IOC Report
BON DE COMMANDE POUR CHENOUFI AEK.xlsx

loading gif

Files

File Path
Type
Category
Malicious
BON DE COMMANDE POUR CHENOUFI AEK.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
downloaded
malicious
C:\Users\user\AppData\Local\Temp\bmexo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$BON DE COMMANDE POUR CHENOUFI AEK.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\71EFD22C.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AD6B8317.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BCA69961.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4ED06E0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F00B6FEE.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Temp\fmrfya
data
dropped
C:\Users\user\AppData\Local\Temp\nsmD99.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\pm30pgwp2di9
data
dropped
C:\Users\user\AppData\Local\Temp\~DF05A0E9538DA984DE.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DF4F6886DF9AB47DD5.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF5923B3D402615EB4.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF91A8639994D1ECD1.TMP
data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Users\user\AppData\Local\Temp\bmexo.exe
C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
malicious
C:\Users\user\AppData\Local\Temp\bmexo.exe
C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\chkdsk.exe
C:\Windows\SysWOW64\chkdsk.exe
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\AppData\Local\Temp\bmexo.exe"

URLs

Name
IP
Malicious
http://103.156.91.153/fdcloudfiles/vbc.exej
unknown
malicious
http://103.156.91.153/fdcloudfiles/vbc.exes
unknown
malicious
http://103.156.91.153/fdcloudfiles/vbc.exe
103.156.91.153
malicious
www.freerenoadvice.com/ud5f/
malicious
http://103.156.91.153/fdcloudfiles/vbc.exehhC:
unknown
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.iis.fhg.de/audioPA
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://www.piriform.com/ccleanerv
unknown
http://servername/isapibackend.dll
unknown
There are 19 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.156.91.153
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
d-.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\66AA5
66AA5
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
?.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6C2B3
6C2B3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6E0FC
6E0FC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6C2B3
6C2B3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
300000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
90000
system
page execute and read and write
malicious
170000
direct allocation
page read and write
malicious
A9D3000
unkown
page execute and read and write
malicious
F0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A9D3000
unkown
page execute and read and write
malicious
430000
unclassified section
page execute and read and write
malicious
200000
unclassified section
page execute and read and write
malicious
42AE000
stack
page read and write
741F000
stack
page read and write
886F000
unkown
page read and write
42AE000
stack
page read and write
1D13000
unkown
page read and write
4C10000
heap
page read and write
37B000
heap
page read and write
6A6D000
stack
page read and write
41E0000
unkown
page read and write
8608000
unkown
page read and write
B763000
unkown
page read and write
4C10000
heap
page read and write
300000
unkown
page read and write
3AC8000
unkown
page read and write
3F0000
heap
page read and write
D90000
direct allocation
page read and write
28C0000
unkown
page read and write
44F0000
unkown
page readonly
26BA000
unkown
page read and write
2A60000
trusted library allocation
page read and write
2CBF000
unkown
page read and write
20000
heap
page read and write
2AF000
unkown
page read and write
B5E2000
unkown
page read and write
7064000
heap
page read and write
F33000
unkown
page read and write
AA13000
unkown
page execute and read and write
2CA5000
unkown
page read and write
1D73000
heap
page read and write
4220000
unkown
page readonly
41E0000
unkown
page read and write
2CAB000
unkown
page read and write
77C000
unkown
page read and write
1D30000
unkown
page read and write
3CF7000
unkown
page readonly
C30000
direct allocation
page read and write
6FC0000
heap
page read and write
F20000
unkown
page readonly
3AE000
heap
page read and write
8664000
unkown
page read and write
3DD000
stack
page read and write
2C10000
unkown
page read and write
800000
trusted library allocation
page read and write
2E9F000
stack
page read and write
400000
unkown
page readonly
3BF000
heap
page read and write
A87000
trusted library allocation
page execute and read and write
39D0000
unkown
page read and write
E0000
unkown
page read and write
6FC4000
heap
page read and write
6750000
unkown
page read and write
39E0000
heap
page read and write
6FC4000
heap
page read and write
2961000
unkown
page read and write
4F60000
heap
page read and write
480E000
stack
page read and write
7230000
heap
page read and write
7169000
stack
page read and write
84D2000
unkown
page read and write
830000
unkown
page readonly
84EE000
unkown
page read and write
79F0000
heap
page read and write
AB1E000
stack
page read and write
41D0000
unkown
page readonly
4220000
unkown
page readonly
63AF000
trusted library allocation
page read and write
8844000
unkown
page read and write
879E000
unkown
page read and write
45A0000
unkown
page readonly
7934000
heap
page read and write
42B000
heap
page read and write
6F0000
heap
page read and write
46D0000
unkown
page readonly
750000
heap
page read and write
6330000
heap
page read and write
4D5E000
stack
page read and write
851A000
unkown
page read and write
329000
heap
page read and write
3A70000
unkown
page read and write
2E0000
heap
page read and write
B900000
heap
page read and write
B923000
heap
page read and write
7B5000
unkown
page read and write
2A0F000
stack
page read and write
689000
heap
page read and write
19F000
stack
page read and write
2961000
unkown
page read and write
E81000
direct allocation
page read and write
35CD000
stack
page read and write
6DDE000
stack
page read and write
60000
unkown
page readonly
2801000
unkown
page read and write
3FD000
heap
page read and write
77DF000
stack
page read and write
2B0000
unkown
page read and write
2CBF000
unkown
page read and write
1D13000
unkown
page read and write
B923000
heap
page read and write
4F0000
heap
page read and write
B763000
unkown
page read and write
8802000
unkown
page read and write
41D0000
unkown
page readonly
2C00000
unkown
page read and write
4338000
unkown
page read and write
B620000
unkown
page read and write
408000
unkown
page readonly
1DD0000
unkown
page readonly
6C78000
stack
page read and write
223F000
stack
page read and write
82D5000
unkown
page read and write
2CA0000
unkown
page read and write
8371000
unkown
page read and write
2898000
stack
page read and write
25E0000
trusted library allocation
page execute and read and write
1D73000
heap
page read and write
786000
unkown
page read and write
8506000
unkown
page read and write
4520000
unkown
page readonly
2BFE000
stack
page read and write
1E0000
trusted library allocation
