IOC Report
New order.xlsx

loading gif

Files

File Path
Type
Category
Malicious
New order.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
downloaded
malicious
C:\Users\user\AppData\Local\Temp\fdvucso.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$New order.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B8C79A7.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C67416EA.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D915B94D.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F22AACBE.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FE9B77C.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Temp\kk2f9zwlwvo3ghi9f9
data
dropped
C:\Users\user\AppData\Local\Temp\nsbF6CE.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\wqqynoeqp
data
dropped
C:\Users\user\AppData\Local\Temp\~DF43C5C58FDDE0F3A8.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFA5230667FEC71F99.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DFDC892710C54AAC44.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFFA1DA6C3CBA16E75.TMP
data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Users\user\AppData\Local\Temp\fdvucso.exe
C:\Users\user\AppData\Local\Temp\fdvucso.exe C:\Users\user\AppData\Local\Temp\wqqynoeqp
malicious
C:\Users\user\AppData\Local\Temp\fdvucso.exe
C:\Users\user\AppData\Local\Temp\fdvucso.exe C:\Users\user\AppData\Local\Temp\wqqynoeqp
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\AppData\Local\Temp\fdvucso.exe"

URLs

Name
IP
Malicious
www.worklifefirewalls.com/m9y5/
malicious
http://104.168.33.25/gtb/vbc.exe
104.168.33.25
malicious
http://104.168.33.25/gtb/vbc.exehhC:
unknown
malicious
http://104.168.33.25/gtb/vbc.exej
unknown
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.iis.fhg.de/audioPA
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.mozilla.com0
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://www.xinli-ac.com/m9y5/?3f=ylBe/k3Uhk7dBIeXI//KFRH0TaC7pxYziRrYgQ8MI5uD9iOXGI4rYw0cjZ+4cEk1rP/qTw==&-Z=f4l0drr
154.222.70.249
http://nsis.sf.net/NSIS_ErrorError
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://www.piriform.com/ccleanerv
unknown
http://servername/isapibackend.dll
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.xinli-ac.com
154.222.70.249
malicious
www.insurancecentral.info
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.168.33.25
unknown
United States
malicious
154.222.70.249
www.xinli-ac.com
Seychelles
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
`{,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\668F0
668F0
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
s,,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6BEDC
6BEDC
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6F086
6F086
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6BEDC
6BEDC
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2C0000
unclassified section
page execute and read and write
malicious
130000
unclassified section
page execute and read and write
malicious
100000
system
page execute and read and write
malicious
120000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
80000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
B92E000
unkown
page execute and read and write
malicious
1E0000
trusted library allocation
page read and write
malicious
B92E000
unkown
page execute and read and write
malicious
88C0000
unkown
page read and write
240000
heap
page read and write
290000
unkown
page readonly
41E0000
unkown
page read and write
CB0000
trusted library allocation
page execute and read and write
3FD000
heap
page read and write
4423000
unkown
page read and write
2CBF000
unkown
page read and write
2BF000
unkown
page read and write
6F3F000
stack
page read and write
8820000
unkown
page read and write
1B0000
unkown
page read and write
790000
trusted library allocation
page execute and read and write
1054000
direct allocation
page read and write
8675000
unkown
page read and write
87FC000
unkown
page read and write
2A20000
unkown
page read and write
7230000
heap
page read and write
26F0000
unkown
page read and write
27F0000
unkown
page read and write
2E9F000
stack
page read and write
2AD0000
unkown
page read and write
10000
heap
page read and write
860B000
unkown
page read and write
690000
unkown
page readonly
2CB3000
unkown
page read and write
351D000
stack
page read and write
2CAB000
unkown
page read and write
1320000
unkown
page readonly
F50000
direct allocation
page read and write
3B7000
heap
page read and write
2BFE000
stack
page read and write
26F0000
unkown
page read and write
26F0000
unkown
page read and write
4385000
unkown
page read and write
F60000
direct allocation
page read and write
886D000
unkown
page read and write
440D000
unkown
page read and write
8667000
unkown
page read and write
B96B000
unkown
page execute and read and write
8611000
unkown
page read and write
44D000
unkown
page read and write
2F1B000
stack
page read and write
84EE000
unkown
page read and write
B683000
unkown
page read and write
4040000
unkown
page readonly
288D000
stack
page read and write
6750000
unkown
page read and write
8600000
unkown
page read and write
7934000
heap
page read and write
3A4000
heap
page read and write
37B000
heap
page read and write
2CAE000
unkown
page read and write
251F000
stack
page read and write
400000
unkown
page readonly
B20000
system
page execute and read and write
3AD8000
unkown
page read and write
27F0000
unkown
page read and write
1DD0000
unkown
page readonly
82C0000
unkown
page read and write
2A50000
unkown
page read and write
4E69000
stack
page read and write
8D54000
trusted library allocation
page read and write
3A4000
heap
page read and write
2F9E000
stack
page read and write
2898000
stack
page read and write
4F60000
heap
page read and write
2643000
unkown
page read and write
8371000
unkown
page read and write
1321000
unkown
page execute read
430000
unclassified section
page execute and read and write
5CF000
stack
page read and write
901000
trusted library allocation
page execute and read and write
883B000
unkown
page read and write
850D000
unkown
page read and write
449F000
unkown
page read and write
42C000
stack
page read and write
690000
trusted library allocation
page execute and read and write
8608000
unkown
page read and write
401000
unkown
page execute read
223F000
stack
page read and write
44D0000
unkown
page readonly
2402000
heap
page read and write
841B000
unkown
page read and write
4385000
unkown
page read and write
234000
heap
page read and write
5E2000
heap
page read and write
1057000
direct allocation
page read and write
2E9F000
stack
page read and write
4464000
unkown
page read and write
6DDE000
stack
page read and write
360000
heap
page read and write
