IOC Report
Eclf71HXa1.exe

loading gif

Files

File Path
Type
Category
Malicious
Eclf71HXa1.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI62802\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI62802\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Eclf71HXa1.exe
"C:\Users\user\Desktop\Eclf71HXa1.exe"
malicious
C:\Users\user\Desktop\Eclf71HXa1.exe
"C:\Users\user\Desktop\Eclf71HXa1.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 235 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
http://python.org/dev/peps/pep-0263/
unknown
https://mahler:8092/site-updates.py
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ocsp.thawte.com0
unknown
http://www.python.org/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.openssl.org/H
unknown
http://crl.mic
unknown
http://greenbytes.de/tech/tc2231/
unknown
http://pypi.python.org/pypi/wget/
unknown
http://bitbucket.org/techtonik/python-wget/
unknown
http://www.python.org/dev/peps/pep-0205/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://bitbucket.org/techtonik/python-pager
unknown
http://www.python.org/download/releases/2.3/mro/.
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.221.149.185
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
2114C0B8000
heap
page read and write
261B8E57000
heap
page read and write
18902650000
heap
page read and write
1F7334BB000
heap
page read and write
2211ED75000
heap
page read and write
276632C000
stack
page read and write
20E945A0000
heap
page read and write
2492F4D0000
direct allocation
page read and write
1117EFB000
stack
page read and write
21495BEC000
heap
page read and write
F980BFF000
unkown
page read and write
22376AD5000
heap
page read and write
977CEFF000
unkown
page read and write
17AF8D20000
heap
page read and write
1FDD4CB5000
heap
page read and write
F62E1FF000
stack
page read and write
4F2A2FF000
stack
page read and write
2492EF10000
direct allocation
page read and write
1A6B8A40000
heap
page read and write
22376CC0000
heap
page read and write
1C6E5790000
heap
page read and write
1F871105000
heap
page read and write
26ECCDF0000
heap
page read and write
2211ED70000
heap
page read and write
2725F920000
heap
page read and write
7FFE130C5000
unkown
page read and write
F980CFF000
stack
page read and write
7FFDFB442000
unkown
page read and write
23786BF0000
heap
page read and write
17C5992C000
heap
page read and write
7FF6117D4000
unkown
page read and write
1474F960000
heap
page read and write
19F417D0000
heap
page read and write
49112FE000
stack
page read and write
1C96E5A0000
heap
page read and write
20BFAE48000
heap
page read and write
1F733680000
heap
page read and write
40E7FFF000
stack
page read and write
28858E60000
heap
page read and write
26BE0FE000
unkown
page read and write
1D38C270000
heap
page read and write
76706FE000
stack
page read and write
7FFDFB130000
unkown
page readonly
1A6B8920000
heap
page read and write
2114C355000
heap
page read and write
16AAF650000
heap
page read and write
1BF13D25000
heap
page read and write
22558100000
heap
page read and write
7FFDFB41A000
unkown
page readonly
FBB06FF000
stack
page read and write
277BF6EC000
heap
page read and write
1474FC20000
heap
page read and write
1F791A88000
heap
page read and write
139A5850000
heap
page read and write
5523FFE000
stack
page read and write
15BA6FE000
stack
page read and write
2D09B575000
heap
page read and write
365B78C000
stack
page read and write
82D05FF000
unkown
page read and write
2725F9AE000
heap
page read and write
37560FF000
stack
page read and write
15DF4190000
heap
page read and write
7E1E8FB000
stack
page read and write
17C59945000
heap
page read and write
1284310B000
heap
page read and write
D6750FF000
stack
page read and write
1A32BFF000
stack
page read and write
17F9FCC000
stack
page read and write
15AFB6AC000
heap
page read and write
25136290000
heap
page read and write
B2ADBFE000
stack
page read and write
18EB56C5000
heap
page read and write
1DD449B0000
heap
page read and write
23786D00000
heap
page read and write
2725F940000
heap
page read and write
18EB5727000
heap
page read and write
7FFE130C3000
unkown
page readonly
17FA2FF000
unkown
page read and write
2122C365000
heap
page read and write
18C4D100000
heap
page read and write
1FDD4AF0000
heap
page read and write
17AF8D10000
heap
page read and write
1F6DFF000
unkown
page read and write
1E74161C000
heap
page read and write
26E5E830000
heap
page read and write
20E679B5000
heap
page read and write
EB4A4FF000
stack
page read and write
1FF9C400000
heap
page read and write
25C52BC0000
heap
page read and write
2492CEBF000
heap
page read and write
2122C098000
heap
page read and write
3755EFB000
stack
page read and write
2366E70C000
heap
page read and write
1A9B7550000
heap
page read and write
26CFDAF0000
heap
page read and write
21F09247000
heap
page read and write
1CC83340000
heap
page read and write
1BF13A20000
heap
page read and write
1EEE0406000
heap
page read and write
1F791A6C000
heap
page read and write
312CEFF000
unkown
page read and write
7FFE130C1000
unkown
page execute read
189C0330000
heap
page read and write
2492CE61000
heap
page read and write
1D3CEB80000
heap
page read and write
2492CE98000
heap
page read and write
261C97B000
stack
page read and write
1F791CF0000
heap
page read and write
139A586C000
heap
page read and write
1E958710000
heap
page read and write
187A2030000
heap
page read and write
1FF9C320000
heap
page read and write
1A9B7570000
heap
page read and write
2725F9C8000
heap
page read and write
2492CDF8000
heap
page read and write
1EA0F570000
heap
page read and write
240082D0000
heap
page read and write
1F8711E0000
heap
page read and write
17868D50000
heap
page read and write
26E5E927000
heap
page read and write
2A6CCCC0000
heap
page read and write
2455C820000
heap
page read and write
7BDB75C000
stack
page read and write
20BFAD90000
heap
page read and write
50D6FFF000
unkown
page read and write
A364F0C000
stack
page read and write
F8FAFE000
stack
page read and write
1E7DBEE0000
heap
page read and write
FDD80FE000
unkown
page read and write
15DF4195000
heap
page read and write
2122C240000
heap
page read and write
1E0EC52E000
heap
page read and write
1E10FCF0000
heap
page read and write
18481567000
heap
page read and write
1DBF68E5000
heap
page read and write
1C96E430000
heap
page read and write
2492EFF1000
heap
page read and write
1936CE50000
heap
page read and write
1F7337C0000
heap
page read and write
226D3C07000
heap
page read and write
D4AE4FF000
unkown
page read and write
2492EF8C000
heap
page read and write
40E7BAC000
stack
page read and write
1C618EB0000
heap
page read and write
195A0660000
heap
page read and write
7FFDFB1CE000
unkown
page execute read
7FFE12E10000
unkown
page readonly
2492F120000
direct allocation
page read and write
7FFE126E0000
unkown
page readonly
20BC0CF0000
heap
page read and write
18E0E7A5000
heap
page read and write
7FFE00556000
unkown
page write copy
1F6EFF000
stack
page read and write
263DB6B0000
heap
page read and write
20E67998000
heap
page read and write
1E0EC51F000
heap
page read and write
1EECD5F0000
heap
page read and write
1DF8ADD0000
heap
page read and write
2366E700000
heap
page read and write
1E8EA695000
heap
page read and write
1DF8ADF6000
heap
page read and write
17868D55000
heap
page read and write
1EA0F560000
heap
page read and write
AC828FF000
unkown
page read and write
1A9B7625000
heap
page read and write
AC829FF000
stack
page read and write
B6B89FF000
unkown
page read and write
1E297AD0000
heap
page read and write
2A5DD290000
heap
page read and write
20E944C8000
heap
page read and write
19CCF9D0000
heap
page read and write
2492CE66000
heap
page read and write
1C618FD8000
heap
page read and write
B572BFF000
unkown
page read and write
2366E6D5000
heap
page read and write
2366E725000
heap
page read and write
527B1FF000
stack
page read and write
288590C0000
heap
page read and write
1BF13D30000
heap
page read and write
19D7C9A0000
heap
page read and write
20E944A0000
heap
page read and write
25E441F0000
heap
page read and write
273A7FF000
stack
page read and write
2725F9A0000
heap
page read and write
17AF8D65000
heap
page read and write
7FF611791000
unkown
page execute read
23786A25000
heap
page read and write
7FFE10319000
unkown
page write copy
2492CEE9000
heap
page read and write
C80BFF000
unkown
page read and write
79B36FF000
stack
page read and write
1DA0E475000
heap
