
page read and write
45B4000
unkown
page read and write
94E0000
unkown
page read and write
356000
unkown
page write copy
30C0000
unkown
page read and write
870000
heap
page read and write
356000
unkown
page write copy
10EF000
stack
page read and write
2A40000
unkown
page read and write
3130000
unkown
page readonly
2F10000
unkown
page read and write
51D2000
trusted library allocation
page read and write
672C000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
4D40000
unkown
page readonly
2130000
unkown
page read and write
78B2000
stack
page read and write
3BE000
stack
page read and write
44E7000
unkown
page read and write
5ABE000
stack
page read and write
9900000
heap
page read and write
528B000
trusted library allocation
page read and write
9905000
heap
page read and write
249000
heap
page read and write
449C000
unkown
page read and write
2680000
heap
page read and write
457A000
unkown
page read and write
110000
unkown
page read and write
1B65000
heap
page read and write
445B000
unkown
page read and write
4AF0000
unkown
page readonly
5C0000
trusted library allocation
page read and write
1B50000
unkown
page read and write
6A4B000
trusted library allocation
page read and write
292000
unkown
page execute read
1D7000
stack
page read and write
74B4000
heap
page read and write
CE0000
trusted library allocation
page execute and read and write
47E000
stack
page read and write
25C3000
unkown
page read and write
4AC4000
heap
page read and write
95E4000
unkown
page read and write
78B7000
stack
page read and write
301E000
stack
page read and write
9720000
unkown
page execute and read and write
2A20000
unkown
page read and write
4D40000
unkown
page readonly
2F00000
unkown
page read and write
30D0000
unkown
page readonly
2A0000
heap
page read and write
750000
unkown
page readonly
243000
heap
page read and write
400000
trusted library allocation
page read and write
8320000
unkown
page read and write
6C30000
stack
page read and write
7FAF000
stack
page read and write
4160000
unkown
page read and write
2A70000
unkown
page read and write
66D000
trusted library allocation
page read and write
2CC7000
unkown
page readonly
290000
unkown
page readonly
212F000
unkown
page read and write
950000
heap
page read and write
7E1E000
stack
page read and write
437F000
trusted library allocation
page read and write
96A0000
unkown
page read and write
CD4000
trusted library allocation
page execute and read and write
45A1000
unkown
page read and write
640000
trusted library allocation
page read and write
95A0000
unkown
page read and write
456F000
unkown
page read and write
2EC1000
unkown
page read and write
230000
heap
page read and write
532E000
stack
page read and write
44E7000
unkown
page read and write
782F000
stack
page read and write
8B7000
trusted library allocation
page read and write
64D4000
trusted library allocation
page read and write
640A000
trusted library allocation
page read and write
20D9000
trusted library allocation
page read and write
430000
unkown
page readonly
263C000
unkown
page read and write
5C8000
heap
page read and write
3298000
unkown
page read and write
6A2F000
stack
page read and write
6D48000
stack
page read and write
2A20000
unkown
page read and write
1B83000
heap
page read and write
42D0000
trusted library allocation
page read and write
2A80000
unkown
page read and write
6CB0000
stack
page read and write
6700000
trusted library allocation
page read and write
6505000
trusted library allocation
page read and write
2911000
trusted library allocation
page execute and read and write
660E000
trusted library allocation
page read and write
9923000
heap
page read and write
4150000
unkown
page readonly
6B97000
trusted library allocation
page read and write
4C5E000
stack
page read and write
5216000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
30E0000
unkown
page readonly
2B0000
trusted library allocation
page execute and read and write
2080000
trusted library allocation
page read and write
73B9000
stack
page read and write
29B000
heap
page read and write
85C000
heap
page read and write
5B0000
trusted library allocation
page read and write
2A50000
unkown
page read and write
2540000
unkown
page read and write
2EC1000
unkown
page read and write
993000
trusted library allocation
page read and write
9663000
unkown
page read and write
110000
unkown
page read and write
20DA000
unkown
page read and write
2C7000
heap
page read and write
2A30000
unkown
page read and write
7988000
stack
page read and write
4308000
stack
page read and write
255E000
stack
page read and write
3130000
unkown
page readonly
81AE000
stack
page read and write
6BBE000
stack
page read and write
324000
heap
page read and write
6B6B000
trusted library allocation
page read and write
211F000
unkown
page read and write
6536000
trusted library allocation
page read and write