page read and write
7422000
stack
page read and write
2BFE000
stack
page read and write
2801000
unkown
page read and write
408000
unkown
page readonly
2FC9000
heap
page read and write
44F0000
unkown
page readonly
8903000
unkown
page read and write
6D49000
stack
page read and write
3FB7000
stack
page read and write
2310000
trusted library allocation
page read and write
410000
unkown
page read and write
F37000
unkown
page readonly
8611000
unkown
page read and write
550000
heap
page read and write
3E0000
heap
page read and write
2CBF000
unkown
page read and write
7E3B000
stack
page read and write
B923000
heap
page read and write
2BFE000
stack
page read and write
2B30000
unkown
page readonly
C80000
trusted library allocation
page execute and read and write
1D20000
unkown
page read and write
2CB0000
unkown
page read and write
1B0000
heap
page read and write
3A70000
unkown
page read and write
84C7000
unkown
page read and write
410C000
stack
page read and write
276000
heap
page read and write
2BF000
unkown
page read and write
2F9E000
stack
page read and write
8900000
unkown
page read and write
7083000
heap
page read and write
86CF000
unkown
page read and write
7410000
trusted library allocation
page read and write
8675000
unkown
page read and write
26BA000
unkown
page read and write
A9B0000
unkown
page execute and read and write
E87000
direct allocation
page read and write
3A6000
heap
page read and write
19F000
stack
page read and write
316000
heap
page read and write
690000
unkown
page readonly
4220000
unkown
page readonly
87E8000
unkown
page read and write
44B6000
unkown
page read and write
463D000
stack
page read and write
3B9000
heap
page read and write
F21000
unkown
page execute read
1D20000
unkown
page read and write
2CB0000
unkown
page read and write
F21000
unkown
page execute read
8861000
unkown
page read and write
42E000
unkown
page read and write
87E3000
unkown
page read and write
400000
unkown
page readonly
5F0000
heap
page read and write
2CA5000
unkown
page read and write
60000
unkown
page readonly
2B50000
unkown
page readonly
E70000
heap
page read and write
329000
heap
page read and write
3A6000
heap
page read and write
440D000
unkown
page read and write
2AE0000
unkown
page read and write
F2E000
unkown
page readonly
22D000
heap
page read and write
6E4C000
stack
page read and write
85FD000
unkown
page read and write
27F0000
unkown
page read and write
85F4000
unkown
page read and write
2B4E000
stack
page read and write
5AE000
stack
page read and write
B905000
heap
page read and write
6E5A000
stack
page read and write
2E7000
heap
page read and write
89000
stack
page read and write
885F000
unkown
page read and write
841B000
unkown
page read and write
2801000
unkown
page read and write
1F6000
heap
page read and write
19F000
stack
page read and write
335000
heap
page read and write
ADB000
stack
page read and write
8669000
unkown
page read and write
213E000
stack
page read and write
6DDE000
stack
page read and write
8669000
unkown
page read and write
2600000
unkown
page readonly
216A000
trusted library allocation
page read and write
8602000
unkown
page read and write
420000
heap
page read and write
1D50000
heap
page read and write
2B0000
trusted library allocation
page read and write
82CC000
unkown
page read and write
6E4E000
stack
page read and write
69C000
stack
page read and write
256000
unkown
page read and write
180000
trusted library allocation
page execute and read and write
860E000
unkown
page read and write
35D0000
trusted library allocation
page read and write
5F7000
heap
page read and write
72C0000
heap
page read and write
2CAE000
unkown
page read and write
F37000
unkown
page readonly
6F3F000
stack
page read and write
4030000
unkown
page execute read
6F7000
heap
page read and write
44E0000
unkown
page read and write
8337000
unkown
page read and write
3FB5000
stack
page read and write
316000
heap
page read and write
380000
trusted library allocation
page read and write
8820000
unkown
page read and write
42AE000
stack
page read and write
2B30000
unkown
page readonly
2CAE000
unkown
page read and write
29C000
heap
page read and write
742A000
stack
page read and write
1F0000
heap
page read and write
D0000
unkown
page readonly
E84000
direct allocation
page read and write
28F0000
unkown
page read and write
6450000
unkown
page readonly
7549000
heap
page read and write
866C000
unkown
page read and write
886A000
unkown
page read and write
410C000
stack
page read and write
742A000
stack
page read and write
2B10000
unkown
page read and write
D0000
unkown
page readonly
A8D8000
unkown
page read and write
25F7000
trusted library allocation
page execute and read and write
2A4000
heap
page read and write
3990000
unkown
page readonly
D0D000
direct allocation
page read and write
506000
unkown
page read and write
2FB0000
unkown
page read and write
3A4000
heap
page read and write
860B000
unkown
page read and write
1D50000
heap
page read and write
88FD000
unkown
page read and write
2B00000
unkown
page read and write
1D0000
heap
page read and write
83E2000
unkown
page read and write
4453000
unkown
page read and write
F37000
unkown
page readonly
41E0000
unkown
page read and write
237000
heap
page read and write
4D5E000
stack
page read and write
30000
trusted library allocation
page read and write
7930000
heap
page read and write
8337000
unkown
page read and write
E84000
direct allocation
page read and write
87FF000
unkown
page read and write
8805000
unkown
page read and write
A5AE000
stack
page read and write
2CB0000
unkown
page read and write
39D0000
unkown
page read and write
4F60000
heap
page read and write
28C0000
unkown
page read and write
2B0000
unkown
page read and write
335000
heap
page read and write
7567000
heap
page read and write
87FF000
unkown
page read and write
6F4C000
stack
page read and write
886A000
unkown
page read and write
830000
unkown
page readonly
3A4000
heap
page read and write
7BE0000
heap
page read and write
6370000
trusted library allocation
page read and write
2CA8000
unkown
page read and write
2AE0000
unkown
page read and write
5BF000
stack
page read and write
40A000
unkown
page read and write
3990000
unkown
page readonly
2A0000
unkown
page read and write
160000
direct allocation
page execute and read and write
1E10000
direct allocation
page read and write
100000
unkown
page read and write
42D0000
unkown
page read and write
C30000
direct allocation
page read and write
38A000
trusted library allocation
page read and write
2FC9000
heap
page read and write
869E000
unkown
page read and write
4570000
unkown
page readonly
2F0F000
stack
page read and write
44E0000
unkown
page read and write
2B0000
unkown
page read and write
3FB7000
stack
page read and write
690000
unkown
page readonly
22E4000
trusted library allocation
page read and write
50000
unkown
page readonly
8512000
unkown
page read and write
4453000
unkown
page read and write
2FA0000
unkown
page read and write
40A000
unkown
page write copy
2FB0000
unkown
page read and write
87F9000
unkown
page read and write
84C7000
unkown
page read and write
2FCE000
heap
page read and write
6750000
unkown
page read and write
86C9000
unkown
page read and write
8691000
unkown
page read and write