8512000
unkown
page read and write
7720000
stack
page read and write
1DCE000
stack
page read and write
2E0000
unkown
page readonly
86C9000
unkown
page read and write
910000
trusted library allocation
page execute and read and write
2910000
unkown
page readonly
88BD000
unkown
page read and write
660000
trusted library allocation
page read and write
7540000
heap
page read and write
440D000
unkown
page read and write
2FC9000
heap
page read and write
B603000
unkown
page read and write
2FCE000
heap
page read and write
2A30000
unkown
page read and write
869E000
unkown
page read and write
244000
heap
page read and write
4182000
stack
page read and write
2801000
unkown
page read and write
6E5A000
stack
page read and write
8608000
unkown
page read and write
430000
trusted library allocation
page read and write
261F000
stack
page read and write
5DC000
heap
page read and write
132E000
unkown
page readonly
4E60000
stack
page read and write
220000
unkown
page read and write
4540000
unkown
page readonly
30000
trusted library allocation
page read and write
7930000
heap
page read and write
428000
heap
page read and write
400000
unkown
page readonly
44B6000
unkown
page read and write
7549000
heap
page read and write
2AA0000
unkown
page read and write
F50000
direct allocation
page read and write
6D4B000
stack
page read and write
7E3E000
stack
page read and write
2A30000
unkown
page read and write
2BF000
unkown
page read and write
4C10000
heap
page read and write
220000
unkown
page read and write
F00000
heap
page read and write
335000
heap
page read and write
1D5B000
heap
page read and write
42AE000
stack
page read and write
2971000
unkown
page read and write
10000
heap
page read and write
27A000
unkown
page read and write
4F0000
trusted library allocation
page read and write
554000
heap
page read and write
448C000
unkown
page read and write
310000
heap
page read and write
20000
trusted library allocation
page read and write
4210000
unkown
page read and write
6FE3000
heap
page read and write
6D49000
stack
page read and write
D0000
unkown
page readonly
7540000
heap
page read and write
1060000
direct allocation
page read and write
323000
heap
page read and write
43F0000
unkown
page read and write
B640000
unkown
page read and write
8F0000
trusted library allocation
page execute and read and write
82FD000
unkown
page read and write
1D30000
unkown
page read and write
132E000
unkown
page readonly
85F2000
unkown
page read and write
4188000
stack
page read and write
45D000
trusted library allocation
page read and write
2CB0000
unkown
page read and write
B90000
trusted library allocation
page execute and read and write
417F000
stack
page read and write
797000
heap
page read and write
5030000
heap
page read and write
132E000
unkown
page readonly
323000
heap
page read and write
1057000
direct allocation
page read and write
785E000
stack
page read and write
71A0000
heap
page read and write
8569000
unkown
page read and write
8807000
unkown
page read and write
1A9000
stack
page read and write
2CA5000
unkown
page read and write
2CB0000
unkown
page read and write
410000
unkown
page read and write
194D000
stack
page read and write
19F000
stack
page read and write
44CD000
unkown
page read and write
2A10000
unkown
page read and write
2AE0000
unkown
page read and write
84EE000
unkown
page read and write
8608000
unkown
page read and write
85FA000
unkown
page read and write
7083000
heap
page read and write
82C5000
unkown
page read and write
6FE3000
heap
page read and write
23C000
heap
page read and write
1060000
direct allocation
page read and write
6DD000
direct allocation
page read and write
26F0000
unkown
page read and write
44C3000
unkown
page read and write
EC000
stack
page read and write
23E0000
heap
page read and write
7EC0000
unkown
page read and write
2801000
unkown
page read and write
6D4B000
stack
page read and write
3AD8000
unkown
page read and write
4BBF000
stack
page read and write
77C9000
stack
page read and write
7917000
stack
page read and write
2A0000
unkown
page read and write
6FC0000
heap
page read and write
8900000
unkown
page read and write
335000
heap
page read and write
44CD000
unkown
page read and write
2C21000
unkown
page read and write
F60000
direct allocation
page read and write
2801000
unkown
page read and write
2983000
unkown
page read and write
45A0000
unkown
page readonly
106000
heap
page read and write
2D0000
unkown
page readonly
8605000
unkown
page read and write
87BB000
unkown
page read and write
4520000
unkown
page readonly
8605000
unkown
page read and write
8636000
unkown
page read and write
2A50000
unkown
page read and write
6EC0000
heap
page read and write
8605000
unkown
page read and write
408000
unkown
page readonly
860E000
unkown
page read and write
1F0000
unkown
page readonly
8337000
unkown
page read and write
4540000
unkown
page readonly
6DA000
direct allocation
page read and write
3FE000
stack
page read and write
317000
heap
page read and write
3FB5000
stack
page read and write
2CB9000
unkown
page read and write
869E000
unkown
page read and write
31F000
stack
page read and write
2CBF000
unkown
page read and write
4E69000
stack
page read and write
88C0000
unkown
page read and write
B4C0000
unkown
page read and write
5F1000
trusted library allocation
page read and write
2280000
heap
page read and write
44B6000
unkown
page read and write
7BE0000
heap
page read and write
2A60000
unkown
page read and write
23CF000
trusted library section
page readonly
418A000
stack
page read and write
4620000
unkown
page read and write
2CA5000
unkown
page read and write
2E9F000
stack
page read and write
2B20000
unkown
page read and write
323000
heap
page read and write
88C0000
unkown
page read and write
2FCE000
heap
page read and write
223F000
stack
page read and write
2CAB000
unkown
page read and write
579000
heap
page read and write
1337000
unkown
page readonly
2E0000
unkown
page readonly
2B20000
unkown
page read and write
85F2000
unkown
page read and write
39E0000
heap
page read and write
BB0000
trusted library allocation
page execute and read and write
417F000
stack
page read and write
1321000
unkown
page execute read
7A6000
unkown
page read and write
8521000
unkown
page read and write
1337000
unkown
page readonly
4570000
unkown
page readonly
1D50000
heap
page read and write
8D10000
trusted library allocation
page read and write
1D50000
heap
page read and write
82D5000
unkown
page read and write
3FAF000
stack
page read and write
5030000
heap
page read and write
223F000
stack
page read and write
510000
unkown
page readonly
886A000
unkown
page read and write
B482000
unkown
page read and write
B24000
trusted library allocation
page execute and read and write
377000
heap
page read and write
