IOC Report
SecuriteInfo.com.FileRepMalware.22561.28030.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.22561.28030.exe
initial sample
malicious
C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Browsers\Cookies.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Browsers\Firefox\History.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\network_info.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\process_info.txt
ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\system_info.txt
Algol 68 source, ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\EFOYFBOLXA.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PIVFAGEAAV.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PWCCAWLGRE.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_cffi_backend.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_helpers.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_parser.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_writer.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_websocket.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist\_frozenlist.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\multidict\_multidict.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\propcache\_helpers_c.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI12922\yarl\_quoting_c.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\49flztqg
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Display (1).png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AutofillData.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Cookies.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\DownloadData.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\HistoryData.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Logins.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\GAOBCVIQIJ.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LSBIHQFDVT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LSBIHQFDVT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PALRGUCVEH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\QNCYCDFIJJ.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\QNCYCDFIJJ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\QNCYCDFIJJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\SQSJKEBWDT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\SQSJKEBWDT.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\SUAVTZKNFL.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ZQIXMVQGAH.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\EFOYFBOLXA.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\GAOBCVIQIJ.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LSBIHQFDVT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LSBIHQFDVT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\PALRGUCVEH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\PIVFAGEAAV.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\PWCCAWLGRE.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\QNCYCDFIJJ.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\QNCYCDFIJJ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\QNCYCDFIJJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\SQSJKEBWDT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\SQSJKEBWDT.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\SUAVTZKNFL.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ZQIXMVQGAH.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\EFOYFBOLXA.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\GAOBCVIQIJ.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LSBIHQFDVT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LSBIHQFDVT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\PALRGUCVEH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\PIVFAGEAAV.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\PWCCAWLGRE.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\QNCYCDFIJJ.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\QNCYCDFIJJ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\QNCYCDFIJJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\SQSJKEBWDT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\SQSJKEBWDT.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\SUAVTZKNFL.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ZQIXMVQGAH.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\GAOBCVIQIJ.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\LSBIHQFDVT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\QNCYCDFIJJ.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\IPKGELNTQY\ZQIXMVQGAH.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\EFOYFBOLXA.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\LSBIHQFDVT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\PALRGUCVEH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\QNCYCDFIJJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\SQSJKEBWDT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\LSBIHQFDVT\SUAVTZKNFL.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\PIVFAGEAAV.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\PWCCAWLGRE.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\QNCYCDFIJJ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\SQSJKEBWDT.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\NEBFQQYWPS\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Web.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\METADATA
Unicode text, UTF-8 text, with very long lines (411)
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info\licenses\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0t1faps.il3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pkesy0nl.lqb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tg1dm3o1.nds.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xrc3jcte.obs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (610), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.out
Unicode text, UTF-8 (with BOM) text, with very long lines (743), with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
There are 135 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "gdb --version"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_VideoController get name
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic computersystem get Manufacturer
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic path Win32_ComputerSystem get Manufacturer
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe""
malicious
C:\Windows\System32\attrib.exe
attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c chcp
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Get-Clipboard
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c chcp
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic logicaldisk get caption,description,providername
malicious
C:\Windows\System32\net.exe
net user
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 user
malicious
C:\Windows\System32\net.exe
net localgroup
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 localgroup
malicious
C:\Windows\System32\net.exe
net localgroup administrators
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 localgroup administrators
malicious
C:\Windows\System32\net.exe
net user guest
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 user guest
malicious
C:\Windows\System32\net.exe
net user administrator
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 user administrator
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic startup get caption,command
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\ARP.EXE
arp -a
malicious
C:\Windows\System32\NETSTAT.EXE
netstat -ano
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\netsh.exe
netsh firewall show config
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\chcp.com
chcp
C:\Windows\System32\chcp.com
chcp
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\HOSTNAME.EXE
hostname
C:\Windows\System32\query.exe
query user
C:\Windows\System32\quser.exe
"C:\Windows\system32\quser.exe"
C:\Windows\System32\tasklist.exe
tasklist /svc
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\sc.exe
sc query type= service state= all
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 70 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://account.riotgames.com/api/account/v1/user
unknown
https://accounts.reddit.com/api/access_token
unknown
https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002/?key=440D7F4D810EF9298D25EDDF37C1F9
unknown
https://github.com/pyca/cryptography/issues/8996
unknown
https://go.microsoft.co
unknown
https://github.com/python-attrs/attrs/issues/251
unknown
https://klaviyo.com/
unknown
https://tiktok.com/
unknown
https://github.com/aio-libs/aiohttp/discussions/6044
unknown
http://python.org
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://www.attrs.org/en/24.2.0/_static/sponsors/
unknown
http://python.org:80
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/sponsors/hynek
unknown
https://github.com/python-attrs/attrs/issues/1328)
unknown
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
unknown
https://oauth.reddit.com/api/v1/me
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://store1.gofile.io/uploadFile
unknown
https://support.mozilla.org/kb/custom
unknown
https://raw.githubusercontent.com/python-attrs/attrs/main/docs/_static/attrs_logo.svg
unknown
https://tidelift.com/?utm_source=lifter&utm_medium=referral&utm_campaign=hynek).
unknown
https://www.attrs.org/en/stable/init.html#hooking-yourself-into-initialization)
unknown
https://github.com/python-attrs/attrs)
unknown
https://www.attrs.org/)
unknown
https://i.hizliresim.com/8po0puy.jfifPY9H
unknown
https://twitter.com
unknown
https://twitter.com/home
unknown
https://nuget.org/nuget.exe
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
unknown
https://github.com/python-attrs/attrs/issues/136
unknown
https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba
unknown
https://i.hizliresim.com/6t31tw2.jpg0m9H
unknown
https://i.hizliresim.com/8po0puy.jfif
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://github.com/python-attrs/attrs/issues/1329)
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://webcast.tiktok.com/webcast/wallet_api/diamond_buy/permission/?aid=1988&app_language=de-DE&ap
unknown
http://json.org
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://github.com/python-attrs/attrs/issues/1330)
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://go.micro
unknown
https://instagram.com/p
unknown
https://raw.githubusercontent.com/justforExela/injection/main/injection.js
unknown
https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://contoso.com/Icon
unknown
https://discord.com/api/v8/users/
unknown
https://i.hizliresim.com/qxnzimj.jpg
unknown
https://www.apache.org/licenses/
unknown
https://www.attrs.org/en/latest/names.html)
unknown
https://www.twitch.tv/
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
unknown
https://open.spotify.com/user/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://filepreviews.io/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.attrs.org/en/stable/why.html#data-classes)
unknown
https://github.com/Pester/Pester
unknown
https://cryptography.io/en/latest/installation/
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://www.attrs.org/en/stable/changelog.html
unknown
https://cryptography.io/en/latest/security/
unknown
https://cffi.readthedocs.io/en/latest/using.html#callbacks
unknown
https://i.hizliresim.com/6t31tw2.jpg
unknown
https://thumbnails.roblox.com/v1/users/avatar?userIds=
unknown
https://www.variomedia.de/
unknown
https://bugs.python.org/issue37179
unknown
https://twitter.com/i/api/1.1/account/update_profile.jsonP
unknown
http://crl.microsoftfM%
unknown
https://www.reddit.com/user/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://github.com/quicaxd/Exela-V2.0zI
unknown
https://go.m
unknown
https://github.com/pyca/cryptography/issues
unknown
https://readthedocs.org/projects/cryptography/badge/?version=latest
unknown
https://t.me/ExelaStealer
unknown
https://www.attrs.org/
unknown
https://mahler:8092/site-updates.py
unknown
https://oauth.reddit.com/api/v1/mep
unknown
https://github.com/pyca/cryptography
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://cryptography.io/
unknown
https://github.com
unknown
https://docs.python.org/3/library/asyncio-eventloop.html
unknown
https://github.com/quicaxd/Ex
unknown
https://i.hizliresim.com/6t31tw2.jpgpZ9H
unknown
http://ip-api.com/json
208.95.112.1
http://python.org/
unknown
https://contoso.com/License
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://peps.python.org/pep-0749/)-implementing
unknown
https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)).
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.136.232
ip-api.com
208.95.112.1
store1.gofile.io
45.112.123.227
api.gofile.io
45.112.123.126
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
162.159.136.232
discord.com
United States
162.159.137.232
unknown
United States
45.112.123.126
api.gofile.io
Singapore
45.112.123.227
store1.gofile.io
Singapore
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters
TrapPollTimeMilliSecs

Memdumps

Base Address
Regiontype
Protect
Malicious
18B4A0B0000
direct allocation
page read and write
malicious
18B48390000
direct allocation
page read and write
malicious
18B47BF3000
heap
page read and write
malicious
18B487FD000
heap
page read and write
malicious
18B49FB0000
direct allocation
page read and write
malicious
7FF7B2B8B000
unkown
page readonly
260D91C9000
heap
page read and write
1F78AEEE000
heap
page read and write
187225BA000
heap
page read and write
260C1181000
trusted library allocation
page read and write
1F4C6E11000
heap
page read and write
142E9F2D000
heap
page read and write
1C7B7431000
heap
page read and write
215AB5F0000
heap
page read and write
7FFD32FF0000
trusted library allocation
page execute and read and write
18B48FAE000
heap
page read and write
1F788E90000
heap
page read and write
7FFD9E856000
unkown
page execute and write copy
7FFDA4637000
unkown
page execute and read and write
18B490E9000
heap
page read and write
2909FBF3000
heap
page read and write
187225CB000
heap
page read and write
1C7B73A3000
heap
page read and write
18B472D0000
heap
page read and write
2909FA50000
heap
page read and write
1FAB36C7000
heap
page read and write