26C6000
unkown
page read and write
F20000
unkown
page readonly
85D2000
unkown
page read and write
210000
unkown
page readonly
1D13000
unkown
page read and write
2961000
unkown
page read and write
3990000
unkown
page readonly
E87000
direct allocation
page read and write
E0000
unkown
page read and write
7707000
stack
page read and write
2B00000
unkown
page read and write
1B0000
unkown
page read and write
785E000
stack
page read and write
2CBC000
unkown
page read and write
4E7000
heap
page read and write
F33000
unkown
page write copy
7707000
stack
page read and write
4EED000
stack
page read and write
12DF000
stack
page read and write
28F0000
unkown
page read and write
2643000
unkown
page read and write
88FD000
unkown
page read and write
2CA2000
unkown
page read and write
8664000
unkown
page read and write
8C000
stack
page read and write
44D0000
unkown
page readonly
8605000
unkown
page read and write
22E7000
trusted library allocation
page read and write
2F1B000
stack
page read and write
370000
trusted library allocation
page read and write
82D5000
unkown
page read and write
22F000
stack
page read and write
448C000
unkown
page read and write
8903000
unkown
page read and write
866C000
unkown
page read and write
110000
heap
page read and write
20000
trusted library allocation
page read and write
F20000
unkown
page readonly
4530000
unkown
page readonly
79F0000
heap
page read and write
85F7000
unkown
page read and write
216D000
trusted library allocation
page read and write
3A6000
heap
page read and write
3AC0000
unkown
page read and write
256000
unkown
page read and write
E87000
direct allocation
page read and write
A5AE000
stack
page read and write
2500000
trusted library allocation
page execute and read and write
4520000
unkown
page readonly
8506000
unkown
page read and write
67E000
stack
page read and write
85AC000
unkown
page read and write
449B000
unkown
page read and write
83A7000
unkown
page read and write
7934000
heap
page read and write
510000
unkown
page readonly
316000
heap
page read and write
26BA000
unkown
page read and write
B723000
unkown
page read and write
4570000
unkown
page readonly
10000
heap
page read and write
F33000
unkown
page write copy
82CC000
unkown
page read and write
3A60000
unkown
page read and write
284000
unkown
page read and write
4C10000
heap
page read and write
856A000
unkown
page read and write
3AC8000
unkown
page read and write
44B3000
unkown
page read and write
D0A000
direct allocation
page read and write
23CE000
stack
page read and write
85F4000
unkown
page read and write
8926000
unkown
page read and write
28B0000
unkown
page readonly
E81000
direct allocation
page read and write
2FC0000
heap
page read and write
39D0000
unkown
page read and write
3B10000
unkown
page readonly
42E000
unkown
page read and write
8575000
unkown
page read and write
8611000
unkown
page read and write
6DDE000
stack
page read and write
2600000
unkown
page readonly
885F000
unkown
page read and write
28A0000
unkown
page read and write
2E10000
unkown
page read and write
41C0000
unkown
page readonly
449F000
unkown
page read and write
7930000
heap
page read and write
8802000
unkown
page read and write
860B000
unkown
page read and write
466000
heap
page read and write
7169000
stack
page read and write
7B9000
unkown
page readonly
44D000
unkown
page read and write
1DD0000
trusted library allocation
page read and write
B6E4000
unkown
page read and write
83A7000
unkown
page read and write
140000
heap
page read and write
288D000
stack
page read and write
D0000
unkown
page readonly
39B0000
unkown
page read and write
82FD000
unkown
page read and write
E90000
direct allocation
page read and write
4453000
unkown
page read and write
44B3000
unkown
page read and write
110000
unkown
page read and write
F2E000
unkown
page readonly
2B0000
trusted library allocation
page read and write
4540000
unkown
page readonly
7934000
heap
page read and write
690000
unkown
page readonly
26F0000
unkown
page read and write
1D0000
heap
page read and write
85E000
stack
page read and write
3A90000
unkown
page read and write
4484000
unkown
page read and write
4317000
unkown
page read and write
80000
system
page execute and read and write
2090000
trusted library allocation
page read and write
83A7000
unkown
page read and write
44B8000
unkown
page read and write
856A000
unkown
page read and write
27A000
unkown
page read and write
C01000
trusted library allocation
page execute and read and write
1F0000
unkown
page readonly
24E0000
trusted library allocation
page execute and read and write
6FC4000
heap
page read and write
8600000
unkown
page read and write
2910000
unkown
page readonly
3A6000
heap
page read and write
879E000
unkown
page read and write
4484000
unkown
page read and write
F20000
unkown
page readonly
2887000
unclassified section
page read and write
22E1000
trusted library allocation
page read and write
2B30000
unkown
page readonly
7E40000
heap
page read and write
82FD000
unkown
page read and write
850D000
unkown
page read and write
2C0000
unkown
page read and write
8661000
unkown
page read and write
676F000
stack
page read and write
7083000
heap
page read and write
785E000
stack
page read and write
21F0000
trusted library allocation
page read and write
26F0000
unkown
page read and write
7427000
stack
page read and write
3FD000
heap
page read and write
8575000
unkown
page read and write
F21000
unkown
page execute read
2F1B000
stack
page read and write
F20000
unkown
page readonly
4210000
unkown
page read and write
1BBD000
trusted library allocation
page read and write
F33000
unkown
page write copy
2CA5000
unkown
page read and write
10000
heap
page read and write
46CC000
stack
page read and write
B6A0000
unkown
page read and write
2B0000
trusted library allocation
page read and write
3A60000
unkown
page read and write
46D0000
unkown
page readonly
AB1E000
stack
page read and write
71A0000
heap
page read and write
866C000
unkown
page read and write
87E8000
unkown
page read and write
B905000
heap
page read and write
8864000
unkown
page read and write
F2E000
unkown
page readonly
D90000
direct allocation
page read and write
3B9000
heap
page read and write
7E40000
heap
page read and write
41C0000
unkown
page readonly
7E30000
stack
page read and write
4302000
unkown
page read and write
F33000
unkown
page write copy
4210000
unkown
page read and write
2FB0000
unkown
page read and write
8926000
unkown
page read and write
2B20000
unkown
page read and write
6E4E000
stack
page read and write
44B8000
unkown
page read and write
2B50000
unkown
page readonly
85000
system
page execute and read and write
21E0000
trusted library allocation
page read and write
F2E000
unkown
page readonly
4423000
unkown
page read and write
2CB0000
unkown
page read and write
7E3B000
stack
page read and write
2CA5000
unkown
page read and write
87FC000
unkown
page read and write
879E000
unkown
page read and write
E81000
direct allocation
page read and write
830000
unkown
page readonly
6EC0000
heap
page read and write
980000
trusted library allocation
page execute and read and write
8691000
unkown
page read and write
856A000
unkown
page read and write
82C0000
unkown
page read and write
2AE0000
unkown