100000
unkown
page read and write
448C000
unkown
page read and write
782000
unkown
page read and write
4510000
unkown
page execute and read and write
2CB6000
unkown
page read and write
71A0000
heap
page read and write
2CB9000
unkown
page read and write
2A90000
unkown
page read and write
256000
unkown
page read and write
41D0000
unkown
page readonly
4C05000
heap
page read and write
1051000
direct allocation
page read and write
800000
trusted library allocation
page execute and read and write
2CF000
unkown
page read and write
600000
direct allocation
page read and write
2A90000
unkown
page read and write
43F0000
unkown
page read and write
8867000
unkown
page read and write
87F9000
unkown
page read and write
600000
direct allocation
page read and write
D20000
trusted library allocation
page execute and read and write
7EFE0000
unkown
page readonly
2FC9000
heap
page read and write
19F000
stack
page read and write
2BF000
unkown
page read and write
2A00000
unkown
page read and write
2600000
unkown
page readonly
886F000
unkown
page read and write
3B10000
unkown
page readonly
1D55000
heap
page read and write
46CC000
stack
page read and write
288D000
stack
page read and write
132E000
unkown
page readonly
2D0000
unkown
page readonly
68B000
heap
page read and write
2A00000
unkown
page read and write
380000
trusted library allocation
page read and write
1D20000
unkown
page read and write
3AB8000
unkown
page read and write
7060000
heap
page read and write
2A70000
unkown
page read and write
1057000
direct allocation
page read and write
2A0000
unkown
page read and write
B584000
unkown
page read and write
8600000
unkown
page read and write
79F0000
heap
page read and write
2B20000
unkown
page read and write
879E000
unkown
page read and write
1C30000
unkown
page readonly
B584000
unkown
page read and write
2CA2000
unkown
page read and write
8807000
unkown
page read and write
2910000
unkown
page readonly
2BFE000
stack
page read and write
28F0000
unkown
page read and write
4188000
stack
page read and write
6FC0000
heap
page read and write
72C0000
heap
page read and write
2AE0000
unkown
page read and write
18C000
stack
page read and write
B0A5000
heap
page read and write
329000
heap
page read and write
44E0000
unkown
page read and write
250000
unkown
page read and write
3AB0000
unkown
page read and write
1337000
unkown
page readonly
970000
trusted library allocation
page execute and read and write
941000
unkown
page read and write
7E40000
heap
page read and write
4182000
stack
page read and write
7539000
stack
page read and write
77C9000
stack
page read and write
46CC000
stack
page read and write
4CDD000
stack
page read and write
8926000
unkown
page read and write
2B50000
unkown
page readonly
7E3E000
stack
page read and write
83E2000
unkown
page read and write
6FC4000
heap
page read and write
8669000
unkown
page read and write
2C21000
unkown
page read and write
8521000
unkown
page read and write
2B30000
unkown
page readonly
44F0000
unkown
page readonly
8900000
unkown
page read and write
8F7000
unkown
page read and write
1D54000
heap
page read and write
210000
heap
page read and write
8558000
unkown
page read and write
1D55000
heap
page read and write
5DA000
heap
page read and write
1337000
unkown
page readonly
42D0000
unkown
page read and write
866C000
unkown
page read and write
B20000
system
page execute and read and write
7567000
heap
page read and write
1320000
unkown
page readonly
30000
trusted library allocation
page read and write
506000
unkown
page read and write
410C000
stack
page read and write
8F6F000
stack
page read and write
4423000
unkown
page read and write
506000
unkown
page read and write
401000
unkown
page execute read
1051000
direct allocation
page read and write
4550000
unkown
page readonly
1040000
direct allocation
page read and write
4457000
unkown
page read and write
2643000
unkown
page read and write
1337000
unkown
page readonly
2CA8000
unkown
page read and write
2F0F000
stack
page read and write
1333000
unkown
page write copy
1F0000
unkown
page readonly
A30000
trusted library allocation
page execute and read and write
4210000
unkown
page read and write
1320000
unkown
page readonly
1051000
direct allocation
page read and write
886D000
unkown
page read and write
680000
trusted library allocation
page execute and read and write
8669000
unkown
page read and write
AEF000
stack
page read and write
6EC0000
heap
page read and write
10C0000
direct allocation
page read and write
8602000
unkown
page read and write
2214000
heap
page read and write
28B0000
unkown
page readonly
85F7000
unkown
page read and write
72C0000
heap
page read and write
50000
unkown
page readonly
2AE0000
unkown
page read and write
B540000
unkown
page read and write
8805000
unkown
page read and write
690000
unkown
page readonly
1D73000
heap
page read and write
1337000
unkown
page readonly
441F000
unkown
page read and write
3AB0000
unkown
page read and write
3AB0000
unkown
page read and write
85FD000
unkown
page read and write
1051000
direct allocation
page read and write
84D2000
unkown
page read and write
257000
heap
page read and write
7549000
heap
page read and write
2CB0000
unkown
page read and write
50D000
trusted library allocation
page read and write
39E0000
heap
page read and write
8903000
unkown
page read and write
D0000
unkown
page readonly
2CA8000
unkown
page read and write
F50000
direct allocation
page read and write
449B000
unkown
page read and write
7EC0000
unkown
page read and write
883B000
unkown
page read and write
75C000
stack
page read and write
26BA000
unkown
page read and write
2A0000
unkown
page read and write
4220000
unkown
page readonly
256000
unkown
page read and write
110000
unkown
page read and write
2CE0000
heap
page read and write
44B8000
unkown
page read and write
93D0000
heap
page read and write
8864000
unkown
page read and write
42AE000
stack
page read and write
830000
unkown
page readonly
7953000
heap
page read and write
20D000
stack
page read and write
7B5000
unkown
page read and write
8667000
unkown
page read and write
6DDE000
stack
page read and write
7917000
stack
page read and write
B8C0000
unkown
page execute and read and write
4040000
unkown
page readonly
10000
heap
page read and write
1D20000
unkown
page read and write
2F1B000
stack
page read and write
329000
heap
page read and write
1054000
direct allocation
page read and write
8611000
unkown
page read and write
2D0000
unkown
page readonly
9660000
heap
page read and write
2CA0000
unkown
page read and write
2A20000
unkown
page read and write
2C21000
unkown
page read and write
50000
unkown
page readonly
2CA8000
unkown
page read and write
8667000
unkown
page read and write
774000
heap
page read and write
E2F000
stack
