IOC Report
purchaseorder4.exe

loading gif

Files

File Path
Type
Category
Malicious
purchaseorder4.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Browser.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\PublicKey\_x25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Pythonwin\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\Pythonwin\win32ui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_cffi_backend.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-path-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\charset_normalizer\md.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\charset_normalizer\md__mypyc.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography-42.0.5.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\pywin32_system32\pythoncom310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\pywin32_system32\pywintypes310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\setuptools-65.5.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\win32\_win32sysloader.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\win32\win32crypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\win32\win32evtlog.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\win32\win32trace.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI30602\win32com\shell\shell.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\cards_db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\downloads_db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\login_db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\web_history_db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
There are 132 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\purchaseorder4.exe
"C:\Users\user\Desktop\purchaseorder4.exe"
malicious
C:\Users\user\Desktop\purchaseorder4.exe
"C:\Users\user\Desktop\purchaseorder4.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1.pdf
unknown
http://www.dabeaz.com/ply)F
unknown
http://www.dabeaz.com/ply)
unknown
https://github.com/pyca/cryptography/issues/8996
unknown
https://setuptools.pypa.io/en/latest/userguide/declarative_config.html#opt-2P
unknown
http://aka.ms/vcpython27
unknown
https://github.com/mhammond/pywin32
unknown
http://docs.python.org/library/unittest.html
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://github.com/pypa/packaging
unknown
http://csrc.nist.gov/publicatio
unknown
http://stackoverflow.com/questions/19622133/
unknown
https://refspecs.linuxfoundation.org/elf/gabi4
unknown
http://cffi.readthedocs.io/en/latest/cdef.html#ffi-cdef-limitations
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
unknown
https://tools.ietf.org/html/rfc3610
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://docs.python.org/3/library/pprint.html
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
https://setuptools.pypa.io/en/latest/pkg_resources.html#basic-resource-access
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://httpbin.org/
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
http://aka.ms/vcpython27P
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://docs.python.org/3/library/re.html
unknown
https://github.com/pypa/setuptools/issues/417#issuecomment-392298401
unknown
http://github.com/ActiveState/appdirs
unknown
https://wiki.debian.org/XDGBaseDirectorySpecification#state
unknown
http://wwwsearch.sf.net/):
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://cffi.readthedocs.io/en/latest/using.html#callbacks
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings0
unknown
https://bugs.python.org/issue44497.
unknown
https://google.com/mail
unknown
https://packaging.python.org/specifications/entry-points/
unknown
https://github.com/jaraco/jaraco.functools/issues/5
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
http://www.rfc-editor.org/info/rfc7253
unknown
https://github.com/pyca/cryptography/issues
unknown
http://bugs.python.org/issue23606)
unknown
http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
http://.../back.jpeg
unknown
http://tools.ietf.org/html/rfc5869
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
http://blog.cryptographyengineering.com/2012/05/how-to-choose-authenticated-encryption.html
unknown
https://httpbin.org/post
unknown
https://github.com/Ousret/charset_normalizer
unknown
https://docs.python.org/3/library/re.html#re.sub
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://datatracker.ietf.org/doc/html/rfc5246#section-7.4.1.4.1
unknown
https://yahoo.com/
unknown
https://setuptools.pypa.io/en/latest/userguide/declarative_config.html#opt-2
unknown
https://stackoverflow.com/questions/267399/how-do-you-match-only-valid-roman-numerals-with-a-regular
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://html.spec.whatwg.org/multipage/
unknown
https://github.com/pyparsing/pyparsing/wiki
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
https://github.com/pyca/cryptography/issues/9253
unknown
http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/eax/eax-spec.pdf
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
http://tools.ietf.org/html/rfc5297
unknown
https://upload.pypi.org/legacy/
unknown
http://docs.python.org/library/itertools.html#recipes
unknown
http://tools.ietf.org/html/rfc4880
unknown
https://requests.readthedocs.io
unknown
http://www.cs.ucdavis.edu/~rogaway/papers/keywrap.pdf
unknown
https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbca
unknown
https://packaging.python.org/en/latest/specifications/declaring-project-metadata/
unknown
https://github.com/pypa/setuptools/issues/1024.
unknown
https://sectigo.com/CPS0
unknown
https://www.python.org
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
http://www.tarsnap.com/scrypt/scrypt-slides.pdf
unknown
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
unknown
https://www.python.org/
unknown
https://json.org
unknown
https://www.python.org/dev/peps/pep-0205/
unknown
https://twitter.com/
unknown
https://docs.python.org/3/library/pprint.html#pprint.pprint
unknown
https://google.com/
unknown
https://google.com/mail/
unknown
http://google.com/mail/
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate
unknown
https://tools.ietf.org/html/rfc5297
unknown
https://www.openssl.org/H
unknown
https://github.com/urllib3/urllib3/issues/2920c
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dasmake.xyz
192.236.232.35
malicious
mail.dasmake.xyz
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
192.236.232.35
dasmake.xyz
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
26001A3D000
heap
page read and write
7FF8B8F76000
unkown
page readonly
260021F7000
heap
page read and write
260019BB000
heap
page read and write
26001E18000
heap
page read and write
1F981848000
heap
page read and write
26003FA0000
direct allocation
page read and write
26001D04000
heap
page read and write
2600253B000
heap
page read and write
7FF8A817E000
unkown
page read and write
7FF8BFAD1000
unkown
page readonly
7FF8A81A0000
unkown
page readonly
26001E0B000
heap
page read and write
1F98184D000
heap
page read and write
26002300000
heap
page read and write
260019AF000
heap
page read and write
