IOC Report
SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\Browsers\Cookies.txt
ASCII text, with very long lines (522), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\Browsers\Firefox\History.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\network_info.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\process_info.txt
ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\system_info.txt
Algol 68 source, ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KZWFNRXYKI.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\VLZDGUKUTZ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_cffi_backend.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_helpers.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_http_parser.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_http_writer.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\aiohttp\_websocket.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\frozenlist\_frozenlist.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\multidict\_multidict.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\python311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI67602\yarl\_quoting_c.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_cffi_backend.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_helpers.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_http_parser.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_http_writer.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\aiohttp\_websocket.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\frozenlist\_frozenlist.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\multidict\_multidict.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\python311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80682\yarl\_quoting_c.cp311-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0c7c8d00, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\67f46lun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\71434D56-1548-ED3D-AEE6-C75AECD93BF0\Browsers\Historys.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AutofillData.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Cookies.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\DownloadData.db
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\HistoryData.db
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Logins.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\BPMLNOBVSB.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\FENIVHOIKN.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\HTAGVDFUIE.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\HTAGVDFUIE.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KATAXZVCPS.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KZWFNRXYKI.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\KZWFNRXYKI.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LTKMYBSEYZ.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\LTKMYBSEYZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NIKHQAIQAU.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NWTVCDUMOB.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UMMBDNEQBN.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\UOOJJOZIRH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\WKXEWIOTXI.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\WUTJSCBCFX.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\BPMLNOBVSB.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\FENIVHOIKN.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\HTAGVDFUIE.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\HTAGVDFUIE.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KATAXZVCPS.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KZWFNRXYKI.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KZWFNRXYKI.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\KZWFNRXYKI.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LTKMYBSEYZ.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\LTKMYBSEYZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NIKHQAIQAU.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\NWTVCDUMOB.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UMMBDNEQBN.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\UOOJJOZIRH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\VLZDGUKUTZ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\WKXEWIOTXI.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\WUTJSCBCFX.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Documents\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\BPMLNOBVSB.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\FENIVHOIKN.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\HTAGVDFUIE.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\HTAGVDFUIE.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KATAXZVCPS.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KZWFNRXYKI.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KZWFNRXYKI.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\KZWFNRXYKI.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LTKMYBSEYZ.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\LTKMYBSEYZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NIKHQAIQAU.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\NWTVCDUMOB.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UMMBDNEQBN.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\UOOJJOZIRH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\VLZDGUKUTZ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\WKXEWIOTXI.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\WUTJSCBCFX.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Downloads\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\HTAGVDFUIE.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\KZWFNRXYKI.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\LTKMYBSEYZ.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\ONBQCLYSPU\WUTJSCBCFX.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\BPMLNOBVSB.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\KZWFNRXYKI.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\LTKMYBSEYZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\UOOJJOZIRH.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\UMMBDNEQBN\WKXEWIOTXI.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\FENIVHOIKN.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\KZWFNRXYKI.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\NIKHQAIQAU.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\NWTVCDUMOB.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\VLZDGUKUTZ\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\HTAGVDFUIE.mp3
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\KATAXZVCPS.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\UMMBDNEQBN.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\VLZDGUKUTZ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\StealedFilesByExela\XZXHAVGRAG\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Web.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\METADATA
HTML document, Unicode text, UTF-8 text, with very long lines (367)
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\attrs-23.2.0.dist-info\licenses\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67602\cryptography-42.0.5.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\METADATA
HTML document, Unicode text, UTF-8 text, with very long lines (367)
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\attrs-23.2.0.dist-info\licenses\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI80682\cryptography-42.0.5.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ds3s4c53.5hn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_exjrwd5i.bcl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 204 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.8568.15352.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "gdb --version"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_VideoController get name
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic computersystem get Manufacturer
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic path Win32_ComputerSystem get Manufacturer
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe""
malicious
C:\Windows\System32\attrib.exe
attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Exela Update Service" /t REG_SZ /d "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe" /f"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\mshta.exe
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c chcp
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c chcp
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic logicaldisk get caption,description,providername
malicious
C:\Windows\System32\net.exe
net user
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 user
malicious
C:\Windows\System32\net.exe
net localgroup
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 localgroup
malicious
C:\Windows\System32\net.exe
net localgroup administrators
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 localgroup administrators
malicious
C:\Windows\System32\net.exe
net user guest
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 user guest
malicious
C:\Windows\System32\net.exe
net user administrator
malicious
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 user administrator
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic startup get caption,command
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\ARP.EXE
arp -a
malicious
C:\Windows\System32\NETSTAT.EXE
netstat -ano
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\netsh.exe
netsh firewall show config
malicious
C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe
"C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\reg.exe
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Exela Update Service" /t REG_SZ /d "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe" /f
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Get-Clipboard
C:\Windows\System32\chcp.com
chcp
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\HOSTNAME.EXE
hostname
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\query.exe
query user
C:\Windows\System32\quser.exe
"C:\Windows\system32\quser.exe"
C:\Windows\System32\tasklist.exe
tasklist /svc
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\sc.exe
sc query type= service state= all
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 73 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.attrs.org/en/stable/why.html#data-classes).
unknown
https://docs.python.org/3/library/ssl.html#ssl.OP_NO_COMPRESSION
unknown
https://account.riotgames.com/api/account/v1/user
unknown
https://accounts.reddit.com/api/access_token
unknown
https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002/?key=440D7F4D810EF9298D25EDDF37C1F9
unknown
https://github.com/pyca/cryptography/issues/8996
unknown
https://gofile.io/d/mn2lNW)
unknown
https://github.com/python-attrs/attrs/issues/251
unknown
https://tiktok.com/
unknown
https://github.com/aio-libs/aiohttp/discussions/6044
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://t.me/ExelaStealerP5
unknown
http://python.org
unknown
https://discord.com/api/webhooks/1232453561850531851/OBetju49bFsNbzWeG3Y_1O_or46pmBaTOUd7HjjHcO5X_BaLZ2C-YJ8xGzkF6VbqbsY0
162.159.128.233
http://python.org:80
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/sponsors/hynek
unknown
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
unknown
https://oauth.reddit.com/api/v1/me
unknown
https://i.hizliresim.com/6t31tw2.jpgp
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://www.attrs.org/en/23.2.0/_static/sponsors/FilePreviews.svg
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://github.com/python-attrs/attrs/issues/1200)
unknown
https://raw.githubusercontent.com/python-attrs/attrs/main/docs/_static/attrs_logo.svg
unknown
https://www.attrs.org/en/stable/init.html#hooking-yourself-into-initialization)
unknown
https://github.com/python-attrs/attrs)
unknown
https://www.attrs.org/)
unknown
https://twitter.com
unknown
https://twitter.com/home
unknown
https://gql.twitch.tv/gql:
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
unknown
https://github.com/quicaxd/Exela-V2.0/Exela-V2.00
unknown
https://github.com/python-attrs/attrs/issues/136
unknown
https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba
unknown
https://i.hizliresim.com/8po0puy.jfif
unknown
https://peps.python.org/pep-0205/
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://webcast.tiktok.com/webcast/wallet_api/diamond_buy/permission/?aid=1988&app_language=de-DE&ap
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://json.org
unknown
https://zopeinterface.readthedocs.io/en/latest/
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://t.me/Exela
unknown
https://github.com/quicaxd/Exela-V2.00D
unknown
https://raw.githubusercontent.com/justforExela/injection/main/injection.js
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://discord.com/api/v8/users/
unknown
https://i.hizliresim.com/qxnzimj.jpg
unknown
https://www.apache.org/licenses/
unknown
https://www.attrs.org/en/latest/names.html)
unknown
https://www.twitch.tv/
unknown
http://crl.ver)
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
unknown
https://open.spotify.com/user/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://filepreviews.io/
unknown
https://store8.gofile.io/uploadFile
206.168.191.31
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://cryptography.io/en/latest/installation/
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://github.com/python-attrs/attrs/issues/1165)
unknown
https://tidelift.com/subscription/pkg/pypi-attrs?utm_source=pypi-attrs&utm_medium=referral&utm_campa
unknown
https://www.attrs.org/en/stable/changelog.html
unknown
https://cryptography.io/en/latest/security/
unknown
https://github.com/python-attrs/attrs/issues/1141)
unknown
https://i.hizliresim.com/6t31tw2.jpg
unknown
https://thumbnails.roblox.com/v1/users/avatar?userIds=
unknown
https://www.variomedia.de/
unknown
https://bugs.python.org/issue37179
unknown
https://twitter.com/i/api/1.1/account/update_profile.jsonP
unknown
https://raw.githubusercontent.com/justforExela/injection/main/injection.js0A
unknown
https://www.reddit.com/user/0
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://www.reddit.com/user/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://github.com/pyca/cryptography/issues
unknown
https://readthedocs.org/projects/cryptography/badge/?version=latest
unknown
https://t.me/ExelaStealer
unknown
https://www.attrs.org/
unknown
https://www.twitch.tv/P?
unknown
https://discord.com/api/webhooks/1232453561850531851/OBetju49bFsNbzWeG3Y_1O_or46pmBaTOUd7HjjHcO5X_Ba
unknown
https://github.com/python-attrs/attrs/issues/1158)
unknown
https://mahler:8092/site-updates.py
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/python-attrs/attrs/issues/1203)
unknown
https://www.attrs.org/en/23.2.0/_static/sponsors/Tidelift.svg
unknown
https://cdn.discordapp.com/avatars/0
unknown
https://github.com/pyca/cryptography
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://cryptography.io/
unknown
https://docs.python.org/3/library/asyncio-eventloop.html
unknown
http://ip-api.com/json
208.95.112.1
http://python.org/
unknown
https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)).
unknown
https://github.com/pyca/cryptography/
unknown
https://gofile.io/d/mn2lNW)P
unknown
https://github.com/python-attrs/attrs
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
store8.gofile.io
206.168.191.31
discord.com
162.159.128.233
ip-api.com
208.95.112.1
api.gofile.io
51.38.43.18

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
162.159.137.232
unknown
United States
162.159.128.233
discord.com
United States
206.168.191.31
store8.gofile.io
United States
127.0.0.1
unknown
unknown
51.38.43.18
api.gofile.io
France

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Exela Update Service
malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters
TrapPollTimeMilliSecs

Memdumps

Base Address
Regiontype
Protect
Malicious
2DCD0DF6000
heap
page read and write
malicious
2DCD07D8000
direct allocation