23D000
heap
page read and write
4D80000
unkown
page readonly
47C0000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
678B000
trusted library allocation
page read and write
73BB000
stack
page read and write
32A0000
heap
page read and write
5B0000
unkown
page readonly
5390000
heap
page read and write
3C90000
unkown
page read and write
2533000
unkown
page read and write
74B0000
heap
page read and write
2900000
trusted library allocation
page execute and read and write
5270000
unkown
page execute read
2750000
unkown
page read and write
4575000
unkown
page read and write
2951000
unkown
page read and write
78B7000
stack
page read and write
729A000
stack
page read and write
744D000
stack
page read and write
6AF2000
trusted library allocation
page read and write
626E000
trusted library allocation
page read and write
43A0000
unkown
page readonly
34E000
unkown
page read and write
27A0000
trusted library allocation
page execute and read and write
7BD0000
heap
page read and write
20DA000
unkown
page read and write
4428000
stack
page read and write
30E0000
unkown
page readonly
280000
trusted library allocation
page read and write
74B4000
heap
page read and write
2760000
unkown
page readonly
834B000
unkown
page read and write
30D0000
unkown
page readonly
3278000
unkown
page read and write
358000
unkown
page readonly
706F000
trusted library allocation
page read and write
685C000
trusted library allocation
page read and write
9FD000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
3D40000
stack
page read and write
1AB000
trusted library allocation
page execute and read and write
3CA0000
unkown
page read and write
7CFE000
stack
page read and write
C6E000
stack
page read and write
6BE3000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
294F000
stack
page read and write
4900000
trusted library allocation
page read and write
25C3000
unkown
page read and write
4A40000
trusted library allocation
page read and write
36F000
unkown
page read and write
3E50000
unkown
page readonly
212F000
unkown
page read and write
7FAF000
stack
page read and write
290000
unkown
page readonly
650000
trusted library allocation
page execute and read and write
43A0000
unkown
page readonly
4180000
heap
page read and write
6A60000
heap
page read and write
30A8000
stack
page read and write
292000
unkown
page execute read
2D22000
unclassified section
page read and write
6A38000
stack
page read and write
BAE000
stack
page read and write
874000
heap
page read and write
447A000
unkown
page read and write
8406000
unkown
page read and write
50000
unkown
page readonly
2130000
unkown
page read and write
4E5E000
stack
page read and write
4150000
unkown
page readonly
6BBE000
stack
page read and write
220000
unkown
page readonly
98C000
heap
page read and write
4593000
unkown
page read and write
D50000
trusted library allocation
page execute and read and write
5E3F000
stack
page read and write
ACE000
stack
page read and write
45A1000
unkown
page read and write
66BB000
trusted library allocation
page read and write
8320000
unkown
page read and write
20000
unkown
page readonly
65EF000
trusted library allocation
page read and write
634E000
trusted library allocation
page read and write
4DC0000
unkown
page read and write
649C000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
20DA000
unkown
page read and write
24F0000
unkown
page readonly
7D20000
heap
page read and write
2760000
unkown
page readonly
4B00000
unkown
page readonly
6A2F000
stack
page read and write
237000
heap
page read and write
834B000
unkown
page read and write
5216000
trusted library allocation
page read and write
CD1000
trusted library allocation
page execute and read and write
3D4B000
stack
page read and write
6475000
trusted library allocation
page read and write
629E000
trusted library allocation
page read and write
3C90000
unkown
page read and write
532E000
stack
page read and write
F0000
unkown
page read and write
AA4000
trusted library allocation
page read and write
20000
heap
page read and write
45CB000
unkown
page read and write
7839000
stack
page read and write
24F0000
unkown
page readonly
6A60000
heap
page read and write
60000
unkown
page readonly
79F0000
heap
page read and write
255000
heap
page read and write
220000
trusted library allocation
page execute and read and write
2AC0000
unkown
page read and write
2120000
unkown
page read and write
B40000
trusted library allocation
page execute and read and write
6BB8000
trusted library allocation
page read and write
6D48000
stack
page read and write
6B1E000
trusted library allocation
page read and write
4150000
unkown
page readonly
27E0000
unkown
page read and write
4DD0000
heap
page read and write
4B00000
unkown
page readonly
20000
trusted library allocation
page read and write
64FF000
trusted library allocation
page read and write
31FF000
