IOC Report
SecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps432101,00010010Label

Files

File Path
Type
Category
Malicious
Download
SecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\9SF \74198OSecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\9SF \node.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\ExuiKrnln_Win32_20230402.lib
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\9SF \74198OSecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\9SF \9SF .lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Apr 8 20:22:57 2024, mtime=Mon Apr 8 20:23:00 2024, atime=Mon Apr 8 20:22:55 2024, length=22828006, window=hide
dropped
C:\9SF \source.rar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\9SF \source.rar.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\9SF \source\ItemBG.png
PNG image data, 950 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\9SF \source\ItemNewBG.gif
GIF image data, version 89a, 950 x 36
dropped
C:\9SF \source\ItemNewBG.png
GIF image data, version 89a, 950 x 36
dropped
C:\9SF \source\ItemSelectBG.png
PNG image data, 950 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\9SF \source\ListBG.png
PNG image data, 1280 x 830, 8-bit/color RGBA, non-interlaced
dropped
C:\9SF \source\New.gif
GIF image data, version 89a, 98 x 46
dropped
C:\9SF \source\btn_select.png
PNG image data, 74 x 25, 8-bit/color RGB, non-interlaced
dropped
C:\9SF \source\hot.gif
GIF image data, version 89a, 72 x 74
dropped
C:\9SF \source\index.html
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\9SF \source\index.html.tmp
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\9SF \source\xiangqing.png
PNG image data, 64 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\9SF........\source.rar (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\9SF........\source\index.html (copy)
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\del.s
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\sedata.dat
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\Desktop\9SF.........lnk (copy)
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Apr 8 20:22:57 2024, mtime=Mon Apr 8 20:23:00 2024, atime=Mon Apr 8 20:22:55 2024, length=22828006, window=hide
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
malicious
C:\9SF \74198OSecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
C:\9SF \74198OSecuriteInfo.com.Trojan.Siggen8.16025.11050.1897.exe
malicious

URLs

Name
IP
Malicious
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://github.com/joyent/node/issues/3295.
unknown
http://invisible-island.net/ncurses/terminfo.ti.html#toc-_Specials
unknown
https://url.spec.whatwg.org/#concept-urlencoded-byte-serializer
unknown
http://www.ecma-international.org/publications/standards/Ecma-262.htm)
unknown
http://exslt.org/commonnode-set&<
unknown
http://www.3waylabs.com/nw/WWW/products/wizcon/vt220.html
unknown
http://www.9sf.com
unknown
https://html.spec.whatwg.org/multipage/browsers.html#ascii-serialisation-of-an-origin
unknown
https://github.com/nodejs/node/issues/4467
unknown
https://url.spec.whatwg.org/#urlsearchparams-stringification-behavior
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3C//DTD
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://groups.google.com/forum/?pli=1#
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
http://www.youxigw.top:3366/source.rar
103.216.155.225
http://xmlsoft.org/XSLT/testTemplates:
unknown
https://nodejs.org/download/release/v6.9.2/node-v6.9.2.tar.gzsourceUrlhttps://nodejs.org/download/re
unknown
https://www.chromestatus.com/features/4668884095336448
unknown
https://github.com/joyent/node/issues/1707
unknown
https://tools.ietf.org/html/rfc3986#section-3.2.2
unknown
http://stackoverflow.com/a/5501711/3561
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
http://exslt.org/common
unknown
https://github.com/v8/v8/wiki/Debugging-Protocol
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
http://dom.spec.whatwg.org/#dom-range-detach).
unknown
http://www.ecma-international.org/ecma-262/5.1/#sec-15.1.3.4
unknown
https://mathiasbynens.be/notes/javascript-encoding
unknown
http://xmlsoft.org/XSLT/
unknown
https://nodejs.org/download/release/v6.9.2/node-v6.9.2.tar.gz
unknown
http://narwhaljs.org)
unknown
https://github.com/nodejs/node/issues/3392
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
https://nodejs.org/download/release/v6.9.2/win-x86/node.lib
unknown
http://www.iana.org/assignments/tls-extensiontype-values
unknown
http://www.jclark.com/xt
unknown
https://goo.gl/Y0ZkNV).localhost
unknown
https://www.chromestatus.com/feature/5534702526005248).
unknown
https://mxr.mozilla.org/mozilla/source/netwerk/protocol/http/src/nsHttpHeaderArray.cpp
unknown
http://icl.com/saxon
unknown
https://github.com/nodejs/node/issues/1264.
