IOC Report
https://attachments.office.net/owa/scharfi%40healthesystems.com/service.svc/s/GetAttachmentThumbnail?id=AAMkAGRiNDRhZDRjLTU5MDYtNGIxZi1iZWEzLTMxNzAxNDc1MDlkYwBGAAAAAABKaGeaik1pTJKS753XARkPBwA2TQ%2BJRvilSZw5ZwX6ZVMcAAAAMPLNAABjlmxW0OkeRYTsmXxki7u0AARkFkARAAABEgAQAL9k38PsJtdGhGfMC27r7wA%3D&thumbnailTy

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 1 23:00:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 1 23:00:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 1 23:00:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 1 23:00:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 1 23:00:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\3126fed9-23df-4b81-8f58-412bf7f66434.tmp
PNG image data, 1154 x 840, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\Downloads\thumbnail_image002.png (copy)
PNG image data, 1154 x 840, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\Downloads\thumbnail_image002.png.crdownload
PNG image data, 1154 x 840, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\debug\WIA\wiatrace.log
ASCII text, with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 --field-trial-handle=2292,i,9355722068866127456,13920442212961938397,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://attachments.office.net/owa/scharfi%40healthesystems.com/service.svc/s/GetAttachmentThumbnail?id=AAMkAGRiNDRhZDRjLTU5MDYtNGIxZi1iZWEzLTMxNzAxNDc1MDlkYwBGAAAAAABKaGeaik1pTJKS753XARkPBwA2TQ%2BJRvilSZw5ZwX6ZVMcAAAAMPLNAABjlmxW0OkeRYTsmXxki7u0AARkFkARAAABEgAQAL9k38PsJtdGhGfMC27r7wA%3D&thumbnailType=2&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IkU1RDJGMEY4REE5M0I2NzA5QzQzQTlFOEE2MTQzQzAzRDYyRjlBODAiLCJ0eXAiOiJKV1QiLCJ4NXQiOiI1ZEx3LU5xVHRuQ2NRNm5vcGhROEE5WXZtb0EifQ.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.t5Xgv8eR_TfatMktqJ7JjnJafROB0fji1czP9ZR96nX1FkAZML1FJvdPeDk0V2rp3m5jEeRWloFmtz2AYTzKhNPMePSO4GYvWWuBayNL0IEBCVjKw0knfZiz5WH7T9cC5WxhV-x3NmUm9SWBHBq0k6xxrfPaB9BimtTzPrRiajTPIJqs6wrsjIEbrquToHhyr_zMYiPKzCwj2z5nrw4bGeOeE6CEp4XMdHBj9Foc22X451BeyyuCzZdQjEoC6Bw1frHCLp0hgQuKTU065FcItCBeADkzDu5Z4YnXlCj7pRkWdzpszu5HyevcvmqO-66A60nqvJduSHHjtP-urytSJQ&X-OWA-CANARY=X-OWA-CANARY_cookie_is_null_or_empty&owa=outlook.office.com&scriptVer=20240621005.09&clientId=C58FAA7FDA564195AA577D7CEEBC7343&animation=true&persistenceId=267c1982-ca11-413d-9839-5d834b1d45cb"
C:\Windows\SysWOW64\mspaint.exe
mspaint.exe "C:\Users\user\Desktop\"

