IOC Report
DL03327INV.xlsx

loading gif

Files

File Path
Type
Category
Malicious
DL03327INV.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
downloaded
malicious
C:\Users\user\AppData\Local\Temp\yldnat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$DL03327INV.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21AA51C5.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5042D1B.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52D20C60.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77AC4BD4.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E77A502.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Temp\boswagvgna
data
dropped
C:\Users\user\AppData\Local\Temp\l4nnhna3wvu7agf
data
dropped
C:\Users\user\AppData\Local\Temp\nss8A2D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\~DF8200AD3C92400B31.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DFA02A15C6E61E2243.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFB8C99282338AF6F8.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFD268A41FBC2DE634.TMP
data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Users\user\AppData\Local\Temp\yldnat.exe
C:\Users\user\AppData\Local\Temp\yldnat.exe C:\Users\user\AppData\Local\Temp\boswagvgna
malicious
C:\Users\user\AppData\Local\Temp\yldnat.exe
C:\Users\user\AppData\Local\Temp\yldnat.exe C:\Users\user\AppData\Local\Temp\boswagvgna
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\wuapp.exe
C:\Windows\SysWOW64\wuapp.exe
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\AppData\Local\Temp\yldnat.exe"

URLs

Name
IP
Malicious
http://www.yiwanggkm.com/nc39/?dZzp=SW2DOu4AoD1tt2PaEEhiNvSk2qD2OpQeAcSR0NEUE8SsNGniN/+F24NqGXKX7Cj1ljS/6Q==&3f=j6AdrVwh
23.81.214.26
malicious
http://www.tw-life.net/nc39/?dZzp=Td3Z6WACWlvn2oxJ5kz3cAAvTYM+vx9a0mv4ko18Io/mhbtUurGZKYFJi0A4+N8FDsGh8g==&3f=j6AdrVwh
164.155.217.57
malicious
www.arjimni.com/nc39/
malicious
http://104.168.33.31/75/vbc.exehhC:
unknown
malicious
http://104.168.33.31/75/vbc.exe
104.168.33.31
malicious
http://104.168.33.31/75/vbc.exej
unknown
malicious
http://www.contractornurd.com/nc39/?dZzp=CWrF3poHj2MNQw4FqfZfOWFDC9Dy9qwGAafxJUMNhkwMJpF8RUBmV1WHKbaf9sKHKobluA==&3f=j6AdrVwh
198.54.117.212
malicious
http://www.windows.com/pctv.
unknown
http://investor.msn.com
unknown
http://www.msnbc.com/news/ticker.txt
unknown
http://wellformedweb.org/CommentAPI/
unknown
http://www.arjimni.com/nc39/?dZzp=SWFeU2CogosqNHNVddu3ZSSiHhx9YO5iIr2cqOlbYRvwZbqC6rJ+ufxHmetPGTnqGTEg+w==&3f=j6AdrVwh
34.102.136.180
http://www.iis.fhg.de/audioPA
unknown
http://www.piriform.com/ccleanerq
unknown
http://www.piriform.com/ccleaner1SPS0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
http://www.hotmail.com/oe
unknown
http://treyresearch.net
unknown
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
http://java.sun.com
unknown
http://www.icra.org/vocabulary/.
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://investor.msn.com/
unknown
http://www.piriform.com/ccleaner
unknown
http://computername/printers/printername/.printer
unknown
http://www.%s.comPA
unknown
http://www.autoitscript.com/autoit3
unknown
https://support.mozilla.org
unknown
http://www.piriform.com/ccleanerv
unknown
http://servername/isapibackend.dll
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tw-life.net
164.155.217.57
malicious
www.yiwanggkm.com
23.81.214.26
malicious
www.arjimni.com
unknown
malicious
www.contractornurd.com
unknown
malicious
www.skinclash.com
unknown
malicious
parkingpage.namecheap.com
198.54.117.212
hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
18.119.154.66
arjimni.com
34.102.136.180

IPs

IP
Domain
Country
Malicious
23.81.214.26
www.yiwanggkm.com
United States
malicious
104.168.33.31
unknown
United States
malicious
164.155.217.57
www.tw-life.net
South Africa
malicious
34.102.136.180
arjimni.com
United States
198.54.117.212
parkingpage.namecheap.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
!{*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\670AD
670AD
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
=j*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6C1B9
6C1B9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6F5B4
6F5B4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6C1B9
6C1B9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C0000
unclassified section
page execute and read and write
malicious
120000
direct allocation
page read and write
malicious
270000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
B8A4000
unkown
page execute and read and write
malicious
240000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
110000
system
page execute and read and write
malicious
B8A4000
unkown
page execute and read and write
malicious
C0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1DF1000
trusted library allocation
page read and write
71A0000
heap
page read and write
4570000
unkown
page readonly
6C0000
heap
page read and write
82D1000
unkown
page read and write
1A654000
direct allocation
page read and write
82C0000
unkown
page read and write
40A000
unkown
page write copy
4450000
unkown
page read and write
3FC0000
unkown
page read and write
449F000
unkown
page read and write
807000
heap
page read and write
B464000
unkown
page read and write
1DD0000
unkown
page readonly
1A660000
direct allocation
page read and write
AC7000
trusted library allocation
page execute and read and write
49D000
heap
page read and write
7DC3000
stack
page read and write
13C3000
unkown
page read and write
323000
heap
page read and write
26C6000
unkown
page read and write
B4E3000
unkown
page read and write
AA60000
trusted library allocation
page read and write
1DEE000
stack
page read and write
3A4000
heap
page read and write
44B3000
unkown
page read and write
8602000
unkown
page read and write
449B000
unkown
page read and write
44B3000
unkown
page read and write
85FA000
unkown
page read and write
1A640000
direct allocation
page read and write
220000
unkown
page read and write
ADEE000
unkown
page read and write
19F000
stack
page read and write
B8E4000
unkown
page execute and read and write
3A60000
unkown
page read and write
50000
unkown
page readonly
1A651000
direct allocation
page read and write
13C7000
unkown
page readonly
B30000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
4D0000
heap
page read and write
44B6000
unkown
page read and write
2B50000
unkown
page readonly
1FCE000
stack
page read and write
13BE000
unkown
page readonly
4570000
unkown
page readonly
63D000
trusted library allocation
page read and write
B4E3000
unkown
page read and write
27A000
unkown
page read and write
2898000
stack
page read and write
ADE000
stack
page read and write
8858000
unkown
page read and write
6D49000
stack
page read and write
41C0000
unkown
page readonly
4550000
unkown
page readonly
6B8000
heap
page read and write
4040000
unkown
page readonly
434F000
unkown
page read and write
851A000
unkown
page read and write
223F000
stack
page read and write
B420000
unkown
page read and write
2CF000
unkown
page read and write
43F0000
unkown
page read and write
28C0000
unkown
page read and write
2C73000
unkown
page read and write
2B0000
unkown
page read and write
AF9F000
stack
page read and write
2DE000
stack
page read and write
410000
unkown
page read and write
5E7000
heap
page read and write