unknown
https://goo.gl/rStTGz
unknown
https://www.chromestatus.com/features/6750456638341120
unknown
http://html4/loose.dtd
unknown
http://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://heycam.github.io/webidl/#es-stringifier
unknown
https://github.com/nodejs/node/pull/3394
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
unknown
http://code.google.com/p/closure-compiler/wiki/SourceMaps
unknown
https://code.google.com/p/chromium/issues/detail?id=437569#c2
unknown
https://github.com/nodejs/node/issues/2119
unknown
https://url.spec.whatwg.org/#cannot-have-a-username-password-port
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2631
unknown
https://url.spec.whatwg.org/#concept-url
unknown
http://.css
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
http://www.youxigw.top:3366/index.html
103.216.155.225
http://invisible-island.net/xterm/ctlseqs/ctlseqs.html
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
http://www.9-s-fyxgw.asia:999/9sf.com
unknown
https://github.com/nodejs/node/wiki/Intl
unknown
https://svgwg.org/svg2-draft/struct.html#__svg__SVGSVGElement__unsuspendRedraw).
unknown
http://wiki.commonjs.org/wiki/Unit_Testing/1.0
unknown
https://tools.ietf.org/html/rfc3492#section-3.4
unknown
https://heycam.github.io/webidl/#dfn-class-string
unknown
https://heycam.github.io/webidl/#dfn-iterator-prototype-object
unknown
http://.jpg
unknown
https://heycam.github.io/webidl/#es-operations
unknown
https://nodejs.org/download/release/v6.9.2/node-v6.9.2-headers.tar.gz
unknown
http://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
http://xhr.spec.whatwg.org/.
unknown
https://svgwg.org/svg2-draft/struct.html#__svg__SVGSVGElement__forceRedraw).
unknown
http://www.youxigw.top:3366/9sf.com
unknown
http://www.youxixz.top:2255/
unknown
https://svgwg.org/svg2-draft/struct.html#__svg__SVGSVGElement__suspendRedraw).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.6
unknown
https://url.spec.whatwg.org/#concept-urlencoded-parser
unknown
http://xmlsoft.org/XSLT/namespace
unknown
http://tools.ietf.org/html/rfc3986#section-2.1.
unknown
https://github.com/nodejs/node/pull/1771#issuecomment-119351671
unknown
https://github.com/nodejs/node/issues/548
unknown
https://heycam.github.io/webidl/#es-iterable
unknown
https://iexui.com/downexui
unknown
http://xmlsoft.org/XSLT/namespacenode-sethttp://icl.com/saxonhttp://www.jclark.com/xtdebugorg.apache
unknown
http://www.wapforum.org/DTD/wml_1.1.xml
unknown
http://src.chromium.org/viewvc/blink/trunk/Source/devtools/front_end/SourceMap.js
unknown
https://svgwg.org/svg2-draft/struct.html#__svg__SVGSVGElement__unsuspendRedrawAll).
unknown
https://github.com/nodejs/node/issues/7837
unknown
http://dom.spec.whatwg.org/#dom-nodeiterator-detach).
unknown
http://exslt.org/commonxsltSortComp:
unknown
https://github.com/antirez/linenoise
unknown
https://goo.gl/Y0ZkNV).
unknown
https://heycam.github.io/webidl/#es-iterators
unknown
https://github.com/nodejs/node/issues/1600.
unknown
There are 87 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ssttjj.one-dream.me
47.96.96.50
dbday.wodebd.com
154.39.251.157
www.youxigw.top
103.216.155.225

IPs

IP
Domain
Country
Malicious
47.96.96.50
ssttjj.one-dream.me
China
103.216.155.225
www.youxigw.top
China
154.39.251.157
dbday.wodebd.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\bxinfo\data
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}\1.0\0\win32
NULL

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
503C000
heap
page read and write
5062000
heap
page read and write
5C2F000
heap
page read and write
4AB9000
heap
page read and write
504B000
heap
page read and write
50BA000
heap
page read and write
4EB6000
heap
page read and write
4E25000
heap
page read and write
5053000
heap
page read and write
5062000
heap
page read and write
4F6A000
heap
page read and write
5072000
heap
page read and write
4F32000
heap
page read and write
4E7D000
heap
page read and write
3C60000
direct allocation
page read and write
4EB8000
heap
page read and write
4AAB000
heap
page read and write
4EC1000
heap
page read and write
4E7E000
heap
page read and write
5CA4000
heap
page read and write
400000
unkown
page readonly
505E000
heap
page read and write
5075000
heap
page read and write
4E76000
heap
page read and write
5CB0000
heap
page read and write
4AB5000
heap
page read and write
4E74000
heap
page read and write
4AB1000
heap
page read and write
4AB7000
heap
page read and write
5C6D000
heap
page read and write
476D000
heap
page read and write
4AB5000
heap
page read and write
4AA6000
heap
page read and write
549E000
heap
page read and write
4E3F000
heap
page read and write
5053000
heap
page read and write
4AF9000
heap
page read and write
