IOC Report
OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps201510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\WSP\wsp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\WSP\wsp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Links\Amchqbev.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\39044.cmd
Unicode text, UTF-8 text, with very long lines (577), with CRLF line terminators
dropped
C:\ProgramData\4396.cmd
Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\ProgramData\neo.cmd
Unicode text, UTF-8 text, with very long lines (372), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv887F.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x450741fe, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\nlot
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Links\Amchqbev.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Links\\Amchqbev.PIF">), ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr.exe
"C:\Users\user\Desktop\OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\4396.cmd""
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\39044.cmd""
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nlot"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\potmybq"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\aiywytavve"
malicious
C:\Users\user\Links\Amchqbev.PIF
"C:\Users\user\Links\Amchqbev.PIF"
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\Users\user\Links\Amchqbev.PIF
"C:\Users\user\Links\Amchqbev.PIF"
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
180.178
malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DesusertionEndpoint=P
unknown
https://www.office.com/
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/(
unknown
http://geoplugin.net/json.gpl
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
http://geoplugin.net/json.gpr
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
https://edd27623571fc427dc1f8d6ba04dd39f.clo.footprintdns.com/apc/trans.gif?b37f6b94dfddf29d58d90046
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://o.pki.goog/we20%
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5b&
unknown
https://rum18.perf.linkedin.com/apc/trans.gif?d99a5c14daed171e4daf3a2c1226bd16
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://rum18.perf.linkedin.com/apc/trans.gif?481b7caa9fdb7105b2103a8300811877
unknown
http://geoplugin.net/json.gp0oP(e
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://i.pki.goog/gsr1.crt0-
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://c.pki.goog/r/r4.crl0
unknown
http://geoplugin.net/json.gpF(s
unknown
http://i.pki.goog/r4.crt0
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
http://geoplugin.net/json.gpA(v
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://www.pmail.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5c&
unknown
http://www.ebuddy.com
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Amchqbev
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
wsp-KG6IRP
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
wsp-KG6IRP
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
exepath
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
licence
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
time
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
UID

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3F20E000
heap
page read and write
malicious
87D000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
22A0000
direct allocation
page read and write
malicious
947000
heap
page read and write
malicious
3F6D3000
heap
page read and write
malicious
69E000
heap
page read and write
malicious
7E6A0000
direct allocation
page read and write
malicious
3EF9B000
heap
page read and write
malicious
3F5C2000
heap
page read and write
malicious
6E7000
heap
page read and write
malicious
21018000
direct allocation
page readonly
malicious
7FBC0000
direct allocation
page read and write
malicious
9F5000
heap
page read and write
malicious
3F200000
unclassified section
page execute and read and write
malicious
21929000
direct allocation
page readonly
malicious
20ED8000
direct allocation
page readonly
malicious
79B000
heap
page read and write
malicious
3EFC2000
heap
page read and write
malicious
93C000
heap
page read and write
malicious
3F38C000
heap
page read and write
malicious
2300000
direct allocation
page read and write
malicious
7BF000
heap
page read and write
4B08000
heap
page read and write
947000
heap
page read and write
CE0000
unkown
page readonly
3EC90000
heap
page read and write
301E000
heap
page read and write
5C0000
heap
page read and write
4660000
heap
page read and write
7BF000
heap
page read and write
7EE13000
direct allocation
page read and write
7FE43000
direct allocation
page read and write
3EF21000
heap
page read and write
7AD000
heap
page read and write
6A0000
heap
page read and write
20814000
direct allocation
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
B5E000
stack
page read and write
29B7000
direct allocation
page read and write
20D0F000
stack
page read and write
235A000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
D0E000
unkown
page write copy
7AD000
heap
page read and write
48D000
unkown
page read and write
29BC000
direct allocation
page read and write
4841000
heap
page read and write
4DA4000
heap
page read and write
7BF000
heap
page read and write
423E000
heap
page read and write
708000
heap
page read and write
2B85000
direct allocation
page execute and read and write
793000
heap
page read and write
4840000
heap
page read and write
793000
heap
page read and write
D2E000
unkown
page readonly
2139C000
stack
page read and write
3060000
heap
page read and write
7AD000
heap
page read and write
2DCE000
stack
page read and write
716000
heap
page read and write
6A0000
heap
page read and write
830000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
233D000
direct allocation
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
CE0000
unkown
page readonly
7BF000
heap
page read and write
7E850000
direct allocation
page read and write
793000
heap
page read and write
7FC10000
direct allocation
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
20C1E000
stack
page read and write
301E000
heap
page read and write
2085B000
stack
page read and write
20758000
direct allocation
page read and write
7AD000
heap
page read and write
9ED000
heap
page read and write
7BF000
heap
page read and write
5C0000
heap
page read and write
7B0000
heap
page read and write
76F000
unkown
page read and write
9B000
stack
page read and write
239D000
direct allocation
page read and write
7BF000
heap
page read and write
1EB000
stack
page read and write
7BF000
heap
page read and write
5D6000
heap
page read and write
301E000
heap
page read and write
300D000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
29C5000
direct allocation
page execute and read and write
B4C000
stack
page read and write
301E000
heap
page read and write
6E0000
heap
page read and write
7BF000
heap
page read and write
7EEC5000
direct allocation
page read and write
7AD000
heap
page read and write
7BE000
heap
page read and write
301E000
heap
page read and write
243D000
direct allocation
page read and write
486F000
heap
page read and write
483C000
heap
page read and write
292F000
direct allocation
page read and write
