IOC Report
Windows-StandardCollector-x64.exe

loading gif

Files

File Path
Type
Category
Malicious
Windows-StandardCollector-x64.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\Desktop\Windows-StandardCollector-x64.exe.log
JSON data
dropped
malicious
C:\Users\user\Desktop\tmp2041392848.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Collection-571345-2024-10-24_14_57_13__0000_UTC.zip
Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
dropped
C:\Users\user\Desktop\tmp1012754768
data
dropped
C:\Users\user\Desktop\tmp1014962456
data
dropped
C:\Users\user\Desktop\tmp102616438
data
dropped
C:\Users\user\Desktop\tmp1028235396
data
dropped
C:\Users\user\Desktop\tmp1038091834
data
dropped
C:\Users\user\Desktop\tmp1044972604
data
dropped
C:\Users\user\Desktop\tmp1045161861
data
dropped
C:\Users\user\Desktop\tmp1047559858
data
dropped
C:\Users\user\Desktop\tmp1048028079
data
dropped
C:\Users\user\Desktop\tmp104976664
data
dropped
C:\Users\user\Desktop\tmp1057735225
data
dropped
C:\Users\user\Desktop\tmp105984698
data
dropped
C:\Users\user\Desktop\tmp1065758265
data
dropped
C:\Users\user\Desktop\tmp1068106792
data
dropped
C:\Users\user\Desktop\tmp1077680265
data
dropped
C:\Users\user\Desktop\tmp1078970775
data
dropped
C:\Users\user\Desktop\tmp1086607201
data
dropped
C:\Users\user\Desktop\tmp1094524548
data
dropped
C:\Users\user\Desktop\tmp1097001616
data
dropped
C:\Users\user\Desktop\tmp1098055070
data
dropped
C:\Users\user\Desktop\tmp1100544002
data
dropped
C:\Users\user\Desktop\tmp1106357732
data
dropped
C:\Users\user\Desktop\tmp110845717
data
dropped
C:\Users\user\Desktop\tmp111200523
data
dropped
C:\Users\user\Desktop\tmp1117396737
data
dropped
C:\Users\user\Desktop\tmp1122396903
data
dropped
C:\Users\user\Desktop\tmp1122885895
data
dropped
C:\Users\user\Desktop\tmp1124195366
data
dropped
C:\Users\user\Desktop\tmp1129238084
data
dropped
C:\Users\user\Desktop\tmp1129777390
data
dropped
C:\Users\user\Desktop\tmp1130404709
data
dropped
C:\Users\user\Desktop\tmp1136998551
data
dropped
C:\Users\user\Desktop\tmp1141735578
data
dropped
C:\Users\user\Desktop\tmp1153126815
data
dropped
C:\Users\user\Desktop\tmp116269332
data
dropped
C:\Users\user\Desktop\tmp1164635230
data
dropped
C:\Users\user\Desktop\tmp1164777051
data
dropped
C:\Users\user\Desktop\tmp1166413177
data
dropped
C:\Users\user\Desktop\tmp1168983372
data
dropped
C:\Users\user\Desktop\tmp1176042413
data
dropped
C:\Users\user\Desktop\tmp1183934269
data
dropped
C:\Users\user\Desktop\tmp1185040208
data
dropped
C:\Users\user\Desktop\tmp1187841089
data
dropped
C:\Users\user\Desktop\tmp1191856500
data
dropped
C:\Users\user\Desktop\tmp1194479648
data
dropped
C:\Users\user\Desktop\tmp1195595891
data
dropped
C:\Users\user\Desktop\tmp1197378598
data
dropped
C:\Users\user\Desktop\tmp1198368871
data
dropped
C:\Users\user\Desktop\tmp1200005236
data
dropped
C:\Users\user\Desktop\tmp1200209205
data
dropped
C:\Users\user\Desktop\tmp1202945331
data
dropped
C:\Users\user\Desktop\tmp1204578388
data
dropped
C:\Users\user\Desktop\tmp1206958338
data
dropped
C:\Users\user\Desktop\tmp1216251240
data
dropped
C:\Users\user\Desktop\tmp1225522262
data
dropped
C:\Users\user\Desktop\tmp1229570003
data
dropped
C:\Users\user\Desktop\tmp1237335618
data
dropped
C:\Users\user\Desktop\tmp124635854
data
dropped
C:\Users\user\Desktop\tmp125063007
data
dropped
C:\Users\user\Desktop\tmp1257573817
data
dropped
C:\Users\user\Desktop\tmp125787135
data
dropped
C:\Users\user\Desktop\tmp1266871770
data
dropped
C:\Users\user\Desktop\tmp1277555743
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp127757409
data
dropped
C:\Users\user\Desktop\tmp1280711811
data
dropped
C:\Users\user\Desktop\tmp1293160534
data
dropped
C:\Users\user\Desktop\tmp1300346906
data
dropped
C:\Users\user\Desktop\tmp1315321331
data
dropped
C:\Users\user\Desktop\tmp1317526015
data
dropped
C:\Users\user\Desktop\tmp1320810440
data
dropped
C:\Users\user\Desktop\tmp132345547
data
dropped
C:\Users\user\Desktop\tmp1323461169
data
dropped
C:\Users\user\Desktop\tmp1326228054
data
dropped
C:\Users\user\Desktop\tmp1326889926
data
dropped
C:\Users\user\Desktop\tmp1329910983
data
dropped
C:\Users\user\Desktop\tmp1335502235
data
dropped
C:\Users\user\Desktop\tmp1340551896
data
dropped
C:\Users\user\Desktop\tmp134497037
data
dropped
C:\Users\user\Desktop\tmp1348601917
data
dropped
C:\Users\user\Desktop\tmp1348988852
data
dropped
C:\Users\user\Desktop\tmp1355857156
data
dropped
C:\Users\user\Desktop\tmp1361536859
data
dropped
C:\Users\user\Desktop\tmp1361979259
data
dropped
C:\Users\user\Desktop\tmp13653015
data
dropped
C:\Users\user\Desktop\tmp1370346571
data
dropped
C:\Users\user\Desktop\tmp1375306401
data
dropped
C:\Users\user\Desktop\tmp1381339134
data
dropped
C:\Users\user\Desktop\tmp1382683707
data
dropped
C:\Users\user\Desktop\tmp1384932641
data
dropped
C:\Users\user\Desktop\tmp1387449791
data
dropped
C:\Users\user\Desktop\tmp1397709922
data
dropped
C:\Users\user\Desktop\tmp1405575306
data
dropped
C:\Users\user\Desktop\tmp142461417
data
dropped
C:\Users\user\Desktop\tmp142612299
data
dropped
C:\Users\user\Desktop\tmp1426636151
data
dropped
C:\Users\user\Desktop\tmp1432827580
data
dropped
C:\Users\user\Desktop\tmp1432900173
data
dropped
C:\Users\user\Desktop\tmp1438989194
data
dropped
C:\Users\user\Desktop\tmp1439725926
data
dropped
C:\Users\user\Desktop\tmp1439913025
data
dropped
C:\Users\user\Desktop\tmp1447286793
data
dropped
C:\Users\user\Desktop\tmp1459233155
data
dropped
C:\Users\user\Desktop\tmp1459538010
data
dropped
C:\Users\user\Desktop\tmp1471839110
data
dropped
C:\Users\user\Desktop\tmp1475297254
data
dropped
C:\Users\user\Desktop\tmp1476955432
data
dropped
C:\Users\user\Desktop\tmp1481222691
data
dropped
C:\Users\user\Desktop\tmp1495185938
data
dropped
C:\Users\user\Desktop\tmp1496502115
data
dropped
C:\Users\user\Desktop\tmp1502974402
data
dropped
C:\Users\user\Desktop\tmp1507916356
data
dropped
C:\Users\user\Desktop\tmp1508868082
data
dropped
C:\Users\user\Desktop\tmp1515814215
data
dropped
C:\Users\user\Desktop\tmp1519486015
data
dropped
C:\Users\user\Desktop\tmp1531515205
data
dropped
C:\Users\user\Desktop\tmp153458777
data
dropped
C:\Users\user\Desktop\tmp1534679325
data
dropped
C:\Users\user\Desktop\tmp1537897652
data
dropped
C:\Users\user\Desktop\tmp1543002734
data
dropped
C:\Users\user\Desktop\tmp1554456169
data
dropped
C:\Users\user\Desktop\tmp155575677
data
dropped
C:\Users\user\Desktop\tmp1557607845
data
dropped
C:\Users\user\Desktop\tmp1558223359
data
dropped
C:\Users\user\Desktop\tmp1566826595
data
dropped
C:\Users\user\Desktop\tmp1570550482
data
dropped
C:\Users\user\Desktop\tmp1580711884
data
dropped
C:\Users\user\Desktop\tmp1584654222
data
dropped
C:\Users\user\Desktop\tmp1584720451
data
dropped
C:\Users\user\Desktop\tmp1586598627
data
dropped
C:\Users\user\Desktop\tmp158828761
data
dropped
C:\Users\user\Desktop\tmp1592604908
data
dropped
C:\Users\user\Desktop\tmp1600511308
data
dropped
C:\Users\user\Desktop\tmp1623563607
data
dropped
C:\Users\user\Desktop\tmp162705659
data
dropped
C:\Users\user\Desktop\tmp1648654135
data
dropped
C:\Users\user\Desktop\tmp1650239840
data
dropped
C:\Users\user\Desktop\tmp1664178919
data
dropped
C:\Users\user\Desktop\tmp1665445341
data
dropped
C:\Users\user\Desktop\tmp1674806008
data
dropped
C:\Users\user\Desktop\tmp1678723259
data
dropped
C:\Users\user\Desktop\tmp169654671
data
dropped
C:\Users\user\Desktop\tmp1699009141
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp1702766214
data
dropped
C:\Users\user\Desktop\tmp1703476791
data
dropped
C:\Users\user\Desktop\tmp1720625312
data
dropped
C:\Users\user\Desktop\tmp1723033899
data
dropped
C:\Users\user\Desktop\tmp1756799688
data
dropped
C:\Users\user\Desktop\tmp1758893003
data
dropped
C:\Users\user\Desktop\tmp1765842009
data
dropped
C:\Users\user\Desktop\tmp1768975996
data
dropped
C:\Users\user\Desktop\tmp1774752583
data
dropped
C:\Users\user\Desktop\tmp1775617769
data
dropped
C:\Users\user\Desktop\tmp1776543853
data
dropped
C:\Users\user\Desktop\tmp1781158423
data
dropped
C:\Users\user\Desktop\tmp1788163639
data
dropped
C:\Users\user\Desktop\tmp1788559572
data
dropped
C:\Users\user\Desktop\tmp1788977225
data
dropped
C:\Users\user\Desktop\tmp1798921049
data
dropped
C:\Users\user\Desktop\tmp1800482814
data
dropped
C:\Users\user\Desktop\tmp1801787651
data
dropped
C:\Users\user\Desktop\tmp1808222906
data
dropped
C:\Users\user\Desktop\tmp1819564523
data
dropped
C:\Users\user\Desktop\tmp1820821857
data
dropped
C:\Users\user\Desktop\tmp1821923066
data
dropped
C:\Users\user\Desktop\tmp1835500737
data
dropped
C:\Users\user\Desktop\tmp1838827012
data
dropped
C:\Users\user\Desktop\tmp1838864895
data
dropped
C:\Users\user\Desktop\tmp1839637260
data
dropped
C:\Users\user\Desktop\tmp184323688
data
dropped
C:\Users\user\Desktop\tmp1844113337
data
dropped
C:\Users\user\Desktop\tmp1854743548
data
dropped
C:\Users\user\Desktop\tmp1855882938
data
dropped
C:\Users\user\Desktop\tmp1863995883
data
dropped
C:\Users\user\Desktop\tmp1871895412
data
dropped
C:\Users\user\Desktop\tmp1872134048
data
dropped
C:\Users\user\Desktop\tmp1881096456
data
dropped
C:\Users\user\Desktop\tmp1881963918
data
dropped
C:\Users\user\Desktop\tmp189425084
data
dropped
C:\Users\user\Desktop\tmp1896126920
data
dropped
C:\Users\user\Desktop\tmp1905243594
data
dropped
C:\Users\user\Desktop\tmp1912192042
data
dropped
C:\Users\user\Desktop\tmp1912787083
data
dropped
C:\Users\user\Desktop\tmp1919256029
data
dropped
C:\Users\user\Desktop\tmp1921435176
data
dropped
C:\Users\user\Desktop\tmp1923693677
data
dropped
C:\Users\user\Desktop\tmp1941058429
data
dropped
C:\Users\user\Desktop\tmp1947311822
data
dropped
C:\Users\user\Desktop\tmp1958938918
data
dropped
C:\Users\user\Desktop\tmp1963538016
data
dropped
C:\Users\user\Desktop\tmp197524706
data
dropped
C:\Users\user\Desktop\tmp1978165783
data
dropped
C:\Users\user\Desktop\tmp197918828
data
dropped
C:\Users\user\Desktop\tmp1980100330
data
dropped
C:\Users\user\Desktop\tmp1989618238
data
dropped
C:\Users\user\Desktop\tmp1990908622
data
dropped
C:\Users\user\Desktop\tmp199191939
data
dropped
C:\Users\user\Desktop\tmp1993461006
data
dropped
C:\Users\user\Desktop\tmp1995290166
data
dropped
C:\Users\user\Desktop\tmp2003703859
data
dropped
C:\Users\user\Desktop\tmp200719618
data
dropped
C:\Users\user\Desktop\tmp2007679183
data
dropped
C:\Users\user\Desktop\tmp202597385
data
dropped
C:\Users\user\Desktop\tmp202673928
data
dropped
C:\Users\user\Desktop\tmp2032608109
data
dropped
C:\Users\user\Desktop\tmp2044253824
data
dropped
C:\Users\user\Desktop\tmp204592504
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp2048471638
data
dropped
C:\Users\user\Desktop\tmp2067330719
data
dropped
C:\Users\user\Desktop\tmp2089615102
data
dropped
C:\Users\user\Desktop\tmp2091918371
data
dropped
C:\Users\user\Desktop\tmp2095436354
data
dropped
C:\Users\user\Desktop\tmp2100799668
data
dropped
C:\Users\user\Desktop\tmp2107993013
data
dropped
C:\Users\user\Desktop\tmp2112142012
data
dropped
C:\Users\user\Desktop\tmp2118317981
data
dropped
C:\Users\user\Desktop\tmp2119262189
data
dropped
C:\Users\user\Desktop\tmp2120389470
unicos (cray) executable
dropped
C:\Users\user\Desktop\tmp2120490047
data
dropped
C:\Users\user\Desktop\tmp2131254866
data
dropped
C:\Users\user\Desktop\tmp2132015032
data
dropped
C:\Users\user\Desktop\tmp2142276378
data
dropped
C:\Users\user\Desktop\tmp2158733831
data
dropped
C:\Users\user\Desktop\tmp2159897997
data
dropped
C:\Users\user\Desktop\tmp2184482278
data
dropped
C:\Users\user\Desktop\tmp2187492756
data
dropped
C:\Users\user\Desktop\tmp2188282555
data
dropped
C:\Users\user\Desktop\tmp2192824579