page read and write
malicious
2DCD1A20000
direct allocation
page read and write
malicious
2DCD14C1000
heap
page read and write
malicious
2DCD0DB4000
heap
page read and write
malicious
2DCD1B20000
direct allocation
page read and write
malicious
2DCD0E25000
heap
page read and write
malicious
2DCCD074000
heap
page read and write
2938E3EA000
heap
page read and write
2DCCFFF0000
heap
page read and write
1829E40F000
heap
page read and write
2DCD0E58000
heap
page read and write
1DA60300000
heap
page read and write
1DC9FBB4000
heap
page read and write
2173D2A5000
heap
page read and write
16B17F90000
heap
page read and write
2DCD0FA4000
heap
page read and write
21F3FC14000
heap
page read and write
2DCCD09F000
heap
page read and write
2DCCF63B000
heap
page read and write
64A1C7E000
unkown
page readonly
299F740A000
heap
page read and write
2DCCFF67000
heap
page read and write
2DAEC720000
heap
page read and write
1B1377C8000
heap
page read and write
1829E410000
heap
page read and write
1FEF0DD3000
heap
page read and write
1BDF3070000
heap
page read and write
2DCCFD00000
direct allocation
page read and write
2442C4FF000
heap
page read and write
7FF72AAAF000
unkown
page write copy
23B784A3000
heap
page read and write
1FC7580F000
heap
page read and write
21F3FC1A000
heap
page read and write
1AF30BA8000
heap
page read and write
9202EFF000
unkown
page read and write
2DCD2BF0000
direct allocation
page read and write
2DCCF019000
heap
page read and write
2DCCD0E5000
heap
page read and write
2DCCED75000
heap
page read and write
15601558000
heap
page read and write
60E97DD000
stack
page read and write
1B777CEF000
heap
page read and write
15601553000
heap
page read and write
21F3FC84000
heap
page read and write
2DCCED69000
heap
page read and write
2DCCF01F000
heap
page read and write
AF776FE000
stack
page read and write
1BDCB6C0000
heap
page read and write
2442C4E2000
heap
page read and write
5B7B7E000
stack
page read and write
21F3FC11000
heap
page read and write
21A18F77000
heap
page read and write
1DC9DE40000
heap
page read and write
64A167E000
unkown
page readonly
21E30520000
heap
page read and write
2DCCEFC4000
heap
page read and write
2DAEC771000
heap
page read and write
2DCCF6FF000
heap
page read and write
2442C04B000
heap
page read and write
2DCCF087000
heap
page read and write
1B777C4C000
heap
page read and write
1DC9DB94000
heap
page read and write
FFFEF9F000
stack
page read and write
7FFDFA701000
unkown
page execute and read and write
1B1377EB000
heap
page read and write
1DA602E7000
heap
page read and write
1560156C000
heap
page read and write
2173D2FE000
heap
page read and write
2938E3DA000
heap
page read and write
B3A81BB000
stack
page read and write
2DCD05D8000
heap
page read and write
23B784B0000
heap
page read and write
7FF6E3AA1000
unkown
page read and write
2C6FCFF000
unkown
page read and write
23B784A6000
heap
page read and write
1829E5E2000
heap
page read and write
23B784B4000
heap
page read and write
2DAEC75B000
heap
page read and write
2DCCF5CC000
heap
page read and write
2DCCF695000
heap
page read and write
1FEF141E000
heap
page read and write
2DCCD0AA000
heap
page read and write
2283C430000
heap
page read and write
2DCD1F4E000
heap
page read and write
2DCD0355000
heap
page read and write
23B784B0000
heap
page read and write
20950E38000
heap
page read and write
2DCCED7F000
heap
page read and write
2283C450000
heap
page read and write
2442C4E5000
heap
page read and write
2DCCED20000
heap
page read and write
2DCCD0A3000
heap
page read and write
1829E5E7000
heap
page read and write
162B2580000
heap
page read and write
21F3FC76000
heap
page read and write
1BA66418000
heap
page read and write
21F3FC83000
heap
page read and write
2DCCED5B000
heap
page read and write
1B77262B000
heap
page read and write
1DA602E5000
heap
page read and write
2173D30D000
heap
page read and write
1829E509000
heap
page read and write
2DCD0428000
heap
page read and write
21F3FD0F000
trusted library allocation
page read and write
2DCCD093000
heap
page read and write
1DA62362000
heap
page read and write
19ABCFC0000
heap
page read and write
2DCD1F4E000
heap
page read and write
2DCD0BDA000
heap
page read and write
1FEF0F5A000
heap
page read and write
A3523BE000
stack
page read and write
182A029D000
heap
page read and write
2DCD0006000
heap
page read and write
2442DDB5000
heap
page read and write
2DCCF0BB000
heap
page read and write
157C0420000
heap
page read and write
1DA60AF1000
heap
page read and write
162B23F1000
heap
page read and write
2DCD1A04000
heap
page read and write
2DCD12DC000
heap
page read and write
20950E54000
heap
page read and write
1DC9E19E000
heap
page read and write
1FC75816000
heap
page read and write
21F3FC84000
heap
page read and write
64A0B7E000
stack
page read and write
15601561000
heap
page read and write
1C83E7E000
stack
page read and write
12B42FE000
stack
page read and write
2173D2BD000
heap
page read and write
2DCCF0DB000
heap
page read and write
157C00F0000
heap
page read and write
2173D2C6000
heap
page read and write
16B17F99000
heap
page read and write
1FEF2D94000
heap
page read and write
1FC75802000
heap
page read and write
7FF72AA9C000
unkown
page readonly
2442BE65000
heap
page read and write
2DCD0512000
heap
page read and write
21A18F7F000
heap
page read and write
1FEF1416000
heap
page read and write
1DF9C4F5000
heap
page read and write
2DCD1758000
heap
page read and write
2DCCD0DC000
heap
page read and write
21E305F0000
heap
page read and write
2DCD1216000
heap
page read and write
2173D2F5000
heap
page read and write
2DCCF65E000
heap
page read and write
156014D4000
heap
page read and write
1DA62374000
heap
page read and write
2DCD1976000
heap
page read and write
2DCD2007000
heap
page read and write
2DCD0311000
heap
page read and write
2DCD12E7000
heap
page read and write
2DCCED1E000
heap
page read and write
1FEF0E01000
heap
page read and write
2DCD1F6D000
heap
page read and write
21E307A0000
heap
page read and write
2DCD062A000
heap
page read and write
1B777A90000
trusted library allocation
page read and write
2938E42C000
heap
page read and write
2938E3A9000
heap
page read and write
20431870000
heap
page read and write
2DCD1F88000
heap
page read and write
1DF79C20000
heap
page read and write
7FF72AAB3000
unkown
page readonly
2442BE54000
heap
page read and write
21F3FC18000
heap
page read and write
2DCCEF5F000
heap
page read and write
2DCD0376000
heap
page read and write
731A5DF000
stack
page read and write
1FC75802000
heap
page read and write
1829E4EC000
heap
page read and write
23B784A4000
heap
page read and write
21F3FC11000
heap
page read and write
2DCCF02C000
heap
page read and write
2DCCF041000
heap
page read and write
1B777C8A000
heap
page read and write
2173D2FE000
heap
page read and write
2DCCF0B4000
heap
page read and write
20453930000
heap
page read and write
23B784B3000
heap
page read and write
21F3FE19000
heap
page read and write
2DCD19A6000
heap
page read and write
2DCD18ED000
heap
page read and write
A3527FF000
stack
page read and write
2442BE41000
heap
page read and write
23B784A6000
heap
page read and write
2442BE58000
heap
page read and write
2173D2A5000
heap
page read and write
2DCCED76000
heap
page read and write
2DCCFF59000
heap
page read and write
21F3FE00000
heap
page read and write
27A92FD0000
heap
page read and write
162B23F5000
heap
page read and write
2DAEC75B000
heap
page read and write
2442DDBF000
heap
page read and write
162B23FA000
heap
page read and write
2DCCF02E000
heap
page read and write
23B784AB000
heap
page read and write
1FEF0DF0000
heap
page read and write
2106B3B1000
heap
page read and write
2DCD0BCA000
heap
page read and write
2442DDC5000
heap
page read and write
2DCD19A6000
heap
page read and write
64A037E000
unkown
page readonly
21F3FCF5000
trusted library allocation
page read and write
2DCD03CC000
heap
page read and write
2DCD184C000
heap
page read and write
169C36D1000
heap
page read and write
2DCCD09E000
heap
page read and write
24A660E0000
heap
page read and write
1829E4FB000
heap
page read and write
1A01BC59000
heap
page read and write
AF7767D000
stack
page read and write
2173D239000
heap
page read and write
A0EF1FE000
unkown
page read and write
22832F51000
heap
page read and write
21F3FC6A000
heap
page read and write
1FEF0DEE000
heap
page read and write
1E397500000
heap
page read and write
2DCCF5D8000
heap
page read and write
2442BE90000
heap
page read and write
23B784AD000
heap
page read and write
2DCD0379000
heap
page read and write
2173D390000
heap
page read and write
2173D30E000
heap
page read and write
2DCCF063000
heap
page read and write
1FEF0D10000
heap
page read and write
1DA62360000
heap
page read and write
20950E8B000
heap
page read and write
1B7739A1000
trusted library allocation
page read and write
2DCD0005000
heap
page read and write
21451330000
heap
page read and write
2DCD0CA0000
heap
page read and write
1829E509000
heap
page read and write
2DCCEF33000
heap
page read and write
2442C504000
heap
page read and write
1FC75806000
heap
page read and write
2DCCD0BE000
heap
page read and write
2173D2D1000
heap
page read and write
2DCD1FFF000
heap
page read and write
1829E4F8000
heap
page read and write
2DCCEFA8000
heap
page read and write
2DCD03E2000
heap
page read and write
1DA62374000
heap
page read and write
1DA60AE9000
heap
page read and write
9202B8C000
stack
page read and write
2DCD19A7000
heap
page read and write
21F3FC69000
heap
page read and write
2DCCFF64000
heap
page read and write
2173D2B3000
heap
page read and write
1DC9FBAE000
heap
page read and write
2DCCF0CA000
heap
page read and write
2C14D658000
heap
page read and write
1FEF0F54000
heap
page read and write
2DCD1038000
heap
page read and write
2DCCED94000
heap
page read and write
1829E50C000
heap
page read and write
1B773440000
trusted library section
page readonly
2DCD0950000
direct allocation
page read and write
23B784B4000
heap
page read and write
1FC75816000
heap
page read and write
156015A7000
heap
page read and write
15601B27000
heap
page read and write
1829E403000
heap
page read and write
2173D39C000
heap
page read and write
2442C51B000
heap
page read and write
2DCD11D4000
heap
page read and write
2938E340000
heap
page read and write
1FC75808000
heap
page read and write
1AF30B90000
heap
page read and write
2DCD18BD000
heap
page read and write
1E397600000
heap
page read and write
1FEF0F70000
heap
page read and write
1F24BD40000
heap
page read and write
21E305F0000
heap
page read and write
2DCD0750000
direct allocation
page read and write
2442BE5C000
heap
page read and write
1DC9DB98000
heap
page read and write
23B784B4000
heap
page read and write
299F7421000
heap
page read and write
1DC9E2BA000
heap
page read and write
20AA8600000
heap
page read and write
20AA85C0000
heap
page read and write
1829E4EF000
heap
page read and write
DD812FF000
unkown
page read and write
1DC9E1AB000
heap
page read and write
2DCCEDA2000
heap
page read and write
2DAEC746000
heap
page read and write
21F3FE19000
heap
page read and write
1FEF142E000
heap
page read and write
7FF72AA9C000
unkown
page readonly
1FC75808000
heap
page read and write
26749310000
heap
page read and write
2938E2A0000
heap
page read and write
1FC7580D000
heap
page read and write
1FC75808000
heap
page read and write
21F3FE19000
heap
page read and write
2DCD137F000
heap
page read and write
1FEF1414000
heap
page read and write
2DCD1D21000
heap
page read and write
4B55D7E000
stack
page read and write
2DCD2043000
heap
page read and write
1B777AB6000
trusted library allocation
page read and write
21E30550000
heap
page read and write
2DCCF0FC000
heap
page read and write
1DC9E1C5000
heap
page read and write
1FC75815000
heap
page read and write
15601522000
heap
page read and write
1DA60AD0000
heap
page read and write
2442C4FC000
heap
page read and write
2DCD1F66000
heap
page read and write
21F3FC66000
heap
page read and write
1560169B000
heap
page read and write
2DCD1D1F000
heap
page read and write
2DCD07B8000
direct allocation
page read and write
1DA60AF9000
heap
page read and write
2DCD0C5E000
heap
page read and write
2DCD1D1F000
heap
page read and write
1BA663B0000
heap
page read and write
2DCCED10000
heap
page read and write
2DCD0308000
heap
page read and write
35C2ED7000
stack
page read and write
2173D2E9000
heap
page read and write
23B783B0000
heap
page read and write
2442BE66000
heap
page read and write
2173EB40000
heap
page read and write
2DCD000C000
heap
page read and write
2DCCF040000
heap
page read and write
15601B49000
heap
page read and write
1FC75802000
heap
page read and write
85FB1FF000
stack
page read and write
1DF9C210000
heap
page read and write
2442C52A000
heap
page read and write
15601440000
heap
page read and write
2DCCF6A4000
heap
page read and write
1DA60540000
heap
page read and write
B6285DE000
stack
page read and write
1FC7580B000
heap
page read and write
2442BE6D000
heap
page read and write
162B23C6000
heap
page read and write
2938EA50000
heap
page read and write
1DA60AC8000
heap
page read and write
15601B4B000
heap
page read and write
1DA602F3000
heap
page read and write
12B3F8E000
stack
page read and write
2173D30A000
heap
page read and write
1560151C000
heap
page read and write
2DCCF003000
heap
page read and write
2DCD10CC000
heap
page read and write
7FF72AAB3000
unkown
page readonly
2DCD18ED000
heap
page read and write
1DC9DB84000
heap
page read and write
231B2A50000
heap
page read and write
1FEF141E000
heap
page read and write
64A0E7E000
unkown
page readonly
2DCCD0BC000
heap
page read and write
1FC75806000
heap
page read and write
1B773001000
trusted library allocation
page read and write
2106B360000
heap
page read and write
23B784A3000
heap
page read and write
26749270000
heap
page read and write
1FEF1429000
heap
page read and write
1FEF2D8E000
heap
page read and write
21A18F87000
heap
page read and write
2DCCED12000
heap
page read and write
162B24A0000
heap
page read and write
24A660F0000
heap
page read and write
2887F177000
heap
page read and write
20431920000
heap
page read and write
1B772580000
heap
page read and write
2DCD1CA6000
heap
page read and write
2DCD2114000
heap
page read and write
156014D0000
heap
page read and write
2442BE54000
heap
page read and write
21A18F8C000
heap
page read and write
1FC75815000
heap
page read and write
27A92DD0000
heap
page read and write
1FC75815000
heap
page read and write
64A0C7E000
unkown
page readonly
2173D2BD000
heap
page read and write
2DCD1CE7000
heap
page read and write
2C6FDFF000
stack
page read and write
216B3C00000
heap
page read and write
1FC757A0000
heap
page readonly
21F3FC0C000
heap
page read and write
2173EC5E000
heap
page read and write
1829E510000
heap
page read and write
2283C520000
heap
page read and write
A966DE4000
stack
page read and write
162B23B7000
heap
page read and write
1DA60ADE000
heap
page read and write
266A34E000
stack
page read and write
1560155B000
heap
page read and write
1DC9DE00000
heap
page read and write
2DCD184C000
heap
page read and write
1FEF0F57000
heap
page read and write
23B784A3000
heap
page read and write
5A2EADC000
stack
page read and write
1DA62366000
heap
page read and write
2442BE9E000
heap
page read and write
2DCD030D000
heap
page read and write
2442C510000
heap
page read and write
1FEF0DED000
heap
page read and write
2173D2FA000
heap
page read and write
162B23EE000
heap
page read and write
2DCCEF10000
heap
page read and write
2DCCF52C000
heap
page read and write
21F3FE15000
heap
page read and write
59AA4FF000
stack
page read and write
2173EB5E000
heap
page read and write
20950E7D000
heap
page read and write
F0937FF000
stack
page read and write
1829E350000
heap
page read and write
156014E0000
heap
page read and write
1829E401000
heap
page read and write
27A92DC0000
heap
page read and write
21F3FC11000
heap
page read and write
2DCCFFF4000
heap
page read and write
2DCCCFA0000
heap
page read and write
20950E90000
heap
page read and write
2DCCF46B000
heap
page read and write
1DA60630000
heap
page read and write
23B784A6000
heap
page read and write
1829E41E000
heap
page read and write
228331B0000
heap
page read and write
2DCD000B000
heap
page read and write
2DAEC776000
heap
page read and write
21F3FC5E000
heap
page read and write
1829E50A000
heap