page read and write
240000
heap
page read and write
41D0000
unkown
page readonly
2F0F000
stack
page read and write
F33000
unkown
page write copy
6D0F000
stack
page read and write
2FC9000
heap
page read and write
310000
heap
page read and write
2E9F000
stack
page read and write
323000
heap
page read and write
F21000
unkown
page execute read
2380000
trusted library allocation
page execute and read and write
380000
trusted library allocation
page execute and read and write
2B6B000
heap
page read and write
87F9000
unkown
page read and write
22D0000
trusted library allocation
page read and write
2AF0000
unkown
page read and write
8861000
unkown
page read and write
1D55000
heap
page read and write
A8B0000
unkown
page read and write
2910000
unkown
page readonly
2FA0000
unkown
page read and write
26C6000
unkown
page read and write
85F2000
unkown
page read and write
3AC0000
unkown
page read and write
2E10000
unkown
page read and write
2422000
heap
page read and write
487F000
stack
page read and write
1C30000
unkown
page readonly
F21000
unkown
page execute read
223F000
stack
page read and write
B620000
unkown
page read and write
434F000
unkown
page read and write
2CF000
unkown
page read and write
8667000
unkown
page read and write
B900000
heap
page read and write
B663000
unkown
page read and write
8371000
unkown
page read and write
4BBF000
stack
page read and write
85FA000
unkown
page read and write
62E0000
heap
page read and write
6C78000
stack
page read and write
2801000
unkown
page read and write
44F0000
unkown
page readonly
900000
trusted library allocation
page read and write
1D30000
unkown
page read and write
30000
unclassified section
page execute and read and write
64E000
heap
page read and write
B723000
unkown
page read and write
1D30000
unkown
page read and write
2FCE000
heap
page read and write
1D55000
heap
page read and write
110000
unkown
page read and write
885F000
unkown
page read and write
2F0F000
stack
page read and write
42D0000
unkown
page read and write
766B000
stack
page read and write
EF0000
direct allocation
page read and write
2CB9000
unkown
page read and write
67AD000
stack
page read and write
2CBF000
unkown
page read and write
87FC000
unkown
page read and write
43F0000
unkown
page read and write
2C9F000
stack
page read and write
6FF000
heap
page read and write
4338000
unkown
page read and write
1DD0000
unkown
page readonly
3B0000
heap
page read and write
2B60000
heap
page read and write
88BD000
unkown
page read and write
3AE8000
unkown
page read and write
F37000
unkown
page readonly
448C000
unkown
page read and write
4317000
unkown
page read and write
7F0000
trusted library allocation
page read and write
2CB9000
unkown
page read and write
1F0000
unkown
page readonly
380000
heap
page read and write
788000
unkown
page read and write
8506000
unkown
page read and write
8602000
unkown
page read and write
1A9000
stack
page read and write
885B000
unkown
page read and write
E90000
direct allocation
page read and write
4570000
unkown
page readonly
2CB9000
unkown
page read and write
314000
trusted library allocation
page read and write
300000
unkown
page read and write
370000
trusted library allocation
page read and write
2B50000
unkown
page readonly
8521000
unkown
page read and write
220000
unkown
page read and write
A4AB000
stack
page read and write
240000
heap
page read and write
441E000
unkown
page read and write
4484000
unkown
page read and write
1D73000
heap
page read and write
4620000
unkown
page read and write
7EC0000
unkown
page read and write
F2E000
unkown
page readonly
4457000
unkown
page read and write
24F0000
trusted library allocation
page execute and read and write
250000
unkown
page read and write
4C05000
heap
page read and write
850D000
unkown
page read and write
1F0000
unkown
page readonly
88F5000
unkown
page read and write
C30000
direct allocation
page read and write
629E000
stack
page read and write
450000
unkown
page read and write
860E000
unkown
page read and write
2A0000
unkown
page read and write
10000
heap
page read and write
41E0000
unkown
page read and write
F2E000
unkown
page readonly
D90000
direct allocation
page read and write
84C0000
unkown
page read and write
7C4000
heap
page read and write
2C4000
heap
page read and write
BF0000
trusted library allocation
page execute and read and write
3AC0000
unkown
page read and write
C10000
trusted library allocation
page execute and read and write
2460000
trusted library allocation
page execute and read and write
4464000
unkown
page read and write
2C0000
unkown
page read and write
1D50000
heap
page read and write
30C000
stack
page read and write
39E0000
heap
page read and write
1D50000
heap
page read and write
27F0000
unkown
page read and write
41D0000
unkown
page readonly
6F4A000
stack
page read and write
25F0000
unkown
page readonly
3B10000
unkown
page readonly
4317000
unkown
page read and write
682F000
stack
page read and write
256000
unkown
page read and write
A8CE000
unkown
page read and write
D0A000
direct allocation
page read and write
2B00000
unkown
page read and write
2B10000
unkown
page read and write
83E2000
unkown
page read and write
885B000
unkown
page read and write
B7E3000
unkown
page read and write
8691000
unkown
page read and write
F33000
unkown
page write copy
256000
unkown
page read and write
2C21000
unkown
page read and write
2CB6000
unkown
page read and write
614000
heap
page read and write
50000
unkown
page readonly
4CDD000
stack
page read and write
10000
heap
page read and write
88BD000
unkown
page read and write
120000
trusted library allocation
page execute and read and write
8664000
unkown
page read and write
C0E000
stack
page read and write
6F4A000
stack
page read and write
8679000
unkown
page read and write
6D4B000
stack
page read and write
506000
unkown
page read and write
401000
unkown
page execute read
F21000
unkown
page execute read
290000
unkown
page readonly
7EC0000
unkown
page read and write
15D0000
trusted library allocation
page read and write
50000
unkown
page readonly
2FA0000
unkown
page read and write
E70000
direct allocation
page read and write
8661000
unkown
page read and write
290000
unkown
page readonly
E90000
direct allocation
page read and write
410C000
stack
page read and write
990000
trusted library allocation
page execute and read and write
3FB5000
stack
page read and write
39B0000
unkown
page read and write
85FD000
unkown
page read and write
401000
unkown
page execute read
323000
heap
page read and write
46D0000
unkown
page readonly
6E4E000
stack
page read and write
851A000
unkown
page read and write
7060000
heap
page read and write
83E2000
unkown
page read and write
2F9E000
stack
page read and write
AB1E000
stack
page read and write
39A0000
unkown
page read and write
8371000
unkown
page read and write
2F1B000
stack
page read and write
7EFE0000
unkown
page readonly
18A000
stack
page read and write
4540000
unkown
page readonly
A70000
trusted library allocation
page execute and read and write
2AF0000
unkown
page read and write
370000
trusted library allocation
page read and write
2250000
heap
page read and write
8861000
unkown
page read and write
F37000
unkown
page readonly
370000
trusted library allocation