7FF781743000
unkown
page readonly
26001D26000
heap
page read and write
1F981848000
heap
page read and write
2600245A000
heap
page read and write
7FF8B8CB0000
unkown
page readonly
1F981848000
heap
page read and write
2607F7BA000
heap
page read and write
7FF8A8AA4000
unkown
page execute read
26003084000
heap
page read and write
26001E0A000
heap
page read and write
7FF8B0531000
unkown
page execute read
1F981855000
heap
page read and write
2607F80D000
heap
page read and write
2600227A000
heap
page read and write
26002393000
heap
page read and write
26001E0A000
heap
page read and write
2607F859000
heap
page read and write
1F98184E000
heap
page read and write
260019BB000
heap
page read and write
260021D1000
heap
page read and write
26001A64000
heap
page read and write
26002CC4000
heap
page read and write
26002241000
heap
page read and write
2600307E000
heap
page read and write
26002CE7000
heap
page read and write
26001A3A000
heap
page read and write
7FF8A7FD1000
unkown
page read and write
26002C9F000
heap
page read and write
26001D02000
heap
page read and write
260022A9000
heap
page read and write
26002D28000
heap
page read and write
2607F7EF000
heap
page read and write
7FF8B7821000
unkown
page execute read
260021F8000
heap
page read and write
26002F62000
heap
page read and write
26001CCE000
heap
page read and write
2607F804000
heap
page read and write
26001E05000
heap
page read and write
26002C12000
heap
page read and write
2600301D000
heap
page read and write
26001D8D000
heap
page read and write
2607F7EC000
heap
page read and write
7FF8A8609000
unkown
page readonly
260019B3000
heap
page read and write
2600245F000
heap
page read and write
260023FE000
heap
page read and write
26001A7E000
heap
page read and write
26002C95000
heap
page read and write
26001E7E000
heap
page read and write
7FF8A8ADB000
unkown
page readonly
7FF8B780F000
unkown
page write copy
260021C1000
heap
page read and write
2607F80A000
heap
page read and write
26002FF0000
heap
page read and write
7FF8B93D2000
unkown
page readonly
26001DC5000
heap
page read and write
26001D45000
heap
page read and write
260019CC000
heap
page read and write
26001DFB000
heap
page read and write
26002476000
heap
page read and write
26002499000
heap
page read and write
26002432000
heap
page read and write
2607F7D7000
heap
page read and write
26002F80000
heap
page read and write
2607F80C000
heap
page read and write
2607F803000
heap
page read and write
26002296000
heap
page read and write
26001D28000
heap
page read and write
26001E7D000
heap
page read and write
26003913000
heap
page read and write
7FF8B0559000
unkown
page read and write
260019B3000
heap
page read and write
26002D59000
heap
page read and write
26002BB4000
heap
page read and write
2607F809000
heap
page read and write
26002DE8000
heap
page read and write
26001D0F000
heap
page read and write
1F98184F000
heap
page read and write
26001A53000
heap
page read and write
260019CC000
heap
page read and write
26002CB8000
heap
page read and write
2600253F000
heap
page read and write
7FF8B77FD000
unkown
page readonly
2600253B000
heap
page read and write
1F98184D000
heap
page read and write
26001DD1000
heap
page read and write
1F981848000
heap
page read and write
2600247A000
heap
page read and write
260023E4000
heap
page read and write
7FF8A8605000
unkown
page readonly
260024A9000
heap
page read and write
26001E3C000
heap
page read and write
7FF78173F000
unkown
page read and write
26001A61000
heap
page read and write
260019D3000
heap
page read and write
26002440000
heap
page read and write
2607F750000
heap
page read and write
26002283000
heap
page read and write
26002C53000
heap
page read and write
1F981847000
heap
page read and write
26002501000
heap
page read and write
26001A14000
heap
page read and write
26003F4C000
direct allocation
page read and write
7FF8B9F77000
unkown
page read and write
2607F823000
heap
page read and write
26001D8F000
heap
page read and write
26001990000
heap
page read and write
260036D0000
direct allocation
page read and write
26002587000
heap
page read and write
26001DEA000
heap
page read and write
260019A4000
heap
page read and write
26002229000
heap
page read and write
26002442000
heap
page read and write
2607F7ED000
heap
page read and write
26002279000
heap
page read and write
26002BBC000
heap
page read and write
7FF8A8AE1000
unkown
page execute read
2BA39F80000
heap
page read and write
26002393000
heap
page read and write
260023E9000
heap
page read and write
8C905DF000
stack
page read and write
1F981855000
heap
page read and write
26001DFC000
heap
page read and write
26001DB8000
heap
page read and write
26001A2B000
heap
page read and write
7FF78172C000
unkown
page readonly
26001D7A000
heap
page read and write
2600241A000
heap
page read and write
260019C0000
heap
page read and write
26002ED2000
heap
page read and write
7FF8B6040000
unkown
page readonly
26002FFB000
heap
page read and write
7FF8B8AF0000
unkown
page readonly
7FF8A8021000
unkown
page execute read
2600251F000
heap
page read and write
26002CC9000
heap
page read and write
2600222E000
heap
page read and write
1F98184F000
heap
page read and write
26002CE6000
heap
page read and write
26002F2A000
heap
page read and write
26002DF0000
heap
page read and write
26001DAF000
heap
page read and write
26003021000
heap
page read and write
26002BA0000
heap
page read and write
2600247D000
heap
page read and write
1F981848000
heap
page read and write
26002499000
heap
page read and write
1F981848000
heap
page read and write
1F981856000
heap
page read and write
260022FA000
heap
page read and write
E68DBCE000
stack
page read and write
26001A0D000
heap
page read and write
2607FDE0000
direct allocation
page read and write
7FF8B9F7D000
unkown
page readonly
26001A63000
heap
page read and write
26002D4F000
heap
page read and write
2600221B000
heap
page read and write
26001E87000
heap
page read and write
1F98184A000
heap
page read and write
2600235A000
heap
page read and write
7FF8B8F81000
unkown
page execute read
260024A9000
heap
page read and write
26002377000
heap
page read and write
26001E82000
heap
page read and write
26001D7D000
heap
page read and write
260019A3000
heap
page read and write
26002D39000
heap
page read and write
1F9832E0000
heap
page read and write
26001D12000
heap
page read and write
7FF8B78C1000
unkown
page readonly
7FF8B78B0000
unkown
page readonly
7FF8B27CE000
unkown
page readonly
26002D51000
heap
page read and write
2607F85F000
heap
page read and write
26001999000
heap
page read and write
26001D2A000
heap
page read and write
7FF8B6021000
unkown
page execute read
26001D4E000
heap
page read and write
2600374C000
direct allocation
page read and write
1F98184D000
heap
page read and write
260023E8000
heap
page read and write
26001A54000
heap
page read and write
260024C5000
heap
page read and write
260022D8000
heap
page read and write
26002499000
heap
page read and write
1F981840000
heap
page read and write
26001D77000
heap
page read and write
E68D7D1000
stack
page read and write
1F981848000
heap
page read and write
26001A3E000
heap
page read and write
26003FC4000
direct allocation