7BF000
heap
page read and write
194000
heap
page read and write
794000
heap
page read and write
7BF000
heap
page read and write
BEE000
stack
page read and write
7BF000
heap
page read and write
153000
stack
page read and write
7FA00000
direct allocation
page read and write
207FE000
direct allocation
page read and write
3F38C000
heap
page read and write
300D000
heap
page read and write
8F0000
heap
page read and write
20E94000
direct allocation
page execute read
19D000
stack
page read and write
195000
heap
page read and write
3EFD4000
heap
page read and write
1F0000
heap
page read and write
76E000
heap
page read and write
7BF000
heap
page read and write
3153000
heap
page read and write
7AD000
heap
page read and write
2401000
direct allocation
page read and write
D2A000
unkown
page readonly
7FE3B000
direct allocation
page read and write
793000
heap
page read and write
7FD70000
direct allocation
page read and write
8FE000
heap
page read and write
C00000
heap
page readonly
20A7F000
stack
page read and write
7BF000
heap
page read and write
1E0000
heap
page read and write
22F3000
heap
page read and write
9EE000
heap
page read and write
7EF50000
direct allocation
page read and write
7BF000
heap
page read and write
7BE000
heap
page read and write
7BF000
heap
page read and write
7F07C000
direct allocation
page read and write
793000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
3ECDE000
stack
page read and write
793000
heap
page read and write
838000
heap
page read and write
CE1000
unkown
page execute read
2356000
heap
page read and write
291C000
direct allocation
page read and write
793000
heap
page read and write
C9E000
stack
page read and write
2D54000
heap
page read and write
301E000
heap
page read and write
251F000
stack
page read and write
2200000
direct allocation
page read and write
21056000
heap
page read and write
7EF2F000
direct allocation
page read and write
482F000
heap
page read and write
487A000
heap
page read and write
7E6A0000
direct allocation
page read and write
7BE000
heap
page read and write
7BF000
heap
page read and write
2EF0000
heap
page read and write
20FD4000
direct allocation
page execute read
21C0000
heap
page read and write
7AD000
heap
page read and write
7ED20000
direct allocation
page read and write
20741000
direct allocation
page read and write
426E000
heap
page read and write
7BF000
heap
page read and write
71E000
stack
page read and write
2845000
direct allocation
page read and write
3100000
heap
page read and write
5DB000
heap
page read and write
7FA00000
direct allocation
page read and write
723000
heap
page read and write
344F000
stack
page read and write
207EF000
stack
page read and write
2410000
heap
page read and write
195000
heap
page read and write
793000
heap
page read and write
944000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
218D0000
direct allocation
page readonly
85F000
stack
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7DF000
stack
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
2B7C000
direct allocation
page read and write
7BF000
heap
page read and write
482B000
heap
page read and write
4821000
heap
page read and write
7BF000
heap
page read and write
2090D000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
22AC000
direct allocation
page read and write
793000
heap
page read and write
3F281000
direct allocation
page execute and read and write
474000
system
page execute and read and write
7BF000
heap
page read and write
20BCF000
stack
page read and write
793000
heap
page read and write
7EE5F000
direct allocation
page read and write
8F0000
heap
page read and write
29B7000
direct allocation
page read and write
7BF000
heap
page read and write
3EF9A000
heap
page read and write
710000
heap
page read and write
21948000
direct allocation
page readonly
7AD000
heap
page read and write
194000
heap
page read and write
4250000
heap
page read and write
7FD40000
direct allocation
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
4853000
heap
page read and write
7EB30000
direct allocation
page read and write
7AD000
heap
page read and write
248E000
stack
page read and write
7EE8F000
direct allocation
page read and write
D2A000
unkown
page readonly
2927000
direct allocation
page read and write
4846000
heap
page read and write
3F630000
unclassified section
page execute and read and write
42B2000
heap
page read and write
7EC80000
direct allocation
page read and write
301E000
heap
page read and write
21009000
direct allocation
page readonly
793000
heap
page read and write
483D000
heap
page read and write
2D50000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
4846000
heap
page read and write
301E000
heap
page read and write
22CF000
stack
page read and write
D2E000
unkown
page readonly
7BF000
heap
page read and write
7BF000
heap
page read and write
48A000
unkown
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
247C000
direct allocation
page read and write
301E000
heap
page read and write
20E97000
direct allocation
page execute read
195000
heap
page read and write
75F000
stack
page read and write
4841000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
6E0000
heap
page read and write
7BF000
heap
page read and write
4F41000
heap
page read and write
550000
heap
page read and write
20715000
direct allocation
page read and write
9EC000
heap
page read and write
7BF000
heap
page read and write
70E000
heap
page read and write
2EDE000
unkown
page read and write
21022000
direct allocation
page read and write
7BF000
heap
page read and write
48C000
unkown
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
3EFF7000
heap
page read and write
4850000
heap
page read and write
796000
heap
page read and write
20FB0000
heap
page read and write
7AD000
heap
page read and write
4230000
heap
page read and write
4829000
heap
page read and write
20C0E000
stack
page read and write
5D0000
heap
page read and write
3250000
heap
page read and write
301E000
heap
page read and write
2344000
direct allocation
page read and write
72A000
heap
page read and write
91E000
heap
page read and write
301E000
heap
page read and write
793000
heap
page read and write
7AD000
heap
page read and write
1E9000
stack
page read and write
7BF000
heap
page read and write
2233000
direct allocation
page read and write
7BF000
heap
page read and write
2096E000
direct allocation
page read and write
AA0000
direct allocation
page read and write
640000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
3C0000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
5A0000
heap
page read and write
301E000
heap
page read and write
301E000
heap
page read and write
301E000
heap
page read and write
3150000
heap
page read and write
2968000
direct allocation
page read and write
23DD000
direct allocation
page read and write
2071D000
direct allocation
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
5BA000
unkown
page readonly
301E000
heap
page read and write
4821000
heap
page read and write
794000
heap
page read and write
2073A000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
7AD000
heap
page read and write
20D6E000
stack
page read and write
232C000
stack
page read and write
7AD000
heap
page read and write
487000
unkown
page read and write
3D0000
heap
page read and write
195000
heap
page read and write
7AD000
heap
page read and write