page read and write
323000
heap
page read and write
F37000
unkown
page readonly
E5F000
stack
page read and write
450000
unkown
page read and write
8611000
unkown
page read and write
27B000
heap
page read and write
410000
unkown
page read and write
2FC0000
heap
page read and write
22F0000
trusted library allocation
page read and write
2E0000
unkown
page readonly
2E9F000
stack
page read and write
2E10000
unkown
page read and write
329000
heap
page read and write
88F5000
unkown
page read and write
510000
unkown
page readonly
42D0000
unkown
page read and write
E70000
direct allocation
page read and write
8679000
unkown
page read and write
44C3000
unkown
page read and write
8636000
unkown
page read and write
3A4000
heap
page read and write
4385000
unkown
page read and write
10000
heap
page read and write
42AE000
stack
page read and write
210000
unkown
page readonly
3BA000
heap
page read and write
210000
unkown
page readonly
4338000
unkown
page read and write
41C0000
unkown
page readonly
329000
heap
page read and write
28C0000
unkown
page read and write
A80000
trusted library allocation
page execute and read and write
EF0000
direct allocation
page read and write
4620000
unkown
page read and write
43F0000
unkown
page read and write
3FB7000
stack
page read and write
510000
unkown
page readonly
44C3000
unkown
page read and write
2B0000
trusted library allocation
page read and write
26C6000
unkown
page read and write
7E3B000
stack
page read and write
8858000
unkown
page read and write
6FC0000
heap
page read and write
28A0000
unkown
page read and write
2FCE000
heap
page read and write
2870000
unclassified section
page execute and read and write
7953000
heap
page read and write
860B000
unkown
page read and write
1D0000
trusted library allocation
page read and write
26C6000
unkown
page read and write
F21000
unkown
page execute read
E0000
unkown
page read and write
8675000
unkown
page read and write
6FE000
heap
page read and write
8864000
unkown
page read and write
4030000
unkown
page execute read
2643000
unkown
page read and write
82FD000
unkown
page read and write
2CF000
unkown
page read and write
B663000
unkown
page read and write
886D000
unkown
page read and write
434F000
unkown
page read and write
6750000
unkown
page read and write
A8D8000
unkown
page read and write
F20000
unkown
page readonly
230F000
stack
page read and write
7E30000
stack
page read and write
3FB5000
stack
page read and write
8F4000
trusted library allocation
page read and write
74BE000
stack
page read and write
4464000
unkown
page read and write
2993000
unkown
page read and write
2CB9000
unkown
page read and write
10000
heap
page read and write
656E000
stack
page read and write
8679000
unkown
page read and write
4030000
unkown
page execute read
A4AB000
stack
page read and write
8900000
unkown
page read and write
88F5000
unkown
page read and write
17C000
stack
page read and write
2C10000
unkown
page read and write
3AE8000
unkown
page read and write
2AF0000
unkown
page read and write
22EF000
stack
page read and write
3B10000
unkown
page readonly
3FD000
heap
page read and write
4457000
unkown
page read and write
223F000
stack
page read and write
7EC0000
unkown
page read and write
8864000
unkown
page read and write
3F9000
trusted library section
page readonly
B7A0000
unkown
page read and write
F20000
unkown
page readonly
310000
trusted library allocation
page read and write
287000
heap
page read and write
2FC000
stack
page read and write
869E000
unkown
page read and write
D80000
direct allocation
page read and write
6D49000
stack
page read and write
10000
heap
page read and write
35000
unclassified section
page execute and read and write
742A000
stack
page read and write
4C00000
heap
page read and write
2B0000
trusted library allocation
page read and write
2CA2000
unkown
page read and write
2FC0000
heap
page read and write
28A0000
unkown
page read and write
2B0000
unclassified section
page execute and read and write
B663000
unkown
page read and write
F9E000
stack
page read and write
C70000
trusted library allocation
page execute and read and write
1D20000
unkown
page read and write
4040000
unkown
page readonly
44B6000
unkown
page read and write
3E4000
heap
page read and write
450000
unkown
page read and write
2F9E000
stack
page read and write
4510000
unkown
page execute and read and write
8521000
unkown
page read and write
3B10000
unkown
page readonly
F2E000
unkown
page readonly
2CAB000
unkown
page read and write
2FC9000
heap
page read and write
F2E000
unkown
page readonly
2400000
heap
page read and write
3AE8000
unkown
page read and write
84C0000
unkown
page read and write
B5E2000
unkown
page read and write
43F0000
unkown
page read and write
441E000
unkown
page read and write
EF0000
direct allocation
page read and write
426000
heap
page read and write
8512000
unkown
page read and write
82C5000
unkown
page read and write
2C10000
unkown
page read and write
1D55000
heap
page read and write
8844000
unkown
page read and write
639F000
trusted library allocation
page read and write
4BE000
stack
page read and write
7060000
heap
page read and write
3A4000
heap
page read and write
37B000
heap
page read and write
84EE000
unkown
page read and write
7B9000
unkown
page readonly
3D1000
heap
page read and write
2B10000
unkown
page read and write
A8B0000
unkown
page read and write
85FA000
unkown
page read and write
1D13000
unkown
page read and write
1B0000
unkown
page read and write
B6A0000
unkown
page read and write
A8B0000
unkown
page read and write
1D20000
unkown
page read and write
4540000
unkown
page readonly
7953000
heap
page read and write
86C9000
unkown
page read and write
37B000
heap
page read and write
4C05000
heap
page read and write
28B0000
unkown
page readonly
434F000
unkown
page read and write
82D1000
unkown
page read and write
42E000
unkown
page read and write
42B000
heap
page read and write
62E000
heap
page read and write
449B000
unkown
page read and write
440D000
unkown
page read and write
2AF0000
unkown
page read and write
4210000
unkown
page read and write
2E10000
unkown
page read and write
A4AB000
stack
page read and write
87E3000
unkown
page read and write
3FAF000
stack
page read and write
841B000
unkown
page read and write
B7A0000
unkown
page read and write
2AF000
unkown
page read and write
8867000
unkown
page read and write
110000
unkown
page read and write
290000
unkown
page readonly
510000
unkown
page readonly
2A60000
trusted library allocation
page read and write
85F7000
unkown
page read and write
2AF000
unkown
page read and write
20000
unkown
page readonly
5030000
heap
page read and write
7083000
heap
page read and write
27F0000
unkown
page read and write
440D000
unkown
page read and write
3A90000
unkown
page read and write
C07000
trusted library allocation
page execute and read and write
7660000
stack
page read and write
D2F000
stack
page read and write
B7E3000
unkown
page read and write
F20000
unkown
page readonly
F37000
unkown
page readonly
82D5000
unkown
page read and write
7660000
stack
page read and write
1B6000
heap
page read and write
2898000
stack
page read and write
4C05000
heap
page read and write
2AF000
unkown
page read and write
44D000
unkown
page read and write