page read and write
2DCCF09F000
heap
page read and write
22694262000
heap
page read and write
2DCCEF2E000
heap
page read and write
E52C36D000
stack
page read and write
B6285E4000
stack
page read and write
22832F30000
heap
page read and write
2DCD108A000
heap
page read and write
1FEF2D8E000
heap
page read and write
2442BE58000
heap
page read and write
2938EA80000
heap
page read and write
23B783C0000
heap
page readonly
2DCCEF21000
heap
page read and write
2DCCF721000
heap
page read and write
1FEF0F75000
heap
page read and write
1DC9FBAD000
heap
page read and write
1DA60635000
heap
page read and write
A966DD5000
stack
page read and write
15601B2C000
heap
page read and write
23B784AB000
heap
page read and write
2DCCEFD0000
heap
page read and write
1829E3F0000
heap
page read and write
2DCD1C21000
heap
page read and write
64A1379000
stack
page read and write
2DCCF57B000
heap
page read and write
1FEF0DB8000
heap
page read and write
1DA60240000
heap
page read and write
1FEF0D92000
heap
page read and write
1DA602B0000
heap
page read and write
A5E29FE000
stack
page read and write
3995AFC000
stack
page read and write
2DCCED1A000
heap
page read and write
2173D2FA000
heap
page read and write
2442BFE0000
heap
page read and write
1DA60280000
trusted library allocation
page read and write
1DC9DB9D000
heap
page read and write
2938EA60000
heap
page read and write
2DCCEFF8000
heap
page read and write
1FC75808000
heap
page read and write
1FEF0DF0000
heap
page read and write
2442C4EA000
heap
page read and write
2DCCF540000
heap
page read and write
1DC9DB47000
heap
page read and write
1FEF2D70000
heap
page read and write
156014E5000
heap
page read and write
2173D236000
heap
page read and write
2173D28E000
heap
page read and write
1B772600000
heap
page read and write
1FC75790000
heap
page read and write
2DCCD09C000
heap
page read and write
2DCCFE68000
heap
page read and write
2DCD1934000
heap
page read and write
2DAEC680000
heap
page read and write
2DCD000F000
heap
page read and write
2DCCF597000
heap
page read and write
2DCD1F66000
heap
page read and write
23B78400000
heap
page read and write
1DC9E1A3000
heap
page read and write
21A19105000
heap
page read and write
1E397620000
heap
page read and write
21A18F72000
heap
page read and write
2442C4F7000
heap
page read and write
2DCCF57A000
heap
page read and write
2DCCFF33000
heap
page read and write
2DCCFFFB000
heap
page read and write
8EF1C7F000
stack
page read and write
22694246000
heap
page read and write
15601564000
heap
page read and write
2DCD0005000
heap
page read and write
2413AD00000
heap
page read and write
2DCD0E54000
heap
page read and write
15F0C652000
heap
page read and write
7FF72AA70000
unkown
page readonly
2DCCEF54000
heap
page read and write
2DCCF03B000
heap
page read and write
2442BEA3000
heap
page read and write
1F24BE40000
heap
page read and write
2442DDB1000
heap
page read and write
1B777B51000
trusted library allocation
page read and write
2DCCF730000
direct allocation
page read and write
2173D2FE000
heap
page read and write
2442BE17000
heap
page read and write
2DCCEF69000
heap
page read and write
1B773340000
trusted library allocation
page read and write
2DCCFDA0000
direct allocation
page read and write
2DCCED09000
heap
page read and write
1B137640000
heap
page read and write
1DA60304000
heap
page read and write
2413AAB7000
heap
page read and write
1829E4FB000
heap
page read and write
1A01BC60000
heap
page read and write
15601B53000
heap
page read and write
21F3FC9E000
heap
page read and write
1DC9DE4B000
heap
page read and write
2173D30A000
heap
page read and write
14CF55A6000
heap
page read and write
2DCCED15000
heap
page read and write
2DCCEF7E000
heap
page read and write
3CBB6FF000
stack
page read and write
A966FDF000
stack
page read and write
1829E41A000
heap
page read and write
1DC9DB39000
heap
page read and write
1DA602E5000
heap
page read and write
1DA6236D000
heap
page read and write
20950E77000
heap
page read and write
2DCD2047000
heap
page read and write
1DC9E2B5000
heap
page read and write
2DCCEDD2000
heap
page read and write
1FEF2D85000
heap
page read and write
204318C5000
heap
page read and write
2DCCEF9D000
heap
page read and write
1829E390000
trusted library allocation
page read and write
216B3C90000
heap
page read and write
2413A9D0000
heap
page read and write
2DAEC776000
heap
page read and write
21A18F81000
heap
page read and write
1FC7580F000
heap
page read and write
2DAEC650000
heap
page read and write
A9FE47F000
stack
page read and write
1DC9E197000
heap
page read and write
1DA6236D000
heap
page read and write
2173EC54000
heap
page read and write
1DA6054A000
heap
page read and write
22694249000
heap
page read and write
20453610000
heap
page read and write
1AF60A70000
heap
page read and write
1FEF0DD6000
heap
page read and write
2DCCFE56000
heap
page read and write
20431770000
heap
page read and write
20453530000
heap
page read and write
21F3FC8E000
heap
page read and write
23B79F10000
heap
page read and write
2DCCF083000
heap
page read and write
7FF6E3A60000
unkown
page readonly
24A66430000
heap
page read and write
2173D26F000
heap
page read and write
2DCD1E8E000
heap
page read and write
2442BE65000
heap
page read and write
2938E6F0000
heap
page read and write
162B23F3000
heap
page read and write
20950E52000
heap
page read and write
1FC7580B000
heap
page read and write
2442BE6A000
heap
page read and write
2DCCD07E000
heap
page read and write
2DCCF07C000
heap
page read and write
59AA2FC000
stack
page read and write
2938E40A000
heap
page read and write
2DCD203F000
heap
page read and write
162B23A8000
heap
page read and write
1FC75802000
heap
page read and write
1DA60AC7000
heap
page read and write
14CF5570000
heap
page read and write
2173D2B4000
heap
page read and write
2173D2FE000
heap
page read and write
19ABD290000
heap
page read and write
731A55F000
stack
page read and write
1DC9E1BA000
heap
page read and write
1B777BA0000
trusted library allocation
page read and write
2DCCF596000
heap
page read and write
2DCD1F80000
heap
page read and write
2DCD204F000
heap
page read and write
2DCD0D4B000
heap
page read and write
2938E3CA000
heap
page read and write
23B784A6000
heap
page read and write
21A18F62000
heap
page read and write
B53C57E000
stack
page read and write
156015C0000
heap
page read and write
15601B59000
heap
page read and write
1B777C3F000
heap
page read and write
2173EB59000
heap
page read and write
1B777AEE000
trusted library allocation
page read and write
23B784B3000
heap
page read and write
169C38A0000
heap
page read and write
1FEF0DF7000
heap
page read and write
2DCD1F7E000
heap
page read and write
2DCCEFD9000
heap
page read and write
216B3C35000
heap
page read and write
6A706FF000
unkown
page read and write
1829E4B0000
trusted library allocation
page read and write
1DC9FBA4000
heap
page read and write
2DCCED13000
heap
page read and write
1CCFB9F0000
heap
page read and write
231B2940000
heap
page read and write
1BA66420000
heap
page read and write
22694160000
heap
page read and write
7A8A9FF000
stack
page read and write
2283C4A5000
heap
page read and write
2DCCF6FF000
heap
page read and write
204318C0000
heap
page read and write
1FEF0DED000
heap
page read and write
1829E3E6000
heap
page read and write
2173D2BD000
heap
page read and write
1DC9DB92000
heap
page read and write
1AF60BD5000
heap
page read and write
2DCCED19000
heap
page read and write
1FEF0D89000
heap
page read and write
1DC9E2BA000
heap
page read and write
1FEF0D30000
trusted library allocation
page read and write
60177FE000
stack
page read and write
14CF54C0000
heap
page read and write
1F24C0B0000
heap
page read and write
2DCCF717000
heap
page read and write
21F3FC13000
heap
page read and write
21F3FC84000
heap
page read and write
2173D27F000
heap
page read and write
21F3FC66000
heap
page read and write
2DCD0DF4000
heap
page read and write
2442BE99000
heap
page read and write
1FC75808000
heap
page read and write
22694080000
heap
page read and write
B53C47B000
stack
page read and write
2DCD19B3000
heap
page read and write
2173D2AE000
heap
page read and write
1829E3E7000
heap
page read and write
1FEF0DBF000
heap
page read and write
2DCCD0D4000
heap
page read and write
2938E430000
heap
page read and write
2106B3B1000
heap
page read and write
1FC77150000
heap
page read and write
1829E5EB000
heap
page read and write
2DCD1A15000
heap
page read and write
21F3FBF8000
heap
page read and write
1BDF3290000
heap
page read and write
2173D28D000
heap
page read and write
2173D2E0000
heap
page read and write
162B23EE000
heap
page read and write
21F44522000
trusted library allocation
page read and write
1B777BC0000
trusted library allocation
page read and write
1829E5E5000
heap
page read and write
A35277F000
stack
page read and write
1DA60AE8000
heap
page read and write
1B7779D0000
trusted library allocation
page read and write
2DCCF659000
heap
page read and write
2173D2C6000
heap
page read and write
1DA6054B000
heap
page read and write
2DCCEF56000
heap
page read and write
2DCCD080000
heap
page read and write
2DCD1F60000
heap
page read and write
2442BE9B000
heap
page read and write
23B784A8000
heap
page read and write
2DCD0097000
heap
page read and write
2DCCF070000
heap
page read and write
A5E28FC000
stack
page read and write
1B777AC4000
trusted library allocation
page read and write
204536B0000
heap
page read and write
2DCD011C000
heap
page read and write
156014D8000
heap
page read and write
6EE3AFC000
stack
page read and write
1B1377EB000
heap
page read and write
1829E403000
heap
page read and write
162B2610000
heap
page read and write
1B77268F000
heap
page read and write
2173D2FC000
heap
page read and write
2DCD1934000
heap
page read and write
2DCD030F000
heap
page read and write
2938E3A8000
heap
page read and write
1DA60302000
heap
page read and write
216B3C90000
heap
page read and write
1DA60ADE000
heap
page read and write
1DA602E5000
heap
page read and write
2DCD1E96000
heap
page read and write
2DCD1329000
heap
page read and write
1A01BAA0000
heap
page read and write
1DC9DBA7000
heap
page read and write
D041EFE000
stack
page read and write
2DCCEF53000
heap
page read and write
24A66435000
heap
page read and write
2DCCECFE000
heap
page read and write
1DC9FBB4000
heap
page read and write
2173EC5D000
heap
page read and write
2106B665000
heap
page read and write
2173D302000
heap
page read and write
2DCCFF58000
heap
page read and write
2DAEC660000
heap
page read and write
2DCCF6E6000
heap
page read and write
2DCD1F66000
heap
page read and write
1B7726A1000
heap
page read and write
2442BE17000
heap
page read and write
2DCD1E73000
heap
page read and write
2DCCED50000
heap
page read and write
2DAEC77C000
heap
page read and write
1DA60ADE000
heap
page read and write
1DA62470000
heap
page read and write
1DA60323000
heap
page read and write
2DCCEF3B000
heap
page read and write
2938E6F9000
heap
page read and write
1DA60AD1000
heap
page read and write
650439C000
stack
page read and write
2DCD1CE7000
heap
page read and write
2DCD1934000
heap
page read and write
2442BE33000
heap
page read and write
2DCCEF51000
heap
page read and write
182A029D000
heap
page read and write
2DCCF053000
heap
page read and write
2DCCED27000
heap
page read and write
1B777BB0000
trusted library allocation
page read and write
2DCCED0E000
heap
page read and write
16B17F40000
heap
page read and write
1B777B03000
trusted library allocation
page read and write
A9BABBB000
stack
page read and write
2DCCD081000
heap
page read and write
1DF79FA5000
heap
page read and write
1DA60544000
heap
page read and write
1F24BE5F000
heap
page read and write
23B784A6000
heap
page read and write
1FEF0DE4000
heap
page read and write
2DCCED97000
heap
page read and write
1DA60AF4000
heap
page read and write
2DCD0B9A000
heap
page read and write
7FF72AAB3000
unkown
page readonly
2938E3D9000
heap
page read and write
2DCD2CFB000
heap
page read and write
2DCD175C000
heap
page read and write
2DCD0E51000
heap
page read and write
1FEF0F5E000
heap
page read and write
3CBB4FB000
stack
page read and write
2DCCEF2D000
heap
page read and write
2DCD184C000
heap
page read and write
21F3FC9F000
heap
page read and write
2DCCEDC8000
heap
page read and write
2DCCF07C000
heap
page read and write
2DCD0BDA000
heap
page read and write
2DCD15CC000
heap
page read and write
16B17F20000
heap
page read and write
2DCCFE65000
heap
page read and write
2DCD1F70000
heap
page read and write
216B3C7D000
heap
page read and write
21F3FE08000
heap
page read and write
6EE3BFF000
unkown
page read and write
E6F5DE000
stack
page read and write
1FEF0D30000
trusted library allocation
page read and write
2DCD1F66000
heap
page read and write
1B779000000
heap
page read and write
A9FE13B000
stack
page read and write
2DCD200D000
heap
page read and write
1DC9DB8A000
heap
page read and write
2DCCF085000
heap
page read and write
2DCD0379000
heap
page read and write
162B23FA000
heap
page read and write
2442DDC5000
heap
page read and write
2173EC54000
heap
page read and write
21F3FD70000
heap
page readonly
1FC7580F000
heap
page read and write
23B784AB000
heap
page read and write
216B3C90000
heap
page read and write
1FEF0DC6000
heap
page read and write
2106B3B1000
heap
page read and write
2DCCEF3A000
heap
page read and write
2DCCFF23000
heap
page read and write
19ABCFD5000
heap
page read and write
1DF79D82000
heap
page read and write
2DCCED51000
heap
page read and write
15601B33000
heap
page read and write
1DA60ACC000
heap
page read and write
1FEF0DE6000
heap
page read and write
2173D302000
heap
page read and write
1DA62376000
heap
page read and write
156014C0000
heap
page read and write
2DCCD0AA000
heap
page read and write
156033CE000
heap
page read and write
2DCCF683000
heap
page read and write
1DA602F2000
heap
page read and write
2DCCF682000
heap
page read and write
2DCCED2A000
heap
page read and write
169C36B0000
heap
page read and write
23B784A6000
heap
page read and write
2DAEC728000
heap
page read and write
2DCD13C0000
heap
page read and write
1F836B2F000
heap
page read and write
2442BE6D000
heap
page read and write
2DCD18EE000
heap
page read and write
1B777A68000
trusted library allocation
page read and write
1B777C53000
heap
page read and write
156014C0000
heap
page read and write
15601563000
heap
page read and write
156015A4000
heap
page read and write
26749250000
heap
page read and write
1829E5EA000
heap
page read and write
2DAEC773000
heap
page read and write
2DCCEDA0000
heap
page read and write
2442C045000
heap
page read and write
21F3FD50000
trusted library allocation
page execute
2DCD022C000
heap
page read and write
21451210000
heap
page read and write
2DCCEF6D000
heap
page read and write
2DCCEF68000
heap
page read and write
156033C6000
heap
page read and write
2DCD0378000
heap
page read and write
2442C4EB000
heap
page read and write
21A18F58000
heap
page read and write
156014EA000
heap
page read and write
15601556000
heap
page read and write
64A077E000
unkown
page readonly
2DCCED69000
heap
page read and write
299F7230000
heap
page read and write
1DC9FBA3000
heap
page read and write
1B7739D0000
trusted library allocation
page read and write
2DCD1A04000
heap
page read and write
2442DDBF000
heap
page read and write
1A01BD40000
heap
page read and write
2DCCEF3A000
heap
page read and write
1829E3E5000
heap
page read and write
1DF9C2D0000
heap
page read and write
15601480000
heap
page read and write
2173D370000
heap
page read and write
601787F000
stack
page read and write
2DCCFF58000
heap
page read and write
7FF72AAAF000
unkown
page read and write
2173D2B8000
heap
page read and write
2938EA90000
heap
page read and write
21F3FC6B000
heap
page read and write
2DCCF01F000
heap
page read and write
2442C508000
heap
page read and write
2DCD000F000
heap
page read and write
2938E399000
heap
page read and write
23B784A6000
heap
page read and write
A35267D000
stack
page read and write
2173D27F000
heap
page read and write
27A92DB0000
heap
page read and write
2442BE00000
heap
page read and write
1B772E15000
heap
page read and write
1DC9E1A1000
heap
page read and write
2DAEC771000
heap
page read and write
2DCD0AD4000
heap
page read and write
1BDF307B000
heap
page read and write
8DD38FF000
stack
page read and write
1B772F13000
heap