453F8FF000
unkown
page read and write
24D95FE4000
heap
page read and write
18B4983F000
heap
page read and write
18B4778C000
heap
page read and write
36DF8EC000
stack
page read and write
1C7B73E1000
heap
page read and write
231D6D2A000
heap
page read and write
18B4912B000
heap
page read and write
276C0AAB000
heap
page read and write
231D6D04000
heap
page read and write
18B48ED1000
heap
page read and write
18387EE7000
heap
page read and write
7FFD93DAD000
unkown
page execute and read and write
209D92E5000
heap
page read and write
18723E33000
heap
page read and write
1F789668000
heap
page read and write
18389DA4000
heap
page read and write
18B45105000
heap
page read and write
260BF2D0000
heap
page read and write
15ABB9E4000
heap
page read and write
18B49713000
heap
page read and write
18B49D01000
heap
page read and write
1C7B73E3000
heap
page read and write
1838806E000
heap
page read and write
215AD354000
heap
page read and write
1F788FA2000
heap
page read and write
B6FA76B000
stack
page read and write
231D72C0000
heap
page read and write
215ABA19000
heap
page read and write
2909FBED000
heap
page read and write
215ABA04000
heap
page read and write
1FAB3145000
heap
page read and write
24373C64000
heap
page read and write
1C7B7434000
heap
page read and write
7FFD9DF7D000
unkown
page read and write
1F789679000
heap
page read and write
187225A5000
heap
page read and write
18722003000
heap
page read and write
260BF263000
heap
page read and write
1FAB2F07000
heap
page read and write
18B488DA000
heap
page read and write
1FAB2F07000
heap
page read and write
218F1404000
heap
page read and write
7FFDA086D000
unkown
page execute and read and write
7FFDA32FC000
unkown
page execute and read and write
1F788FB2000
heap
page read and write
1C7B76A4000
heap
page read and write
231D6CC8000
heap
page read and write
24D95B80000
heap
page read and write
FD2C87C000
stack
page read and write
18B48C7B000
heap
page read and write
18B451A4000
heap
page read and write
2BD86721000
heap
page read and write
18B49D61000
heap
page read and write
18B48180000
direct allocation
page read and write
18B479A0000
heap
page read and write
18721FF4000
heap
page read and write
3C8907E000
stack
page read and write
7FFD9DFA0000
unkown
page readonly
7FFDA3558000
unkown
page execute and read and write
18387F61000
heap
page read and write
621BCE000
stack
page read and write
18B48B5F000
heap
page read and write
1C7B79FE000
heap
page read and write
7FFD33160000
trusted library allocation
page read and write
18721FEF000
heap
page read and write
52AA27F000
stack
page read and write
242DF790000
heap
page read and write
28DDB740000
heap
page read and write
7FFDA5490000
unkown
page readonly
1C7B73F9000
heap
page read and write
7FFD944B3000
unkown
page execute and read and write
18721F97000
heap
page read and write
18387F27000
heap
page read and write
5B407F000
stack
page read and write
1F788FB7000
heap
page read and write
18B4996E000
heap
page read and write
18B47955000
heap
page read and write
18B4881F000
heap
page read and write
18721FE9000
heap
page read and write
18B4767D000
heap
page read and write
18389D9D000
heap
page read and write
15ABB720000
heap
page read and write
18B47C38000
heap
page read and write
205C8B10000
heap
page read and write
2B2277C2000
heap
page read and write
2239CB20000
heap
page read and write
18B4767C000
heap
page read and write
18B479E2000
heap
page read and write
7DF46C4E0000
trusted library allocation
page execute and read and write
18B4A202000
heap
page read and write
215AB344000
heap
page read and write
18B473B0000
direct allocation
page read and write
18B493C0000
heap
page read and write
215AD350000
heap
page read and write
18B4763C000
heap
page read and write
1C7B7547000
heap
page read and write
1C7B73F3000
heap
page read and write
7FFD332B0000
trusted library allocation
page read and write
1C7B76AB000
heap
page read and write
18721F5B000
heap
page read and write
276C0D70000
heap
page read and write
7FFD9E840000
unkown
page readonly
209D9330000
heap
page read and write
1F4C70A4000
heap
page read and write
1FAB4F6E000
heap
page read and write
7FFDA3435000
unkown
page execute and read and write
18B48E91000
heap
page read and write
1C7B73E3000
heap
page read and write
18B48BA8000
heap
page read and write
218F1410000
heap
page read and write
9D33E7C000
stack
page read and write
CAD29DF000
stack
page read and write
7FFD944E3000
unkown
page execute and write copy
1C7B7A22000
heap
page read and write
231D8BCE000
heap
page read and write
18B490E9000
heap
page read and write
18B497BF000
heap
page read and write
7FF7B2BA4000
unkown
page readonly
18B47B9E000
heap
page read and write
1FAB36DF000
heap
page read and write
18B49A1A000
heap
page read and write
7FFDA3472000
unkown
page read and write
15ABB729000
heap
page read and write
2909FBC7000
heap
page read and write
18B49BBE000
heap
page read and write
7FF7B2B61000
unkown
page execute read
E8E79FE000
unkown
page read and write
2797DB00000
heap
page read and write
2BD86724000
heap
page read and write
18B49064000
heap
page read and write
18B48491000
heap
page read and write
1FAB36D0000
heap
page read and write
1F788F10000
heap
page read and write
215AB69A000
heap
page read and write
18B48C86000
heap
page read and write
230CA418000
heap
page read and write
18721FA2000
heap
page read and write
C8307F000
stack
page read and write
18B4944D000
heap
page read and write
1C1C2FE000
stack
page read and write
231D6CA0000
trusted library allocation
page read and write
1FAB2F0C000
heap
page read and write
18B497C9000
heap
page read and write
2302ED5A000
heap
page read and write
231D6D1A000
heap
page read and write
2B2277C2000
heap
page read and write
243739F8000
heap
page read and write
218F1A10000
heap
page read and write
7FFD33114000
trusted library allocation
page read and write
22048DE1000
heap
page read and write
18B49E65000
heap
page read and write
215AB6AB000
heap
page read and write
8BCD0FF000
unkown
page read and write
1F78AEE3000
heap
page read and write
18B47386000
heap
page read and write
7FFD330D0000
trusted library allocation
page read and write
18B49402000
heap
page read and write
7FFDA36E1000
unkown
page execute and read and write
133E1207000
heap
page read and write
205C8DC0000
heap
page read and write
260C120C000
trusted library allocation
page read and write
215AB349000
heap
page read and write
2797DB3A000
heap
page read and write
18723E3E000
heap
page read and write
1C7B7A0C000
heap
page read and write
2BD86724000
heap
page read and write
2909FBED000
heap
page read and write
18B49A17000
heap
page read and write
215ABA1C000
heap
page read and write
1C7B7390000
heap
page read and write
215AB280000
heap
page read and write
1C7B73E1000
heap
page read and write
1CBB6D24000
heap
page read and write
9D33F7F000
stack
page read and write
215AB9F8000
heap
page read and write
215AB260000
heap
page read and write
19350B3A000
heap
page read and write
18B45171000
heap
page read and write
D6F52FF000
stack
page read and write
2BD86724000
heap
page read and write
2BD8672F000
heap
page read and write
18B47B0B000
heap
page read and write
1C7B92C4000
heap
page read and write
18B47ABA000
heap
page read and write
18B45198000
heap
page read and write
1FAB2E20000
heap
page read and write
FD2CBF9000
stack
page read and write
133E1200000
heap
page read and write
2239CA50000
heap
page read and write
215ABA22000
heap
page read and write
A391FDE000
stack
page read and write
18B4944F000
heap
page read and write
18B4519E000
heap
page read and write
DEA8DFE000
unkown
page read and write
18B4519C000
heap
page read and write
215AB318000
heap
page read and write
1FAB36F1000
heap
page read and write
18B48BC6000
heap
page read and write
24D95C60000
heap
page read and write
1FAB2F07000
heap
page read and write
205C8BF5000
heap
page read and write
2BD86723000
heap
page read and write
1C7B92D5000
heap
page read and write
18B497B8000
heap
page read and write
209D92F0000
heap
page read and write
36231CE000
stack
page read and write
2245C170000
heap
page read and write
218F155C000
heap
page read and write
231D72E8000
heap
page read and write
1C7B740A000
heap
page read and write
2797DCE0000
heap
page read and write
2239CC00000
heap
page read and write
215AB693000
heap
page read and write
1F788F79000
heap
page read and write
215AB340000
heap
page read and write
18B45175000
heap
page read and write
2BD86731000
heap
page read and write
2909FBFD000
heap
page read and write
2BD86720000
heap
page read and write
18B476B3000
heap
page read and write
7FFD9DEB1000
unkown
page execute and read and write
2797DB4D000
heap
page read and write
18B4519D000
heap
page read and write
18B47A0B000
heap
page read and write
2BD8672E000
heap
page read and write
1872259E000
heap
page read and write
1C7B92C2000
heap
page read and write
231D72CC000
heap
page read and write
205C8BD0000
heap
page read and write
255A2950000
heap
page read and write
1C7B7544000
heap
page read and write
187225BA000
heap
page read and write
1F78AEF6000
heap
page read and write
24D95D71000
heap
page read and write
215AB697000
heap
page read and write
2909FBC7000
heap
page read and write
18B48D90000
direct allocation
page read and write
18B497C8000
heap
page read and write
1F789264000
heap
page read and write
7FFDA549C000
unkown
page read and write
1F788FAE000
heap
page read and write
18B47A89000
heap
page read and write
18B47B87000
heap
page read and write
1C7B76A0000
heap
page read and write
18B4855C000
heap
page read and write
1651FEB0000
heap
page read and write
1F4C6E09000
heap
page read and write
5B3E7F000
stack
page read and write
1F78926B000
heap
page read and write
18B47A63000
heap
page read and write
3C891FE000
stack
page read and write
231D6CF5000
heap
page read and write
215AD35E000
heap
page read and write
1FAB2EE8000
heap
page read and write
18387EB6000
heap
page read and write
218F152A000
heap
page read and write
1FAB2F1F000
heap
page read and write
1F788FAB000
heap
page read and write
28DDB927000
heap
page read and write
231D72E9000
heap
page read and write
7FFDA0875000
unkown
page read and write
18B46E70000
direct allocation
page read and write
1FAB323D000
heap
page read and write
1C7B92CF000
heap
page read and write
260C28E4000
trusted library allocation
page read and write
215AB9FF000
heap
page read and write
2BD8672C000
heap
page read and write
1091ED90000
heap
page read and write
FD2D84D000
stack
page read and write
18721FFA000
heap
page read and write
18B4798C000
heap
page read and write
2768FE000
unkown
page read and write
23F537C0000
heap
page read and write
2BD86724000
heap
page read and write
18B490A8000
heap
page read and write
260D1190000
trusted library allocation
page read and write
18B48732000
heap
page read and write
205C8C07000
heap
page read and write
1091EB40000
heap
page read and write
19350C80000
heap
page read and write
205C8C19000
heap
page read and write
1091EB63000
heap
page read and write
1838806A000
heap
page read and write
22125EE0000
heap
page read and write
2BD86724000
heap
page read and write
232DEBC4000
heap
page read and write
18B49A17000
heap
page read and write
1C7B7A09000
heap
page read and write
18B49D53000
heap
page read and write
18B472D1000
heap
page read and write
C85BB2D000
stack
page read and write
18388062000
heap
page read and write
18B47B59000
heap
page read and write
260BF28F000
heap
page read and write
18B49D7E000
heap
page read and write
18722442000
heap
page read and write
18B477B0000
direct allocation
page read and write
18B45143000
heap
page read and write
22125EEA000
heap
page read and write
18B47B87000
heap
page read and write
1CCF66B0000
heap
page read and write
2F532470000
heap
page read and write
215AB690000
heap
page read and write
2909FBD8000
heap
page read and write
1F789674000
heap
page read and write
18B475CA000
heap
page read and write
1F7892F4000
heap
page read and write
1FAB36F9000
heap
page read and write
18B49B2B000
heap
page read and write
231D8BD5000
heap
page read and write
1F788FB6000
heap
page read and write
18B48BC6000
heap
page read and write
18B4859D000
heap
page read and write
18B498ED000
heap
page read and write
A7DCAFC000
stack
page read and write
1C7B92C3000
heap
page read and write
18B450E4000
heap
page read and write
5F047FF000
stack
page read and write
18B475CB000
heap
page read and write
7FFD33190000
trusted library allocation
page read and write
18B47BA0000
heap
page read and write
1FAB36E8000
heap
page read and write
18387F6E000
heap
page read and write
18B47AA1000
heap
page read and write
18387F1E000
heap
page read and write
24C59D30000
heap
page read and write
18B48A0D000
heap
page read and write
1C7B73CE000
heap
page read and write
1F788EA0000
heap
page read and write
231D72F1000
heap
page read and write
7FF7B2B8B000
unkown
page readonly
18387F79000
heap
page read and write
18B49A1A000
heap
page read and write
23F537C7000
heap
page read and write
7FFD943C4000
unkown
page execute and read and write
18B450C0000
heap
page read and write
7FFDA5491000
unkown
page execute and read and write
165201F4000
heap
page read and write
7FFD93D01000
unkown
page execute and read and write
18387F5C000
heap
page read and write
1F789669000
heap
page read and write
231D72E8000
heap
page read and write
18721FE6000
heap
page read and write
18722447000
heap
page read and write
218F1A00000
heap
page read and write
18B49D13000
heap
page read and write
18B47307000
heap
page read and write
1FAB36F4000
heap
page read and write
231D8BD6000
heap
page read and write
260C2523000
trusted library allocation
page read and write
18B45171000
heap
page read and write
231D8BC1000
heap
page read and write
231D6D13000
heap
page read and write
1C7B73A7000
heap
page read and write
18B497C8000
heap
page read and write
7FFD93D05000
unkown
page execute and write copy
18B49524000
heap
page read and write
1CBB6AC6000
heap
page read and write
260BF210000
heap
page read and write
187225BA000
heap
page read and write
260C0C30000
heap
page read and write
18387E00000
heap
page read and write
1838806E000
heap
page read and write
1C7B7A25000
heap
page read and write
215AB2A0000
trusted library allocation
page read and write
18B498CD000
heap
page read and write
215AB344000
heap
page read and write
18387F15000
heap
page read and write
2B227A90000
heap
page read and write
7BF6CFF000
stack
page read and write
215AB320000
heap