page read and write
1EA0F5F8000
heap
page read and write
1ABDD358000
heap
page read and write
2D09B350000
heap
page read and write
19A7A255000
heap
page read and write
139A5888000
heap
page read and write
20C0D4B0000
heap
page read and write
2492EF10000
direct allocation
page read and write
1DA0E1A8000
heap
page read and write
215846E0000
heap
page read and write
1FF9C488000
heap
page read and write
7FFE10318000
unkown
page read and write
1C618FD6000
heap
page read and write
21495B50000
heap
page read and write
18EB58D0000
heap
page read and write
1F871245000
heap
page read and write
18E0E780000
heap
page read and write
2366E650000
heap
page read and write
5F108FF000
stack
page read and write
9B426FF000
stack
page read and write
2114C0B6000
heap
page read and write
A7C83FF000
stack
page read and write
187A20C0000
heap
page read and write
17AF8DC8000
heap
page read and write
1D3CED70000
heap
page read and write
1E0EC51F000
heap
page read and write
26E5EAD0000
heap
page read and write
7FFE1031C000
unkown
page readonly
7BBFEFF000
stack
page read and write
79B35FF000
unkown
page read and write
2492EF10000
direct allocation
page read and write
85807FF000
stack
page read and write
21584500000
heap
page read and write
724A8FF000
unkown
page read and write
7FFDFB857000
unkown
page read and write
1F871250000
heap
page read and write
205D6EB5000
heap
page read and write
D88F7FF000
unkown
page read and write
1FFB4FC000
stack
page read and write
25953C98000
heap
page read and write
22376D30000
heap
page read and write
1F870FD0000
heap
page read and write
1F791B60000
heap
page read and write
12843100000
heap
page read and write
25E442A5000
heap
page read and write
18C4D3B0000
heap
page read and write
C5BBFFF000
unkown
page read and write
1FDD4CB7000
heap
page read and write
A06335C000
stack
page read and write
1E9588E5000
heap
page read and write
20C7D4F0000
heap
page read and write
2158451C000
heap
page read and write
156B8110000
heap
page read and write
1B71B645000
heap
page read and write
7FFE126D8000
unkown
page read and write
21A3E6C0000
heap
page read and write
256DE3B0000
heap
page read and write
1C202E4C000
heap
page read and write
1F8710E8000
heap
page read and write
16AAF5E0000
heap
page read and write
56C8FC000
stack
page read and write
16AAF677000
heap
page read and write
12843380000
heap
page read and write
26556560000
heap
page read and write
20C7D6C5000
heap
page read and write
1C96E4A0000
heap
page read and write
205D6E90000
heap
page read and write
273A6FE000
unkown
page read and write
2492EF10000
direct allocation
page read and write
40E7EFE000
unkown
page read and write
19A7A1D0000
heap
page read and write
1FA4EFC000
stack
page read and write
7D2DCFF000
unkown
page read and write
7FFE126C0000
unkown
page readonly
277BF8D0000
heap
page read and write
CD4B8FB000
stack
page read and write
7FFDFB1BA000
unkown
page execute read
6DB97FC000
stack
page read and write
3C2FAFB000
stack
page read and write
49111FF000
unkown
page read and write
1EEE03E0000
heap
page read and write
2D09B450000
heap
page read and write
2492EF10000
direct allocation
page read and write
55C61FF000
unkown
page read and write
20E94410000
heap
page read and write
187A20B0000
heap
page read and write
7FFDFB1C0000
unkown
page execute read
17AF8D60000
heap
page read and write
21495B70000
heap
page read and write
2725F9AC000
heap
page read and write
16E2B6A0000
heap
page read and write
240082E0000
heap
page read and write
1E29775B000
heap
page read and write
2211EA70000
heap
page read and write
169C1DD0000
heap
page read and write
17422DE5000
heap
page read and write
26D143B0000
heap
page read and write
365BAFF000
unkown
page read and write
26CFDE50000
heap
page read and write
2A6CCA60000
heap
page read and write
A3317FF000
stack
page read and write
19D7CBD0000
heap
page read and write
1F9258C0000
heap
page read and write
18E0E720000
heap
page read and write
19BFF750000
heap
page read and write
159E6930000
heap
page read and write
3CC36FF000
unkown
page read and write
2122BFF0000
heap
page read and write
1EA0F940000
heap
page read and write
1FF9C420000
heap
page read and write
17F8B5D0000
heap
page read and write
1A9B7600000
heap
page read and write
17C59920000
heap
page read and write
2492F160000
direct allocation
page read and write
20A4AA40000
heap
page read and write
2A5DD395000
heap
page read and write
18E0E750000
heap
page read and write
139A5A50000
heap
page read and write
20C7D6A0000
heap
page read and write
A3652FF000
unkown
page read and write
1E110040000
heap
page read and write
24008105000
heap
page read and write
1936CE10000
heap
page read and write
1C6E5870000
heap
page read and write
1C202FF0000
heap
page read and write
15BA5FF000
unkown
page read and write
49FD8FE000
stack
page read and write
25D9D886000
heap
page read and write
261CCFF000
unkown
page read and write
19D7CA27000
heap
page read and write
7E1EAFF000
stack
page read and write
71E6DFC000
stack
page read and write
A8400FE000
unkown
page read and write
76705FF000
unkown
page read and write
28B22197000
heap
page read and write
204C3C40000
heap
page read and write
1E7DC0E0000
heap
page read and write
1F7337C5000
heap
page read and write
159E6AD5000
heap
page read and write
7FF6117BB000
unkown
page readonly
1DBF6B70000
heap
page read and write
E3844FC000
stack
page read and write
1EDE4995000
heap
page read and write
1DF8AD20000
heap
page read and write
53DFEFF000
stack
page read and write
7FFE11EB1000
unkown
page execute read
2A593FF000
unkown
page read and write
E7F55FF000
unkown
page read and write
1EECD800000
heap
page read and write
7FFE10230000
unkown
page readonly
6F3B0FF000
unkown
page read and write
1D12CFC000
stack
page read and write
7FF611791000
unkown
page execute read
1C96E350000
heap
page read and write
3015FFF000
unkown
page read and write
2492EF10000
direct allocation
page read and write
1E8EA6A0000
heap
page read and write
38715FF000
unkown
page read and write
15DF3F00000
heap
page read and write
DF0CCFC000
stack
page read and write
261B9100000
heap
page read and write
64542FF000
stack
page read and write
1C6E5A85000
heap
page read and write
1474F940000
heap
page read and write
A5852FE000
unkown
page read and write
19F418AC000
heap
page read and write
24007F80000
heap
page read and write
1E10FCE0000
heap
page read and write
5523B4C000
stack
page read and write
1E297776000
heap
page read and write
25C52BC5000
heap
page read and write
20A4A968000
heap
page read and write
1B71B825000
heap
page read and write
2C1AFE20000
heap
page read and write
7D2DDFF000
stack
page read and write
1E7DBFE0000
heap
page read and write
26ECC9C0000
heap
page read and write
9D9C6FF000
stack
page read and write
2D520FE000
unkown
page read and write
24008080000
heap
page read and write
2255800C000
heap
page read and write
21236890000
heap
page read and write
D9DFAFC000
stack
page read and write
E6330FC000
stack
page read and write
21584510000
heap
page read and write
189026B5000
heap
page read and write
1936CED8000
heap
page read and write
25C527E0000
heap
page read and write
256DE715000
heap
page read and write
1DA0E18C000
heap
page read and write
4E7F6FC000
stack
page read and write
18444610000
heap
page read and write
1A6B8A15000
heap
page read and write
2492EED0000
direct allocation
page read and write
1FFB5FF000
unkown
page read and write
1E8EA4B0000
heap
page read and write
E3846FF000
stack
page read and write
53DFDFF000
unkown
page read and write
57A87FF000
unkown
page read and write
19BFF770000
heap
page read and write
CD4BAFF000
stack
page read and write
9D9C4FC000
stack
page read and write
20BFAE2B000
heap
page read and write
159E6AD0000
heap
page read and write
7FFDFB373000
unkown
page readonly
277BF8B0000
heap
page read and write
E7F56FF000
stack
page read and write
7FFE130C0000
unkown
page readonly
C6D69FF000
stack
page read and write
EA801FF000
stack
page read and write
2114C0B8000
heap
page read and write
1E2976F0000
heap
page read and write
169C1DF6000
heap
page read and write
7FFDFB39E000
unkown
page readonly
187A1F57000
heap
page read and write
17422CD0000
heap
page read and write
2D09B2B0000
heap
page read and write
187A1F30000
heap
page read and write
2492CE74000
heap
page read and write
25136550000
heap
page read and write
549E1AC000
stack
page read and write
18902790000
heap
page read and write
226D3C26000
heap
page read and write
28859050000
heap
page read and write