data
dropped
C:\Users\user\Desktop\tmp2194214445
data
dropped
C:\Users\user\Desktop\tmp2196499101
data
dropped
C:\Users\user\Desktop\tmp2199176760
data
dropped
C:\Users\user\Desktop\tmp2199298826
data
dropped
C:\Users\user\Desktop\tmp2202415557
data
dropped
C:\Users\user\Desktop\tmp2204766376
data
dropped
C:\Users\user\Desktop\tmp2205623090
data
dropped
C:\Users\user\Desktop\tmp2209768623
data
dropped
C:\Users\user\Desktop\tmp2211917591
data
dropped
C:\Users\user\Desktop\tmp2216116981
data
dropped
C:\Users\user\Desktop\tmp2226470259
data
dropped
C:\Users\user\Desktop\tmp2229323129
data
dropped
C:\Users\user\Desktop\tmp2230960641
data
dropped
C:\Users\user\Desktop\tmp2232329541
data
dropped
C:\Users\user\Desktop\tmp2238238512
data
dropped
C:\Users\user\Desktop\tmp2241901730
data
dropped
C:\Users\user\Desktop\tmp2252582206
data
dropped
C:\Users\user\Desktop\tmp226761390
data
dropped
C:\Users\user\Desktop\tmp2270433535
data
dropped
C:\Users\user\Desktop\tmp2272443466
data
dropped
C:\Users\user\Desktop\tmp2287281867
data
dropped
C:\Users\user\Desktop\tmp2289732078
data
dropped
C:\Users\user\Desktop\tmp2291605652
data
dropped
C:\Users\user\Desktop\tmp2291888974
data
dropped
C:\Users\user\Desktop\tmp2294695359
data
dropped
C:\Users\user\Desktop\tmp2298876549
data
dropped
C:\Users\user\Desktop\tmp2304969140
data
dropped
C:\Users\user\Desktop\tmp2318922733
data
dropped
C:\Users\user\Desktop\tmp2320215679
data
dropped
C:\Users\user\Desktop\tmp2326695031
data
dropped
C:\Users\user\Desktop\tmp2334029355
data
dropped
C:\Users\user\Desktop\tmp2339794935
data
dropped
C:\Users\user\Desktop\tmp2343523647
data
dropped
C:\Users\user\Desktop\tmp2345297494
data
dropped
C:\Users\user\Desktop\tmp235000716
data
dropped
C:\Users\user\Desktop\tmp2351486155
data
dropped
C:\Users\user\Desktop\tmp2358084536
data
dropped
C:\Users\user\Desktop\tmp2377218136
data
dropped
C:\Users\user\Desktop\tmp2378729891
data
dropped
C:\Users\user\Desktop\tmp2379477348
data
dropped
C:\Users\user\Desktop\tmp2384148094
data
dropped
C:\Users\user\Desktop\tmp2392033517
data
dropped
C:\Users\user\Desktop\tmp2392754283
data
dropped
C:\Users\user\Desktop\tmp2398794695
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp2404612140
data
dropped
C:\Users\user\Desktop\tmp2418699714
data
dropped
C:\Users\user\Desktop\tmp2426852915
data
dropped
C:\Users\user\Desktop\tmp243141417
data
dropped
C:\Users\user\Desktop\tmp2445287627
data
dropped
C:\Users\user\Desktop\tmp2448821179
data
dropped
C:\Users\user\Desktop\tmp2449483749
data
dropped
C:\Users\user\Desktop\tmp244966847
data
dropped
C:\Users\user\Desktop\tmp2449840985
data
dropped
C:\Users\user\Desktop\tmp2451159875
data
dropped
C:\Users\user\Desktop\tmp2452484104
data
dropped
C:\Users\user\Desktop\tmp2485558842
data
dropped
C:\Users\user\Desktop\tmp2493978991
data
dropped
C:\Users\user\Desktop\tmp2509477034
data
dropped
C:\Users\user\Desktop\tmp2515504216
data
dropped
C:\Users\user\Desktop\tmp2515594782
data
dropped
C:\Users\user\Desktop\tmp2527144250
data
dropped
C:\Users\user\Desktop\tmp2531484335
data
dropped
C:\Users\user\Desktop\tmp2534863003
data
dropped
C:\Users\user\Desktop\tmp254208048
data
dropped
C:\Users\user\Desktop\tmp2545462913
data
dropped
C:\Users\user\Desktop\tmp2549805058
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp2551415287
data
dropped
C:\Users\user\Desktop\tmp2552096934
data
dropped
C:\Users\user\Desktop\tmp2553147116
data
dropped
C:\Users\user\Desktop\tmp2565074876
data
dropped
C:\Users\user\Desktop\tmp2569752263
data
dropped
C:\Users\user\Desktop\tmp2582813473
data
dropped
C:\Users\user\Desktop\tmp2586290092
data
dropped
C:\Users\user\Desktop\tmp2588286661
data
dropped
C:\Users\user\Desktop\tmp2596767940
data
dropped
C:\Users\user\Desktop\tmp2603104366
data
dropped
C:\Users\user\Desktop\tmp2604993142
data
dropped
C:\Users\user\Desktop\tmp2606356230
data
dropped
C:\Users\user\Desktop\tmp2608125326
data
dropped
C:\Users\user\Desktop\tmp2612510655
data
dropped
C:\Users\user\Desktop\tmp2630667373
data
dropped
C:\Users\user\Desktop\tmp2635449359
data
dropped
C:\Users\user\Desktop\tmp2636358787
data
dropped
C:\Users\user\Desktop\tmp264744849
data
dropped
C:\Users\user\Desktop\tmp2654585860
data
dropped
C:\Users\user\Desktop\tmp2661514431
data
dropped
C:\Users\user\Desktop\tmp2663593856
data
dropped
C:\Users\user\Desktop\tmp2663910511
data
dropped
C:\Users\user\Desktop\tmp2679092029
data
dropped
C:\Users\user\Desktop\tmp2680482016
data
dropped
C:\Users\user\Desktop\tmp2681193766
data
dropped
C:\Users\user\Desktop\tmp2684384731
data
dropped
C:\Users\user\Desktop\tmp2693179493
data
dropped
C:\Users\user\Desktop\tmp2698493822
data
dropped
C:\Users\user\Desktop\tmp2698508058
data
dropped
C:\Users\user\Desktop\tmp2702944898
data
dropped
C:\Users\user\Desktop\tmp2709210654
data
dropped
C:\Users\user\Desktop\tmp2713661849
data
dropped
C:\Users\user\Desktop\tmp2724163722
data
dropped
C:\Users\user\Desktop\tmp2724419598
data
dropped
C:\Users\user\Desktop\tmp2725451125
data
dropped
C:\Users\user\Desktop\tmp2730050484
data
dropped
C:\Users\user\Desktop\tmp2744324619
data
dropped
C:\Users\user\Desktop\tmp2745679530
data
dropped
C:\Users\user\Desktop\tmp2746419293
data
dropped
C:\Users\user\Desktop\tmp2754377029
data
dropped
C:\Users\user\Desktop\tmp2756775005
data
dropped
C:\Users\user\Desktop\tmp2757081425
data
dropped
C:\Users\user\Desktop\tmp276692696
data
dropped
C:\Users\user\Desktop\tmp2778955283
data
dropped
C:\Users\user\Desktop\tmp2787676944
data
dropped
C:\Users\user\Desktop\tmp2794746648
data
dropped
C:\Users\user\Desktop\tmp2802262599
PGP symmetric key encrypted data - salted & iterated -
dropped
C:\Users\user\Desktop\tmp2806403084
data
dropped
C:\Users\user\Desktop\tmp2806814220
data
dropped
C:\Users\user\Desktop\tmp280769083
data
dropped
C:\Users\user\Desktop\tmp2818619901
data
dropped
C:\Users\user\Desktop\tmp2821480940
data
dropped
C:\Users\user\Desktop\tmp2837411920
data
dropped
C:\Users\user\Desktop\tmp2840983197
data
dropped
C:\Users\user\Desktop\tmp2841511157
data
dropped
C:\Users\user\Desktop\tmp2845630606
data
dropped
C:\Users\user\Desktop\tmp2851056241
data
dropped
C:\Users\user\Desktop\tmp2868793283
data
dropped
C:\Users\user\Desktop\tmp287453225
data
dropped
C:\Users\user\Desktop\tmp2877639007
data
dropped
C:\Users\user\Desktop\tmp2891586290
data
dropped
C:\Users\user\Desktop\tmp2899740768
data
dropped
C:\Users\user\Desktop\tmp2907003019
data
dropped
C:\Users\user\Desktop\tmp2911582165
data
dropped
C:\Users\user\Desktop\tmp2912047921
data
dropped
C:\Users\user\Desktop\tmp2914921971
data
dropped
C:\Users\user\Desktop\tmp2922928926
data
dropped
C:\Users\user\Desktop\tmp2923604057
data
dropped
C:\Users\user\Desktop\tmp2929299067
data
dropped
C:\Users\user\Desktop\tmp2941595114
data
dropped
C:\Users\user\Desktop\tmp2942695036
data
dropped
C:\Users\user\Desktop\tmp2944775008
data
dropped
C:\Users\user\Desktop\tmp2947709175
data
dropped
C:\Users\user\Desktop\tmp2955782460
data
dropped
C:\Users\user\Desktop\tmp2959327891
data
dropped
C:\Users\user\Desktop\tmp2965934094
data
dropped
C:\Users\user\Desktop\tmp296625619
data
dropped
C:\Users\user\Desktop\tmp2968698334
data
dropped
C:\Users\user\Desktop\tmp2974219501
data
dropped
C:\Users\user\Desktop\tmp2974747951
data
dropped
C:\Users\user\Desktop\tmp2981784437
data
dropped
C:\Users\user\Desktop\tmp2996678139
data
dropped
C:\Users\user\Desktop\tmp3004895639
data
dropped
C:\Users\user\Desktop\tmp3011849460
data
dropped
C:\Users\user\Desktop\tmp3012642769
data
dropped
C:\Users\user\Desktop\tmp3012660377
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp3030052852
data
dropped
C:\Users\user\Desktop\tmp3035340115
data
dropped
C:\Users\user\Desktop\tmp303644576
data
dropped
C:\Users\user\Desktop\tmp3036772347
data
dropped
C:\Users\user\Desktop\tmp3043834075
data
dropped
C:\Users\user\Desktop\tmp3044001403
data
dropped
C:\Users\user\Desktop\tmp3053259074
data
dropped
C:\Users\user\Desktop\tmp3056523069
data
dropped
C:\Users\user\Desktop\tmp3057600614
data
dropped
C:\Users\user\Desktop\tmp3057852599
data
dropped
C:\Users\user\Desktop\tmp3063775548
data
dropped
C:\Users\user\Desktop\tmp3065805979
data
dropped
C:\Users\user\Desktop\tmp3075611034
data
dropped
C:\Users\user\Desktop\tmp3076569446
data
dropped
C:\Users\user\Desktop\tmp3079321734
data
dropped
C:\Users\user\Desktop\tmp308113652
data
dropped
C:\Users\user\Desktop\tmp3082747287
data
dropped
C:\Users\user\Desktop\tmp3086928807
data
dropped
C:\Users\user\Desktop\tmp3089901649
data
dropped
C:\Users\user\Desktop\tmp3090887070
data
dropped
C:\Users\user\Desktop\tmp3111869487
data
dropped
C:\Users\user\Desktop\tmp3119045968
data
dropped
C:\Users\user\Desktop\tmp3124114588
data
dropped
C:\Users\user\Desktop\tmp3130746308
data
dropped
C:\Users\user\Desktop\tmp3145150329
data
dropped
C:\Users\user\Desktop\tmp3157200238
data
dropped
C:\Users\user\Desktop\tmp3157898196
data
dropped
C:\Users\user\Desktop\tmp3165551418
data
dropped
C:\Users\user\Desktop\tmp3169708905
data
dropped
C:\Users\user\Desktop\tmp317081545
data
dropped
C:\Users\user\Desktop\tmp3175510798
data
dropped
C:\Users\user\Desktop\tmp3178225435
data
dropped
C:\Users\user\Desktop\tmp3179062323
data
dropped
C:\Users\user\Desktop\tmp3187384902
data
dropped
C:\Users\user\Desktop\tmp3188009500
data
dropped
C:\Users\user\Desktop\tmp3197193487
data
dropped
C:\Users\user\Desktop\tmp319868856
data
dropped
C:\Users\user\Desktop\tmp3201539651
data
dropped
C:\Users\user\Desktop\tmp3203328271
data
dropped
C:\Users\user\Desktop\tmp3207584146
data
dropped
C:\Users\user\Desktop\tmp3211882663
data
dropped
C:\Users\user\Desktop\tmp3218636405
data
dropped
C:\Users\user\Desktop\tmp3223138323
data
dropped
C:\Users\user\Desktop\tmp3225673504
data
dropped
C:\Users\user\Desktop\tmp3227370267
data
dropped
C:\Users\user\Desktop\tmp323194823
data
dropped
C:\Users\user\Desktop\tmp3256633980
data
dropped
C:\Users\user\Desktop\tmp3256694777
data
dropped
C:\Users\user\Desktop\tmp3258673537
data
dropped
C:\Users\user\Desktop\tmp3266686176
data
dropped
C:\Users\user\Desktop\tmp32792515
data
dropped
C:\Users\user\Desktop\tmp3281091149
data
dropped
C:\Users\user\Desktop\tmp3284244235
data
dropped
C:\Users\user\Desktop\tmp328500681
data
dropped
C:\Users\user\Desktop\tmp3286061299
data
dropped
C:\Users\user\Desktop\tmp3292625864
data
dropped
C:\Users\user\Desktop\tmp3298536243
data
dropped
C:\Users\user\Desktop\tmp33028915
data
dropped
C:\Users\user\Desktop\tmp3310890104
data
dropped
C:\Users\user\Desktop\tmp331682102
data
dropped
C:\Users\user\Desktop\tmp3331260883
data
dropped
C:\Users\user\Desktop\tmp3335241590
data
dropped
C:\Users\user\Desktop\tmp3337295506
data
dropped
C:\Users\user\Desktop\tmp3342034393
data
dropped
C:\Users\user\Desktop\tmp337237053
data
dropped
C:\Users\user\Desktop\tmp3376387952
data
dropped
C:\Users\user\Desktop\tmp3378880796
data
dropped
C:\Users\user\Desktop\tmp3390104930
data
dropped
C:\Users\user\Desktop\tmp3395945860
data
dropped
C:\Users\user\Desktop\tmp3404875196
data
dropped
C:\Users\user\Desktop\tmp3414113622
data
dropped
C:\Users\user\Desktop\tmp3415035403
data
dropped
C:\Users\user\Desktop\tmp3416032679
data
dropped
C:\Users\user\Desktop\tmp3421996314
data
dropped
C:\Users\user\Desktop\tmp3423563123
data
dropped
C:\Users\user\Desktop\tmp3433076353
data
dropped
C:\Users\user\Desktop\tmp3438957620
data
dropped
C:\Users\user\Desktop\tmp3442834707
data
dropped
C:\Users\user\Desktop\tmp3450399810
data
dropped
C:\Users\user\Desktop\tmp3453984194
data
dropped
C:\Users\user\Desktop\tmp3457453993
data
dropped
C:\Users\user\Desktop\tmp3458580468
data
dropped
C:\Users\user\Desktop\tmp3471467231