page read and write
215AB9F0000
heap
page read and write
187225AE000
heap
page read and write
7FFDA4340000
unkown
page execute and read and write
1FAB2E90000
heap
page read and write
1F789262000
heap
page read and write
18387F6E000
heap
page read and write
7FFD332A0000
trusted library allocation
page read and write
18B49755000
heap
page read and write
1C1C078000
stack
page read and write
209D9430000
heap
page read and write
1651FE90000
heap
page read and write
218F1590000
heap
page read and write
215AB69B000
heap
page read and write
64B227F000
stack
page read and write
1F788F40000
heap
page read and write
7FF7B2B8B000
unkown
page readonly
DEA8CFC000
stack
page read and write
18B47625000
heap
page read and write
9AD2BFE000
stack
page read and write
231D6D04000
heap
page read and write
BC082FC000
stack
page read and write
7FFDA54BC000
unkown
page execute and write copy
18B4778D000
heap
page read and write
209D934A000
heap
page read and write
7FFD93BE9000
unkown
page read and write
1F788FB7000
heap
page read and write
18B45175000
heap
page read and write
231D6E00000
trusted library allocation
page read and write
3C8917E000
stack
page read and write
19424DC0000
heap
page read and write
18B45177000
heap
page read and write
1F4C6DB0000
heap
page read and write
1F788FBF000
heap
page read and write
18721FCD000
heap
page read and write
18B451B6000
heap
page read and write
1F7892FB000
heap
page read and write
2BD86610000
heap
page read and write
18B497B8000
heap
page read and write
260D9332000
heap
page read and write
7FFD330F0000
trusted library allocation
page execute and read and write
1FAB2EE8000
heap
page read and write
18387F86000
heap
page read and write
18B472C1000
heap
page read and write
2F532370000
heap
page read and write
AED71FF000
unkown
page read and write
7FFD94090000
unkown
page readonly
1CBB6AA0000
heap
page read and write
7FFD93F8A000
unkown
page execute and read and write
18B47384000
heap
page read and write
260D9310000
heap
page read and write
18B485A0000
heap
page read and write
231D6CEA000
heap
page read and write
18B47674000
heap
page read and write
24373C60000
heap
page read and write
453F5CC000
stack
page read and write
2BD86720000
heap
page read and write
1FAB36CC000
heap
page read and write
17B1B334000
heap
page read and write
255A297D000
heap
page read and write
1651FFCA000
heap
page read and write
17B1B111000
heap
page read and write
18B49D55000
heap
page read and write
18B45183000
heap
page read and write
2245C3C0000
heap
page read and write
18387DD0000
trusted library allocation
page read and write
18388094000
heap
page read and write
2909FB30000
heap
page read and write
18387F82000
heap
page read and write
7FFD9DF7A000
unkown
page execute and read and write
18B48120000
direct allocation
page read and write
7FFDA3561000
unkown
page execute and read and write
1FAB314A000
heap
page read and write
2BD86720000
heap
page read and write
1FAB2F15000
heap
page read and write
1FAB4F60000
heap
page read and write
1CBB6AE1000
heap
page read and write
18B47368000
heap
page read and write
1BC539D000
stack
page read and write
18B49E2D000
heap
page read and write
5F043BB000
stack
page read and write
18B48826000
heap
page read and write
205C8A10000
heap
page read and write
18B49A75000
heap
page read and write
18387DD0000
trusted library allocation
page read and write
1C7B73FB000
heap
page read and write
A7DCCFF000
stack
page read and write
1BC56FF000
stack
page read and write
24373A02000
heap
page read and write
260C0B00000
heap
page readonly
AED72FF000
stack
page read and write
7FFD9DF75000
unkown
page execute and read and write
243738E0000
heap
page read and write
18B495CA000
heap
page read and write
18B48868000
heap
page read and write
DDD1B5D000
stack
page read and write
23F53A00000
heap
page read and write
1C7B741C000
heap
page read and write
18B451B3000
heap
page read and write
22126134000
heap
page read and write
18387F5F000
heap
page read and write
19350B53000
heap
page read and write
18B49513000
heap
page read and write
260D92E7000
heap
page execute and read and write
7FFD33260000
trusted library allocation
page read and write
18B497D8000
heap
page read and write
18B475C3000
heap
page read and write
2BD86720000
heap
page read and write
7FFDA355D000
unkown
page read and write
231D6CF7000
heap
page read and write
215AB2EE000
heap
page read and write
1C1C27E000
stack
page read and write
7FFD9DEE6000
unkown
page read and write
133E1210000
heap
page read and write
18B497DD000
heap
page read and write
1C7B92D5000
heap
page read and write
276C0AA8000
heap
page read and write
133E11A0000
heap
page read and write
7FFDA3531000
unkown
page execute and read and write
18721F90000
heap
page read and write
2797DB4D000
heap
page read and write
18387EA3000
heap
page read and write
187225A7000
heap
page read and write
D3B34FE000
stack
page read and write
1FAB4F61000
heap
page read and write
215ABA04000
heap
page read and write
215ABA01000
heap
page read and write
1C7B74B0000
heap
page read and write
1651FFDC000
heap
page read and write
1F789668000
heap
page read and write
26207654000
heap
page read and write
7FFD93BF0000
unkown
page readonly
18B48733000
heap
page read and write
18B45100000
heap
page read and write
2B227770000
heap
page read and write
260C2E37000
trusted library allocation
page read and write
2BD86725000
heap
page read and write
215AB69E000
heap
page read and write
18B48BD7000
heap
page read and write
C85BE7E000
stack
page read and write
1AB93EE0000
heap
page read and write
276C0A10000
heap
page read and write
2BE10D10000
heap
page read and write
18B45143000
heap
page read and write
7FFD32F8C000
trusted library allocation
page execute and read and write
A1321FF000
stack
page read and write
B6FAAFF000
unkown
page read and write
1F789671000
heap
page read and write
222B2FF000
stack
page read and write
18B4519F000
heap
page read and write
1FAB2F1E000
heap
page read and write
7FF7B2BA2000
unkown
page read and write
260BF287000
heap
page read and write
1F78964E000
heap
page read and write
10E3A9F0000
heap
page read and write
21D1AFE000
stack
page read and write
86990FE000
stack
page read and write
1CBB6AFC000
heap
page read and write
7FFD93F5F000
unkown
page execute and read and write
1FAB4F74000
heap
page read and write
7FFD93CFB000
unkown
page execute and read and write
18B4996E000
heap
page read and write
79AA31B000
stack
page read and write
2797DB38000
heap
page read and write
1C7B73ED000
heap
page read and write
21D1A7E000
stack
page read and write
231D72F4000
heap
page read and write
7FFDA36B4000
unkown
page execute and read and write
1F789265000
heap
page read and write
18B4798E000
heap
page read and write
2BD8672C000
heap
page read and write
3C88D67000
stack
page read and write
18721FD2000
heap
page read and write
2BD86708000
heap
page read and write
5F0477E000
stack
page read and write
1FAB2E40000
heap
page read and write
215AB324000
heap
page read and write
1F788FAC000
heap
page read and write
18B49974000
heap
page read and write
215AB33F000
heap
page read and write
2BD86730000
heap
page read and write
1FAB2E60000
trusted library allocation
page read and write
7FFDA3463000
unkown
page execute and read and write
7FFDA3711000
unkown
page execute and read and write
1C7B92CF000
heap
page read and write
1C7B73A2000
heap
page read and write
24C59C50000
heap
page read and write
142EA020000
heap
page read and write
18723E30000
heap
page read and write
232DE840000
heap
page read and write
C830FF000
stack
page read and write
2BD8672D000
heap
page read and write
2B2277C2000
heap
page read and write
1FF04180000
heap
page read and write
18B497DC000
heap
page read and write
18B4798C000
heap
page read and write
18B47A05000
heap
page read and write
18B4519E000
heap
page read and write
2797DB28000
heap
page read and write
231D6D04000
heap
page read and write
1FF03E10000
heap
page read and write
231D6D0B000
heap
page read and write
1AB93FD9000
heap
page read and write
7FFD93BDE000
unkown
page execute and read and write
18B48628000
heap
page read and write
1CCF68E0000
heap
page read and write
7FF7B2B61000
unkown
page execute read
7BF6B7E000
stack
page read and write
7FFD944A9000
unkown
page execute and read and write
231D6D13000
heap
page read and write
52AA17F000
stack
page read and write
218F154B000
heap
page read and write
1102CFF000
stack
page read and write
7FFD93D11000
unkown
page execute and read and write
260BF240000
heap
page read and write
260C2815000
trusted library allocation
page read and write
1F788FA7000
heap
page read and write
18B451AE000
heap
page read and write
18B47A74000
heap
page read and write
1FAB2F05000
heap
page read and write
1F788F7F000
heap
page read and write
18387E90000
heap
page read and write
1091EB64000
heap
page read and write
7FFD93D07000
unkown
page read and write
1C7B754E000
heap
page read and write
18B49CB9000
heap
page read and write
26207650000
heap
page read and write
18B450A0000
heap
page read and write
1651FF90000
heap
page read and write
1C1C1FE000
stack
page read and write
621DBE000
stack
page read and write
231D72A0000
heap
page read and write
1F4C70A5000
heap
page read and write
2239C920000
heap
page read and write
7FFD94053000
unkown
page execute and read and write
2797DB2E000
heap
page read and write
18B4937D000
heap
page read and write
1F78AEE1000
heap
page read and write
1F7892F0000
heap
page read and write
18B45106000
heap
page read and write
230CA7A0000
heap
page read and write
1C7B7490000
heap
page read and write
1F788F96000
heap
page read and write
215AB322000
heap
page read and write
18B491F1000
heap
page read and write
DDD1BDE000
stack
page read and write
1838809B000
heap
page read and write
231D72C7000
heap
page read and write
18B48BD8000
heap
page read and write
230F89D0000
heap
page read and write
205C8BF6000
heap
page read and write
18B48BE6000
heap
page read and write
1F78926A000
heap
page read and write
F868AFF000
stack
page read and write
231D72D1000
heap
page read and write
1091EB20000
heap
page read and write
18B475CD000
heap
page read and write
16FD0050000
heap
page read and write
18B4937E000
heap
page read and write
17B1B111000
heap
page read and write
1FAB3230000
heap
page read and write
18721F00000
trusted library allocation
page read and write
A7DCBFF000
unkown
page read and write
18B48B5F000
heap
page read and write
A391F5E000
stack
page read and write
18B472FA000
heap
page read and write
1091EB69000
heap
page read and write
18387F35000
heap
page read and write
7FFD9F3C1000
unkown
page execute and read and write
18B4981F000
heap
page read and write
18B48C7B000
heap
page read and write
18387EEF000
heap
page read and write
18B478B0000
heap
page read and write
18B4799C000
heap
page read and write
1872244B000
heap
page read and write
1F78965C000
heap
page read and write
1CBB6AED000
heap
page read and write
18B4799B000
heap
page read and write
2BD86727000
heap
page read and write
8698E77000
stack
page read and write
2BD86721000
heap
page read and write
7FFD94060000
unkown
page execute and read and write
2BD8672C000
heap
page read and write
2BD86721000
heap
page read and write
18B49A75000
heap
page read and write
18B475B2000
heap
page read and write
1F78926A000
heap
page read and write
18B4519F000
heap
page read and write
231D6DF0000
heap
page read and write
18B475B0000
heap
page read and write
24373A02000
heap
page read and write
7FFDA4348000
unkown
page read and write
18B47C8E000
heap
page read and write
1FAB36E8000
heap
page read and write
2909FB50000
heap
page read and write
18B47C94000
heap
page read and write
2BD86721000
heap
page read and write
FC7687F000
stack
page read and write
1C7B74D0000
trusted library allocation
page read and write
1F788F93000
heap
page read and write
231D7157000
heap
page read and write
10E3AAD0000
heap
page read and write
260BF306000
heap
page read and write
362347F000
stack
page read and write
2BD86724000
heap
page read and write
18B48B65000
heap
page read and write
1C7B740B000
heap
page read and write
18B47312000
heap
page read and write
215AB33A000
heap
page read and write
18B4518B000
heap
page read and write
15ABB630000
heap
page read and write
28DDB920000
heap
page read and write
215AB34C000
heap
page read and write
64B1FEE000
stack
page read and write
18B49233000
heap
page read and write
2BD86720000
heap
page read and write
1C7B73E9000
heap
page read and write
18B4859D000
heap
page read and write
7FFD330E1000
trusted library allocation
page read and write
553007F000
stack
page read and write
1F788FAF000
heap
page read and write
231D6BA0000
heap
page read and write
18387E89000
heap
page read and write
276C0AB5000
heap
page read and write
18721FF4000
heap
page read and write
18B47B0B000
heap
page read and write
1D25C8C0000
heap
page read and write
18B49D74000
heap
page read and write
7FFDA4160000
unkown
page readonly
7FFD9DFE8000
unkown
page execute and read and write
18B49B0A000
heap
page read and write
18722002000
heap
page read and write
187225BA000
heap
page read and write
1F4C6E11000
heap
page read and write
18B4A1C1000
heap
page read and write
F9F7F7F000
stack
page read and write
16FD0020000
heap
page read and write
895A5CE000
stack
page read and write
230F88F0000
heap
page read and write
1F788F53000
heap
page read and write
2239CA20000
heap
page read and write
2BD86724000
heap
page read and write
231D72E8000
heap
page read and write
18B48490000
heap
page read and write
218F1406000
heap
page read and write
2909FBCD000
heap
page read and write
18B49402000
heap
page read and write
9AD2C7E000
stack
page read and write
18387EAF000
heap
page read and write
276C0AB5000
heap
page read and write
18722447000
heap
page read and write
1F4C6E11000
heap
page read and write
2EC04FC000
stack
page read and write
215AB352000
heap
page read and write
187225AE000
heap
page read and write
1F4C6E11000
heap
page read and write
1FAB2E60000
trusted library allocation
page read and write
18B48C84000
heap
page read and write
24C59B50000
heap
page read and write
215AB35D000
heap
page read and write
218F157F000
heap
page read and write
18721DE0000
heap
page read and write
18721EE0000
heap
page read and write
260D92F0000
heap
page read and write
18B49D06000
heap
page read and write
18B4516C000
heap
page read and write
260C2A8C000
trusted library allocation
page read and write
218F156B000
heap
page read and write
18B47B87000
heap
page read and write