22B0000
direct allocation
page execute and read and write
2FE0000
heap
page read and write
5D6000
heap
page read and write
513F000
stack
page read and write
4254000
heap
page read and write
71D000
heap
page read and write
793000
heap
page read and write
456000
system
page execute and read and write
4B6B000
heap
page read and write
29E1000
direct allocation
page execute read
180000
heap
page read and write
7EBF0000
direct allocation
page read and write
295A000
direct allocation
page read and write
194000
heap
page read and write
7AD000
heap
page read and write
2EEF000
stack
page read and write
7AD000
heap
page read and write
7A5000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
42B2000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
20D6E000
stack
page read and write
73A000
heap
page read and write
7BE000
heap
page read and write
7BF000
heap
page read and write
4836000
heap
page read and write
793000
heap
page read and write
4846000
heap
page read and write
2D54000
heap
page read and write
7BF000
heap
page read and write
20D6E000
stack
page read and write
76F000
heap
page read and write
20625000
direct allocation
page read and write
20A6F000
stack
page read and write
20984000
direct allocation
page read and write
60E000
stack
page read and write
7AD000
heap
page read and write
4853000
heap
page read and write
71F000
heap
page read and write
1D0000
heap
page read and write
21942000
direct allocation
page read and write
429D000
heap
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
484B000
heap
page read and write
2082A000
direct allocation
page read and write
71E000
stack
page read and write
7EE10000
direct allocation
page read and write
7BF000
heap
page read and write
2491000
direct allocation
page read and write
28DE000
direct allocation
page read and write
2924000
direct allocation
page read and write
11C000
stack
page read and write
301E000
heap
page read and write
793000
heap
page read and write
20EAE000
stack
page read and write
4829000
heap
page read and write
4251000
heap
page read and write
23B3000
direct allocation
page read and write
7AD000
heap
page read and write
656000
heap
page read and write
486F000
heap
page read and write
2149C000
stack
page read and write
3F64B000
unclassified section
page execute and read and write
7BE000
heap
page read and write
7BE000
heap
page read and write
400000
system
page execute and read and write
7BF000
heap
page read and write
45E000
system
page execute and read and write
257E000
stack
page read and write
20C1E000
stack
page read and write
22C8000
direct allocation
page read and write
483D000
heap
page read and write
7BE000
heap
page read and write
2368000
direct allocation
page read and write
4249000
heap
page read and write
7BF000
heap
page read and write
4A20000
trusted library allocation
page read and write
301E000
heap
page read and write
4853000
heap
page read and write
2690000
heap
page read and write
780000
heap
page read and write
7AD000
heap
page read and write
244C000
stack
page read and write
80E000
stack
page read and write
4A27000
heap
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
226D000
direct allocation
page read and write
2991000
direct allocation
page execute read
A8F000
stack
page read and write
7AD000
heap
page read and write
7B0000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
23A4000
direct allocation
page read and write
7BF000
heap
page read and write
910000
heap
page read and write
6CE000
heap
page read and write
7E6A0000
direct allocation
page read and write
7EE00000
direct allocation
page read and write
A3C000
stack
page read and write
7EC5F000
direct allocation
page read and write
7EC00000
direct allocation
page read and write
7E79F000
direct allocation
page read and write
72F000
heap
page read and write
7EBBF000
direct allocation
page read and write
7BF000
heap
page read and write
93A000
heap
page read and write
23AC000
direct allocation
page read and write
20EAE000
stack
page read and write
301E000
heap
page read and write
20F0000
heap
page read and write
25A0000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7E850000
direct allocation
page read and write
7EE8E000
direct allocation
page read and write
4821000
heap
page read and write
209A8000
direct allocation
page read and write
72B000
heap
page read and write
206EC000
stack
page read and write
493000
unkown
page readonly
190000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
19D000
stack
page read and write
7BE000
heap
page read and write
7EE5F000
direct allocation
page read and write
7BF000
heap
page read and write
9EE000
heap
page read and write
6E0000
heap
page read and write
7BE000
heap
page read and write
2B07000
direct allocation
page read and write
7ED70000
direct allocation
page read and write
9B000
stack
page read and write
423C000
heap
page read and write
20815000
direct allocation
page read and write
4841000
heap
page read and write
7E6A0000
direct allocation
page read and write
3EB50000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
4820000
heap
page read and write
7ED20000
direct allocation
page read and write
4836000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
4828000
heap
page read and write
7BF000
heap
page read and write
194000
heap
page read and write
2D54000
heap
page read and write
20906000
direct allocation
page read and write
20E6E000
stack
page read and write
7AD000
heap
page read and write
20751000
direct allocation
page read and write
223A000
direct allocation
page read and write
4840000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7E82F000
direct allocation
page read and write
7BF000
heap
page read and write
7FA00000
direct allocation
page read and write
2446000
heap
page read and write
4829000
heap
page read and write
7AD000
heap
page read and write
22BA000
direct allocation
page read and write
42B2000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
1E0000
heap
page readonly
2093F000
stack
page read and write
315C000
heap
page read and write
7EED0000
direct allocation
page read and write
486F000
heap
page read and write
485F000
heap
page read and write
7BF000
heap
page read and write
4241000
heap
page read and write
76F000
heap
page read and write
7BF000
heap
page read and write
4829000
heap
page read and write
301E000
heap
page read and write
70E000
heap
page read and write
5DB000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
221D000
direct allocation
page read and write
2470000
heap
page read and write
2920000
direct allocation
page read and write
7AD000
heap
page read and write
7FD1B000
direct allocation
page read and write
7BF000
heap
page read and write
4841000
heap
page read and write
7BF000
heap
page read and write
25A3000
heap
page read and write
20D1F000
stack
page read and write
2B0C000
direct allocation
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
22B3000
direct allocation
page read and write
5DB000
heap
page read and write
21025000
direct allocation
page read and write
73B000
heap
page read and write
23FA000
direct allocation
page read and write
7BF000
heap
page read and write
482B000
heap
page read and write
650000
heap
page read and write
2F70000
heap
page read and write
21025000
direct allocation
page read and write
23DE000
stack
page read and write
20A7F000
stack
page read and write
301E000