666F000
stack
page read and write
2FA0000
unkown
page read and write
2B64000
heap
page read and write
230000
heap
page read and write
314000
trusted library allocation
page read and write
63B4000
trusted library allocation
page read and write
2600000
unkown
page readonly
448F000
unkown
page read and write
7567000
heap
page read and write
2B0000
trusted library allocation
page read and write
D0A000
direct allocation
page read and write
253F000
stack
page read and write
7707000
stack
page read and write
3FAF000
stack
page read and write
2993000
unkown
page read and write
8667000
unkown
page read and write
7A6000
unkown
page read and write
220000
unkown
page read and write
3AE8000
unkown
page read and write
2350000
trusted library allocation
page read and write
10000
heap
page read and write
B723000
unkown
page read and write
8558000
unkown
page read and write
1A9000
stack
page read and write
3FAF000
stack
page read and write
AF0000
trusted library allocation
page execute and read and write
7EFE0000
unkown
page readonly
850D000
unkown
page read and write
4317000
unkown
page read and write
A8D8000
unkown
page read and write
D80000
direct allocation
page read and write
8820000
unkown
page read and write
2CBC000
unkown
page read and write
1B0000
unkown
page read and write
2C80000
heap
page read and write
314000
trusted library allocation
page read and write
2C0000
unkown
page read and write
4040000
unkown
page readonly
71A0000
heap
page read and write
5EE000
stack
page read and write
86C9000
unkown
page read and write
F33000
unkown
page write copy
8926000
unkown
page read and write
6FC0000
heap
page read and write
86CF000
unkown
page read and write
638D000
trusted library allocation
page read and write
883B000
unkown
page read and write
4220000
unkown
page readonly
8558000
unkown
page read and write
310000
heap
page read and write
100000
unkown
page read and write
860E000
unkown
page read and write
8900000
unkown
page read and write
84EE000
unkown
page read and write
F20000
unkown
page readonly
8636000
unkown
page read and write
3BF000
heap
page read and write
883B000
unkown
page read and write
82C0000
unkown
page read and write
66B000
heap
page read and write
8903000
unkown
page read and write
B00000
trusted library allocation
page execute and read and write
4F60000
heap
page read and write
44D000
unkown
page read and write
E81000
direct allocation
page read and write
2B0000
trusted library allocation
page read and write
88FD000
unkown
page read and write
F33000
unkown
page write copy
3FD000
heap
page read and write
8608000
unkown
page read and write
335000
heap
page read and write
300000
unkown
page read and write
A90000
trusted library allocation
page execute and read and write
DC000
stack
page read and write
2B20000
unkown
page read and write
441E000
unkown
page read and write
4520000
unkown
page readonly
38D000
trusted library allocation
page read and write
7230000
heap
page read and write
E70000
direct allocation
page read and write
4464000
unkown
page read and write
44D000
stack
page read and write
71A0000
heap
page read and write
1F0000
heap
page read and write
714000
heap
page read and write
2B5F000
stack
page read and write
84C0000
unkown
page read and write
449F000
unkown
page read and write
410000
unkown
page read and write
21B0000
heap
page read and write
85000
system
page execute and read and write
6F9000
heap
page read and write
288D000
stack
page read and write
268A000
unclassified section
page read and write
1FC000
stack
page read and write
8600000
unkown
page read and write
87E3000
unkown
page read and write
6C4000
heap
page read and write
44B3000
unkown
page read and write
3A90000
unkown
page read and write
6F3F000
stack
page read and write
B1F000
stack
page read and write
757000
heap
page read and write
6450000
unkown
page readonly
2D0000
unkown
page readonly
26F0000
unkown
page read and write
39A0000
unkown
page read and write
2C0000
heap
page read and write
44D0000
unkown
page readonly
2CAB000
unkown
page read and write
3FAF000
stack
page read and write
6F3F000
stack
page read and write
240000
heap
page read and write
785E000
stack
page read and write
4620000
unkown
page read and write
506000
unkown
page read and write
2480000
trusted library allocation
page execute and read and write
310000
trusted library allocation
page read and write
2CBC000
unkown
page read and write
30000
trusted library allocation
page read and write
2B00000
unkown
page read and write
886F000
unkown
page read and write
2CA2000
unkown
page read and write
2CAE000
unkown
page read and write
4E0000
heap
page read and write
1D30000
unkown
page read and write
2474000
trusted library allocation
page execute and read and write
85FA000
unkown
page read and write
F2E000
unkown
page readonly
10AC000
stack
page read and write
F2E000
unkown
page readonly
2660000
trusted library allocation
page execute and read and write
2AC000
stack
page read and write
B620000
unkown
page read and write
21D000
trusted library allocation
page read and write
4EED000
stack
page read and write
7930000
heap
page read and write
80000
system
page execute and read and write
244000
heap
page read and write
25F0000
unkown
page readonly
1DD0000
unkown
page readonly
F37000
unkown
page readonly
2FC5000
heap
page read and write
88C0000
unkown
page read and write
4CDD000
stack
page read and write
434F000
unkown
page read and write
7540000
heap
page read and write
2C00000
unkown
page read and write
6F4A000
stack
page read and write
F33000
unkown
page write copy
4302000
unkown
page read and write
87F9000
unkown
page read and write
2C10000
unkown
page read and write
1D55000
heap
page read and write
2F1B000
stack
page read and write
39E0000
heap
page read and write
387000
heap
page read and write
4423000
unkown
page read and write
C30000
direct allocation
page read and write
4385000
unkown
page read and write
2CB6000
unkown
page read and write
2961000
unkown
page read and write
8844000
unkown
page read and write
25F0000
unkown
page readonly
1F0000
unkown
page readonly
267000
unkown
page read and write
82C5000
unkown
page read and write
4510000
unkown
page execute and read and write
270000
heap
page read and write
2AF000
unkown
page read and write
3AC8000
unkown
page read and write
F20000
unkown
page readonly
7427000
stack
page read and write
2B0E000
stack
page read and write
79FA000
heap
page read and write
8807000
unkown
page read and write
8820000
unkown
page read and write
1BA0000
trusted library allocation
page read and write
8512000
unkown
page read and write
8B000
stack
page read and write
7060000
heap
page read and write
F20000
unkown
page readonly
2A5F000
stack
page read and write
20000
unkown
page readonly
504000
heap
page read and write
2C0000
unkown
page read and write
244000
heap
page read and write
10000
heap
page read and write
67EC000
stack
page read and write
310000
heap
page read and write
A8CE000
unkown
page read and write
85FD000
unkown
page read and write
B900000
heap
page read and write
6450000
unkown
page readonly
290F000
stack
page read and write
220000
unkown
page read and write
7064000
heap
page read and write
886D000
unkown
page read and write
62DC000
stack
page read and write