page read and write
21A18F62000
heap
page read and write
2DCCF0FC000
heap
page read and write
F0933DB000
stack
page read and write
2DCCF726000
heap
page read and write
2DCCF46C000
heap
page read and write
15601695000
heap
page read and write
1DA602C7000
heap
page read and write
1DC9FBAE000
heap
page read and write
2DCCF6A4000
heap
page read and write
23B784AB000
heap
page read and write
BB8EDED000
stack
page read and write
1FEF1429000
heap
page read and write
1FC75803000
heap
page read and write
2442BE63000
heap
page read and write
21F3FE0B000
heap
page read and write
20950E64000
heap
page read and write
2DCD0305000
heap
page read and write
2DCD1329000
heap
page read and write
2173D255000
heap
page read and write
14CF54E0000
heap
page read and write
21A18F88000
heap
page read and write
266A2CD000
stack
page read and write
2173D2E9000
heap
page read and write
21A18F30000
heap
page read and write
21A18F7D000
heap
page read and write
281E7690000
heap
page read and write
2DCCF5DD000
heap
page read and write
1B772673000
heap
page read and write
1B777AA0000
trusted library allocation
page read and write
FFFF37F000
stack
page read and write
1DA6031B000
heap
page read and write
2DCD1F60000
heap
page read and write
2173D302000
heap
page read and write
27A92FF0000
heap
page read and write
2DCD203F000
heap
page read and write
2DCCD0AA000
heap
page read and write
20AA867B000
heap
page read and write
81FD67F000
stack
page read and write
21A18F5D000
heap
page read and write
7FF6E3A8C000
unkown
page readonly
6A7031C000
stack
page read and write
1A01BC59000
heap
page read and write
1C839D8000
stack
page read and write
1829E515000
heap
page read and write
2DCCED2F000
heap
page read and write
1829E406000
heap
page read and write
2DCD203F000
heap
page read and write
226941F0000
heap
page read and write
1B777CC7000
heap
page read and write
1560156B000
heap
page read and write
2DCD062A000
heap
page read and write
2938E510000
heap
page read and write
2173D276000
heap
page read and write
2DCCED97000
heap
page read and write
2173D30A000
heap
page read and write
2442C523000
heap
page read and write
2DCD062A000
heap
page read and write
15601B2C000
heap
page read and write
1DA602E5000
heap
page read and write
2DCD0311000
heap
page read and write
2DCCEF40000
heap
page read and write
2DCCF579000
heap
page read and write
2DCCED15000
heap
page read and write
2DCCFF23000
heap
page read and write
47C3BFE000
stack
page read and write
1DA60300000
heap
page read and write
2DCCF085000
heap
page read and write
1DC9FBA0000
heap
page read and write
1B777B54000
trusted library allocation
page read and write
1A5F0FB5000
heap
page read and write
2173D2AE000
heap
page read and write
2DCCFFC6000
heap
page read and write
1BA66410000
heap
page read and write
1DA60260000
heap
page read and write
1DC9DBAE000
heap
page read and write
162B23EF000
heap
page read and write
2DAEC75B000
heap
page read and write
2DCD0302000
heap
page read and write
182A0294000
heap
page read and write
1AF30B00000
heap
page read and write
1FEF2D94000
heap
page read and write
A9BAEFF000
unkown
page read and write
2DCCF044000
heap
page read and write
1DA60AE8000
heap
page read and write
2442BE9C000
heap
page read and write
3995CFF000
stack
page read and write
14CF55A6000
heap
page read and write
2DCCED19000
heap
page read and write
2DCCD08D000
heap
page read and write
2DCCFF58000
heap
page read and write
2DCD18DC000
heap
page read and write
64A08FE000
stack
page read and write
15601553000
heap
page read and write
2DCCEE10000
direct allocation
page read and write
2442BE9D000
heap
page read and write
162B23A0000
heap
page read and write
2DCD16F6000
heap
page read and write
1829E50F000
heap
page read and write
1FEF140C000
heap
page read and write
35C2FDE000
stack
page read and write
2DCCF72A000
heap
page read and write
228331C0000
heap
page read and write
281E7790000
heap
page read and write
64A09FE000
stack
page read and write
15601B20000
heap
page read and write
23B784AB000
heap
page read and write
2DCD1548000
heap
page read and write
169C3880000
heap
page read and write
4AFA27F000
stack
page read and write
20950E62000
heap
page read and write
14CF5578000
heap
page read and write
2DCD1692000
heap
page read and write
2442C522000
heap
page read and write
2173D2F8000
heap
page read and write
1FC75808000
heap
page read and write
1FC75816000
heap
page read and write
2442BE60000
heap
page read and write
7FF6E3A60000
unkown
page readonly
1DA6063B000
heap
page read and write
1DA60304000
heap
page read and write
2DCCED9E000
heap
page read and write
21F3FC6A000
heap
page read and write
2938E42B000
heap
page read and write
2DCCEDCE000
heap
page read and write
1560154A000
heap
page read and write
1FEF1410000
heap
page read and write
2106B390000
heap
page read and write
2283C52B000
heap
page read and write
2DCCEF66000
heap
page read and write
2173D2D7000
heap
page read and write
15601556000
heap
page read and write
2DCD1E73000
heap
page read and write
15601556000
heap
page read and write
1A5F0FB0000
heap
page read and write
2DAEC746000
heap
page read and write
1829E509000
heap
page read and write
2DCCED90000
heap
page read and write
14CF55BC000
heap
page read and write
1829E429000
heap
page read and write
2DCD0CE3000
heap
page read and write
2DCD1F6D000
heap
page read and write
1FC7580D000
heap
page read and write
2173D2C7000
heap
page read and write
157C0425000
heap
page read and write
1BDF33A0000
heap
page read and write
2DCCF052000
heap
page read and write
156033C2000
heap
page read and write
2173D27F000
heap
page read and write
1B137797000
heap
page read and write
2DCD1F46000
heap
page read and write
2DCCFF69000
heap
page read and write
B3A85FF000
stack
page read and write
23B784A3000
heap
page read and write
15F0C652000
heap
page read and write
2442C501000
heap
page read and write
2442BE34000
heap
page read and write
7FF6E3A8C000
unkown
page readonly
2DCCF0C2000
heap
page read and write
1FC75808000
heap
page read and write
60E9AFE000
stack
page read and write
2DCCF10E000
heap
page read and write
2442BE57000
heap
page read and write
21F3FC13000
heap
page read and write
A0EF0FC000
stack
page read and write
23B784A3000
heap
page read and write
1FEF141E000
heap
page read and write
1B777CF4000
heap
page read and write
7FF72AA70000
unkown
page readonly
1DC9E1C2000
heap
page read and write
1B777BB0000
trusted library allocation
page read and write
1FEF0DF5000
heap
page read and write
2173D2FA000
heap
page read and write
1829E5E4000
heap
page read and write
2DCD1F6F000
heap
page read and write
21A18F73000
heap
page read and write
2DCCD080000
heap
page read and write
2442BE58000
heap
page read and write
2DCD1047000
heap
page read and write
2DCD1A15000
heap
page read and write
2DCCF46B000
heap
page read and write
156015AA000
heap
page read and write
2173D2CC000
heap
page read and write
1FEF0DD3000
heap
page read and write
157C0160000
heap
page read and write
2DCD1E4C000
heap
page read and write
182A03B0000
heap
page read and write
21F3FCF8000
trusted library allocation
page read and write
2DCCEF3B000
heap
page read and write
2DAEC77C000
heap
page read and write
1AF60890000
heap
page read and write
2442C4EE000
heap
page read and write
21F3FC6D000
heap
page read and write
1DA60230000
heap
page read and write
23B784B3000
heap
page read and write
2DCCFED4000
heap
page read and write
2DCCCE80000
heap
page read and write
2173D2E0000
heap
page read and write
21F3FC4B000
heap
page read and write
15601561000
heap
page read and write
20950E77000
heap
page read and write
1FEF0DFA000
heap
page read and write
1DC9DD20000
trusted library allocation
page read and write
2173D2FC000
heap
page read and write
1FC7580A000
heap
page read and write
14CF54B0000
heap
page read and write
1B772E02000
heap
page read and write
2DCD019E000
heap
page read and write
2DCD0EDE000
heap
page read and write
1B772640000
heap
page read and write
2DCD160E000
heap
page read and write
2442BE99000
heap
page read and write
64A0EFE000
stack
page read and write
1DA60304000
heap
page read and write
156014B6000
heap
page read and write
15601542000
heap
page read and write
1FC7580D000
heap
page read and write
2173D2A5000
heap
page read and write
1DA60480000
heap
page read and write
12B437F000
stack
page read and write
2442C4E7000
heap
page read and write
1FC757FE000
heap
page read and write
2442DDBE000
heap
page read and write
231B2D25000
heap
page read and write
1DC9E1B9000
heap
page read and write
1FC75809000
heap
page read and write
20453630000
heap
page read and write
2DCCF10A000
heap
page read and write
2DCD1038000
heap
page read and write
1FEF1409000
heap
page read and write
15601360000
heap
page read and write
60176FF000
stack
page read and write
2173EB57000
heap
page read and write
2DCCF101000
heap
page read and write
35C327E000
stack
page read and write
2DCD07AC000
direct allocation
page read and write
2DCD1C62000
heap
page read and write
1DF79E60000
heap
page read and write
1DA6030A000
heap
page read and write
2173D258000
heap
page read and write
1FC75808000
heap
page read and write
7FF72AA71000
unkown
page execute read
1B777A78000
trusted library allocation
page read and write
2DCCED28000
heap
page read and write
2DCCF04F000
heap
page read and write
2173D0D0000
heap
page read and write
1DC9DD40000
heap
page read and write
2DCD02FF000
heap
page read and write
2DCCF46F000
heap
page read and write
2DCCFFEE000
heap
page read and write
2106B3B1000
heap
page read and write
1FEF0DD9000
heap
page read and write
1B1377BB000
heap
page read and write
2DAEC74C000
heap
page read and write
20950E80000
heap
page read and write
2DCD0005000
heap
page read and write
2DCD1F66000
heap
page read and write
162B23EE000
heap
page read and write
1829E419000
heap
page read and write
1DA60547000
heap
page read and write
1829E4FB000
heap
page read and write
2DCD1E73000
heap
page read and write
2442DDB0000
heap
page read and write
1FEF0DF0000
heap
page read and write
2C14D650000
heap
page read and write
2DCCED97000
heap
page read and write
1829E5EA000
heap
page read and write
1FEF0DD3000
heap
page read and write
1DA6030B000
heap
page read and write
1DA60323000
heap
page read and write
1B777B90000
trusted library allocation
page read and write
3E4D57E000
stack
page read and write
2DCD2043000
heap
page read and write
2173EC5E000
heap
page read and write
2DCCEF88000
heap
page read and write
182A02A3000
heap
page read and write
1B1377DC000
heap
page read and write
65046FF000
unkown
page read and write
2DCCCFF0000
heap
page read and write
2DCCEF35000
heap
page read and write
2DCD13C0000
heap
page read and write
1DC9DB88000
heap
page read and write
299F75F0000
heap
page read and write
1FEF0F50000
heap
page read and write
2DCCD0AA000
heap
page read and write
2173D236000
heap
page read and write
15601B3F000
heap
page read and write
64A097E000
unkown
page readonly
21F3FC6B000
heap
page read and write
47C40FF000
stack
page read and write
1FC7580F000
heap
page read and write
1FC75815000
heap
page read and write
2DCCF52D000
heap
page read and write
15601B3F000
heap
page read and write
2442C4F0000
heap
page read and write
2DCCF6FF000
heap
page read and write
1FEF0DDF000
heap
page read and write
20431934000
heap
page read and write
1DA60AF1000
heap
page read and write
2DCD137B000
heap
page read and write
2DCD1F7E000
heap
page read and write
216B3BE0000
heap
page read and write
1DC9E1C9000
heap
page read and write
2173D2F6000
heap
page read and write
20AA85F0000
heap
page read and write
1DF79D20000
heap
page read and write
2442C510000
heap
page read and write
21451048000
heap
page read and write
2DCD03E7000
heap
page read and write
2DCCF09A000
heap
page read and write
2DCCFF58000
heap
page read and write
1B773490000
trusted library section
page readonly
1FC75802000
heap
page read and write
20453935000
heap
page read and write
21F3FD05000
trusted library allocation
page read and write
1FEF0D97000
heap
page read and write
2173D2A5000
heap
page read and write
15601B3F000
heap
page read and write
2DCCE890000
direct allocation
page read and write
2DCCD0AC000
heap
page read and write
2DCCED65000
heap
page read and write
1AF30E10000
heap
page read and write
1FEF0DD1000
heap
page read and write
1FEF0DBF000
heap
page read and write
1AF30E00000
heap
page read and write
2DCCED13000
heap
page read and write
2283C4A0000
heap
page read and write
2173D30A000
heap
page read and write
2DCCEAE0000
direct allocation
page read and write
1FEF0D30000
trusted library allocation
page read and write
21F3FC6D000
heap
page read and write
2DCCED46000
heap
page read and write
2DCD16E4000
heap
page read and write
1BDCB7A0000
heap
page read and write
1829E423000
heap
page read and write
1BA66390000
heap
page read and write
21F3FC84000
heap
page read and write
2442C040000
heap
page read and write
2173EB44000
heap
page read and write
1829E5E0000
heap
page read and write
A9BAFFF000
stack
page read and write
21F3FC17000
heap
page read and write
2DCD129B000
heap
page read and write
23B7849F000
heap
page read and write
2442BE79000
heap
page read and write
2173D300000
heap
page read and write
1DC9DB88000
heap
page read and write
64A0FFE000
stack
page read and write
DF41CFE000
stack
page read and write
182A029D000
heap
page read and write
21A18F80000
heap
page read and write
1B773450000
trusted library section
page readonly
2173D27F000
heap
page read and write
2DCCF5FA000
heap
page read and write
1829E4FB000
heap
page read and write
2442BE6D000
heap
page read and write
2DCCED97000
heap
page read and write
2DCCF695000
heap
page read and write
2DCCD0B6000
heap
page read and write
2442C528000
heap
page read and write
2DCD1D69000
heap
page read and write
F0936FF000
stack
page read and write
1560156D000
heap
page read and write
21F3FE0A000
heap
page read and write
1B7725B0000
trusted library allocation
page read and write
2173D276000
heap
page read and write
2DCD02B0000
heap
page read and write
21F3FBF4000
heap
page read and write
1A01BBA0000
heap
page read and write
2DCD1E98000
heap
page read and write
23B784A3000
heap
page read and write
156033C0000
heap
page read and write
2DCCF030000
heap
page read and write
156014D4000
heap
page read and write
2DCCED74000
heap
page read and write
20950E77000
heap
page read and write
1E397700000
heap
page read and write
21F3FE14000
heap
page read and write
20AA8840000
heap
page read and write
2DCD160E000
heap
page read and write
2DCCF542000
heap
page read and write
2DCCF331000
heap
page read and write
2283C350000
heap
page read and write
21F3FC66000
heap
page read and write
2DCCF608000
heap
page read and write
2DCCD07C000
heap
page read and write
1FC75802000
heap
page read and write
DF419EE000
stack
page read and write
2DCD199A000
heap
page read and write
1FEF1413000
heap
page read and write
2DAEC747000
heap
page read and write
2173D2E9000
heap
page read and write
1FC7580B000
heap
page read and write
1DC9E1B9000
heap
page read and write
2DCCEF52000
heap
page read and write
2DCD13C0000
heap
page read and write
1FEF140F000
heap
page read and write
2173D2B1000
heap
page read and write
2DCD1D1F000
heap
page read and write
21A18F6A000
heap
page read and write
2DCCFEF3000
heap
page read and write
2DCCF6A4000
heap
page read and write
1DA60AC0000
heap
page read and write
2442BE5D000
heap
page read and write
2442DF20000
heap
page read and write
64A127E000
unkown
page readonly
21F3FE13000
heap
page read and write
2DCCEFAA000
heap
page read and write
2DCD129B000
heap
page read and write
27A92E30000
heap
page read and write
2DCD18ED000
heap
page read and write
2173D2D7000
heap
page read and write
A3526FF000
stack
page read and write
23B784AD000
heap
page read and write
2DCCEF8F000
heap
page read and write
20431929000
heap
page read and write
2DCD16F4000
heap
page read and write
14CF55BC000
heap
page read and write
2DCD19A6000
heap
page read and write
1829E406000
heap
page read and write
1FC75815000
heap
page read and write
20950E81000
heap
page read and write
27A92E0A000
heap
page read and write
A966DDA000
stack
page read and write
156014D4000
heap
page read and write
D041DFF000
unkown
page read and write
1FC75808000
heap
page read and write
1FEF0DE1000
heap
page read and write
2DCD1D69000
heap
page read and write
1FC75808000
heap