heap
page read and write
4835000
heap
page read and write
19D000
stack
page read and write
301E000
heap
page read and write
4A2C000
heap
page read and write
793000
heap
page read and write
20FDB000
direct allocation
page execute read
20BFE000
stack
page read and write
730000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
3F616000
unclassified section
page execute and read and write
207EB000
stack
page read and write
7BF000
heap
page read and write
1AD000
stack
page read and write
5C5000
heap
page read and write
211F2000
heap
page read and write
660000
heap
page read and write
B80000
heap
page read and write
7EE80000
direct allocation
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
21025000
direct allocation
page read and write
20AAE000
stack
page read and write
2FEB000
heap
page read and write
7BF000
heap
page read and write
42B2000
heap
page read and write
2FEF000
stack
page read and write
301E000
heap
page read and write
5F5000
heap
page read and write
4829000
heap
page read and write
5A9000
heap
page read and write
793000
heap
page read and write
3470000
heap
page read and write
7BF000
heap
page read and write
4220000
heap
page read and write
7AD000
heap
page read and write
724000
heap
page read and write
29C2000
direct allocation
page read and write
780000
heap
page read and write
7BF000
heap
page read and write
3EF9B000
heap
page read and write
3EF9A000
heap
page read and write
3353000
heap
page read and write
426D000
heap
page read and write
4829000
heap
page read and write
2961000
direct allocation
page read and write
20E6E000
stack
page read and write
3F280000
direct allocation
page read and write
780000
heap
page read and write
2440000
heap
page read and write
2D54000
heap
page read and write
793000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
4829000
heap
page read and write
870000
heap
page read and write
7ED10000
direct allocation
page read and write
2693000
heap
page read and write
4840000
heap
page read and write
20885000
direct allocation
page read and write
423C000
heap
page read and write
5BA000
heap
page read and write
7E200000
direct allocation
page read and write
7EE40000
direct allocation
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
482B000
heap
page read and write
2413000
heap
page read and write
7BF000
heap
page read and write
20D10000
heap
page read and write
3F274000
unclassified section
page execute and read and write
5DB000
heap
page read and write
3EFE2000
heap
page read and write
7C0000
heap
page read and write
7AD000
heap
page read and write
2968000
direct allocation
page read and write
932000
heap
page read and write
793000
heap
page read and write
763000
heap
page read and write
2490000
heap
page read and write
7BF000
heap
page read and write
23B2000
direct allocation
page read and write
2098E000
stack
page read and write
20ADE000
stack
page read and write
1CE000
unkown
page read and write
20806000
direct allocation
page read and write
7BF000
heap
page read and write
20FD7000
direct allocation
page execute read
11D000
stack
page read and write
7FE48000
direct allocation
page read and write
5C0000
heap
page read and write
194000
heap
page read and write
21554000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
7E6A0000
direct allocation
page read and write
7BF000
heap
page read and write
4830000
heap
page read and write
6DE000
stack
page read and write
713000
heap
page read and write
7BF000
heap
page read and write
2917000
direct allocation
page read and write
4836000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
3F61C000
unclassified section
page execute and read and write
2D54000
heap
page read and write
4FE000
stack
page read and write
23AD000
direct allocation
page read and write
2328000
direct allocation
page read and write
3EF1F000
stack
page read and write
4853000
heap
page read and write
7BE000
heap
page read and write
20635000
direct allocation
page read and write
793000
heap
page read and write
20976000
direct allocation
page read and write
72E000
stack
page read and write
78E000
heap
page read and write
301E000
heap
page read and write
20D6E000
stack
page read and write
2350000
heap
page read and write
793000
heap
page read and write
240C000
stack
page read and write
207EE000
stack
page execute and read and write
3F44F000
heap
page read and write
4844000
heap
page read and write
9A0000
heap
page read and write
69A000
heap
page read and write
89E000
stack
page read and write
2096E000
stack
page read and write
7BF000
heap
page read and write
3EFE2000
heap
page read and write
6DE000
stack
page read and write
7BF000
heap
page read and write
2936000
direct allocation
page read and write
4846000
heap
page read and write
7EE80000
direct allocation
page read and write
2D54000
heap
page read and write
793000
heap
page read and write
728000
heap
page read and write
248A000
direct allocation
page read and write
194000
heap
page read and write
20C1E000
stack
page read and write
2099A000
direct allocation
page read and write
7AD000
heap
page read and write
793000
heap
page read and write
C50000
heap
page read and write
301E000
heap
page read and write
2248000
direct allocation
page read and write
42B2000
heap
page read and write
5C0000
heap
page read and write
2474000
direct allocation
page read and write
194000
heap
page read and write
4821000
heap
page read and write
7BF000
heap
page read and write
24A0000
heap
page read and write
7BF000
heap
page read and write
7EDF9000
direct allocation
page read and write
7AD000
heap
page read and write
485F000
heap
page read and write
4B6C000
heap
page read and write
735000
heap
page read and write
194000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
4853000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BE000
heap
page read and write
23BA000
direct allocation
page read and write
3EF21000
heap
page read and write
4840000
heap
page read and write
75F000
heap
page read and write
6D0000
heap
page read and write
755000
heap
page read and write
9B000
stack
page read and write
325F000
stack
page read and write
A2F000
stack
page read and write
793000
heap
page read and write
209A1000
direct allocation
page read and write
487000
unkown
page read and write
7BF000
heap
page read and write
218D1000
direct allocation
page execute read
72A000
heap
page read and write
194000
heap
page read and write
2095F000
stack
page read and write
301E000
heap
page read and write
2990000
direct allocation
page readonly
320F000
stack
page read and write
940000
trusted library allocation
page read and write
7BF000
heap
page read and write
7EE10000
direct allocation
page read and write
194000
heap
page read and write
20D10000
heap
page read and write
793000
heap
page read and write
52D000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
4840000
heap
page read and write
42B2000
heap
page read and write
7BF000
heap
page read and write
9E0000
heap
page read and write
21ED000
direct allocation
page read and write
2356000
heap
page read and write
7AD000
heap
page read and write
3F5C0000
unclassified section
page execute and read and write
2925000
direct allocation
page execute and read and write
4839000
heap
page read and write
4255000
heap
page read and write
9D8000
heap
page read and write
530000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