data
dropped
C:\Users\user\Desktop\tmp3475135631
data
dropped
C:\Users\user\Desktop\tmp3475894210
data
dropped
C:\Users\user\Desktop\tmp3477773228
data
dropped
C:\Users\user\Desktop\tmp3477923050
data
dropped
C:\Users\user\Desktop\tmp3483267416
data
dropped
C:\Users\user\Desktop\tmp3486256768
data
dropped
C:\Users\user\Desktop\tmp3490326652
data
dropped
C:\Users\user\Desktop\tmp3490464193
data
dropped
C:\Users\user\Desktop\tmp349190399
data
dropped
C:\Users\user\Desktop\tmp3492744131
data
dropped
C:\Users\user\Desktop\tmp3503570051
data
dropped
C:\Users\user\Desktop\tmp3517646441
data
dropped
C:\Users\user\Desktop\tmp352712287
data
dropped
C:\Users\user\Desktop\tmp3534478168
data
dropped
C:\Users\user\Desktop\tmp3543524610
data
dropped
C:\Users\user\Desktop\tmp3562861362
data
dropped
C:\Users\user\Desktop\tmp3573022505
data
dropped
C:\Users\user\Desktop\tmp3575115937
data
dropped
C:\Users\user\Desktop\tmp3595069541
data
dropped
C:\Users\user\Desktop\tmp3608777923
data
dropped
C:\Users\user\Desktop\tmp361335925
data
dropped
C:\Users\user\Desktop\tmp3617974716
data
dropped
C:\Users\user\Desktop\tmp3620306200
data
dropped
C:\Users\user\Desktop\tmp3623013835
data
dropped
C:\Users\user\Desktop\tmp3625557222
data
dropped
C:\Users\user\Desktop\tmp3638204428
data
dropped
C:\Users\user\Desktop\tmp3644372125
data
dropped
C:\Users\user\Desktop\tmp3646204058
data
dropped
C:\Users\user\Desktop\tmp3652768273
data
dropped
C:\Users\user\Desktop\tmp3660306505
data
dropped
C:\Users\user\Desktop\tmp3661279140
data
dropped
C:\Users\user\Desktop\tmp3675006201
data
dropped
C:\Users\user\Desktop\tmp3679719565
data
dropped
C:\Users\user\Desktop\tmp3679810973
data
dropped
C:\Users\user\Desktop\tmp3700706259
data
dropped
C:\Users\user\Desktop\tmp3707231049
data
dropped
C:\Users\user\Desktop\tmp372676725
data
dropped
C:\Users\user\Desktop\tmp3729809257
data
dropped
C:\Users\user\Desktop\tmp3734845314
data
dropped
C:\Users\user\Desktop\tmp3743142356
data
dropped
C:\Users\user\Desktop\tmp3749276003
data
dropped
C:\Users\user\Desktop\tmp3754622594
data
dropped
C:\Users\user\Desktop\tmp3758187254
data
dropped
C:\Users\user\Desktop\tmp375942539
data
dropped
C:\Users\user\Desktop\tmp3761576793
data
dropped
C:\Users\user\Desktop\tmp3763272616
data
dropped
C:\Users\user\Desktop\tmp3771526525
data
dropped
C:\Users\user\Desktop\tmp3772172788
data
dropped
C:\Users\user\Desktop\tmp3774233020
data
dropped
C:\Users\user\Desktop\tmp3776709676
data
dropped
C:\Users\user\Desktop\tmp3785460147
data
dropped
C:\Users\user\Desktop\tmp3789401290
data
dropped
C:\Users\user\Desktop\tmp3794050483
data
dropped
C:\Users\user\Desktop\tmp3801694141
data
dropped
C:\Users\user\Desktop\tmp3805631145
data
dropped
C:\Users\user\Desktop\tmp382619922
data
dropped
C:\Users\user\Desktop\tmp3827029675
data
dropped
C:\Users\user\Desktop\tmp3831187171
data
dropped
C:\Users\user\Desktop\tmp3846955549
data
dropped
C:\Users\user\Desktop\tmp3854247150
data
dropped
C:\Users\user\Desktop\tmp3854837876
data
dropped
C:\Users\user\Desktop\tmp3865311539
data
dropped
C:\Users\user\Desktop\tmp3873269106
data
dropped
C:\Users\user\Desktop\tmp3876052751
data
dropped
C:\Users\user\Desktop\tmp3884735195
data
dropped
C:\Users\user\Desktop\tmp3907239624
data
dropped
C:\Users\user\Desktop\tmp3916888440
data
dropped
C:\Users\user\Desktop\tmp3918416173
data
dropped
C:\Users\user\Desktop\tmp392550028
data
dropped
C:\Users\user\Desktop\tmp3932184206
data
dropped
C:\Users\user\Desktop\tmp3943281922
data
dropped
C:\Users\user\Desktop\tmp3946664881
data
dropped
C:\Users\user\Desktop\tmp3951989194
data
dropped
C:\Users\user\Desktop\tmp3966715881
data
dropped
C:\Users\user\Desktop\tmp3978025454
data
dropped
C:\Users\user\Desktop\tmp3992844361
data
modified
C:\Users\user\Desktop\tmp3999127280
data
dropped
C:\Users\user\Desktop\tmp4003479509
data
dropped
C:\Users\user\Desktop\tmp4003883724
data
dropped
C:\Users\user\Desktop\tmp4006373062
data
dropped
C:\Users\user\Desktop\tmp4035945192
data
dropped
C:\Users\user\Desktop\tmp4037029581
data
dropped
C:\Users\user\Desktop\tmp4038682793
data
dropped
C:\Users\user\Desktop\tmp4047978657
data
dropped
C:\Users\user\Desktop\tmp4058033965
data
dropped
C:\Users\user\Desktop\tmp4061794434
data
dropped
C:\Users\user\Desktop\tmp4070165166
data
dropped
C:\Users\user\Desktop\tmp4071967961
data
dropped
C:\Users\user\Desktop\tmp4076812542
data
dropped
C:\Users\user\Desktop\tmp4081033378
data
dropped
C:\Users\user\Desktop\tmp4082783648
data
dropped
C:\Users\user\Desktop\tmp4087315130
data
dropped
C:\Users\user\Desktop\tmp4102177220
data
dropped
C:\Users\user\Desktop\tmp4120717610
data
dropped
C:\Users\user\Desktop\tmp4146083769
data
dropped
C:\Users\user\Desktop\tmp4146168961
data
dropped
C:\Users\user\Desktop\tmp4157925855
data
dropped
C:\Users\user\Desktop\tmp417888809
data
dropped
C:\Users\user\Desktop\tmp4193314281
data
dropped
C:\Users\user\Desktop\tmp4204097931
data
dropped
C:\Users\user\Desktop\tmp420664034
data
dropped
C:\Users\user\Desktop\tmp4209677804
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp4223410265
data
dropped
C:\Users\user\Desktop\tmp4228811350
data
dropped
C:\Users\user\Desktop\tmp4230696541
data
dropped
C:\Users\user\Desktop\tmp4242961133
data
dropped
C:\Users\user\Desktop\tmp4244942757
data
dropped
C:\Users\user\Desktop\tmp4255660965
data
dropped
C:\Users\user\Desktop\tmp4261050296
data
dropped
C:\Users\user\Desktop\tmp4261269026
data
dropped
C:\Users\user\Desktop\tmp4261553794
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\Desktop\tmp4261812198
data
dropped
C:\Users\user\Desktop\tmp4269355977
data
dropped
C:\Users\user\Desktop\tmp427369074
data
dropped
C:\Users\user\Desktop\tmp4277832979
data
dropped
C:\Users\user\Desktop\tmp4279594779
data
dropped
C:\Users\user\Desktop\tmp428174380
data
dropped
C:\Users\user\Desktop\tmp4290959250
data
dropped
C:\Users\user\Desktop\tmp4291461239
data
dropped
C:\Users\user\Desktop\tmp436541695
data
dropped
C:\Users\user\Desktop\tmp447303270
data
dropped
C:\Users\user\Desktop\tmp456992049
data
dropped
C:\Users\user\Desktop\tmp46587132
data
dropped
C:\Users\user\Desktop\tmp466226774
data
dropped
C:\Users\user\Desktop\tmp46709368
data
dropped
C:\Users\user\Desktop\tmp468883924
data
dropped
C:\Users\user\Desktop\tmp474479131
data
dropped
C:\Users\user\Desktop\tmp4805815
data
dropped
C:\Users\user\Desktop\tmp481772993
data
dropped
C:\Users\user\Desktop\tmp484767872
data
dropped
C:\Users\user\Desktop\tmp49087186
data
dropped
C:\Users\user\Desktop\tmp491663879
data
dropped
C:\Users\user\Desktop\tmp494353794
data
dropped
C:\Users\user\Desktop\tmp511138340
data
dropped
C:\Users\user\Desktop\tmp513876707
data
dropped
C:\Users\user\Desktop\tmp522069406
data
dropped
C:\Users\user\Desktop\tmp522542792
data
dropped
C:\Users\user\Desktop\tmp527609379
data
dropped
C:\Users\user\Desktop\tmp528690164
data
dropped
C:\Users\user\Desktop\tmp555136351
data
dropped
C:\Users\user\Desktop\tmp556540324
data
dropped
C:\Users\user\Desktop\tmp556884529
data
dropped
C:\Users\user\Desktop\tmp569513047
data
dropped
C:\Users\user\Desktop\tmp570611659
data
dropped
C:\Users\user\Desktop\tmp57257869
data
dropped
C:\Users\user\Desktop\tmp573228687
data
dropped
C:\Users\user\Desktop\tmp586157102
data
dropped
C:\Users\user\Desktop\tmp59085285
data
dropped
C:\Users\user\Desktop\tmp592714901
data
dropped
C:\Users\user\Desktop\tmp593855254
data
dropped
C:\Users\user\Desktop\tmp595906158
data
dropped
C:\Users\user\Desktop\tmp596444260
data
dropped
C:\Users\user\Desktop\tmp596735325
data
dropped
C:\Users\user\Desktop\tmp597177101
data
dropped
C:\Users\user\Desktop\tmp606271032
data
dropped
C:\Users\user\Desktop\tmp615159307
data
dropped
C:\Users\user\Desktop\tmp61711024
data
dropped
C:\Users\user\Desktop\tmp618085471
data
dropped
C:\Users\user\Desktop\tmp619076658
data
dropped
C:\Users\user\Desktop\tmp620251259
data
dropped
C:\Users\user\Desktop\tmp622622582
data
dropped
C:\Users\user\Desktop\tmp632545691
data
dropped
C:\Users\user\Desktop\tmp655043937
data
dropped
C:\Users\user\Desktop\tmp66082114
data
dropped
C:\Users\user\Desktop\tmp664854486
data
dropped
C:\Users\user\Desktop\tmp665693981
PGP symmetric key encrypted data -
dropped
C:\Users\user\Desktop\tmp674388938
data
dropped
C:\Users\user\Desktop\tmp674501287
data
dropped
C:\Users\user\Desktop\tmp675247318
data
dropped
C:\Users\user\Desktop\tmp675593285
data
dropped
C:\Users\user\Desktop\tmp676069910
data
dropped
C:\Users\user\Desktop\tmp678689843
data
dropped
C:\Users\user\Desktop\tmp688266968
data
dropped
C:\Users\user\Desktop\tmp688566551
data
dropped
C:\Users\user\Desktop\tmp702720712
data
dropped
C:\Users\user\Desktop\tmp719444656
data
dropped
C:\Users\user\Desktop\tmp73023369
data
dropped
C:\Users\user\Desktop\tmp739515145
data
dropped
C:\Users\user\Desktop\tmp748873649
data
dropped
C:\Users\user\Desktop\tmp749969354
data
dropped
C:\Users\user\Desktop\tmp761064661
data
dropped
C:\Users\user\Desktop\tmp770437288
data
dropped
C:\Users\user\Desktop\tmp776173750
data
dropped
C:\Users\user\Desktop\tmp793497266
data
dropped
C:\Users\user\Desktop\tmp794678177
data
dropped
C:\Users\user\Desktop\tmp796892191
data
dropped
C:\Users\user\Desktop\tmp801898600
data
dropped
C:\Users\user\Desktop\tmp802416157
data
dropped
C:\Users\user\Desktop\tmp835717481
data
dropped
C:\Users\user\Desktop\tmp838645641
data
dropped
C:\Users\user\Desktop\tmp839932252
data
dropped
C:\Users\user\Desktop\tmp852816668
data
dropped
C:\Users\user\Desktop\tmp855806890
data
dropped
C:\Users\user\Desktop\tmp867335449
data
dropped
C:\Users\user\Desktop\tmp871701110
data
dropped
C:\Users\user\Desktop\tmp878745450
data
dropped
C:\Users\user\Desktop\tmp893079191
data
dropped
C:\Users\user\Desktop\tmp903508523
data
dropped
C:\Users\user\Desktop\tmp904332985
data
dropped
C:\Users\user\Desktop\tmp905636657
data
dropped
C:\Users\user\Desktop\tmp905871826
data
dropped
C:\Users\user\Desktop\tmp911885037
data
dropped
C:\Users\user\Desktop\tmp911940951
data
dropped
C:\Users\user\Desktop\tmp914965452
data
dropped
C:\Users\user\Desktop\tmp916167013
data
dropped
C:\Users\user\Desktop\tmp917885694
data
dropped
C:\Users\user\Desktop\tmp921579178
data
dropped
C:\Users\user\Desktop\tmp927756818
data
dropped
C:\Users\user\Desktop\tmp92819755
data
dropped
C:\Users\user\Desktop\tmp931329731
data
dropped
C:\Users\user\Desktop\tmp935559558
data
dropped
C:\Users\user\Desktop\tmp951366987
data
dropped
C:\Users\user\Desktop\tmp95696639
data
dropped
C:\Users\user\Desktop\tmp958392723
data
dropped
C:\Users\user\Desktop\tmp962477894
data
dropped
C:\Users\user\Desktop\tmp963131123
data
dropped
C:\Users\user\Desktop\tmp970001612
data
dropped
C:\Users\user\Desktop\tmp973311543
data
dropped
C:\Users\user\Desktop\tmp975532910
data
dropped
C:\Users\user\Desktop\tmp981242955
data
dropped
C:\Users\user\Desktop\tmp988812466
data
dropped
C:\Users\user\Desktop\tmp992616226
data
dropped
C:\Users\user\Desktop\tmp99881433
data
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
dropped
There are 680 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Windows-StandardCollector-x64.exe
"C:\Users\user\Desktop\Windows-StandardCollector-x64.exe"
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Users\user\Desktop\tmp2041392848.exe
C:\Users\user\Desktop\tmp2041392848.exe -nobanner -accepteula -t -a * -c -h *
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://datatracker.ietf.org/doc/html/rfc7396)Access
unknown
http://jsonpatch.com/)Permission
unknown
https://www.virustotal.com/about/terms-of-service
unknown
http://www.intel.com/repository/CRL/Intel%20External%20Basic%20Issuing%20CA%203B(2).crl
unknown
https://elastic.co/cloud).