stack
page read and write
782F000
stack
page read and write
2A80000
unkown
page read and write
630000
trusted library allocation
page read and write
BE1000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
7FAF000
stack
page read and write
4AC0000
unkown
page read and write
23D000
heap
page read and write
920000
trusted library allocation
page read and write
8374000
unkown
page read and write
270000
trusted library allocation
page read and write
290000
unkown
page readonly
2760000
unkown
page readonly
6820000
trusted library allocation
page read and write
30D0000
unkown
page readonly
5216000
trusted library allocation
page read and write
73BB000
stack
page read and write
2AD0000
unkown
page read and write
4D60000
unkown
page readonly
D0000
unkown
page readonly
47D0000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
532E000
stack
page read and write
4C70000
heap
page read and write
673E000
trusted library allocation
page read and write
729A000
stack
page read and write
4DD0000
heap
page read and write
4D80000
unkown
page readonly
290000
unkown
page readonly
174000
trusted library allocation
page read and write
96E3000
unkown
page read and write
4B9D000
stack
page read and write
292000
unkown
page execute read
51E6000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
8E0000
heap
page read and write
140000
trusted library allocation
page execute and read and write
7330000
stack
page read and write
3270000
unkown
page read and write
6564000
trusted library allocation
page read and write
51C3000
trusted library allocation
page read and write
1BE0000
unkown
page readonly
67B0000
trusted library allocation
page read and write
2520000
unkown
page read and write
4E60000
unkown
page read and write
3CC0000
unkown
page readonly
2244000
trusted library allocation
page read and write
45B4000
unkown
page read and write
2AC0000
unkown
page read and write
1D7000
stack
page read and write
8720000
unkown
page read and write
7CFE000
stack
page read and write
96E3000
unkown
page read and write
2100000
unkown
page readonly
290000
unkown
page readonly
4C0000
heap
page read and write
2EC1000
unkown
page read and write
21EE000
stack
page read and write | page guard
6B63000
trusted library allocation
page read and write
7B50000
heap
page read and write
130000
trusted library allocation
page read and write
78B2000
stack
page read and write
4AAD000
stack
page read and write
979000
heap
page read and write
8355000
unkown
page read and write
29E0000
unkown
page read and write
5360000
unkown
page read and write
2A00000
unkown
page read and write
173000
trusted library allocation
page execute and read and write
2F20000
heap
page read and write
457A000
unkown
page read and write
7988000
stack
page read and write
4C70000
heap
page read and write
81CE000
stack
page read and write | page guard
358000
unkown
page readonly
1E0000
unkown
page read and write
3D90000
unkown
page read and write
305000
unkown
page execute read
4B9D000
stack
page read and write
2A80000
unkown
page read and write
A50000
trusted library allocation
page execute and read and write
E0000
heap
page read and write
E0000
heap
page read and write
31FF000
stack
page read and write
74B0000
heap
page read and write
4C70000
heap
page read and write
653D000
trusted library allocation
page read and write
5C2000
heap
page read and write
292000
unkown
page execute read
BE4000
trusted library allocation
page read and write
297000
heap
page read and write
8320000
unkown
page read and write
95E4000
unkown
page read and write
4150000
unkown
page readonly
249000
heap
page read and write
669E000
trusted library allocation
page read and write
460B000
unkown
page read and write
30A8000
stack
page read and write
5288000
trusted library allocation
page read and write
8406000
unkown
page read and write
2AE0000
unkown
page readonly
6747000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
213F000
unkown
page read and write
372000
unkown
page read and write
36F000
unkown
page read and write
2646000
unkown
page read and write
A60000
trusted library allocation
page execute and read and write
2F10000
unkown
page read and write
65BF000
trusted library allocation
page read and write
8B4000
trusted library allocation
page read and write
3278000
unkown
page read and write
66A3000
trusted library allocation
page read and write
305000
unkown
page execute read
25C3000
unkown
page read and write
6726000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
3C90000
unkown
page read and write
5D0000
trusted library allocation
page read and write
292000
unkown
page execute read
AF0000
trusted library allocation
page read and write
2CC7000
unkown
page readonly
1B83000
heap
page read and write
36B000
unkown
page read and write
213F000
unkown
page read and write
8C20000
unkown
page read and write
330000
unkown