46CC000
stack
page read and write
39D0000
unkown
page read and write
8512000
unkown
page read and write
13B0000
unkown
page readonly
310000
heap
page read and write
2BF000
unkown
page read and write
441F000
unkown
page read and write
256000
unkown
page read and write
8636000
unkown
page read and write
329000
heap
page read and write
6C0000
heap
page read and write
693000
heap
page read and write
1D13000
unkown
page read and write
720000
heap
page read and write
7E40000
heap
page read and write
323000
heap
page read and write
18A000
stack
page read and write
3AF0000
unkown
page read and write
449B000
unkown
page read and write
8669000
unkown
page read and write
6D4B000
stack
page read and write
4140000
unkown
page read and write
AD000
stack
page read and write
1A6C0000
direct allocation
page read and write
1C6000
heap
page read and write
8337000
unkown
page read and write
2C73000
unkown
page read and write
866C000
unkown
page read and write
B785000
heap
page read and write
8669000
unkown
page read and write
448F000
unkown
page read and write
1D20000
unkown
page read and write
1A660000
direct allocation
page read and write
719A000
stack
page read and write
4188000
unkown
page read and write
8678000
unkown
page read and write
2B50000
unkown
page readonly
85F4000
unkown
page read and write
2FC5000
heap
page read and write
4F60000
heap
page read and write
41C0000
unkown
page readonly
8678000
unkown
page read and write
85F4000
unkown
page read and write
320000
heap
page read and write
3A60000
unkown
page read and write
766B000
stack
page read and write
B420000
unkown
page read and write
1A550000
direct allocation
page read and write
8926000
unkown
page read and write
41E0000
unkown
page read and write
940000
unkown
page read and write
1CC000
stack
page read and write
78D8000
stack
page read and write
256000
unkown
page read and write
13B0000
unkown
page readonly
D0000
unkown
page readonly
A4AC000
stack
page read and write
690000
unkown
page readonly
8611000
unkown
page read and write
72C0000
heap
page read and write
2E0000
trusted library allocation
page read and write
400000
unkown
page readonly
82CC000
unkown
page read and write
63A000
trusted library allocation
page read and write
335000
heap
page read and write
8844000
unkown
page read and write
6FC0000
heap
page read and write
7064000
heap
page read and write
4423000
unkown
page read and write
6F3F000
stack
page read and write
1A640000
direct allocation
page read and write
3990000
unkown
page readonly
4188000
unkown
page read and write
4030000
unkown
page execute read
4520000
unkown
page readonly
27F0000
unkown
page read and write
408000
unkown
page readonly
448C000
unkown
page read and write
408000
unkown
page readonly
2CB9000
unkown
page read and write
66B000
heap
page read and write
8864000
unkown
page read and write
3F10000
unkown
page read and write
4C10000
heap
page read and write
440D000
unkown
page read and write
8506000
unkown
page read and write
2E0000
trusted library allocation
page read and write
B563000
unkown
page read and write
8521000
unkown
page read and write
42E000
unkown
page read and write
B520000
unkown
page read and write
AD0000
trusted library allocation
page execute and read and write
3FE000
stack
page read and write
780000
trusted library allocation
page read and write
44E0000
unkown
page read and write
1DAF000
stack
page read and write
407C000
unkown
page read and write
2B0000
unkown
page read and write
13C3000
unkown
page write copy
4150000
unkown
page read and write
6C0000
trusted library allocation
page read and write
44B6000
unkown
page read and write
282000
heap
page read and write
2FC9000
heap
page read and write
717000
heap
page read and write
741000
heap
page read and write
1D13000
unkown
page read and write
240000
heap
page read and write
7660000
stack
page read and write
87FC000
unkown
page read and write
84EE000
unkown
page read and write
AA60000
trusted library allocation
page read and write
42D0000
unkown
page read and write
13B1000
unkown
page execute read
13C7000
unkown
page readonly
13C3000
unkown
page write copy
4BBF000
stack
page read and write
88FA000
unkown
page read and write
ADD0000
unkown
page read and write
1F0000
unkown
page readonly
8521000
unkown
page read and write
6E5A000
stack
page read and write
1D30000
unkown
page read and write
82D1000
unkown
page read and write
264000
heap
page read and write
4540000
unkown
page readonly
1A9000
stack
page read and write
830000
unkown
page readonly
5E0000
heap
page read and write
41A8000
unkown
page read and write
8611000
unkown
page read and write
401000
unkown
page execute read
410C000
stack
page read and write
88FD000
unkown
page read and write
26F0000
unkown
page read and write
2CA8000
unkown
page read and write
13C3000
unkown
page write copy
9DBF000
trusted library allocation
page read and write
85A000
trusted library allocation
page read and write
41C0000
unkown
page readonly
830000
unkown
page readonly
210000
unkown
page readonly
1CF0000
trusted library allocation
page read and write
448F000
unkown
page read and write
69B000
heap
page read and write
4180000
unkown
page read and write
7A6000
unkown
page read and write
46CC000
stack
page read and write
2C73000
unkown
page read and write
79F0000
heap
page read and write
1A6C0000
direct allocation
page read and write
2B0000
unkown
page read and write
2A0000
unkown
page read and write
2CAE000
unkown
page read and write
2B20000
unkown
page read and write
4530000
unkown
page readonly
1D73000
heap
page read and write
886D000
unkown
page read and write
2E0000
trusted library allocation
page read and write
2CD000
stack
page read and write
AAC9000
stack
page read and write
72C0000
heap
page read and write
2C40000
trusted library allocation
page read and write
2104000
trusted library allocation
page execute and read and write
7409000
stack
page read and write
46D0000
unkown
page readonly
84C0000
unkown
page read and write
44C3000
unkown
page read and write
2E0000
unkown
page readonly
31D000
heap
page read and write
44D0000
unkown
page readonly
4464000
unkown
page read and write
4120000
unkown
page read and write
13BE000
unkown
page readonly
12DA000
direct allocation
page read and write
220000
unkown
page read and write
2CA5000
unkown
page read and write
316000
heap
page read and write
87F1000
unkown
page read and write
13BE000
unkown
page readonly
4C05000
heap
page read and write
886F000
unkown
page read and write
6450000
unkown
page readonly
2FC0000
heap
page read and write
77C000
unkown
page read and write
7EFE0000
unkown
page readonly
A20000
heap
page read and write
D0000
unkown
page readonly
36D0000
trusted library allocation
page read and write
947000
trusted library allocation
page execute and read and write
1A9000
stack
page read and write
2A0000
unkown
page read and write
8582000
unkown
page read and write
4220000
unkown
page readonly
4510000
unkown
page execute and read and write
2E0000
unkown
page readonly
30000
unclassified section
page execute and read and write
340000
heap
page read and write
3CF7000
unkown
page readonly
408000
unkown
page readonly
1C30000
unkown
page readonly
AAC9000
stack
page read and write
36F000
heap
page read and write
850D000
unkown
page read and write
85D2000
unkown
page read and write
28C0000
unkown
page read and write