page read and write
23B784B3000
heap
page read and write
2442C51C000
heap
page read and write
15601B4C000
heap
page read and write
2DCCF6ED000
heap
page read and write
2173D210000
heap
page read and write
22694240000
heap
page read and write
1AF30B10000
heap
page read and write
21F3FC6F000
heap
page read and write
2173D300000
heap
page read and write
162B2615000
heap
page read and write
64A107E000
unkown
page readonly
1DA60304000
heap
page read and write
2173D2EE000
heap
page read and write
2DCCED97000
heap
page read and write
2DCD1D21000
heap
page read and write
1DC9DB96000
heap
page read and write
1FC757B0000
heap
page read and write
2DCCF53F000
heap
page read and write
157C00D0000
heap
page read and write
47C3FFE000
stack
page read and write
2DCCED5F000
heap
page read and write
23B784B3000
heap
page read and write
21F3FC4B000
heap
page read and write
7FF6E3A9F000
unkown
page write copy
2DCD2115000
heap
page read and write
22832F4A000
heap
page read and write
2DCD1934000
heap
page read and write
E2FABD9000
stack
page read and write
2DCD1DF7000
heap
page read and write
23B784A3000
heap
page read and write
21F3FE15000
heap
page read and write
2DCD0E49000
heap
page read and write
1FC75816000
heap
page read and write
1DC9DE4D000
heap
page read and write
E2FB3AE000
stack
page read and write
1B777A50000
trusted library allocation
page read and write
2173D2B2000
heap
page read and write
2DCCED6B000
heap
page read and write
2DCCEFED000
heap
page read and write
2DCD1FB0000
heap
page read and write
23B784A6000
heap
page read and write
2DCD1F60000
heap
page read and write
1F836B10000
heap
page read and write
F09377F000
stack
page read and write
2DCCEFA7000
heap
page read and write
1FEF0DC3000
heap
page read and write
2DCD0096000
heap
page read and write
1DC9E19F000
heap
page read and write
20950E00000
heap
page read and write
64A0CFE000
stack
page read and write
2106B560000
heap
page read and write
156014D4000
heap
page read and write
2DCD1F6D000
heap
page read and write
281E780F000
heap
page read and write
2DCD203F000
heap
page read and write
1AF608A9000
heap
page read and write
1A01BC60000
heap
page read and write
1DC9DAF0000
heap
page read and write
21F3FC66000
heap
page read and write
16B17E20000
heap
page read and write
1A01BEC5000
heap
page read and write
2DCCEF68000
heap
page read and write
2DCCECE5000
heap
page read and write
2DCCED44000
heap
page read and write
1DA602C2000
heap
page read and write
1DA60AE8000
heap
page read and write
2173D2FC000
heap
page read and write
1DA60327000
heap
page read and write
2DCD03E3000
heap
page read and write
21A18F37000
heap
page read and write
1FC7580D000
heap
page read and write
1DC9DB47000
heap
page read and write
21F3FC84000
heap
page read and write
2DCCED5F000
heap
page read and write
1DA60309000
heap
page read and write
1B772694000
heap
page read and write
1B7726FF000
heap
page read and write
1FEF0F5A000
heap
page read and write
1AF60A90000
heap
page read and write
2DCD061B000
heap
page read and write
15601B57000
heap
page read and write
2442C4E0000
heap
page read and write
2173D23E000
heap
page read and write
1F836B19000
heap
page read and write
B3A84FF000
unkown
page read and write
2DCCE918000
direct allocation
page read and write
1BDF3270000
heap
page read and write
2173D30E000
heap
page read and write
2442C4EA000
heap
page read and write
1DC9DB70000
heap
page read and write
20950D50000
heap
page read and write
1FC75808000
heap
page read and write
216B3C90000
heap
page read and write
1829E4F4000
heap
page read and write
1FC7580B000
heap
page read and write
1DC9FBB6000
heap
page read and write
2442BE54000
heap
page read and write
21F3FE13000
heap
page read and write
2173D2A6000
heap
page read and write
2DCCED1E000
heap
page read and write
7FF72AA70000
unkown
page readonly
2DCCF72E000
heap
page read and write
1FC75808000
heap
page read and write
21A18EA0000
heap
page read and write
21F3FC10000
heap
page read and write
23B784A3000
heap
page read and write
2442BE99000
heap
page read and write
2DCCF707000
heap
page read and write
A966DDE000
stack
page read and write
2938E376000
heap
page read and write
2DCD0850000
direct allocation
page read and write
2DCD204F000
heap
page read and write
14CF55CC000
heap
page read and write
2DCCF039000
heap
page read and write
162B23EE000
heap
page read and write
B6285E0000
stack
page read and write
1829E519000
heap
page read and write
2DCD2D00000
direct allocation
page read and write
2DCD1F4E000
heap
page read and write
1DC9DB96000
heap
page read and write
2442BD90000
heap
page read and write
21F3F1D5000
trusted library allocation
page read and write
23B784B3000
heap
page read and write
2DCD1150000
heap
page read and write
2442BFD0000
trusted library allocation
page read and write
2DCCFFEC000
heap
page read and write
15F0C730000
heap
page read and write
2DCCEF69000
heap
page read and write
1FC757FE000
heap
page read and write
2173D2EA000
heap
page read and write
2DCD0F20000
heap
page read and write
2DCCF075000
heap
page read and write
21F3FE19000
heap
page read and write
B53C5FF000
stack
page read and write
2DCD000C000
heap
page read and write
156014E3000
heap
page read and write
1B77267D000
heap
page read and write
1DA60313000
heap
page read and write
1829E5EE000
heap
page read and write
64A157A000
stack
page read and write
21F3FC12000
heap
page read and write
1B777A6E000
trusted library allocation
page read and write
2442BE90000
heap
page read and write
15601690000
heap
page read and write
156014EA000
heap
page read and write
23B784B4000
heap
page read and write
1B777CF9000
heap
page read and write
2DCD02FF000
heap
page read and write
2106B340000
heap
page read and write
2DCCED0A000
heap
page read and write
1829E5E3000
heap
page read and write
157C0170000
heap
page read and write
2442BDE0000
trusted library allocation
page read and write
23B784A3000
heap
page read and write
1560169D000
heap
page read and write
1FC75815000
heap
page read and write
2DCD18DC000
heap
page read and write
2DCCFF23000
heap
page read and write
1BDCB930000
heap
page read and write
D041CFC000
stack
page read and write
1DC9FBA2000
heap
page read and write
1B777AF1000
trusted library allocation
page read and write
2DCD0E5A000
heap
page read and write
16B17F00000
heap
page read and write
2DCCD0AC000
heap
page read and write
21F3FE08000
heap
page read and write
1FEF0DD3000
heap
page read and write
156015A0000
heap
page read and write
15601553000
heap
page read and write
1E3976F0000
heap
page read and write
2DCD1F66000
heap
page read and write
1DA60300000
heap
page read and write
23B784A7000
heap
page read and write
2173D27F000
heap
page read and write
2DCD1E98000
heap
page read and write
2DCCD07F000
heap
page read and write
AF7777F000
stack
page read and write
1DA6031A000
heap
page read and write
2173D302000
heap
page read and write
2173D250000
heap
page read and write
21F3FC6F000
heap
page read and write
2938E361000
heap
page read and write
2DCCD0A8000
heap
page read and write
1829E640000
heap
page read and write
2DCD00D9000
heap
page read and write
2DCD16E4000
heap
page read and write
2442BE47000
heap
page read and write
BCF23FF000
unkown
page read and write
1DA60AF1000
heap
page read and write
7FF72AAB3000
unkown
page readonly
2DCCF723000
heap
page read and write
1B7725C0000
trusted library section
page read and write
281E7770000
heap
page read and write
23B784A6000
heap
page read and write
15601B49000
heap
page read and write
2442C4E3000
heap
page read and write
1DC9FBA1000
heap
page read and write
1FC75808000
heap
page read and write
14CF559C000
heap
page read and write
15601B34000
heap
page read and write
1FC75808000
heap
page read and write
2DCCF0E0000
heap
page read and write
1DC9DB99000
heap
page read and write
1B777A60000
trusted library allocation
page read and write
1DA6236D000
heap
page read and write
299F7600000
heap
page read and write
2DAEC771000
heap
page read and write
2DCD17BE000
heap
page read and write
2DCD02F2000
heap
page read and write
1DC9DB65000
heap
page read and write
1829E419000
heap
page read and write
21F3FBF7000
heap
page read and write
BB8F0FF000
unkown
page read and write
2DCD0B58000
heap
page read and write
1A5F0BA0000
heap
page read and write
1829E401000
heap
page read and write
1DA60280000
trusted library allocation
page read and write
2DCCED20000
heap
page read and write
1DC9E2B2000
heap
page read and write
2442C4EE000
heap
page read and write
1DA6032F000
heap
page read and write
1DC9DB70000
heap
page read and write
1B777C60000
heap
page read and write
7FFDFAD92000
unkown
page execute and read and write
1DA60AD4000
heap
page read and write
2DCCF6FF000
heap
page read and write
169C3660000
heap
page read and write
1FEF1400000
heap
page read and write
2DCD1D1C000
heap
page read and write
2DCCEFAC000
heap
page read and write
2DCCED68000
heap
page read and write
2173D2FC000
heap
page read and write
2938E3A8000
heap
page read and write
21451050000
heap
page read and write
2DCCFF23000
heap
page read and write
2DCD1F88000
heap
page read and write
2DCD203F000
heap
page read and write
2173EB61000
heap
page read and write
2DCD000B000
heap
page read and write
1DA60AF1000
heap
page read and write
2DCCEDBA000
heap
page read and write
156014E4000
heap
page read and write
2DCD137B000
heap
page read and write
22694180000
heap
page read and write
2938E398000
heap
page read and write
2173D303000
heap
page read and write
27A92E20000
heap
page read and write
21F3FE19000
heap
page read and write
14CF5597000
heap
page read and write
2DCCEDBE000
heap
page read and write
21F3FC02000
heap
page read and write
2DCCF60B000
heap
page read and write
1DC9DD00000
heap
page read and write
2DCCFF59000
heap
page read and write
21F3FC6F000
heap
page read and write
2C14D620000
heap
page read and write
2DCD000B000
heap
page read and write
2DCD1A04000
heap
page read and write
2173D2B9000
heap
page read and write
1829E3F0000
heap
page read and write
1829E401000
heap
page read and write
64A057E000
unkown
page readonly
B6285DA000
stack
page read and write
2DCCFF62000
heap
page read and write
1FC7580D000
heap
page read and write
2DCCEF66000
heap
page read and write
1DC9DB97000
heap
page read and write
1DC9E190000
heap
page read and write
2DCCD0A8000
heap
page read and write
64A017E000
unkown
page readonly
1DA60AED000
heap
page read and write
1DF79D00000
heap
page read and write
22832F51000
heap
page read and write
2DCCF608000
heap
page read and write
23B78480000
heap
page read and write
2DCD1DAA000
heap
page read and write
1DC9DB74000
heap
page read and write
2DCCEF6B000
heap
page read and write
1DC9DBA6000
heap
page read and write
1B137790000
heap
page read and write
1829E5EA000
heap
page read and write
14CF559C000
heap
page read and write
1BDCB838000
heap
page read and write
35C2F5E000
stack
page read and write
1FEF0C10000
heap
page read and write
1829E419000
heap
page read and write
2DCD03CC000
heap
page read and write
2938E374000
heap
page read and write
64A027B000
stack
page read and write
2DCD1402000
heap
page read and write
1B137A45000
heap
page read and write
2DCCEFA7000
heap
page read and write
1829E370000
heap
page read and write
21F3FE06000
heap
page read and write
2DAEC76B000
heap
page read and write
7FF72AA9C000
unkown
page readonly
1FEF0D80000
heap
page read and write
2C6F9AC000
stack
page read and write
1FEF1429000
heap
page read and write
2442BE39000
heap
page read and write
15F0C5E0000
heap
page read and write
7FF72AAAF000
unkown
page write copy
2DCD2040000
heap
page read and write
14CF55C0000
heap
page read and write
FD1017E000
stack
page read and write
2DCCFF58000
heap
page read and write
1FC75802000
heap
page read and write
2DCCFF67000
heap
page read and write
2DCCF728000
heap
page read and write
2938EA40000
heap
page read and write
2938E41A000
heap
page read and write
2106B660000
heap
page read and write
2DCD1E4C000
heap
page read and write
2DCCED97000
heap
page read and write
156033D4000
heap
page read and write
4B55DFF000
stack
page read and write
E2FADDE000
stack
page read and write
2DCCEF1D000
heap
page read and write
2173D2A5000
heap
page read and write
1829E3C7000
heap
page read and write
1DA60545000
heap
page read and write
2DCD037B000
heap
page read and write
1B772F1A000
heap
page read and write
2DCD180A000
heap
page read and write
B6287DF000
stack
page read and write
266A3CF000
stack
page read and write
2DCD1F60000
heap
page read and write
1B777A80000
trusted library allocation
page read and write
2DCD1F60000
heap
page read and write
299F7400000
heap
page read and write
15F0C652000
heap
page read and write
2DCD2007000
heap
page read and write
1DF79D82000
heap
page read and write
1B777B67000
trusted library allocation
page read and write
1B777B7A000
trusted library allocation
page read and write
1B772628000
heap
page read and write
2DCCEF56000
heap
page read and write
22833100000
heap
page read and write
2442BE79000
heap
page read and write
23B784B0000
heap
page read and write
1DA60316000
heap
page read and write
2173D261000
heap
page read and write
21F3FC5E000
heap
page read and write
2DCCED97000
heap
page read and write
156014E0000
heap
page read and write
1829E416000
heap
page read and write
2DAEC758000
heap
page read and write
E52C3EE000
stack
page read and write
2DCCF608000
heap
page read and write
1DC9E198000
heap
page read and write
739155D000
stack
page read and write
2DCCCFD5000
heap
page read and write
2DCD137B000
heap
page read and write
1FEF0DDA000
heap
page read and write
2DCD1DF7000
heap
page read and write
23B78488000
heap
page read and write
2173D2BD000
heap
page read and write
1DC9E2B7000
heap
page read and write
1FEF0DF7000
heap
page read and write
15601497000
heap
page read and write
2442BE09000
heap
page read and write
2DCD18F3000
heap
page read and write
1829E42E000
heap
page read and write
1FEF140C000
heap
page read and write
2DCD18DC000
heap
page read and write
162B23F6000
heap
page read and write
2DCCF709000
heap
page read and write
1DC9DB9E000
heap
page read and write
1DC9DB85000
heap
page read and write
15601B34000
heap
page read and write
2DCCF085000
heap
page read and write
2413AAB0000
heap
page read and write
60173E8000
stack
page read and write
2DCCF030000
heap
page read and write
1DC9DE45000
heap
page read and write
1AF30B30000
heap
page read and write
2DCD1F45000
heap
page read and write
2173D2AE000
heap
page read and write
1829E3E6000
heap
page read and write
1FEF2D83000
heap
page read and write
649FD77000
stack
page read and write
2938E6F5000
heap
page read and write
1DC9DB30000
heap
page read and write
21F3FE19000
heap
page read and write
1BDCB805000
heap
page read and write
24A66180000
heap
page read and write
1829E4FB000
heap
page read and write
1FEF0DF7000
heap
page read and write
2DCCED17000
heap
page read and write
14CF5596000
heap
page read and write
1B777E00000
remote allocation
page read and write
1DC9DB68000
heap
page read and write
1DC9DB9C000
heap
page read and write
1829E509000
heap
page read and write
1DA60320000
heap
page read and write
2DCD0379000
heap
page read and write
2442C4F9000
heap
page read and write
1B1377C9000
heap
page read and write
2173D2CD000
heap
page read and write
1829E5E7000
heap
page read and write
216B3C90000
heap
page read and write
2674931A000
heap
page read and write
1FEF0F5B000
heap
page read and write
2DCCF692000
heap
page read and write
28C82FF000
stack
page read and write
21A18F62000
heap
page read and write
2DCD1CE7000
heap
page read and write
1B777B40000
trusted library allocation
page read and write
2DCCF5E5000
heap
page read and write
2DCD2043000
heap
page read and write
2442C4FC000
heap
page read and write
1AF30BB1000
heap
page read and write
2DCCFE80000
heap
page read and write
1FEF2D95000
heap
page read and write
2442BE32000
heap
page read and write
2DCCF01C000
heap
page read and write
23B784A6000
heap
page read and write
21A18F92000
heap
page read and write
3E4D5FF000
stack
page read and write
23B784A6000
heap
page read and write
156033D4000
heap
page read and write
1DA6054A000
heap
page read and write
2442BE58000
heap
page read and write
2DCCED65000
heap
page read and write
2DCD19AC000
heap
page read and write
2173D25F000
heap
page read and write
1B777AA4000
trusted library allocation
page read and write