URLs

Name
IP
Malicious
https://attachments.office.net/owa/scharfi%40healthesystems.com/service.svc/s/GetAttachmentThumbnail?id=AAMkAGRiNDRhZDRjLTU5MDYtNGIxZi1iZWEzLTMxNzAxNDc1MDlkYwBGAAAAAABKaGeaik1pTJKS753XARkPBwA2TQ%2BJRvilSZw5ZwX6ZVMcAAAAMPLNAABjlmxW0OkeRYTsmXxki7u0AARkFkARAAABEgAQAL9k38PsJtdGhGfMC27r7wA%3D&thumbnailType=2&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IkU1RDJGMEY4REE5M0I2NzA5QzQzQTlFOEE2MTQzQzAzRDYyRjlBODAiLCJ0eXAiOiJKV1QiLCJ4NXQiOiI1ZEx3LU5xVHRuQ2NRNm5vcGhROEE5WXZtb0EifQ.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.t5Xgv8eR_TfatMktqJ7JjnJafROB0fji1czP9ZR96nX1FkAZML1FJvdPeDk0V2rp3m5jEeRWloFmtz2AYTzKhNPMePSO4GYvWWuBayNL0IEBCVjKw0knfZiz5WH7T9cC5WxhV-x3NmUm9SWBHBq0k6xxrfPaB9BimtTzPrRiajTPIJqs6wrsjIEbrquToHhyr_zMYiPKzCwj2z5nrw4bGeOeE6CEp4XMdHBj9Foc22X451BeyyuCzZdQjEoC6Bw1frHCLp0hgQuKTU065FcItCBeADkzDu5Z4YnXlCj7pRkWdzpszu5HyevcvmqO-66A60nqvJduSHHjtP-urytSJQ&X-OWA-CANARY=X-OWA-CANARY_cookie_is_null_or_empty&owa=outlook.office.com&scriptVer=20240621005.09&clientId=C58FAA7FDA564195AA577D7CEEBC7343&animation=true&persistenceId=267c1982-ca11-413d-9839-5d834b1d45cb
https://attachments.office.net/owa/scharfi%40healthesystems.com/service.svc/s/GetAttachmentThumbnail?id=AAMkAGRiNDRhZDRjLTU5MDYtNGIxZi1iZWEzLTMxNzAxNDc1MDlkYwBGAAAAAABKaGeaik1pTJKS753XARkPBwA2TQ%2BJRvilSZw5ZwX6ZVMcAAAAMPLNAABjlmxW0OkeRYTsmXxki7u0AARkFkARAAABEgAQAL9k38PsJtdGhGfMC27r7wA%3D&thumbnailType=2&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IkU1RDJGMEY4REE5M0I2NzA5QzQzQTlFOEE2MTQzQzAzRDYyRjlBODAiLCJ0eXAiOiJKV1QiLCJ4NXQiOiI1ZEx3LU5xVHRuQ2NRNm5vcGhROEE5WXZtb0EifQ.eyJvcmlnaW4iOiJodHRwczovL291dGxvb2sub2ZmaWNlLmNvbSIsInVjIjoiMzFjZTY1ZmViM2MzNGNlZTg0NDNiZTJiNDU3MDBiNjUiLCJzaWduaW5fc3RhdGUiOlsiZHZjX21uZ2QiLCJkdmNfZG1qZCIsImttc2kiXSwidmVyIjoiRXhjaGFuZ2UuQ2FsbGJhY2suVjEiLCJhcHBjdHhzZW5kZXIiOiJPd2FEb3dubG9hZEA0MzY3N2ZiNy1iODk0LTQ1NDktOGUwMS0zOGMzZjI3MWM0N2YiLCJpc3NyaW5nIjoiV1ciLCJhcHBjdHgiOiJ7XCJtc2V4Y2hwcm90XCI6XCJvd2FcIixcInB1aWRcIjpcIjExNTM5MDY2NjExMzQwMDQ1NjRcIixcInNjb3BlXCI6XCJPd2FEb3dubG9hZFwiLFwib2lkXCI6XCJmODk4MWNhNC05M2JkLTQxMzktYWU5ZC0yYTY0ZGNkYzU4NzJcIixcInByaW1hcnlzaWRcIjpcIlMtMS01LTIxLTE3ODk4MTM1NDUtOTMzNDAxMDMyLTI1NTYwNTY0NzMtMTI4MjAzOTFcIn0iLCJuYmYiOjE3MTk4NzgxNzQsImV4cCI6MTcxOTg3ODQ3NCwiaXNzIjoiMDAwMDAwMDItMDAwMC0wZmYxLWNlMDAtMDAwMDAwMDAwMDAwQDQzNjc3ZmI3LWI4OTQtNDU0OS04ZTAxLTM4YzNmMjcxYzQ3ZiIsImF1ZCI6IjAwMDAwMDAyLTAwMDAtMGZmMS1jZTAwLTAwMDAwMDAwMDAwMC9hdHRhY2htZW50cy5vZmZpY2UubmV0QDQzNjc3ZmI3LWI4OTQtNDU0OS04ZTAxLTM4YzNmMjcxYzQ3ZiIsImhhcHAiOiJvd2EifQ.t5Xgv8eR_TfatMktqJ7JjnJafROB0fji1czP9ZR96nX1FkAZML1FJvdPeDk0V2rp3m5jEeRWloFmtz2AYTzKhNPMePSO4GYvWWuBayNL0IEBCVjKw0knfZiz5WH7T9cC5WxhV-x3NmUm9SWBHBq0k6xxrfPaB9BimtTzPrRiajTPIJqs6wrsjIEbrquToHhyr_zMYiPKzCwj2z5nrw4bGeOeE6CEp4XMdHBj9Foc22X451BeyyuCzZdQjEoC6Bw1frHCLp0hgQuKTU065FcItCBeADkzDu5Z4YnXlCj7pRkWdzpszu5HyevcvmqO-66A60nqvJduSHHjtP-urytSJQ&X-OWA-CANARY=X-OWA-CANARY_cookie_is_null_or_empty&owa=outlook.office.com&scriptVer=20240621005.09&clientId=C58FAA7FDA564195AA577D7CEEBC7343&animation=true&persistenceId=267c1982-ca11-413d-9839-5d834b1d45cb
52.98.179.98

Domains

Name
IP
Malicious
www.google.com
142.250.186.100
FRA-efz.ms-acdc.office.com
52.98.179.98
fp2e7a.wpc.phicdn.net
192.229.221.95
attachments.office.net
unknown

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
52.98.179.98
FRA-efz.ms-acdc.office.com
United States
142.250.186.100
www.google.com
United States
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
345E000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4EF0000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
341E000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F40000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
3530000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
532A000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
5310000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
6DD1000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
537B000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
5040000
trusted library allocation
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33CE000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
55BE000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
565E000
stack
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
5470000
trusted library allocation
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
557F000
stack
page read and write
37DA000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
5300000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4EAB000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4ED0000
heap
page read and write
4F41000
heap
page read and write
356C000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4EE0000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
349F000
stack
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
362E000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
3232000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
37DD000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
5EE0000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
569E000
stack
page read and write
4F3C000
stack
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
362B000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
9520000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D0000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
34A0000
heap
page read and write
4ED3000
heap
page read and write
553E000
stack
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
3279000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
37D0000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
5410000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
6DD0000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
55FF000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
35BF000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
362E000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
54BD000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
54FE000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
3623000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
3538000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
3620000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
3547000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
32B0000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
33D4000
heap
page read and write
4F41000
heap
page read and write
33D4000
heap
page read and write
There are 899 hidden memdumps, click here to show them.