page read and write
26002329000
heap
page read and write
260019CF000
heap
page read and write
2600300C000
heap
page read and write
26001DEC000
heap
page read and write
26001DF4000
heap
page read and write
26001DAF000
heap
page read and write
26002400000
heap
page read and write
2607F823000
heap
page read and write
26002408000
heap
page read and write
7FF8B620B000
unkown
page read and write
26001DEA000
heap
page read and write
D803BFE000
unkown
page read and write
26001E4C000
heap
page read and write
26002340000
heap
page read and write
26002416000
heap
page read and write
8C905E3000
stack
page read and write
26002223000
heap
page read and write
7FF8B80CC000
unkown
page readonly
7FF8B7FE0000
unkown
page readonly
7FF781701000
unkown
page execute read
7FF8B8107000
unkown
page readonly
26002FA7000
heap
page read and write
2600247A000
heap
page read and write
7FF8A7FC2000
unkown
page write copy
2600231D000
heap
page read and write
26001D53000
heap
page read and write
7FF781741000
unkown
page read and write
1F981848000
heap
page read and write
26002D28000
heap
page read and write
26001A3D000
heap
page read and write
26002D36000
heap
page read and write
1F98184F000
heap
page read and write
2600245F000
heap
page read and write
26002CC7000
heap
page read and write
2600199A000
heap
page read and write
26003FC0000
direct allocation
page read and write
2600300C000
heap
page read and write
7FF8B825C000
unkown
page read and write
7FF8A8ACE000
unkown
page readonly
2607F80A000
heap
page read and write
2600233E000
heap
page read and write
26001DF1000
heap
page read and write
26002D1D000
heap
page read and write
26002476000
heap
page read and write
26003079000
heap
page read and write
26001DEA000
heap
page read and write
1F98184E000
heap
page read and write
2607F770000
heap
page read and write
7FF8B7815000
unkown
page readonly
7FF8B9840000
unkown
page readonly
26002356000
heap
page read and write
26002D41000
heap
page read and write
7FF8A7FD5000
unkown
page readonly
26001CC6000
heap
page read and write
260021E5000
heap
page read and write
1F981856000
heap
page read and write
26003095000
heap
page read and write
2600243E000
heap
page read and write
2607F80A000
heap
page read and write
260024AA000
heap
page read and write
260021E7000
heap
page read and write
7FF8A8EBC000
unkown
page read and write
26002DD8000
heap
page read and write
26001D48000
heap
page read and write
7FF781700000
unkown
page readonly
26002300000
heap
page read and write
7FF8A8AD4000
unkown
page readonly
7FF8B8F90000
unkown
page read and write
260024A9000
heap
page read and write
7FF8B27B1000
unkown
page execute read
26001D78000
heap
page read and write
2600226E000
heap
page read and write
26002ED3000
heap
page read and write
260027A0000
direct allocation
page read and write
7FF8A835D000
unkown
page execute read
26001DE9000
heap
page read and write
2607F805000
heap
page read and write
26002F44000
heap
page read and write
7FF8A8AE0000
unkown
page readonly
7FF8B5710000
unkown
page readonly
26002D00000
heap
page read and write
26001DFE000
heap
page read and write
260024A9000
heap
page read and write
260021A1000
heap
page read and write
2600232C000
heap
page read and write
26002221000
heap
page read and write
1F981855000
heap
page read and write
26001DE7000
heap
page read and write
26001E39000
heap
page read and write
2600253B000
heap
page read and write
1F981855000
heap
page read and write
260034A0000
direct allocation
page read and write
2607F803000
heap
page read and write
26001DEA000
heap
page read and write
260019CC000
heap
page read and write
26001D8D000
heap
page read and write
26001E65000
heap
page read and write
26002232000
heap
page read and write
7FF8A85E0000
unkown
page read and write
1F981848000
heap
page read and write
26001E54000
heap
page read and write
7FF8B90E1000
unkown
page execute read
7FF8B9F61000
unkown
page execute read
26002E42000
heap
page read and write
26001DB2000
heap
page read and write
1F981854000
heap
page read and write
2607F823000
heap
page read and write
26002366000
heap
page read and write
26001CE0000
heap
page read and write
2600258A000
heap
page read and write
7FF8B8F80000
unkown
page readonly
260021F9000
heap
page read and write
1F981848000
heap
page read and write
26001A57000
heap
page read and write
260023B2000
heap
page read and write
26002476000
heap
page read and write
1F981854000
heap
page read and write
26002E91000
heap
page read and write
260022B5000
heap
page read and write
2607F80C000
heap
page read and write
1F981855000
heap
page read and write
26001A4C000
heap
page read and write
7FF8B8832000
unkown
page readonly
1F981856000
heap
page read and write
26001DC1000
heap
page read and write
26001D69000
heap
page read and write
26003080000
heap
page read and write
26002CF7000
heap
page read and write
7FF781700000
unkown
page readonly
2607F7EF000
heap
page read and write
26001DB2000
heap
page read and write
1F981848000
heap
page read and write
2600245A000
heap
page read and write
26001D26000
heap
page read and write
26002559000
heap
page read and write
26001DB6000
heap
page read and write
26002317000
heap
page read and write
1F981820000
heap
page read and write
26002354000
heap
page read and write
7FF8A8EF9000
unkown
page read and write
26001CC8000
heap
page read and write
26001A90000
direct allocation
page read and write
26002CEC000
heap
page read and write
26001E00000
heap
page read and write
1F981855000
heap
page read and write
7FF8A8592000
unkown
page readonly
2600258E000
heap
page read and write
26002499000
heap
page read and write
7FF8A8510000
unkown
page readonly
260022FA000
heap
page read and write
26001CD8000
heap
page read and write
2607F7C0000
heap
page read and write
260024A9000
heap
page read and write
1F981848000
heap
page read and write
7FF8B8021000
unkown
page execute read
7FF8B8AFA000
unkown
page readonly
26002CE6000
heap
page read and write
260024AB000
heap
page read and write
260022A8000
heap
page read and write
26001DF5000
heap
page read and write
26002329000
heap
page read and write
26002228000
heap
page read and write
7FF8A7FC3000
unkown
page read and write
7FF781700000
unkown
page readonly
1F981800000
heap
page readonly
26001E0F000
heap
page read and write
2600300C000
heap
page read and write
26002389000
heap
page read and write
26001E6C000
heap
page read and write
7FF8A82AF000
unkown
page read and write
26002CE3000
heap
page read and write
26003063000
heap
page read and write
2607FEE0000
direct allocation
page read and write
26002D36000
heap
page read and write
7FF8B8CB5000
unkown
page readonly
1F981852000
heap
page read and write
7FF8B6036000
unkown
page readonly
26002351000
heap
page read and write
26002499000
heap
page read and write
26001DA1000
heap
page read and write
26001DC2000
heap
page read and write
7FF78173F000
unkown
page read and write
260019CC000
heap
page read and write
7FF8B90FB000
unkown
page readonly
7FF8B620A000
unkown
page write copy
26001A67000
heap
page read and write
26001E54000
heap
page read and write
26001DA1000
heap
page read and write
26001D2A000
heap
page read and write
26002CC3000
heap
page read and write
260019AE000
heap