page read and write
4D70000
unkown
page readonly
6AE5000
trusted library allocation
page read and write
27A0000
unkown
page readonly
3B8000
unkown
page read and write
2760000
unkown
page readonly
808E000
stack
page read and write
7D20000
heap
page read and write
356000
unkown
page write copy
4450000
unkown
page read and write
2750000
unkown
page read and write
590000
trusted library allocation
page read and write
6A60000
heap
page read and write
211F000
unkown
page read and write
3D4B000
stack
page read and write
4575000
unkown
page read and write
6503000
trusted library allocation
page read and write
79F0000
heap
page read and write
10000
heap
page read and write
330000
unkown
page read and write
66EA000
trusted library allocation
page read and write
66B7000
trusted library allocation
page read and write
3145000
heap
page read and write
31D000
heap
page read and write
32A5000
heap
page read and write
5C3000
heap
page read and write
F0000
unkown
page read and write
2A30000
unkown
page read and write
7B0000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
744D000
stack
page read and write
3140000
heap
page read and write
255000
heap
page read and write
8392000
unkown
page read and write
21BF000
stack
page read and write
7662000
trusted library allocation
page read and write
BE0000
trusted library allocation
page execute and read and write
20CC000
stack
page read and write
3DF8000
unkown
page read and write
2740000
unkown
page readonly
4D20000
unkown
page execute and read and write
47F0000
trusted library allocation
page read and write
83FE000
unkown
page read and write
69B9000
trusted library allocation
page read and write
2F10000
unkown
page read and write
36F000
unkown
page read and write
213F000
unkown
page read and write
6ADE000
trusted library allocation
page read and write
750000
unkown
page readonly
1E0000
unkown
page read and write
65EC000
trusted library allocation
page read and write
26B000
stack
page read and write
356000
unkown
page write copy
290000
unkown
page readonly
18C000
stack
page read and write
305000
unkown
page execute read
7B0000
trusted library allocation
page read and write
30A8000
stack
page read and write
5B0000
unkown
page readonly
692C000
trusted library allocation
page read and write
32AE000
heap
page read and write
2690000
trusted library allocation
page execute and read and write
358000
unkown
page readonly
9563000
unkown
page read and write
6D7A000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
D40000
trusted library allocation
page execute and read and write
6A2F000
stack
page read and write
8355000
unkown
page read and write
23D000
heap
page read and write
3D90000
unkown
page read and write
6FF0000
trusted library allocation
page read and write
E0000
heap
page read and write
518C000
trusted library allocation
page read and write
263C000
unkown
page read and write
3278000
unkown
page read and write
808E000
stack
page read and write
6362000
trusted library allocation
page read and write
1A2000
trusted library allocation
page read and write
169000
heap
page read and write
64D0000
trusted library allocation
page read and write
309E000
stack
page read and write
30F0000
unkown
page readonly
2EC1000
unkown
page read and write
45CF000
unkown
page read and write
2A10000
unkown
page read and write
8392000
unkown
page read and write
3D4B000
stack
page read and write
3CA0000
unkown
page read and write
4308000
stack
page read and write
230000
heap
page read and write
7B40000
stack
page read and write
6B28000
trusted library allocation
page read and write
5410000
heap
page read and write
9623000
unkown
page read and write
AD0000
system
page execute and read and write
358000
unkown
page readonly
98F000
stack
page read and write
30000
unclassified section
page execute and read and write
7C0000
trusted library allocation
page read and write
4D70000
unkown
page readonly
5270000
unkown
page execute read
290000
heap
page read and write
305000
unkown
page execute read
66ED000
trusted library allocation
page read and write
2EF0000
unkown
page read and write
6ADB000
trusted library allocation
page read and write
213F000
unkown
page read and write
1B65000
heap
page read and write
594000
heap
page read and write
556F000
stack
page read and write
1D0000
heap
page read and write
5188000
trusted library allocation
page read and write
4160000
unkown
page read and write
27C0000
unkown
page read and write
7988000
stack
page read and write
68A7000
trusted library allocation
page read and write
211F000
unkown
page read and write
356000
unkown
page write copy
533D000
trusted library allocation
page read and write
2AE0000
unkown
page readonly
2740000
unkown
page readonly
4D50000
unkown
page readonly
20D0000
trusted library allocation
page read and write
10000
heap
page read and write
29F0000
unkown
page read and write
674C000