830000
heap
page read and write
20FDF000
direct allocation
page execute read
426A000
heap
page read and write
234C000
direct allocation
page read and write
71D000
heap
page read and write
4255000
heap
page read and write
4846000
heap
page read and write
7BF000
heap
page read and write
3EF9A000
heap
page read and write
7EE3F000
direct allocation
page read and write
2372000
direct allocation
page read and write
2AE1000
direct allocation
page execute read
2401000
direct allocation
page read and write
42B2000
heap
page read and write
790000
direct allocation
page execute and read and write
4261000
heap
page read and write
4828000
heap
page read and write
76A000
heap
page read and write
2097E000
stack
page read and write
24C6000
heap
page read and write
20FE1000
direct allocation
page execute read
4846000
heap
page read and write
301E000
heap
page read and write
2084B000
stack
page read and write
20BDF000
stack
page read and write
20FD1000
direct allocation
page execute read
73A000
heap
page read and write
6EE000
stack
page read and write
9B000
stack
page read and write
24A3000
heap
page read and write
4255000
heap
page read and write
7BF000
heap
page read and write
2094F000
stack
page read and write
7EEC0000
direct allocation
page read and write
D0E000
unkown
page write copy
301E000
heap
page read and write
793000
heap
page read and write
4846000
heap
page read and write
7BF000
heap
page read and write
690000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
4250000
heap
page read and write
71F000
heap
page read and write
CE0000
unkown
page readonly
740000
heap
page read and write
20C1E000
stack
page read and write
7BF000
heap
page read and write
482B000
heap
page read and write
7F090000
direct allocation
page read and write
7AD000
heap
page read and write
7AD000
heap
page read and write
4C8C000
heap
page read and write
7BF000
heap
page read and write
7E7A8000
direct allocation
page read and write
7F081000
direct allocation
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
9B000
stack
page read and write
5C0000
heap
page read and write
7BF000
heap
page read and write
76F000
heap
page read and write
7EE5F000
direct allocation
page read and write
72A000
heap
page read and write
28FA000
direct allocation
page read and write
4846000
heap
page read and write
7E6A0000
direct allocation
page read and write
48C000
unkown
page read and write
293D000
direct allocation
page read and write
22F0000
heap
page read and write
3F335000
heap
page read and write
24C3000
heap
page read and write
71D000
heap
page read and write
7E56C000
direct allocation
page read and write
7ED4F000
direct allocation
page read and write
CE0000
unkown
page readonly
7BF000
heap
page read and write
7EBC4000
direct allocation
page read and write
7BF000
heap
page read and write
4841000
heap
page read and write
483D000
heap
page read and write
7BE000
heap
page read and write
20FAF000
stack
page read and write
7BF000
heap
page read and write
20D1F000
stack
page read and write
7BF000
heap
page read and write
3F25E000
unclassified section
page execute and read and write
301E000
heap
page read and write
4853000
heap
page read and write
7FA00000
direct allocation
page read and write
195000
heap
page read and write
7E718000
direct allocation
page read and write
206C5000
direct allocation
page read and write
4250000
heap
page read and write
301E000
heap
page read and write
20E91000
direct allocation
page execute read
301E000
heap
page read and write
4836000
heap
page read and write
3EF21000
heap
page read and write
91C000
stack
page read and write
7EE60000
direct allocation
page read and write
2A4B000
stack
page read and write
301E000
heap
page read and write
2944000
direct allocation
page read and write
9FD000
stack
page read and write
5C5000
heap
page read and write
301E000
heap
page read and write
4721000
heap
page read and write
2353000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
4846000
heap
page read and write
7FC08000
direct allocation
page read and write
20E6E000
stack
page read and write
2961000
direct allocation
page read and write
244C000
stack
page read and write
4831000
heap
page read and write
7FA00000
direct allocation
page read and write
207CA000
direct allocation
page read and write
4251000
heap
page read and write
29DB000
stack
page read and write
7BF000
heap
page read and write
20A9F000
stack
page read and write
301E000
heap
page read and write
71D000
heap
page read and write
7BF000
heap
page read and write
20FAF000
stack
page read and write
42B2000
heap
page read and write
7B3000
heap
page read and write
7BF000
heap
page read and write
7B5000
heap
page read and write
484B000
heap
page read and write
194000
heap
page read and write
301E000
heap
page read and write
4258000
heap
page read and write
20EA1000
direct allocation
page execute read
7ED20000
direct allocation
page read and write
208FE000
direct allocation
page read and write
7BF000
heap
page read and write
5BA000
heap
page read and write
793000
heap
page read and write
7FD30000
direct allocation
page read and write
20831000
direct allocation
page read and write
D2A000
unkown
page readonly
42B2000
heap
page read and write
AEF000
stack
page read and write
41B000
system
page execute and read and write
487000
unkown
page read and write
32DF000
stack
page read and write
793000
heap
page read and write
194000
heap
page read and write
2101D000
direct allocation
page readonly
20724000
direct allocation
page read and write
3EFF7000
heap
page read and write
23F3000
direct allocation
page read and write
5C5000
heap
page read and write
7BF000
heap
page read and write
20914000
direct allocation
page read and write
7BF000
heap
page read and write
7ECBF000
direct allocation
page read and write
7EFA5000
direct allocation
page read and write
4244000
heap
page read and write
239E000
stack
page read and write
B8A000
stack
page read and write
20E9B000
direct allocation
page execute read
7BF000
heap
page read and write
20726000
direct allocation
page read and write
20838000
direct allocation
page read and write
23C8000
direct allocation
page read and write
4721000
heap
page read and write
726000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
8A0000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
76C000
heap
page read and write
7AD000
heap
page read and write
21022000
direct allocation
page read and write
2EE0000
heap
page read and write
7BF000
heap
page read and write
7E730000
direct allocation
page read and write
35D000
stack
page read and write
7EFC0000
direct allocation
page read and write
7BF000
heap
page read and write
792000
heap
page read and write
7BF000
heap
page read and write
21336000
heap
page read and write
7BF000
heap
page read and write
BF0000
heap
page read and write
7BF000
heap
page read and write
CE1000
unkown
page execute read
4840000
heap
page read and write
7EE40000
direct allocation
page read and write
211F0000
heap
page read and write
D2E000
unkown
page readonly
2093F000
stack
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
880000
heap
page read and write
7BF000
heap
page read and write
9ED000
heap
page read and write
7BF000
heap
page read and write
23FA000
direct allocation
page read and write
4283000
heap
page read and write
7BF000
heap
page read and write
400000
unkown
page readonly