162B23CC000
heap
page read and write
2442C4FE000
heap
page read and write
1FEF0DD6000
heap
page read and write
22832F00000
heap
page read and write
2269424F000
heap
page read and write
23B784A7000
heap
page read and write
2DCCF004000
heap
page read and write
1FEF0DE2000
heap
page read and write
2173D2E9000
heap
page read and write
2DCCEFC8000
heap
page read and write
2DCCEFB0000
heap
page read and write
1DA60AD4000
heap
page read and write
2DCD18EF000
heap
page read and write
216B3C7B000
heap
page read and write
2DCD0DF4000
heap
page read and write
2DCD1E4C000
heap
page read and write
64A007E000
stack
page read and write
2413ABD0000
heap
page read and write
2DCCF5DC000
heap
page read and write
BCF22FC000
stack
page read and write
1DA60312000
heap
page read and write
2DCD03DF000
heap
page read and write
2DCD0A51000
heap
page read and write
DD80FDC000
stack
page read and write
2173D2F8000
heap
page read and write
2DCCED40000
heap
page read and write
231B2A20000
heap
page read and write
2DCCED2B000
heap
page read and write
1FC75802000
heap
page read and write
2442BE6C000
heap
page read and write
1F24BC60000
heap
page read and write
2DCD137B000
heap
page read and write
1FC75808000
heap
page read and write
2442BE35000
heap
page read and write
2442BE46000
heap
page read and write
2442BE64000
heap
page read and write
2DCD18ED000
heap
page read and write
2DCCD0DA000
heap
page read and write
21F3FE13000
heap
page read and write
15601497000
heap
page read and write
1DF79D6A000
heap
page read and write
5A2EB5E000
stack
page read and write
2DCD179E000
heap
page read and write
1FEF0CF0000
heap
page read and write
156015AB000
heap
page read and write
156014DC000
heap
page read and write
21F3FC14000
heap
page read and write
2DCCFEF3000
heap
page read and write
2442BDC0000
heap
page read and write
1829E408000
heap
page read and write
1DC9E1C9000
heap
page read and write
2DCD0627000
heap
page read and write
2DCCEFAB000
heap
page read and write
1DA60AE8000
heap
page read and write
2442BE33000
heap
page read and write
1DC9E1A4000
heap
page read and write
FD100FE000
stack
page read and write
156033CE000
heap
page read and write
157C0169000
heap
page read and write
1829E5EE000
heap
page read and write
2DCCFEF4000
heap
page read and write
1FEF142C000
heap
page read and write
23B784A6000
heap
page read and write
1B777ACC000
trusted library allocation
page read and write
2DCCD00E000
heap
page read and write
2DCD0098000
heap
page read and write
2DCCED1C000
heap
page read and write
2DCD1A15000
heap
page read and write
2DCCFEB7000
heap
page read and write
15601503000
heap
page read and write
1DC9DB9A000
heap
page read and write
23B784AD000
heap
page read and write
2DCCEFC9000
heap
page read and write
2DCD1F80000
heap
page read and write
1829E403000
heap
page read and write
2DCCF06E000
heap
page read and write
156014D4000
heap
page read and write
169C3670000
heap
page read and write
1829E509000
heap
page read and write
7FF72AA70000
unkown
page readonly
1FEF0E01000
heap
page read and write
2DCCF093000
heap
page read and write
21A18F7D000
heap
page read and write
2173D2BD000
heap
page read and write
7FF72AA71000
unkown
page execute read
1829E509000
heap
page read and write
7FFDFA700000
unkown
page readonly
2DCD1DF7000
heap
page read and write
182A0296000
heap
page read and write
1A01BC60000
heap
page read and write
21F3FC76000
heap
page read and write
2173D300000
heap
page read and write
2DCD0B16000
heap
page read and write
2442C502000
heap
page read and write
2DCD0005000
heap
page read and write
7FF72AAAF000
unkown
page read and write
1FC75808000
heap
page read and write
2173D250000
heap
page read and write
2DAEC771000
heap
page read and write
2106B3B1000
heap
page read and write
1DF79D82000
heap
page read and write
1829E3B0000
heap
page read and write
2DCD0596000
heap
page read and write
20431850000
heap
page read and write
2DCD19F4000
heap
page read and write
64A047B000
stack
page read and write
2DCD1370000
heap
page read and write
2442C51A000
heap
page read and write
204536B8000
heap
page read and write
2DCCF718000
heap
page read and write
2DCCF5FC000
heap
page read and write
1DC9DB96000
heap
page read and write
2DCCED54000
heap
page read and write
21F3FC84000
heap
page read and write
1DC9DE4E000
heap
page read and write
1BA66650000
heap
page read and write
156014DA000
heap
page read and write
156014D9000
heap
page read and write
2DCD0005000
heap
page read and write
1829E421000
heap
page read and write
2DCD1215000
heap
page read and write
1FEF0DF0000
heap
page read and write
2442BE41000
heap
page read and write
2DCD1F4E000
heap
page read and write
1DA60ADE000
heap
page read and write
64A07FE000
stack
page read and write
2442DDC5000
heap
page read and write
182A0290000
heap
page read and write
20950E52000
heap
page read and write
64A0DFE000
stack
page read and write
1FEF0DD6000
heap
page read and write
7A8A58D000
stack
page read and write
1829E645000
heap
page read and write
2DCCEFE8000
heap
page read and write
1DC9E2BA000
heap
page read and write
1FC75805000
heap
page read and write
2442BE90000
heap
page read and write
2887F435000
heap
page read and write
1DC9DB89000
heap
page read and write
2DCD1D27000
heap
page read and write
2DCD1329000
heap
page read and write
1829E416000
heap
page read and write
15601B3F000
heap
page read and write
2442BDE0000
trusted library allocation
page read and write
1B7724A0000
heap
page read and write
2173D340000
trusted library allocation
page read and write
2DCCEDD2000
heap
page read and write
2DCD0097000
heap
page read and write
1FEF0F57000
heap
page read and write
1DA60304000
heap
page read and write
1DA60AD0000
heap
page read and write
23B784B4000
heap
page read and write
21F3FC83000
heap
page read and write
2DCD1038000
heap
page read and write
2DCCD08F000
heap
page read and write
1FEF0D30000
trusted library allocation
page read and write
1C83CFF000
stack
page read and write
20AA85F5000
heap
page read and write
15601580000
trusted library allocation
page read and write
1B777B48000
trusted library allocation
page read and write
2173D262000
heap
page read and write
2DCD000C000
heap
page read and write
20950E59000
heap
page read and write
1829E4B0000
trusted library allocation
page read and write
1AF30B9A000
heap
page read and write
2173D2B2000
heap
page read and write
2DCD0E02000
heap
page read and write
156015AA000
heap
page read and write
2DCCFAC0000
direct allocation
page read and write
2DCD1CE7000
heap
page read and write
1DC9E1A5000
heap
page read and write
2DCCF990000
direct allocation
page read and write
64A0D7E000
unkown
page readonly
2DCCF0BE000
heap
page read and write
2DCD18BD000
heap
page read and write
2DCD0379000
heap
page read and write
2938E290000
heap
page read and write
B53C6FE000
stack
page read and write
1FEF0DD6000
heap
page read and write
2DCD1D1F000
heap
page read and write
2DCD1692000
heap
page read and write
1A5F0C27000
heap
page read and write
2DCCD0AC000
heap
page read and write
21F3FC1B000
heap
page read and write
2DCCEF8B000
heap
page read and write
1DA60AD7000
heap
page read and write
21F3FC4B000
heap
page read and write
1829E418000
heap
page read and write
2173D2F5000
heap
page read and write
2173D2FA000
heap
page read and write
2173EC5D000
heap
page read and write
B6289CF000
stack
page read and write
23B784A7000
heap
page read and write
2DCD13C0000
heap
page read and write
4B55CFB000
stack
page read and write
1DF9C4F0000
heap
page read and write
1B772F00000
heap
page read and write
23B784A6000
heap
page read and write
1DC9E2BE000
heap
page read and write
2938E376000
heap
page read and write
15601558000
heap
page read and write
2887F110000
heap
page read and write
1DC9E1AB000
heap
page read and write
2DCD11D4000
heap
page read and write
1F24BE47000
heap
page read and write
2DCCD0B8000
heap
page read and write
15601B4D000
heap
page read and write
156033D4000
heap
page read and write
22694340000
heap
page read and write
E52C67F000
stack
page read and write
1B772F02000
heap
page read and write
2DCD0E9C000
heap
page read and write
2DCCED75000
heap
page read and write
2DCD0DF5000
heap
page read and write
1DC9FBA6000
heap
page read and write
2173D2EB000
heap
page read and write
2DCD1E73000
heap
page read and write
21A18EC0000
heap
page read and write
21F3F3F0000
trusted library allocation
page read and write
3E4D67E000
stack
page read and write
1A5F0BC0000
heap
page read and write
23B784A3000
heap
page read and write
2DCCED34000
heap
page read and write
73919FF000
stack
page read and write
2DCD1F7E000
heap
page read and write
2442C4EA000
heap
page read and write
2DCD2CF0000
direct allocation
page read and write
21A18F57000
heap
page read and write
19ABCF40000
heap
page read and write
21F3FE15000
heap
page read and write
1FEF0DD6000
heap
page read and write
21F3F100000
heap
page read and write
21451040000
heap
page read and write
1DA602C7000
heap
page read and write
15601B49000
heap
page read and write
1B1377DC000
heap
page read and write
1829E3E9000
heap
page read and write
1FC7580D000
heap
page read and write
2DCD1650000
heap
page read and write
1B777B1A000
trusted library allocation
page read and write
23B784A4000
heap
page read and write
156033CE000
heap
page read and write
1B772480000
heap
page read and write
1B777B22000
trusted library allocation
page read and write
2DCCF102000
heap
page read and write
2DCCFE30000
heap
page read and write
1B777D02000
heap
page read and write
2DCD0313000
heap
page read and write
2938E3B9000
heap
page read and write
2DCCF609000
heap
page read and write
1B777E00000
remote allocation
page read and write
2DCD0E58000
heap
page read and write
1829E423000
heap
page read and write
21E30970000
heap
page read and write
2442C506000
heap
page read and write
A9FE1BD000
stack
page read and write
156014B5000
heap
page read and write
1FEF1429000
heap
page read and write
2DCCD080000
heap
page read and write
156014C3000
heap
page read and write
1FEF1417000
heap
page read and write
162B23F6000
heap
page read and write
1DC9FBAE000
heap
page read and write
2DCD18ED000
heap
page read and write
1DC9DB98000
heap
page read and write
2DCCFE6A000
heap
page read and write
1FEF0DE1000
heap
page read and write
2DCD0B58000
heap
page read and write
14CF58E5000
heap
page read and write
162B23FA000
heap
page read and write
156033C1000
heap
page read and write
14CF55BD000
heap
page read and write
1DC9DB8E000
heap
page read and write
2173EB61000
heap
page read and write
2938E387000
heap
page read and write
2442C507000
heap
page read and write
21F3FC9E000
heap
page read and write
F09387F000
stack
page read and write
2DCD1507000
heap
page read and write
2DCD062A000
heap
page read and write
2442DDB7000
heap
page read and write
2173D330000
trusted library allocation
page read and write
15601B49000
heap
page read and write
1829E4EC000
heap
page read and write
21F3FE13000
heap
page read and write
1829E4F1000
heap
page read and write
1B777B5F000
trusted library allocation
page read and write
1B137740000
heap
page read and write
1829E4E0000
heap
page read and write
21A18F78000
heap
page read and write
2DCCED0F000
heap
page read and write
2DCD2114000
heap
page read and write
1DC9DB60000
heap
page read and write
156033CD000
heap
page read and write
64A147E000
unkown
page readonly
21F3FC5E000
heap
page read and write
2442DDBF000
heap
page read and write
2DCCED94000
heap
page read and write
2DCD1F50000
heap
page read and write
2DCD125A000
heap
page read and write
2413AD05000
heap
page read and write
F38A8FF000
stack
page read and write
7A8A97E000
stack
page read and write
7FF6E3A61000
unkown
page execute read
2442C51A000
heap
page read and write
2DCCEF8C000
heap
page read and write
156014DA000
heap
page read and write
2DCCF041000
heap
page read and write
2DCCED2C000
heap
page read and write
1B772613000
heap
page read and write
2DCD062A000
heap
page read and write
2DCD0E9C000
heap
page read and write
2DCCEFA2000
heap
page read and write
2442C4E4000
heap
page read and write
47C3CFE000
stack
page read and write
2938E2C0000
heap
page read and write
2DCD0355000
heap
page read and write
14CF55CC000
heap
page read and write
2DCCF085000
heap
page read and write
1FEF2D87000
heap
page read and write
15601553000
heap
page read and write
1B773470000
trusted library section
page readonly
1DC9DB20000
trusted library allocation
page read and write
2442C4E7000
heap
page read and write
2173D2B9000
heap
page read and write
21F3FC76000
heap
page read and write
2DCCF063000
heap
page read and write
2DCCEF19000
heap
page read and write
2DCCF695000
heap
page read and write
169C3675000
heap
page read and write
21A18DC0000
heap
page read and write
1DF9C130000
heap
page read and write
1DC9DBA3000
heap
page read and write
2173D2C6000
heap
page read and write
21F3FC6A000
heap
page read and write
2173D1D0000
heap
page read and write
E2FAFCD000
stack
page read and write
1AF60BD0000
heap
page read and write
2442BE80000
heap
page read and write
1B772713000
heap
page read and write
4AF9EDB000
stack
page read and write
14CF58E0000
heap
page read and write
15F0C63A000
heap
page read and write
2DCCF52C000
heap
page read and write
2DCCF870000
direct allocation
page read and write
2DCD19F4000
heap
page read and write
20AA8670000
heap
page read and write
2442C523000
heap
page read and write
1DA60543000
heap
page read and write
1DA602B9000
heap
page read and write
2DCD199A000
heap
page read and write
1FEF1430000
heap
page read and write
1B777ACF000
trusted library allocation
page read and write
2442DDB3000
heap
page read and write
1829E401000
heap
page read and write
1FEF141E000
heap
page read and write
1DC9E2B7000
heap
page read and write
19ABCFC8000
heap
page read and write
FFFEF1B000
stack
page read and write
1FC75802000
heap
page read and write
2938E387000
heap
page read and write
1829E3C7000
heap
page read and write
1FC757E0000
heap
page read and write
2DCD2CF0000
direct allocation
page read and write
1829E42E000
heap
page read and write
2DCD129B000
heap
page read and write
2DCD079C000
direct allocation
page read and write
2DCCF0FF000
heap
page read and write
2173D2F6000
heap
page read and write
1FEF2D8E000
heap
page read and write
2173D2EB000
heap
page read and write
2173D30A000
heap
page read and write
1829E403000
heap
page read and write
19ABCFE5000
heap
page read and write
1829E416000
heap
page read and write
1B772E00000
heap
page read and write
2DCCEF4D000
heap
page read and write
2938E3B9000
heap
page read and write
85FB0FF000
unkown
page read and write
20950E7B000
heap
page read and write
22832F51000
heap
page read and write
2DCD0A93000
heap
page read and write
2DCD12E5000
heap
page read and write
2DCCF5F8000
heap
page read and write
2442BE5C000
heap
page read and write
21A18F57000
heap
page read and write
2442BE54000
heap
page read and write
15601B49000
heap
page read and write
1FEF0F52000
heap
page read and write
2DCD1F70000
heap
page read and write
1DC9DB62000
heap
page read and write
23B784A9000
heap
page read and write
14CF55A8000
heap
page read and write
23B784A3000
heap
page read and write
2DCD16F4000
heap
page read and write
21F3FC10000
heap
page read and write
21A18F62000
heap
page read and write
2DCCED20000
heap
page read and write
1AF30BB1000
heap
page read and write
1AF608A0000
heap
page read and write
2DCCF706000
heap
page read and write
21E305D0000
heap
page read and write
1DC9FBB4000
heap
page read and write
E6F87E000
stack
page read and write
14CF55BC000
heap
page read and write
1B777B45000
trusted library allocation
page read and write
1829E390000
trusted library allocation
page read and write
156014E2000
heap
page read and write
4B5617F000
stack
page read and write
2DCD200D000
heap
page read and write
2106B330000
heap
page read and write
2DAEC757000
heap
page read and write
2DCCF67C000
heap
page read and write
A352338000
stack
page read and write
1DF9C2D8000
heap
page read and write
21A19100000
heap
page read and write
21F40250000
heap
page read and write
2173D276000
heap
page read and write
1B777AD2000
trusted library allocation
page read and write
1FC77180000
heap
page read and write
1829E512000
heap
page read and write
2DCD000B000
heap
page read and write
15601B28000
heap
page read and write
2173EC54000
heap
page read and write