page read and write
A20000
trusted library allocation
page execute and read and write
100000
trusted library allocation
page execute and read and write
919E000
stack
page read and write
6F3F000
stack
page read and write
7660000
stack
page read and write
3AB8000
unkown
page read and write
44B6000
unkown
page read and write
B0A0000
heap
page read and write
2FC0000
heap
page read and write
2A70000
unkown
page read and write
680000
heap
page read and write
37B000
heap
page read and write
580000
heap
page read and write
879E000
unkown
page read and write
46D0000
unkown
page readonly
789000
unkown
page read and write
260000
heap
page read and write
3990000
unkown
page readonly
8602000
unkown
page read and write
2AB0000
unkown
page read and write
6450000
unkown
page readonly
4520000
unkown
page readonly
2CA0000
unkown
page read and write
20000
unkown
page readonly
4385000
unkown
page read and write
4530000
unkown
page readonly
7064000
heap
page read and write
335000
heap
page read and write
50A000
trusted library allocation
page read and write
1E10000
direct allocation
page read and write
B5C3000
unkown
page read and write
4325000
unkown
page read and write
2FC0000
heap
page read and write
82D1000
unkown
page read and write
2FC0000
heap
page read and write
2FC5000
heap
page read and write
85D2000
unkown
page read and write
1D13000
unkown
page read and write
8855000
unkown
page read and write
B0A0000
heap
page read and write
87E8000
unkown
page read and write
2910000
unkown
page readonly
83E2000
unkown
page read and write
6F4A000
stack
page read and write
4F60000
heap
page read and write
1D73000
heap
page read and write
6C79000
stack
page read and write
7E40000
heap
page read and write
2AD0000
unkown
page read and write
410C000
stack
page read and write
132E000
unkown
page readonly
600000
direct allocation
page read and write
7720000
stack
page read and write
448C000
unkown
page read and write
9BD0000
trusted library allocation
page read and write
3A6000
heap
page read and write
10EF000
stack
page read and write
4453000
unkown
page read and write
449F000
unkown
page read and write
85F7000
unkown
page read and write
866C000
unkown
page read and write
1320000
unkown
page readonly
288D000
stack
page read and write
7934000
heap
page read and write
AEE0000
unkown
page read and write
8521000
unkown
page read and write
2F0000
heap
page read and write
2E0000
unkown
page readonly
510000
unkown
page readonly
83A7000
unkown
page read and write
3FB7000
stack
page read and write
2AC0000
unkown
page read and write
88F5000
unkown
page read and write
3AD8000
unkown
page read and write
2910000
unkown
page readonly
33E000
stack
page read and write
1060000
direct allocation
page read and write
7930000
heap
page read and write
440D000
unkown
page read and write
2AA0000
unkown
page read and write
4484000
unkown
page read and write
770000
trusted library allocation
page execute and read and write
4530000
unkown
page readonly
2BF000
unkown
page read and write
1B0000
unkown
page read and write
4620000
unkown
page read and write
27A000
unkown
page read and write
82D5000
unkown
page read and write
44D000
unkown
page read and write
23C9000
trusted library section
page readonly
1060000
direct allocation
page read and write
4D5E000
stack
page read and write
1C30000
unkown
page readonly
74E000
stack
page read and write
4530000
unkown
page readonly
B0A5000
heap
page read and write
84C0000
unkown
page read and write
E0000
unkown
page read and write
8855000
unkown
page read and write
8A0000
trusted library allocation
page read and write
B8C0000
unkown
page execute and read and write
BA0000
trusted library allocation
page execute and read and write
2CB3000
unkown
page read and write
26BA000
unkown
page read and write
AEC0000
unkown
page read and write
71A0000
heap
page read and write
B5C3000
unkown
page read and write
317000
heap
page read and write
690000
unkown
page readonly
8558000
unkown
page read and write
50000
unkown
page readonly
6E5A000
stack
page read and write
1D30000
unkown
page read and write
88BD000
unkown
page read and write
4325000
unkown
page read and write
10000
heap
page read and write
1321000
unkown
page execute read
860E000
unkown
page read and write
2CA8000
unkown
page read and write
2A60000
unkown
page read and write
2600000
unkown
page readonly
355E000
stack
page read and write
2B0000
unkown
page read and write
37B000
heap
page read and write
2F9E000
stack
page read and write
85FA000
unkown
page read and write
2E0000
unkown
page readonly
30000
trusted library allocation
page read and write
8802000
unkown
page read and write
25F0000
unkown
page readonly
8926000
unkown
page read and write
8506000
unkown
page read and write
4453000
unkown
page read and write
25F0000
unkown
page readonly
448F000
unkown
page read and write
3FD000
heap
page read and write
6750000
unkown
page read and write
4E60000
stack
page read and write
2AB0000
unkown
page read and write
4560000
unkown
page readonly
23C0000
trusted library section
page readonly
310000
heap
page read and write
41D0000
unkown
page readonly
2A80000
unkown
page read and write
84D2000
unkown
page read and write
2A50000
unkown
page read and write
2AC0000
unkown
page read and write
132E000
unkown
page readonly
3A4000
heap
page read and write
79F0000
heap
page read and write
9C000
stack
page read and write
8820000
unkown
page read and write
3D4000
heap
page read and write
1D13000
unkown
page read and write
6E4E000
stack
page read and write
2A80000
unkown
page read and write
AEC0000
unkown
page read and write
1321000
unkown
page execute read
8569000
unkown
page read and write
4570000
unkown
page readonly
2AB0000
unkown
page read and write
5E0000
trusted library allocation
page read and write
2B50000
unkown
page readonly
41C0000
unkown
page readonly
530000
heap
page read and write
2CAB000
unkown
page read and write
240000
heap
page read and write
2CA2000
unkown
page read and write
441F000
unkown
page read and write
786000
unkown
page read and write
907000
trusted library allocation
page execute and read and write
790000
heap
page read and write
1333000
unkown
page write copy
79F000
heap
page read and write
77C000
unkown
page read and write
132E000
unkown
page readonly
89000
stack
page read and write
B540000
unkown
page read and write
8844000
unkown
page read and write
28B0000
unkown
page readonly
841F000
unkown
page read and write
8802000
unkown
page read and write
8805000
unkown
page read and write
28F0000
unkown
page read and write
10C0000
direct allocation
page read and write
37B000
heap
page read and write
841B000
unkown
page read and write
914000
unkown
page read and write
600000
heap
page read and write
4CDD000
stack
page read and write
41D000
heap