trusted library allocation
page read and write
6D40000
stack
page read and write
2130000
unkown
page read and write
6B60000
trusted library allocation
page read and write
356000
unkown
page write copy
CD7000
trusted library allocation
page execute and read and write
356000
unkown
page write copy
9522000
unkown
page read and write
30A8000
stack
page read and write
436C000
heap
page read and write
4AAD000
stack
page read and write
74D3000
heap
page read and write
4C7A000
heap
page read and write
2A00000
unkown
page read and write
3D40000
stack
page read and write
7645000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
6731000
trusted library allocation
page read and write
E4000
heap
page read and write
6F9A000
trusted library allocation
page read and write
4300000
stack
page read and write
73B9000
stack
page read and write
2F20000
heap
page read and write
2533000
unkown
page read and write
E4000
heap
page read and write
1B50000
unkown
page read and write
2A10000
unkown
page read and write
249000
heap
page read and write
4650000
unkown
page readonly
4428000
stack
page read and write
65C6000
trusted library allocation
page read and write
45CB000
unkown
page read and write
65B4000
trusted library allocation
page read and write
2540000
unkown
page read and write
51C3000
trusted library allocation
page read and write
621F000
trusted library allocation
page read and write
4D30000
unkown
page readonly
13A000
stack
page read and write
94E0000
unkown
page read and write
1CE000
stack
page read and write
6D40000
stack
page read and write
85A000
heap
page read and write
140000
unkown
page readonly
2110000
unkown
page read and write
2550000
unkown
page read and write
65CC000
trusted library allocation
page read and write
32A0000
heap
page read and write
4593000
unkown
page read and write
6792000
trusted library allocation
page read and write
4180000
heap
page read and write
D0000
unkown
page readonly
45BE000
unkown
page read and write
6EC6000
trusted library allocation
page read and write
1B83000
heap
page read and write
2500000
unkown
page readonly
4650000
unkown
page readonly
449C000
unkown
page read and write
C6F000
stack
page read and write
2990000
trusted library allocation
page execute and read and write
2980000
trusted library allocation
page execute and read and write
2A50000
unkown
page read and write
4E60000
unkown
page read and write
64A1000
trusted library allocation
page read and write
358000
unkown
page readonly
8BD000
heap
page read and write
5288000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
4C1E000
stack
page read and write
292000
unkown
page execute read
78B2000
stack
page read and write
4D60000
unkown
page readonly
290000
unkown
page readonly
2740000
unkown
page readonly
237000
heap
page read and write
6A38000
stack
page read and write
45BF000
unkown
page read and write
430000
unkown
page readonly
63CF000
trusted library allocation
page read and write
29E0000
unkown
page read and write
305000
unkown
page execute read
4CB000
heap
page read and write
2F20000
heap
page read and write
66E6000
trusted library allocation
page read and write
5B9000
heap
page read and write
F6F000
stack
page read and write
17D000
trusted library allocation
page execute and read and write
2246000
trusted library allocation
page read and write
728E000
stack
page read and write
45E000
stack
page read and write
817000
heap
page read and write
6C30000
stack
page read and write
21EF000
stack
page read and write
5390000
heap
page read and write
30D0000
unkown
page readonly
9923000
heap
page read and write
728E000
stack
page read and write
243000
heap
page read and write
7B40000
stack
page read and write
368000
trusted library allocation
page read and write
3140000
heap
page read and write
5320000
trusted library allocation
page read and write
5B7000
heap
page read and write
3CC0000
unkown
page readonly
243000
heap
page read and write
372000
unkown
page read and write
5360000
unkown
page read and write
36B000
unkown
page read and write
2750000
unkown
page read and write
8C3E000
unkown
page read and write
1FD0000
unkown
page readonly
3278000
unkown
page read and write
249000
heap
page read and write
8C20000
unkown
page read and write
2F10000
unkown
page read and write
32A9000
heap
page read and write
BFE000
stack
page read and write
29AA000
unclassified section
page read and write
309E000
stack
page read and write
456F000
unkown
page read and write
259E000
stack
page read and write
4D70000
unkown
page readonly
5470000
trusted library allocation
page read and write
95E000
heap
page read and write
45BE000
unkown
page read and write
577000
heap
page read and write
460B000
unkown
page read and write
6C30000
stack
page read and write
95F000
heap
page read and write
2917000
trusted library allocation
page execute and read and write
60000
unkown