1B777C1E000
heap
page read and write
14CF55C4000
heap
page read and write
2413ABB0000
heap
page read and write
2442BE74000
heap
page read and write
1FC75815000
heap
page read and write
1560169E000
heap
page read and write
2DCD2D00000
direct allocation
page read and write
2DCD1CA5000
heap
page read and write
1829E3C2000
heap
page read and write
2DCD1A15000
heap
page read and write
2DCD0C1C000
heap
page read and write
1FC75808000
heap
page read and write
2DCCFFF0000
heap
page read and write
2DCD0303000
heap
page read and write
21F3FE13000
heap
page read and write
2DCCED36000
heap
page read and write
21F3FE19000
heap
page read and write
15601B56000
heap
page read and write
2DCCEDBB000
heap
page read and write
2DCD0CE2000
heap
page read and write
1DF79D82000
heap
page read and write
23B784B3000
heap
page read and write
2DCCED75000
heap
page read and write
2DCD187B000
heap
page read and write
1DA60480000
trusted library allocation
page read and write
2DCD01A5000
heap
page read and write
1FC7580B000
heap
page read and write
21A18F7D000
heap
page read and write
1DC9DB42000
heap
page read and write
2DCD18ED000
heap
page read and write
156014FC000
heap
page read and write
2DCD0512000
heap
page read and write
2DCCF02C000
heap
page read and write
2442BE65000
heap
page read and write
23B784A9000
heap
page read and write
14CF55A6000
heap
page read and write
162B25A0000
heap
page read and write
27A92E00000
heap
page read and write
20950C70000
heap
page read and write
2DCCF5B8000
heap
page read and write
2DCCF71D000
heap
page read and write
1FEF0DB6000
heap
page read and write
21F3FC76000
heap
page read and write
2DCCEF90000
heap
page read and write
2DCCFF23000
heap
page read and write
2DCD01EA000
heap
page read and write
2938E3C9000
heap
page read and write
21F3F1F0000
heap
page read and write
601777F000
stack
page read and write
2DCD0FA4000
heap
page read and write
649FE7E000
unkown
page readonly
2DCCEFC3000
heap
page read and write
1829E64B000
heap
page read and write
1B777C8C000
heap
page read and write
1FC7580F000
heap
page read and write
2DAEC76B000
heap
page read and write
24A66187000
heap
page read and write
2DCCEF81000
heap
page read and write
2DCD1E8E000
heap
page read and write
2DCD022C000
heap
page read and write
81FD31B000
stack
page read and write
20AA8691000
heap
page read and write
1FEF0D97000
heap
page read and write
1DC9E1A7000
heap
page read and write
156014B5000
heap
page read and write
2DCD07D4000
direct allocation
page read and write
3E4D1C7000
stack
page read and write
2DCCED09000
heap
page read and write
15601B2F000
heap
page read and write
1829E3B9000
heap
page read and write
21F3FC0B000
heap
page read and write
B53C67F000
stack
page read and write
1FEF2D82000
heap
page read and write
2DCD204F000
heap
page read and write
1DC9E19C000
heap
page read and write
2DCD0A92000
heap
page read and write
2DCD1F6D000
heap
page read and write
1C83C7E000
stack
page read and write
2DCCEFDA000
heap
page read and write
2106B39A000
heap
page read and write
1DC9DBA9000
heap
page read and write
1829E406000
heap
page read and write
2DCCED9A000
heap
page read and write
1B777AAD000
trusted library allocation
page read and write
1FEF0DD3000
heap
page read and write
21F3FE0D000
heap
page read and write
F38A87C000
stack
page read and write
156014DF000
heap
page read and write
1FC75808000
heap
page read and write
2DCD158A000
heap
page read and write
2DCD1A04000
heap
page read and write
1A01BC60000
heap
page read and write
1DF79D60000
heap
page read and write
2DCD0305000
heap
page read and write
7FF72AA71000
unkown
page execute read
2DCD1F56000
heap
page read and write
2DCD02B0000
heap
page read and write
2DCD1218000
heap
page read and write
2DCCFFE7000
heap
page read and write
2DCCF110000
direct allocation
page read and write
2DCD1E4C000
heap
page read and write
73918FF000
unkown
page read and write
1DC9E1B9000
heap
page read and write
15601580000
trusted library allocation
page read and write
1B773460000
trusted library section
page readonly
DD813FF000
stack
page read and write
156014DC000
heap
page read and write
21451335000
heap
page read and write
2DAEC77C000
heap
page read and write
1BDF3170000
heap
page read and write
2283C527000
heap
page read and write
1FEF0DBF000
heap
page read and write
1DA6031B000
heap
page read and write
363E97E000
stack
page read and write
2DCCF0DA000
heap
page read and write
1CCFB760000
heap
page read and write
156015A3000
heap
page read and write
2442BE60000
heap
page read and write
2DCCED6B000
heap
page read and write
2DCCD09B000
heap
page read and write
2DCD1A15000
heap
page read and write
2DCD1F60000
heap
page read and write
1FEF0F5A000
heap
page read and write
15601580000
trusted library allocation
page read and write
231B2B50000
heap
page read and write
156014D1000
heap
page read and write
2173D396000
heap
page read and write
1DC9E1AB000
heap
page read and write
2DCD2047000
heap
page read and write
1829E4F4000
heap
page read and write
2DCD1F6D000
heap
page read and write
1FEF1432000
heap
page read and write
1DC9E2B4000
heap
page read and write
2DCD13C0000
heap
page read and write
22832F51000
heap
page read and write
1DF79D82000
heap
page read and write
2DCD204F000
heap
page read and write
2DCD19AE000
heap
page read and write
2938EA70000
heap
page read and write
22832F3B000
heap
page read and write
12B3F0E000
stack
page read and write
21F3FE0F000
heap
page read and write
1FC75808000
heap
page read and write
228331B5000
heap
page read and write
7FF72AAB1000
unkown
page read and write
1FEF1429000
heap
page read and write
216B3C70000
heap
page read and write
1FC7580D000
heap
page read and write
1FEF2D81000
heap
page read and write
2442C510000
heap
page read and write
2DCCF0F6000
heap
page read and write
FFFF27F000
stack
page read and write
1DA60316000
heap
page read and write
731A4DC000
stack
page read and write
DF418ED000
stack
page read and write
2DCD1044000
heap
page read and write
2442BE7F000
heap
page read and write
26749595000
heap
page read and write
3E4D4FF000
stack
page read and write
2DCCED67000
heap
page read and write
2DCCEF90000
heap
page read and write
2DCCFF67000
heap
page read and write
2DCD137B000
heap
page read and write
1F836CF0000
heap
page read and write
2173D2AE000
heap
page read and write
1E397521000
heap
page read and write
1DC9DB88000
heap
page read and write
2173D2D2000
heap
page read and write
1DA60480000
trusted library allocation
page read and write
23B784A3000
heap
page read and write
23B784A6000
heap
page read and write
1DA60307000
heap
page read and write
21E305DA000
heap
page read and write
21A18F84000
heap
page read and write
1BDCB850000
heap
page read and write
21F3FE05000
heap
page read and write
2DCD1F7E000
heap
page read and write
23B784AB000
heap
page read and write
1FC7580D000
heap
page read and write
2DCCED18000
heap
page read and write
6A707FF000
stack
page read and write
15601B49000
heap
page read and write
2DCCF46B000
heap
page read and write
2DCD0E58000
heap
page read and write
2442BE5C000
heap
page read and write
182A0291000
heap
page read and write
2938E3E9000
heap
page read and write
2442C51A000
heap
page read and write
1DC9DBAE000
heap
page read and write
1B777CC0000
heap
page read and write
2DCD1934000
heap
page read and write
2DCCED68000
heap
page read and write
1DC9DB66000
heap
page read and write
2173D2E0000
heap
page read and write
21F3F1F4000
heap
page read and write
2DCCFF2E000
heap
page read and write
2DCCED97000
heap
page read and write
21F3FC68000
heap
page read and write
1B777B30000
trusted library allocation
page read and write
1DC9E1A8000
heap
page read and write
2DCCED15000
heap
page read and write
1829E411000
heap
page read and write
2DCCFEB4000
heap
page read and write
21F3FC84000
heap
page read and write
A5E297E000
stack
page read and write
1DA60305000
heap
page read and write
2DCD0DFE000
heap
page read and write
2DCCED92000
heap
page read and write
2887F0F0000
heap
page read and write
1FEF0DC3000
heap
page read and write
15601564000
heap
page read and write
21A18F5D000
heap
page read and write
2442BE54000
heap
page read and write
1CCFB74A000
heap
page read and write
2DCD17C9000
heap
page read and write
2C14D820000
heap
page read and write
2DCD1C20000
heap
page read and write
15601529000
heap
page read and write
1DA6054E000
heap
page read and write
1BA66655000
heap
page read and write
22832F10000
heap
page read and write
2DCCFFF2000
heap
page read and write
281E77F0000
heap
page read and write
1FEF141E000
heap
page read and write
47C444F000
stack
page read and write
2DCD103F000
heap
page read and write
2DCCF023000
heap
page read and write
363E87D000
stack
page read and write
2DCCD0B1000
heap
page read and write
1829E3F0000
heap
page read and write
1B777B00000
trusted library allocation
page read and write
35C32FF000
stack
page read and write
6EE3CFF000
stack
page read and write
2DCD1D21000
heap
page read and write
15601542000
heap
page read and write
1DA602E7000
heap
page read and write
21A18F7D000
heap
page read and write
28C7FBD000
stack
page read and write
1CCFB840000
heap
page read and write
2DCCED36000
heap
page read and write
2DCCEDE0000
unkown
page readonly
2DCD0FE6000
heap
page read and write
2DCCFEB3000
heap
page read and write
4AFA2FE000
stack
page read and write
2DCCF083000
heap
page read and write
1B777C0E000
heap
page read and write
2DCD1A04000
heap
page read and write
1DA60323000
heap
page read and write
2DCD02F2000
heap
page read and write
23B784A6000
heap
page read and write
2DCD0CA0000
heap
page read and write
64A087E000
unkown
page readonly
2DCCED66000
heap
page read and write
2DCCD0A5000
heap
page read and write
2442BDA0000
heap
page read and write
2DCD1F4E000
heap
page read and write
FD1007C000
stack
page read and write
1F836DA5000
heap
page read and write
15601B3F000
heap
page read and write
1CCFB758000
heap
page read and write
2DCD1D21000
heap
page read and write
156014B5000
heap
page read and write
2DCD0513000
heap
page read and write
1829E517000
heap
page read and write
2442BE57000
heap
page read and write
1DA6236D000
heap
page read and write
2DCD1259000
heap
page read and write
15F0C649000
heap
page read and write
162B23DB000
heap
page read and write
2DCCD0B8000
heap
page read and write
156014B8000
heap
page read and write
4B5607E000
stack
page read and write
2173D2B4000
heap
page read and write
23B784A9000
heap
page read and write
2DCCE990000
direct allocation
page read and write
1DF9C230000
heap
page read and write
2DCCEF89000
heap
page read and write
156033C3000
heap
page read and write
24A6618B000
heap
page read and write
2173D30E000
heap
page read and write
1B1377B5000
heap
page read and write
2173D2A7000
heap
page read and write
1DA60AEB000
heap
page read and write
1560150C000
heap
page read and write
1FC75802000
heap
page read and write
1DC9E1B9000
heap
page read and write
15F0C652000
heap
page read and write
19ABCF60000
heap
page read and write
2DCCED81000
heap
page read and write
2173D276000
heap
page read and write
1829E270000
heap
page read and write
1829E4E8000
heap
page read and write
2DCD1F4E000
heap
page read and write
15601514000
heap
page read and write
2DCD2047000
heap
page read and write
1DC9DB00000
heap
page read and write
23D347E000
stack
page read and write
1829E4E7000
heap
page read and write
1B777E00000
remote allocation
page read and write
21A18F92000
heap
page read and write
60E9A7E000
stack
page read and write
1FC75808000
heap
page read and write
2938E398000
heap
page read and write
2C14DA05000
heap
page read and write
2DCCED2B000
heap
page read and write
2DCD18DC000
heap
page read and write
BCF24FF000
stack
page read and write
1A01BC60000
heap
page read and write
182A029D000
heap
page read and write
7FF72AA9C000
unkown
page readonly
7A8A507000
stack
page read and write
1FC75816000
heap
page read and write
65047FF000
stack
page read and write
2DCD03DC000
heap
page read and write
162B23FA000
heap
page read and write
2DCCF608000
heap
page read and write
2DCD000C000
heap
page read and write
14CF55AA000
heap
page read and write
15601555000
heap
page read and write
1CCFB610000
heap
page read and write
19ABD295000
heap
page read and write
23B784A2000
heap
page read and write
2DCCED2B000
heap
page read and write
1B777A60000
trusted library allocation
page read and write
1A5F0B90000
heap
page read and write
2442BE36000
heap
page read and write
14CF55C3000
heap
page read and write
1F836D10000
heap
page read and write
2DCD0355000
heap
page read and write
1F836DA0000
heap
page read and write
26749170000
heap
page read and write
15601580000
trusted library allocation
page read and write
2DCD03DC000
heap
page read and write
2DCD10CC000
heap
page read and write
1FC75808000
heap
page read and write
23B784B0000
heap
page read and write
2DCD1DF7000
heap
page read and write
2DCD1192000
heap
page read and write
7A8A8FE000
stack
page read and write
231B2A58000
heap
page read and write
2DCCED97000
heap
page read and write
7FF6E3AA3000
unkown
page readonly
1CCFB757000
heap
page read and write
F38A97F000
stack
page read and write
1829E514000
heap
page read and write
1B777C59000
heap
page read and write
1BDF3250000
heap
page read and write
85FAD9C000
stack
page read and write
2938E389000
heap
page read and write
1CCFB6F0000
heap
page read and write
2173D2C9000
heap
page read and write
1B777B5C000
trusted library allocation
page read and write
2442BE37000
heap
page read and write
2173D2F8000
heap
page read and write
2DCD1D18000
heap
page read and write
2938E42D000
heap
page read and write
2E1171C000
stack
page read and write
1DC9E1BC000
heap
page read and write
2DCD0E54000
heap
page read and write
2DCCEDC0000
heap
page read and write
1B137A40000
heap
page read and write
21F3FC17000
heap
page read and write
1C83D7F000
stack
page read and write
1DA6054E000
heap
page read and write
1FEF1407000
heap
page read and write
2DCCEFCC000
heap
page read and write
2DCCEF8F000
heap
page read and write
2DCD12E8000
heap
page read and write
1E39750B000
heap
page read and write
2442BE41000
heap
page read and write
1DC9DB93000
heap
page read and write
2442BFD0000
trusted library allocation
page read and write
2887F170000
heap
page read and write
2DCD011B000
heap
page read and write
169C36BB000
heap
page read and write
2DCCF72E000
heap
page read and write
21A18F87000
heap
page read and write
2DCD0554000
heap
page read and write
23B784A6000
heap
page read and write
1DA60ADE000
heap
page read and write
23D34FF000
stack
page read and write
2DCD1D1F000
heap
page read and write
2DCCEF98000
heap
page read and write
2DCCFEC3000
heap
page read and write
2DCD019E000
heap
page read and write
1DC9DB73000
heap
page read and write
2442BE99000
heap
page read and write
2DCCEF2E000
heap
page read and write
2DCD175C000
heap
page read and write
1DC9E1C4000
heap
page read and write
64A067B000
stack
page read and write
2173D1B0000
heap
page read and write
1FEF0DFD000
heap
page read and write
1DC9DB8E000
heap
page read and write
1FEF2D80000
heap
page read and write
8EF191C000
stack
page read and write
1FC75808000
heap
page read and write
A7408FB000
stack
page read and write
15601558000
heap
page read and write
1829E4F3000
heap
page read and write
2173D270000
heap
page read and write
216B3B00000
heap
page read and write
23B784A6000
heap
page read and write
1E397410000
heap
page read and write
2DCCFEC3000
heap
page read and write
1829E413000
heap
page read and write
E6F55C000
stack
page read and write
1BDCB830000
heap
page read and write
1829E4C0000
heap
page read and write
2DCCFFFF000
heap
page read and write
2DCCCF70000
heap
page read and write
21F3FC02000
heap
page read and write
5B7AFE000
stack
page read and write
21F3FBF0000
heap
page read and write
2DCD1038000
heap
page read and write
21F3FCF0000
trusted library allocation
page read and write
2DCD0640000
direct allocation
page read and write
162B23FA000
heap
page read and write
2DCCED94000
heap
page read and write
2DCCED50000
heap
page read and write
1FEF0DFB000
heap
page read and write
2DCCECE0000
heap
page read and write
1FC7580B000
heap
page read and write
1FEF0F53000
heap
page read and write
1FC75808000
heap
page read and write
A7409FF000
unkown
page read and write
64A1BFE000
stack
page read and write
7FF6E3A61000