85AC000
unkown
page read and write
448C000
unkown
page read and write
223F000
stack
page read and write
B3E0000
unkown
page read and write
1A660000
direct allocation
page read and write
9DAF000
trusted library allocation
page read and write
87F1000
unkown
page read and write
244000
heap
page read and write
2C21000
unkown
page read and write
E0000
unkown
page read and write
4520000
unkown
page readonly
6FE3000
heap
page read and write
A21D000
stack
page read and write
2170000
trusted library allocation
page execute and read and write
2D0000
unkown
page readonly
26F0000
unkown
page read and write
2AF000
unkown
page read and write
1D50000
heap
page read and write
86C9000
unkown
page read and write
1A560000
direct allocation
page read and write
27A000
unkown
page read and write
310000
heap
page read and write
400000
unkown
page readonly
7400000
stack
page read and write
367000
heap
page read and write
886A000
unkown
page read and write
210000
unkown
page readonly
82C5000
unkown
page read and write
357000
heap
page read and write
3FD000
heap
page read and write
7B9000
unkown
page readonly
1FD0000
heap
page read and write
250000
unkown
page read and write
20000
unkown
page readonly
26C6000
unkown
page read and write
2CB0000
unkown
page read and write
3B10000
unkown
page readonly
45A0000
unkown
page readonly
8521000
unkown
page read and write
2CB0000
unkown
page read and write
1F0000
unkown
page readonly
4D5E000
stack
page read and write
4030000
unkown
page execute read
4188000
unkown
page read and write
7064000
heap
page read and write
28B0000
unkown
page readonly
3DD000
stack
page read and write
260000
heap
page read and write
3FD0000
unkown
page read and write
6D3000
heap
page read and write
88F7000
unkown
page read and write
2180000
trusted library allocation
page execute and read and write
2C0000
unkown
page read and write
44D0000
unkown
page readonly
A09E000
stack
page read and write
27D000
heap
page read and write
8864000
unkown
page read and write
2FC5000
heap
page read and write
74BE000
stack
page read and write
ADD0000
unkown
page read and write
35CE000
stack
page read and write
256000
unkown
page read and write
5030000
heap
page read and write
85D000
trusted library allocation
page read and write
1A640000
direct allocation
page read and write
408000
unkown
page readonly
4484000
unkown
page read and write
7660000
stack
page read and write
8802000
unkown
page read and write
1A6C0000
direct allocation
page read and write
82C0000
unkown
page read and write
85F2000
unkown
page read and write
2CB9000
unkown
page read and write
6D49000
stack
page read and write
13B1000
unkown
page execute read
4560000
unkown
page readonly
4180000
unkown
page read and write
288D000
stack
page read and write
2BF000
unkown
page read and write
E64000
unclassified section
page execute and read and write
88FD000
unkown
page read and write
3A6000
heap
page read and write
240000
heap
page read and write
2CBC000
unkown
page read and write
200000
trusted library allocation
page execute and read and write
883B000
unkown
page read and write
785E000
stack
page read and write
992000
unkown
page read and write
288D000
stack
page read and write
886D000
unkown
page read and write
3A6000
heap
page read and write
4620000
unkown
page read and write
869E000
unkown
page read and write
2CBC000
unkown
page read and write
449B000
unkown
page read and write
1E60000
trusted library allocation
page read and write
886F000
unkown
page read and write
866C000
unkown
page read and write
87E3000
unkown
page read and write
2CB6000
unkown
page read and write
329000
heap
page read and write
40A000
unkown
page write copy
2C21000
unkown
page read and write
2CB6000
unkown
page read and write
86C9000
unkown
page read and write
40A000
unkown
page read and write
110000
unkown
page read and write
441F000
unkown
page read and write
44B8000
unkown
page read and write
8337000
unkown
page read and write
3A70000
unkown
page read and write
2B30000
unkown
page readonly
3FC0000
unkown
page read and write
25F0000
unkown
page readonly
7B9000
unkown
page readonly
8664000
unkown
page read and write
44D000
unkown
page read and write
1200000
direct allocation
page read and write
440D000
unkown
page read and write
40A000
unkown
page write copy
94F000
stack
page read and write
39D0000
unkown
page read and write
510000
unkown
page readonly
460000
heap
page read and write
5C0000
trusted library section
page readonly
885F000
unkown
page read and write
4560000
unkown
page readonly
448F000
unkown
page read and write
D0000
unkown
page readonly
4450000
unkown
page read and write
879E000
unkown
page read and write
4130000
unkown
page read and write
410000
unkown
page read and write
110000
unkown
page read and write
2CAB000
unkown
page read and write
316000
heap
page read and write
886A000
unkown
page read and write
2CBF000
unkown
page read and write
46E000
heap
page read and write
2CA0000
unkown
page read and write
317000
heap
page read and write
1D73000
heap
page read and write
2E0000
trusted library allocation
page read and write
1D55000
heap
page read and write
3F10000
unkown
page read and write
1DF7000
trusted library allocation
page read and write
4150000
unkown
page read and write
869E000
unkown
page read and write
410C000
stack
page read and write
1E80000
trusted library allocation
page execute and read and write
8667000
unkown
page read and write
39E0000
heap
page read and write
3FB7000
stack
page read and write
42AE000
stack
page read and write
310000
heap
page read and write
18C000
stack
page read and write
37B000
heap
page read and write
B800000
unkown
page execute and read and write
4540000
unkown
page readonly
2898000
stack
page read and write
37B000
heap
page read and write
2FB0000
unkown
page read and write
79FA000
heap
page read and write
2A0000
unkown
page read and write
60000
unkown
page readonly
883B000
unkown
page read and write
84D2000
unkown
page read and write
43F0000
unkown
page read and write
930000
trusted library allocation
page execute and read and write
12DA000
direct allocation
page read and write
450000
unkown
page read and write
8558000
unkown
page read and write
450000
unkown
page read and write
510000
unkown
page readonly
10000
heap
page read and write
7540000
heap
page read and write
5AE000
stack
page read and write
290000
unkown
page readonly
28B0000
unkown
page readonly
39E0000
heap
page read and write
4464000
unkown
page read and write
1D73000
heap
page read and write
B780000
heap
page read and write
6D4B000
stack
page read and write
3FAF000
stack
page read and write
6EC0000
heap
page read and write
860E000
unkown
page read and write
8807000
unkown
page read and write
2CAE000
unkown
page read and write
4C05000
heap
page read and write
1B0000
trusted library allocation
page read and write
8E0000
system
page execute and read and write
19F000
stack
page read and write
2CB0000
unkown
page read and write
690000
unkown
page readonly
2643000
unkown
page read and write
1D55000
heap
page read and write
87BB000
unkown
page read and write
ADEE000
unkown
page read and write
506000
unkown
page read and write
3F10000
unkown
page read and write
2CBF000
unkown
page read and write
4210000
unkown
page read and write
290000
unkown
page readonly
4530000
unkown
page readonly
310000
heap
page read and write
6E4E000