74BE000
stack
page read and write
42D0000
unkown
page read and write
3FF000
trusted library section
page readonly
4550000
unkown
page readonly
39B0000
unkown
page read and write
6E0F000
stack
page read and write
5030000
heap
page read and write
37B000
heap
page read and write
1B0000
unkown
page read and write
87E8000
unkown
page read and write
25F1000
trusted library allocation
page execute and read and write
7422000
stack
page read and write
448F000
unkown
page read and write
2BF000
unkown
page read and write
45A0000
unkown
page readonly
288D000
stack
page read and write
87BB000
unkown
page read and write
40C000
unkown
page read and write
E90000
direct allocation
page read and write
1A0000
trusted library allocation
page read and write
78D8000
stack
page read and write
316000
heap
page read and write
410C000
stack
page read and write
8600000
unkown
page read and write
6EC0000
heap
page read and write
27A000
unkown
page read and write
8858000
unkown
page read and write
6E5A000
stack
page read and write
774000
heap
page read and write
26F000
stack
page read and write
3B3000
heap
page read and write
20000
unkown
page readonly
B6C000
stack
page read and write
6D4B000
stack
page read and write
6D49000
stack
page read and write
D0A000
direct allocation
page read and write
449B000
unkown
page read and write
140000
heap
page read and write
F37000
unkown
page readonly
7549000
heap
page read and write
380000
trusted library allocation
page read and write
2BF000
unkown
page read and write
220000
unkown
page read and write
7427000
stack
page read and write
4423000
unkown
page read and write
46CC000
stack
page read and write
4385000
unkown
page read and write
E0000
unkown
page read and write
2C21000
unkown
page read and write
F21000
unkown
page execute read
7BE0000
heap
page read and write
B7E3000
unkown
page read and write
8802000
unkown
page read and write
E84000
direct allocation
page read and write
886F000
unkown
page read and write
4530000
unkown
page readonly
741F000
stack
page read and write
7410000
trusted library allocation
page read and write
2898000
stack
page read and write
25F0000
unkown
page readonly
3A60000
unkown
page read and write
335000
heap
page read and write
8667000
unkown
page read and write
44B6000
unkown
page read and write
449F000
unkown
page read and write
8F1000
trusted library allocation
page read and write
250000
unkown
page read and write
467E000
stack
page read and write
1A9000
stack
page read and write
79FA000
heap
page read and write
5030000
heap
page read and write
323000
heap
page read and write
1C30000
unkown
page readonly
27F0000
unkown
page read and write
B905000
heap
page read and write
290000
unkown
page readonly
4BBF000
stack
page read and write
8575000
unkown
page read and write
424000
heap
page read and write
B763000
unkown
page read and write
2C21000
unkown
page read and write
841B000
unkown
page read and write
2CA0000
unkown
page read and write
2D0000
unkown
page readonly
8805000
unkown
page read and write
4560000
unkown
page readonly
44E0000
unkown
page read and write
6FE0000
heap
page read and write
2600000
trusted library allocation
page execute and read and write
2CAB000
unkown
page read and write
D80000
direct allocation
page read and write
370000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
830000
unkown
page readonly
7C0000
heap
page read and write
8805000
unkown
page read and write
2643000
unkown
page read and write
4560000
unkown
page readonly
42F000
heap
page read and write
10000
heap
page read and write
7953000
heap
page read and write
C0D000
stack
page read and write
2B30000
unkown
page readonly
AA13000
unkown
page execute and read and write
82D1000
unkown
page read and write
8605000
unkown
page read and write
100000
unkown
page read and write
110000
unkown
page read and write
320000
heap
page read and write
6B6D000
stack
page read and write
25F4000
trusted library allocation
page execute and read and write
4040000
unkown
page readonly
448F000
unkown
page read and write
20000
unkown
page readonly
2B10000
unkown
page read and write
7540000
heap
page read and write
4302000
unkown
page read and write
1A9000
stack
page read and write
4C00000
heap
page read and write
7567000
heap
page read and write
2F9E000
stack
page read and write
3AE000
heap
page read and write
244000
heap
page read and write
87FC000
unkown
page read and write
27A000
unkown
page read and write
2D0000
unkown
page readonly
4510000
unkown
page execute and read and write
2BFE000
stack
page read and write
E84000
direct allocation
page read and write
72C0000
heap
page read and write
250000
unkown
page read and write
1F6000
heap
page read and write
82D1000
unkown
page read and write
3A90000
unkown
page read and write
B5E2000
unkown
page read and write
240000
heap
page read and write
3FB5000
stack
page read and write
6AE000
heap
page read and write
D80000
direct allocation
page read and write
3A4000
heap
page read and write
2CB6000
unkown
page read and write
6D4B000
stack
page read and write
8E0000
trusted library allocation
page read and write
216E000
stack
page read and write
F37000
unkown
page readonly
F33000
unkown
page write copy
430000
heap
page read and write
8605000
unkown
page read and write
2993000
unkown
page read and write
86CF000
unkown
page read and write
6FE3000
heap
page read and write
18C000
stack
page read and write
2FC5000
heap
page read and write
B6E4000
unkown
page read and write
2E9F000
stack
page read and write
3CF7000
unkown
page readonly
F21000
unkown
page execute read
2C21000
unkown
page read and write
4D5E000
stack
page read and write
8F7000
trusted library allocation
page read and write
313000
unclassified section
page execute and read and write
E70000
direct allocation
page read and write
2477000
trusted library allocation
page execute and read and write
7E40000
heap
page read and write
4550000
unkown
page readonly
44B8000
unkown
page read and write
D0D000
direct allocation
page read and write
2C00000
unkown
page read and write
D0000
unkown
page readonly
D90000
direct allocation
page read and write
310000
heap
page read and write
3FB7000
stack
page read and write
2CB6000
unkown
page read and write
2CAE000
unkown
page read and write
1C30000
unkown
page readonly
741F000
stack
page read and write
C04000
trusted library allocation
page execute and read and write
3AC0000
unkown
page read and write
960000
trusted library allocation
page read and write
3CF7000
unkown
page readonly
2B20000
unkown
page read and write
4030000
unkown
page execute read
EF0000
direct allocation
page read and write
8807000
unkown
page read and write
39E0000
heap
page read and write
2C00000
unkown
page read and write
4302000
unkown
page read and write
85F4000
unkown
page read and write
28B0000
unkown
page readonly
4560000
unkown
page readonly
2A60000
trusted library allocation
page read and write
6C78000
stack
page read and write
2CA8000
unkown
page read and write
6C00000
heap
page read and write
6FE3000
heap
page read and write
2CF000
unkown
page read and write
B6A0000
unkown
page read and write
725000
heap
page read and write
87BB000
unkown
page read and write
8867000
unkown
page read and write
766B000
stack
page read and write