unknown
https://your-org-name.okta.com
unknown
http://ocsp.thawte.com0
unknown
http://underscorejs.org
unknown
https://github.com/Velocidex/vtypes).
unknown
http://wiki.ecmascript.org/doku.php?id=harmony:egal.
unknown
http://s3.amazonaws.com/doc/2006-03-01/
unknown
https://github.com/Velocidex/evtx-data.
unknown
http://docs.python.org/library/functions.html#range).
unknown
https://cdn.jsdelivr.net/npm/popper.js
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css
unknown
http://169.254.169.254iam-fips.amazonaws.comidna:
unknown
http://www.intel.com/repository/pkicps/index.htm0
unknown
https://%s:%d/https://%v:%v/httptest.servehunt_flows:
unknown
http://certificates.intel.com/repository/certificates/Intel%20External%20Basic%20Issuing%20CA%203B(2
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://certificates.intel.com/repository/CRL/Intel%20External%20Basic%20Issuing%20CA%203B(2).crl0
unknown
http://certificates.intel.com/repository/CRL/Intel%20External%20Basic%20Policy%20CA(1).crl0
unknown
https://developers.google.com/accounts/docs/application-default-credentialslistChildren:
unknown
http://certificates.intel.com/repository/certificates/Intel%20External%20Basic%20Policy%20CA(1).crt0
unknown
http://169.254.169.254/latesthttp://
unknown
http://purl.oclc.org/ooxml/spreadsheetml/mainignore
unknown
https://www.realvnc.com/en/connect/docs/logging.html#logging
unknown
https://www.velocidex.comiam/security-credentials/ifMetagenerationNotMatch=illegal
unknown
https://code.jquery.com/jquery-3.4.1.slim.min.js
unknown
http://169.254.170.2if/with
unknown
http://www.intel.com/repository/certificates/Intel%20External%20Basic%20Issuing%20CA%203B(2).crt0u
unknown
https://bugs.webkit.org/show_bug.cgi?id=80797
unknown
https://www.velocidex.com
unknown
https://github.com/go-sql-driver/mysql/wiki/old_passwordsDEBUG:
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/bootstrap.min.js
unknown
http://www.3ware.comD
unknown
http://myexternalip.com/rawhttps://api.github.com/userifSourceMetagenerationMatchignoring
unknown
http://purl.oclc.org/ooxml/officeDocument/relationships/commentsinternal
unknown
https://docs.velociraptor.app/
unknown
https://docs.velociraptor.app/docs/deployment/cloud/multifrontend/
unknown
http://www.intel.com/repository/CRL/Intel%20External%20Basic%20Policy%20CA(1).crl
unknown
http://www.intel.com/repository/certificates/Intel%20External%20Basic%20Policy%20CA(1).crt0o
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
fp2e7a.wpc.phicdn.net
192.229.221.95

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Sysinternals\AutoRuns
EulaAccepted

Memdumps

Base Address
Regiontype
Protect
Malicious
294FE252000
heap
page read and write
26FD6A5F000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE379000
heap
page read and write
294FE15D000
heap
page read and write
26FD6CA5000
heap
page read and write
294FE379000
heap
page read and write
294FE13B000
heap
page read and write
294FE140000
heap
page read and write
294FE379000
heap
page read and write
294FE140000
heap
page read and write
26FD6D83000
heap
page read and write
26FD70C1000
heap
page read and write
C002ACE000
direct allocation
page read and write
294F69FD000
heap
page read and write
294F6A0B000
heap
page read and write
294FE379000
heap
page read and write
294FE15D000
heap
page read and write
294F69FC000
heap
page read and write
C002B8C000
direct allocation
page read and write
294FE38C000
heap
page read and write
294FE379000
heap
page read and write
26FD7041000
heap
page read and write
294FE13B000
heap
page read and write
294FE0E1000
heap
page read and write
294FE107000
heap
page read and write
294FE247000
heap
page read and write
294FE14B000
heap
page read and write
26FD6D83000
heap
page read and write
294FE3BC000
heap
page read and write
294F69E6000
heap
page read and write
294FE0F1000
heap
page read and write
294FE13B000
heap
page read and write
294FE124000
heap
page read and write
26FD6C41000
heap
page read and write
294FE160000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE113000
heap
page read and write
294FE37C000
heap
page read and write
294FE124000
heap
page read and write
294FE247000
heap
page read and write
26FD6A86000
heap
page read and write
294FE379000
heap
page read and write
294FE107000
heap
page read and write
294FE11A000
heap
page read and write
294FE151000
heap
page read and write
294FE421000
heap
page read and write
26FD6CD7000
heap
page read and write
294F6A1B000
heap
page read and write
C0028DE000
direct allocation
page read and write
26FD6C41000
heap
page read and write
294FE124000
heap
page read and write
294FE140000
heap
page read and write
294FE34C000
heap
page read and write
C001360000
direct allocation
page read and write
26FD4A74000
heap
page read and write
26FD6C61000
heap
page read and write
294FE107000
heap
page read and write
294FE356000
heap
page read and write
294F6A08000
heap
page read and write
294FE154000
heap
page read and write
26FD7041000
heap
page read and write
131000
unkown
page execute read
26FD4A74000
heap
page read and write
C00288A000
direct allocation
page read and write
294FE148000
heap
page read and write
294FE141000
heap
page read and write
C00289E000
direct allocation
page read and write
294F6D0E000
heap
page read and write
26FD6CD9000
heap
page read and write
C002928000
direct allocation
page read and write
C002916000
direct allocation
page read and write
294FE145000
heap
page read and write
26FD6CDE000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
294FE153000
heap
page read and write
294FE15D000
heap
page read and write
294FE148000
heap
page read and write
294FE15D000
heap
page read and write
26FD6A2B000
heap
page read and write
294F6D0E000
heap
page read and write
C002944000
direct allocation
page read and write
294FE11F000
heap
page read and write
26FD6CD7000
heap
page read and write
26FD6D83000
heap
page read and write
294FE117000
heap
page read and write
26FD6CDD000
heap
page read and write
C002970000
direct allocation
page read and write
294FE350000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE107000
heap
page read and write
C002B5E000
direct allocation
page read and write
294FE13B000
heap
page read and write
26FD4A74000
heap
page read and write
294FE145000
heap
page read and write
C002858000
direct allocation
page read and write
294FE370000
heap
page read and write
294FE379000
heap
page read and write
294FDF20000
trusted library allocation
page read and write
26FD6C75000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE379000
heap
page read and write
26FD6C95000
heap
page read and write
294F6A0E000
heap
page read and write
294FE156000
heap
page read and write
294FE15E000
heap
page read and write
C00295A000
direct allocation
page read and write
C002AFA000
direct allocation
page read and write
26FD6CD7000
heap
page read and write
294FE13A000
heap
page read and write
294FE15D000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6D2B000
heap
page read and write
294FE379000
heap
page read and write
B31000
unkown
page execute read
C002B42000
direct allocation
page read and write
294FE15D000
heap
page read and write
294FE25D000
heap
page read and write
294FE15D000
heap
page read and write
294FE356000
heap
page read and write
294FE11A000
heap
page read and write
26FD4AC2000
heap
page read and write
26FD6D83000
heap
page read and write
294FE15D000
heap
page read and write
294FE117000
heap
page read and write
294F6A19000
heap
page read and write
26FD6A61000
heap
page read and write
294FE154000
heap
page read and write
294F6D0B000
heap
page read and write
294FE15E000
heap
page read and write
294FE144000
heap
page read and write
294FE14B000
heap
page read and write
294FE156000
heap
page read and write
C002B64000
direct allocation
page read and write
294FE107000
heap
page read and write
26FD6D0A000
heap
page read and write
294F6A1B000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE0FF000
heap
page read and write
294FE3A3000
heap
page read and write
294FE379000
heap
page read and write
294FE117000
heap
page read and write
294FE379000
heap
page read and write
294FE11B000
heap
page read and write
26FD6D83000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE370000
heap
page read and write
26FD6CB5000
heap
page read and write
294FE140000
heap
page read and write
294FE0EE000
heap
page read and write
294FE14F000
heap
page read and write
26FD6D03000
heap
page read and write
C002B56000
direct allocation
page read and write
26FD6D0B000
heap
page read and write
26FD6D6D000
heap
page read and write
294FE154000
heap
page read and write
26FD6CD9000
heap
page read and write
C002B26000
direct allocation
page read and write
294FE379000
heap
page read and write
294F6D0E000
heap
page read and write
294FE145000
heap
page read and write
294FE379000
heap
page read and write
294F6A0C000
heap
page read and write
294FE124000
heap
page read and write
26FD6D2B000
heap
page read and write
26FD6DA5000
heap
page read and write
294F69F5000
heap
page read and write
294FE120000
heap
page read and write
26FD6CC7000
heap
page read and write
C0028F2000
direct allocation
page read and write
294FE409000
heap
page read and write
294FE157000
heap
page read and write
294FE143000
heap
page read and write
C002ADE000
direct allocation
page read and write
294FE140000
heap
page read and write
294FE15D000
heap
page read and write
294FE379000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE0ED000
heap
page read and write
C002948000
direct allocation
page read and write
C002842000
direct allocation
page read and write
294FE14B000
heap
page read and write
294F6D0E000
heap
page read and write
C002930000
direct allocation
page read and write
294FE0EE000
heap
page read and write
26FD6A61000
heap
page read and write
294FE247000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
C002900000
direct allocation
page read and write
294FE13A000
heap
page read and write
294FE118000
heap
page read and write
294FE135000
heap
page read and write
26FD6C49000
heap
page read and write
C002B80000
direct allocation
page read and write
294F6A1B000
heap
page read and write
294FE379000
heap
page read and write
294FE14B000
heap
page read and write
294FE118000
heap
page read and write
26FD6D0A000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6A77000
heap
page read and write
294FE15D000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE119000
heap
page read and write
294FE0EB000
heap
page read and write
294FE13B000
heap
page read and write
294FE124000
heap
page read and write
294F6A0B000
heap
page read and write
294FE140000
heap
page read and write
294FE141000
heap
page read and write
294FE14B000
heap
page read and write
26FD6CE2000
heap
page read and write
C00293C000
direct allocation
page read and write
294FE11D000
heap
page read and write
294FE107000
heap
page read and write
26FD6D83000
heap
page read and write
294FE160000
heap
page read and write
26FD6CD7000
heap
page read and write
1F50000
unkown
page readonly
26FD6CD9000
heap
page read and write
26FD6D83000
heap
page read and write
294FE245000
heap
page read and write
294FE379000
heap
page read and write
26FD6D83000
heap
page read and write
294FE379000
heap
page read and write
C00296E000
direct allocation
page read and write
C0028E2000
direct allocation
page read and write
C002844000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE145000
heap
page read and write
294FE356000
heap
page read and write
294FE370000
heap
page read and write
294FE400000
heap
page read and write
294FE11C000
heap
page read and write
7FF7CC0A1000
unkown
page execute read
26FD6C4C000
heap
page read and write
294FE100000
heap
page read and write
294FE15D000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE350000
heap
page read and write
294FE13B000
heap
page read and write
294FE107000
heap
page read and write
294FE107000
heap
page read and write
294FE11F000
heap
page read and write
C002B94000
direct allocation
page read and write
294FE13B000
heap
page read and write
294FE11A000
heap
page read and write
C002AF6000
direct allocation
page read and write
294FE107000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE15D000
heap
page read and write
294FE14B000
heap
page read and write
C00288C000
direct allocation
page read and write
C002AD2000
direct allocation
page read and write
294FE140000
heap
page read and write
294FE140000
heap
page read and write
26FD6AA0000
heap
page read and write
294FE247000
heap
page read and write
26FD6A90000
heap
page read and write
26FD6D83000
heap
page read and write
C00290C000
direct allocation
page read and write
26FD6C51000
heap
page read and write
294FE14B000
heap
page read and write
294FE124000
heap
page read and write
C002B18000
direct allocation
page read and write
26FD6D03000
heap
page read and write
294FE140000
heap
page read and write
C002B62000
direct allocation
page read and write
294FE15D000
heap
page read and write
26FD6C85000
heap
page read and write
26FD6C51000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6D6D000
heap
page read and write
294FE379000
heap
page read and write
C002B60000
direct allocation
page read and write
294FE370000
heap
page read and write
294FE140000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
294FE371000
heap
page read and write
C00294A000
direct allocation
page read and write
294FE154000
heap
page read and write
294FE15E000
heap
page read and write
C002B24000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE124000
heap
page read and write
26FD6CD7000
heap
page read and write
26FD6D83000
heap
page read and write
26FD7041000
heap
page read and write
294FE14B000
heap
page read and write
294F69FD000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE14A000
heap
page read and write
294FE109000
heap
page read and write
294FE117000
heap
page read and write
26FD6A61000
heap
page read and write
294FE379000
heap
page read and write
294FE13B000
heap
page read and write
26FD6CE2000
heap
page read and write
26FD6A5D000
heap
page read and write
294FE13C000
heap
page read and write
294FE26A000
heap
page read and write
294FE107000
heap
page read and write
294FE100000
heap
page read and write
294FE379000
heap
page read and write
26FD6CD7000
heap
page read and write
7FF7CC13D000
unkown
page write copy
26FD6C41000
heap
page read and write
294F6D0D000
heap
page read and write
C002942000
direct allocation
page read and write
294FE15D000
heap
page read and write
294FE124000
heap
page read and write
294FE132000
heap
page read and write
26FD6A5D000
heap
page read and write
294FE341000
heap
page read and write
294FE14B000
heap
page read and write
26FD7041000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE379000
heap
page read and write
26FD6C41000
heap
page read and write
294FE13B000
heap