page read and write
4EED000
stack
page read and write
2983000
unkown
page read and write
2B50000
trusted library allocation
page read and write
2A90000
unkown
page read and write
8844000
unkown
page read and write
46D0000
unkown
page readonly
6450000
unkown
page readonly
860B000
unkown
page read and write
690000
unkown
page readonly
2AF000
unkown
page read and write
2FC9000
heap
page read and write
120000
trusted library allocation
page execute and read and write
2AC0000
unkown
page read and write
24C000
stack
page read and write
2CB6000
unkown
page read and write
1333000
unkown
page write copy
30000
trusted library allocation
page read and write
256000
unkown
page read and write
210000
unkown
page readonly
2A80000
unkown
page read and write
8569000
unkown
page read and write
2FC5000
heap
page read and write
1057000
direct allocation
page read and write
B640000
unkown
page read and write
2FC0000
heap
page read and write
2CA0000
unkown
page read and write
851A000
unkown
page read and write
317000
heap
page read and write
8FEC000
stack
page read and write
830000
unkown
page readonly
2AA0000
unkown
page read and write
26C6000
unkown
page read and write
4030000
unkown
page execute read
780000
trusted library allocation
page execute and read and write
8CBE000
stack
page read and write
7083000
heap
page read and write
1F0000
unkown
page readonly
8F0000
unkown
page read and write
2AF000
unkown
page read and write
3B10000
unkown
page readonly
7230000
heap
page read and write
100000
unkown
page read and write
4423000
unkown
page read and write
8512000
unkown
page read and write
606000
heap
page read and write
3990000
unkown
page readonly
2C0000
unkown
page read and write
44C3000
unkown
page read and write
44D0000
unkown
page readonly
30000
trusted library allocation
page read and write
29D000
stack
page read and write
79FA000
heap
page read and write
841B000
unkown
page read and write
3AB0000
unkown
page read and write
1D13000
unkown
page read and write
44E0000
unkown
page read and write
2CA5000
unkown
page read and write
5F4000
trusted library allocation
page read and write
2898000
stack
page read and write
2AB0000
unkown
page read and write
2A10000
unkown
page read and write
2A70000
unkown
page read and write
2983000
unkown
page read and write
1E00000
heap
page read and write
4C10000
heap
page read and write
10000
heap
page read and write
684000
heap
page read and write
7720000
stack
page read and write
28C0000
unkown
page read and write
441F000
unkown
page read and write
610000
heap
page read and write
86C9000
unkown
page read and write
4C05000
heap
page read and write
D0000
unkown
page readonly
2CBC000
unkown
page read and write
2F9E000
stack
page read and write
85FA000
unkown
page read and write
8617000
unkown
page read and write
87F9000
unkown
page read and write
84D2000
unkown
page read and write
160000
heap
page read and write
87FF000
unkown
page read and write
26BA000
unkown
page read and write
B482000
unkown
page read and write
2D0000
unkown
page readonly
3FB7000
stack
page read and write
ABB9000
stack
page read and write
4457000
unkown
page read and write
2AF000
unkown
page read and write
5F1000
heap
page read and write
600000
direct allocation
page read and write
B503000
unkown
page read and write
980000
trusted library allocation
page read and write
132E000
unkown
page readonly
8864000
unkown
page read and write
82C0000
unkown
page read and write
82CC000
unkown
page read and write
6DDE000
stack
page read and write
941C000
stack
page read and write
40A000
unkown
page write copy
2CBC000
unkown
page read and write
886A000
unkown
page read and write
260000
heap
page read and write
1320000
unkown
page readonly
87E3000
unkown
page read and write
1337000
unkown
page readonly
2801000
unkown
page read and write
4220000
unkown
page readonly
7917000
stack
page read and write
323000
heap
page read and write
1D55000
heap
page read and write
8675000
unkown
page read and write
2F1B000
stack
page read and write
2CF000
unkown
page read and write
997000
trusted library allocation
page read and write
210000
unkown
page readonly
1C30000
unkown
page readonly
B1F000
stack
page read and write
8512000
unkown
page read and write
42D0000
unkown
page read and write
2AE0000
unkown
page read and write
2AEF000
stack
page read and write
2A0000
heap
page read and write
28C0000
unkown
page read and write
4453000
unkown
page read and write
8337000
unkown
page read and write
74BE000
stack
page read and write
FC000
stack
page read and write
2C30000
unkown
page read and write
10000
heap
page read and write
320000
heap
page read and write
583000
heap
page read and write
1337000
unkown
page readonly
8558000
unkown
page read and write
2F0F000
stack
page read and write
8CD0000
heap
page read and write
5AC000
heap
page read and write
4C05000
heap
page read and write
CA4000
trusted library allocation
page execute and read and write
132E000
unkown
page readonly
7064000
heap
page read and write
1D73000
heap
page read and write
10C0000
direct allocation
page read and write
6E5A000
stack
page read and write
2FC5000
heap
page read and write
2B30000
unkown
page readonly
4040000
unkown
page readonly
F60000
direct allocation
page read and write
4484000
unkown
page read and write
365F000
stack
page read and write
7C0000
trusted library allocation
page read and write
87FF000
unkown
page read and write
27F0000
unkown
page read and write
939D000
stack
page read and write
2F0F000
stack
page read and write
87E8000
unkown
page read and write
7B4000
heap
page read and write
7B9000
unkown
page readonly
2C21000
unkown
page read and write
100000
unkown
page read and write
2A30000
unkown
page read and write
B0A0000
heap
page read and write
40A000
unkown
page read and write
36D000
stack
page read and write
2F9E000
stack
page read and write
85F4000
unkown
page read and write
B0A5000
heap
page read and write
8371000
unkown
page read and write
85F2000
unkown
page read and write
AEDE000
unkown
page read and write
3E0000
heap
page read and write
79F0000
heap
page read and write
82C0000
unkown
page read and write
3FD000
heap
page read and write
110000
unkown
page read and write
6450000
unkown
page readonly
1D30000
unkown
page read and write
79FA000
heap
page read and write
82D5000
unkown
page read and write
2CB3000
unkown
page read and write
510000
unkown
page readonly
44D000
unkown
page read and write
2643000
unkown
page read and write
3A4000
heap
page read and write
1321000
unkown
page execute read
42AE000
stack
page read and write
60000
unkown
page readonly
851A000
unkown
page read and write
2CAE000
unkown
page read and write
56E000
stack
page read and write
951D000
stack
page read and write
8900000
unkown
page read and write
6DD000