page readonly
61F000
stack
page read and write
81CF000
stack
page read and write
1BE0000
unkown
page readonly
4160000
unkown
page read and write
32A9000
heap
page read and write
7EFE0000
unkown
page readonly
2F00000
unkown
page read and write
4308000
stack
page read and write
4E5E000
stack
page read and write
237000
heap
page read and write
4D80000
unkown
page readonly
6D55000
trusted library allocation
page read and write
290000
unkown
page readonly
3E50000
unkown
page readonly
3CA0000
unkown
page read and write
5B0E000
stack
page read and write
622E000
trusted library allocation
page read and write
140000
unkown
page readonly
6FB7000
trusted library allocation
page read and write
2120000
unkown
page read and write
10000
heap
page read and write
358000
unkown
page readonly
7B4B000
stack
page read and write
280000
trusted library allocation
page read and write
518D000
trusted library allocation
page read and write
695E000
trusted library allocation
page read and write
3B8000
unkown
page read and write
45B4000
unkown
page read and write
292000
unkown
page execute read
447A000
unkown
page read and write
45CB000
unkown
page read and write
110000
heap
page read and write
31FF000
stack
page read and write
50000
unkown
page readonly
96A0000
unkown
page read and write
20000
unkown
page readonly
1D7000
stack
page read and write
7839000
stack
page read and write
3D40000
stack
page read and write
48FF000
stack
page read and write
4B9D000
stack
page read and write
4450000
unkown
page read and write
4D20000
unkown
page execute and read and write
2646000
unkown
page read and write
6560000
trusted library allocation
page read and write
4B9D000
stack
page read and write
309E000
stack
page read and write
4A60000
trusted library allocation
page read and write
4B00000
unkown
page readonly
30E0000
unkown
page readonly
728E000
stack
page read and write
645F000
trusted library allocation
page read and write
2CC7000
unkown
page readonly
6777000
trusted library allocation
page read and write
10000
heap
page read and write
920000
trusted library allocation
page read and write
356000
unkown
page write copy
30F0000
unkown
page readonly
32A0000
heap
page read and write
4E60000
unkown
page read and write
74D3000
heap
page read and write
290000
unkown
page readonly
51A7000
trusted library allocation
page read and write
2C7000
heap
page read and write
7B4B000
stack
page read and write
6745000
trusted library allocation
page read and write
43A0000
unkown
page readonly
6530000
trusted library allocation
page read and write
4DD0000
heap
page read and write
45BE000
unkown
page read and write
641E000
trusted library allocation
page read and write
782F000
stack
page read and write
301E000
stack
page read and write
6B20000
trusted library allocation
page read and write
6AD3000
trusted library allocation
page read and write
6918000
trusted library allocation
page read and write
32A9000
heap
page read and write
9923000
heap
page read and write
31D000
heap
page read and write
BE7000
trusted library allocation
page read and write
192000
trusted library allocation
page read and write
3130000
unkown
page readonly
4DB1000
unkown
page read and write
6C38000
stack
page read and write
750000
unkown
page readonly
301E000
stack
page read and write
738E000
trusted library allocation
page read and write
5390000
heap
page read and write
2646000
unkown
page read and write
6BE1000
trusted library allocation
page read and write
2790000
trusted library allocation
page execute and read and write
197000
trusted library allocation
page execute and read and write
5C8000
heap
page read and write
45A1000
unkown
page read and write
28F2000
unkown
page read and write
460000
trusted library allocation
page read and write
4E5E000
stack
page read and write
2920000
trusted library allocation
page execute and read and write
6CD9000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
4C1E000
stack
page read and write
6D48000
stack
page read and write
1FD0000
unkown
page readonly
470000
heap
page execute and read and write
3145000
heap
page read and write
400000
trusted library allocation
page read and write
6785000
trusted library allocation
page read and write
3CC0000
unkown
page readonly
1BE0000
unkown
page readonly
8406000
unkown
page read and write
6E50000
heap
page read and write
2500000
unkown
page readonly
676F000
trusted library allocation
page read and write
27C0000
unkown
page read and write
4DB1000
unkown
page read and write
F0000
unkown
page read and write
9563000
unkown
page read and write
5188000
trusted library allocation
page read and write
4D40000
unkown
page readonly
20000
unkown
page readonly
729A000
stack
page read and write
67DA000
trusted library allocation
page read and write
2951000
unkown
page read and write
2F20000
heap
page read and write
6D40000
stack
page read and write