65653FF000
unkown
page read and write
189C0359000
heap
page read and write
169C2155000
heap
page read and write
C6D650C000
stack
page read and write
7FFE11EE1000
unkown
page read and write
277BF706000
heap
page read and write
17AF8DC6000
heap
page read and write
1DF8AD50000
heap
page read and write
24A36EC5000
heap
page read and write
2492CE4D000
heap
page read and write
1E563EC0000
heap
page read and write
21495BE0000
heap
page read and write
227D8610000
heap
page read and write
1EA0F617000
heap
page read and write
7FF6117D3000
unkown
page read and write
B4C9DFF000
unkown
page read and write
20E67C25000
heap
page read and write
212368B0000
heap
page read and write
1C03F7C0000
heap
page read and write
B619F4C000
stack
page read and write
55C62FF000
stack
page read and write
999C1FF000
unkown
page read and write
1936CE40000
heap
page read and write
156B811C000
heap
page read and write
261B8E3C000
heap
page read and write
20C0D4BC000
heap
page read and write
7FFE1026C000
unkown
page readonly
55CDAFE000
unkown
page read and write
6DE9CFC000
stack
page read and write
1B71B550000
heap
page read and write
7BDBAFE000
unkown
page read and write
5F106FC000
stack
page read and write
1B062850000
heap
page read and write
22376BC0000
heap
page read and write
263DB5A0000
heap
page read and write
20C0D480000
heap
page read and write
20BC0DE0000
heap
page read and write
2D51D7B000
stack
page read and write
1474FB00000
heap
page read and write
25953DE0000
heap
page read and write
1FFB6FF000
stack
page read and write
159E6838000
heap
page read and write
A68C2FF000
stack
page read and write
263DB4A0000
heap
page read and write
A68C0FC000
stack
page read and write
5F107FF000
unkown
page read and write
1C6E58EB000
heap
page read and write
1EE78FA5000
heap
page read and write
1F733480000
heap
page read and write
19CCFAB0000
heap
page read and write
18EB5727000
heap
page read and write
2492CE7E000
heap
page read and write
18EB5725000
heap
page read and write
18EB5700000
heap
page read and write
277BF6A0000
heap
page read and write
1E297777000
heap
page read and write
2725FCD0000
heap
page read and write
9D9C5FF000
unkown
page read and write
999C2FF000
stack
page read and write
83029BC000
stack
page read and write
24033820000
heap
page read and write
16AAF500000
heap
page read and write
1B71B820000
heap
page read and write
6DE9DFF000
unkown
page read and write
2492EC10000
direct allocation
page read and write
1FDD4BF0000
heap
page read and write
7FF6117BB000
unkown
page readonly
1C343E70000
heap
page read and write
7FFDFB13D000
unkown
page execute read
19BFF580000
heap
page read and write
16AAF658000
heap
page read and write
7FFE11EC3000
unkown
page read and write
1FF9C486000
heap
page read and write
24033746000
heap
page read and write
226D3C00000
heap
page read and write
24033680000
heap
page read and write
1E95871C000
heap
page read and write
2122C077000
heap
page read and write
18C4D1E5000
heap
page read and write
55CD71C000
stack
page read and write
2492CE8C000
heap
page read and write
21A3E8A5000
heap
page read and write
195A0310000
heap
page read and write
CC5C7FF000
stack
page read and write
7FF6117CE000
unkown
page write copy
128430A0000
heap
page read and write
A136FF000
stack
page read and write
18481730000
heap
page read and write
11180FF000
stack
page read and write
1DBF6B60000
heap
page read and write
263DB3C0000
heap
page read and write
2211EA30000
heap
page read and write
FDD7DDC000
stack
page read and write
EA09FFF000
stack
page read and write
1E0EDEB0000
heap
page read and write
E6331FF000
unkown
page read and write
2A5DD1B0000
heap
page read and write
19BFF850000
heap
page read and write
1DA0E160000
heap
page read and write
1C618F90000
heap
page read and write
23786CF0000
heap
page read and write
7FFDFB131000
unkown
page execute read
1E0EC52C000
heap
page read and write
21A3E8A0000
heap
page read and write
2A6CCA10000
heap
page read and write
7FFE126D1000
unkown
page readonly
156B8138000
heap
page read and write
2492CEC1000
heap
page read and write
1E7415B0000
heap
page read and write
1E8EA6C0000
heap
page read and write
26D144AC000
heap
page read and write
116B7855000
heap
page read and write
1B062750000
heap
page read and write
CC5C6FE000
unkown
page read and write
24033749000
heap
page read and write
24033935000
heap
page read and write
1E5640E5000
heap
page read and write
2D09B290000
heap
page read and write
19D7C950000
heap
page read and write
15A56FD0000
heap
page read and write
2725F9C8000
heap
page read and write
186FFCF000
stack
page read and write
2492CE8A000
heap
page read and write
1C96E440000
heap
page read and write
F62DD8C000
stack
page read and write
7FFDFB76D000
unkown
page readonly
2114C030000
heap
page read and write
186FBED000
stack
page read and write
2260BF90000
heap
page read and write
27667FF000
stack
page read and write
527AD3C000
stack
page read and write
15AFB920000
heap
page read and write
195A0665000
heap
page read and write
1B71B450000
heap
page read and write
21236960000
heap
page read and write
1DA0E2A0000
heap
page read and write
26CFDB10000
heap
page read and write
D9DFCFF000
stack
page read and write
1DA0E280000
heap
page read and write
A3653FF000
stack
page read and write
205D7160000
heap
page read and write
2492EFB1000
heap
page read and write
1E958590000
heap
page read and write
F62E0FF000
unkown
page read and write
24008060000
heap
page read and write
7BBFDFE000
unkown
page read and write
1474FA00000
heap
page read and write
24A36E60000
heap
page read and write
1EEE03B0000
heap
page read and write
226D3DC5000
heap
page read and write
21F09245000
heap
page read and write
227D84D0000
heap
page read and write
7FFE00561000
unkown
page readonly
1EE79190000
heap
page read and write
189C0337000
heap
page read and write
17868B8C000
heap
page read and write
187A1E30000
heap
page read and write
1E7DBE30000
heap
page read and write
19F417E0000
heap
page read and write
205D6EB7000
heap
page read and write
1C6190F0000
heap
page read and write
24A36EA8000
heap
page read and write
18E0EA50000
heap
page read and write
18EB56C0000
heap
page read and write
B4C9CFC000
stack
page read and write
26D144C5000
heap
page read and write
17FA3FF000
stack
page read and write
17C59C15000
heap
page read and write
25D9D888000
heap
page read and write
2260BDA0000
heap
page read and write
2455C8D5000
heap
page read and write
1ABDD5A0000
heap
page read and write
A134FC000
stack
page read and write
25E44380000
heap
page read and write
7FFE126EE000
unkown
page readonly
2C1AFD45000
heap
page read and write
2492F0E0000
direct allocation
page read and write
1DD44DA0000
heap
page read and write
1E741580000
heap
page read and write
2492CE4D000
heap
page read and write
19D7C9A5000
heap
page read and write
85806FF000
unkown
page read and write
2492EFF8000
heap
page read and write
20BFAE48000
heap
page read and write
26CFDB7C000
heap
page read and write
1C03F550000
heap
page read and write
15DF3E90000
heap
page read and write
7FFE126DC000
unkown
page readonly
1C03F7D0000
heap
page read and write
2D09B35B000
heap
page read and write
227D85D0000
heap
page read and write
2122BFE0000
heap
page read and write
15C41BB5000
heap
page read and write
7FFE126F2000
unkown
page read and write
1EA0F615000
heap
page read and write
1C6190F5000
heap
page read and write
212366D5000
heap
page read and write
2A6CCA85000
heap
page read and write
45398FF000
stack
page read and write
C80CFF000
stack
page read and write
2492CDF0000
heap
page read and write
20A4AC50000
heap
page read and write
1E5640E0000
heap
page read and write
1EEE05B0000
heap
page read and write
EAFFD2B000
stack
page read and write
2492CE8A000
heap
page read and write
20BFAE46000
heap
page read and write
A7CA10C000
stack
page read and write
1E0EC51F000
heap
page read and write
1936CEBE000
heap
page read and write
1F871107000
heap
page read and write
1FF9C460000
heap
page read and write
20C7D975000
heap
page read and write
1E741930000
heap
page read and write
CD4B9FF000
unkown
page read and write
25E440F0000
heap
page read and write
1C96E435000
heap
page read and write
1F8710B0000
heap
page read and write
19A7A1C0000
heap
page read and write
EA800FE000
unkown
page read and write
2492EF10000
direct allocation
page read and write
18444870000
heap
page read and write
1C202DA0000
heap
page read and write
26ECCC70000
heap
page read and write
1DD449E0000
heap
page read and write
2455CB30000