18B49B0A000
heap
page read and write
1CBB6A00000
heap
page read and write
18722007000
heap
page read and write
2BE10A52000
heap
page read and write
1F78926E000
heap
page read and write
18B4518F000
heap
page read and write
18B48EE2000
heap
page read and write
18B49065000
heap
page read and write
2BD86723000
heap
page read and write
7FFD33289000
trusted library allocation
page read and write
1C7B754B000
heap
page read and write
18B48752000
heap
page read and write
7FFDA4631000
unkown
page execute and read and write
26207380000
heap
page read and write
1C7B742B000
heap
page read and write
215AD365000
heap
page read and write
230F88D0000
heap
page read and write
18B47312000
heap
page read and write
1FF03F10000
heap
page read and write
18388090000
heap
page read and write
18387EBB000
heap
page read and write
1FAB36D3000
heap
page read and write
1651FFED000
heap
page read and write
1F788EC0000
heap
page read and write
1651FFB7000
heap
page read and write
18723E45000
heap
page read and write
7BF6A78000
stack
page read and write
7FFDA355B000
unkown
page execute and write copy
9AD2B7F000
stack
page read and write
18B472E6000
heap
page read and write
1C7B7A1B000
heap
page read and write
205C8C1D000
heap
page read and write
18B49D58000
heap
page read and write
2797DB58000
heap
page read and write
2BD86721000
heap
page read and write
260C1DB5000
trusted library allocation
page read and write
18721FE6000
heap
page read and write
260D925F000
heap
page read and write
18B49A33000
heap
page read and write
1FAB314B000
heap
page read and write
A3922FE000
stack
page read and write
7FFDA54BE000
unkown
page read and write
18B49A1E000
heap
page read and write
7FFD9F3D7000
unkown
page execute and read and write
205C8C2B000
heap
page read and write
18387F79000
heap
page read and write
18B48EE2000
heap
page read and write
18387EE0000
heap
page read and write
18B49527000
heap
page read and write
18387E87000
heap
page read and write
262074B0000
heap
page read and write
276C0AAE000
heap
page read and write
1FAB3142000
heap
page read and write
205C8C1D000
heap
page read and write
552FFFF000
stack
page read and write
1872259C000
heap
page read and write
18389D92000
heap
page read and write
18B4734B000
heap
page read and write
18B475EE000
heap
page read and write
1C7B92CF000
heap
page read and write
1F4C70A0000
heap
page read and write
1FF04190000
heap
page read and write
1C7B7434000
heap
page read and write
2C49D1A4000
heap
page read and write
1C7B7A01000
heap
page read and write
5B3B8B000
stack
page read and write
260C0AF0000
trusted library allocation
page read and write
7FF7B2B60000
unkown
page readonly
218F13E0000
heap
page read and write
17B1B1F0000
heap
page read and write
7FFD9DF8E000
unkown
page execute and write copy
18387F37000
heap
page read and write
18B487BB000
heap
page read and write
218F14F9000
heap
page read and write
18387F27000
heap
page read and write
1C7B7A06000
heap
page read and write
142E9F2B000
heap
page read and write
1651FFE0000
heap
page read and write
2BD86720000
heap
page read and write
18721FE6000
heap
page read and write
18B49A1A000
heap
page read and write
230F89D9000
heap
page read and write
18721F54000
heap
page read and write
1C7B73F6000
heap
page read and write
260D9247000
heap
page read and write
7FFD9DF60000
unkown
page readonly
18388063000
heap
page read and write
1FAB2E60000
trusted library allocation
page read and write
7FFD93460000
unkown
page readonly
1D25C890000
heap
page read and write
17B1B050000
heap
page read and write
18B47CAD000
heap
page read and write
18721FC8000
heap
page read and write
18B47A56000
heap
page read and write
2C49CF30000
heap
page read and write
16FD00E1000
heap
page read and write
18387F79000
heap
page read and write
18B47329000
heap
page read and write
18B4988B000
heap
page read and write
1CCF64D0000
heap
page read and write
7FFDA3A92000
unkown
page execute and write copy
1F788F77000
heap
page read and write
1C7B73E3000
heap
page read and write
7FFDA3A81000
unkown
page execute and read and write
1F788F85000
heap
page read and write
7FFDA54BB000
unkown
page execute and read and write
18B48A96000
heap
page read and write
18389D80000
heap
page read and write
1C7B7A2A000
heap
page read and write
7FFDA3310000
unkown
page readonly
218F1509000
heap
page read and write
18B49D13000
heap
page read and write
7FFD93FE1000
unkown
page execute and read and write
FD2CAFE000
stack
page read and write
18B489E4000
heap
page read and write
1F78964C000
heap
page read and write
1C7B754A000
heap
page read and write
CAD2DBF000
stack
page read and write
18B47C3F000
heap
page read and write
1F789654000
heap
page read and write
28DDB860000
heap
page read and write
CAD27E2000
stack
page read and write
1091EB96000
heap
page read and write
260BF0A0000
heap
page read and write
1C7B73ED000
heap
page read and write
7FF7B2B61000
unkown
page execute read
18722590000
heap
page read and write
18387DD0000
trusted library allocation
page read and write
242DF830000
heap
page read and write
869907E000
stack
page read and write
231D72D4000
heap
page read and write
1C7B73E1000
heap
page read and write
8698EFE000
stack
page read and write
2797DE80000
heap
page read and write
36DF9EF000
stack
page read and write
1F4C6DF0000
heap
page read and write
18B49D65000
heap
page read and write
7FFDA3708000
unkown
page execute and read and write
231D6CEC000
heap
page read and write
18722444000
heap
page read and write
1F78AEE6000
heap
page read and write
23F53780000
heap
page read and write
18B49E37000
heap
page read and write
18B47C41000
heap
page read and write
7FFD944A6000
unkown
page execute and read and write
7FFD9DFDF000
unkown
page execute and read and write
1C7B7428000
heap
page read and write
187225C5000
heap
page read and write
218F1490000
heap
page read and write
1AB93FE1000
heap
page read and write
24373A02000
heap
page read and write
18B48795000
heap
page read and write
231D72ED000
heap
page read and write
18B48A52000
heap
page read and write
1BC567F000
stack
page read and write
215ABA1F000
heap
page read and write
7FFDA36CE000
unkown
page read and write
2797DD00000
heap
page read and write
FD2CA79000
stack
page read and write
18B47C38000
heap
page read and write
1F788FAE000
heap
page read and write
1F788FB7000
heap
page read and write
18B486F0000
heap
page read and write
583D59D000
stack
page read and write
7FFDA4330000
unkown
page readonly
23F53A04000
heap
page read and write
2245C350000
heap
page read and write
1FAB36CE000
heap
page read and write
8698FFF000
stack
page read and write
18B47A14000
heap
page read and write
18B47A05000
heap
page read and write
1F788F9E000
heap
page read and write
2EC05FF000
unkown
page read and write
18387EA3000
heap
page read and write
1F788F74000
heap
page read and write
18B48A10000
heap
page read and write
18B47399000
heap
page read and write
1F788EE0000
trusted library allocation
page read and write
7FFDA3470000
unkown
page execute and write copy
209D91D0000
heap
page read and write
1C7B79FF000
heap
page read and write
1D25C950000
heap
page read and write
18387EAC000
heap
page read and write
18387ED6000
heap
page read and write
1C7B7431000
heap
page read and write
18B48795000
heap
page read and write
218F157D000
heap
page read and write
215AD365000
heap
page read and write
1F788FA9000
heap
page read and write
1C7B92C0000
heap
page read and write
B3282FF000
stack
page read and write
1F789648000
heap
page read and write
1F4C6E11000
heap
page read and write
1872200B000
heap
page read and write
7FFD943BC000
unkown
page execute and read and write
18B48F46000
heap
page read and write
1C7B73F1000
heap
page read and write
672847F000
stack
page read and write
18387F6E000
heap
page read and write
1C7B7A02000
heap
page read and write
7FFD33120000
trusted library allocation
page execute and read and write
2B227A94000
heap
page read and write
18B472D3000
heap
page read and write
7FFDA32FE000
unkown
page execute and read and write
1C7B92CF000
heap
page read and write
1C7B79F0000
heap
page read and write
1FAB2F15000
heap
page read and write
1872244A000
heap
page read and write
1F788F93000
heap
page read and write
276C0AB0000
heap
page read and write
7FFDA3733000
unkown
page read and write
218F1405000
heap
page read and write
1C7B754E000
heap
page read and write
18387F63000
heap
page read and write
18B48949000
heap
page read and write
672827F000
stack
page read and write
231D6CA0000
trusted library allocation
page read and write
18B47BA7000
heap
page read and write
18B47C94000
heap
page read and write
7FFD93C9E000
unkown
page execute and read and write
1651FF9C000
heap
page read and write
231D8BCF000
heap
page read and write
1651FFB7000
heap
page read and write
215AB695000
heap
page read and write
230CA600000
heap
page read and write
187225AE000
heap
page read and write
215AB2F7000
heap
page read and write
18B49755000
heap
page read and write
18B4519E000
heap
page read and write
215AB9FC000
heap
page read and write
260D9180000
heap
page read and write
187225AE000
heap
page read and write
215AB331000
heap
page read and write
18B47394000
heap
page read and write
2797DB4D000
heap
page read and write
A391ED8000
stack
page read and write
187225BA000
heap
page read and write
4C8D77F000
stack
page read and write
260C1110000
heap
page execute and read and write
1CBB6ACB000
heap
page read and write
260D92E0000
heap
page execute and read and write
18B45090000
heap
page read and write
7FFD331D0000
trusted library allocation
page read and write
B93F5FF000
unkown
page read and write
231D8CD0000
heap
page read and write
18B474B0000
direct allocation
page read and write
1F78964C000
heap
page read and write
18721FE4000
heap
page read and write
18B492F9000
heap
page read and write
18B47DC0000
direct allocation
page read and write
26207460000
heap
page read and write
7FFDA4177000
unkown
page read and write
1F788FA3000
heap
page read and write
1AB93FD0000
heap
page read and write
165201F0000
heap
page read and write
187225BF000
heap
page read and write
19350C90000
heap
page read and write
7FFDA3AF9000
unkown
page execute and read and write
18B497D8000
heap
page read and write
218F157C000
heap
page read and write
7FFDA4630000
unkown
page readonly
1CBB6AFC000
heap
page read and write
2BD86721000
heap
page read and write
215AB9F7000
heap
page read and write
255A2990000
heap
page read and write
18B48518000
heap
page read and write
1FAB2F1A000
heap
page read and write
1091EB74000
heap
page read and write
231D6D21000
heap
page read and write
18B4891B000
heap
page read and write
18B497BF000
heap
page read and write
2B2277A0000
heap
page read and write
18B49D01000
heap
page read and write
52AA2FE000
stack
page read and write
2BD86720000
heap
page read and write
7FFD9DF81000
unkown
page execute and read and write
232DE770000
heap
page read and write
D8770FC000
stack
page read and write
18B479A0000
heap
page read and write
18721FF3000
heap
page read and write
18387EAB000
heap
page read and write
18B4511E000
heap
page read and write
7FFD32F3D000
trusted library allocation
page execute and read and write
18B4960B000
heap
page read and write
1D25CC10000
heap
page read and write
1838806A000
heap
page read and write
7FFDA3560000
unkown
page readonly
1AB941E4000
heap
page read and write
2BE10D14000
heap
page read and write
18B497B8000
heap
page read and write
1872200B000
heap
page read and write
18387F6E000
heap
page read and write
262074B7000
heap
page read and write
24D95FE0000
heap
page read and write
260BF1A0000
heap
page read and write
2909FBFC000
heap
page read and write
209D9351000
heap
page read and write
255A2B70000
heap
page read and write
2F532490000
heap
page read and write
18721F00000
trusted library allocation
page read and write
18B49D06000
heap
page read and write
22048D00000
heap
page read and write
276C0A9E000
heap
page read and write
18B47A05000
heap
page read and write
2B227740000
heap
page read and write
18B49B0A000
heap
page read and write
18B4797A000
heap
page read and write
1F788F93000
heap
page read and write
F79555E000
stack
page read and write
133E14B0000
heap
page read and write
24D95D50000
heap
page read and write
260C13B5000
trusted library allocation
page read and write
1091EB9E000
heap
page read and write
6219DF000
stack
page read and write
18387EF5000
heap
page read and write
18B472F7000
heap
page read and write
18B49D53000
heap
page read and write
18B477AC000
heap
page read and write
17B1B111000
heap
page read and write
7FFD331A0000
trusted library allocation
page read and write
18B4519E000
heap
page read and write
334594E000
stack
page read and write
1C7B73F6000
heap
page read and write
2C49D010000
heap
page read and write
231D6D23000
heap
page read and write
218F19F0000
heap
page read and write
7FFDA3FD1000
unkown
page execute and read and write
15ABB840000
heap
page read and write
7FFD94035000
unkown
page execute and read and write
2BD86720000
heap
page read and write
2C49D039000
heap
page read and write
19424FD0000
heap
page read and write
260D11EF000
trusted library allocation
page read and write
231D72E8000
heap
page read and write
1C7B7A1A000
heap
page read and write
B3281FF000
unkown
page read and write
215AB318000
heap
page read and write
18387F2C000
heap
page read and write
3F14FFF000
unkown
page read and write
453F9FF000
stack
page read and write
2BD86724000
heap
page read and write
1F788F7F000
heap
page read and write
215AB358000
heap
page read and write
18387F1E000
heap
page read and write
215AD35F000
heap
page read and write
18B451B8000
heap
page read and write
1F789671000
heap
page read and write
2909FD44000
heap
page read and write
1CBB6AC5000
heap
page read and write
7FFDA4638000
unkown
page execute and write copy
18B49A2C000
heap
page read and write
215ABA1A000
heap
page read and write
10E3ABAD000
heap
page read and write
209D92B0000
heap
page read and write
18B49490000
heap
page read and write
1F788F9B000
heap
page read and write
205C8C22000
heap
page read and write
7FF7B2B60000
unkown
page readonly
18721FC8000
heap
page read and write
260C2D6D000
trusted library allocation
page read and write
230CA421000
heap
page read and write
18B486AE000
heap
page read and write
18B4516E000
heap
page read and write
18B48518000
heap
page read and write
2F532350000
heap
page read and write
2909FBA7000
heap
page read and write
18B472BA000
heap
page read and write
1F4C70B0000
heap