4B0E000
heap
page read and write
5031000
heap
page read and write
5056000
heap
page read and write
5058000
heap
page read and write
4E95000
heap
page read and write
5D65000
heap
page read and write
5031000
heap
page read and write
5042000
heap
page read and write
4E7F000
heap
page read and write
4E92000
heap
page read and write
506F000
heap
page read and write
4A99000
heap
page read and write
4AAB000
heap
page read and write
4AA4000
heap
page read and write
4A9B000
heap
page read and write
4A9A000
heap
page read and write
5063000
heap
page read and write
4AAB000
heap
page read and write
4E87000
heap
page read and write
508A000
heap
page read and write
4AB1000
heap
page read and write
144A000
heap
page read and write
5C23000
heap
page read and write
4AA5000
heap
page read and write
4AB1000
heap
page read and write
5471000
heap
page read and write
4E83000
heap
page read and write
4AAE000
heap
page read and write
5062000
heap
page read and write
4A9A000
heap
page read and write
5031000
heap
page read and write
44FE000
heap
page read and write
5A848000
direct allocation
page read and write
4AB7000
heap
page read and write
5056000
heap
page read and write
4DB8000
heap
page read and write
5075000
heap
page read and write
5056000
heap
page read and write
4EC3000
heap
page read and write
5B7C000
heap
page read and write
4B09000
heap
page read and write
5058000
heap
page read and write
4AAE000
heap
page read and write
3899000
heap
page read and write
4E6A000
heap
page read and write
4AB2000
heap
page read and write
4E7A000
heap
page read and write
550000
unkown
page write copy
4AA1000
heap
page read and write
5D5E000
heap
page read and write
4E2C000
heap
page read and write
4AD8000
heap
page read and write
5076000
heap
page read and write
5052000
heap
page read and write
1537000
direct allocation
page read and write
4AAF000
heap
page read and write
4AAF000
heap
page read and write
313D000
heap
page read and write
4E90000
heap
page read and write
4E9B000
heap
page read and write
3A95000
heap
page read and write
4AA9000
heap
page read and write
504B000
heap
page read and write
4DE4000
heap
page read and write
4E30000
heap
page read and write
4A9E000
heap
page read and write
400000
unkown
page readonly
4A9A000
heap
page read and write
4DD7000
heap
page read and write
5062000
heap
page read and write
4FEC000
heap
page read and write
5046000
heap
page read and write
5B54000
heap
page read and write
550000
unkown
page write copy
4ABE000
heap
page read and write
470C000
heap
page read and write
5074000
heap
page read and write
4AC0000
heap
page read and write
4A9A000
heap
page read and write
1287000
unkown
page write copy
4E95000
heap
page read and write
4DEB000
heap
page read and write
4AB1000
heap
page read and write
4EA0000
heap
page read and write
5A80C000
direct allocation
page read and write
4B09000
heap
page read and write
4AA0000
heap
page read and write
4AAB000
heap
page read and write
4D9D000
heap
page read and write
4D91000
heap
page read and write
4B0E000
heap
page read and write
4ED8000
heap
page read and write
4F38000
heap
page read and write
794F000
heap
page read and write
4E43000
heap
page read and write
4DD7000
heap
page read and write
4A9A000
heap
page read and write
45C3000
heap
page read and write
4AF5000
heap
page read and write
5A868000
direct allocation
page read and write
5B4B000
heap
page read and write
4EA0000
heap
page read and write
5072000
heap
page read and write
5053000
heap
page read and write
3070000
direct allocation
page read and write
13A0000
heap
page read and write
4AAD000
heap
page read and write
4AA2000
heap
page read and write
5032000
heap
page read and write
4FA8000
heap
page read and write
4E65000
heap
page read and write
4AA4000
heap
page read and write
4E68000
heap
page read and write
4E0C000
heap
page read and write
4FB2000
heap
page read and write
439A000
heap
page read and write
4AB7000
heap
page read and write
4AAA000
heap
page read and write
3740000
heap
page read and write
4E76000
heap
page read and write
4AB2000
heap
page read and write
4AAD000
heap
page read and write
5C52000
heap
page read and write
5052000
heap
page read and write
4AAD000
heap
page read and write
6F4F000
heap
page read and write
544E000
heap
page read and write
4A9E000
heap
page read and write
4AB4000
heap
page read and write
4ABD000
heap
page read and write
4AA1000
heap
page read and write
5062000
heap
page read and write
30D4000
heap
page read and write
5075000
heap
page read and write
4E76000
heap
page read and write
1440000
direct allocation
page read and write
1549000
direct allocation
page read and write
4AAE000
heap
page read and write
4A9F000
heap
page read and write
6552000
heap