83FE000
unkown
page read and write
63BB000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
45CF000
unkown
page read and write
79F0000
heap
page read and write
6A0000
heap
page read and write
2A70000
unkown
page read and write
672E000
trusted library allocation
page read and write
7B4B000
stack
page read and write
1CE000
stack
page read and write
5360000
unkown
page read and write
2120000
unkown
page read and write
5A8000
stack
page read and write
6740000
trusted library allocation
page read and write
2100000
unkown
page readonly
270000
trusted library allocation
page read and write
4E5E000
stack
page read and write
876000
unclassified section
page execute and read and write
358000
unkown
page readonly
130000
trusted library allocation
page read and write
850000
heap
page read and write
2C7000
heap
page read and write
4D60000
unkown
page readonly
20B6000
unkown
page read and write
32A5000
heap
page read and write
7338000
stack
page read and write
2794000
trusted library allocation
page execute and read and write
4593000
unkown
page read and write
1B50000
unkown
page read and write
6CB9000
stack
page read and write
1CC000
stack
page read and write
243000
heap
page read and write
49E0000
trusted library section
page read and write
1B60000
heap
page read and write
13D000
stack
page read and write
7839000
stack
page read and write
1EB000
stack
page read and write
E4000
heap
page read and write
6BA5000
trusted library allocation
page read and write
7B0000
unclassified section
page execute and read and write
31FF000
stack
page read and write
5FF000
stack
page read and write
66B9000
trusted library allocation
page read and write
97E6000
unkown
page execute and read and write
30E0000
unkown
page readonly
6CB9000
stack
page read and write
62FE000
trusted library allocation
page read and write
7338000
stack
page read and write
445B000
unkown
page read and write
6B58000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
678F000
trusted library allocation
page read and write
3E50000
unkown
page readonly
63B0000
trusted library allocation
page read and write
4575000
unkown
page read and write
30C0000
unkown
page read and write
96A0000
unkown
page read and write
2A30000
unkown
page read and write
9563000
unkown
page read and write
1BE0000
unkown
page readonly
4D30000
unkown
page readonly
6B15000
trusted library allocation
page read and write
6CB9000
stack
page read and write
290000
unkown
page readonly
29F0000
unkown
page read and write
10000
heap
page read and write
29B000
heap
page read and write
24F0000
unkown
page readonly
6A60000
heap
page read and write
460B000
unkown
page read and write
4D30000
unkown
page readonly
3D50000
unkown
page read and write
892000
heap
page read and write
58B000
stack
page read and write
B60000
trusted library allocation
page execute and read and write
6BBE000
stack
page read and write
2520000
unkown
page read and write
73B9000
stack
page read and write
6C38000
stack
page read and write
920000
trusted library allocation
page read and write
36B000
unkown
page read and write
BC000
stack
page read and write
29E0000
unkown
page read and write
7001000
trusted library allocation
page read and write
3CC0000
unkown
page readonly
130000
trusted library allocation
page read and write
7839000
stack
page read and write
5470000
trusted library allocation
page read and write
25C3000
unkown
page read and write
66E1000
trusted library allocation
page read and write
3D50000
unkown
page read and write
81AE000
stack
page read and write
6312000
trusted library allocation
page read and write
4300000
stack
page read and write
7330000
stack
page read and write
8392000
unkown
page read and write
237000
heap
page read and write
7650000
trusted library allocation
page read and write
64CA000
trusted library allocation
page read and write
6BDB000
trusted library allocation
page read and write
20B6000
unkown
page read and write
457A000
unkown
page read and write
3DF8000
unkown
page read and write
7C0000
trusted library allocation
page read and write
230000
heap
page read and write
1B60000
heap
page read and write
4A50000
trusted library allocation
page read and write
2520000
unkown
page read and write
75BB000
trusted library allocation
page read and write
45B4000
unkown
page read and write
27A0000
unkown
page readonly
10000
heap
page read and write
6CB0000
stack
page read and write
E4000
heap
page read and write
4D30000
unkown
page readonly
130000
trusted library allocation
page read and write
4DB1000
unkown
page read and write
6E50000
heap
page read and write
356000
unkown
page write copy
69E000
stack
page read and write
32A5000
heap
page read and write
3DF8000
unkown
page read and write
5D0000
trusted library allocation
page read and write
6D48000
stack
page read and write
449C000
unkown
page read and write
61CB000