heap
page read and write
6D9EFF000
stack
page read and write
1936CEBC000
heap
page read and write
22733990000
heap
page read and write
26E5E860000
heap
page read and write
156B83C0000
heap
page read and write
D9EFAFF000
unkown
page read and write
7209D8C000
stack
page read and write
49FD7FF000
unkown
page read and write
256DE720000
heap
page read and write
1DBF68C0000
heap
page read and write
20BFAE10000
heap
page read and write
A7C7F6C000
stack
page read and write
15A57155000
heap
page read and write
46E7AFF000
unkown
page read and write
1474F860000
heap
page read and write
12843370000
heap
page read and write
1E297AD5000
heap
page read and write
79A8CFE000
unkown
page read and write
2260BBD0000
heap
page read and write
20BFAE15000
heap
page read and write
15C41B40000
heap
page read and write
237869F0000
heap
page read and write
1C343D7C000
heap
page read and write
20BFACB0000
heap
page read and write
1EE79210000
heap
page read and write
17AF8DAB000
heap
page read and write
2492CED0000
heap
page read and write
1F791990000
heap
page read and write
261B8DE0000
heap
page read and write
7FFE148E1000
unkown
page execute read
15C41B90000
heap
page read and write
19BFF840000
heap
page read and write
1936CED6000
heap
page read and write
159E6857000
heap
page read and write
240082D5000
heap
page read and write
169C1FC0000
heap
page read and write
7FFDFB449000
unkown
page readonly
65654FF000
stack
page read and write
116B78FC000
heap
page read and write
25953C90000
heap
page read and write
169C1DA0000
heap
page read and write
A7CA5FF000
stack
page read and write
1C202E65000
heap
page read and write
9B425FF000
unkown
page read and write
24033930000
heap
page read and write
FDD81FF000
stack
page read and write
1DBF68CC000
heap
page read and write
8302DFF000
stack
page read and write
19CCFB25000
heap
page read and write
1DA0E470000
heap
page read and write
25C52905000
heap
page read and write
F8F9FF000
unkown
page read and write
2211EA95000
heap
page read and write
1E0EC508000
heap
page read and write
1CC835C0000
heap
page read and write
2492EF10000
direct allocation
page read and write
189C02F0000
heap
page read and write
D1EA70C000
stack
page read and write
21495F75000
heap
page read and write
256DE46B000
heap
page read and write
17F8B540000
heap
page read and write
7FFE126C1000
unkown
page execute read
7FF6117D6000
unkown
page readonly
B6B8AFF000
stack
page read and write
B61A2FF000
unkown
page read and write
1474FA26000
heap
page read and write
28B22170000
heap
page read and write
25136540000
heap
page read and write
2492CE4D000
heap
page read and write
1E2976C0000
heap
page read and write
1EDE4990000
heap
page read and write
7FFE148E9000
unkown
page readonly
17868BA8000
heap
page read and write
227D8637000
heap
page read and write
25953CB5000
heap
page read and write
499B5E0000
stack
page read and write
BE7C72C000
stack
page read and write
2A6CCA6C000
heap
page read and write
64541FF000
unkown
page read and write
15AFB610000
heap
page read and write
30160FF000
stack
page read and write
49110FC000
stack
page read and write
1E958735000
heap
page read and write
3CC33EB000
stack
page read and write
1E0EC51E000
heap
page read and write
24A36EA0000
heap
page read and write
7FFDFB1A9000
unkown
page execute read
2492CE7E000
heap
page read and write
1E0EC51F000
heap
page read and write
1B71B530000
heap
page read and write
9B424FC000
stack
page read and write
189C0356000
heap
page read and write
2455C9B0000
heap
page read and write
C6D68FE000
unkown
page read and write
1E153FF000
unkown
page read and write
7FF611790000
unkown
page readonly
17F8B575000
heap
page read and write
720A0FE000
unkown
page read and write
2455C840000
heap
page read and write
1936CE45000
heap
page read and write
189C0310000
heap
page read and write
16E2B70C000
heap
page read and write
2211EA20000
heap
page read and write
2366E670000
heap
page read and write
1F9258B5000
heap
page read and write
261B9000000
heap
page read and write
28859030000
heap
page read and write
16E2B660000
heap
page read and write
1C618FB0000
heap
page read and write
1EECD820000
heap
page read and write
20BC0DEC000
heap
page read and write
2492F050000
direct allocation
page read and write
24A371F5000
heap
page read and write
53DFCFC000
stack
page read and write
2211EA97000
heap
page read and write
18EB570E000
heap
page read and write
7FFE0055A000
unkown
page read and write
1BF13AA8000
heap
page read and write
427DEFC000
stack
page read and write
20BC0EE0000
heap
page read and write
2D09B1B0000
heap
page read and write
2492F210000
direct allocation
page read and write
4E7F7FE000
unkown
page read and write
834D4FF000
unkown
page read and write
1EE79170000
heap
page read and write
212366BC000
heap
page read and write
12843126000
heap
page read and write
24A36E40000
heap
page read and write
2492EF10000
direct allocation
page read and write
1D38C375000
heap
page read and write
1C96E4AC000
heap
page read and write
256DE710000
heap
page read and write
20A4AB40000
heap
page read and write
1EDE49A0000
heap
page read and write
1DA0E1A8000
heap
page read and write
2492F290000
direct allocation
page read and write
1ABDD5B0000
heap
page read and write
1DD449EC000
heap
page read and write
91EF7FF000
stack
page read and write
46E77DC000
stack
page read and write
18902690000
heap
page read and write
204C3C20000
heap
page read and write
19F418A0000
heap
page read and write
7FF6117CE000
unkown
page read and write
49FD6FB000
stack
page read and write
1ABDD358000
heap
page read and write
2492EF51000
heap
page read and write
26D14785000
heap
page read and write
22557FC0000
heap
page read and write
139A5A30000
heap
page read and write
3015EFB000
stack
page read and write
1E0EC51E000
heap
page read and write
227339B5000
heap
page read and write
7FFE126E1000
unkown
page execute read
18EB56B0000
heap
page read and write
2260BB20000
heap
page read and write
1A6B8AE5000
heap
page read and write
20C7D5D0000
heap
page read and write
25D9DA45000
heap
page read and write
17AF8F70000
heap
page read and write
19A7A230000
heap
page read and write
17F8B5F5000
heap
page read and write
2366E570000
heap
page read and write
7FFE1026B000
unkown
page read and write
277BF708000
heap
page read and write
15AFB7A0000
heap
page read and write
227338D0000
heap
page read and write
15BA4FC000
stack
page read and write
2725F9C6000
heap
page read and write
D674FFF000
unkown
page read and write
195A02E0000
heap
page read and write
7FFE12E1A000
unkown
page readonly
17F8B5DC000
heap
page read and write
26D14780000
heap
page read and write
1EE78F80000
heap
page read and write
15A56EA0000
heap
page read and write
25D9D860000
heap
page read and write
1D3CED75000
heap
page read and write
18902910000
heap
page read and write
2492EF51000
heap
page read and write
2492CE8F000
heap
page read and write
169C1DF8000
heap
page read and write
7FF611790000
unkown
page readonly
7FFDFB371000
unkown
page execute read
1E10FF00000
heap
page read and write
2492EF87000
heap
page read and write
53F21FE000
unkown
page read and write
B6B88FC000
stack
page read and write
2492F250000
direct allocation
page read and write
2455C8BC000
heap
page read and write
159E67C0000
heap
page read and write
22733C05000
heap
page read and write
25D9D86C000
heap
page read and write
12843127000
heap
page read and write
7FFE1030D000
unkown
page readonly
50D6EFC000
stack
page read and write
7FFE11ED1000
unkown
page execute read
1474FA2A000
heap
page read and write
55C60FC000
stack
page read and write
7FFE004C1000
unkown
page execute read
1C96E460000
heap
page read and write
2455CB35000
heap
page read and write
1CC83510000
heap
page read and write
1CC835B5000
heap
page read and write
7C6791B000
stack
page read and write
1B062777000
heap
page read and write
204C3C68000
heap
page read and write
1FDD4CB7000
heap
page read and write
76704FB000
stack
page read and write
1FDD4BD0000
heap
page read and write
2492CE7E000
heap
page read and write
226D3B70000
heap
page read and write
1F8710E0000
heap
page read and write
25E44280000
heap
page read and write
1EEE0408000
heap
page read and write
7FFE10231000
unkown
page execute read
18EB58F0000
heap
page read and write
427DFFF000
unkown
page read and write
24A371F0000
heap
page read and write
1DBF69D0000
heap
page read and write
20C0D485000
heap
page read and write
7FFDFB851000
unkown
page read and write
18C4D1F0000
heap
page read and write