page read and write
1C7B79F9000
heap
page read and write
1F788FB2000
heap
page read and write
9AD2AFF000
stack
page read and write
1F788FBF000
heap
page read and write
276C0A90000
heap
page read and write
2BD86726000
heap
page read and write
BF4B9FF000
stack
page read and write
18B494D2000
heap
page read and write
232DE848000
heap
page read and write
2909FBAC000
heap
page read and write
18B496D1000
heap
page read and write
18B49AB8000
heap
page read and write
18B47349000
heap
page read and write
1CBB6AED000
heap
page read and write
FD2C3DE000
stack
page read and write
1FAB2F2D000
heap
page read and write
2BD86730000
heap
page read and write
1F788FAA000
heap
page read and write
2BE10A52000
heap
page read and write
18387E86000
heap
page read and write
1C7B7543000
heap
page read and write
18721FEA000
heap
page read and write
22048DC4000
heap
page read and write
1F788FAA000
heap
page read and write
231D72D0000
heap
page read and write
205C8C1D000
heap
page read and write
22125E60000
heap
page read and write
2BD86724000
heap
page read and write
215AB348000
heap
page read and write
18721FFF000
heap
page read and write
2245C198000
heap
page read and write
231D6D1C000
heap
page read and write
18387DD0000
trusted library allocation
page read and write
1F78AEEE000
heap
page read and write
18B476A9000
heap
page read and write
18B492B7000
heap
page read and write
209D933B000
heap
page read and write
18B4881F000
heap
page read and write
8BCCDBC000
stack
page read and write
16FD01C0000
heap
page read and write
18723F90000
heap
page read and write
18721FC8000
heap
page read and write
18B47312000
heap
page read and write
E8E78FC000
stack
page read and write
2239CB0B000
heap
page read and write
187225C5000
heap
page read and write
18387F87000
heap
page read and write
18B478B1000
heap
page read and write
243739E0000
heap
page read and write
18B475D6000
heap
page read and write
18721FCB000
heap
page read and write
18B48BD7000
heap
page read and write
1FAB2EC9000
heap
page read and write
205C8C2B000
heap
page read and write
18B47368000
heap
page read and write
18389D9E000
heap
page read and write
187225A4000
heap
page read and write
F8688FC000
stack
page read and write
18B47CB0000
direct allocation
page read and write
7FFD9E84D000
unkown
page execute and read and write
218F14C5000
heap
page read and write
1FAB2EB9000
heap
page read and write
1C7B73F9000
heap
page read and write
1F78926E000
heap
page read and write
1C7B7404000
heap
page read and write
1F789650000
heap
page read and write
1872259F000
heap
page read and write
260BF180000
heap
page read and write
230CA5E0000
heap
page read and write
218F19D0000
heap
page read and write
18B488AA000
heap
page read and write
1F789671000
heap
page read and write
218F155B000
heap
page read and write
18B47A89000
heap
page read and write
1FAB2E60000
trusted library allocation
page read and write
18721F30000
heap
page read and write
2769FF000
stack
page read and write
7FFD93D9A000
unkown
page execute and read and write
7FFD943CE000
unkown
page execute and read and write
1CBB6AEE000
heap
page read and write
18387CB0000
heap
page read and write
231D7153000
heap
page read and write
18B48C29000
heap
page read and write
18B47336000
heap
page read and write
7FFDA3A91000
unkown
page execute and read and write
1CCF65B0000
heap
page read and write
7FFD32FE0000
trusted library allocation
page read and write
F9F7EFF000
stack
page read and write
18389D91000
heap
page read and write
222AFDD000
stack
page read and write
1FAB2F17000
heap
page read and write
18B498EE000
heap
page read and write
18B49972000
heap
page read and write
1F4C6E09000
heap
page read and write
33458CD000
stack
page read and write
18B4964D000
heap
page read and write
18B45193000
heap
page read and write
215ABA19000
heap
page read and write
18B48824000
heap
page read and write
18B49443000
heap
page read and write
209D9351000
heap
page read and write
23F53750000
heap
page read and write
552FEFF000
stack
page read and write
18B47A05000
heap
page read and write
1651FF97000
heap
page read and write
18387F3F000
heap
page read and write
1F78AEEE000
heap
page read and write
1FAB4F66000
heap
page read and write
18B4515B000
heap
page read and write
276C0C60000
heap
page read and write
18B476B5000
heap
page read and write
7FFD33270000
trusted library allocation
page read and write
215AB348000
heap
page read and write
187225BA000
heap
page read and write
215AB322000
heap
page read and write
231D6DB0000
heap
page read and write
18387F6E000
heap
page read and write
18387DB0000
heap
page read and write
2797DB0C000
heap
page read and write
1F789640000
heap
page read and write
18B473AE000
heap
page read and write
18B47A89000
heap
page read and write
18B4516E000
heap
page read and write
1C7B7380000
trusted library allocation
page read and write
7FFD9DF90000
unkown
page read and write
2302ED50000
heap
page read and write
18387F3A000
heap
page read and write
231D6D13000
heap
page read and write
19424DC7000
heap
page read and write
18B475D9000
heap
page read and write
1F78AEE2000
heap
page read and write
18B4A202000
heap
page read and write
215ABA29000
heap
page read and write
18B47A74000
heap
page read and write
187225BD000
heap
page read and write
18387F3F000
heap
page read and write
231D6C80000
heap
page read and write
18B498ED000
heap
page read and write
18B4A3E6000
heap
page read and write
18387F79000
heap
page read and write
187225A4000
heap
page read and write
2302ECD0000
heap
page read and write
7FFDA3301000
unkown
page execute and read and write
231D72D7000
heap
page read and write
243739F2000
heap
page read and write
18B45171000
heap
page read and write
D8772FF000
stack
page read and write
7BF6AFE000
stack
page read and write
18B47321000
heap
page read and write
CAD2FAF000
stack
page read and write
18B4734E000
heap
page read and write
1CBB69F0000
heap
page read and write
18B49A1A000
heap
page read and write
1FF03F98000
heap
page read and write
2F532392000
heap
page read and write
260D1331000
trusted library allocation
page read and write
7FFDA0860000
unkown
page readonly
18B4734B000
heap
page read and write
7FFD33230000
trusted library allocation
page read and write
242DF83B000
heap
page read and write
142E9EB0000
heap
page read and write
1F78966D000
heap
page read and write
18388067000
heap
page read and write
1C7B7405000
heap
page read and write
1091ED94000
heap
page read and write
18B49234000
heap
page read and write
1872244E000
heap
page read and write
18B472D4000
heap
page read and write
52AA078000
stack
page read and write
7FFD32FE6000
trusted library allocation
page read and write
1FAB36E8000
heap
page read and write
2797DB58000
heap
page read and write
18B4799B000
heap
page read and write
1FAB2F10000
heap
page read and write
24373A02000
heap
page read and write
18B49A07000
heap
page read and write
18B47A89000
heap
page read and write
18B49DB7000
heap
page read and write
18387F42000
heap
page read and write
187225AA000
heap
page read and write
2245C1A1000
heap
page read and write
2BD86724000
heap
page read and write
215AB2F3000
heap
page read and write
18B4776D000
heap
page read and write
1D25C958000
heap
page read and write
7FFD94091000
unkown
page execute and read and write
1C1C0FE000
stack
page read and write
1F789653000
heap
page read and write
215ABA29000
heap
page read and write
7FFDA3FD9000
unkown
page execute and read and write
18387EA3000
heap
page read and write
7FFD32F4B000
trusted library allocation
page read and write
1651FFDC000
heap
page read and write
2BD86724000
heap
page read and write
7FFDA4DAF000
unkown
page read and write
18B45151000
heap
page read and write
18387EEF000
heap
page read and write
1FAB2F28000
heap
page read and write
1FAB4F6D000
heap
page read and write
18B49D06000
heap
page read and write
2239CA54000
heap
page read and write
18B47A0B000
heap
page read and write
10E3AE80000
heap
page read and write
205C8C23000
heap
page read and write
2BE10A30000
heap
page read and write
1FAB2F05000
heap
page read and write
18B48F46000
heap
page read and write
218F1400000
heap
page read and write
7FFDA3703000
unkown
page execute and read and write
18B4734D000
heap
page read and write
2F53237B000
heap
page read and write
2BD86724000
heap
page read and write
18388060000
heap
page read and write
1CBB6A20000
heap
page read and write
1FAB36F3000
heap
page read and write
2BE10B30000
heap
page read and write
18B473AC000
heap
page read and write
1091EB9B000
heap
page read and write
2302ED71000
heap
page read and write
18389D9E000
heap
page read and write
1F78965C000
heap
page read and write
18B47A89000
heap
page read and write
260D9720000
heap
page read and write
231D7150000
heap
page read and write
18B4916D000
heap
page read and write
215AB348000
heap
page read and write
260BF2A3000
heap
page read and write
18B472F8000
heap
page read and write
1FAB314E000
heap
page read and write
1C7B7A0C000
heap
page read and write
18B4516E000
heap
page read and write
276C0AA8000
heap
page read and write
B93F4FC000
stack
page read and write
24D95E50000
heap
page read and write
1F4C6DA0000
heap
page read and write
2BD86727000
heap
page read and write
215AB69A000
heap
page read and write
7FFD33280000
trusted library allocation
page read and write
1C7B92C8000
heap
page read and write
18B49D79000
heap
page read and write
583D8FF000
stack
page read and write
1F7892FD000
heap
page read and write
2BD86720000
heap
page read and write
2BD88025000
heap
page read and write
2BD86724000
heap
page read and write
276C0C80000
heap
page read and write
1C7B754A000
heap
page read and write
18B4738F000
heap
page read and write
2B2277C2000
heap
page read and write
1FAB2F2D000
heap
page read and write
24D95D5A000
heap
page read and write
18B472B0000
heap
page read and write
22048DD7000
heap
page read and write
28DDB864000
heap
page read and write
1FAB36C0000
heap
page read and write
FD2D7CF000
stack
page read and write
215ABA27000
heap
page read and write
231D72D0000
heap
page read and write
AED70FB000
stack
page read and write
7BF6C7E000
stack
page read and write
142E9F43000
heap
page read and write
1C7B7A1A000
heap
page read and write
18723E45000
heap
page read and write
18B48AD8000
heap
page read and write
18B451B9000
heap
page read and write
1FAB2F1E000
heap
page read and write
1091EBA0000
heap
page read and write
7FFDA3727000
unkown
page execute and read and write
7FFDA2EA7000
unkown
page execute and read and write
1C7B73E3000
heap
page read and write
231D6D13000
heap
page read and write
18723E3E000
heap
page read and write
1C7B92C1000
heap
page read and write
231D6DFB000
heap
page read and write
2BD88160000
heap
page read and write
10E3AB90000
heap
page read and write
276C0A30000
heap
page read and write
1FAB2EE8000
heap
page read and write
F7955DE000
stack
page read and write
67282FF000
stack
page read and write
142E9ED0000
heap
page read and write
23F53760000
heap
page read and write
1F788FB7000
heap
page read and write
215AD351000
heap
page read and write
231D6CB0000
heap
page read and write
1FAB2F0B000
heap
page read and write
231D6D30000
heap
page read and write
18B4734B000
heap
page read and write
1838806A000
heap
page read and write
7FFDA346D000
unkown
page execute and read and write
7FFD9DF61000
unkown
page execute and read and write
205C8DC4000
heap
page read and write
1C7B74F0000
heap
page read and write
7FFDA2E90000
unkown
page readonly
18B477AC000
heap
page read and write
24C59EF0000
heap
page read and write
7FFD9DF89000
unkown
page execute and read and write
18387D90000
heap
page read and write
2BD86724000
heap
page read and write
260C1130000
heap
page execute and read and write
142E9F43000
heap
page read and write
18B490A7000
heap
page read and write
18B4A3E6000
heap
page read and write
BC084FF000
stack
page read and write
18387E67000
heap
page read and write
18B476B4000
heap
page read and write
18B47383000
heap
page read and write
2BD86724000
heap
page read and write
215AB6A4000
heap
page read and write
7FFD33112000
trusted library allocation
page read and write
15ABB9E0000
heap
page read and write
18722443000
heap
page read and write
7FFD332D0000
trusted library allocation
page read and write
1651FFBD000
heap
page read and write
18B47933000
heap
page read and write
2BD86720000
heap
page read and write
7FFD9E855000
unkown
page execute and read and write
18B47625000
heap
page read and write
231D72D4000
heap
page read and write
18B479B6000
heap
page read and write
205C8BF7000
heap
page read and write
64B1F6D000
stack
page read and write
1872244A000
heap
page read and write
2BE10A52000
heap
page read and write
18B49275000
heap
page read and write
F7954DD000
stack
page read and write
231D6D16000
heap
page read and write
1C7B7A23000
heap
page read and write
21AB6A50000
heap
page read and write
18B48A52000
heap
page read and write
1F789260000
heap
page read and write
7FFD33100000
trusted library allocation
page execute and read and write
142E9F43000
heap
page read and write
22125E80000
heap
page read and write
B6FABFF000
stack
page read and write
18387F7D000
heap
page read and write
231D6D17000
heap
page read and write
7FFDA370B000
unkown
page read and write
18B475C5000
heap
page read and write
18B49490000
heap
page read and write
1CBB6AED000
heap
page read and write
187225C5000
heap
page read and write
209D9351000
heap
page read and write
2909FBCD000
heap
page read and write
18387F3A000
heap
page read and write
1C7B73F2000
heap
page read and write
1C7B742A000
heap
page read and write
231D72CC000
heap
page read and write
215AB2A0000
trusted library allocation
page read and write
7FFDA32F1000
unkown
page execute and read and write
7FFD331C0000
trusted library allocation
page read and write
231D6D15000
heap
page read and write
7FFDA2EA2000
unkown
page execute and read and write
1F4C6E11000
heap
page read and write
1C7B73FB000
heap
page read and write
7FFD9DEE2000
unkown
page execute and read and write
215AB331000
heap
page read and write
1FAB36D6000
heap
page read and write
18B47395000
heap
page read and write
133E1180000
heap
page read and write
1F789267000
heap
page read and write
205C8C2B000
heap
page read and write
142E9DB0000
heap
page read and write
18387EFD000
heap
page read and write
2245C3D0000
heap
page read and write
1C7B7540000
heap
page read and write
209D9351000
heap
page read and write
18387F29000
heap
page read and write
18B48EE6000
heap