stack
page read and write
85D2000
unkown
page read and write
69F000
heap
page read and write
A05D000
stack
page read and write
329000
heap
page read and write
2F0F000
stack
page read and write
7549000
heap
page read and write
20000
heap
page read and write
5F7000
heap
page read and write
B7A3000
heap
page read and write
2F9E000
stack
page read and write
26BA000
unkown
page read and write
310000
heap
page read and write
4030000
unkown
page execute read
6C79000
stack
page read and write
506000
unkown
page read and write
110000
unkown
page read and write
4030000
unkown
page execute read
4302000
unkown
page read and write
1200000
direct allocation
page read and write
41D0000
unkown
page readonly
3FD0000
unkown
page read and write
3FD000
heap
page read and write
85FD000
unkown
page read and write
719A000
stack
page read and write
8900000
unkown
page read and write
8E0000
system
page execute and read and write
3FC000
stack
page read and write
840000
trusted library allocation
page execute and read and write
1A560000
direct allocation
page read and write
6E4E000
stack
page read and write
8900000
unkown
page read and write
4560000
unkown
page readonly
7930000
heap
page read and write
8867000
unkown
page read and write
13B0000
unkown
page readonly
2101000
trusted library allocation
page execute and read and write
2CBC000
unkown
page read and write
693000
heap
page read and write
A918000
stack
page read and write
88F5000
unkown
page read and write
87F9000
unkown
page read and write
2E0000
trusted library allocation
page read and write
4423000
unkown
page read and write
8506000
unkown
page read and write
AA60000
trusted library allocation
page read and write
2B1E000
stack
page read and write
87E3000
unkown
page read and write
27A000
unkown
page read and write
60000
unkown
page readonly
947000
unkown
page read and write
1C30000
unkown
page readonly
85F7000
unkown
page read and write
41E0000
unkown
page read and write
13C7000
unkown
page readonly
83A7000
unkown
page read and write
28B0000
unkown
page readonly
8371000
unkown
page read and write
7060000
heap
page read and write
4CDD000
stack
page read and write
7C0000
trusted library allocation
page read and write
1E90000
trusted library allocation
page execute and read and write
1F0000
unkown
page readonly
4040000
unkown
page readonly
1E00000
trusted library allocation
page read and write
3B00000
unkown
page read and write
3FD0000
unkown
page read and write
41AE000
stack
page read and write
87FF000
unkown
page read and write
2FCE000
heap
page read and write
944000
trusted library allocation
page execute and read and write
6750000
unkown
page read and write
A1DC000
stack
page read and write
2A0000
unkown
page read and write
3AF0000
unkown
page read and write
8602000
unkown
page read and write
34E000
heap
page read and write
7DC8000
stack
page read and write
13C7000
unkown
page readonly
223F000
stack
page read and write
2F0F000
stack
page read and write
8512000
unkown
page read and write
376000
heap
page read and write
13B0000
unkown
page readonly
690000
unkown
page readonly
210000
unkown
page readonly
7B9000
unkown
page readonly
7567000
heap
page read and write
4BBF000
stack
page read and write
7930000
heap
page read and write
10000
heap
page read and write
41E0000
unkown
page read and write
6450000
unkown
page readonly
4338000
unkown
page read and write
2801000
unkown
page read and write
13C7000
unkown
page readonly
44B8000
unkown
page read and write
4130000
unkown
page read and write
13C3000
unkown
page write copy
3CF7000
unkown
page readonly
28F0000
unkown
page read and write
45A0000
unkown
page readonly
A918000
stack
page read and write
450000
unkown
page read and write
9D0000
trusted library allocation
page execute and read and write
4550000
unkown
page readonly
88F5000
unkown
page read and write
3A6000
heap
page read and write
13BE000
unkown
page readonly
7DBF000
stack
page read and write
7083000
heap
page read and write
2010000
trusted library allocation
page execute and read and write
4210000
unkown
page read and write
7B1000
trusted library allocation
page read and write
8820000
unkown
page read and write
2E9F000
stack
page read and write
964000
unkown
page read and write
1F70000
trusted library allocation
page execute and read and write
110000
direct allocation
page execute and read and write
719A000
stack
page read and write
785E000
stack
page read and write
8667000
unkown
page read and write
8667000
unkown
page read and write
8864000
unkown
page read and write
8608000
unkown
page read and write
34C000
heap
page read and write
995000
unkown
page read and write
8820000
unkown
page read and write
1F10000
trusted library allocation
page read and write
87FC000
unkown
page read and write
50000
unkown
page readonly
87F9000
unkown
page read and write
29DF000
stack
page read and write
85AC000
unkown
page read and write
AB0000
trusted library allocation
page execute and read and write
1D13000
unkown
page read and write
4150000
unkown
page read and write
786000
unkown
page read and write
4180000
unkown
page read and write
8608000
unkown
page read and write
12DA000
direct allocation
page read and write
1D55000
heap
page read and write
2CBF000
unkown
page read and write
43F0000
unkown
page read and write
2B64000
heap
page read and write
4110000
unkown
page read and write
2110000
trusted library allocation
page execute and read and write
2CB6000
unkown
page read and write
407C000
unkown
page read and write
8600000
unkown
page read and write
1FF0000
trusted library allocation
page execute and read and write
2CA2000
unkown
page read and write
4570000
unkown
page readonly
1D55000
heap
page read and write
484000
heap
page read and write
2B50000
unkown
page readonly
4385000
unkown
page read and write
8926000
unkown
page read and write
3F10000
unkown
page read and write
8900000
unkown
page read and write
7230000
heap
page read and write
26BA000
unkown
page read and write
9C0000
trusted library allocation
page execute and read and write
449B000
unkown
page read and write
250000
unkown
page read and write
2107000
trusted library allocation
page execute and read and write
2B3F000
stack
page read and write
2BFE000
stack
page read and write
2C40000
trusted library allocation
page read and write
7DC3000
stack
page read and write
7930000
heap
page read and write
8371000
unkown
page read and write
2D0000
unkown
page readonly
85F4000
unkown
page read and write
B563000
unkown
page read and write
85F2000
unkown
page read and write
83A7000
unkown
page read and write
4385000
unkown
page read and write
2E0000
unkown
page readonly
42E000
unkown
page read and write
2F1B000
stack
page read and write
10000
heap
page read and write
3FC0000
unkown
page read and write
26C6000
unkown
page read and write
7230000
heap
page read and write
6F3F000
stack
page read and write
44D000
unkown
page read and write
4540000
unkown
page readonly
84EE000
unkown
page read and write
9B0000
trusted library allocation
page execute and read and write
1D5E000
stack
page read and write
93F000
stack
page read and write
401000
unkown
page execute read
2B20000
unkown
page read and write
87F9000
unkown
page read and write
4570000
unkown
page readonly
8605000
unkown
page read and write
8337000
unkown
page read and write
7EC0000
unkown
page read and write
7DBF000
stack