7BF000
heap
page read and write
2498000
direct allocation
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
293D000
direct allocation
page read and write
301E000
heap
page read and write
19D000
stack
page read and write
2CF8000
heap
page read and write
20938000
direct allocation
page read and write
78B000
heap
page read and write
7C0000
heap
page read and write
19D000
stack
page read and write
2160000
direct allocation
page execute and read and write
195000
heap
page read and write
23DD000
direct allocation
page read and write
20734000
direct allocation
page read and write
2921000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
208CA000
direct allocation
page read and write
794000
heap
page read and write
7BF000
heap
page read and write
63E000
stack
page read and write
2D54000
heap
page read and write
4C8D000
heap
page read and write
4853000
heap
page read and write
2408000
direct allocation
page read and write
4DAE000
heap
page read and write
5C0000
heap
page read and write
3F2AD000
heap
page read and write
233F000
stack
page read and write
2D54000
heap
page read and write
4241000
heap
page read and write
7BF000
heap
page read and write
707000
heap
page read and write
194000
heap
page read and write
7BF000
heap
page read and write
4A20000
trusted library allocation
page read and write
728000
heap
page read and write
7AD000
heap
page read and write
4A20000
trusted library allocation
page read and write
726000
heap
page read and write
466E000
heap
page read and write
793000
heap
page read and write
7AD000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
7F840000
direct allocation
page read and write
793000
heap
page read and write
750000
heap
page read and write
48C000
unkown
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
9B000
stack
page read and write
24A0000
direct allocation
page execute and read and write
7AD000
heap
page read and write
4853000
heap
page read and write
4853000
heap
page read and write
4A20000
trusted library allocation
page read and write
2070C000
direct allocation
page read and write
194000
heap
page read and write
7E571000
direct allocation
page read and write
7BF000
heap
page read and write
D0E000
unkown
page read and write
7AD000
heap
page read and write
4BE000
stack
page read and write
2154B000
heap
page read and write
3F6D2000
heap
page read and write
728000
heap
page read and write
793000
heap
page read and write
301E000
heap
page read and write
CE1000
unkown
page execute read
7BF000
heap
page read and write
21022000
direct allocation
page read and write
325A000
heap
page read and write
7AD000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
228E000
stack
page read and write
4866000
heap
page read and write
487000
unkown
page read and write
7ED20000
direct allocation
page read and write
7BE000
heap
page read and write
7BF000
heap
page read and write
2935000
direct allocation
page execute and read and write
9ED000
heap
page read and write
3EC90000
heap
page read and write
3EFD7000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
4840000
heap
page read and write
7BF000
heap
page read and write
20BAF000
stack
page read and write
2083E000
stack
page read and write
4843000
heap
page read and write
794000
heap
page read and write
7BF000
heap
page read and write
7ED70000
direct allocation
page read and write
4FC000
stack
page read and write
1D0000
heap
page read and write
22C1000
direct allocation
page read and write
7AD000
heap
page read and write
21022000
direct allocation
page read and write
729000
heap
page read and write
98E000
stack
page read and write
6FF000
heap
page read and write
472B000
heap
page read and write
20E6E000
stack
page read and write
2290000
heap
page read and write
75E000
stack
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
23C1000
direct allocation
page read and write
C50000
heap
page read and write
7AD000
heap
page read and write
7BF000
heap
page read and write
3320000
heap
page read and write
4230000
heap
page read and write
7BF000
heap
page read and write
7FA00000
direct allocation
page read and write
770000
heap
page read and write
7AD000
heap
page read and write
292E000
direct allocation
page read and write
534000
heap
page read and write
7BF000
heap
page read and write
73F000
heap
page read and write
4261000
heap
page read and write
21565000
heap
page read and write
7BF000
heap
page read and write
D0E000
unkown
page read and write
4251000
heap
page read and write
301E000
heap
page read and write
20FB1000
heap
page read and write
8C0000
direct allocation
page execute and read and write
7BF000
heap
page read and write
7E730000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
20BBF000
stack
page read and write
268B000
stack
page read and write
20ABE000
stack
page read and write
20EE5000
direct allocation
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
48C000
unkown
page read and write
5C0000
heap
page read and write
7AD000
heap
page read and write
2D54000
heap
page read and write
2901000
direct allocation
page execute read
2B81000
direct allocation
page read and write
717000
heap
page read and write
9E6000
heap
page read and write
7BF000
heap
page read and write
7EDF0000
direct allocation
page read and write
728000
heap
page read and write
2B15000
direct allocation
page execute and read and write
6DE000
stack
page read and write
20EAE000
stack
page read and write
2280000
direct allocation
page read and write
3EFD2000
heap
page read and write
7EE00000
direct allocation
page read and write
7EDE0000
direct allocation
page read and write
3EFF8000
heap
page read and write
4842000
heap
page read and write
7BF000
heap
page read and write
48C000
unkown
page read and write
7BF000
heap
page read and write
7ED9F000
direct allocation
page read and write
8AE000
stack
page read and write
930000
heap
page read and write
7EE8E000
direct allocation
page read and write
71A000
heap
page read and write
8BF000
stack
page read and write
793000
heap
page read and write
301E000
heap
page read and write
206EC000
stack
page read and write
7BF000
heap
page read and write
21051000
heap
page read and write
9B000
stack
page read and write
23EC000
direct allocation
page read and write
7BF000
heap
page read and write
20FAF000
stack
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
3EFC9000
heap
page read and write
97E000
stack
page read and write
20AEE000
stack
page read and write
4826000
heap
page read and write
7BE000
heap
page read and write
450000
heap
page read and write
488000
unkown
page read and write
207E9000
stack
page read and write
7AD000
heap
page read and write
4250000
heap
page read and write
793000
heap
page read and write
484E000
heap
page read and write
7EE10000
direct allocation
page read and write
7BF000
heap
page read and write
487000
unkown
page write copy
2D54000
heap
page read and write
6FF000
heap
page read and write
2B11000
direct allocation
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
7EDF4000
direct allocation
page read and write
7FB00000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
790000
heap
page read and write
4821000
heap
page read and write
301E000
heap
page read and write
23C0000
direct allocation
page read and write
2071E000
direct allocation
page read and write
301E000
heap
page read and write
301E000
heap
page read and write