page read and write
45E5000
heap
page read and write
45AD000
heap
page read and write
4AC2000
heap
page read and write
4AAE000
heap
page read and write
70F8000
heap
page read and write
4AB6000
heap
page read and write
5460000
heap
page read and write
4ADA000
heap
page read and write
4E75000
heap
page read and write
4DFB000
heap
page read and write
4E6F000
heap
page read and write
4AA4000
heap
page read and write
4AA3000
heap
page read and write
4B09000
heap
page read and write
5062000
heap
page read and write
5449000
heap
page read and write
4AAE000
heap
page read and write
5D59000
heap
page read and write
5BAE000
heap
page read and write
5056000
heap
page read and write
4EAF000
heap
page read and write
4B00000
heap
page read and write
4E95000
heap
page read and write
4A9D000
heap
page read and write
4AA9000
heap
page read and write
5056000
heap
page read and write
4B00000
heap
page read and write
4FE0000
heap
page read and write
4E06000
heap
page read and write
4AB1000
heap
page read and write
4E6C000
heap
page read and write
5A844000
direct allocation
page read and write
4AB7000
heap
page read and write
5CA0000
heap
page read and write
5BE3000
heap
page read and write
5062000
heap
page read and write
1840000
direct allocation
page read and write
4AA5000
heap
page read and write
4AAA000
heap
page read and write
5056000
heap
page read and write
142E000
stack
page read and write
4AF9000
heap
page read and write
4AA4000
heap
page read and write
4DB2000
heap
page read and write
4AB8000
heap
page read and write
4AB0000
heap
page read and write
4F60000
heap
page read and write
31DA000
heap
page read and write
4AB1000
heap
page read and write
4AB9000
heap
page read and write
4ED4000
heap
page read and write
4B09000
heap
page read and write
4E54000
heap
page read and write
4A9D000
heap
page read and write
4ABE000
heap
page read and write
1550000
direct allocation
page read and write
4B09000
heap
page read and write
5034000
heap
page read and write
4FB9000
heap
page read and write
5072000
heap
page read and write
5075000
heap
page read and write
4A9D000
heap
page read and write
5056000
heap
page read and write
4FE8000
heap
page read and write
506D000
heap
page read and write
4AA4000
heap
page read and write
4ACF000
heap
page read and write
4EA6000
heap
page read and write
4E35000
heap
page read and write
324A000
heap
page read and write
4AA1000
heap
page read and write
50BA000
heap
page read and write
4AB1000
heap
page read and write
4E65000
heap
page read and write
4AA9000
heap
page read and write
4FAD000
heap
page read and write
4ABB000
heap
page read and write
4A9A000
heap
page read and write
5062000
heap
page read and write
4EE0000
heap
page read and write
5B76000
heap
page read and write
4ECB000
heap
page read and write
4AD8000
heap
page read and write
5D47000
heap
page read and write
4E95000
heap
page read and write
4A9D000
heap
page read and write
5BB5000
heap
page read and write
547B000
heap
page read and write
5035000
heap
page read and write
4E95000
heap
page read and write
5C55000
heap
page read and write
4AB7000
heap
page read and write
4AA2000
heap
page read and write
4A9A000
heap
page read and write
4AA4000
heap
page read and write
9A000
stack
page read and write
4DFB000
heap
page read and write
5047000
heap
page read and write
3150000
direct allocation
page read and write
4E7E000
heap
page read and write
44F3000
heap
page read and write
1379000
unkown
page read and write
4E90000
heap
page read and write
4DFB000
heap
page read and write
13EE000
stack
page read and write
5CD3000
heap
page read and write
4B00000
heap
page read and write
4AB3000
heap
page read and write
5062000
heap
page read and write
4AAC000
heap
page read and write
4E90000
heap
page read and write
5075000
heap
page read and write
4E95000
heap
page read and write
4EC1000
heap
page read and write
4AB1000
heap
page read and write
5031000
heap
page read and write
4ED4000
heap
page read and write
5058000
heap
page read and write
4AB2000
heap
page read and write
4AA0000
heap
page read and write
4AAE000
heap
page read and write
4AB7000
heap
page read and write
1287000
unkown
page write copy
4E95000
heap
page read and write
4AA6000
heap
page read and write
5062000
heap
page read and write
454A000
heap
page read and write
503D000
heap
page read and write
5062000
heap
page read and write
5B5E000
heap
page read and write
4AB2000
heap
page read and write
4ED8000
heap
page read and write
4B00000
heap
page read and write
4AAE000
heap
page read and write
4E9C000
heap
page read and write
4AA1000
heap
page read and write
4AAF000
heap
page read and write
5039000
heap
page read and write
4AB8000
heap
page read and write
4E6B000
heap
page read and write
4E70000