page read and write
7FFDA4DA0000
unkown
page readonly
260BF214000
heap
page read and write
215ABA20000
heap
page read and write
2BD86731000
heap
page read and write
1C7B92D5000
heap
page read and write
231D6D0C000
heap
page read and write
1F789267000
heap
page read and write
230CA410000
heap
page read and write
7FFD9F3C0000
unkown
page readonly
1F4C6DD0000
heap
page read and write
18B4515B000
heap
page read and write
2BD86731000
heap
page read and write
218F14E9000
heap
page read and write
2245C1A1000
heap
page read and write
215AD366000
heap
page read and write
5F0467E000
stack
page read and write
215AB33A000
heap
page read and write
2909FBC7000
heap
page read and write
1872200B000
heap
page read and write
7FFDA3302000
unkown
page execute and write copy
1C7B92D5000
heap
page read and write
18387EBF000
heap
page read and write
1FAB2F27000
heap
page read and write
1651FFDC000
heap
page read and write
18B48B19000
heap
page read and write
18722002000
heap
page read and write
18B49CA1000
heap
page read and write
231D8BC3000
heap
page read and write
260D91D6000
heap
page read and write
552FBC7000
stack
page read and write
18387EB7000
heap
page read and write
18721FF2000
heap
page read and write
1651FFED000
heap
page read and write
1C7B73EC000
heap
page read and write
18721FE4000
heap
page read and write
1D25C8A0000
heap
page read and write
231D72EB000
heap
page read and write
1FAB4F74000
heap
page read and write
18B48949000
heap
page read and write
2909FBB9000
heap
page read and write
7FFD331B0000
trusted library allocation
page read and write
2302EF20000
heap
page read and write
18B48491000
heap
page read and write
18387F2C000
heap
page read and write
7FFDA5471000
unkown
page readonly
A39227F000
stack
page read and write
18B495C9000
heap
page read and write
2BD86724000
heap
page read and write
142E9E90000
heap
page read and write
7FFD9DF7B000
unkown
page execute and write copy
18B48A52000
heap
page read and write
18B45156000
heap
page read and write
16FD0044000
heap
page read and write
18B49C4C000
heap
page read and write
1F788EE0000
trusted library allocation
page read and write
16FD00E1000
heap
page read and write
7FFD94066000
unkown
page read and write
24D95D6A000
heap
page read and write
1AB93F00000
heap
page read and write
7FFDA3FD0000
unkown
page readonly
1FAB3144000
heap
page read and write
18721FCB000
heap
page read and write
18387F5C000
heap
page read and write
21AB6990000
heap
page read and write
7FFD93BF1000
unkown
page execute and read and write
7FFD33140000
trusted library allocation
page read and write
18721FFF000
heap
page read and write
230F8910000
heap
page read and write
18B47BA0000
heap
page read and write
18B472F6000
heap
page read and write
18B491AF000
heap
page read and write
215AB69E000
heap
page read and write
7FFD9DFEA000
unkown
page execute and write copy
230CA431000
heap
page read and write
1FAB2EE7000
heap
page read and write
18B48144000
direct allocation
page read and write
A39237F000
stack
page read and write
231D6D0F000
heap
page read and write
18B49569000
heap
page read and write
218F1300000
heap
page read and write
18B473A7000
heap
page read and write
18B49A17000
heap
page read and write
1F789657000
heap
page read and write
1FF04184000
heap
page read and write
7FFDA3FDC000
unkown
page read and write
2B2277C2000
heap
page read and write
2909FBF3000
heap
page read and write
18B49A33000
heap
page read and write
18B4859D000
heap
page read and write
7FFD944DE000
unkown
page execute and read and write
520CADC000
stack
page read and write
231D8BC4000
heap
page read and write
7FFDA4331000
unkown
page execute and read and write
18B4933B000
heap
page read and write
1FAB2EEB000
heap
page read and write
7FFDA36FB000
unkown
page execute and read and write
1F789668000
heap
page read and write
231D6D1D000
heap
page read and write
18722011000
heap
page read and write
22048C20000
heap
page read and write
18389D90000
heap
page read and write
17B1B0F0000
heap
page read and write
1F788EE0000
trusted library allocation
page read and write
18B4779C000
heap
page read and write
262074C1000
heap
page read and write
260BF291000
heap
page read and write
2302ECE0000
heap
page read and write
7BF6BFF000
stack
page read and write
7FFDA3AE1000
unkown
page execute and read and write
7FFD94037000
unkown
page execute and read and write
7FFD9DED8000
unkown
page execute and read and write
2245C3C4000
heap
page read and write
205C8C18000
heap
page read and write
24D95D71000
heap
page read and write
2BD87FC0000
heap
page read and write
895A54C000
stack
page read and write
276C0AAB000
heap
page read and write
18387F89000
heap
page read and write
1FAB36DF000
heap
page read and write
2BD86726000
heap
page read and write
1FAB314A000
heap
page read and write
231D7152000
heap
page read and write
260C2A61000
trusted library allocation
page read and write
18B4779C000
heap
page read and write
18B47626000
heap
page read and write
18B47359000
heap
page read and write
276C0A00000
heap
page read and write
7FFDA36CC000
unkown
page execute and write copy
2F532590000
heap
page read and write
7FFDA3731000
unkown
page execute and write copy
18721EC0000
heap
page read and write
18B4797A000
heap
page read and write
1C7B72A0000
heap
page read and write
7FF7B2B8B000
unkown
page readonly
215AB31A000
heap
page read and write
2239CA00000
heap
page read and write
18B49777000
heap
page read and write
1C7B7A04000
heap
page read and write
7FFD9DFA1000
unkown
page execute and read and write
18B47A15000
heap
page read and write
2BD86720000
heap
page read and write
2BD86731000
heap
page read and write
1C7B7A23000
heap
page read and write
18389D94000
heap
page read and write
7FFD33250000
trusted library allocation
page read and write
215AB320000
heap
page read and write
17B1B0FA000
heap
page read and write
1C7B73E1000
heap
page read and write
18B4764B000
heap
page read and write
19350A50000
heap
page read and write
18B47683000
heap
page read and write
215AB352000
heap
page read and write
215ABA1F000
heap
page read and write
133E14B4000
heap
page read and write
18B48BD7000
heap
page read and write
231D8BC0000
heap
page read and write
18B48992000
heap
page read and write
1CBB6AED000
heap
page read and write
7FFDA33C0000
unkown
page readonly
1838806B000
heap
page read and write
1C7B7A07000
heap
page read and write
18B49A1E000
heap
page read and write
18388065000
heap
page read and write
18389DA4000
heap
page read and write
1651FFB8000
heap
page read and write
4C8D67C000
stack
page read and write
18B475C2000
heap
page read and write
1F789656000
heap
page read and write
4C8D6FF000
stack
page read and write
18387ED6000
heap
page read and write
18B494D2000
heap
page read and write
18B496D1000
heap
page read and write
1FAB2F1C000
heap
page read and write
7FFDA3709000
unkown
page execute and write copy
1C7B73ED000
heap
page read and write
7FFD331E0000
trusted library allocation
page read and write
187225C7000
heap
page read and write
18B4988B000
heap
page read and write
18B491F1000
heap
page read and write
18B4516E000
heap
page read and write
1C7B754A000
heap
page read and write
18B472DF000
heap
page read and write
18B47BA0000
heap
page read and write
2239CB00000
heap
page read and write
1FAB323E000
heap
page read and write
2BD86800000
heap
page read and write
231D72CE000
heap
page read and write
7FFDA0861000
unkown
page execute and read and write
18722007000
heap
page read and write
205C8C06000
heap
page read and write
1CCF66B8000
heap
page read and write
2BD86720000
heap
page read and write
18B47619000
heap
page read and write
FD2C7FE000
stack
page read and write
7FFD9F3E1000
unkown
page read and write
6217D6000
stack
page read and write
18B49A75000
heap
page read and write
C85BF7E000
stack
page read and write
FD2CC7E000
stack
page read and write
1FF03F90000
heap
page read and write
18B498ED000
heap
page read and write
7FFD9DF8D000
unkown
page execute and read and write
276C0AC7000
heap
page read and write
18B49CF3000
heap
page read and write
1C7B7A0C000
heap
page read and write
18B4996E000
heap
page read and write
7FFDA5461000
unkown
page execute read
2245C370000
heap
page read and write
18B4519E000
heap
page read and write
2BD86720000
heap
page read and write
18B4996E000
heap
page read and write
1C7B740A000
heap
page read and write
18387F58000
heap
page read and write
276C0D74000
heap
page read and write
215ABA25000
heap
page read and write
205C8C24000
heap
page read and write
276C0AB5000
heap
page read and write
18388067000
heap
page read and write
18387ECF000
heap
page read and write
260BF1E0000
heap
page read and write
18B47B0B000
heap
page read and write
7FFD93CA2000
unkown
page execute and read and write
19425180000
heap
page read and write
19424FB0000
heap
page read and write
215AB69A000
heap
page read and write
7FFD9F3DE000
unkown
page execute and read and write
28DDB92B000
heap
page read and write
1FAB4F64000
heap
page read and write
7FFD94064000
unkown
page execute and write copy
10E3AAF0000
heap
page read and write
7FFDA4DAD000
unkown
page execute and read and write
18B4855B000
heap
page read and write
18722002000
heap
page read and write
18B48A93000
heap
page read and write
18B49275000
heap
page read and write
18721FD2000
heap
page read and write
18B47683000
heap
page read and write
1FAB2F15000
heap
page read and write
2BD86724000
heap
page read and write
18B472E7000
heap
page read and write
18B48519000
heap
page read and write
205C8C1E000
heap
page read and write
2BE10A44000
heap
page read and write
215ABA24000
heap
page read and write
18B49524000
heap
page read and write
22126130000
heap
page read and write
18B4A1C0000
heap
page read and write
1FAB2EE9000
heap
page read and write
1FAB2F12000
heap
page read and write
18722010000
heap
page read and write
2EC06FF000
stack
page read and write
18387F2C000
heap
page read and write
5B3FFF000
stack
page read and write
18387F15000
heap
page read and write
18389D93000
heap
page read and write
18B489E4000
heap
page read and write
5F0487E000
stack
page read and write
7FFD32FEC000
trusted library allocation
page execute and read and write
7FFDA54B1000
unkown
page execute and read and write
1C7B73CE000
heap
page read and write
1FAB2F0E000
heap
page read and write
1F7892FE000
heap
page read and write
2B2277AA000
heap
page read and write
1C7B79FC000
heap
page read and write
16FD00E1000
heap
page read and write
18B47BF2000
heap
page read and write
18B48C7B000
heap
page read and write
242DFBD4000
heap
page read and write
18B489E4000
heap
page read and write
242DFBD0000
heap
page read and write
7FFDA4176000
unkown
page execute and write copy
1CBB6AFC000
heap
page read and write
18721F50000
heap
page read and write
18721FF8000
heap
page read and write
18387E97000
heap
page read and write
18B47358000
heap
page read and write
18B46B20000
heap
page read and write
18B48754000
heap
page read and write
1FAB2F05000
heap
page read and write
2BD86721000
heap
page read and write
7FFD9DFEC000
unkown
page read and write
552FF7F000
stack
page read and write
16FD0040000
heap
page read and write
215AB692000
heap
page read and write
19350B30000
heap
page read and write
1F78AEE4000
heap
page read and write
D3B31BD000
stack
page read and write
18B472D4000
heap
page read and write
18B472FA000
heap
page read and write
18B49B39000
heap
page read and write
218F149B000
heap
page read and write
18B48629000
heap
page read and write
231D6E00000
trusted library allocation
page read and write
7FFDA354E000
unkown
page execute and read and write
7FFD94397000
unkown
page execute and read and write
7FFDA32F0000
unkown
page readonly
7FFDA4DA1000
unkown
page execute and read and write
2B227750000
heap
page read and write
1C7B73D4000
heap
page read and write
260C0C34000
heap
page read and write
18B4916D000
heap
page read and write
7FFDA5477000
unkown
page readonly
1651FFED000
heap
page read and write
218F14B2000
heap
page read and write
215ABA19000
heap
page read and write
2BD8672F000
heap
page read and write
260BF24D000
heap
page read and write
52AA0FD000
stack
page read and write
24373AE0000
heap
page read and write
19350B42000
heap
page read and write
231D72C8000
heap
page read and write
18721FEE000
heap
page read and write
8698F7E000
stack
page read and write
205C8C2B000
heap
page read and write
18B47A65000
heap
page read and write
7FF7B2B9E000
unkown
page read and write
18387F64000
heap
page read and write
1C7B739E000
heap
page read and write
242DF760000
heap
page read and write
18B45171000
heap
page read and write
215AB35D000
heap
page read and write
18B47336000
heap
page read and write
18721FD2000
heap
page read and write
18387F50000
heap
page read and write
230F8914000
heap
page read and write
2F532594000
heap
page read and write
18B4511D000
heap
page read and write
1CCF68E4000
heap
page read and write
18B4734C000
heap
page read and write
231D8BCF000
heap
page read and write
255A2930000
heap
page read and write
7FFDA3321000
unkown
page execute and write copy
18B496D1000
heap
page read and write
18B48E90000
heap
page read and write
18B4A202000
heap
page read and write
18387ECF000
heap
page read and write
18721FA7000
heap
page read and write
1102BFF000
unkown
page read and write
260D1181000
trusted library allocation
page read and write
1F788FB7000
heap
page read and write
18B4A1B3000
heap
page read and write
18B4797A000
heap
page read and write
2909FBFC000
heap
page read and write
18387EA3000
heap
page read and write
7FFDA3320000
unkown
page execute and read and write
2BD86730000
heap
page read and write
67283FE000
stack
page read and write
18387E63000
heap
page read and write
1FAB36F9000
heap
page read and write
1FAB36D0000
heap
page read and write
7FFD93FBB000
unkown
page execute and read and write
18722016000
heap
page read and write
2BD86724000
heap
page read and write
218F1519000
heap
page read and write
1FAB3143000
heap
page read and write
1FAB3147000
heap
page read and write
1F789668000
heap
page read and write
FD2C77E000
stack
page read and write
18723E37000
heap
page read and write
1C1C17E000
stack
page read and write
6727FAB000
stack
page read and write
18B49CF3000
heap
page read and write
7FFDA3304000
unkown
page read and write
7FFD32F50000
trusted library allocation
page read and write
FD2CDFB000
stack
page read and write
142E9F43000
heap
page read and write
18B4A202000
heap
page read and write
18B45189000
heap
page read and write