713000
heap
page read and write
7EDD0000
direct allocation
page read and write
3EC90000
heap
page read and write
21025000
direct allocation
page read and write
7AD000
heap
page read and write
423F000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
2097E000
stack
page read and write
4840000
heap
page read and write
7BF000
heap
page read and write
22A4000
direct allocation
page read and write
484F000
heap
page read and write
793000
heap
page read and write
301E000
heap
page read and write
4F50000
trusted library allocation
page read and write
48E000
unkown
page write copy
793000
heap
page read and write
7EE94000
direct allocation
page read and write
48A000
unkown
page read and write
3068000
heap
page read and write
300D000
heap
page read and write
2072D000
direct allocation
page read and write
CE1000
unkown
page execute read
20E71000
direct allocation
page execute read
2080D000
direct allocation
page read and write
646000
heap
page read and write
301E000
heap
page read and write
4853000
heap
page read and write
4846000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
483D000
heap
page read and write
7BF000
heap
page read and write
20D6E000
stack
page read and write
7AD000
heap
page read and write
7BE000
heap
page read and write
42B2000
heap
page read and write
2361000
direct allocation
page read and write
7ED20000
direct allocation
page read and write
315C000
heap
page read and write
7ECF0000
direct allocation
page read and write
7AD000
heap
page read and write
4834000
heap
page read and write
2D54000
heap
page read and write
2A07000
direct allocation
page read and write
7BF000
heap
page read and write
2B77000
direct allocation
page read and write
4846000
heap
page read and write
4241000
heap
page read and write
7A0000
heap
page read and write
20FAF000
stack
page read and write
7BF000
heap
page read and write
42B2000
heap
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
20A8F000
stack
page read and write
793000
heap
page read and write
890000
heap
page read and write
73B000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
13C000
stack
page read and write
335D000
heap
page read and write
61E000
stack
page read and write
CA0000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
C50000
heap
page read and write
7AD000
heap
page read and write
301E000
heap
page read and write
301E000
heap
page read and write
20ACE000
stack
page read and write
4261000
heap
page read and write
2D54000
heap
page read and write
793000
heap
page read and write
24C0000
heap
page read and write
7EEBE000
direct allocation
page read and write
793000
heap
page read and write
2A0C000
direct allocation
page read and write
5D0000
heap
page read and write
2106000
heap
page read and write
20EDD000
direct allocation
page readonly
4838000
heap
page read and write
20D1F000
stack
page read and write
292C000
direct allocation
page read and write
7BF000
heap
page read and write
7BE000
heap
page read and write
4836000
heap
page read and write
4833000
heap
page read and write
7AD000
heap
page read and write
300E000
heap
page read and write
716000
heap
page read and write
7EDF1000
direct allocation
page read and write
7BF000
heap
page read and write
D2E000
unkown
page readonly
7EEC0000
direct allocation
page read and write
20FB1000
direct allocation
page execute read
21177000
direct allocation
page read and write
7BF000
heap
page read and write
4853000
heap
page read and write
7BF000
heap
page read and write
860000
heap
page read and write
4241000
heap
page read and write
9EE000
heap
page read and write
7BF000
heap
page read and write
21F2000
direct allocation
page read and write
20748000
direct allocation
page read and write
6CA000
heap
page read and write
4A20000
trusted library allocation
page read and write
7ECE0000
direct allocation
page read and write
7F08C000
direct allocation
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
2B51000
direct allocation
page execute read
7BF000
heap
page read and write
3350000
heap
page read and write
71F000
heap
page read and write
70E000
heap
page read and write
2D54000
heap
page read and write
2F3E000
stack
page read and write
4840000
heap
page read and write
20E9F000
direct allocation
page execute read
7BF000
heap
page read and write
8DE000
stack
page read and write
4841000
heap
page read and write
48A000
unkown
page read and write
4F40000
heap
page read and write
7AD000
heap
page read and write
32E0000
heap
page read and write
7BF000
heap
page read and write
14F000
stack
page read and write
7BF000
heap
page read and write
482B000
heap
page read and write
7BF000
heap
page read and write
7ED20000
direct allocation
page read and write
767000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
71D000
heap
page read and write
2272000
direct allocation
page read and write
20BEF000
stack
page read and write
42B2000
heap
page read and write
4853000
heap
page read and write
793000
heap
page read and write
20EDA000
direct allocation
page readonly
4846000
heap
page read and write
5D6000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7AD000
heap
page read and write
793000
heap
page read and write
4241000
heap
page read and write
930000
heap
page read and write
229D000
direct allocation
page read and write
790000
direct allocation
page execute and read and write
195000
heap
page read and write
20C2E000
stack
page read and write
137000
stack
page read and write
680000
heap
page read and write
2093A000
direct allocation
page read and write
20D2F000
stack
page read and write
487000
unkown
page read and write
7BF000
heap
page read and write
711000
heap
page read and write
B2F000
stack
page read and write
719000
heap
page read and write
7BF000
heap
page read and write
5F0000
heap
page read and write
3EC90000
heap
page read and write
2483000
direct allocation
page read and write
9A8000
heap
page read and write
7BF000
heap
page read and write
2830000
direct allocation
page read and write
4844000
heap
page read and write
2100000
heap
page read and write
72C000
heap
page read and write
4840000
heap
page read and write
23FF000
stack
page read and write
2074A000
direct allocation
page read and write
793000
heap
page read and write
7BF000
heap
page read and write
3F670000
heap
page read and write
7BF000
heap
page read and write
20716000
direct allocation
page read and write
7BF000
heap
page read and write
510000
heap
page read and write
2140000
heap
page read and write
23E4000
direct allocation
page read and write
29C5000
direct allocation
page execute and read and write
423C000
heap
page read and write
7BF000
heap
page read and write
2350000
heap
page read and write
4255000
heap
page read and write
307F000
heap
page read and write
2092A000
direct allocation
page read and write
24C0000
heap
page read and write
724000
heap
page read and write
21945000
direct allocation
page read and write
48A000
unkown
page read and write
42B2000
heap
page read and write
7BF000
heap
page read and write
7EDAF000
direct allocation
page read and write
7BF000
heap
page read and write
23E4000
direct allocation
page read and write
4840000
heap
page read and write
3EF20000
heap
page read and write
45C000
system
page execute and read and write
7BF000
heap
page read and write
7D0000
direct allocation
page execute and read and write
2224000
direct allocation