heap
page read and write
5A858000
direct allocation
page read and write
4AFC000
heap
page read and write
4EAF000
heap
page read and write
5052000
heap
page read and write
4A9B000
heap
page read and write
4AB1000
heap
page read and write
4AA9000
heap
page read and write
4B0D000
heap
page read and write
4AB6000
heap
page read and write
4E06000
heap
page read and write
4A9A000
heap
page read and write
4EB6000
heap
page read and write
5053000
heap
page read and write
5060000
heap
page read and write
4E65000
heap
page read and write
4ACC000
heap
page read and write
4AC2000
heap
page read and write
5CEB000
heap
page read and write
5062000
heap
page read and write
5062000
heap
page read and write
4DE0000
heap
page read and write
4FBC000
heap
page read and write
12D5000
unkown
page read and write
5062000
heap
page read and write
4A9D000
heap
page read and write
4D91000
heap
page read and write
4AA4000
heap
page read and write
4AA5000
heap
page read and write
4A99000
heap
page read and write
5056000
heap
page read and write
5453000
heap
page read and write
5062000
heap
page read and write
4AE2000
heap
page read and write
4ABD000
heap
page read and write
5062000
heap
page read and write
4EC4000
heap
page read and write
5A5D000
heap
page read and write
4AB2000
heap
page read and write
4E66000
heap
page read and write
4A9C000
heap
page read and write
4B0E000
heap
page read and write
4EC4000
heap
page read and write
4DE4000
heap
page read and write
5035000
heap
page read and write
5058000
heap
page read and write
4AB4000
heap
page read and write
4AA4000
heap
page read and write
5031000
heap
page read and write
4AA0000
heap
page read and write
4F20000
heap
page read and write
506D000
heap
page read and write
4E66000
heap
page read and write
4AB7000
heap
page read and write
4E66000
heap
page read and write
4EDA000
heap
page read and write
4F23000
heap
page read and write
50A9000
heap
page read and write
4A99000
heap
page read and write
4ECB000
heap
page read and write
4AB3000
heap
page read and write
4A9D000
heap
page read and write
4E16000
heap
page read and write
4AAE000
heap
page read and write
5075000
heap
page read and write
4B01000
heap
page read and write
4AAE000
heap
page read and write
506C000
heap
page read and write
4ABB000
heap
page read and write
4DAF000
heap
page read and write
4AF1000
heap
page read and write
3070000
direct allocation
page read and write
5053000
heap
page read and write
4D91000
heap
page read and write
5039000
heap
page read and write
4E06000
heap
page read and write
4AA4000
heap
page read and write
4EC4000
heap
page read and write
4F4D000
heap
page read and write
5D4A000
heap
page read and write
4AA0000
heap
page read and write
4DEE000
heap
page read and write
4ED8000
heap
page read and write
5059000
heap
page read and write
4E95000
heap
page read and write
4E2C000
heap
page read and write
4675000
heap
page read and write
5A854000
direct allocation
page read and write
5D53000
heap
page read and write
5C0F000
heap
page read and write
4AA3000
heap
page read and write
4AB9000
heap
page read and write
1637000
direct allocation
page read and write
4E35000
heap
page read and write
1550000
direct allocation
page read and write
5075000
heap
page read and write
4AAF000
heap
page read and write
4E16000
heap
page read and write
4AE7000
heap
page read and write
137B000
unkown
page execute and write copy
5CED000
heap
page read and write
1859000
direct allocation
page read and write
5031000
heap
page read and write
4AB4000
heap
page read and write
1381000
unkown
page execute and write copy
4AA6000
heap
page read and write
3886000
heap
page read and write
5065000
heap
page read and write
4FCE000
heap
page read and write
4A9E000
heap
page read and write
4EEA000
heap
page read and write
505C000
heap
page read and write
5471000
heap
page read and write
5052000
heap
page read and write
5D1E000
heap
page read and write
4AB1000
heap
page read and write
5051000
heap
page read and write
4AA2000
heap
page read and write
4AB7000
heap
page read and write
1530000
direct allocation
page read and write
4ED9000
heap
page read and write
4EE3000
heap
page read and write
506F000
heap
page read and write
1381000
unkown
page execute and read and write
5098000
heap
page read and write
5075000
heap
page read and write
4A99000
heap
page read and write
4A9A000
heap
page read and write
4AB6000
heap
page read and write
4AEA000
heap
page read and write
4AA2000
heap
page read and write
5039000
heap
page read and write
45AD000
heap
page read and write
5062000
heap
page read and write
4AAF000
heap
page read and write
4ED9000
heap
page read and write
4E43000
heap
page read and write
44F8000
heap
page read and write
4EC9000
heap