page read and write
26FD6D2B000
heap
page read and write
294FE124000
heap
page read and write
26FD6D96000
heap
page read and write
294F69F5000
heap
page read and write
C002802000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD6C49000
heap
page read and write
294FE0ED000
heap
page read and write
294F6A0C000
heap
page read and write
26FD6D83000
heap
page read and write
294FE379000
heap
page read and write
294FE14D000
heap
page read and write
C002B22000
direct allocation
page read and write
26FD7041000
heap
page read and write
26FD6A9D000
heap
page read and write
26FD7041000
heap
page read and write
294FE14F000
heap
page read and write
26FD6C71000
heap
page read and write
294FE379000
heap
page read and write
294F6A05000
heap
page read and write
294F69F5000
heap
page read and write
294FE0FB000
heap
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
294FE123000
heap
page read and write
C00284C000
direct allocation
page read and write
26FD6A93000
heap
page read and write
26FD6A92000
heap
page read and write
294F69F4000
heap
page read and write
26FD6D0A000
heap
page read and write
C002906000
direct allocation
page read and write
C002958000
direct allocation
page read and write
26FD4A74000
heap
page read and write
294FE421000
heap
page read and write
294F69EA000
heap
page read and write
26FD6C41000
heap
page read and write
294FE350000
heap
page read and write
294FE11A000
heap
page read and write
26FD6D96000
heap
page read and write
294FE147000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE25D000
heap
page read and write
26FD6CB5000
heap
page read and write
26FD6C74000
heap
page read and write
26FD4A74000
heap
page read and write
294FE25C000
heap
page read and write
294F69F5000
heap
page read and write
15B4000
unkown
page write copy
294F6A1A000
heap
page read and write
294FE120000
heap
page read and write
294FE379000
heap
page read and write
26FD6CD9000
heap
page read and write
26FD6C51000
heap
page read and write
26FD6CA5000
heap
page read and write
294FE15E000
heap
page read and write
294FE379000
heap
page read and write
294F6A10000
heap
page read and write
C002870000
direct allocation
page read and write
26FD6CD9000
heap
page read and write
26FD6D83000
heap
page read and write
294FE12F000
heap
page read and write
294F6A1A000
heap
page read and write
C0028DC000
direct allocation
page read and write
294FE14B000
heap
page read and write
294F69E0000
heap
page read and write
26FD7041000
heap
page read and write
26FD6A62000
heap
page read and write
26FD6D83000
heap
page read and write
294FE409000
heap
page read and write
294F69FD000
heap
page read and write
26FD6D6F000
heap
page read and write
294FE140000
heap
page read and write
294FE379000
heap
page read and write
26FD6C51000
heap
page read and write
C002B52000
direct allocation
page read and write
294FE12F000
heap
page read and write
294FE144000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
14BB75D0000
heap
page read and write
26FD6CA5000
heap
page read and write
294FE0F3000
heap
page read and write
C00291E000
direct allocation
page read and write
26FD6D83000
heap
page read and write
26FD6C53000
heap
page read and write
294FE147000
heap
page read and write
C002ADA000
direct allocation
page read and write
294FE379000
heap
page read and write
C001364000
direct allocation
page read and write
294FE350000
heap
page read and write
294FE379000
heap
page read and write
294F6A19000
heap
page read and write
26FD4AC2000
heap
page read and write
C002884000
direct allocation
page read and write
294FE15D000
heap
page read and write
26FD7074000
heap
page read and write
294FE13B000
heap
page read and write
294FE0EE000
heap
page read and write
26FD6D83000
heap
page read and write
294F69F0000
heap
page read and write
294FE118000
heap
page read and write
26FD6C95000
heap
page read and write
294FE356000
heap
page read and write
26FD6D0B000
heap
page read and write
C0028A2000
direct allocation
page read and write
294FE0ED000
heap
page read and write
294F6A0E000
heap
page read and write
294FE15E000
heap
page read and write
26FD7041000
heap
page read and write
C002AEE000
direct allocation
page read and write
C002B06000
direct allocation
page read and write
C00286C000
direct allocation
page read and write
26FD6C49000
heap
page read and write
26FD7041000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE247000
heap
page read and write
294FE118000
heap
page read and write
26FD6D6D000
heap
page read and write
26FD7041000
heap
page read and write
294FE15F000
heap
page read and write
294FE379000
heap
page read and write
294FE11A000
heap
page read and write
294FE13A000
heap
page read and write
26FD6C95000
heap
page read and write
26FD6A94000
heap
page read and write
294FE140000
heap
page read and write
294FE11A000
heap
page read and write
294FE15D000
heap
page read and write
294FE11F000
heap
page read and write
294FE350000
heap
page read and write
C002860000
direct allocation
page read and write
26FD4AC2000
heap
page read and write
294FE11A000
heap
page read and write
294FE411000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE151000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE13A000
heap
page read and write
294FE117000
heap
page read and write
294FE11C000
heap
page read and write
294FE13C000
heap
page read and write
294FE356000
heap
page read and write
26FD707C000
heap
page read and write
294FE124000
heap
page read and write
294FE11A000
heap
page read and write
294FE11C000
heap
page read and write
294FE107000
heap
page read and write
294FE3F9000
heap
page read and write
2D3A000
unkown
page readonly
294FE147000
heap
page read and write
294FE379000
heap
page read and write
294FE350000
heap
page read and write
C00295C000
direct allocation
page read and write
294FE124000
heap
page read and write
294FE11A000
heap
page read and write
C002AF0000
direct allocation
page read and write
C002938000
direct allocation
page read and write
1749000
unkown
page write copy
C002B78000
direct allocation
page read and write
26FD6CA5000
heap
page read and write
294FE350000
heap
page read and write
C0028E6000
direct allocation
page read and write
26FD6D03000
heap
page read and write
294FE14B000
heap
page read and write
C002964000
direct allocation
page read and write
294FE341000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE15D000
heap
page read and write
294FE370000
heap
page read and write
26FD6D96000
heap
page read and write
294F6A16000
heap
page read and write
C00285C000
direct allocation
page read and write
C00287E000
direct allocation
page read and write
C002B02000
direct allocation
page read and write
294FE119000
heap
page read and write
26FD6C61000
heap
page read and write
26FD4AC2000
heap
page read and write
26FD6C49000
heap
page read and write
26FD6A94000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE379000
heap
page read and write
26FD6A95000
heap
page read and write
49F4AD000
stack
page read and write
C00294E000
direct allocation
page read and write
C002882000
direct allocation
page read and write
294FE144000
heap
page read and write
294FE15D000
heap
page read and write
C00292E000
direct allocation
page read and write
294F6A1A000
heap
page read and write
C002B7A000
direct allocation
page read and write
26FD6A62000
heap
page read and write
C002B1E000
direct allocation
page read and write
294FE15E000
heap
page read and write
294FE379000
heap
page read and write
294FE155000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6D83000
heap
page read and write
C0028A8000
direct allocation
page read and write
294FE120000
heap
page read and write
294FE379000
heap
page read and write
294FE14B000
heap
page read and write
294FE109000
heap
page read and write
26FD6A21000
heap
page read and write
294F6D0B000
heap
page read and write
294FE350000
heap
page read and write
294FE13B000
heap
page read and write
294FE147000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE356000
heap
page read and write
26FD6AA0000
heap
page read and write
294FE108000
heap
page read and write
26FD4A74000
heap
page read and write
26FD7041000
heap
page read and write
294FE258000
heap
page read and write
C002888000
direct allocation
page read and write
C002B9E000
direct allocation
page read and write
294FE140000
heap
page read and write
294FE379000
heap
page read and write
294FE13B000
heap
page read and write
294FE37C000
heap
page read and write
26FD6CD9000
heap
page read and write
294F6D0B000
heap
page read and write
C002AE6000
direct allocation
page read and write
26FD70AF000
heap
page read and write
C002840000
direct allocation
page read and write
294FE379000
heap
page read and write
C002AC4000
direct allocation
page read and write
294FE379000
heap
page read and write
C002904000
direct allocation
page read and write
294FE13B000
heap
page read and write
26FD6D03000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6CE2000
heap
page read and write
26FD7041000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE3D5000
heap
page read and write
294FE12F000
heap
page read and write
294FE273000
heap
page read and write
C0028D9000
direct allocation
page read and write
294FE15F000
heap
page read and write
294FE3F0000
heap
page read and write
294FE350000
heap
page read and write
294FE11F000
heap
page read and write
294FE141000
heap
page read and write
26FD6D9D000
heap
page read and write
C0028DC000
direct allocation
page read and write
294FE140000
heap
page read and write
C002B5A000
direct allocation
page read and write
294FE140000
heap
page read and write
294FE107000
heap
page read and write
294FE3F6000
heap
page read and write
294F6A0E000
heap
page read and write
C002AB0000
direct allocation
page read and write
294FE13B000
heap
page read and write
294FE371000
heap
page read and write
294FE341000
heap
page read and write
294FE12F000
heap
page read and write
294FE144000
heap
page read and write
294FE107000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
294FE381000
heap
page read and write
294FE379000
heap
page read and write
294FE354000
heap
page read and write
294FE370000
heap
page read and write
26FD6CDD000
heap
page read and write
294FE12F000
heap
page read and write
294FE15D000
heap
page read and write
2D3B000
unkown
page write copy
294FE11B000
heap
page read and write
26FD7041000
heap
page read and write
294FE147000
heap
page read and write
294F6A12000
heap
page read and write
294FE147000
heap
page read and write
26FD6CA5000
heap
page read and write
26FD6CE3000
heap
page read and write
C0028A6000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE14B000
heap
page read and write
C002BA2000
direct allocation
page read and write
C002ADC000
direct allocation
page read and write
C000470000
direct allocation
page read and write
294F69EA000
heap
page read and write
294FE349000
heap
page read and write
26FD4A74000
heap
page read and write
26FD6D65000
heap
page read and write
294FE15F000
heap
page read and write
C002886000
direct allocation
page read and write
C002918000
direct allocation
page read and write
C002B4A000
direct allocation
page read and write
294FE252000
heap
page read and write
294FE107000
heap
page read and write
294FE540000
trusted library allocation
page read and write
C002AFE000
direct allocation
page read and write
26FD6CD7000
heap
page read and write
294FE379000
heap
page read and write
26FD6C49000
heap
page read and write
26FD6D83000
heap
page read and write
294FE252000
heap
page read and write
294FE14F000
heap
page read and write
C002B2C000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD7041000
heap
page read and write
C002AC8000
direct allocation
page read and write
26FD4AC2000
heap
page read and write
294FE0E1000
heap
page read and write
294FE13B000
heap
page read and write
26FD6D83000
heap
page read and write
C002856000
direct allocation
page read and write
C002BB0000
direct allocation
page read and write
14BB7600000
heap
page read and write
26FD6CD7000
heap
page read and write
201F000
unkown
page readonly
294FE24D000
heap
page read and write
294FE13A000
heap
page read and write
294FE135000
heap
page read and write
26FD6CE2000
heap
page read and write
26FD6C41000
heap
page read and write
294FE141000
heap
page read and write
294FE144000
heap
page read and write
C002924000
direct allocation
page read and write
294FE15D000
heap
page read and write
294FE145000
heap
page read and write
294FE371000
heap
page read and write
C00287C000
direct allocation
page read and write
294FE144000
heap
page read and write
294FE15D000
heap
page read and write
294FE15D000
heap
page read and write
C002B76000
direct allocation
page read and write
26FD6CD7000
heap
page read and write
294FE15D000
heap
page read and write
294FE151000
heap
page read and write
294FE379000
heap
page read and write
294FE120000
heap
page read and write
C002BAE000
direct allocation
page read and write
C002B08000
direct allocation
page read and write
294FE15F000
heap
page read and write
294FE13B000
heap
page read and write
294FE147000
heap
page read and write
294FE349000
heap
page read and write
26FD7041000
heap
page read and write
C0028DA000
direct allocation
page read and write
294F6A1A000
heap
page read and write
294FE379000
heap
page read and write
26FD6D03000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE140000
heap
page read and write
294F6A04000
heap
page read and write
C002B2A000
direct allocation
page read and write
26FD6C95000
heap
page read and write
294FE133000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE358000
heap
page read and write
C002BA6000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD6CB5000
heap
page read and write
294FE379000
heap
page read and write
C0028F6000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE381000
heap
page read and write
294FE135000
heap
page read and write
26FD6C61000
heap
page read and write
294F69B0000
heap
page read and write
294FE15D000
heap
page read and write
294FE117000
heap
page read and write
294F6A16000
heap
page read and write
294FE356000
heap
page read and write
294FE247000
heap
page read and write
294FE13C000
heap
page read and write
26FD6C61000
heap
page read and write
26FD6D03000
heap
page read and write
294FE379000
heap
page read and write
26FD70AF000
heap
page read and write
294FE13C000
heap
page read and write
C002B20000
direct allocation
page read and write
294F6D0E000
heap
page read and write
294FE0F8000
heap
page read and write
C0028A4000
direct allocation
page read and write
294FE358000
heap
page read and write
294F69E0000
heap
page read and write
294FE379000
heap
page read and write
26FD6C41000
heap
page read and write
294FE13C000
heap
page read and write
294FE379000
heap
page read and write
294FE13B000
heap
page read and write
294FE0ED000
heap
page read and write
294FE157000
heap
page read and write
294FE379000