205D7060000
heap
page read and write
187A1F10000
heap
page read and write
26556450000
heap
page read and write
1EE78F8C000
heap
page read and write
914AF1B000
stack
page read and write
977CB1C000
stack
page read and write
21584760000
heap
page read and write
5D434FF000
unkown
page read and write
159E66E0000
heap
page read and write
1EDE46E0000
heap
page read and write
21A3E6CB000
heap
page read and write
56CAFF000
stack
page read and write
15DF3EC0000
heap
page read and write
2A594FF000
stack
page read and write
225582E0000
heap
page read and write
1C202FE5000
heap
page read and write
21495F70000
heap
page read and write
1E7DBEEC000
heap
page read and write
2122C096000
heap
page read and write
71E71FF000
stack
page read and write
19BFF5A5000
heap
page read and write
189C05F0000
heap
page read and write
2492CEC1000
heap
page read and write
159E6857000
heap
page read and write
25953DE5000
heap
page read and write
256DE460000
heap
page read and write
2725FB70000
heap
page read and write
2211EC40000
heap
page read and write
17F8B440000
heap
page read and write
2492CEA4000
heap
page read and write
17422EE0000
heap
page read and write
D084EFF000
unkown
page read and write
BE7CAFF000
unkown
page read and write
7FFE11EC4000
unkown
page readonly
28B22340000
heap
page read and write
18E0EA55000
heap
page read and write
22376ABC000
heap
page read and write
20BC1090000
heap
page read and write
7FFE11EBE000
unkown
page readonly
1E563FA7000
heap
page read and write
B2ADAFF000
unkown
page read and write
D9EFBFF000
stack
page read and write
2492F1C0000
direct allocation
page read and write
21F09190000
heap
page read and write
B572AFC000
stack
page read and write
1C618FBC000
heap
page read and write
1ABDD356000
heap
page read and write
227D85B0000
heap
page read and write
1D3CEC18000
heap
page read and write
2114C09B000
heap
page read and write
227D8635000
heap
page read and write
91BF2FF000
stack
page read and write
18EB570C000
heap
page read and write
1ABDD2B0000
heap
page read and write
227338F0000
heap
page read and write
25953CB7000
heap
page read and write
7FFDFB813000
unkown
page read and write
263DB5C0000
heap
page read and write
17422FA0000
heap
page read and write
1936CE20000
heap
page read and write
45397FE000
unkown
page read and write
1A32AFF000
unkown
page read and write
FBB05FF000
unkown
page read and write
19CCFB00000
heap
page read and write
1C202CC0000
heap
page read and write
15C41AF0000
heap
page read and write
256DE3C0000
heap
page read and write
7FF611790000
unkown
page readonly
17422DC0000
heap
page read and write
261B8E30000
heap
page read and write
25E44200000
heap
page read and write
1E0EC390000
heap
page read and write
1E958670000
heap
page read and write
1FF9C560000
heap
page read and write
1EEE03EC000
heap
page read and write
17422DCC000
heap
page read and write
5D4310C000
stack
page read and write
16AAF7D5000
heap
page read and write
227D87A0000
heap
page read and write
1E7DC0E5000
heap
page read and write
20BFADB0000
heap
page read and write
C9E9EFF000
stack
page read and write
2492EF10000
direct allocation
page read and write
2492CEBF000
heap
page read and write
212366B0000
heap
page read and write
A3316FF000
unkown
page read and write
1E0EC4B0000
heap
page read and write
21584750000
heap
page read and write
1B062777000
heap
page read and write
2492CEBF000
heap
page read and write
15A56DC0000
heap
page read and write
2C1AFC20000
heap
page read and write
28858E86000
heap
page read and write
D1EAAFF000
unkown
page read and write
1E0EC480000
heap
page read and write
3B0A77C000
stack
page read and write
2492F310000
heap
page read and write
6F3B1FF000
stack
page read and write
1F925660000
heap
page read and write
25C528EC000
heap
page read and write
273A35C000
stack
page read and write
D9EF7FC000
stack
page read and write
1844461C000
heap
page read and write
7FF6117CE000
unkown
page read and write
2725FCD5000
heap
page read and write
24033660000
heap
page read and write
139A5830000
heap
page read and write
15AFB6A0000
heap
page read and write
1DD44A05000
heap
page read and write
139A5860000
heap
page read and write
277BF6B0000
heap
page read and write
1E9588F0000
heap
page read and write
26CFDE55000
heap
page read and write
19CCFC80000
heap
page read and write
1D38C380000
heap
page read and write
18EB56D0000
heap
page read and write
1F7334B0000
heap
page read and write
7FFE10300000
unkown
page readonly
1DF8AD30000
heap
page read and write
1E7DBD50000
heap
page read and write
1E8EA4BB000
heap
page read and write
1DF8B050000
heap
page read and write
79A89CC000
stack
page read and write
1474FC25000
heap
page read and write
1C202FE0000
heap
page read and write
8CCD1AC000
stack
page read and write
25136350000
heap
page read and write
17F8B6D0000
heap
page read and write
2492CE61000
heap
page read and write
1DF8ADD9000
heap
page read and write
156B83D0000
heap
page read and write
23786CF5000
heap
page read and write
18481565000
heap
page read and write
834D19B000
stack
page read and write
26BE1FF000
stack
page read and write
7FFDFB441000
unkown
page write copy
26E5E900000
heap
page read and write
26556720000
heap
page read and write
187A1F3C000
heap
page read and write
195A0395000
heap
page read and write
1A9B760C000
heap
page read and write
22557EE0000
heap
page read and write
8302CFF000
unkown
page read and write
20BFAF20000
heap
page read and write
312CFFF000
stack
page read and write
2455C740000
heap
page read and write
189C05E0000
heap
page read and write
1D38C17B000
heap
page read and write
18444637000
heap
page read and write
205D6E00000
heap
page read and write
27666FF000
unkown
page read and write
4F2A1FF000
unkown
page read and write
21236970000
heap
page read and write
1C03F5C7000
heap
page read and write
1890269C000
heap
page read and write
18C4D2D5000
heap
page read and write
1C6E5A80000
heap
page read and write
26D144A0000
heap
page read and write
2260BBF6000
heap
page read and write
1C343D95000
heap
page read and write
1D3CEBF0000
heap
page read and write
19CCFC90000
heap
page read and write
15C41B30000
heap
page read and write
205D7165000
heap
page read and write
24A36E30000
heap
page read and write
17868B80000
heap
page read and write
2492EB50000
direct allocation
page read and write
1BF139F0000
heap
page read and write
1A6B8A20000
heap
page read and write
1C618FD8000
heap
page read and write
24033727000
heap
page read and write
26ECCB97000
heap
page read and write
20E67B80000
heap
page read and write
19A7A1F0000
heap
page read and write
15AFB510000
heap
page read and write
91EF6FF000
unkown
page read and write
26CFDAE0000
heap
page read and write
2492CE8B000
heap
page read and write
DF0CEFF000
stack
page read and write
8E823FF000
stack
page read and write
1E0EC51F000
heap
page read and write
7FFE004C0000
unkown
page readonly
1E741610000
heap
page read and write
18C4D2B0000
heap
page read and write
19D7CA00000
heap
page read and write
3CC37FF000
stack
page read and write
1117FFE000
unkown
page read and write
22376AB0000
heap
page read and write
2492CE5F000
heap
page read and write
1D12EFF000
stack
page read and write
2492F2F2000
heap
page read and write
1E0EC51A000
heap
page read and write
7FFE12E15000
unkown
page readonly
22558025000
heap
page read and write
195A0540000
heap
page read and write
195A0370000
heap
page read and write
204C3C4B000
heap
page read and write
1EECD700000
heap
page read and write
1E0EC470000
heap
page readonly
2A6CCCC5000
heap
page read and write
18E0E730000
heap
page read and write
25953B50000
heap
page read and write
169C1DDB000
heap
page read and write
22733C00000
heap
page read and write
184444A0000
heap
page read and write
20C0D450000
heap
page read and write
1F6CFC000
stack
page read and write
1E8EA4D6000
heap
page read and write
21584535000
heap
page read and write
116B79F0000
heap
page read and write
205D6E97000
heap
page read and write
1E10FEE0000
heap
page read and write
2260BB30000
heap
page read and write
7FF611791000
unkown
page execute read
1CC83530000
heap
page read and write
2D09B570000
heap
page read and write
19A7A210000
heap
page read and write
E6332FF000
stack
page read and write
1B062775000
heap
page read and write
F980AFC000
stack
page read and write
7FFE12E19000
unkown
page read and write
7FFE11ED9000
unkown
page readonly
19F418C7000
heap
page read and write
25D9DA40000
heap
page read and write
1FDD4C90000
heap
page read and write
205D6E10000
heap