page read and write
4EB8000
heap
page read and write
4E65000
heap
page read and write
4A9E000
heap
page read and write
509B000
heap
page read and write
3B10000
direct allocation
page read and write
4AAE000
heap
page read and write
4AA0000
heap
page read and write
4FC6000
heap
page read and write
4A9E000
heap
page read and write
4DC3000
heap
page read and write
5056000
heap
page read and write
4E90000
heap
page read and write
3010000
direct allocation
page read and write
4AB4000
heap
page read and write
4AAE000
heap
page read and write
5B71000
heap
page read and write
4B00000
heap
page read and write
5035000
heap
page read and write
4A98000
heap
page read and write
5058000
heap
page read and write
4E65000
heap
page read and write
4AA4000
heap
page read and write
5035000
heap
page read and write
4DB2000
heap
page read and write
4AA1000
heap
page read and write
4AB5000
heap
page read and write
4ADD000
heap
page read and write
548A000
heap
page read and write
4AA2000
heap
page read and write
4F09000
heap
page read and write
5459000
heap
page read and write
4AB0000
heap
page read and write
4A99000
heap
page read and write
5062000
heap
page read and write
4AAC000
heap
page read and write
3150000
direct allocation
page read and write
4AA9000
heap
page read and write
4E95000
heap
page read and write
4AB1000
heap
page read and write
4E88000
heap
page read and write
4AAE000
heap
page read and write
5052000
heap
page read and write
4AB5000
heap
page read and write
5039000
heap
page read and write
137B000
unkown
page execute and write copy
5059000
heap
page read and write
4E56000
heap
page read and write
4E1C000
heap
page read and write
4ECB000
heap
page read and write
4DE8000
heap
page read and write
5062000
heap
page read and write
1570000
heap
page read and write
4EA0000
heap
page read and write
4A9A000
heap
page read and write
4AB7000
heap
page read and write
5062000
heap
page read and write
4A9E000
heap
page read and write
4E65000
heap
page read and write
4AB7000
heap
page read and write
503A000
heap
page read and write
4B00000
heap
page read and write
4AB7000
heap
page read and write
4DB4000
heap
page read and write
50AF000
heap
page read and write
4A9A000
heap
page read and write
5C2A000
heap
page read and write
5052000
heap
page read and write
3430000
heap
page read and write
504B000
heap
page read and write
458E000
heap
page read and write
4AAE000
heap
page read and write
5062000
heap
page read and write
5053000
heap
page read and write
4AA5000
heap
page read and write
4DD4000
heap
page read and write
50A8000
heap
page read and write
5469000
heap
page read and write
5D3C000
heap
page read and write
4EFC000
heap
page read and write
5056000
heap
page read and write
4DE8000
heap
page read and write
5CB7000
heap
page read and write
5C96000
heap
page read and write
4AB4000
heap
page read and write
4E56000
heap
page read and write
7A36000
heap
page read and write
504C000
heap
page read and write
4EC9000
heap
page read and write
1371000
unkown
page write copy
5058000
heap
page read and write
4E30000
heap
page read and write
45E6000
heap
page read and write
4A9F000
heap
page read and write
4A9C000
heap
page read and write
5C86000
heap
page read and write
4EA4000
heap
page read and write
4AAF000
heap
page read and write
505E000
heap
page read and write
3999000
heap
page read and write
5053000
heap
page read and write
12AE000
unkown
page read and write
4A9D000
heap
page read and write
5A828000
direct allocation
page read and write
12D8000
unkown
page execute and write copy
5056000
heap
page read and write
4AB7000
heap
page read and write
4B09000
heap
page read and write
4F5C000
heap
page read and write
5032000
heap
page read and write
3258000
heap
page read and write
4E98000
heap
page read and write
4E95000
heap
page read and write
5059000
heap
page read and write
4A98000
heap
page read and write
5063000
heap
page read and write
4DB2000
heap
page read and write
4A98000
heap
page read and write
5041000
heap
page read and write
4AAF000
heap
page read and write
5058000
heap
page read and write
4DEE000
heap
page read and write
5090000
heap
page read and write
1287000
unkown
page read and write
5D07000
heap
page read and write
401000
unkown
page execute and write copy
4AB1000
heap
page read and write
3899000
heap
page read and write
4ABA000
heap
page read and write
5CC7000
heap
page read and write
5053000
heap
page read and write
4ACC000
heap
page read and write
5052000
heap
page read and write
4AB2000
heap
page read and write
4A9A000
heap
page read and write
4AA6000
heap
page read and write
5052000
heap
page read and write
4E74000
heap
page read and write
547B000
heap
page read and write
1580000
heap
page read and write
4A99000