page read and write
1E0000
trusted library allocation
page execute and read and write
44B3000
unkown
page read and write
20000
trusted library allocation
page read and write
8600000
unkown
page read and write
2E9F000
stack
page read and write
3FB5000
stack
page read and write
28F0000
unkown
page read and write
2CA0000
unkown
page read and write
3FD000
heap
page read and write
26F0000
unkown
page read and write
D7F000
stack
page read and write
85F7000
unkown
page read and write
4620000
unkown
page read and write
9D9D000
trusted library allocation
page read and write
27A000
unkown
page read and write
4220000
unkown
page readonly
441F000
unkown
page read and write
6FE3000
heap
page read and write
869E000
unkown
page read and write
8E9000
system
page execute and read and write
20000
unkown
page readonly
8861000
unkown
page read and write
2B20000
unkown
page read and write
841F000
unkown
page read and write
3AF0000
unkown
page read and write
4520000
unkown
page readonly
2FC0000
heap
page read and write
400000
unkown
page readonly
44E0000
unkown
page read and write
A19F000
stack
page read and write
3CF7000
unkown
page readonly
2E0000
heap
page read and write
510000
unkown
page readonly
1200000
direct allocation
page read and write
8512000
unkown
page read and write
25D0000
heap
page read and write
410C000
stack
page read and write
1A9000
stack
page read and write
8903000
unkown
page read and write
467000
heap
page read and write
B464000
unkown
page read and write
2FC9000
heap
page read and write
13B0000
unkown
page readonly
7DCA000
stack
page read and write
6EC0000
heap
page read and write
2FC0000
heap
page read and write
866C000
unkown
page read and write
42D0000
unkown
page read and write
2CF000
unkown
page read and write
1B0000
unkown
page read and write
335000
heap
page read and write
85F2000
unkown
page read and write
34C000
heap
page read and write
4130000
unkown
page read and write
434F000
unkown
page read and write
407C000
unkown
page read and write
3A6000
heap
page read and write
45A0000
unkown
page readonly
B40000
trusted library allocation
page execute and read and write
88F5000
unkown
page read and write
41E0000
unkown
page read and write
1D50000
heap
page read and write
4210000
unkown
page read and write
860B000
unkown
page read and write
7DCA000
stack
page read and write
44F0000
unkown
page readonly
2801000
unkown
page read and write
28B000
heap
page read and write
223F000
stack
page read and write
2FC5000
heap
page read and write
4385000
unkown
page read and write
8926000
unkown
page read and write
41A8000
unkown
page read and write
290000
unkown
page readonly
850D000
unkown
page read and write
13C3000
unkown
page write copy
3A4000
heap
page read and write
8E9000
system
page execute and read and write
41FE000
stack
page read and write
1DD0000
unkown
page readonly
79FA000
heap
page read and write
2600000
unkown
page readonly
789000
unkown
page read and write
469000
heap
page read and write
41D0000
unkown
page readonly
88BD000
unkown
page read and write
2910000
unkown
page readonly
B7A3000
heap
page read and write
7DC3000
stack
page read and write
20F0000
trusted library allocation
page execute and read and write
7064000
heap
page read and write
26BA000
unkown
page read and write
316000
heap
page read and write
400000
unkown
page readonly
1FC000
stack
page read and write
7D48000
stack
page read and write
1F10000
trusted library allocation
page read and write
8802000
unkown
page read and write
10000
heap
page read and write
856A000
unkown
page read and write
8903000
unkown
page read and write
2AF000
unkown
page read and write
A36D000
stack
page read and write
7934000
heap
page read and write
7B9000
unkown
page readonly
4120000
unkown
page read and write
E0000
unkown
page read and write
6EC0000
heap
page read and write
B780000
heap
page read and write
7400000
stack
page read and write
46D0000
unkown
page readonly
20000
unkown
page readonly
474000
heap
page read and write
3B10000
unkown
page readonly
7540000
heap
page read and write
61F000
heap
page read and write
2600000
unkown
page readonly
85F7000
unkown
page read and write
88BD000
unkown
page read and write
85D2000
unkown
page read and write
44D000
unkown
page read and write
886A000
unkown
page read and write
2CAB000
unkown
page read and write
37B000
heap
page read and write
410000
unkown
page read and write
710000
heap
page read and write
288D000
stack
page read and write
2B60000
heap
page read and write
4338000
unkown
page read and write
D0000
unkown
page readonly
2D0000
unkown
page readonly
24DF000
stack
page read and write
1F0000
heap
page read and write
6D49000
stack
page read and write
879E000
unkown
page read and write
8608000
unkown
page read and write
940000
trusted library allocation
page execute and read and write
7953000
heap
page read and write
6F4A000
stack
page read and write
860E000
unkown
page read and write
7567000
heap
page read and write
6E5A000
stack
page read and write
2B30000
unkown
page readonly
2CAE000
unkown
page read and write
82D1000
unkown
page read and write
2801000
unkown
page read and write
1E2F000
stack
page read and write
45A0000
unkown
page readonly
1DD0000
unkown
page readonly
1A560000
direct allocation
page read and write
4464000
unkown
page read and write
2F0F000
stack
page read and write
2FCE000
heap
page read and write
449F000
unkown
page read and write
66A000
heap
page read and write
2643000
unkown
page read and write
83A7000
unkown
page read and write
401000
unkown
page execute read
2B5C000
stack
page read and write
82D5000
unkown
page read and write
6D4B000
stack
page read and write
37B000
heap
page read and write
320000
heap
page read and write
B563000
unkown
page read and write
1D30000
unkown
page read and write
8867000
unkown
page read and write
2B6B000
heap
page read and write
A230000
heap
page read and write
2B50000
unkown
page readonly
8FE000
stack
page read and write
2E9F000
stack
page read and write
88C0000
unkown
page read and write
6FC4000
heap
page read and write
7083000
heap
page read and write
44D000
unkown
page read and write
6F4A000
stack
page read and write
1F80000
trusted library allocation
page execute and read and write
2512000
unclassified section
page read and write
4423000
unkown
page read and write
1A9000
stack
page read and write
10000
heap
page read and write
AF9F000
stack
page read and write
42E000
unkown
page read and write
2C3F000
stack
page read and write
4C00000
heap
page read and write
4EED000
stack
page read and write
408000
unkown
page readonly
ADEE000
unkown
page read and write
824000
heap
page read and write
1200000
direct allocation
page read and write
8675000
unkown
page read and write
6FC0000
heap
page read and write
7953000
heap
page read and write
6E4E000
stack
page read and write
42AE000
stack
page read and write
4130000
unkown
page read and write
448F000
unkown
page read and write
427D000
stack
page read and write
449F000
unkown
page read and write
1C30000
unkown
page readonly
7DC8000
stack
page read and write
4450000
unkown
page read and write
4220000
unkown
page readonly
44C3000
unkown
page read and write
2CB9000
unkown
page read and write
B420000
unkown
page read and write
40A000
unkown
page write copy
13BE000
unkown
page readonly
12DD000
direct allocation
page read and write
4530000
unkown
page readonly