heap
page read and write
26FD4A74000
heap
page read and write
294FE11C000
heap
page read and write
294F6D0E000
heap
page read and write
294FE356000
heap
page read and write
294FE13B000
heap
page read and write
C002B0A000
direct allocation
page read and write
C002BA8000
direct allocation
page read and write
294FE14F000
heap
page read and write
26FD6D83000
heap
page read and write
294FE11F000
heap
page read and write
294FE540000
trusted library allocation
page read and write
C002B0E000
direct allocation
page read and write
C002854000
direct allocation
page read and write
294FE15F000
heap
page read and write
26FD6CB5000
heap
page read and write
C002B82000
direct allocation
page read and write
C002880000
direct allocation
page read and write
294FE11C000
heap
page read and write
26FD70BA000
heap
page read and write
294FE11E000
heap
page read and write
294FE25D000
heap
page read and write
294FE379000
heap
page read and write
294FE142000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
294FE245000
heap
page read and write
294FE0EE000
heap
page read and write
26FD6CB5000
heap
page read and write
294FE15D000
heap
page read and write
26FD6C73000
heap
page read and write
C00291A000
direct allocation
page read and write
C002898000
direct allocation
page read and write
294FE247000
heap
page read and write
294FE421000
heap
page read and write
294FE379000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE107000
heap
page read and write
26FD6D2B000
heap
page read and write
294FE347000
heap
page read and write
294FE348000
heap
page read and write
294F6A0E000
heap
page read and write
294FE13B000
heap
page read and write
294FE15D000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE350000
heap
page read and write
294FE379000
heap
page read and write
26FD7041000
heap
page read and write
26FD4AC2000
heap
page read and write
26FD70A3000
heap
page read and write
7FF7CC0A0000
unkown
page readonly
294FE145000
heap
page read and write
294F6D0D000
heap
page read and write
26FD6C49000
heap
page read and write
C002952000
direct allocation
page read and write
26FD6CB7000
heap
page read and write
C00288E000
direct allocation
page read and write
C002932000
direct allocation
page read and write
1E9C000
unkown
page readonly
294FE151000
heap
page read and write
26FD4A74000
heap
page read and write
26FD6C95000
heap
page read and write
C0028EC000
direct allocation
page read and write
294F6A10000
heap
page read and write
294FE144000
heap
page read and write
C002B1C000
direct allocation
page read and write
C002B28000
direct allocation
page read and write
294FE117000
heap
page read and write
294FE14F000
heap
page read and write
26FD6C41000
heap
page read and write
C002ABA000
direct allocation
page read and write
294FE12F000
heap
page read and write
26FD6A7B000
heap
page read and write
294FE247000
heap
page read and write
26FD6A77000
heap
page read and write
26FD6C41000
heap
page read and write
C002B58000
direct allocation
page read and write
294FE13B000
heap
page read and write
26FD7041000
heap
page read and write
294FE370000
heap
page read and write
294FE108000
heap
page read and write
294FE379000
heap
page read and write
294FE0FF000
heap
page read and write
26FD7041000
heap
page read and write
C002866000
direct allocation
page read and write
294FE13B000
heap
page read and write
294F6A12000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
294F6A1B000
heap
page read and write
C0028F8000
direct allocation
page read and write
26FD6C51000
heap
page read and write
C002940000
direct allocation
page read and write
294FE15D000
heap
page read and write
C002ABE000
direct allocation
page read and write
26FD6C61000
heap
page read and write
14BB7668000
heap
page read and write
26FD6CB5000
heap
page read and write
26FD6C85000
heap
page read and write
26FD70BA000
heap
page read and write
294F69F0000
heap
page read and write
26FD6D83000
heap
page read and write
294F6D0E000
heap
page read and write
294FE124000
heap
page read and write
294FE356000
heap
page read and write
294FE14D000
heap
page read and write
26FD7041000
heap
page read and write
294FE151000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE15E000
heap
page read and write
294FE13B000
heap
page read and write
294FE120000
heap
page read and write
294FE15D000
heap
page read and write
C00295E000
direct allocation
page read and write
C002AC2000
direct allocation
page read and write
26FD6C41000
heap
page read and write
C002B8E000
direct allocation
page read and write
26FD6CE2000
heap
page read and write
294F6D0B000
heap
page read and write
294F6A16000
heap
page read and write
294FE156000
heap
page read and write
26FD6D03000
heap
page read and write
26FD6A58000
heap
page read and write
C002946000
direct allocation
page read and write
26FD6D96000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE151000
heap
page read and write
294FE154000
heap
page read and write
294FE120000
heap
page read and write
294FE379000
heap
page read and write
294FE107000
heap
page read and write
26FD6A5B000
heap
page read and write
294FE144000
heap
page read and write
C002926000
direct allocation
page read and write
294FE124000
heap
page read and write
294FE13B000
heap
page read and write
26FD6CE2000
heap
page read and write
C002908000
direct allocation
page read and write
294FE145000
heap
page read and write
294FE0F4000
heap
page read and write
294F69EA000
heap
page read and write
294FE15D000
heap
page read and write
26FD6D6D000
heap
page read and write
294F69F5000
heap
page read and write
26FD707C000
heap
page read and write
26FD6C95000
heap
page read and write
294F6989000
heap
page read and write
294FE15E000
heap
page read and write
C002B88000
direct allocation
page read and write
294FE13A000
heap
page read and write
294FE379000
heap
page read and write
294FE11F000
heap
page read and write
C002912000
direct allocation
page read and write
C00296A000
direct allocation
page read and write
294FE124000
heap
page read and write
294FE141000
heap
page read and write
26FD7041000
heap
page read and write
294FE118000
heap
page read and write
C0028F0000
direct allocation
page read and write
294F6A0F000
heap
page read and write
294F69FD000
heap
page read and write
C00287A000
direct allocation
page read and write
294FE14B000
heap
page read and write
294FE140000
heap
page read and write
294FE124000
heap
page read and write
C002B36000
direct allocation
page read and write
49F52F000
unkown
page read and write
294F69FD000
heap
page read and write
26FD6D83000
heap
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
26FD70B4000
heap
page read and write
294FE156000
heap
page read and write
294FE15D000
heap
page read and write
294FE132000
heap
page read and write
C002954000
direct allocation
page read and write
294FE140000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE379000
heap
page read and write
294FE247000
heap
page read and write
294FE12C000
heap
page read and write
294FE140000
heap
page read and write
294FE13C000
heap
page read and write
C002B30000
direct allocation
page read and write
26FD6D83000
heap
page read and write
294FE14F000
heap
page read and write
294FE356000
heap
page read and write
294FE379000
heap
page read and write
294FE15D000
heap
page read and write
294FE13B000
heap
page read and write
294F6A19000
heap
page read and write
294FE13B000
heap
page read and write
C002B00000
direct allocation
page read and write
294F6A16000
heap
page read and write
26FD6C41000
heap
page read and write
294FE11F000
heap
page read and write
294FE379000
heap
page read and write
C002878000
direct allocation
page read and write
26FD4A74000
heap
page read and write
294FE341000
heap
page read and write
294FE15E000
heap
page read and write
C002B7E000
direct allocation
page read and write
294FE151000
heap
page read and write
294FE13C000
heap
page read and write
294FE15E000
heap
page read and write
26FD4A74000
heap
page read and write
C00292A000
direct allocation
page read and write
26FD6D83000
heap
page read and write
294FE14B000
heap
page read and write
C00293E000
direct allocation
page read and write
26FD6D0A000
heap
page read and write
26FD6CD7000
heap
page read and write
C002B68000
direct allocation
page read and write
294FE14E000
heap
page read and write
294FE147000
heap
page read and write
26FD7041000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6D2B000
heap
page read and write
C002B90000
direct allocation
page read and write
26FD6CB5000
heap
page read and write
26FD7041000
heap
page read and write
26FD6CB5000
heap
page read and write
294FE353000
heap
page read and write
26FD6A8E000
heap
page read and write
294FE117000
heap
page read and write
26FD6D83000
heap
page read and write
294FE124000
heap
page read and write
294FE379000
heap
page read and write
294F6A0E000
heap
page read and write
294FE14B000
heap
page read and write
294FE146000
heap
page read and write
294FE351000
heap
page read and write
294F6A1A000
heap
page read and write
26FD70C1000
heap
page read and write
26FD6C95000
heap
page read and write
C002AEC000
direct allocation
page read and write
26FD6AA1000
heap
page read and write
C002B12000
direct allocation
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
1E8A000
unkown
page readonly
294FE379000
heap
page read and write
294F6A13000
heap
page read and write
294FE0EE000
heap
page read and write
C0028E8000
direct allocation
page read and write
49F5AF000
stack
page read and write
C002846000
direct allocation
page read and write
294FE140000
heap
page read and write
294F6A16000
heap
page read and write
294FE379000
heap
page read and write
294F6A05000
heap
page read and write
C002AD6000
direct allocation
page read and write
294F6D0B000
heap
page read and write
2A27000
unkown
page readonly
26FD7041000
heap
page read and write
C002B0C000
direct allocation
page read and write
C002ABC000
direct allocation
page read and write
294FDF20000
trusted library allocation
page read and write
294FE13C000
heap
page read and write
294FE14B000
heap
page read and write
26FD6CD9000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
26FD6D83000
heap
page read and write
294FE125000
heap
page read and write
2024000
unkown
page readonly
26FD6D70000
heap
page read and write
26FD6C41000
heap
page read and write
26FD63A0000
trusted library allocation
page read and write
C002AB2000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE14F000
heap
page read and write
C00296C000
direct allocation
page read and write
294FE107000
heap
page read and write
294FE24D000
heap
page read and write
C0028F4000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE13B000
heap
page read and write
294FE0FB000
heap
page read and write
294FE34C000
heap
page read and write
26FD6D0A000
heap
page read and write
26FD6C41000
heap
page read and write
294FE379000
heap
page read and write
294FE124000
heap
page read and write
14BB74F0000
heap
page read and write
294F69CF000
heap
page read and write
294FE15E000
heap
page read and write
C0028FA000
direct allocation
page read and write
26FD6C41000
heap
page read and write
26FD6C61000
heap
page read and write
C002B40000
direct allocation
page read and write
C0028D6000
direct allocation
page read and write
26FD4A74000
heap
page read and write
294FE379000
heap
page read and write
C002922000
direct allocation
page read and write
C00290A000
direct allocation
page read and write
294FE154000
heap
page read and write
C002876000
direct allocation
page read and write
26FD6A92000
heap
page read and write
294F6A08000
heap
page read and write
26FD7041000
heap
page read and write
26FD6C53000
heap
page read and write
294FE379000
heap
page read and write
294F6A1B000
heap
page read and write
26FD6D0B000
heap
page read and write
26FD6C41000
heap
page read and write
294FE145000
heap
page read and write
294FE379000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE379000
heap
page read and write
294FE107000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE0F8000
heap
page read and write
294FE379000
heap
page read and write
294FE157000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
C002B2E000
direct allocation
page read and write
26FD6D83000
heap
page read and write
294FE379000
heap
page read and write
26FD6D2B000
heap
page read and write
C000472000
direct allocation
page read and write
C002B54000
direct allocation
page read and write
26FD6D96000
heap
page read and write
294FE379000
heap
page read and write
294FE247000
heap
page read and write
294FE258000
heap
page read and write
294F6A0E000
heap
page read and write
294FE11F000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE370000
heap
page read and write
26FD4AC2000
heap
page read and write
C002852000
direct allocation
page read and write
294FE13A000
heap
page read and write
C002894000
direct allocation
page read and write
26FD6A5F000
heap
page read and write
294FE247000
heap
page read and write
26FD6D0A000
heap
page read and write
26FD6D2B000
heap
page read and write
294FE13C000
heap
page read and write
C002B32000
direct allocation
page read and write
294FE13D000
heap
page read and write
294FE13B000
heap
page read and write
C002AEA000
direct allocation
page read and write
294FE341000
heap
page read and write
294FE144000
heap
page read and write
C002B34000
direct allocation
page read and write
C00291C000
direct allocation
page read and write
294F6A0E000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
26FD7041000
heap
page read and write
294FE11D000
heap
page read and write
294FE154000
heap
page read and write
294FE0FF000
heap
page read and write
C002950000
direct allocation
page read and write
294FE145000
heap
page read and write
294FE140000
heap
page read and write
26FD6D2B000
heap
page read and write
26FD6A92000
heap
page read and write
294F6D0B000
heap
page read and write
C002AE4000
direct allocation
page read and write
294FE13F000
heap
page read and write
C00290E000
direct allocation
page read and write
294FE152000
heap
page read and write
26FD4A74000
heap
page read and write
C002968000
direct allocation
page read and write
294FE14D000
heap
page read and write
C002902000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE15D000
heap
page read and write
294FE13B000
heap
page read and write
294FE0EB000
heap
page read and write
C002B98000
direct allocation
page read and write
294FE0F1000
heap
page read and write
294FE15D000
heap
page read and write
294F69B0000
heap
page read and write
294FE15D000
heap
page read and write
26FD6D2B000
heap
page read and write
C002B9C000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE379000
heap
page read and write
294FE13B000
heap
page read and write
294FE13B000
heap
page read and write
294FE107000
heap
page read and write
26FD6D6D000
heap
page read and write
26FD6D83000
heap
page read and write