page read and write
21F0922C000
heap
page read and write
7FFDFB67A000
unkown
page readonly
1D38C370000
heap
page read and write
6D9DFF000
unkown
page read and write
1D3CEAA0000
heap
page read and write
116B7915000
heap
page read and write
1B062758000
heap
page read and write
2492CE73000
heap
page read and write
7FFE10301000
unkown
page execute read
2492CEE0000
heap
page read and write
4F2A0FB000
stack
page read and write
116B7720000
heap
page read and write
23786BD0000
heap
page read and write
977CFFF000
stack
page read and write
20C7D6AC000
heap
page read and write
25136376000
heap
page read and write
46E7BFF000
stack
page read and write
1E5640C0000
heap
page read and write
1F791970000
heap
page read and write
26CFDB95000
heap
page read and write
2C1AFD2C000
heap
page read and write
2A5DD370000
heap
page read and write
1E5640F0000
heap
page read and write
189C05E5000
heap
page read and write
1EE79090000
heap
page read and write
26556710000
heap
page read and write
312CB4C000
stack
page read and write
ECFCCFE000
stack
page read and write
19A7A215000
heap
page read and write
17C59900000
heap
page read and write
57A86FC000
stack
page read and write
1DD449A0000
heap
page read and write
26CFDD40000
heap
page read and write
199C1FF000
stack
page read and write
1FA50FF000
stack
page read and write
7C67CFF000
unkown
page read and write
25D9D7E0000
heap
page read and write
2122C070000
heap
page read and write
20E67C30000
heap
page read and write
159E6855000
heap
page read and write
2492CE8F000
heap
page read and write
20C0D4D5000
heap
page read and write
1EECD965000
heap
page read and write
1C6E5906000
heap
page read and write
7FFDFB447000
unkown
page read and write
15DF3F25000
heap
page read and write
1EDE470C000
heap
page read and write
26ECCB97000
heap
page read and write
2260BB50000
heap
page read and write
D9DFBFF000
unkown
page read and write
7D2D94C000
stack
page read and write
2492CED9000
heap
page read and write
22558000000
heap
page read and write
1E0EC51E000
heap
page read and write
1EECD725000
heap
page read and write
18481520000
heap
page read and write
1DD44DA5000
heap
page read and write
288590C5000
heap
page read and write
187A1F55000
heap
page read and write
19D7CA25000
heap
page read and write
1EEE0780000
heap
page read and write
2492CFD0000
heap
page readonly
7FFE00533000
unkown
page readonly
17868BA8000
heap
page read and write
26ECCB78000
heap
page read and write
1C03F570000
heap
page read and write
1CC83330000
heap
page read and write
2366E800000
heap
page read and write
18C4D2D7000
heap
page read and write
116B7820000
heap
page read and write
7FFE11EE3000
unkown
page readonly
17F8B520000
heap
page read and write
25E441D0000
heap
page read and write
C80AFB000
stack
page read and write
1FDD4EE5000
heap
page read and write
1D12DFF000
unkown
page read and write
1EECD6D0000
heap
page read and write
A7CA4FF000
unkown
page read and write
1EECD70C000
heap
page read and write
3C2FBFF000
unkown
page read and write
91EF35B000
stack
page read and write
20BC0E07000
heap
page read and write
1DA0E080000
heap
page read and write
1E0EC51F000
heap
page read and write
25E4428C000
heap
page read and write
17C59947000
heap
page read and write
2122C360000
heap
page read and write
2A5DD2B0000
heap
page read and write
18481740000
heap
page read and write
1C343CA0000
heap
page read and write
1C03F5A0000
heap
page read and write
1B062650000
heap
page read and write
226D3DC0000
heap
page read and write
186FBE7000
stack
page read and write
16E2B680000
heap
page read and write
1DBF6B65000
heap
page read and write
A0636FF000
unkown
page read and write
1E0EC51F000
heap
page read and write
1E10FEC0000
heap
page read and write
7FFE1031B000
unkown
page read and write
25C52800000
heap
page read and write
1A6B8BC0000
heap
page read and write
1D38C19A000
heap
page read and write
1A9B7870000
heap
page read and write
E7F54FB000
stack
page read and write
1DBF6AB0000
heap
page read and write
20C7D970000
heap
page read and write
7FFE12E11000
unkown
page execute read
2492EF10000
direct allocation
page read and write
2A592FC000
stack
page read and write
26556589000
heap
page read and write
28B22450000
heap
page read and write
1BF13AA8000
heap
page read and write
256DE486000
heap
page read and write
EB4A2FB000
stack
page read and write
6DB9AFF000
unkown
page read and write
18444710000
heap
page read and write
2492CE98000
heap
page read and write
1F7334D7000
heap
page read and write
A83FDEC000
stack
page read and write
2D521FF000
stack
page read and write
15AFB5F0000
heap
page read and write
7FFE10264000
unkown
page readonly
1E0EC51F000
heap
page read and write
2122C010000
heap
page read and write
71E70FE000
unkown
page read and write
17AF8DC8000
heap
page read and write
2492EF10000
direct allocation
page read and write
26D143D0000
heap
page read and write
15AFB6C5000
heap
page read and write
1F871107000
heap
page read and write
2455C8B0000
heap
page read and write
2114C190000
heap
page read and write
1E110045000
heap
page read and write
25953CB7000
heap
page read and write
19F41A70000
heap
page read and write
18481710000
heap
page read and write
2492F2FF000
heap
page read and write
A33133B000
stack
page read and write
C5BC0FF000
stack
page read and write
2492CEF0000
heap
page read and write
427E0FE000
stack
page read and write
2492CED9000
heap
page read and write
6DB9BFF000
stack
page read and write
ECFCAFC000
stack
page read and write
50D70FF000
stack
page read and write
2492CE9F000
heap
page read and write
7FF6117CE000
unkown
page write copy
20E944C6000
heap
page read and write
23786A0C000
heap
page read and write
26556660000
heap
page read and write
7FFDFB3F5000
unkown
page readonly
1EEE05D0000
heap
page read and write
288590D0000
heap
page read and write
19D7CA27000
heap
page read and write
21F09320000
heap
page read and write
A7C82FF000
unkown
page read and write
F8F8FB000
stack
page read and write
7FD7FF000
stack
page read and write
82D04FC000
stack
page read and write
25136270000
heap
page read and write
7FFE126F3000
unkown
page readonly
26ECCAA0000
heap
page read and write
8E81F5C000
stack
page read and write
1E958690000
heap
page read and write
21236965000
heap
page read and write
1C6E5A90000
heap
page read and write
2114C050000
heap
page read and write
56C9FE000
unkown
page read and write
199BD9C000
stack
page read and write
3755FFE000
unkown
page read and write
199C0FE000
unkown
page read and write
D084B3B000
stack
page read and write
116B7850000
heap
page read and write
1E8EA4D8000
heap
page read and write
25136190000
heap
page read and write
21A3E8F0000
heap
page read and write
1E8EA6E0000
heap
page read and write
7FFE11ED0000
unkown
page readonly
15C41B9C000
heap
page read and write
22558027000
heap
page read and write
1EA0F7C0000
heap
page read and write
1F791A88000
heap
page read and write
1F791A86000
heap
page read and write
1F7334D6000
heap
page read and write
2492EF50000
heap
page read and write
1A9B7875000
heap
page read and write
1EDE4700000
heap
page read and write
26E5E90C000
heap
page read and write
2492CEBF000
heap
page read and write
1D38C198000
heap
page read and write
1ABDD280000
heap
page read and write
15A56ED7000
heap
page read and write
724A5AC000
stack
page read and write
2492F2FB000
heap
page read and write
2492EF10000
direct allocation
page read and write
17F8B570000
heap
page read and write
159E6830000
heap
page read and write
1936CED8000
heap
page read and write
1DF8B045000
heap
page read and write
22376D40000
heap
page read and write
15C41D60000
heap
page read and write
159E67E0000
heap
page read and write
21495C05000
heap
page read and write
7FFE130C6000
unkown
page readonly
227D861C000
heap
page read and write
18C4D2BB000
heap
page read and write
7E1E9FF000
unkown
page read and write
1D38C070000
heap
page read and write
2211EA50000
heap
page read and write
1E10FCFC000
heap
page read and write
1E0EC51F000
heap
page read and write
1C619100000
heap
page read and write
7FFE11EB0000
unkown
page readonly
720A1FF000
stack
page read and write
1A6B8ACC000
heap
page read and write
156B82F0000
heap
page read and write
914B3FF000
stack
page read and write
1E0EC51F000
heap
page read and write
20E94330000
heap
page read and write
24033720000
heap
page read and write
25953C30000
heap
page read and write
25953C50000
heap
page read and write
1E0EC51F000
heap
page read and write
2492EF10000
direct allocation
page read and write