page read and write
1F981847000
heap
page read and write
26002487000
heap
page read and write
1F981856000
heap
page read and write
26001A7E000
heap
page read and write
2607F83C000
heap
page read and write
2607F80C000
heap
page read and write
7FF8A8349000
unkown
page execute read
26001E11000
heap
page read and write
1F981849000
heap
page read and write
1F981854000
heap
page read and write
26002222000
heap
page read and write
26002FA7000
heap
page read and write
1F981841000
heap
page read and write
1F981848000
heap
page read and write
26002374000
heap
page read and write
2607F857000
heap
page read and write
1F98184E000
heap
page read and write
2600249C000
heap
page read and write
1F981854000
heap
page read and write
26001DBE000
heap
page read and write
26001DA1000
heap
page read and write
1F98184F000
heap
page read and write
26002AA0000
direct allocation
page read and write
260022B1000
heap
page read and write
2607F84F000
heap
page read and write
7FF8B8251000
unkown
page execute read
26002476000
heap
page read and write
26003810000
direct allocation
page read and write
26002300000
heap
page read and write
26003C0C000
direct allocation
page read and write
2607F829000
heap
page read and write
1F981854000
heap
page read and write
1F981855000
heap
page read and write
260019B6000
heap
page read and write
2600300C000
heap
page read and write
260024A9000
heap
page read and write
260024FE000
heap
page read and write
2607F7F8000
heap
page read and write
2607F866000
heap
page read and write
26002504000
heap
page read and write
26001A79000
heap
page read and write
1F98184F000
heap
page read and write
26002F3C000
heap
page read and write
26002BC9000
heap
page read and write
26002351000
heap
page read and write
7FF8B93CD000
unkown
page readonly
2607F740000
heap
page readonly
7FF8A7FCF000
unkown
page write copy
1F981848000
heap
page read and write
26002317000
heap
page read and write
1F98184E000
heap
page read and write
260019AA000
heap
page read and write
2600249C000
heap
page read and write
26002499000
heap
page read and write
26002240000
heap
page read and write
7FF8A8A31000
unkown
page execute read
260024BF000
heap
page read and write
2600306C000
heap
page read and write
1F981855000
heap
page read and write
7FF8B9F70000
unkown
page readonly
26002C11000
heap
page read and write
26002F3C000
heap
page read and write
26001A4F000
heap
page read and write
260023A1000
heap
page read and write
26001E38000
heap
page read and write
2607F827000
heap
page read and write
2607FDD5000
heap
page read and write
260019A3000
heap
page read and write
260023E9000
heap
page read and write
260024FE000
heap
page read and write
26002FC7000
heap
page read and write
8C909CE000
stack
page read and write
26002565000
heap
page read and write
26001DED000
heap
page read and write
2600247A000
heap
page read and write
26001DBC000
heap
page read and write
26002F80000
heap
page read and write
26002D33000
heap
page read and write
7FF8A8EFC000
unkown
page read and write
26002500000
heap
page read and write
7FF8B7841000
unkown
page readonly
26002476000
heap
page read and write
1F981848000
heap
page read and write
26001CF9000
heap
page read and write
D803CFF000
stack
page read and write
2607F850000
heap
page read and write
1F981848000
heap
page read and write
26002F1C000
heap
page read and write
1F98184D000
heap
page read and write
26002329000
heap
page read and write
26001CB9000
heap
page read and write
260019BD000
heap
page read and write
7FF8B604C000
unkown
page read and write
26003EA0000
direct allocation
page read and write
26002442000
heap
page read and write
1F98184E000
heap
page read and write
26002393000
heap
page read and write
26002C9B000
heap
page read and write
26001A57000
heap
page read and write
1F981847000
heap
page read and write
2607F80E000
heap
page read and write
26001A4D000
heap
page read and write
7FF8B8834000
unkown
page readonly
26002F62000
heap
page read and write
26003079000
heap
page read and write
26003C7C000
direct allocation
page read and write
26001DE2000
heap
page read and write
1F981848000
heap
page read and write
8C907DE000
stack
page read and write
26002300000
heap
page read and write
26002FD0000
heap
page read and write
26002366000
heap
page read and write
26002223000
heap
page read and write
26002318000
heap
page read and write
26003FA8000
direct allocation
page read and write
26002540000
heap
page read and write
7FF8A8325000
unkown
page execute read
26001A16000
heap
page read and write
2607F854000
heap
page read and write
26001CFE000
heap
page read and write
260019C5000
heap
page read and write
26002F3C000
heap
page read and write
26001D2A000
heap
page read and write
26002D41000
heap
page read and write
7FF8A7E68000
unkown
page readonly
7FF8A81A6000
unkown
page readonly
26001CCC000
heap
page read and write
26002BA9000
heap
page read and write
2607F81B000
heap
page read and write
26002223000
heap
page read and write
26003084000
heap
page read and write
26002317000
heap
page read and write
7FF8B6171000
unkown
page execute read
2607F814000
heap
page read and write
7FF8BFAD7000
unkown
page readonly
260024AC000
heap
page read and write
26001A63000
heap
page read and write
26001A77000
heap
page read and write
26002D1F000
heap
page read and write
260024BE000
heap
page read and write
1F981852000
heap
page read and write
2600247E000
heap
page read and write
26001A4C000
heap
page read and write
2607F81B000
heap
page read and write
2600241A000
heap
page read and write
26002D45000
heap
page read and write
260033A0000
direct allocation
page read and write
26001E3C000
heap
page read and write
26002359000
heap
page read and write
26002D55000
heap
page read and write
2607F7F0000
heap
page read and write
2600247E000
heap
page read and write
7FF8B77F0000
unkown
page readonly
2607F84D000
heap
page read and write
26001E01000
heap
page read and write
26002D34000
heap
page read and write
260022B2000
heap
page read and write
26002FC7000
heap
page read and write
26002CB6000
heap
page read and write
26002690000
heap
page read and write
26001DD1000
heap
page read and write
26002D49000
heap
page read and write
7FF78173F000
unkown
page write copy
26002374000
heap
page read and write
1F981855000
heap
page read and write
2600301C000
heap
page read and write
26001E01000
heap
page read and write
2600247A000
heap
page read and write
1F981847000
heap
page read and write
260022FA000
heap
page read and write
26001999000
heap
page read and write
7FF8B800D000
unkown
page readonly
26001D73000
heap
page read and write
26002317000
heap
page read and write
26003D40000
direct allocation
page read and write
26001D2D000
heap
page read and write
260019BF000
heap
page read and write
1F98184E000
heap
page read and write
26001D49000
heap
page read and write
260024BE000
heap
page read and write
26001D10000
heap
page read and write
1F981848000
heap
page read and write
2600222A000
heap
page read and write
26002393000
heap
page read and write
26002307000
heap
page read and write
1F981856000
heap
page read and write
7FF8B572A000
unkown
page read and write
1F98184B000
heap
page read and write
26002300000
heap
page read and write