unkown
page execute read
1DC9E1AB000
heap
page read and write
1A01BC4A000
heap
page read and write
2DCCFF5A000
heap
page read and write
2DCCF330000
heap
page read and write
1FC75802000
heap
page read and write
2DAEC775000
heap
page read and write
156015AE000
heap
page read and write
2DCCED2B000
heap
page read and write
1DC9DB9F000
heap
page read and write
2DCD17BF000
heap
page read and write
1829E406000
heap
page read and write
15F0C652000
heap
page read and write
23B784B4000
heap
page read and write
1DF79FA0000
heap
page read and write
2DCD1F7E000
heap
page read and write
2DCD0A50000
heap
page read and write
21451020000
heap
page read and write
1F24BD60000
heap
page read and write
2DCD1F7E000
heap
page read and write
1B7779E0000
trusted library allocation
page read and write
15F0C750000
heap
page read and write
2DCD0C1C000
heap
page read and write
12B3E8B000
stack
page read and write
1FC7580D000
heap
page read and write
21E30530000
heap
page read and write
2442BE6A000
heap
page read and write
28C827E000
stack
page read and write
2DCCCF60000
heap
page readonly
1FC7580B000
heap
page read and write
2DAEC76B000
heap
page read and write
1DC9DB64000
heap
page read and write
2DCCCFD0000
heap
page read and write
2DCCF6F0000
heap
page read and write
162B23D9000
heap
page read and write
23B784A6000
heap
page read and write
2DCCED25000
heap
page read and write
1FEF0DE0000
heap
page read and write
2DCD000E000
heap
page read and write
1B137720000
heap
page read and write
1FEF0F55000
heap
page read and write
2DCCD0C4000
heap
page read and write
1DC9E1C2000
heap
page read and write
2DCCF6E5000
heap
page read and write
1AF30BB1000
heap
page read and write
2173D2F8000
heap
page read and write
1A01BEC0000
heap
page read and write
2DCD137B000
heap
page read and write
2173D26F000
heap
page read and write
2DCD203F000
heap
page read and write
14CF55CD000
heap
page read and write
21451230000
heap
page read and write
1DC9DD20000
trusted library allocation
page read and write
1FC75812000
heap
page read and write
23B784A6000
heap
page read and write
281E77F7000
heap
page read and write
2DCCFF3F000
heap
page read and write
2DCD19F5000
heap
page read and write
2DCCFF4E000
heap
page read and write
1DC9E2BB000
heap
page read and write
2DCD0428000
heap
page read and write
21F3F1D3000
trusted library allocation
page read and write
1DA60AE8000
heap
page read and write
156014C4000
heap
page read and write
1BA66380000
heap
page read and write
12B427E000
stack
page read and write
1DC9DB20000
trusted library allocation
page read and write
156014C0000
heap
page read and write
2DCCF01B000
heap
page read and write
64A0A7E000
unkown
page readonly
21F3FE07000
heap
page read and write
2DCCF0B6000
heap
page read and write
1829E4FB000
heap
page read and write
1FEF0DEC000
heap
page read and write
2938E430000
heap
page read and write
2DCD061A000
heap
page read and write
2938E34B000
heap
page read and write
1FC75809000
heap
page read and write
2DCCD090000
heap
page read and write
2DCCFE70000
heap
page read and write
14CF5596000
heap
page read and write
2DCCEF3A000
heap
page read and write
2DCCED97000
heap
page read and write
156014C4000
heap
page read and write
2DCD1F60000
heap
page read and write
23B784A6000
heap
page read and write
1B1377ED000
heap
page read and write
21F3FE10000
heap
page read and write
2DCCEDC0000
heap
page read and write
601767F000
stack
page read and write
2887F010000
heap
page read and write
1DA60326000
heap
page read and write
2DCD1DB5000
heap
page read and write
21A18F7D000
heap
page read and write
216B3D70000
heap
page read and write
1FEF1417000
heap
page read and write
1DC9DB96000
heap
page read and write
2173D26F000
heap
page read and write
15601B31000
heap
page read and write
1DC9DB93000
heap
page read and write
2DCD1E8E000
heap
page read and write
23B784AB000
heap
page read and write
23B784B3000
heap
page read and write
1DA60542000
heap
page read and write
2DCCEFCE000
heap
page read and write
9202FFF000
stack
page read and write
1DC9E2B0000
heap
page read and write
1B77269F000
heap
page read and write
2DCD1150000
heap
page read and write
2DCCFF59000
heap
page read and write
7FF6E3AA3000
unkown
page readonly
14CF55BF000
heap
page read and write
2DCD1F4E000
heap
page read and write
2DCCEF7E000
heap
page read and write
2DCD07A8000
direct allocation
page read and write
2DCCF0C5000
heap
page read and write
649F7AB000
stack
page read and write
216B3C90000
heap
page read and write
23B784A6000
heap
page read and write
59AA3FF000
unkown
page read and write
1B772F1A000
heap
page read and write
1DA62364000
heap
page read and write
8EF199F000
stack
page read and write
2DCCF40B000
heap
page read and write
64A117E000
stack
page read and write
2DCD16F4000
heap
page read and write
1CCFB710000
heap
page read and write
2173D30A000
heap
page read and write
81FD39E000
stack
page read and write
24A66110000
heap
page read and write
2DCD110E000
heap
page read and write
1B777CE9000
heap
page read and write
2DCD1FFF000
heap
page read and write
23B784AB000
heap
page read and write
2DCCEF2E000
heap
page read and write
2DCCD091000
heap
page read and write
20950E05000
heap
page read and write
2C14DA00000
heap
page read and write
2DCD1506000
heap
page read and write
2173EC50000
heap
page read and write
2DCD1046000
heap
page read and write
23B784A6000
heap
page read and write
21F3FC84000
heap
page read and write
2DCD1F66000
heap
page read and write
2DCCED36000
heap
page read and write
1DA62361000
heap
page read and write
2DCD0DF4000
heap
page read and write
1B777D03000
heap
page read and write
8DD35CC000
stack
page read and write
2C14D610000
heap
page read and write
A9673BF000
stack
page read and write
FFFF2FF000
stack
page read and write
26749590000
heap
page read and write
3995BFE000
unkown
page read and write
2DAEC6C5000
heap
page read and write
2DAEC76B000
heap
page read and write
2DCCF0BF000
heap
page read and write
1A5F0C20000
heap
page read and write
1DA602E9000
heap
page read and write
2DCD1FF0000
heap
page read and write
1560154A000
heap
page read and write
1FC757E8000
heap
page read and write
15601B56000
heap
page read and write
2DCD180A000
heap
page read and write
4AF9F5E000
stack
page read and write
1B772702000
heap
page read and write
2173D30B000
heap
page read and write
2DCCEF11000
heap
page read and write
1B777A75000
trusted library allocation
page read and write
156015A7000
heap
page read and write
1829E406000
heap
page read and write
1B777A90000
trusted library allocation
page read and write
2DCD1976000
heap
page read and write
1A01BB80000
heap
page read and write
2173D2E1000
heap
page read and write
23B784A6000
heap
page read and write
156015AE000
heap
page read and write
21F3FC66000
heap
page read and write
1DA60ACE000
heap
page read and write
1DC9E2BE000
heap
page read and write
1FC75815000
heap
page read and write
156015AA000
heap
page read and write
5A2EBDF000
stack
page read and write
23B784A6000
heap
page read and write
2DCCFF49000
heap
page read and write
21F3FC9F000
heap
page read and write
1DA60ACC000
heap
page read and write
2DCD0305000
heap
page read and write
2DCD18BE000
heap
page read and write
1FC75816000
heap
page read and write
B6285D5000
stack
page read and write
1829E407000
heap
page read and write
21F3F1DE000
trusted library allocation
page read and write
2DCD12E3000
heap
page read and write
2DCD137B000
heap
page read and write
3CBB5FF000
unkown
page read and write
2DCD1259000
heap
page read and write
21A18F49000
heap
page read and write
1DA60300000
heap
page read and write
1B777C00000
heap
page read and write
2DCCFF50000
heap
page read and write
2173D2AE000
heap
page read and write
2DCCF608000
heap
page read and write
1FEF0DC7000
heap
page read and write
2DCD108B000
heap
page read and write
156033C4000
heap
page read and write
15601566000
heap
page read and write
156034C0000
heap
page read and write
20950E77000
heap
page read and write
156014B4000
heap
page read and write
2DCCED68000
heap
page read and write
15601492000
heap
page read and write
1C83DFF000
stack
page read and write
1AF30BA9000
heap
page read and write
15601553000
heap
page read and write
1FEF0D60000
heap
page read and write
1CCFB740000
heap
page read and write
23B784A9000
heap
page read and write
2DCCED78000
heap
page read and write
1B777A61000
trusted library allocation
page read and write
21F3FE19000
heap
page read and write
2DCD0F62000
heap
page read and write
2DCD1462000
heap
page read and write
2DCCED14000
heap
page read and write
2DCCF0C9000
heap
page read and write
1DC9DB70000
heap
page read and write
2DCCD0DC000
heap
page read and write
2442DDC5000
heap
page read and write
2DCCF026000
heap
page read and write
47C3AF7000
stack
page read and write
1DC9DB9E000
heap
page read and write
1FEF0DF1000
heap
page read and write
A740AFF000
stack
page read and write
2DCCEF81000
heap
page read and write
281E7A95000
heap
page read and write
35C337E000
stack
page read and write
1DA6032A000
heap
page read and write
2442DDBF000
heap
page read and write
23B784A3000
heap
page read and write
1DC9E1AB000
heap
page read and write
15F0C500000
heap
page read and write
2173D2BD000
heap
page read and write
21A18F69000
heap
page read and write
2DCD16F4000
heap
page read and write
2DCCF5E7000
heap
page read and write
15F0C630000
heap
page read and write
182A0292000
heap
page read and write
7FF6E3A9F000
unkown
page read and write
21F3FC5E000
heap
page read and write
2DCCEFB3000
heap
page read and write
2DCCEF6E000
heap
page read and write
21F3FC6B000
heap
page read and write
2DCD2043000
heap
page read and write
1FC75802000
heap
page read and write
1DC9DB74000
heap
page read and write
2DCCEFA7000
heap
page read and write
4AF9FDF000
stack
page read and write
2938E3BA000
heap
page read and write
2DCCEFA9000
heap
page read and write
2DCCF0D9000
heap
page read and write
14CF55BC000
heap
page read and write
4B560FF000
stack
page read and write
1B777A40000
trusted library allocation
page read and write
169C3680000
heap
page read and write
20950E80000
heap
page read and write
231B2D20000
heap
page read and write
21F3F1D9000
trusted library allocation
page read and write
2173D2CE000
heap
page read and write
4AFA37F000
stack
page read and write
21F3FC16000
heap
page read and write
2DCCF030000
heap
page read and write
2DCCF075000
heap
page read and write
2DCD1F6D000
heap
page read and write
1FC75808000
heap
page read and write
2173D2AE000
heap
page read and write
1B77267A000
heap
page read and write
1FC75812000
heap
page read and write
2DCCEFF9000
heap
page read and write
2DCCED29000
heap
page read and write
2DCCEFA8000
heap
page read and write
2DCCF002000
heap
page read and write
1B777C2B000
heap
page read and write
15601B3F000
heap
page read and write
2DCCFF31000
heap
page read and write
2442C506000
heap
page read and write
21F3FC4B000
heap
page read and write
1829E50F000
heap
page read and write
2E1179F000
stack
page read and write
1B772678000
heap
page read and write
2DCD026E000
heap
page read and write
2DCCFF44000
heap
page read and write
2DCD1D21000
heap
page read and write
2DCCED6B000
heap
page read and write
20950E30000
heap
page read and write
2DCD18ED000
heap
page read and write
22832F51000
heap
page read and write
2442C509000
heap
page read and write
1BDCB7C0000
heap
page read and write
2442BE95000
heap
page read and write
15601B52000
heap
page read and write
20950E59000
heap
page read and write
23B784A3000
heap
page read and write
15F0C610000
heap
page read and write
1DA602E5000
heap
page read and write
23B784A6000
heap
page read and write
2DCCEF54000
heap
page read and write
2DCCEF1E000
heap
page read and write
2442DDC5000
heap
page read and write
23B784A3000
heap
page read and write
21F3FC66000
heap
page read and write
2DCCD0C4000
heap
page read and write
B53C4FE000
stack
page read and write
21F3FC67000
heap
page read and write
1CCFB760000
heap
page read and write
2DCD03DC000
heap
page read and write
20950E77000
heap
page read and write
2442C525000
heap
page read and write
1F24C0B5000
heap
page read and write
2DCCED2B000
heap
page read and write
2DCD1A15000
heap
page read and write
2DCCED67000
heap
page read and write
2DCD0AD4000
heap
page read and write
2173D2A5000
heap
page read and write
1A01BC40000
heap
page read and write
2DCCED9E000
heap
page read and write
1DC9E2B3000
heap
page read and write
2DCCD0B2000
heap
page read and write
1DA6032F000
heap
page read and write
2887F430000
heap
page read and write
2DCCF578000
heap
page read and write
299F7330000
heap
page read and write
F09367F000
stack
page read and write
14CF55C2000
heap
page read and write
5B7A7C000
stack
page read and write
216B3C30000
heap
page read and write
1FEF2D8E000
heap
page read and write
2DCCD0D5000
heap
page read and write
47C41FE000
stack
page read and write
1B773480000
trusted library section
page readonly
12B43FF000
stack
page read and write
A0EF2FE000
stack
page read and write
1FC75809000
heap
page read and write
2DCCF210000
direct allocation
page read and write
1FEF0DC3000
heap
page read and write
1BDCB800000
heap
page read and write
2DCD1D21000
heap
page read and write
15601460000
heap
page read and write
2442BE58000
heap
page read and write
2DCD179E000
heap
page read and write
2DCCEF78000
heap
page read and write
2173D277000
heap
page read and write
64A0F7E000
unkown
page readonly
2DCD18DC000
heap
page read and write
7A8A87E000
stack
page read and write
2442BE60000
heap
page read and write
1B773580000
trusted library allocation
page read and write
2DCD1DB3000
heap
page read and write
22832F51000
heap
page read and write
1829E3E6000
heap
page read and write
2DCCFEC3000
heap
page read and write
1DA6031C000
heap
page read and write
20950D70000
heap
page read and write
19ABCF30000
heap
page read and write
1FEF0F5E000
heap
page read and write
14CF55CC000
heap
page read and write
1FEF0F7A000
heap
page read and write
2442BE12000
heap
page read and write
2DCD0BDA000
heap
page read and write
156015A5000
heap
page read and write
2173D300000
heap
page read and write
156014E3000
heap
page read and write
1DA6054A000
heap
page read and write
7FF72AA71000
unkown
page execute read
1B777B30000
trusted library allocation
page read and write
2DCCF054000
heap
page read and write
1FEF0DD6000
heap
page read and write
1DC9E1B9000
heap
page read and write
156015A2000
heap
page read and write
3E4D47F000
stack
page read and write
1A01BC60000
heap
page read and write
2938E3F9000
heap
page read and write
2DCCEF4E000
heap
page read and write
1B1377DC000
heap
page read and write
20AA85B0000
heap
page read and write
23B7849E000
heap
page read and write
1DC9E1A2000
heap
page read and write
2DCD1A04000
heap
page read and write
2DAEC6C0000
heap
page read and write
281E7A90000
heap
page read and write
2DCD18BD000
heap
page read and write
15F0C615000
heap
page read and write
23B783D0000
heap
page read and write
2DCCFF59000
heap
page read and write
363E8FF000
stack
page read and write
2DCCFE54000
heap
page read and write
BB8F1FF000
stack
page read and write
2DCCF075000
heap
page read and write
2DCD1F6D000
heap
page read and write
2DCCFEC3000
heap
page read and write
1829E519000
heap
page read and write
2DCCECF3000
heap
page read and write
23B784A9000
heap
page read and write
2DCCFBE0000
direct allocation
page read and write
299F7310000
heap
page read and write
2DCCF003000
heap
page read and write
2DCD137B000
heap
page read and write
8DD387E000
stack
page read and write
2DCCF01E000
heap
page read and write
2DAEC77C000
heap
page read and write
23D31CD000
stack
page read and write
21F3FC0B000
heap
page read and write
2DCCEF44000
heap
page read and write
2173D2D1000
heap
page read and write
2DCD17C7000
heap
page read and write
1FEF1414000
heap
page read and write
157BFFF0000
heap
page read and write
1829E403000
heap
page read and write
2173D276000
heap
page read and write
1CCFB760000
heap
page read and write
1DA60547000
heap
page read and write
7FF72AAB1000
unkown
page read and write
1F836C10000
heap
page read and write
2442DDB4000
heap
page read and write
2DCD0E58000
heap
page read and write
2DCD18CD000
heap
page read and write
FFFF3FE000
stack
page read and write
1FC75808000
heap
page read and write
There are 2981 hidden memdumps, click here to show them.