329000
heap
page read and write
E0000
unkown
page read and write
7540000
heap
page read and write
2CB3000
unkown
page read and write
4457000
unkown
page read and write
84D2000
unkown
page read and write
4302000
unkown
page read and write
88FA000
unkown
page read and write
14C000
stack
page read and write
13C3000
unkown
page write copy
1A657000
direct allocation
page read and write
244000
heap
page read and write
3FAF000
stack
page read and write
88BD000
unkown
page read and write
8858000
unkown
page read and write
2000000
trusted library allocation
page execute and read and write
74BE000
stack
page read and write
79FA000
heap
page read and write
335000
heap
page read and write
1D20000
unkown
page read and write
1F0000
unkown
page readonly
A560000
heap
page read and write
4560000
unkown
page readonly
2B30000
unkown
page readonly
2E9F000
stack
page read and write
CD000
stack
page read and write
85FD000
unkown
page read and write
358000
heap
page read and write
89000
stack
page read and write
6FC0000
heap
page read and write
2C73000
unkown
page read and write
410000
unkown
page read and write
5C9000
trusted library section
page readonly
7B5000
unkown
page read and write
3FB7000
stack
page read and write
3990000
unkown
page readonly
4450000
unkown
page read and write
3A4000
heap
page read and write
83E2000
unkown
page read and write
2643000
unkown
page read and write
86C9000
unkown
page read and write
25F0000
unkown
page readonly
8558000
unkown
page read and write
3A4000
heap
page read and write
7BE0000
heap
page read and write
A66D000
stack
page read and write
8371000
unkown
page read and write
39B0000
unkown
page read and write
5030000
heap
page read and write
782000
unkown
page read and write
4484000
unkown
page read and write
2FB0000
unkown
page read and write
883B000
unkown
page read and write
39B0000
unkown
page read and write
A520000
heap
page read and write
4EED000
stack
page read and write
800000
heap
page read and write
87E7000
unkown
page read and write
8675000
unkown
page read and write
2CB3000
unkown
page read and write
290000
unkown
page readonly
7DBF000
stack
page read and write
1A657000
direct allocation
page read and write
4457000
unkown
page read and write
400000
unkown
page readonly
44B3000
unkown
page read and write
10C000
stack
page read and write
8636000
unkown
page read and write
19F000
stack
page read and write
50000
unkown
page readonly
1B0000
unkown
page read and write
856A000
unkown
page read and write
1D50000
heap
page read and write
110000
unkown
page read and write
1A550000
direct allocation
page read and write
8636000
unkown
page read and write
1A6C0000
direct allocation
page read and write
1D13000
unkown
page read and write
4325000
unkown
page read and write
3A60000
unkown
page read and write
410C000
stack
page read and write
100000
unkown
page read and write
46F000
heap
page read and write
5EF000
stack
page read and write
1A654000
direct allocation
page read and write
46D0000
unkown
page readonly
4302000
unkown
page read and write
3B00000
unkown
page read and write
4423000
unkown
page read and write
810000
trusted library allocation
page execute and read and write
41D0000
unkown
page readonly
4C10000
heap
page read and write
87BB000
unkown
page read and write
2B30000
unkown
page readonly
2643000
unkown
page read and write
44F0000
unkown
page readonly
1D30000
unkown
page read and write
44E0000
unkown
page read and write
286000
heap
page read and write
44F0000
unkown
page readonly
4120000
unkown
page read and write
5E0000
heap
page read and write
100000
unkown
page read and write
1A550000
direct allocation
page read and write
B7A3000
heap
page read and write
4C00000
heap
page read and write
8807000
unkown
page read and write
13B0000
unkown
page readonly
39D0000
unkown
page read and write
82CC000
unkown
page read and write
1A560000
direct allocation
page read and write
26BA000
unkown
page read and write
83E2000
unkown
page read and write
82C0000
unkown
page read and write
4C05000
heap
page read and write
50000
unkown
page readonly
690000
unkown
page readonly
69A000
heap
page read and write
1D73000
heap
page read and write
250000
unkown
page read and write
84EE000
unkown
page read and write
84C0000
unkown
page read and write
B800000
unkown
page execute and read and write
25D4000
heap
page read and write
8802000
unkown
page read and write
B520000
unkown
page read and write
6FC4000
heap
page read and write
74BE000
stack
page read and write
2CB0000
unkown
page read and write
7D48000
stack
page read and write
3990000
unkown
page readonly
7660000
stack
page read and write
240000
heap
page read and write
27F0000
unkown
page read and write
82FD000
unkown
page read and write
13C3000
unkown
page write copy
2801000
unkown
page read and write
8678000
unkown
page read and write
43F0000
unkown
page read and write
7953000
heap
page read and write
2CA2000
unkown
page read and write
2F0000
heap
page read and write
42D0000
unkown
page read and write
860B000
unkown
page read and write
1C30000
unkown
page readonly
82CC000
unkown
page read and write
7934000
heap
page read and write
7B9000
unkown
page readonly
3FD0000
unkown
page read and write
1FE0000
direct allocation
page read and write
6E5A000
stack
page read and write
686000
heap
page read and write
2397000
unclassified section
page read and write
408000
unkown
page readonly
8805000
unkown
page read and write
8844000
unkown
page read and write
F0000
heap
page read and write
450000
unkown
page read and write
46CC000
stack
page read and write
3B00000
unkown
page read and write
6B0000
trusted library allocation
page read and write
1A640000
direct allocation
page read and write
AAC9000
stack
page read and write
323000
heap
page read and write
79F0000
heap
page read and write
5F0000
heap
page read and write
4CDD000
stack
page read and write
5AE000
stack
page read and write
885F000
unkown
page read and write
13BE000
unkown
page readonly
2910000
unkown
page readonly
13B0000
unkown
page readonly
210000
unkown
page readonly
219A000
unclassified section
page read and write
4C00000
heap
page read and write
250000
unkown
page read and write
36B000
stack
page read and write
2E0000
trusted library allocation
page read and write
7934000
heap
page read and write
2C0000
unkown
page read and write
677000
heap
page read and write
28A0000
unkown
page read and write
42AE000
stack
page read and write
42AE000
stack
page read and write
327000
heap
page read and write
4210000
unkown
page read and write
7E40000
heap
page read and write
1A654000
direct allocation
page read and write
2CBC000
unkown
page read and write
6F4A000
stack
page read and write
10000
heap
page read and write
A918000
stack
page read and write
13C7000
unkown
page readonly
7EC0000
unkown
page read and write
46CC000
stack
page read and write
841F000
unkown
page read and write
8903000
unkown
page read and write
2CAE000
unkown
page read and write
357000
heap
page read and write
4457000
unkown
page read and write
240000
heap
page read and write
220000
unkown
page read and write
69F000
heap
page read and write
4C10000
heap
page read and write
44B8000
unkown
page read and write
4325000
unkown
page read and write
13C3000
unkown
page write copy
28A0000
unkown
page read and write
46D0000
unkown
page readonly
7BE0000
heap
page read and write
E0000