heap
page read and write
506B000
heap
page read and write
4AA2000
heap
page read and write
5B86000
heap
page read and write
4E86000
heap
page read and write
5075000
heap
page read and write
5072000
heap
page read and write
4AA5000
heap
page read and write
4AA9000
heap
page read and write
4AA1000
heap
page read and write
4AA5000
heap
page read and write
4F02000
heap
page read and write
4E65000
heap
page read and write
4DB3000
heap
page read and write
4E43000
heap
page read and write
4AF6000
heap
page read and write
50B0000
heap
page read and write
4E6D000
heap
page read and write
4A99000
heap
page read and write
4AB3000
heap
page read and write
1381000
unkown
page execute and write copy
5053000
heap
page read and write
4A9A000
heap
page read and write
4E12000
heap
page read and write
4AB4000
heap
page read and write
4AA2000
heap
page read and write
4AA6000
heap
page read and write
4A9B000
heap
page read and write
5053000
heap
page read and write
5BF9000
heap
page read and write
5C27000
heap
page read and write
4AB8000
heap
page read and write
4E16000
heap
page read and write
4ACC000
heap
page read and write
6639000
heap
page read and write
5031000
heap
page read and write
4AA5000
heap
page read and write
4E70000
heap
page read and write
4AB7000
heap
page read and write
4E71000
heap
page read and write
4E2C000
heap
page read and write
5D21000
heap
page read and write
4E76000
heap
page read and write
4ACB000
heap
page read and write
5063000
heap
page read and write
4623000
heap
page read and write
5067000
heap
page read and write
4E4E000
heap
page read and write
5075000
heap
page read and write
4E72000
heap
page read and write
4F32000
heap
page read and write
5BA0000
heap
page read and write
4EC9000
heap
page read and write
50AD000
heap
page read and write
1371000
unkown
page read and write
5043000
heap
page read and write
4F23000
heap
page read and write
4AA5000
heap
page read and write
4A99000
heap
page read and write
4E45000
heap
page read and write
4A9F000
heap
page read and write
503E000
heap
page read and write
4AA6000
heap
page read and write
4E41000
heap
page read and write
5B51000
heap
page read and write
5058000
heap
page read and write
137B000
unkown
page execute and write copy
4AB1000
heap
page read and write
550000
unkown
page write copy
5CBD000
heap
page read and write
4B09000
heap
page read and write
5068000
heap
page read and write
4DD7000
heap
page read and write
4E83000
heap
page read and write
4DB3000
heap
page read and write
4E9B000
heap
page read and write
5193000
heap
page read and write
4E6D000
heap
page read and write
4AC0000
heap
page read and write
4AB7000
heap
page read and write
4AA2000
heap
page read and write
4AB7000
heap
page read and write
4EB8000
heap
page read and write
4AEA000
heap
page read and write
4AAE000
heap
page read and write
4AB7000
heap
page read and write
4A9A000
heap
page read and write
4F51000
heap
page read and write
4DD7000
heap
page read and write
4AAA000
heap
page read and write
10053000
direct allocation
page execute and read and write
4DE0000
heap
page read and write
5446000
heap
page read and write
4AA9000
heap
page read and write
4E8C000
heap
page read and write
4AC9000
heap
page read and write
4AA5000
heap
page read and write
5CA9000
heap
page read and write
5D29000
heap
page read and write
4E95000
heap
page read and write
34D0000
heap
page read and write
4DE4000
heap
page read and write
4DFB000
heap
page read and write
4AA6000
heap
page read and write
4AB4000
heap
page read and write
4DE4000
heap
page read and write
5075000
heap
page read and write
5065000
heap
page read and write
5041000
heap
page read and write
175F000
stack
page read and write
4F49000
heap
page read and write
4A98000
heap
page read and write
4F20000
heap
page read and write
4E78000
heap
page read and write
4AA2000
heap
page read and write
4AAA000
heap
page read and write
4D9A000
heap
page read and write
5053000
heap
page read and write
4AB9000
heap
page read and write
5062000
heap
page read and write
5062000
heap
page read and write
504F000
heap
page read and write
5072000
heap
page read and write
4ECF000
heap
page read and write
5A2C000
heap
page read and write
4A9D000
heap
page read and write
4F7D000
heap
page read and write
5CF7000
heap
page read and write
4A9A000
heap
page read and write
1530000
direct allocation
page read and write
4A99000
heap
page read and write
399D000
heap
page read and write
5B92000
heap
page read and write
4E3F000
heap
page read and write
5439000
heap
page read and write
4E72000
heap
page read and write
4EB7000
heap
page read and write
4A9D000
heap
page read and write
4DEB000
heap
page read and write
4A9F000
heap
page read and write
504F000
heap
page read and write