26001DCA000
heap
page read and write
7FF8B604E000
unkown
page readonly
26002416000
heap
page read and write
26001E81000
heap
page read and write
260019C5000
heap
page read and write
26001D23000
heap
page read and write
1F981855000
heap
page read and write
7FF8BA4F9000
unkown
page readonly
1F981848000
heap
page read and write
1F981848000
heap
page read and write
260024AD000
heap
page read and write
26002442000
heap
page read and write
26001DC8000
heap
page read and write
26001DFF000
heap
page read and write
26002DD8000
heap
page read and write
26001A53000
heap
page read and write
260021EE000
heap
page read and write
2607F7D8000
heap
page read and write
26001D76000
heap
page read and write
26002229000
heap
page read and write
260019B4000
heap
page read and write
26001E75000
heap
page read and write
26002BB4000
heap
page read and write
26002240000
heap
page read and write
1F981854000
heap
page read and write
26002236000
heap
page read and write
26002426000
heap
page read and write
26002532000
heap
page read and write
26001E1F000
heap
page read and write
26002509000
heap
page read and write
26002394000
heap
page read and write
26001A59000
heap
page read and write
26002504000
heap
page read and write
2607FDD0000
heap
page read and write
260022FA000
heap
page read and write
26002504000
heap
page read and write
26001DC9000
heap
page read and write
26002317000
heap
page read and write
260022B3000
heap
page read and write
26001E8E000
heap
page read and write
7FF8B78BE000
unkown
page read and write
260021F7000
heap
page read and write
2600249B000
heap
page read and write
260022C9000
heap
page read and write
26002D36000
heap
page read and write
7FF781743000
unkown
page readonly
7FF8B8F92000
unkown
page readonly
7FF8A82CD000
unkown
page execute read
7FF8A8A30000
unkown
page readonly
26001E38000
heap
page read and write
7FF8A82C0000
unkown
page readonly
2BA3A170000
heap
page read and write
7FF8BFAC0000
unkown
page readonly
260024AB000
heap
page read and write
7FF8B9103000
unkown
page read and write
7FF8B6214000
unkown
page readonly
26001A7C000
heap
page read and write
260019B4000
heap
page read and write
7FF8B8257000
unkown
page readonly
2607F790000
heap
page read and write
260024C3000
heap
page read and write
7FF8B7820000
unkown
page readonly
26002D00000
heap
page read and write
26002D00000
heap
page read and write
1F9817F0000
heap
page read and write
1F98184F000
heap
page read and write
7FF8A8EF4000
unkown
page read and write
26002E4A000
heap
page read and write
1F98184F000
heap
page read and write
26003191000
heap
page read and write
260022A7000
heap
page read and write
26002353000
heap
page read and write
2600251F000
heap
page read and write
260024A9000
heap
page read and write
2600251F000
heap
page read and write
26003095000
heap
page read and write
260019CB000
heap
page read and write
260021C2000
heap
page read and write
260023C9000
heap
page read and write
26001D34000
heap
page read and write
26001D22000
heap
page read and write
26003FBC000
direct allocation
page read and write
2600249C000
heap
page read and write
26002206000
heap
page read and write
26001A3D000
heap
page read and write
7FF8B78A0000
unkown
page readonly
26002D4A000
heap
page read and write
2607F84F000
heap
page read and write
26003084000
heap
page read and write
2607F823000
heap
page read and write
26002D00000
heap
page read and write
2607F7B8000
heap
page read and write
26002F1C000
heap
page read and write
26002DB8000
heap
page read and write
2607F79E000
heap
page read and write
26002FD0000
heap
page read and write
7FF8A81A1000
unkown
page execute read
26002329000
heap
page read and write
26003080000
heap
page read and write
2600307F000
heap
page read and write
7FF8B9104000
unkown
page readonly
1F98183E000
heap
page read and write
26001DA2000
heap
page read and write
2607F84F000
heap
page read and write
26001D38000
heap
page read and write
7FF8B825E000
unkown
page readonly
26002CEC000
heap
page read and write
260023D3000
heap
page read and write
26001A3C000
heap
page read and write
26002FE2000
heap
page read and write
26002BA1000
heap
page read and write
260038F8000
direct allocation
page read and write
260024CA000
heap
page read and write
26001D7F000
heap
page read and write
2600232C000
heap
page read and write
26002E32000
heap
page read and write
7FF8B8F73000
unkown
page readonly
7FF8B572E000
unkown
page readonly
2600199E000
heap
page read and write
1F981855000
heap
page read and write
260019FE000
heap
page read and write
26002432000
heap
page read and write
260022CF000
heap
page read and write
2607F829000
heap
page read and write
7FF8B8020000
unkown
page readonly
7FF8B8AF1000
unkown
page execute read
26002565000
heap
page read and write
1F981855000
heap
page read and write
26001DF1000
heap
page read and write
2607F84F000
heap
page read and write
2607F7F1000
heap
page read and write
26002383000
heap
page read and write
260022FA000
heap
page read and write
2600199B000
heap
page read and write
26002D25000
heap
page read and write
26002398000
heap
page read and write
26002379000
heap
page read and write
2600249C000
heap
page read and write
26001E3C000
heap
page read and write
1F981848000
heap
page read and write
2600306C000
heap
page read and write
26002241000
heap
page read and write
26001DF1000
heap
page read and write
1F981848000
heap
page read and write
26001D4C000
heap
page read and write
2607F829000
heap
page read and write
26002191000
heap
page read and write
26002C53000
heap
page read and write
26001A0E000
heap
page read and write
26002206000
heap
page read and write
26001DC0000
heap
page read and write
1F98184F000
heap
page read and write
26002F4E000
heap
page read and write
26002565000
heap
page read and write
2607F7B8000
heap
page read and write
26003A80000
direct allocation
page read and write
26002585000
heap
page read and write
1F981855000
heap
page read and write
2607F810000
heap
page read and write
26002F62000
heap
page read and write
7FF781743000
unkown
page readonly
26002392000
heap
page read and write
26002565000
heap
page read and write
260021C1000
heap
page read and write
2600237A000
heap
page read and write
260022D7000
heap
page read and write
26001E4C000
heap
page read and write
260024EB000
heap
page read and write
1F98184F000
heap
page read and write
260019FF000
heap
page read and write
7FF8B8F75000
unkown
page read and write
26001DF1000
heap
page read and write
7FF8B7833000
unkown
page readonly
26002504000
heap
page read and write
26002351000
heap
page read and write
26003FB8000
direct allocation
page read and write
26003B90000
direct allocation
page read and write
26002D0C000
heap
page read and write
1F981856000
heap
page read and write
260022CD000
heap
page read and write
7FF8B800B000
unkown
page read and write
26001E7E000
heap
page read and write
26002412000
heap
page read and write
26001A55000
heap
page read and write
260022B6000
heap
page read and write
26001CCE000
heap
page read and write
26001D75000
heap
page read and write
26003DC8000
direct allocation
page read and write
7FF8B78A1000
unkown
page execute read
1F981854000
heap
page read and write
26001DA9000
heap