trusted library allocation
page read and write
305000
unkown
page execute read
358000
unkown
page readonly
4C7A000
heap
page read and write
230000
heap
page read and write
36B000
unkown
page read and write
1D7000
stack
page read and write
60000
unkown
page readonly
61B1000
trusted library allocation
page read and write
A7F000
stack
page read and write
6BF6000
trusted library allocation
page read and write
6E50000
heap
page read and write
4180000
heap
page read and write
7B50000
heap
page read and write
230000
heap
page read and write
2DB000
heap
page read and write
5A7000
heap
page read and write
74D3000
heap
page read and write
660C000
trusted library allocation
page read and write
8AE000
stack
page read and write
212F000
unkown
page read and write
676B000
trusted library allocation
page read and write
140000
unkown
page readonly
4C1E000
stack
page read and write
2914000
trusted library allocation
page execute and read and write
4180000
heap
page read and write
2F00000
unkown
page read and write
9900000
heap
page read and write
F0000
unkown
page read and write
51E6000
trusted library allocation
page read and write
9522000
unkown
page read and write
556F000
stack
page read and write
64B1000
trusted library allocation
page read and write
5282000
trusted library allocation
page read and write
460B000
unkown
page read and write
5A0000
heap
page read and write
4DC0000
unkown
page read and write
4350000
trusted library allocation
page read and write
6C30000
stack
page read and write
1A5000
trusted library allocation
page execute and read and write
68E8000
trusted library allocation
page read and write
9663000
unkown
page read and write
18D000
trusted library allocation
page execute and read and write
729A000
stack
page read and write
2540000
unkown
page read and write
330000
unkown
page read and write
74B0000
heap
page read and write
292000
unkown
page execute read
2EF0000
unkown
page read and write
6A2F000
stack
page read and write
9720000
unkown
page execute and read and write
2A00000
unkown
page read and write
44E7000
unkown
page read and write
650000
trusted library allocation
page read and write
51C4000
trusted library allocation
page read and write
67E9000
trusted library allocation
page read and write
25B000
trusted library allocation
page read and write
6B9D000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
2A70000
unkown
page read and write
430000
unkown
page readonly
31D000
heap
page read and write
4A40000
trusted library allocation
page read and write
358000
unkown
page readonly
220000
unkown
page readonly
20DA000
unkown
page read and write
7338000
stack
page read and write
290000
unkown
page readonly
2951000
unkown
page read and write
4AE2000
heap
page read and write
130000
trusted library allocation
page read and write
4650000
unkown
page readonly
34E000
unkown
page read and write
91E000
stack
page read and write
5270000
unkown
page execute read
64A8000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
1B60000
heap
page read and write
4308000
stack
page read and write
2EF0000
unkown
page read and write
7A0000
trusted library allocation
page read and write
97E6000
unkown
page execute and read and write
7A0000
trusted library allocation
page read and write
255000
heap
page read and write
2120000
unkown
page read and write
6772000
trusted library allocation
page read and write
518C000
trusted library allocation
page read and write
1FD0000
unkown
page readonly
810000
heap
page read and write
570000
heap
page read and write
95E4000
unkown
page read and write
CC0000
trusted library allocation
page execute and read and write
23D000
heap
page read and write
2A10000
unkown
page read and write
6FB0000
trusted library allocation
page read and write
686B000
trusted library allocation
page read and write
2A50000
unkown
page read and write
4D70000
unkown
page readonly
3270000
unkown
page read and write
5410000
heap
page read and write
45CF000
unkown
page read and write
340000
heap
page read and write
5AD000
heap
page read and write
3270000
unkown
page read and write
2533000
unkown
page read and write
4AC0000
unkown
page read and write
29B000
heap
page read and write
790000
heap
page read and write
6734000
trusted library allocation
page read and write
300000
heap
page read and write
45A1000
unkown
page read and write
B57000
trusted library allocation
page execute and read and write
4300000
stack
page read and write
4DB1000
unkown
page read and write
554E000
stack
page read and write
6C38000
stack
page read and write
20000
unkown
page readonly
6392000
trusted library allocation
page read and write
110000
unkown
page read and write
27A0000
unkown
page readonly
AD0000
system
page execute and read and write
83FE000
unkown
page read and write
730000
heap
page read and write
There are 1392 hidden memdumps, click here to show them.