232DE7A0000
heap
page read and write
1FAB4F63000
heap
page read and write
2BD86722000
heap
page read and write
215AB346000
heap
page read and write
215AB6A0000
heap
page read and write
1FAB36D7000
heap
page read and write
18B45173000
heap
page read and write
255A297B000
heap
page read and write
231D72F1000
heap
page read and write
215ABA19000
heap
page read and write
1872200B000
heap
page read and write
1C7B7A1C000
heap
page read and write
1FAB2F0E000
heap
page read and write
18B47ABC000
heap
page read and write
18B48BA7000
heap
page read and write
16FD00CA000
heap
page read and write
7FFDA0873000
unkown
page execute and write copy
232DE780000
heap
page read and write
231D72E8000
heap
page read and write
A13217E000
stack
page read and write
1F78AEED000
heap
page read and write
1F788F57000
heap
page read and write
18721F9F000
heap
page read and write
215AB697000
heap
page read and write
2797DB65000
heap
page read and write
33459CF000
stack
page read and write
1C7B7542000
heap
page read and write
231D6CB9000
heap
page read and write
2909FBA0000
heap
page read and write
187225AA000
heap
page read and write
1091EB9F000
heap
page read and write
18722445000
heap
page read and write
1C7B9420000
heap
page read and write
18B49B7C000
heap
page read and write
1872200B000
heap
page read and write
7FFDA3311000
unkown
page execute and read and write
7FFD93BE8000
unkown
page execute and read and write
18B48950000
heap
page read and write
24C59EF4000
heap
page read and write
1FAB36C8000
heap
page read and write
18B48A10000
heap
page read and write
2BE10A52000
heap
page read and write
7FFD33210000
trusted library allocation
page read and write
18B4519B000
heap
page read and write
230F87F0000
heap
page read and write
18387F83000
heap
page read and write
18B48BD7000
heap
page read and write
1651FFED000
heap
page read and write
187225AE000
heap
page read and write
1C7B73D3000
heap
page read and write
18B472F7000
heap
page read and write
1FAB4F76000
heap
page read and write
7FFD9F3DF000
unkown
page execute and write copy
7FFD33150000
trusted library allocation
page read and write
1C7B73FB000
heap
page read and write
7FF7B2B60000
unkown
page readonly
7FFDA549A000
unkown
page execute and write copy
18B48B64000
heap
page read and write
1CCF65D0000
heap
page read and write
18B48BA7000
heap
page read and write
7FF7B2B61000
unkown
page execute read
7FFD33130000
trusted library allocation
page read and write
18B47620000
heap
page read and write
7FFDA2EA8000
unkown
page execute and write copy
18B494D2000
heap
page read and write
7FF7B2BA4000
unkown
page readonly
2BD86730000
heap
page read and write
222B27E000
stack
page read and write
18B47342000
heap
page read and write
243739EA000
heap
page read and write
1651FFC8000
heap
page read and write
1FAB36DF000
heap
page read and write
F9F7B5E000
stack
page read and write
18B47958000
heap
page read and write
1C7B73E8000
heap
page read and write
187225A8000
heap
page read and write
231D6D04000
heap
page read and write
1C7B7545000
heap
page read and write
362314E000
stack
page read and write
7FFD9DF80000
unkown
page readonly
1F788F49000
heap
page read and write
3C88DEF000
stack
page read and write
18B47ADB000
heap
page read and write
215AB331000
heap
page read and write
1CBB6D20000
heap
page read and write
18B47940000
heap
page read and write
215AD355000
heap
page read and write
28DDB840000
heap
page read and write
1F788EE0000
trusted library allocation
page read and write
24373A02000
heap
page read and write
18B487B8000
heap
page read and write
18B49847000
heap
page read and write
205C8AF0000
heap
page read and write
18387F7B000
heap
page read and write
209D9351000
heap
page read and write
2797DC00000
heap
page read and write
19425184000
heap
page read and write
672837E000
stack
page read and write
231D7157000
heap
page read and write
24D95D71000
heap
page read and write
18B47322000
heap
page read and write
7FFD9F3DB000
unkown
page execute and read and write
18387F57000
heap
page read and write
18387EA3000
heap
page read and write
2BD86721000
heap
page read and write
2B2277C2000
heap
page read and write
231D715A000
heap
page read and write
E8E7AFF000
stack
page read and write
7FFD9DEDD000
unkown
page execute and read and write
7FFDA3AFD000
unkown
page read and write
260C0B80000
trusted library allocation
page read and write
2909FBED000
heap
page read and write
1651FDB0000
heap
page read and write
1F788FB7000
heap
page read and write
1CBB6AD6000
heap
page read and write
18B479FF000
heap
page read and write
18387EE0000
heap
page read and write
1C7B74D0000
trusted library allocation
page read and write
18B49275000
heap
page read and write
1FAB2EB0000
heap
page read and write
215AB9FC000
heap
page read and write
18389DA4000
heap
page read and write
18387F29000
heap
page read and write
18B49849000
heap
page read and write
215AD340000
heap
page read and write
18B49AB9000
heap
page read and write
9AD2CFF000
stack
page read and write
18B49690000
heap
page read and write
7FFDA36E0000
unkown
page readonly
209D9351000
heap
page read and write
205C8C2B000
heap
page read and write
1FAB36CC000
heap
page read and write
215AB2A0000
trusted library allocation
page read and write
230CA3F0000
heap
page read and write
215ABA19000
heap
page read and write
18B48B66000
heap
page read and write
1651FFDC000
heap
page read and write
1872244E000
heap
page read and write
231D6D1C000
heap
page read and write
231D6CF8000
heap
page read and write
2BD86720000
heap
page read and write
18B49065000
heap
page read and write
1AB93E00000
heap
page read and write
18B48C90000
direct allocation
page read and write
260C2E33000
trusted library allocation
page read and write
BF4B8FF000
unkown
page read and write
1872259C000
heap
page read and write
18B48A94000
heap
page read and write
1CBB6AE0000
heap
page read and write
215AB325000
heap
page read and write
18B49AB6000
heap
page read and write
2B2277BA000
heap
page read and write
10E3AE84000
heap
page read and write
7FFDA3433000
unkown
page execute and read and write
26207480000
heap
page read and write
18B4516C000
heap
page read and write
215AB35D000
heap
page read and write
1872200B000
heap
page read and write
260C1170000
heap
page read and write
7FFD93F5D000
unkown
page execute and read and write
17B1B330000
heap
page read and write
7FFD94469000
unkown
page execute and read and write
18B49A1E000
heap
page read and write
1C7B7423000
heap
page read and write
18B4514B000
heap
page read and write
1F78965C000
heap
page read and write
A13207E000
stack
page read and write
231D8BD5000
heap
page read and write
7FFDA3FDA000
unkown
page execute and write copy
215AB2E0000
heap
page read and write
1C7B92C6000
heap
page read and write
7FFD9DEB0000
unkown
page readonly
1091EA20000
heap
page read and write
24D95D71000
heap
page read and write
7FFDA3AF3000
unkown
page execute and read and write
18B49A07000
heap
page read and write
24D95C80000
heap
page read and write
18B4A4A1000
heap
page read and write
F8689FF000
unkown
page read and write
1C7B7428000
heap
page read and write
2B2277B9000
heap
page read and write
1FAB2F1B000
heap
page read and write
18B475C4000
heap
page read and write
218F19E0000
heap
page read and write
7FFD9402F000
unkown
page execute and read and write
18B49443000
heap
page read and write
1F78AEE0000
heap
page read and write
18387F64000
heap
page read and write
D6F51FF000
unkown
page read and write
1FAB36F1000
heap
page read and write
18B47ABB000
heap
page read and write
18387F79000
heap
page read and write
205C8BFB000
heap
page read and write
209D92E0000
heap
page read and write
18B4767D000
heap
page read and write
1C7B7428000
heap
page read and write
1FAB36DF000
heap
page read and write
18B4798E000
heap
page read and write
231D6D0C000
heap
page read and write
18387F35000
heap
page read and write
7FFDA54B0000
unkown
page readonly
18B49D53000
heap
page read and write
1FF03F9D000
heap
page read and write
18B47398000
heap
page read and write
2909FBEF000
heap
page read and write
18B4862A000
heap
page read and write
1CBB6AD8000
heap
page read and write
18B48992000
heap
page read and write
260C0B43000
trusted library allocation
page read and write
231D72F9000
heap
page read and write
FD2C97E000
stack
page read and write
7FFDA4161000
unkown
page execute and read and write
2302F100000
heap
page read and write
231D7155000
heap
page read and write
18387EE7000
heap
page read and write
1FAB4F6E000
heap
page read and write
18B47397000
heap
page read and write
18B46F70000
direct allocation
page read and write
215AB33A000
heap
page read and write
231D6D06000
heap
page read and write
255A2A70000
heap
page read and write
18387F36000
heap
page read and write
1F788F81000
heap
page read and write
7FFDA4DA9000
unkown
page execute and read and write
1651FFE5000
heap
page read and write
18722440000
heap
page read and write
D8771FF000
unkown
page read and write
1FAB3220000
heap
page read and write
7FFD33220000
trusted library allocation
page read and write
276C0AC7000
heap
page read and write
A1320FF000
stack
page read and write
18B49C0B000
heap
page read and write
18387EAE000
heap
page read and write
231D715B000
heap
page read and write
2909FD40000
heap
page read and write
18387E96000
heap
page read and write
18387E90000
heap
page read and write
7FFDA5476000
unkown
page read and write
1F788FAE000
heap
page read and write
18B488D8000
heap
page read and write
7FFD94466000
unkown
page execute and read and write
FD2C9FF000
stack
page read and write
215AB357000
heap
page read and write
18B47348000
heap
page read and write
7FFDA3AE0000
unkown
page readonly
19424ED0000
heap
page read and write
18B49D6E000
heap
page read and write
7FFD93C52000
unkown
page execute and read and write
18B48010000
direct allocation
page read and write
260BF230000
trusted library allocation
page read and write
1C7B73E8000
heap
page read and write
7FFDA3A93000
unkown
page read and write
1FF03EF0000
heap
page read and write
242DF837000
heap
page read and write
7FFD33050000
trusted library allocation
page execute and read and write
19350C84000
heap
page read and write
18B479BF000
heap
page read and write
2C49D130000
heap
page read and write
2797DB65000
heap
page read and write
18B48EE5000
heap
page read and write
FD2C6FE000
stack
page read and write
7FFDA3530000
unkown
page readonly
5F046FE000
stack
page read and write
18B47343000
heap
page read and write
1F78B0D0000
heap
page read and write
1FAB314E000
heap
page read and write
7FFDA3A8C000
unkown
page execute and read and write
18B47B95000
heap
page read and write
7FF7B2B9E000
unkown
page write copy
231D6D30000
heap
page read and write
1AB941E0000
heap
page read and write
16FD00E1000
heap
page read and write
7FFDA2EAA000
unkown
page read and write
C82DCD000
stack
page read and write
7FFD93BE7000
unkown
page execute and write copy
260BF283000
heap
page read and write
1872244A000
heap
page read and write
215AB352000
heap
page read and write
1C7B92D6000
heap
page read and write
7FFDA3458000
unkown
page execute and read and write
7FFD9E852000
unkown
page execute and read and write
1FAB4F62000
heap
page read and write
218F153A000
heap
page read and write
21D17ED000
stack
page read and write
18721FE6000
heap
page read and write
1F788F9F000
heap
page read and write
2797DB58000
heap
page read and write
18B4797A000
heap
page read and write
187225BC000
heap
page read and write
22048DC0000
heap
page read and write
18387E8B000
heap
page read and write
260C0F8D000
heap
page read and write
7FFDA33C1000
unkown
page execute and read and write
231D715A000
heap
page read and write
18B48AD7000
heap
page read and write
142E9ED5000
heap
page read and write
7FF7B2BA1000
unkown
page read and write
18B48752000
heap
page read and write
1C7B7A28000
heap
page read and write
1F78AEF4000
heap
page read and write
18387EA5000
heap
page read and write
1FAB4F74000
heap
page read and write
18B497BF000
heap
page read and write
2BD86720000
heap
page read and write
B3280FC000
stack
page read and write
F9F7E7F000
stack
page read and write
D3B347F000
stack
page read and write
18B47C0D000
heap
page read and write
18B4518B000
heap
page read and write
7FFD93B7F000
unkown
page execute and read and write
7FFD9DEE4000
unkown
page execute and write copy
DDD1E7E000
stack
page read and write
1F788FA3000
heap
page read and write
3F14EFC000
stack
page read and write
7FFDA54B9000
unkown
page execute and read and write
18B45171000
heap
page read and write
7FFDA0872000
unkown
page execute and read and write
18389DA6000
heap
page read and write
18B497D5000
heap
page read and write
2BD86700000
heap
page read and write
18B4A203000
heap
page read and write
187225BA000
heap
page read and write
2BD88020000
heap
page read and write
231D6DF4000
heap
page read and write
18B48260000
direct allocation
page read and write
1FAB3147000
heap
page read and write
7FFDA331D000
unkown
page execute and read and write
18722002000
heap
page read and write
18B47398000
heap
page read and write
5B3F7E000
stack
page read and write
79AA67F000
stack
page read and write
1F788F57000
heap
page read and write
1FAB2F12000
heap
page read and write
1FAB2E10000
heap
page read and write
18B4799B000
heap
page read and write
231D6D30000
heap
page read and write
A131CBB000
stack
page read and write
2BE10A3A000
heap
page read and write
1F789650000
heap
page read and write
231D6D23000
heap
page read and write
18723E3E000
heap
page read and write
215AD353000
heap
page read and write
7FFD93D1D000
unkown
page execute and read and write
18B4799C000
heap
page read and write
187225C5000
heap
page read and write
24373B00000
heap
page read and write
231D6D23000
heap
page read and write
7FFD330EA000
trusted library allocation
page read and write
1F788F75000
heap
page read and write
18B47366000
heap
page read and write
7FFD9E841000
unkown
page execute and read and write
1091EB87000
heap
page read and write
18721F00000
trusted library allocation
page read and write
1F788F86000
heap
page read and write
276C0D77000
heap
page read and write
1F789263000
heap
page read and write
17B1B111000
heap
page read and write
215AB320000
heap
page read and write
18B498CD000
heap
page read and write
18722599000
heap
page read and write
2F532595000
heap
page read and write
215AB331000
heap
page read and write
7FFD33016000
trusted library allocation
page execute and read and write
18387F27000
heap