100000
unkown
page read and write
7549000
heap
page read and write
2FC5000
heap
page read and write
78D8000
stack
page read and write
250000
unkown
page read and write
2993000
unkown
page read and write
8521000
unkown
page read and write
D0D000
direct allocation
page read and write
10000
heap
page read and write
370000
trusted library allocation
page read and write
4CDD000
stack
page read and write
2A0000
unkown
page read and write
26D000
heap
page read and write
1D73000
heap
page read and write
2B2000
unkown
page read and write
851A000
unkown
page read and write
696D000
stack
page read and write
2E0000
unkown
page readonly
8602000
unkown
page read and write
27A000
unkown
page read and write
72C0000
heap
page read and write
2B0000
unkown
page read and write
F2E000
unkown
page readonly
4040000
unkown
page readonly
883B000
unkown
page read and write
11C0000
trusted library allocation
page read and write
4530000
unkown
page readonly
2AC000
stack
page read and write
310000
trusted library allocation
page read and write
85AC000
unkown
page read and write
2E0000
unkown
page readonly
10000
heap
page read and write
39B0000
unkown
page read and write
2B50000
unkown
page readonly
2000000
trusted library allocation
page read and write
87FF000
unkown
page read and write
B6E4000
unkown
page read and write
4550000
unkown
page readonly
3F0000
trusted library section
page readonly
2CB3000
unkown
page read and write
D0D000
direct allocation
page read and write
79FA000
heap
page read and write
2370000
trusted library allocation
page execute and read and write
3990000
unkown
page readonly
6830000
heap
page read and write
8807000
unkown
page read and write
50000
unkown
page readonly
2CA8000
unkown
page read and write
79F0000
heap
page read and write
84D2000
unkown
page read and write
8858000
unkown
page read and write
26BA000
unkown
page read and write
2CA0000
unkown
page read and write
2E0000
unkown
page readonly
3CF7000
unkown
page readonly
8D0000
heap
page read and write
782000
unkown
page read and write
84D2000
unkown
page read and write
2D0000
unkown
page readonly
8558000
unkown
page read and write
88BD000
unkown
page read and write
F21000
unkown
page execute read
85F2000
unkown
page read and write
2670000
trusted library allocation
page execute and read and write
F21000
unkown
page execute read
11BE000
stack
page read and write
D5E000
stack
page read and write
886D000
unkown
page read and write
2170000
trusted library allocation
page execute and read and write
4BBF000
stack
page read and write
3A70000
unkown
page read and write
7660000
stack
page read and write
85D2000
unkown
page read and write
210000
unkown
page readonly
1DD0000
unkown
page readonly
A5AE000
stack
page read and write
8669000
unkown
page read and write
3A70000
unkown
page read and write
4457000
unkown
page read and write
2A0000
unkown
page read and write
4C00000
heap
page read and write
2CA2000
unkown
page read and write
370000
trusted library allocation
page read and write
45A0000
unkown
page readonly
4210000
unkown
page read and write
223F000
stack
page read and write
2BF000
stack
page read and write
6BAF000
stack
page read and write
7169000
stack
page read and write
E87000
direct allocation
page read and write
10D000
stack
page read and write
200000
trusted library allocation
page read and write
2B20000
unkown
page read and write
260000
unkown
page read and write
2910000
unkown
page readonly
1C30000
unkown
page readonly
8608000
unkown
page read and write
19F000
stack
page read and write
84C7000
unkown
page read and write
2CB3000
unkown
page read and write
410000
unkown
page read and write
8D6000
heap
page read and write
39D0000
unkown
page read and write
85D2000
unkown
page read and write
A8CE000
unkown
page read and write
869E000
unkown
page read and write
2FB0000
unkown
page read and write
2910000
unkown
page readonly
88C0000
unkown
page read and write
3E0000
trusted library allocation
page execute and read and write
7410000
trusted library allocation
page read and write
2600000
unkown
page readonly
60000
unkown
page readonly
7540000
heap
page read and write
7064000
heap
page read and write
82C5000
unkown
page read and write
2643000
unkown
page read and write
B7A0000
unkown
page read and write
2B68000
heap
page read and write
44D000
unkown
page read and write
60000
unkown
page readonly
87BB000
unkown
page read and write
288D000
stack
page read and write
2470000
trusted library allocation
page execute and read and write
4338000
unkown
page read and write
2AE0000
unkown
page read and write
A20000
trusted library allocation
page read and write
506000
unkown
page read and write
2F0F000
stack
page read and write
85F2000
unkown
page read and write
2FCE000
heap
page read and write
690000
unkown
page readonly
7BE0000
heap
page read and write
44C3000
unkown
page read and write
2CBC000
unkown
page read and write
8636000
unkown
page read and write
85AC000
unkown
page read and write
400000
remote allocation
page execute and read and write
7230000
heap
page read and write
8337000
unkown
page read and write
4385000
unkown
page read and write
29B3000
unclassified section
page execute and read and write
7E2000
heap
page read and write
2B3F000
stack
page read and write
28B0000
unkown
page readonly
2CA8000
unkown
page read and write
41C0000
unkown
page readonly
2CB3000
unkown
page read and write
314000
trusted library allocation
page read and write
44D0000
unkown
page readonly
244000
heap
page read and write
8661000
unkown
page read and write
28F0000
unkown
page read and write
46CC000
stack
page read and write
82CC000
unkown
page read and write
B10000
trusted library allocation
page execute and read and write
7E30000
stack
page read and write
2FC5000
heap
page read and write
6E5A000
stack
page read and write
10EF000
stack
page read and write
82C0000
unkown
page read and write
A84000
trusted library allocation
page execute and read and write
3AC8000
unkown
page read and write
2CF000
unkown
page read and write
8867000
unkown
page read and write
3A60000
unkown
page read and write
26F0000
unkown
page read and write
2090000
trusted library allocation
page execute and read and write
2FC0000
heap
page read and write
2CB3000
unkown
page read and write
F37000
unkown
page readonly
2CA0000
unkown
page read and write
39A0000
unkown
page read and write
6EC0000
heap
page read and write
3DE000
stack
page read and write
766B000
stack
page read and write
2898000
stack
page read and write
4EED000
stack
page read and write
A9B0000
unkown
page execute and read and write
85F7000
unkown
page read and write
8675000
unkown
page read and write
229E000
stack
page read and write
448C000
unkown
page read and write
39A0000
unkown
page read and write
2BF000
unkown
page read and write
88C0000
unkown
page read and write
74BE000
stack
page read and write
7422000
stack
page read and write
886A000
unkown
page read and write
450000
unkown
page read and write
3F4000
trusted library section
page readonly
6FE3000
heap
page read and write
78D8000
stack
page read and write
885B000
unkown
page read and write
2404000
heap
page read and write
42E000
unkown
page read and write
There are 1521 hidden memdumps, click here to show them.