294FE356000
heap
page read and write
294FE379000
heap
page read and write
294FE247000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE13B000
heap
page read and write
294FE11E000
heap
page read and write
C002B46000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD6CA5000
heap
page read and write
26FD6CDD000
heap
page read and write
C002862000
direct allocation
page read and write
294FE152000
heap
page read and write
294FE15D000
heap
page read and write
26FD6A70000
heap
page read and write
C002B72000
direct allocation
page read and write
26FD6D0A000
heap
page read and write
294FE341000
heap
page read and write
26FD6AA0000
heap
page read and write
294FE350000
heap
page read and write
294FE15D000
heap
page read and write
294FE124000
heap
page read and write
C002ACA000
direct allocation
page read and write
294F6D0B000
heap
page read and write
294F6A05000
heap
page read and write
C002B86000
direct allocation
page read and write
294F6A06000
heap
page read and write
294FE379000
heap
page read and write
294FE153000
heap
page read and write
294F6D0B000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6A7B000
heap
page read and write
294FE0FB000
heap
page read and write
294FE13C000
heap
page read and write
294FE0E1000
heap
page read and write
C002B96000
direct allocation
page read and write
26FD6D83000
heap
page read and write
294FE15E000
heap
page read and write
294FE143000
heap
page read and write
294FE3BC000
heap
page read and write
294FE107000
heap
page read and write
26FD7041000
heap
page read and write
294FE145000
heap
page read and write
294F69CF000
heap
page read and write
26FD7041000
heap
page read and write
294FE371000
heap
page read and write
294FE13B000
heap
page read and write
26FD6CDD000
heap
page read and write
26FD6D83000
heap
page read and write
294FE379000
heap
page read and write
294FE24D000
heap
page read and write
294FE114000
heap
page read and write
294FE252000
heap
page read and write
294FE25D000
heap
page read and write
294FE154000
heap
page read and write
294FE379000
heap
page read and write
C0028A0000
direct allocation
page read and write
294FE247000
heap
page read and write
294FE160000
heap
page read and write
C0028E4000
direct allocation
page read and write
26FD4A74000
heap
page read and write
294FE0E1000
heap
page read and write
C002B66000
direct allocation
page read and write
294FE143000
heap
page read and write
26FD6AA0000
heap
page read and write
294FE14D000
heap
page read and write
294FE14B000
heap
page read and write
294FE379000
heap
page read and write
294FE124000
heap
page read and write
C002BAC000
direct allocation
page read and write
26FD6D0A000
heap
page read and write
294FE14B000
heap
page read and write
294F69E0000
heap
page read and write
294F6A08000
heap
page read and write
294FE14E000
heap
page read and write
294FE14E000
heap
page read and write
294FE120000
heap
page read and write
294F69E0000
heap
page read and write
26FD6D83000
heap
page read and write
294F6A04000
heap
page read and write
26FD6D83000
heap
page read and write
294FE3C1000
heap
page read and write
294FE119000
heap
page read and write
294FE157000
heap
page read and write
294FE14D000
heap
page read and write
26FD7041000
heap
page read and write
26FD6D6D000
heap
page read and write
294F6A06000
heap
page read and write
294FE370000
heap
page read and write
294FE11F000
heap
page read and write
294FE13A000
heap
page read and write
294FE379000
heap
page read and write
294FE3E9000
heap
page read and write
294FE379000
heap
page read and write
294FE350000
heap
page read and write
294FE140000
heap
page read and write
14BB7610000
heap
page read and write
26FD7041000
heap
page read and write
294FE350000
heap
page read and write
C002B92000
direct allocation
page read and write
26FD63A0000
trusted library allocation
page read and write
294FE13B000
heap
page read and write
294FE156000
heap
page read and write
294FE14F000
heap
page read and write
294F69F4000
heap
page read and write
294FE0E8000
heap
page read and write
294FE149000
heap
page read and write
294FE154000
heap
page read and write
294FE15D000
heap
page read and write
294FE0E8000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE15D000
heap
page read and write
26FD6CE2000
heap
page read and write
26FD6CDD000
heap
page read and write
294F69FD000
heap
page read and write
294FE24D000
heap
page read and write
294FE379000
heap
page read and write
294FE25E000
heap
page read and write
294F6A16000
heap
page read and write
26FD7041000
heap
page read and write
294FE14E000
heap
page read and write
294FE3C1000
heap
page read and write
294FE11A000
heap
page read and write
294F69F2000
heap
page read and write
174D000
unkown
page readonly
C002966000
direct allocation
page read and write
26FD6A9D000
heap
page read and write
294FE11F000
heap
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
294FE370000
heap
page read and write
294FE13C000
heap
page read and write
26FD6D96000
heap
page read and write
294FE379000
heap
page read and write
294F6A0B000
heap
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
294FE370000
heap
page read and write
C002914000
direct allocation
page read and write
294FE140000
heap
page read and write
294F69F0000
heap
page read and write
294FE14D000
heap
page read and write
C002B74000
direct allocation
page read and write
294FE0E8000
heap
page read and write
294FE114000
heap
page read and write
294F6A10000
heap
page read and write
294FE100000
heap
page read and write
C00285E000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE15E000
heap
page read and write
294F6D0E000
heap
page read and write
294FE144000
heap
page read and write
294FE11B000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE247000
heap
page read and write
C0028FE000
direct allocation
page read and write
294FE147000
heap
page read and write
294FE107000
heap
page read and write
294FE379000
heap
page read and write
294FE341000
heap
page read and write
26FD6CD7000
heap
page read and write
294F6A16000
heap
page read and write
C002892000
direct allocation
page read and write
C002AE2000
direct allocation
page read and write
294F6A08000
heap
page read and write
26FD6CB5000
heap
page read and write
294FE379000
heap
page read and write
294FE352000
heap
page read and write
294FE140000
heap
page read and write
294FE147000
heap
page read and write
294F6A08000
heap
page read and write
294FE371000
heap
page read and write
26FD6C41000
heap
page read and write
C002B10000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD6CDD000
heap
page read and write
294FE14B000
heap
page read and write
294F6A1A000
heap
page read and write
294FE117000
heap
page read and write
C002BB2000
direct allocation
page read and write
294F6A09000
heap
page read and write
294F6A15000
heap
page read and write
26FD6D0A000
heap
page read and write
294F69EA000
heap
page read and write
26FD7041000
heap
page read and write
294F6A03000
heap
page read and write
294FE100000
heap
page read and write
294FE379000
heap
page read and write
26FD6CA5000
heap
page read and write
294FE370000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE356000
heap
page read and write
C0028D9000
direct allocation
page read and write
26FD6A62000
heap
page read and write
26FD6D03000
heap
page read and write
294FE11B000
heap
page read and write
C002AD8000
direct allocation
page read and write
294FE3F9000
heap
page read and write
294FE379000
heap
page read and write
294FE0EB000
heap
page read and write
294FE11F000
heap
page read and write
294FE15F000
heap
page read and write
294FE3F6000
heap
page read and write
26FD6D65000
heap
page read and write
294FE14B000
heap
page read and write
294FE379000
heap
page read and write
294F69FD000
heap
page read and write
294FE0FE000
heap
page read and write
294FE153000
heap
page read and write
26FD6D6D000
heap
page read and write
26FD6D83000
heap
page read and write
294FE247000
heap
page read and write
294FE13E000
heap
page read and write
C00284E000
direct allocation
page read and write
294FE380000
heap
page read and write
26FD6D6D000
heap
page read and write
294FE107000
heap
page read and write
294FE25D000
heap
page read and write
294FE379000
heap
page read and write
26FD6D83000
heap
page read and write
294FE0E1000
heap
page read and write
294FE11D000
heap
page read and write
294F6A08000
heap
page read and write
294FE11E000
heap
page read and write
294FE15D000
heap
page read and write
26FD6CE2000
heap
page read and write
294F69D1000
heap
page read and write
294F6A0E000
heap
page read and write
294FE120000
heap
page read and write
294FE247000
heap
page read and write
C00135E000
direct allocation
page read and write
294FE120000
heap
page read and write
26FD4A74000
heap
page read and write
C002BA4000
direct allocation
page read and write
294F6A0B000
heap
page read and write
26FD6A62000
heap
page read and write
26FD6C61000
heap
page read and write
294FE379000
heap
page read and write
C002B38000
direct allocation
page read and write
14BB7660000
heap
page read and write
C002B50000
direct allocation
page read and write
294FE108000
heap
page read and write
294FE0E1000
heap
page read and write
26FD4A74000
heap
page read and write
294F6A16000
heap
page read and write
C002896000
direct allocation
page read and write
26FD6D83000
heap
page read and write
26FD707C000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
26FD6C41000
heap
page read and write
294FE107000
heap
page read and write
26FD6CD7000
heap
page read and write
294F69F5000
heap
page read and write
294FE15E000
heap
page read and write
26FD6CB5000
heap
page read and write
294FE14B000
heap
page read and write
26FD6D96000
heap
page read and write
294FE356000
heap
page read and write
26FD4AC2000
heap
page read and write
294F69E6000
heap
page read and write
294FE0FA000
heap
page read and write
294FE14B000
heap
page read and write
26FD6C61000
heap
page read and write
C002B3E000
direct allocation
page read and write
294FE13B000
heap
page read and write
C002800000
direct allocation
page read and write
26FD4AC2000
heap
page read and write
294FE157000
heap
page read and write
294FE0EE000
heap
page read and write
C002B4C000
direct allocation
page read and write
C00284A000
direct allocation
page read and write
294FE151000
heap
page read and write
294FE12C000
heap
page read and write
294FE140000
heap
page read and write
26FD4AC2000
heap
page read and write
26FD6D2B000
heap
page read and write
294FE15D000
heap
page read and write
26FD7041000
heap
page read and write
294FE11D000
heap
page read and write
26FD4A74000
heap
page read and write
294FE160000
heap
page read and write
C002AC0000
direct allocation
page read and write
294FE252000
heap
page read and write
C002960000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE150000
heap
page read and write
294FE0E1000
heap
page read and write
26FD4AC2000
heap
page read and write
C002890000
direct allocation
page read and write
C002850000
direct allocation
page read and write
C002B5C000
direct allocation
page read and write
294FE118000
heap
page read and write
294FE15D000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE160000
heap
page read and write
294F69EE000
heap
page read and write
26FD6CE2000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE107000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE379000
heap
page read and write
C002AFC000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
294FE141000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6D6D000
heap
page read and write
294F6A0B000
heap
page read and write
294FE14B000
heap
page read and write
26FD6C41000
heap
page read and write
26FD4A74000
heap
page read and write
294FE379000
heap
page read and write
294FE13A000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6A61000
heap
page read and write
C002934000
direct allocation
page read and write
294FE142000
heap
page read and write
294FE124000
heap
page read and write
294FE379000
heap
page read and write
294FE0FA000
heap
page read and write
294FE144000
heap
page read and write
294FE144000
heap
page read and write
294FE379000
heap
page read and write
26FD7041000
heap
page read and write
C0028AA000
direct allocation
page read and write
294FE14F000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE0EC000
heap
page read and write
294FE14B000
heap
page read and write
26FD6D83000
heap
page read and write
294FE157000
heap
page read and write
294FE140000
heap
page read and write
26FD6D0B000
heap
page read and write
C002AB4000
direct allocation
page read and write
C002962000
direct allocation
page read and write
294F6A1B000
heap
page read and write
294FE100000
heap
page read and write
294FE13C000
heap
page read and write
294FE140000
heap
page read and write
294FE379000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE14F000
heap
page read and write
294F69E0000
heap
page read and write
294F6A16000
heap
page read and write
294FE247000
heap
page read and write
26FD7074000
heap
page read and write
C002874000
direct allocation
page read and write
294FE14B000
heap
page read and write
294FE160000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6A62000
heap
page read and write
294FE13B000
heap
page read and write
294FE157000
heap
page read and write
C002916000
direct allocation
page read and write
294FE379000
heap
page read and write
26FD6CDD000
heap
page read and write
26FD6A92000
heap
page read and write
294FE156000
heap
page read and write
7FF7CC144000
unkown
page readonly
294FE13C000
heap
page read and write
C00289C000
direct allocation
page read and write
294FE341000
heap
page read and write
294FE379000
heap
page read and write
294FE11A000
heap
page read and write
26FD6A92000
heap
page read and write
294FE135000
heap
page read and write
26FD6A92000
heap
page read and write
294FE14F000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6C8C000
heap
page read and write
294FE379000
heap
page read and write
26FD6A92000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE107000
heap
page read and write
294FE379000
heap
page read and write
294FE107000
heap
page read and write
294FE370000
heap
page read and write
294FE371000
heap
page read and write
294F6D0B000
heap
page read and write
294FE143000
heap
page read and write
294FE0E9000
heap
page read and write
294FE379000
heap
page read and write
294FE14C000
heap
page read and write
26FD6C71000
heap
page read and write
26FD6D03000
heap
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
26FD6A61000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE37C000
heap
page read and write
294FE147000
heap
page read and write
2027000
unkown
page readonly
26FD6D0A000
heap
page read and write
294FE117000
heap
page read and write
C002AF2000
direct allocation
page read and write
294FE0EC000
heap
page read and write
294FE14B000
heap
page read and write