page read and write
2D54000
heap
page read and write
2CF0000
heap
page read and write
7EF8F000
direct allocation
page read and write
4846000
heap
page read and write
4828000
heap
page read and write
2D0C000
heap
page read and write
20CFF000
stack
page read and write
2D54000
heap
page read and write
20707000
direct allocation
page read and write
20D1F000
stack
page read and write
4720000
heap
page read and write
838000
heap
page read and write
21025000
direct allocation
page read and write
2936000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
4250000
heap
page read and write
7BF000
heap
page read and write
20EE2000
direct allocation
page read and write
4250000
heap
page read and write
4843000
heap
page read and write
2097D000
direct allocation
page read and write
2DC0000
heap
page read and write
4250000
heap
page read and write
301E000
heap
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
21022000
heap
page read and write
70E000
heap
page read and write
23F3000
direct allocation
page read and write
866000
heap
page read and write
7EC20000
direct allocation
page read and write
2A15000
direct allocation
page execute and read and write
195000
heap
page read and write
3EC90000
heap
page read and write
7BE000
heap
page read and write
7AD000
heap
page read and write
71A000
heap
page read and write
7ED70000
direct allocation
page read and write
19D000
stack
page read and write
2092F000
stack
page read and write
20AAF000
stack
page read and write
483D000
heap
page read and write
76F000
heap
page read and write
7EE80000
direct allocation
page read and write
4829000
heap
page read and write
B60000
heap
page read and write
31DF000
unkown
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
20BBF000
stack
page read and write
7BF000
heap
page read and write
222C000
direct allocation
page read and write
D2A000
unkown
page readonly
48A000
unkown
page read and write
7E570000
direct allocation
page read and write
7AD000
heap
page read and write
7E7C0000
direct allocation
page read and write
7E8BF000
direct allocation
page read and write
AC0000
heap
page read and write
72E000
stack
page read and write
AD0000
heap
page readonly
7BF000
heap
page read and write
793000
heap
page read and write
793000
heap
page read and write
4F41000
heap
page read and write
6D5000
heap
page read and write
3F50D000
heap
page read and write
301E000
heap
page read and write
69E000
stack
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
4A80000
heap
page read and write
2450000
direct allocation
page read and write
20E6E000
stack
page read and write
301E000
heap
page read and write
2D54000
heap
page read and write
7E6A0000
direct allocation
page read and write
2892000
direct allocation
page read and write
CFD000
stack
page read and write
42B2000
heap
page read and write
7BF000
heap
page read and write
C4E000
stack
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
246D000
direct allocation
page read and write
7BF000
heap
page read and write
716000
heap
page read and write
7BF000
heap
page read and write
A7C000
stack
page read and write
2380000
direct allocation
page read and write
2B4F000
stack
page read and write
301E000
heap
page read and write
7EED0000
direct allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
B1E000
stack
page read and write
7BF000
heap
page read and write
4840000
heap
page read and write
2101A000
direct allocation
page readonly
301D000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
793000
heap
page read and write
300D000
heap
page read and write
206EA000
direct allocation
page read and write
793000
heap
page read and write
20931000
direct allocation
page read and write
20FAF000
stack
page read and write
6FD000
stack
page read and write
6DF000
stack
page read and write
794000
heap
page read and write
4840000
heap
page read and write
7BF000
heap
page read and write
20EAE000
stack
page read and write
793000
heap
page read and write
794000
heap
page read and write
8F8000
heap
page read and write
8FA000
heap
page read and write
7AD000
heap
page read and write
7AD000
heap
page read and write
2312000
direct allocation
page read and write
7BF000
heap
page read and write
76A000
heap
page read and write
7BE000
heap
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
7E7C0000
direct allocation
page read and write
4821000
heap
page read and write
4841000
heap
page read and write
6C0000
heap
page read and write
7BF000
heap
page read and write
940000
trusted library allocation
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
48A000
unkown
page read and write
7BF000
heap
page read and write
7BF000
heap
page read and write
400000
system
page execute and read and write
4A20000
trusted library allocation
page read and write
7BF000
heap
page read and write
2442000
direct allocation
page read and write
793000
heap
page read and write
3F296000
direct allocation
page execute and read and write
7BF000
heap
page read and write
20EAE000
stack
page read and write
B2F000
stack
page read and write
301E000
heap
page read and write
4721000
heap
page read and write
194000
heap
page read and write
7BF000
heap
page read and write
4853000
heap
page read and write
2863000
direct allocation
page read and write
7BF000
heap
page read and write
518000
heap
page read and write
81F000
stack
page read and write
19D000
stack
page read and write
7AD000
heap
page read and write
2D7E000
stack
page read and write
42B2000
heap
page read and write
925000
heap
page read and write
2931000
direct allocation
page read and write
21C6000
heap
page read and write
335D000
heap
page read and write
7BF000
heap
page read and write
2082E000
stack
page read and write
7BF000
heap
page read and write
3EE1E000
stack
page read and write
2320000
direct allocation
page read and write
295A000
direct allocation
page read and write
2953000
direct allocation
page read and write
7BF000
heap
page read and write
21022000
direct allocation
page read and write
7BF000
heap
page read and write
48A000
unkown
page read and write
59E000
stack
page read and write
867000
heap
page read and write
7BF000
heap
page read and write
2A11000
direct allocation
page read and write
2D54000
heap
page read and write
3EDDF000
stack
page read and write
483D000
heap
page read and write
4840000
heap
page read and write
7BF000
heap
page read and write
2099E000
stack
page read and write
AED000
stack
page read and write
7E3C0000
direct allocation
page read and write
20EC9000
direct allocation
page readonly
7BF000
heap
page read and write
487000
unkown
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
7ECAF000
direct allocation
page read and write
7BF000
heap
page read and write
301E000
heap
page read and write
2241000
direct allocation
page read and write
793000
heap
page read and write
301E000
heap
page read and write
2944000
direct allocation
page read and write
97F000
stack
page read and write
7AD000
heap
page read and write
7F16B000
direct allocation
page read and write
7BF000
heap
page read and write
4828000
heap
page read and write
20ABE000
stack
page read and write
301E000
heap
page read and write
301E000
heap
page read and write
194000
heap
page read and write
28F1000
direct allocation
page execute read
401000
unkown
page execute read
4838000
heap
page read and write
There are 1631 hidden memdumps, click here to show them.