unkown
page read and write
1D20000
unkown
page read and write
87FF000
unkown
page read and write
7230000
heap
page read and write
7C0000
trusted library allocation
page read and write
4CDD000
stack
page read and write
1D30000
unkown
page read and write
6C79000
stack
page read and write
1F84000
trusted library allocation
page execute and read and write
1F2D000
trusted library allocation
page read and write
10000
heap
page read and write
2FB0000
unkown
page read and write
2CA8000
unkown
page read and write
841B000
unkown
page read and write
2FC5000
heap
page read and write
4540000
unkown
page readonly
7A0000
trusted library allocation
page read and write
344000
heap
page read and write
2F9E000
stack
page read and write
400000
unkown
page readonly
1A550000
direct allocation
page read and write
2BFE000
stack
page read and write
3A70000
unkown
page read and write
352000
heap
page read and write
6750000
unkown
page read and write
8DF000
stack
page read and write
13BE000
unkown
page readonly
BD000
stack
page read and write
47B000
heap
page read and write
830000
unkown
page readonly
39B0000
unkown
page read and write
27F000
stack
page read and write
2CA5000
unkown
page read and write
1A660000
direct allocation
page read and write
2910000
unkown
page readonly
2ADF000
stack
page read and write
6FC4000
heap
page read and write
1A654000
direct allocation
page read and write
7409000
stack
page read and write
1F87000
trusted library allocation
page execute and read and write
8611000
unkown
page read and write
2F1B000
stack
page read and write
506000
unkown
page read and write
3A70000
unkown
page read and write
4484000
unkown
page read and write
84D2000
unkown
page read and write
401000
unkown
page execute read
7549000
heap
page read and write
7DCA000
stack
page read and write
860B000
unkown
page read and write
851A000
unkown
page read and write
8691000
unkown
page read and write
44C3000
unkown
page read and write
1A651000
direct allocation
page read and write
2C21000
unkown
page read and write
4220000
unkown
page readonly
13B1000
unkown
page execute read
696000
heap
page read and write
8805000
unkown
page read and write
26F0000
unkown
page read and write
2FCE000
heap
page read and write
7567000
heap
page read and write
13C3000
unkown
page write copy
448C000
unkown
page read and write
407C000
unkown
page read and write
6CE000
heap
page read and write
2BF000
unkown
page read and write
885F000
unkown
page read and write
440D000
unkown
page read and write
44D0000
unkown
page readonly
B520000
unkown
page read and write
4140000
unkown
page read and write
8582000
unkown
page read and write
8675000
unkown
page read and write
ADD0000
unkown
page read and write
AF9F000
stack
page read and write
860E000
unkown
page read and write
12DD000
direct allocation
page read and write
2E0000
trusted library allocation
page read and write
2C0000
unkown
page read and write
28B0000
unkown
page readonly
851A000
unkown
page read and write
4F60000
heap
page read and write
2B20000
unkown
page read and write
13B1000
unkown
page execute read
8558000
unkown
page read and write
401000
unkown
page execute read
B3E0000
unkown
page read and write
2CB3000
unkown
page read and write
8664000
unkown
page read and write
60000
unkown
page readonly
1D00000
trusted library allocation
page read and write
766B000
stack
page read and write
4110000
unkown
page read and write
4464000
unkown
page read and write
9D80000
trusted library allocation
page read and write
D80000
unclassified section
page execute and read and write
4120000
unkown
page read and write
247000
heap
page read and write
7E40000
heap
page read and write
10000
heap
page read and write
6C8000
heap
page read and write
82C5000
unkown
page read and write
25F0000
unkown
page readonly
220000
unkown
page read and write
2CB9000
unkown
page read and write
12DD000
direct allocation
page read and write
C00000
heap
page read and write
4180000
unkown
page read and write
B780000
heap
page read and write
39D0000
unkown
page read and write
886D000
unkown
page read and write
13C7000
unkown
page readonly
82FD000
unkown
page read and write
8B000
stack
page read and write
4140000
unkown
page read and write
3AF0000
unkown
page read and write
1B0000
unkown
page read and write
244000
heap
page read and write
440D000
unkown
page read and write
88FA000
unkown
page read and write
72C0000
heap
page read and write
85FA000
unkown
page read and write
5FE000
stack
page read and write
560000
trusted library allocation
page read and write
2898000
stack
page read and write
19F000
stack
page read and write
5030000
heap
page read and write
88F7000
unkown
page read and write
2600000
unkown
page readonly
88C0000
unkown
page read and write
1DE0000
trusted library allocation
page read and write
78D8000
stack
page read and write
85FD000
unkown
page read and write
4550000
unkown
page readonly
6C0000
heap
page read and write
3FB7000
stack
page read and write
8605000
unkown
page read and write
87E3000
unkown
page read and write
13B0000
unkown
page readonly
7B4000
trusted library allocation
page read and write
2CA8000
unkown
page read and write
7083000
heap
page read and write
4620000
unkown
page read and write
2FB0000
unkown
page read and write
2CA0000
unkown
page read and write
41D0000
unkown
page readonly
25F0000
unkown
page readonly
42E000
unkown
page read and write
2CF000
unkown
page read and write
7060000
heap
page read and write
7DC8000
stack
page read and write
2F0F000
stack
page read and write
71A0000
heap
page read and write
244000
heap
page read and write
8691000
unkown
page read and write
820000
trusted library allocation
page read and write
44E0000
unkown
page read and write
85FA000
unkown
page read and write
9DC4000
trusted library allocation
page read and write
8867000
unkown
page read and write
1DF4000
trusted library allocation
page read and write
288D000
stack
page read and write
13C3000
unkown
page write copy
401000
unkown
page execute read
7B7000
trusted library allocation
page read and write
28C0000
unkown
page read and write
4EED000
stack
page read and write
6750000
unkown
page read and write
7409000
stack
page read and write
13B0000
unkown
page readonly
7549000
heap
page read and write
42D0000
unkown
page read and write
850D000
unkown
page read and write
13C7000
unkown
page readonly
13BE000
unkown
page readonly
240000
heap
page read and write
13B1000
unkown
page execute read
4110000
unkown
page read and write
39E0000
heap
page read and write
4F60000
heap
page read and write
100000
unkown
page read and write
4484000
unkown
page read and write
2CA5000
unkown
page read and write
82C5000
unkown
page read and write
6DDE000
stack
page read and write
41A8000
unkown
page read and write
2AF000
unkown
page read and write
A4F000
stack
page read and write
9EB0000
heap
page read and write
87F1000
unkown
page read and write
2AF000
unkown
page read and write
2CA2000
unkown
page read and write
36CF000
stack
page read and write
2A3F000
stack
page read and write
4510000
unkown
page execute and read and write
39000
unclassified section
page execute and read and write
6DDE000
stack
page read and write
441F000
unkown
page read and write
2E0000
trusted library allocation
page read and write
4530000
unkown
page readonly
4325000
unkown
page read and write
87BB000
unkown
page read and write