page read and write
26003081000
heap
page read and write
1F981856000
heap
page read and write
26003FAC000
direct allocation
page read and write
2607F7F9000
heap
page read and write
26002CEE000
heap
page read and write
26002499000
heap
page read and write
26002524000
heap
page read and write
2607F810000
heap
page read and write
26001A7A000
heap
page read and write
2600250A000
heap
page read and write
2607F7F9000
heap
page read and write
26002530000
heap
page read and write
7FF781701000
unkown
page execute read
26001A15000
heap
page read and write
26001CE1000
heap
page read and write
7FF8A8183000
unkown
page readonly
26002240000
heap
page read and write
7FF8B8CB1000
unkown
page execute read
260022B6000
heap
page read and write
260024AE000
heap
page read and write
26001DBE000
heap
page read and write
260023E4000
heap
page read and write
260022CD000
heap
page read and write
7FF8A82C1000
unkown
page execute read
26001E7D000
heap
page read and write
26001A61000
heap
page read and write
7FF8B9F60000
unkown
page readonly
26002BC9000
heap
page read and write
1F981848000
heap
page read and write
26002F1F000
heap
page read and write
1F981854000
heap
page read and write
260021F7000
heap
page read and write
26001991000
heap
page read and write
7FF8A7930000
unkown
page readonly
7FF8A8AA6000
unkown
page readonly
7FF8B9845000
unkown
page read and write
2600306D000
heap
page read and write
26002F45000
heap
page read and write
7FF8B8AF9000
unkown
page read and write
7FF8BA4F1000
unkown
page execute read
260021C5000
heap
page read and write
7FF8B93D1000
unkown
page read and write
26002C22000
heap
page read and write
1F981854000
heap
page read and write
26001E8B000
heap
page read and write
1F98183E000
heap
page read and write
2600247A000
heap
page read and write
260024C6000
heap
page read and write
26003F70000
direct allocation
page read and write
260019CA000
heap
page read and write
26002CCF000
heap
page read and write
260022D3000
heap
page read and write
26002FE8000
heap
page read and write
26001A57000
heap
page read and write
2607F802000
heap
page read and write
2BA39FA8000
heap
page read and write
1F981847000
heap
page read and write
2600220A000
heap
page read and write
7FF8B5711000
unkown
page execute read
260019A4000
heap
page read and write
26002DD8000
heap
page read and write
26001D3D000
heap
page read and write
26002413000
heap
page read and write
26002559000
heap
page read and write
26002F3C000
heap
page read and write
7FF8A82AC000
unkown
page readonly
26002541000
heap
page read and write
7FF8B8831000
unkown
page execute read
260019EF000
heap
page read and write
7FF8B055E000
unkown
page read and write
260028A0000
direct allocation
page read and write
260019C4000
heap
page read and write
8C905D9000
stack
page read and write
26002BC1000
heap
page read and write
260024A9000
heap
page read and write
26001D9E000
heap
page read and write
26001E90000
direct allocation
page read and write
26002BAB000
heap
page read and write
7FF78172C000
unkown
page readonly
1F981844000
heap
page read and write
26002F50000
heap
page read and write
260023CD000
heap
page read and write
26002F2A000
heap
page read and write
2607F850000
heap
page read and write
26002223000
heap
page read and write
2600223B000
heap
page read and write
1F981847000
heap
page read and write
260022D7000
heap
page read and write
26001E4D000
heap
page read and write
E68D9DD000
stack
page read and write
2607F7E8000
heap
page read and write
26001D69000
heap
page read and write
26001A16000
heap
page read and write
26002D08000
heap
page read and write
2600253B000
heap
page read and write
7FF8B8CB9000
unkown
page readonly
2607F730000
heap
page read and write
26002FE2000
heap
page read and write
1F981847000
heap
page read and write
1F981848000
heap
page read and write
7FF8A85E6000
unkown
page read and write
2BA3A2A0000
heap
page read and write
2600301E000
heap
page read and write
26002366000
heap
page read and write
26003083000
heap
page read and write
1F98184E000
heap
page read and write
26002429000
heap
page read and write
7FF781701000
unkown
page execute read
26001A66000
heap
page read and write
7FF8B90F7000
unkown
page readonly
26001A0E000
heap
page read and write
26002C20000
heap
page read and write
D803AFD000
stack
page read and write
2607F806000
heap
page read and write
1F981848000
heap
page read and write
7FF8A8DE8000
unkown
page readonly
26002DD8000
heap
page read and write
26002CF7000
heap
page read and write
26001D2D000
heap
page read and write
26002190000
heap
page read and write
7FF8B6041000
unkown
page execute read
26002E3B000
heap
page read and write
1F981855000
heap
page read and write
1F981847000
heap
page read and write
26002383000
heap
page read and write
2600247A000
heap
page read and write
1F981848000
heap
page read and write
7FF8BA4F6000
unkown
page readonly
2600221F000
heap
page read and write
26001DF5000
heap
page read and write
260019CF000
heap
page read and write
26002CD2000
heap
page read and write
26002F4D000
heap
page read and write
26001D81000
heap
page read and write
1F98184F000
heap
page read and write
26001A4C000
heap
page read and write
8C905D5000
stack
page read and write
260024A9000
heap
page read and write
26002232000
heap
page read and write
26001E16000
heap
page read and write
2600249C000
heap
page read and write
26002245000
heap
page read and write
26001E7F000
heap
page read and write
26002BB4000
heap
page read and write
260021CD000
heap
page read and write
2607F7E8000
heap
page read and write
7FF8A8F28000
unkown
page readonly
26002EDA000
heap
page read and write
1F981848000
heap
page read and write
26002504000
heap
page read and write
7FF8B7814000
unkown
page read and write
26001B90000
direct allocation
page read and write
26001DBF000
heap
page read and write
26001C94000
heap
page read and write
26002BC9000
heap
page read and write
26002191000
heap
page read and write
7FF8B0530000
unkown
page readonly
1F98184F000
heap
page read and write
1F981848000
heap
page read and write
26001F90000
direct allocation
page read and write
26002236000
heap
page read and write
260022B8000
heap
page read and write
7FF781743000
unkown
page readonly
26001D2A000
heap
page read and write
26001CF8000
heap
page read and write
26001D0E000
heap
page read and write
260023E9000
heap
page read and write
260019B5000
heap
page read and write
26001CD9000
heap
page read and write
2607F7F6000
heap
page read and write
1F981856000
heap
page read and write
1F981856000
heap
page read and write
1F981855000
heap
page read and write
26001CCC000
heap
page read and write
26002C53000
heap
page read and write
26001D2A000
heap
page read and write
7FF8A8151000
unkown
page readonly
2600222E000
heap
page read and write
26002E41000
heap
page read and write
26002C13000
heap
page read and write
1F98184F000
heap
page read and write
26001E65000
heap
page read and write
1F981856000
heap
page read and write
26002499000
heap
page read and write
7FF8B9841000
unkown
page execute read
260019AE000
heap
page read and write
26001D7E000
heap
page read and write
2600227E000
heap
page read and write
26001E6A000
heap
page read and write
260024CA000
heap
page read and write