direct allocation
page read and write
26BA000
unkown
page read and write
890000
trusted library allocation
page read and write
787000
trusted library allocation
page execute and read and write
77C9000
stack
page read and write
83E2000
unkown
page read and write
8FAE000
stack
page read and write
8337000
unkown
page read and write
B640000
unkown
page read and write
B584000
unkown
page read and write
1333000
unkown
page write copy
2B4F000
stack
page read and write
799000
heap
page read and write
88FA000
unkown
page read and write
4550000
unkown
page readonly
87E8000
unkown
page read and write
3A6000
heap
page read and write
766B000
stack
page read and write
7953000
heap
page read and write
886A000
unkown
page read and write
902C000
stack
page read and write
8D3F000
trusted library allocation
page read and write
CA7000
trusted library allocation
page execute and read and write
785E000
stack
page read and write
B5C3000
unkown
page read and write
2AC0000
unkown
page read and write
243000
heap
page read and write
26C6000
unkown
page read and write
AEE0000
unkown
page read and write
5F7000
trusted library allocation
page read and write
7934000
heap
page read and write
10000
heap
page read and write
335000
heap
page read and write
8820000
unkown
page read and write
4030000
unkown
page execute read
886F000
unkown
page read and write
45A0000
unkown
page readonly
3FAF000
stack
page read and write
2CA5000
unkown
page read and write
290000
unkown
page readonly
8B000
stack
page read and write
6FE3000
heap
page read and write
9BD0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
8506000
unkown
page read and write
244000
heap
page read and write
1320000
unkown
page readonly
88F7000
unkown
page read and write
50000
unkown
page readonly
4540000
unkown
page readonly
290000
unkown
page readonly
85F7000
unkown
page read and write
370000
heap
page read and write
6FC4000
heap
page read and write
2A90000
unkown
page read and write
E0000
unkown
page read and write
5030000
heap
page read and write
2CB0000
unkown
page read and write
AEDE000
unkown
page read and write
244000
heap
page read and write
784000
trusted library allocation
page execute and read and write
8903000
unkown
page read and write
20000
unkown
page readonly
600000
trusted library allocation
page read and write
60000
unkown
page readonly
83A7000
unkown
page read and write
D0000
heap
page read and write
955F000
stack
page read and write
82FD000
unkown
page read and write
266000
heap
page read and write
7B9000
unkown
page readonly
4510000
unkown
page execute and read and write
1D20000
unkown
page read and write
1BC000
stack
page read and write
9060000
heap
page read and write
B0C3000
heap
page read and write
4DB000
unclassified section
page execute and read and write
41E0000
unkown
page read and write
29EF000
stack
page read and write
879E000
unkown
page read and write
866C000
unkown
page read and write
4EED000
stack
page read and write
4EED000
stack
page read and write
4560000
unkown
page readonly
1A9000
stack
page read and write
85FD000
unkown
page read and write
1320000
unkown
page readonly
B4C0000
unkown
page read and write
2B0000
unkown
page read and write
6F4A000
stack
page read and write
2EE000
stack
page read and write
410000
unkown
page read and write
2CBC000
unkown
page read and write
2898000
stack
page read and write
1333000
unkown
page read and write
18A000
stack
page read and write
B482000
unkown
page read and write
3990000
unkown
page readonly
4510000
unkown
page execute and read and write
2600000
unkown
page readonly
60000
unkown
page readonly
8861000
unkown
page read and write
4C00000
heap
page read and write
88FA000
unkown
page read and write
87FC000
unkown
page read and write
841F000
unkown
page read and write
20000
heap
page read and write
2A4F000
stack
page read and write
1321000
unkown
page execute read
2CBC000
unkown
page read and write
30000
trusted library allocation
page read and write
860B000
unkown
page read and write
1320000
unkown
page readonly
410C000
stack
page read and write
8371000
unkown
page read and write
7539000
stack
page read and write
2232000
heap
page read and write
88FD000
unkown
page read and write
2B30000
unkown
page readonly
6E4E000
stack
page read and write
30000
unclassified section
page execute and read and write
450000
unkown
page read and write
250000
unkown
page read and write
3FB7000
stack
page read and write
3CE000
stack
page read and write
B4C0000
unkown
page read and write
2898000
stack
page read and write
1EED000
trusted library allocation
page read and write
88F7000
unkown
page read and write
87BB000
unkown
page read and write
4210000
unkown
page read and write
5CE000
stack
page read and write
F60000
direct allocation
page read and write
82D1000
unkown
page read and write
30000
trusted library allocation
page read and write
4E0000
heap
page read and write
3CF7000
unkown
page readonly
1C30000
unkown
page readonly
217000
heap
page read and write
67F000
stack
page read and write
27F0000
unkown
page read and write
30000
trusted library allocation
page read and write
2B30000
unkown
page readonly
3FB5000
stack
page read and write
4F60000
heap
page read and write
7728000
stack
page read and write
6F3F000
stack
page read and write
506000
unkown
page read and write
510000
unkown
page readonly
290000
unkown
page readonly
39E0000
heap
page read and write
1DD0000
unkown
page readonly
2A20000
unkown
page read and write
1D50000
heap
page read and write
3B10000
unkown
page readonly
2643000
unkown
page read and write
7728000
stack
page read and write
19F000
stack
page read and write
2CB6000
unkown
page read and write
3660000
trusted library allocation
page read and write
449B000
unkown
page read and write
7060000
heap
page read and write
537000
heap
page read and write
6D49000
stack
page read and write
41D0000
unkown
page readonly
8636000
unkown
page read and write
883B000
unkown
page read and write
7083000
heap
page read and write
8807000
unkown
page read and write
3E1000
heap
page read and write
3E7000
heap
page read and write
2971000
unkown
page read and write
7E40000
heap
page read and write
434F000
unkown
page read and write
79E000
heap
page read and write
2A40000
unkown
page read and write
7728000
stack
page read and write
B96B000
unkown
page execute and read and write
B603000
unkown
page read and write
223F000
stack
page read and write
1333000
unkown
page write copy
82C5000
unkown
page read and write
2B50000
unkown
page readonly
239000
heap
page read and write
1320000
unkown
page readonly
2CA2000
unkown
page read and write
41E0000
unkown
page read and write
8867000
unkown
page read and write
B540000
unkown
page read and write
87BB000
unkown
page read and write
8D4F000
trusted library allocation