4040000
unkown
page readonly
82D5000
unkown
page read and write
87FF000
unkown
page read and write
2F9E000
stack
page read and write
4D5E000
stack
page read and write
734000
heap
page read and write
8605000
unkown
page read and write
1A651000
direct allocation
page read and write
1D20000
unkown
page read and write
2B68000
heap
page read and write
7B9000
unkown
page readonly
2CA5000
unkown
page read and write
13B1000
unkown
page execute read
10000
heap
page read and write
35D000
heap
page read and write
841B000
unkown
page read and write
AC4000
trusted library allocation
page execute and read and write
2C21000
unkown
page read and write
2FC9000
heap
page read and write
28A0000
unkown
page read and write
13BE000
unkown
page readonly
850000
trusted library allocation
page execute and read and write
10000
heap
page read and write
7EC0000
unkown
page read and write
6C1000
heap
page read and write
71A0000
heap
page read and write
13BE000
unkown
page readonly
4188000
unkown
page read and write
879E000
unkown
page read and write
60000
unkown
page readonly
4620000
unkown
page read and write
13B1000
unkown
page execute read
3FAF000
stack
page read and write
41A8000
unkown
page read and write
13B0000
unkown
page readonly
13C7000
unkown
page readonly
39B0000
unkown
page read and write
4510000
unkown
page execute and read and write
4040000
unkown
page readonly
2D60000
heap
page read and write
12DA000
direct allocation
page read and write
1A651000
direct allocation
page read and write
13B1000
unkown
page execute read
B3E0000
unkown
page read and write
8805000
unkown
page read and write
1F0F000
stack
page read and write
414F000
stack
page read and write
8506000
unkown
page read and write
2E0000
unkown
page readonly
3FD000
heap
page read and write
44D0000
unkown
page readonly
87E7000
unkown
page read and write
510000
unkown
page readonly
B464000
unkown
page read and write
27F0000
unkown
page read and write
449F000
unkown
page read and write
886F000
unkown
page read and write
2FCE000
heap
page read and write
9F20000
heap
page read and write
2CF000
unkown
page read and write
13C7000
unkown
page readonly
8582000
unkown
page read and write
44B8000
unkown
page read and write
B785000
heap
page read and write
B8E4000
unkown
page execute and read and write
2BF000
unkown
page read and write
40C000
unkown
page read and write
1A657000
direct allocation
page read and write
82D5000
unkown
page read and write
88FD000
unkown
page read and write
30000
trusted library allocation
page read and write
A46D000
stack
page read and write
2CAB000
unkown
page read and write
3B00000
unkown
page read and write
12DD000
direct allocation
page read and write
4325000
unkown
page read and write
44C3000
unkown
page read and write
7D48000
stack
page read and write
6C79000
stack
page read and write
5C4000
trusted library section
page readonly
2600000
unkown
page readonly
B4E3000
unkown
page read and write
3A60000
unkown
page read and write
4D5E000
stack
page read and write
6FE3000
heap
page read and write
506000
unkown
page read and write
8807000
unkown
page read and write
82FD000
unkown
page read and write
4150000
unkown
page read and write
13B1000
unkown
page execute read
3FB5000
stack
page read and write
10000
heap
page read and write
88C0000
unkown
page read and write
3B10000
unkown
page readonly
2898000
stack
page read and write
2C0000
unkown
page read and write
2F1B000
stack
page read and write
3FC0000
unkown
page read and write
2FC9000
heap
page read and write
84C0000
unkown
page read and write
1C0000
heap
page read and write
20000
unkown
page readonly
2CA8000
unkown
page read and write
6DDE000
stack
page read and write
8664000
unkown
page read and write
614000
heap
page read and write
83E2000
unkown
page read and write
448C000
unkown
page read and write
323000
heap
page read and write
2F9E000
stack
page read and write
8861000
unkown
page read and write
4550000
unkown
page readonly
780000
trusted library allocation
page execute and read and write
44F0000
unkown
page readonly
766B000
stack
page read and write
44B6000
unkown
page read and write
2C40000
trusted library allocation
page read and write
3FB5000
stack
page read and write
2F1B000
stack
page read and write
8844000
unkown
page read and write
4457000
unkown
page read and write
30D000
stack
page read and write
470000
heap
page read and write
2D0000
unkown
page readonly
434F000
unkown
page read and write
13C7000
unkown
page readonly
2CBF000
unkown
page read and write
8600000
unkown
page read and write
4510000
unkown
page execute and read and write
B785000
heap
page read and write
8861000
unkown
page read and write
79F0000
heap
page read and write
41C0000
unkown
page readonly
2FC0000
heap
page read and write
1DD0000
unkown
page readonly
35D000
heap
page read and write
4520000
unkown
page readonly
13B1000
unkown
page execute read
3FB7000
stack
page read and write
7060000
heap
page read and write
8669000
unkown
page read and write
7BE0000
heap
page read and write
256000
unkown
page read and write
1D50000
heap
page read and write
6450000
unkown
page readonly
C06000
heap
page read and write
13B0000
unkown
page readonly
78D8000
stack
page read and write
3FB5000
stack
page read and write
40A000
unkown
page write copy
5C0000
heap
page read and write
2BFE000
stack
page read and write
13B1000
unkown
page execute read
3A70000
unkown
page read and write
677000
heap
page read and write
434F000
unkown
page read and write
AC1000
trusted library allocation
page execute and read and write
2CAB000
unkown
page read and write
4140000
unkown
page read and write
4385000
unkown
page read and write
2CB6000
unkown
page read and write
13BE000
unkown
page readonly
3B10000
unkown
page readonly
1B0000
unkown
page read and write
2B0000
unkown
page read and write
4BBF000
stack
page read and write
26C6000
unkown
page read and write
4338000
unkown
page read and write
2CB3000
unkown
page read and write
1F90000
trusted library allocation
page execute and read and write
8858000
unkown
page read and write
4110000
unkown
page read and write
2CA0000
unkown
page read and write
841B000
unkown
page read and write
85AC000
unkown
page read and write
27F0000
unkown
page read and write
950000
trusted library allocation
page execute and read and write
111F000
stack
page read and write
686000
heap
page read and write
2CA2000
unkown
page read and write
4338000
unkown
page read and write
100000
unkown
page read and write
3CF7000
unkown
page readonly
4302000
unkown
page read and write
25F2000
heap
page read and write
2910000
unkown
page readonly
7400000
stack
page read and write
88F7000
unkown
page read and write
335000
heap
page read and write
1A657000
direct allocation
page read and write
28F0000
unkown
page read and write
44B6000
unkown
page read and write
2BFE000
stack
page read and write
87E7000
unkown
page read and write
841F000
unkown
page read and write
3FAF000
stack
page read and write
8602000
unkown
page read and write
39E0000
heap
page read and write
87FC000
unkown
page read and write
830000
unkown
page readonly
856A000
unkown
page read and write
8691000
unkown
page read and write
785E000
stack
page read and write
6F3F000
stack
page read and write
340000
heap
page read and write
8820000
unkown
page read and write
There are 1513 hidden memdumps, click here to show them.