26002F2A000
heap
page read and write
260026A0000
direct allocation
page read and write
26002CF7000
heap
page read and write
7FF8A82B1000
unkown
page readonly
1F981848000
heap
page read and write
2600223F000
heap
page read and write
26001D27000
heap
page read and write
7FF8B6034000
unkown
page read and write
260024AE000
heap
page read and write
260019BF000
heap
page read and write
2600233F000
heap
page read and write
7FF8A8E1F000
unkown
page readonly
7FF8B055F000
unkown
page readonly
1F98184F000
heap
page read and write
2BA39FAD000
heap
page read and write
26002D43000
heap
page read and write
26002417000
heap
page read and write
26001D49000
heap
page read and write
26001A4F000
heap
page read and write
260023A1000
heap
page read and write
26002531000
heap
page read and write
26001E01000
heap
page read and write
7FF8A8020000
unkown
page readonly
260035C0000
direct allocation
page read and write
26001DBA000
heap
page read and write
7FF8B61FF000
unkown
page read and write
26002ED2000
heap
page read and write
7FF8A8EDC000
unkown
page write copy
26001E8B000
heap
page read and write
1F981847000
heap
page read and write
26002432000
heap
page read and write
260019E3000
heap
page read and write
2607F817000
heap
page read and write
26002090000
direct allocation
page read and write
260019AC000
heap
page read and write
260023FD000
heap
page read and write
26001A61000
heap
page read and write
26001A56000
heap
page read and write
26002235000
heap
page read and write
2600247A000
heap
page read and write
260019A9000
heap
page read and write
260021C9000
heap
page read and write
7FF8A85E8000
unkown
page readonly
1F981848000
heap
page read and write
26001DEE000
heap
page read and write
26001D82000
heap
page read and write
26003064000
heap
page read and write
2607FCE0000
heap
page read and write
7FF781741000
unkown
page read and write
260019A7000
heap
page read and write
26001E44000
heap
page read and write
26002D2E000
heap
page read and write
7FF8B783E000
unkown
page read and write
2600245F000
heap
page read and write
26001E38000
heap
page read and write
26002432000
heap
page read and write
7FF781701000
unkown
page execute read
26002DD9000
heap
page read and write
260021EE000
heap
page read and write
26001C9D000
heap
page read and write
26003084000
heap
page read and write
26001E1F000
heap
page read and write
260022C4000
heap
page read and write
26001D74000
heap
page read and write
2607F7BF000
heap
page read and write
26001D7E000
heap
page read and write
7FF8B8104000
unkown
page read and write
2600301C000
heap
page read and write
260022FA000
heap
page read and write
26002F50000
heap
page read and write
2600249C000
heap
page read and write
7FF8A8204000
unkown
page readonly
26001A10000
heap
page read and write
260019BD000
heap
page read and write
26001A2A000
heap
page read and write
260019CC000
heap
page read and write
26002DD8000
heap
page read and write
26001E6A000
heap
page read and write
7FF8A8F06000
unkown
page readonly
7FF8B8F71000
unkown
page execute read
7FF8B9F7B000
unkown
page readonly
2600301C000
heap
page read and write
2607F803000
heap
page read and write
7FF8A8339000
unkown
page execute read
2607F80F000
heap
page read and write
26002300000
heap
page read and write
26002307000
heap
page read and write
2607F80A000
heap
page read and write
2600247E000
heap
page read and write
26001C91000
heap
page read and write
7FF8B8CB8000
unkown
page read and write
26002E42000
heap
page read and write
26001DEC000
heap
page read and write
7FF8B054C000
unkown
page readonly
26001CBD000
heap
page read and write
2600247F000
heap
page read and write
1F981847000
heap
page read and write
26001D29000
heap
page read and write
26001D50000
heap
page read and write
2607F810000
heap
page read and write
26001CA0000
heap
page read and write
26002565000
heap
page read and write
26002DB8000
heap
page read and write
26001D51000
heap
page read and write
2600199E000
heap
page read and write
26001E75000
heap
page read and write
2600244B000
heap
page read and write
260023E9000
heap
page read and write
1F981855000
heap
page read and write
260019B2000
heap
page read and write
26001DD1000
heap
page read and write
26002CCA000
heap
page read and write
1F9819F0000
heap
page read and write
7FF8B27CB000
unkown
page read and write
260019AA000
heap
page read and write
26001CF9000
heap
page read and write
26001D76000
heap
page read and write
26001A09000
heap
page read and write
26002FF4000
heap
page read and write
260019ED000
heap
page read and write
260023A1000
heap
page read and write
2607F7BA000
heap
page read and write
26002CE5000
heap
page read and write
2BA3A190000
heap
page read and write
26002D3D000
heap
page read and write
1F981848000
heap
page read and write
26001A1E000
heap
page read and write
7FF8B7FE1000
unkown
page execute read
7FF8A850E000
unkown
page execute read
26002FE7000
heap
page read and write
260022CD000
heap
page read and write
1F981855000
heap
page read and write
2600245F000
heap
page read and write
26001C90000
heap
page read and write
26001E3D000
heap
page read and write
2607F7F1000
heap
page read and write
26002F80000
heap
page read and write
260023A1000
heap
page read and write
26002354000
heap
page read and write
2600301C000
heap
page read and write
2600249B000
heap
page read and write
7FF8A853B000
unkown
page readonly
26002550000
heap
page read and write
26002BB0000
heap
page read and write
2600258E000
heap
page read and write
26002317000
heap
page read and write
26001CCA000
heap
page read and write
26001E6A000
heap
page read and write
7FF8B90E0000
unkown
page readonly
1F981847000
heap
page read and write
7FF8B5724000
unkown
page readonly
2607F815000
heap
page read and write
26002D2A000
heap
page read and write
260019C0000
heap
page read and write
7FF78172C000
unkown
page readonly
7FF8A856D000
unkown
page readonly
2607F801000
heap
page read and write
7FF8B93C0000
unkown
page readonly
7FF8B8F70000
unkown
page readonly
2600224D000
heap
page read and write
260024FC000
heap
page read and write
260029A0000
direct allocation
page read and write
26001A67000
heap
page read and write
260022A1000
heap
page read and write
26002499000
heap
page read and write
26002F66000
heap
page read and write
2600247E000
heap
page read and write
26001A60000
heap
page read and write
7FF8B8002000
unkown
page readonly
2600306D000
heap
page read and write
26001D8F000
heap
page read and write
26001A0E000
heap
page read and write
26001E8B000
heap
page read and write
26002D00000
heap
page read and write
26001DEA000
heap
page read and write
2600236B000
heap
page read and write
2607F850000
heap
page read and write
2607F81B000
heap
page read and write
260019C9000
heap
page read and write
26001D76000
heap
page read and write
7FF8A8E0D000
unkown
page readonly
26001D4C000
heap
page read and write
2600249C000
heap
page read and write
26001A3D000
heap
page read and write
26002351000
heap
page read and write
2BA39FA0000
heap
page read and write
26001D22000
heap
page read and write
2600245F000
heap
page read and write
7FF78173F000
unkown
page write copy
2600222E000
heap
page read and write
26002FFE000
heap
page read and write