page read and write
750000
heap
page read and write
9A0000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
2CAE000
unkown
page read and write
B683000
unkown
page read and write
46D0000
unkown
page readonly
82D1000
unkown
page read and write
B0C3000
heap
page read and write
4D5E000
stack
page read and write
6DD000
direct allocation
page read and write
210000
unkown
page readonly
44F0000
unkown
page readonly
1321000
unkown
page execute read
850D000
unkown
page read and write
25F0000
unkown
page readonly
20000
unkown
page readonly
2CB9000
unkown
page read and write
410000
unkown
page read and write
1D30000
unkown
page read and write
7930000
heap
page read and write
2E9F000
stack
page read and write
434F000
unkown
page read and write
27A000
unkown
page read and write
26C6000
unkown
page read and write
506000
unkown
page read and write
88F7000
unkown
page read and write
4C10000
heap
page read and write
4030000
unkown
page execute read
3FAF000
stack
page read and write
240000
heap
page read and write
20000
trusted library allocation
page read and write
408000
unkown
page readonly
851A000
unkown
page read and write
841F000
unkown
page read and write
B10000
trusted library allocation
page execute and read and write
B36000
unclassified section
page read and write
87FC000
unkown
page read and write
417F000
stack
page read and write
D2F000
unclassified section
page read and write
87F9000
unkown
page read and write
4C00000
heap
page read and write
2B50000
trusted library allocation
page read and write
7BE0000
heap
page read and write
6C79000
stack
page read and write
2C0000
unkown
page read and write
6D4B000
stack
page read and write
4620000
unkown
page read and write
1B0000
unkown
page read and write
26C6000
unkown
page read and write
6DD000
direct allocation
page read and write
2CBF000
unkown
page read and write
8903000
unkown
page read and write
869E000
unkown
page read and write
28B0000
unkown
page readonly
434F000
unkown
page read and write
88FA000
unkown
page read and write
43F0000
unkown
page read and write
4E69000
stack
page read and write
1333000
unkown
page write copy
10000
heap
page read and write
42E000
unkown
page read and write
1040000
direct allocation
page read and write
8602000
unkown
page read and write
7F0000
trusted library allocation
page execute and read and write
2B0000
unkown
page read and write
1D58000
heap
page read and write
810000
trusted library allocation
page execute and read and write
1054000
direct allocation
page read and write
4484000
unkown
page read and write
2A40000
unkown
page read and write
44CD000
unkown
page read and write
28F0000
unkown
page read and write
84EE000
unkown
page read and write
594000
heap
page read and write
88F5000
unkown
page read and write
250000
unkown
page read and write
1321000
unkown
page execute read
2C0000
unkown
page read and write
3B0000
heap
page read and write
2A30000
unkown
page read and write
2C30000
unkown
page read and write
6DA000
direct allocation
page read and write
A5E000
stack
page read and write
7953000
heap
page read and write
3AB8000
unkown
page read and write
1A9000
stack
page read and write
E0000
unkown
page read and write
2CB9000
unkown
page read and write
450000
unkown
page read and write
886D000
unkown
page read and write
1D50000
heap
page read and write
310000
heap
page read and write
2FC5000
heap
page read and write
1040000
direct allocation
page read and write
2AD0000
unkown
page read and write
88FD000
unkown
page read and write
449F000
unkown
page read and write
4CDD000
stack
page read and write
4BBF000
stack
page read and write
B20000
trusted library allocation
page execute and read and write
B503000
unkown
page read and write
8844000
unkown
page read and write
7060000
heap
page read and write
10C0000
direct allocation
page read and write
4325000
unkown
page read and write
418A000
stack
page read and write
3CF7000
unkown
page readonly
4302000
unkown
page read and write
79FA000
heap
page read and write
2CA0000
unkown
page read and write
3A6000
heap
page read and write
5D0000
trusted library allocation
page execute and read and write
1D55000
heap
page read and write
410000
unkown
page read and write
2FCE000
heap
page read and write
7064000
heap
page read and write
D10000
trusted library allocation
page execute and read and write
785E000
stack
page read and write
45A000
trusted library allocation
page read and write
1D20000
unkown
page read and write
7660000
stack
page read and write
44E0000
unkown
page read and write
860E000
unkown
page read and write
2210000
heap
page read and write
3CF000
stack
page read and write
2CB6000
unkown
page read and write
3AD8000
unkown
page read and write
1333000
unkown
page write copy
84C0000
unkown
page read and write
1ED0000
trusted library allocation
page read and write
2AD0000
unkown
page read and write
830000
unkown
page readonly
AEE0000
unkown
page read and write
2A10000
unkown
page read and write
1DD0000
unkown
page readonly
23C4000
trusted library section
page readonly
4560000
unkown
page readonly
2AF000
unkown
page read and write
10000
heap
page read and write
2A10000
unkown
page read and write
2C0000
heap
page read and write
965F000
stack
page read and write
2A80000
unkown
page read and write
366000
heap
page read and write
1321000
unkown
page execute read
B30000
trusted library allocation
page execute and read and write
7EC0000
unkown
page read and write
42D0000
unkown
page read and write
7230000
heap
page read and write
1337000
unkown
page readonly
44F0000
unkown
page readonly
2600000
unkown
page readonly
2C0000
unkown
page read and write
2CAB000
unkown
page read and write
980000
trusted library allocation
page execute and read and write
2CAE000
unkown
page read and write
1321000
unkown
page execute read
8636000
unkown
page read and write
8864000
unkown
page read and write
85F4000
unkown
page read and write
8855000
unkown
page read and write
490000
trusted library allocation
page read and write
2A40000
unkown
page read and write
8802000
unkown
page read and write
88BD000
unkown
page read and write
7549000
heap
page read and write
2B0000
unkown
page read and write
110000
unkown
page read and write
88FD000
unkown
page read and write
87E3000
unkown
page read and write
6FC4000
heap
page read and write
AEC0000
unkown
page read and write
6D49000
stack
page read and write
8506000
unkown
page read and write
991000
trusted library allocation
page read and write
4302000
unkown
page read and write
23E4000
heap
page read and write
8617000
unkown
page read and write
6DA000
direct allocation
page read and write
110000
unkown
page read and write
7660000
stack
page read and write
540000
heap
page read and write
5A0000
heap
page read and write
3AE000
stack