20BC0F20000
heap
page read and write
26D145A0000
heap
page read and write
1C343CC0000
heap
page read and write
914B2FF000
unkown
page read and write
1F733470000
heap
page read and write
1B062735000
heap
page read and write
D88F6FC000
stack
page read and write
1DD44BB0000
heap
page read and write
1A6B8AC0000
heap
page read and write
2A6CCA20000
heap
page read and write
6F3AD7C000
stack
page read and write
A8401FF000
stack
page read and write
1C6190B0000
heap
page read and write
20C0D5B0000
heap
page read and write
1A9B7700000
heap
page read and write
C5BBEFB000
stack
page read and write
1E10FD15000
heap
page read and write
D084FFF000
stack
page read and write
1D3CED80000
heap
page read and write
186FDDE000
stack
page read and write
17868B60000
heap
page read and write
184445A0000
heap
page read and write
18444580000
heap
page read and write
1E8EA4D8000
heap
page read and write
2492EF10000
direct allocation
page read and write
26556587000
heap
page read and write
834D5FF000
stack
page read and write
21F090B0000
heap
page read and write
1E5640A0000
heap
page read and write
18C4D210000
heap
page read and write
7FD3FC000
stack
page read and write
26556530000
heap
page read and write
A5853FF000
stack
page read and write
19D7CA0C000
heap
page read and write
26ECCB70000
heap
page read and write
365BBFF000
stack
page read and write
1F9256B5000
heap
page read and write
2A6CCA40000
heap
page read and write
7FF6117D6000
unkown
page readonly
18E0E950000
heap
page read and write
19BFF58C000
heap
page read and write
16AAF677000
heap
page read and write
15A56EF6000
heap
page read and write
1E8EA5B0000
heap
page read and write
7FFDFB469000
unkown
page readonly
1DA0E1A6000
heap
page read and write
156B8136000
heap
page read and write
1A6B8A10000
heap
page read and write
1F7336A0000
heap
page read and write
16AAF600000
heap
page read and write
17422FB0000
heap
page read and write
2260BBF8000
heap
page read and write
227D87B0000
heap
page read and write
28858E40000
heap
page read and write
8CCD5FF000
stack
page read and write
7FFE10260000
unkown
page readonly
1A3271B000
stack
page read and write
AC8257C000
stack
page read and write
187A20B5000
heap
page read and write
527B0FF000
unkown
page read and write
205D6E30000
heap
page read and write
17AF8D40000
heap
page read and write
1BF13A8B000
heap
page read and write
20E946B0000
heap
page read and write
2492CEDB000
heap
page read and write
1E741590000
heap
page read and write
2A5DD5E5000
heap
page read and write
2725F910000
heap
page read and write
1E0EC500000
heap
page read and write
169C1DB0000
heap
page read and write
25C52700000
heap
page read and write
1BF13A00000
heap
page read and write
1E9588E0000
heap
page read and write
20BC0E05000
heap
page read and write
2492E7B0000
heap
page read and write
20A4A965000
heap
page read and write
5D435FF000
stack
page read and write
19A7A400000
heap
page read and write
204C3E70000
heap
page read and write
21495DB0000
heap
page read and write
1F791CF5000
heap
page read and write
169C2150000
heap
page read and write
226D3DD0000
heap
page read and write
17C59AF0000
heap
page read and write
16E2B728000
heap
page read and write
7FFE148E0000
unkown
page readonly
79A8DFF000
stack
page read and write
53F20FC000
stack
page read and write
B2AD74B000
stack
page read and write
2492EB90000
direct allocation
page read and write
EA09B7C000
stack
page read and write
204C3C68000
heap
page read and write
1FF9C675000
heap
page read and write
8CCD4FE000
unkown
page read and write
261B8E55000
heap
page read and write
1D3CEBA0000
heap
page read and write
18444635000
heap
page read and write
28B22195000
heap
page read and write
16E2B6A5000
heap
page read and write
3B0ABFF000
stack
page read and write
20E94430000
heap
page read and write
2C1AFCC0000
heap
page read and write
2A6CCCD0000
heap
page read and write
2492EF10000
direct allocation
page read and write
15DF3F0C000
heap
page read and write
18C4D2D7000
heap
page read and write
E3BD2FF000
unkown
page read and write
205D6EB7000
heap
page read and write
16E2B700000
heap
page read and write
17C59947000
heap
page read and write
1F791890000
heap
page read and write
7FFDFB195000
unkown
page execute read
1BF13D20000
heap
page read and write
1F871240000
heap
page read and write
1C6E5908000
heap
page read and write
169C1DF8000
heap
page read and write
1E7DBE50000
heap
page read and write
1C202E40000
heap
page read and write
116B78F0000
heap
page read and write
1E152FC000
stack
page read and write
21495B40000
heap
page read and write
1E297920000
heap
page read and write
22557FE0000
heap
page read and write
1C343BA0000
heap
page read and write
2492ED90000
direct allocation
page read and write
1E741635000
heap
page read and write
16E2B800000
heap
page read and write
26E5E840000
heap
page read and write
6D9CFB000
stack
page read and write
D4AE14C000
stack
page read and write
212367B0000
heap
page read and write
1474FA0B000
heap
page read and write
22733A90000
heap
page read and write
1E0EC528000
heap
page read and write
195A02F0000
heap
page read and write
17868A80000
heap
page read and write
18902915000
heap
page read and write
1FF9C46C000
heap
page read and write
7FF6117D6000
unkown
page readonly
19BFF845000
heap
page read and write
261B8DC0000
heap
page read and write
17868BA6000
heap
page read and write
3B0AAFF000
unkown
page read and write
7FF611790000
unkown
page readonly
A135FF000
unkown
page read and write
7BDBBFF000
stack
page read and write
2492CEBF000
heap
page read and write
463BFFF000
unkown
page read and write
19CCFAD0000
heap
page read and write
28B22460000
heap
page read and write
25D9D888000
heap
page read and write
549E5FF000
stack
page read and write
20A4AC40000
heap
page read and write
1F92569C000
heap
page read and write
1C03F7C5000
heap
page read and write
18902630000
heap
page read and write
1BF13A80000
heap
page read and write
B572CFF000
stack
page read and write
8E822FF000
unkown
page read and write
1ABDD290000
heap
page read and write
22376D35000
heap
page read and write
2114C090000
heap
page read and write
1EECD960000
heap
page read and write
1E563FC6000
heap
page read and write
16AAF7D0000
heap
page read and write
1C03F5AB000
heap
page read and write
1E563FA0000
heap
page read and write
263DB4AC000
heap
page read and write
7FFE0055B000
unkown
page readonly
139A5820000
heap
page read and write
EB4A3FF000
unkown
page read and write
B61A3FF000
stack
page read and write
D1EABFF000
stack
page read and write
1EE79220000
heap
page read and write
17422FA5000
heap
page read and write
19D7C980000
heap
page read and write
1F925640000
heap
page read and write
20E67BA0000
heap
page read and write
240080EC000
heap
page read and write
21A3E8D0000
heap
page read and write
1DA0E180000
heap
page read and write
20A4A947000
heap
page read and write
18E0E78C000
heap
page read and write
BE7CBFF000
stack
page read and write
1E7DBF06000
heap
page read and write
2492CE9C000
heap
page read and write
2211EA78000
heap
page read and write
D674EFC000
stack
page read and write
19F41800000
heap
page read and write
4E7F8FF000
stack
page read and write
1B71B620000
heap
page read and write
156B8210000
heap
page read and write
2655656C000
heap
page read and write
2513635C000
heap
page read and write
17422EC0000
heap
page read and write
2A5DD37C000
heap
page read and write
116B7800000
heap
page read and write
2C1AFD20000
heap
page read and write
2492CE66000
heap
page read and write
1EDE46C0000
heap
page read and write
156B83C5000
heap
page read and write
FBB04FB000
stack
page read and write
1FA4FFE000
unkown
page read and write
26ECCAC0000
heap
page read and write
1C343D70000
heap
page read and write
1C96E4C7000
heap
page read and write
240080E0000
heap
page read and write
263DB4C5000
heap
page read and write
1C6E5908000
heap
page read and write
82D06FF000
stack
page read and write
1B062730000
heap
page read and write
1B062570000
heap
page read and write
28B22178000
heap
page read and write
A68C1FE000
unkown
page read and write
15A56ED0000
heap
page read and write
156B8138000
heap
page read and write
1936D080000
heap
page read and write
20A4AB20000
heap
page read and write
463C0FF000
stack
page read and write
C9E9CFB000
stack
page read and write
17868D60000
heap
page read and write
1DF8B040000
heap
page read and write
263DB6B5000
heap
page read and write
91BF1FF000
unkown
page read and write
463BEFB000
stack
page read and write