26FD6D83000
heap
page read and write
294FE113000
heap
page read and write
294FE107000
heap
page read and write
294F69EE000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE379000
heap
page read and write
26FD6D6D000
heap
page read and write
294FE100000
heap
page read and write
294FE252000
heap
page read and write
26FD6CD9000
heap
page read and write
C0028EE000
direct allocation
page read and write
294FE13D000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
294FE0E1000
heap
page read and write
294FE15D000
heap
page read and write
294FE117000
heap
page read and write
294FE14E000
heap
page read and write
294FE379000
heap
page read and write
294FE144000
heap
page read and write
294FE379000
heap
page read and write
C002B3C000
direct allocation
page read and write
294FE147000
heap
page read and write
294FE157000
heap
page read and write
294FE13B000
heap
page read and write
294FE14E000
heap
page read and write
294F6A07000
heap
page read and write
294FE14B000
heap
page read and write
C00294C000
direct allocation
page read and write
26FD7041000
heap
page read and write
294FE120000
heap
page read and write
131000
unkown
page execute read
C002AF4000
direct allocation
page read and write
294F6A17000
heap
page read and write
294FE371000
heap
page read and write
26FD6C51000
heap
page read and write
294FE13C000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
294FE14B000
heap
page read and write
C0028E0000
direct allocation
page read and write
26FD6CDD000
heap
page read and write
294FE124000
heap
page read and write
294FE14B000
heap
page read and write
294FE132000
heap
page read and write
C00286A000
direct allocation
page read and write
26FD6CE2000
heap
page read and write
C002AC6000
direct allocation
page read and write
26FD6A8E000
heap
page read and write
294FE247000
heap
page read and write
294F6A0E000
heap
page read and write
294FE156000
heap
page read and write
C002848000
direct allocation
page read and write
294FE11F000
heap
page read and write
26FD6D0B000
heap
page read and write
26FD6C61000
heap
page read and write
26FD4A74000
heap
page read and write
26FD6C85000
heap
page read and write
C002AD0000
direct allocation
page read and write
294F6A0B000
heap
page read and write
294FE15D000
heap
page read and write
294FE258000
heap
page read and write
294FE140000
heap
page read and write
26FD6CD9000
heap
page read and write
294FE11B000
heap
page read and write
294FE3BC000
heap
page read and write
294FE14A000
heap
page read and write
294FE0F4000
heap
page read and write
C002B6C000
direct allocation
page read and write
C002910000
direct allocation
page read and write
26FD6D96000
heap
page read and write
294FE379000
heap
page read and write
294FE24D000
heap
page read and write
294FE15D000
heap
page read and write
C00293A000
direct allocation
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
294FE247000
heap
page read and write
26FD6A6C000
heap
page read and write
294F6A16000
heap
page read and write
26FD6C71000
heap
page read and write
294FE379000
heap
page read and write
294FE140000
heap
page read and write
26FD6A71000
heap
page read and write
294FE107000
heap
page read and write
14A9000
unkown
page write copy
26FD6A5D000
heap
page read and write
C002B44000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE117000
heap
page read and write
294FE132000
heap
page read and write
294FE13B000
heap
page read and write
294FE11B000
heap
page read and write
26FD6D83000
heap
page read and write
26FD6CE2000
heap
page read and write
C0028D6000
direct allocation
page read and write
26FD6D2B000
heap
page read and write
294F6A16000
heap
page read and write
294F6A1B000
heap
page read and write
294FE120000
heap
page read and write
294FE379000
heap
page read and write
294F698B000
heap
page read and write
294FE0EE000
heap
page read and write
C002B9A000
direct allocation
page read and write
294FE143000
heap
page read and write
294F69E0000
heap
page read and write
C002AF8000
direct allocation
page read and write
294FE153000
heap
page read and write
294F6A0B000
heap
page read and write
26FD6D0A000
heap
page read and write
294FE15D000
heap
page read and write
294FE124000
heap
page read and write
294FE153000
heap
page read and write
26FD6CE2000
heap
page read and write
26FD6CE2000
heap
page read and write
294FE341000
heap
page read and write
294FE341000
heap
page read and write
294FE108000
heap
page read and write
294FE14B000
heap
page read and write
294FE145000
heap
page read and write
294FE379000
heap
page read and write
C002B6E000
direct allocation
page read and write
26FD6C41000
heap
page read and write
294FE379000
heap
page read and write
130000
unkown
page readonly
26FD6A61000
heap
page read and write
294FE151000
heap
page read and write
294FE15D000
heap
page read and write
C002AD4000
direct allocation
page read and write
26FD6D83000
heap
page read and write
294FE15D000
heap
page read and write
294FE13A000
heap
page read and write
294FE151000
heap
page read and write
294F6A12000
heap
page read and write
294FE379000
heap
page read and write
294F6A09000
heap
page read and write
294FE379000
heap
page read and write
C00292C000
direct allocation
page read and write
C002B04000
direct allocation
page read and write
26FD7041000
heap
page read and write
294FE379000
heap
page read and write
C0028EA000
direct allocation
page read and write
C002ACC000
direct allocation
page read and write
C002B4E000
direct allocation
page read and write
C002BA0000
direct allocation
page read and write
26FD6D65000
heap
page read and write
26FD6CA5000
heap
page read and write
26FD70A3000
heap
page read and write
294FE371000
heap
page read and write
294FE14A000
heap
page read and write
C002BB4000
direct allocation
page read and write
26FD6CE2000
heap
page read and write
26FD6C85000
heap
page read and write
294F6A1B000
heap
page read and write
C0028FC000
direct allocation
page read and write
294F69D1000
heap
page read and write
C002B3A000
direct allocation
page read and write
2D40000
unkown
page write copy
294FE379000
heap
page read and write
294FE341000
heap
page read and write
C002B1A000
direct allocation
page read and write
294F69B0000
heap
page read and write
26FD6DB9000
heap
page read and write
C002B84000
direct allocation
page read and write
26FD6D83000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE0EE000
heap
page read and write
294FE34B000
heap
page read and write
26FD6A7B000
heap
page read and write
C002AE8000
direct allocation
page read and write
26FD7041000
heap
page read and write
294FE140000
heap
page read and write
26FD707C000
heap
page read and write
294FE15D000
heap
page read and write
294FE3F6000
heap
page read and write
294FE14B000
heap
page read and write
26FD6D03000
heap
page read and write
7FF7CC113000
unkown
page readonly
294FE150000
heap
page read and write
294FE379000
heap
page read and write
294FE411000
heap
page read and write
26FD6C71000
heap
page read and write
26FD6D6F000
heap
page read and write
294FE15E000
heap
page read and write
294FE13B000
heap
page read and write
26FD6CE2000
heap
page read and write
294F6990000
heap
page read and write
26FD6CD7000
heap
page read and write
C002920000
direct allocation
page read and write
26FD6D0A000
heap
page read and write
294FE379000
heap
page read and write
294F69F2000
heap
page read and write
C002830000
direct allocation
page read and write
294FE140000
heap
page read and write
294FE14B000
heap
page read and write
294FE15E000
heap
page read and write
294FE350000
heap
page read and write
294FE372000
heap
page read and write
294FE133000
heap
page read and write
294FE140000
heap
page read and write
294F69FD000
heap
page read and write
26FD6D0A000
heap
page read and write
26FD6C75000
heap
page read and write
294F6A0B000
heap
page read and write
294FE350000
heap
page read and write
C002B8A000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE15D000
heap
page read and write
294FE117000
heap
page read and write
294FE14A000
heap
page read and write
294FE400000
heap
page read and write
26FD6D0A000
heap
page read and write
294F6A1B000
heap
page read and write
294F6D0E000
heap
page read and write
26FD6C41000
heap
page read and write
C002868000
direct allocation
page read and write
294FE147000
heap
page read and write
26FD6A28000
heap
page read and write
294F69F0000
heap
page read and write
294FE11F000
heap
page read and write
26FD6D0A000
heap
page read and write
C002B14000
direct allocation
page read and write
C002944000
direct allocation
page read and write
C0028AC000
direct allocation
page read and write
294FE358000
heap
page read and write
26FD7041000
heap
page read and write
294FE140000
heap
page read and write
26FD6D0B000
heap
page read and write
294FE0EB000
heap
page read and write
294FE342000
heap
page read and write
294FE3F9000
heap
page read and write
26FD6A92000
heap
page read and write
294FE13B000
heap
page read and write
294FE245000
heap
page read and write
294FE379000
heap
page read and write
294FE379000
heap
page read and write
294FE371000
heap
page read and write
26FD7041000
heap
page read and write
294FE356000
heap
page read and write
294FE13B000
heap
page read and write
294FE11C000
heap
page read and write
26FD6A7B000
heap
page read and write
294FE140000
heap
page read and write
C002B70000
direct allocation
page read and write
294FE14E000
heap
page read and write
294FE13B000
heap
page read and write
294FE124000
heap
page read and write
26FD6A62000
heap
page read and write
C002AE0000
direct allocation
page read and write
294FE13D000
heap
page read and write
294F6A1B000
heap
page read and write
294FE370000
heap
page read and write
294FE379000
heap
page read and write
294F6A0A000
heap
page read and write
294FE0F1000
heap
page read and write
294FE370000
heap
page read and write
26FD6AA1000
heap
page read and write
C002B6A000
direct allocation
page read and write
294FE144000
heap
page read and write
294FE147000
heap
page read and write
294FE153000
heap
page read and write
B31000
unkown
page execute read
C002B16000
direct allocation
page read and write
C00286E000
direct allocation
page read and write
26FD6D0A000
heap
page read and write
294FE14B000
heap
page read and write
26FD6C71000
heap
page read and write
294FE379000
heap
page read and write
294FE13C000
heap
page read and write
2D49000
unkown
page readonly
C00285A000
direct allocation
page read and write
294FE154000
heap
page read and write
14BB7605000
heap
page read and write
294FE151000
heap
page read and write
26FD6A90000
heap
page read and write
294FE13C000
heap
page read and write
26FD70A3000
heap
page read and write
26FD6CDB000
heap
page read and write
26FD6C41000
heap
page read and write
C002956000
direct allocation
page read and write
294FE379000
heap
page read and write
294FE247000
heap
page read and write
294F69FD000
heap
page read and write
26FD6D0A000
heap
page read and write
C002B7C000
direct allocation
page read and write
C002AB6000
direct allocation
page read and write
294FE15D000
heap
page read and write
294FE147000
heap
page read and write
294FE14D000
heap
page read and write
294FE0F8000
heap
page read and write
26FD6A92000
heap
page read and write
294FE14D000
heap
page read and write
294FE11D000
heap
page read and write
26FD6CD7000
heap
page read and write
294FE120000
heap
page read and write
26FD7041000
heap
page read and write
294FE353000
heap
page read and write
294F6D0E000
heap
page read and write
294FE379000
heap
page read and write
294FE107000
heap
page read and write
294FE13B000
heap
page read and write
26FD6C85000
heap
page read and write
294FE140000
heap
page read and write
294FE379000
heap
page read and write
C002AB8000
direct allocation
page read and write
294FE100000
heap
page read and write
294FE154000
heap
page read and write
294FE379000
heap
page read and write
26FD4A74000
heap
page read and write
26FD4AC2000
heap
page read and write
294FE379000
heap
page read and write
26FD6C85000
heap
page read and write
294FE379000
heap
page read and write
26FD6CD9000
heap
page read and write
C00289A000
direct allocation
page read and write
26FD6D03000
heap
page read and write
26FD70C1000
heap
page read and write
26FD7041000
heap
page read and write
294FE124000
heap
page read and write
294FE150000
heap
page read and write
294FE14E000
heap
page read and write
294FE11F000
heap
page read and write
294FE120000
heap
page read and write
294FE13F000
heap
page read and write
294FE153000
heap
page read and write
26FD6C41000
heap
page read and write
26FD6D83000
heap
page read and write
294F69EE000
heap
page read and write
26FD6C41000
heap
page read and write
294FE379000
heap
page read and write
26FD6C95000
heap
page read and write
294FE107000
heap
page read and write
294FE14B000
heap
page read and write
294FE118000
heap
page read and write
294FE15E000
heap
page read and write
294FE379000
heap
page read and write
294FE0E1000
heap
page read and write
294FE15D000
heap
page read and write
C002936000
direct allocation
page read and write
294FE147000
heap
page read and write
C002B48000
direct allocation
page read and write
C002BAA000
direct allocation
page read and write
26FD6A7B000
heap
page read and write
26FD6C63000
heap
page read and write
294F69F4000
heap
page read and write
26FD7041000
heap
page read and write
294F6A0E000
heap
page read and write
26FD6CD9000
heap
page read and write
26FD6D2B000
heap
page read and write
26FD6D03000
heap
page read and write
294F69EC000
heap
page read and write
294FE15D000
heap
page read and write
294FE370000
heap
page read and write
294FE140000
heap
page read and write
26FD6D0A000
heap
page read and write
294F6A0E000
heap
page read and write
294FE0E8000
heap
page read and write
C00285C000
direct allocation
page read and write
294FE371000
heap
page read and write
294FE379000
heap
page read and write
C002864000
direct allocation
page read and write
26FD6C61000
heap
page read and write
294F6D0B000
heap
page read and write
294FE247000
heap
page read and write
294FE13C000
heap
page read and write
294F6A15000
heap
page read and write
294FE379000
heap
page read and write
26FD6A94000
heap
page read and write
294FE13C000
heap
page read and write
C001362000
direct allocation
page read and write
294FE24D000
heap
page read and write
C002872000
direct allocation
page read and write
26FD6D0B000
heap
page read and write
294FE118000
heap
page read and write
26FD6C41000
heap
page read and write
26FD4A74000
heap
page read and write
294FE15D000
heap
page read and write
294FE0E9000
heap
page read and write
294FE13B000
heap
page read and write
294FE379000
heap
page read and write
294F69E9000
heap
page read and write
294FE13B000
heap
page read and write
26FD6D83000
heap
page read and write
294FE379000
heap
page read and write
There are 1874 hidden memdumps, click here to show them.