page read and write
2CF000
unkown
page read and write
4570000
unkown
page readonly
6E4E000
stack
page read and write
1054000
direct allocation
page read and write
87FF000
unkown
page read and write
B603000
unkown
page read and write
19F000
stack
page read and write
2A20000
unkown
page read and write
4182000
stack
page read and write
1A9000
stack
page read and write
450000
unkown
page read and write
1321000
unkown
page execute read
3A6000
heap
page read and write
3FB5000
stack
page read and write
4520000
unkown
page readonly
3BD000
stack
page read and write
766B000
stack
page read and write
82CC000
unkown
page read and write
3CF7000
unkown
page readonly
430000
trusted library allocation
page execute and read and write
220000
unkown
page read and write
6FC0000
heap
page read and write
3CF7000
unkown
page readonly
41C0000
unkown
page readonly
2FC9000
heap
page read and write
8669000
unkown
page read and write
AEDE000
unkown
page read and write
2971000
unkown
page read and write
28B0000
unkown
page readonly
329000
heap
page read and write
830000
unkown
page readonly
2BFE000
stack
page read and write
8805000
unkown
page read and write
132E000
unkown
page readonly
2BFE000
stack
page read and write
F50000
direct allocation
page read and write
6EC0000
heap
page read and write
2983000
unkown
page read and write
28C0000
unkown
page read and write
44C3000
unkown
page read and write
84C0000
unkown
page read and write
30000
trusted library allocation
page read and write
2C30000
unkown
page read and write
132E000
unkown
page readonly
44D0000
unkown
page readonly
7540000
heap
page read and write
4E60000
stack
page read and write
9BD0000
trusted library allocation
page read and write
42F000
stack
page read and write
2A40000
unkown
page read and write
2A00000
unkown
page read and write
757000
heap
page read and write
8926000
unkown
page read and write
8861000
unkown
page read and write
449B000
unkown
page read and write
25F0000
unkown
page readonly
C90000
trusted library allocation
page execute and read and write
2CF000
unkown
page read and write
82CC000
unkown
page read and write
2CA2000
unkown
page read and write
4464000
unkown
page read and write
2B20000
unkown
page read and write
1320000
unkown
page readonly
3AB8000
unkown
page read and write
44D000
unkown
page read and write
3B10000
unkown
page readonly
121F000
unclassified section
page read and write
2A50000
unkown
page read and write
1F0000
unkown
page readonly
426000
heap
page read and write
1040000
direct allocation
page read and write
7567000
heap
page read and write
ABB9000
stack
page read and write
B683000
unkown
page read and write
74BE000
stack
page read and write
FC000
stack
page read and write
244000
heap
page read and write
74BE000
stack
page read and write
85F4000
unkown
page read and write
1333000
unkown
page write copy
6F4A000
stack
page read and write
1333000
unkown
page write copy
ABB9000
stack
page read and write
1337000
unkown
page readonly
2971000
unkown
page read and write
82FD000
unkown
page read and write
4BBF000
stack
page read and write
42E000
unkown
page read and write
1320000
unkown
page readonly
7539000
stack
page read and write
4D5E000
stack
page read and write
2AA0000
unkown
page read and write
400000
remote allocation
page execute and read and write
1D13000
unkown
page read and write
60000
unkown
page readonly
317000
heap
page read and write
E0000
unkown
page read and write
82C5000
unkown
page read and write
8611000
unkown
page read and write
448F000
unkown
page read and write
6750000
unkown
page read and write
4C00000
heap
page read and write
448F000
unkown
page read and write
418A000
stack
page read and write
42E000
unkown
page read and write
850D000
unkown
page read and write
8D2D000
trusted library allocation
page read and write
288D000
stack
page read and write
86C9000
unkown
page read and write
8600000
unkown
page read and write
30000
trusted library allocation
page read and write
40C000
unkown
page read and write
10000
heap
page read and write
904000
trusted library allocation
page execute and read and write
1B0000
unkown
page read and write
1333000
unkown
page write copy
42E000
unkown
page read and write
1D73000
heap
page read and write
329000
heap
page read and write
8675000
unkown
page read and write
8861000
unkown
page read and write
85D2000
unkown
page read and write
100000
unkown
page read and write
210000
unkown
page readonly
2FCE000
heap
page read and write
83A7000
unkown
page read and write
1DD0000
unkown
page readonly
110000
direct allocation
page execute and read and write
88F5000
unkown
page read and write
B27000
trusted library allocation
page execute and read and write
8867000
unkown
page read and write
4457000
unkown
page read and write
44B8000
unkown
page read and write
87E3000
unkown
page read and write
CA1000
trusted library allocation
page execute and read and write
310000
heap
page read and write
4302000
unkown
page read and write
2F0F000
stack
page read and write
4464000
unkown
page read and write
994000
trusted library allocation
page read and write
27A000
unkown
page read and write
46CC000
stack
page read and write
450000
unkown
page read and write
2F1B000
stack
page read and write
220000
unkown
page read and write
45A0000
unkown
page readonly
4220000
unkown
page readonly
2A0000
unkown
page read and write
6DA000
direct allocation
page read and write
B503000
unkown
page read and write
85FD000
unkown
page read and write
4188000
stack
page read and write
766B000
stack
page read and write
D0000
unkown
page readonly
256000
unkown
page read and write
2A60000
unkown
page read and write
6C79000
stack
page read and write
B0C3000
heap
page read and write
72C0000
heap
page read and write
886F000
unkown
page read and write
929D000
stack
page read and write
39E0000
heap
page read and write
2A00000
unkown
page read and write
2B50000
trusted library allocation
page read and write
1337000
unkown
page readonly
4550000
unkown
page readonly
85D2000
unkown
page read and write
1D50000
heap
page read and write
2CB3000
unkown
page read and write
44B8000
unkown
page read and write
41C0000
unkown
page readonly
20000
unkown
page readonly
10000
heap
page read and write
500000
trusted library allocation
page read and write
250000
unkown
page read and write
8E30000
heap
page read and write
8617000
unkown
page read and write
240000
heap
page read and write
3FD000
heap
page read and write
2A60000
unkown
page read and write
ADD000
stack
page read and write
2A70000
unkown
page read and write
2CBF000
unkown
page read and write
7BE0000
heap
page read and write
7567000
heap
page read and write
2B50000
unkown
page readonly
57E000
heap
page read and write
There are 1416 hidden memdumps, click here to show them.