2273399C000
heap
page read and write
15C41B35000
heap
page read and write
277BF6E0000
heap
page read and write
65652FB000
stack
page read and write
1C03F540000
heap
page read and write
1FDD4C9C000
heap
page read and write
2492EBD0000
direct allocation
page read and write
17C598F0000
heap
page read and write
15C41B00000
heap
page read and write
261B8DB0000
heap
page read and write
64540FC000
stack
page read and write
1D3CEBFB000
heap
page read and write
D88F8FF000
stack
page read and write
38716FF000
stack
page read and write
2492F520000
direct allocation
page read and write
549E4FF000
unkown
page read and write
1474FA28000
heap
page read and write
28B22150000
heap
page read and write
2492CE68000
heap
page read and write
17C59B10000
heap
page read and write
21584700000
heap
page read and write
1EEE03A0000
heap
page read and write
169C1FA0000
heap
page read and write
45396FC000
stack
page read and write
1D38C150000
heap
page read and write
1E8EA690000
heap
page read and write
EA09EFF000
unkown
page read and write
26CFDB70000
heap
page read and write
1C6E58E0000
heap
page read and write
1F9258B0000
heap
page read and write
189C02E0000
heap
page read and write
E3BD3FF000
stack
page read and write
12843070000
heap
page read and write
C75771C000
stack
page read and write
20E67AA0000
heap
page read and write
261CDFF000
stack
page read and write
20E67990000
heap
page read and write
7FFDFB480000
unkown
page readonly
E3845FE000
unkown
page read and write
20BFAE20000
heap
page read and write
2C1AFB40000
heap
page read and write
2492F0A0000
direct allocation
page read and write
C757AFE000
unkown
page read and write
2492CE8A000
heap
page read and write
2C1AFCC5000
heap
page read and write
204C3E75000
heap
page read and write
25C529E0000
heap
page read and write
ECFCBFF000
unkown
page read and write
1B71B720000
heap
page read and write
15DF3EA0000
heap
page read and write
2492E800000
heap
page read and write
79B34FC000
stack
page read and write
26D142D0000
heap
page read and write
57A88FE000
stack
page read and write
1F925630000
heap
page read and write
7FF6117BB000
unkown
page readonly
2492CFE0000
heap
page read and write
16E2B726000
heap
page read and write
16AAF675000
heap
page read and write
1E7417E0000
heap
page read and write
20E679B7000
heap
page read and write
1F925690000
heap
page read and write
1BF13AA6000
heap
page read and write
21F091B0000
heap
page read and write
227337F0000
heap
page read and write
26BDD1C000
stack
page read and write
2366E6D0000
heap
page read and write
1EDE4725000
heap
page read and write
2492CEBF000
heap
page read and write
1CC835B0000
heap
page read and write
55CDBFF000
stack
page read and write
204C3C66000
heap
page read and write
2492CEBF000
heap
page read and write
28858E6C000
heap
page read and write
7FF6117D6000
unkown
page readonly
2492F2D0000
heap
page read and write
26E5EBF0000
heap
page read and write
38714FC000
stack
page read and write
7FFDFB465000
unkown
page readonly
19BFF560000
heap
page read and write
12843080000
heap
page read and write
7FFE00568000
unkown
page readonly
7FFE148E6000
unkown
page readonly
1B71B62C000
heap
page read and write
204C3C00000
heap
page read and write
7FFDFB87F000
unkown
page readonly
2492CE8A000
heap
page read and write
1CC8334C000
heap
page read and write
1C343C95000
heap
page read and write
1FF9C488000
heap
page read and write
19A7A23C000
heap
page read and write
256DE3E0000
heap
page read and write
2C1AFC40000
heap
page read and write
1E297750000
heap
page read and write
16E2B580000
heap
page read and write
21A3E6E7000
heap
page read and write
2492CE69000
heap
page read and write
7FFDFB481000
unkown
page execute read
15A57150000
heap
page read and write
12843375000
heap
page read and write
7FFDFB3CF000
unkown
page readonly
7C67DFE000
stack
page read and write
18481760000
heap
page read and write
1EE79215000
heap
page read and write
25C528E0000
heap
page read and write
2A5DD5E0000
heap
page read and write
C757BFF000
stack
page read and write
1ABDD5A5000
heap
page read and write
1E2976D0000
heap
page read and write
20E67C20000
heap
page read and write
1FF9C670000
heap
page read and write
26ECCDF5000
heap
page read and write
2211EA97000
heap
page read and write
26ECCB95000
heap
page read and write
226D3A70000
heap
page read and write
1FDD4EE0000
heap
page read and write
25D9D700000
heap
page read and write
2492CE68000
heap
page read and write
21F09480000
heap
page read and write
1E0EC52C000
heap
page read and write
2655658A000
heap
page read and write
20A4A940000
heap
page read and write
17868C80000
heap
page read and write
19CCFB0C000
heap
page read and write
226D3B50000
heap
page read and write
204C3E80000
heap
page read and write
1C6E5890000
heap
page read and write
1FDD4D90000
heap
page read and write
19CCFC85000
heap
page read and write
28B22140000
heap
page read and write
18C4D1E0000
heap
page read and write
1D3CEC18000
heap
page read and write
DF0CDFF000
unkown
page read and write
277BF6D0000
heap
page read and write
A584FFB000
stack
page read and write
1E154FF000
stack
page read and write
2A5DD470000
heap
page read and write
22376CA0000
heap
page read and write
2260BBDC000
heap
page read and write
1C96E4C7000
heap
page read and write
E3BCF5C000
stack
page read and write
15DF41A0000
heap
page read and write
17C59C10000
heap
page read and write
20E944AC000
heap
page read and write
16E2B728000
heap
page read and write
1848154C000
heap
page read and write
1DBF6AD0000
heap
page read and write
20C7D5F0000
heap
page read and write
20C0D350000
heap
page read and write
2492CE5F000
heap
page read and write
1C202DC0000
heap
page read and write
24A37070000
heap
page read and write
3C2FCFF000
stack
page read and write
7FD6FF000
unkown
page read and write
1EDE46B0000
heap
page read and write
263DB6C0000
heap
page read and write
7FF611791000
unkown
page execute read
7BBFCFC000
stack
page read and write
20BC0F00000
heap
page read and write
1EA0F5F0000
heap
page read and write
1C343C90000
heap
page read and write
15AFB925000
heap
page read and write
6DE9EFE000
stack
page read and write
1D38C170000
heap
page read and write
53F22FF000
stack
page read and write
7FFE00531000
unkown
page execute read
21F09220000
heap
page read and write
23786A00000
heap
page read and write
26E5E925000
heap
page read and write
187A1F57000
heap
page read and write
18902550000
heap
page read and write
25953DF0000
heap
page read and write
2D09B375000
heap
page read and write
19F418C5000
heap
page read and write
16AAF7E0000
heap
page read and write
2492CEBF000
heap
page read and write
1D3CEC16000
heap
page read and write
858032C000
stack
page read and write
7FF6117BB000
unkown
page readonly
91BF0FC000
stack
page read and write
195A037C000
heap
page read and write
19F41C00000
heap
page read and write
1ABDD33B000
heap
page read and write
1936CEB0000
heap
page read and write
1DD44BD0000
heap
page read and write
D4AE5FF000
stack
page read and write
C9E9DFE000
unkown
page read and write
1CC83365000
heap
page read and write
19D7C960000
heap
page read and write
1F791A60000
heap
page read and write
21A3E6B0000
heap
page read and write
25D9D800000
heap
page read and write
15A56FF0000
heap
page read and write
139A5886000
heap
page read and write
21584755000
heap
page read and write
CC5C33C000
stack
page read and write
20C0D430000
heap
page read and write
5523EFF000
unkown
page read and write
999C0FC000
stack
page read and write
2492EF10000
direct allocation
page read and write
20C7D7A0000
heap
page read and write
25D9DA50000
heap
page read and write
1FF9C46E000
heap
page read and write
1B062670000
heap
page read and write
25E441F5000
heap
page read and write
2114C350000
heap
page read and write
2492CEBF000
heap
page read and write
7FFDFB83B000
unkown
page write copy
18481540000
heap
page read and write
1C96E4C5000
heap
page read and write
24033580000
heap
page read and write
1EA0F590000
heap
page read and write
2114BF50000
heap
page read and write
21A3E8B0000
heap
page read and write
1A9B7470000
heap
page read and write
A0637FF000
stack
page read and write
204C3BF0000
heap
page read and write
17AF8DA0000
heap
page read and write
20E679B7000
heap
page read and write
B4C9EFF000
stack
page read and write
724A9FF000
stack
page read and write
21A3E6E6000
heap
page read and write
1ABDD330000
heap
page read and write
156B8310000
heap
page read and write
There are 1754 hidden memdumps, click here to show them.