1F981847000
heap
page read and write
2607F804000
heap
page read and write
26002D04000
heap
page read and write
7FF8B6046000
unkown
page readonly
26002270000
heap
page read and write
7FF8A8253000
unkown
page readonly
1F981856000
heap
page read and write
260024A9000
heap
page read and write
26001A2B000
heap
page read and write
26002388000
heap
page read and write
26001DFA000
heap
page read and write
26001D73000
heap
page read and write
26002C97000
heap
page read and write
1F981855000
heap
page read and write
26002270000
heap
page read and write
7FF8B27B0000
unkown
page readonly
26002D3B000
heap
page read and write
26002E8E000
heap
page read and write
2600233F000
heap
page read and write
26002E3F000
heap
page read and write
26002BBE000
heap
page read and write
26001D51000
heap
page read and write
7FF8B93C1000
unkown
page execute read
26001DFF000
heap
page read and write
26001DEE000
heap
page read and write
26001CB1000
heap
page read and write
1F981848000
heap
page read and write
7FF8B6020000
unkown
page readonly
26002351000
heap
page read and write
26002ED2000
heap
page read and write
2600236C000
heap
page read and write
26002F1C000
heap
page read and write
26001CE5000
heap
page read and write
2600245F000
heap
page read and write
2600242F000
heap
page read and write
2607F84E000
heap
page read and write
26001E01000
heap
page read and write
26002476000
heap
page read and write
7FF8BFAD6000
unkown
page read and write
26001D2A000
heap
page read and write
2607F858000
heap
page read and write
260024AE000
heap
page read and write
26001E3C000
heap
page read and write
7FF8B8250000
unkown
page readonly
26003FB0000
direct allocation
page read and write
260023B9000
heap
page read and write
26003095000
heap
page read and write
7FF8BFAC1000
unkown
page execute read
26001CE7000
heap
page read and write
26002590000
direct allocation
page read and write
2600258E000
heap
page read and write
7FF781700000
unkown
page readonly
7FF8B9846000
unkown
page readonly
260024C8000
heap
page read and write
2607F7E4000
heap
page read and write
2607F781000
heap
page read and write
2600247A000
heap
page read and write
26003EB4000
direct allocation
page read and write
7FF8B8830000
unkown
page readonly
2607FD20000
unkown
page readonly
1F981828000
heap
page read and write
26002ED2000
heap
page read and write
26001DF2000
heap
page read and write
2600245F000
heap
page read and write
1F98184E000
heap
page read and write
2607F858000
heap
page read and write
26002359000
heap
page read and write
1F981848000
heap
page read and write
26001D69000
heap
page read and write
26002442000
heap
page read and write
2600242A000
heap
page read and write
2600247A000
heap
page read and write
26002287000
heap
page read and write
26001DD1000
heap
page read and write
26001A58000
heap
page read and write
26002CEC000
heap
page read and write
26002351000
heap
page read and write
7FF8A7931000
unkown
page execute read
7FF8A8AC9000
unkown
page read and write
1F981847000
heap
page read and write
26002D24000
heap
page read and write
26002223000
heap
page read and write
260021FB000
heap
page read and write
26002240000
heap
page read and write
26001A0F000
heap
page read and write
7FF8B8F88000
unkown
page readonly
1F981848000
heap
page read and write
7FF8B61CC000
unkown
page readonly
2607F829000
heap
page read and write
2607F827000
heap
page read and write
26001D11000
heap
page read and write
26002CEB000
heap
page read and write
260019A6000
heap
page read and write
1F98184F000
heap
page read and write
2607F84F000
heap
page read and write
26002FE7000
heap
page read and write
26001D24000
heap
page read and write
2600249B000
heap
page read and write
2600241D000
heap
page read and write
7FF8B27C1000
unkown
page readonly
7FF8A8D17000
unkown
page readonly
26002366000
heap
page read and write
26002ED7000
heap
page read and write
7FF8B77F1000
unkown
page execute read
26002351000
heap
page read and write
260019D1000
heap
page read and write
26001A07000
heap
page read and write
26002D30000
heap
page read and write
260021F7000
heap
page read and write
26001E3D000
heap
page read and write
260019C6000
heap
page read and write
260021E5000
heap
page read and write
26002433000
heap
page read and write
26002374000
heap
page read and write
7FF8B780E000
unkown
page read and write
2607F84C000
heap
page read and write
26001DEC000
heap
page read and write
1F98184F000
heap
page read and write
26002499000
heap
page read and write
26002351000
heap
page read and write
26003FB4000
direct allocation
page read and write
2607F806000
heap
page read and write
26001A79000
heap
page read and write
26001DB6000
heap
page read and write
26001E44000
heap
page read and write
2BA3A290000
heap
page read and write
26002CE3000
heap
page read and write
260022C6000
heap
page read and write
26001E09000
heap
page read and write
26002D47000
heap
page read and write
26001DD1000
heap
page read and write
26002CEF000
heap
page read and write
26002236000
heap
page read and write
26001CCC000
heap
page read and write
26001DE6000
heap
page read and write
26002476000
heap
page read and write
260023D5000
heap
page read and write
1F981855000
heap
page read and write
26002236000
heap
page read and write
1F98184D000
heap
page read and write
26001CCB000
heap
page read and write
26002D45000
heap
page read and write
26002504000
heap
page read and write
2600254A000
heap
page read and write
7FF8B8AF5000
unkown
page readonly
7FF8B9843000
unkown
page readonly
2607F855000
heap
page read and write
26001A13000
heap
page read and write
1F981854000
heap
page read and write
26002366000
heap
page read and write
26001D41000
heap
page read and write
26001D82000
heap
page read and write
26002CA3000
heap
page read and write
26001D0A000
heap
page read and write
26001E7A000
heap
page read and write
26002236000
heap
page read and write
26002DED000
heap
page read and write
260024CA000
heap
page read and write
26001E4D000
heap
page read and write
26002374000
heap
page read and write
260019B8000
heap
page read and write
26002E40000
heap
page read and write
26003095000
heap
page read and write
26002D41000
heap
page read and write
26001E7A000
heap
page read and write
1F9831B0000
heap
page read and write
2600242A000
heap
page read and write
26002F2A000
heap
page read and write
7FF8B602C000
unkown
page readonly
26002206000
heap
page read and write
1F98184F000
heap
page read and write
7FF8BA4F0000
unkown
page readonly
26002D04000
heap
page read and write
26002F41000
heap
page read and write
260021F7000
heap
page read and write
26001E38000
heap
page read and write
26003079000
heap
page read and write
2600249C000
heap
page read and write
7FF8B6170000
unkown
page readonly
26001E01000
heap
page read and write
26001DA7000
heap
page read and write
2607F84F000
heap
page read and write
2600253B000
heap
page read and write
1F981848000
heap
page read and write
26001A2F000
heap
page read and write
26002D1E000
heap
page read and write
26002D53000
heap
page read and write
26002587000
heap
page read and write
26002582000
heap
page read and write
7FF78172C000
unkown
page readonly
There are 1339 hidden memdumps, click here to show them.