page read and write
231D72F1000
heap
page read and write
209D92E4000
heap
page read and write
1CBB6AF1000
heap
page read and write
142E9F20000
heap
page read and write
255A2850000
heap
page read and write
7FFDA4342000
unkown
page execute and read and write
18B499B5000
heap
page read and write
18B4982B000
heap
page read and write
895A87D000
stack
page read and write
FD2CCFE000
stack
page read and write
1F789679000
heap
page read and write
215ABA19000
heap
page read and write
260D93F0000
heap
page read and write
28DDB820000
heap
page read and write
1F788F93000
heap
page read and write
18B4518C000
heap
page read and write
18B49018000
heap
page read and write
1F788F81000
heap
page read and write
21AB6CD4000
heap
page read and write
18B49D01000
heap
page read and write
1C7B7547000
heap
page read and write
7FFD93D10000
unkown
page readonly
22048DD0000
heap
page read and write
18721FE4000
heap
page read and write
1091EB72000
heap
page read and write
18721F00000
trusted library allocation
page read and write
243739C0000
heap
page read and write
18B4937F000
heap
page read and write
276C0C71000
heap
page read and write
1FAB2F26000
heap
page read and write
18B4866C000
heap
page read and write
18B476B5000
heap
page read and write
18B48A05000
heap
page read and write
2909FBC8000
heap
page read and write
1091EB9E000
heap
page read and write
18B49CF3000
heap
page read and write
260C28DB000
trusted library allocation
page read and write
260C2AE7000
trusted library allocation
page read and write
255A2970000
heap
page read and write
260BF2CA000
heap
page read and write
231D6D11000
heap
page read and write
2BE10B50000
heap
page read and write
1C7B7380000
trusted library allocation
page read and write
2302F104000
heap
page read and write
187225AE000
heap
page read and write
7FFD33200000
trusted library allocation
page read and write
18387F2B000
heap
page read and write
1FAB36E8000
heap
page read and write
7FFD33240000
trusted library allocation
page read and write
2909FBD9000
heap
page read and write
18388064000
heap
page read and write
18B48C7B000
heap
page read and write
18723E45000
heap
page read and write
1F788FA7000
heap
page read and write
1FAB2F07000
heap
page read and write
18B49B0A000
heap
page read and write
7FFDA3710000
unkown
page readonly
21AB6A59000
heap
page read and write
895A8FF000
stack
page read and write
18387F27000
heap
page read and write
7FFD33290000
trusted library allocation
page read and write
231D6CC8000
heap
page read and write
7FFDA2E91000
unkown
page execute and read and write
1FAB36DF000
heap
page read and write
1C7B7A06000
heap
page read and write
7FFDA3AFB000
unkown
page execute and write copy
7FFDA4175000
unkown
page execute and read and write
1C7B73C7000
heap
page read and write
18723E35000
heap
page read and write
2BE10A4A000
heap
page read and write
2BD86726000
heap
page read and write
2B227970000
heap
page read and write
7FFDA5460000
unkown
page readonly
18B475ED000
heap
page read and write
22125E50000
heap
page read and write
7FFD32F33000
trusted library allocation
page execute and read and write
DEA8EFE000
stack
page read and write
7FF7B2BA4000
unkown
page readonly
7FF7B2B60000
unkown
page readonly
18B493C0000
heap
page read and write
7FFD944E5000
unkown
page read and write
1872259F000
heap
page read and write
1FAB36D4000
heap
page read and write
27650D000
stack
page read and write
17B1B070000
heap
page read and write
18B45143000
heap
page read and write
7FFDA36CA000
unkown
page execute and read and write
18B4799B000
heap
page read and write
9D33EFF000
stack
page read and write
79AA39D000
stack
page read and write
2302ED00000
heap
page read and write
16FD00E1000
heap
page read and write
215AB352000
heap
page read and write
1F78AEF4000
heap
page read and write
187225AE000
heap
page read and write
1F788FB9000
heap
page read and write
18B49DF4000
heap
page read and write
1F788FBA000
heap
page read and write
FD2CD7E000
stack
page read and write
18B487FC000
heap
page read and write
18B47C9E000
heap
page read and write
2BD8672E000
heap
page read and write
18B49BFF000
heap
page read and write
7FFD331F0000
trusted library allocation
page read and write
18B4516E000
heap
page read and write
3C890FE000
stack
page read and write
230CA7A4000
heap
page read and write
2BE10930000
heap
page read and write
18B49B0A000
heap
page read and write
18B45190000
heap
page read and write
1FAB36E8000
heap
page read and write
18B472F7000
heap
page read and write
18B498FC000
heap
page read and write
7FFDA4345000
unkown
page execute and read and write
231D6D23000
heap
page read and write
18B4968F000
heap
page read and write
18B48B19000
heap
page read and write
18721FF5000
heap
page read and write
A131D3E000
stack
page read and write
260D1469000
trusted library allocation
page read and write
2BE10A10000
heap
page read and write
18387E50000
heap
page read and write
18B49BBE000
heap
page read and write
18B47B99000
heap
page read and write
18B4734B000
heap
page read and write
18B46A80000
unkown
page readonly
1C7B741C000
heap
page read and write
1FAB3234000
heap
page read and write
CAD2BCE000
stack
page read and write
18B49A17000
heap
page read and write
18722000000
heap
page read and write
231D715E000
heap
page read and write
7FFDA372F000
unkown
page execute and read and write
1C7B79FC000
heap
page read and write
18721FFC000
heap
page read and write
18B47312000
heap
page read and write
2797DB59000
heap
page read and write
18B475DD000
heap
page read and write
18B46A40000
heap
page read and write
215AB2A0000
trusted library allocation
page read and write
231D6D2B000
heap
page read and write
7FFDA3323000
unkown
page read and write
7FFD332C0000
trusted library allocation
page read and write
18722016000
heap
page read and write
1CBB6AC5000
heap
page read and write
2909FBED000
heap
page read and write
2F532270000
heap
page read and write
18B47B55000
heap
page read and write
1C7B73C9000
heap
page read and write
2B2277C2000
heap
page read and write
F9F7ADB000
stack
page read and write
7FFDA4639000
unkown
page read and write
18B47EF0000
direct allocation
page read and write
187225A1000
heap
page read and write
8BCD1FF000
stack
page read and write
18B48513000
heap
page read and write
24C59D50000
heap
page read and write
18B4517B000
heap
page read and write
1091EB00000
heap
page read and write
215ABA03000
heap
page read and write
218F14D8000
heap
page read and write
260D9630000
heap
page read and write
16FCFF40000
heap
page read and write
24C59B58000
heap
page read and write
15ABB820000
heap
page read and write
215AB2E8000
heap
page read and write
10E3AB98000
heap
page read and write
1FAB2F15000
heap
page read and write
142E9ED4000
heap
page read and write
1C7B7A1A000
heap
page read and write
215AB250000
heap
page read and write
1FAB2F22000
heap
page read and write
583D87F000
stack
page read and write
1C7B73CE000
heap
page read and write
18B479B8000
heap
page read and write
2909FBFC000
heap
page read and write
1F78965C000
heap
page read and write
2BD86724000
heap
page read and write
18B4894F000
heap
page read and write
18387F6E000
heap
page read and write
1FAB3140000
heap
page read and write
18B46EF8000
direct allocation
page read and write
1C7B73F0000
heap
page read and write
18B47BA0000
heap
page read and write
552FE7F000
stack
page read and write
18387F2F000
heap
page read and write
1F78965C000
heap
page read and write
260D92A0000
trusted library section
page read and write
2BD86730000
heap
page read and write
215AB331000
heap
page read and write
18387F79000
heap
page read and write
1F789673000
heap
page read and write
FD2C8FE000
stack
page read and write
1091EB63000
heap
page read and write
1FAB2F0E000
heap
page read and write
1F788F9D000
heap
page read and write
2C49D1A0000
heap
page read and write
1C7B73EF000
heap
page read and write
FC765CF000
stack
page read and write
19350C50000
heap
page read and write
260D1478000
trusted library allocation
page read and write
18B45171000
heap
page read and write
21AB6890000
heap
page read and write
7FFD32F34000
trusted library allocation
page read and write
1C7B73E3000
heap
page read and write
F9F7BDE000
stack
page read and write
232DEBC0000
heap
page read and write
231D8BC5000
heap
page read and write
231D6CF5000
heap
page read and write
17B1AF70000
heap
page read and write
2BD86726000
heap
page read and write
18B47A0A000
heap
page read and write
1FAB2EC9000
heap
page read and write
18387F7C000
heap
page read and write
1091EB89000
heap
page read and write
7FFD93461000
unkown
page execute and read and write
24D95D71000
heap
page read and write
1091EB48000
heap
page read and write
231D72F1000
heap
page read and write
18B49524000
heap
page read and write
18721FFF000
heap
page read and write
18B47AA2000
heap
page read and write
36230CC000
stack
page read and write
18387E59000
heap
page read and write
CAD27ED000
stack
page read and write
1F78926A000
heap
page read and write
7FFD93D75000
unkown
page execute and read and write
18B4734B000
heap
page read and write
18B488D8000
heap
page read and write
1FAB2EC4000
heap
page read and write
1C7B79F7000
heap
page read and write
1F788F52000
heap
page read and write
9AD2A7B000
stack
page read and write
18387EAF000
heap
page read and write
1F788FAE000
heap
page read and write
7FFDA36BB000
unkown
page execute and read and write
D6F50FC000
stack
page read and write
1F78966B000
heap
page read and write
215AB34F000
heap
page read and write
215AB352000
heap
page read and write
1C7B73F2000
heap
page read and write
1F788FA7000
heap
page read and write
FD2C673000
stack
page read and write
242DF770000
heap
page read and write
231D715A000
heap
page read and write
1102AFD000
stack
page read and write
18B48B5A000
heap
page read and write
18B451B2000
heap
page read and write
18B45190000
heap
page read and write
18B495C9000
heap
page read and write
18387EBB000
heap
page read and write
215AB322000
heap
page read and write
1F78AEF4000
heap
page read and write
18722597000
heap
page read and write
231D6D04000
heap
page read and write
1D25CC14000
heap
page read and write
24D95D71000
heap
page read and write
260C0B40000
trusted library allocation
page read and write
2797DB65000
heap
page read and write
BC083FF000
unkown
page read and write
7FFD33180000
trusted library allocation
page read and write
18387E90000
heap
page read and write
209D9351000
heap
page read and write
7FFD33170000
trusted library allocation
page read and write
7FF7B2BA4000
unkown
page readonly
5B3EFF000
stack
page read and write
18387F86000
heap
page read and write
18B4891B000
heap
page read and write
18B47A05000
heap
page read and write
7FFD9E858000
unkown
page read and write
18B47336000
heap
page read and write
18B47B36000
heap
page read and write
16FD00C0000
heap
page read and write
18B46B24000
heap
page read and write
1872200B000
heap
page read and write
7FFDA4DAE000
unkown
page execute and write copy
218F156C000
heap
page read and write
18B47C3D000
heap
page read and write
18B47B9E000
heap
page read and write
218F1A20000
heap
page read and write
1FAB2F22000
heap
page read and write
7FF7B2B9E000
unkown
page read and write
18B472D0000
heap
page read and write
1FAB323B000
heap
page read and write
2245C180000
heap
page read and write
231D715E000
heap
page read and write
18B4734B000
heap
page read and write
7FFDA4346000
unkown
page execute and write copy
215AD35F000
heap
page read and write
1C7B92CF000
heap
page read and write
231D7154000
heap
page read and write
260D926B000
heap
page read and write
18B48BC6000
heap
page read and write
18B488AB000
heap
page read and write
FD2CB78000
stack
page read and write
1FAB36EB000
heap
page read and write
1FAB36E9000
heap
page read and write
7FFDA3A80000
unkown
page readonly
22048D20000
heap
page read and write
18B49D6B000
heap
page read and write
231D6CC3000
heap
page read and write
260D9326000
heap
page read and write
1C7B740C000
heap
page read and write
18387EB2000
heap
page read and write
1872259F000
heap
page read and write
187225A8000
heap
page read and write
1FAB4F6E000
heap
page read and write
2797DE84000
heap
page read and write
18B49A1E000
heap
page read and write
FC7654C000
stack
page read and write
18B475B7000
heap
page read and write
3F150FF000
stack
page read and write
2909FBEE000
heap
page read and write
18B47BA0000
heap
page read and write
21AB6970000
heap
page read and write
230F89E0000
heap
page read and write
1F4C6DFA000
heap
page read and write
18B47A74000
heap
page read and write
18B497C8000
heap
page read and write
18B473AA000
heap
page read and write
18723E31000
heap
page read and write
1C7B73A7000
heap
page read and write
205C8C1D000
heap
page read and write
7FFD93DA0000
unkown
page execute and read and write
2239CB0D000
heap
page read and write
2BD86720000
heap
page read and write
1F789647000
heap
page read and write
2BE10A52000
heap
page read and write
BF4B5DB000
stack
page read and write
1F788F81000
heap
page read and write
255A2B74000
heap
page read and write
7FF7B2B9E000
unkown
page write copy
1F789668000
heap
page read and write
18723E3E000
heap
page read and write
7FFD93D89000
unkown
page execute and read and write
231D6CF5000
heap
page read and write
218F154C000
heap
page read and write
1FAB314A000
heap
page read and write
7FFD32F32000
trusted library allocation
page read and write
18B48EE2000
heap
page read and write
2245C18A000
heap
page read and write
1C7B7A08000
heap
page read and write
133E10A0000
heap
page read and write
18B482AC000
direct allocation
page read and write
215AB694000
heap
page read and write
18B450FD000
heap
page read and write
18B4964D000
heap
page read and write
142E9F43000
heap
page read and write
2797DB07000
heap
page read and write
7FFD32F40000
trusted library allocation
page read and write
18B4516E000
heap
page read and write
215ABA08000
heap
page read and write
19350C30000
heap
page read and write
B93F6FF000
stack
page read and write
A131DBE000
stack
page read and write
18B45143000
heap
page read and write
7FFDA5499000
unkown
page execute and read and write
7FFD93D04000
unkown
page execute and read and write
2C49D030000
heap
page read and write
21AB6CD0000
heap
page read and write
18B49D13000
heap
page read and write
FD2CAF7000
stack
page read and write
52AA1FF000
stack
page read and write
36DF96F000
stack
page read and write
16FD00D9000
heap
page read and write
There are 2590 hidden memdumps, click here to show them.