5075000
heap
page read and write
5075000
heap
page read and write
4E0C000
heap
page read and write
4A9A000
heap
page read and write
5A838000
direct allocation
page read and write
4E76000
heap
page read and write
4A9B000
heap
page read and write
5058000
heap
page read and write
4AB9000
heap
page read and write
4AAC000
heap
page read and write
4A99000
heap
page read and write
4A9D000
heap
page read and write
5C7D000
heap
page read and write
4AB5000
heap
page read and write
5052000
heap
page read and write
5058000
heap
page read and write
4B00000
heap
page read and write
4B0E000
heap
page read and write
4E90000
heap
page read and write
4DE4000
heap
page read and write
185F000
stack
page read and write
400000
unkown
page readonly
5047000
heap
page read and write
4AA4000
heap
page read and write
5056000
heap
page read and write
5BEA000
heap
page read and write
4B09000
heap
page read and write
5485000
heap
page read and write
5BBE000
heap
page read and write
4B00000
heap
page read and write
4E3F000
heap
page read and write
4B00000
heap
page read and write
4E35000
heap
page read and write
4AB3000
heap
page read and write
4AAE000
heap
page read and write
4AAA000
heap
page read and write
4ED9000
heap
page read and write
4ACC000
heap
page read and write
5456000
heap
page read and write
5BF7000
heap
page read and write
4AA7000
heap
page read and write
4F03000
heap
page read and write
4EA9000
heap
page read and write
4EB8000
heap
page read and write
47D1000
heap
page read and write
3B50000
direct allocation
page read and write
4AB8000
heap
page read and write
12A0000
unkown
page read and write
504B000
heap
page read and write
4AF9000
heap
page read and write
4F02000
heap
page read and write
4ACC000
heap
page read and write
4AE2000
heap
page read and write
5C14000
heap
page read and write
4AA4000
heap
page read and write
550000
unkown
page write copy
544A000
heap
page read and write
5056000
heap
page read and write
4E43000
heap
page read and write
5C09000
heap
page read and write
4E66000
heap
page read and write
4F48000
heap
page read and write
4B0D000
heap
page read and write
4A9D000
heap
page read and write
19D000
stack
page read and write
4D91000
heap
page read and write
4AB7000
heap
page read and write
5B3C000
heap
page read and write
4AA6000
heap
page read and write
4EAF000
heap
page read and write
4A9B000
heap
page read and write
4F10000
heap
page read and write
1540000
direct allocation
page read and write
4AB1000
heap
page read and write
4ABC000
heap
page read and write
5D0D000
heap
page read and write
4E95000
heap
page read and write
4AC0000
heap
page read and write
4AAE000
heap
page read and write
5053000
heap
page read and write
4F3A000
heap
page read and write
4AA8000
heap
page read and write
4A9A000
heap
page read and write
4F51000
heap
page read and write
5B64000
heap
page read and write
5BDB000
heap
page read and write
4AD3000
heap
page read and write
12D8000
unkown
page execute and write copy
4E65000
heap
page read and write
4EC9000
heap
page read and write
5053000
heap
page read and write
4AA6000
heap
page read and write
4A9B000
heap
page read and write
5054000
heap
page read and write
5C89000
heap
page read and write
401000
unkown
page execute read
4AA5000
heap
page read and write
4AA6000
heap
page read and write
4FBE000
heap
page read and write
5492000
heap
page read and write
4DE0000
heap
page read and write
4A9D000
heap
page read and write
4ECF000
heap
page read and write
5031000
heap
page read and write
324A000
heap
page read and write
5080000
heap
page read and write
4EAF000
heap
page read and write
12D8000
unkown
page execute and write copy
4E75000
heap
page read and write
4D9A000
heap
page read and write
4E90000
heap
page read and write
4548000
heap
page read and write
4A99000
heap
page read and write
4A9D000
heap
page read and write
4E41000
heap
page read and write
4B00000
heap
page read and write
4AA4000
heap
page read and write
4F0B000
heap
page read and write
10000000
direct allocation
page execute and read and write
4EB5000
heap
page read and write
5D2C000
heap
page read and write
5A840000
direct allocation
page read and write
4AB9000
heap
page read and write
4B00000
heap
page read and write
5075000
heap
page read and write
5063000
heap
page read and write
5063000
heap
page read and write
4A9A000
heap
page read and write
4AB5000
heap
page read and write
5441000
heap
page read and write
4B00000
heap
page read and write
5475000
heap
page read and write
1287000
unkown
page write copy
4AB4000
heap
page read and write
4AA1000
heap
page read and write
400000
unkown
page readonly
4AB7000
heap
page read and write
4F19000
heap
page read and write
4AAD000
heap
page read and write
4E54000
heap
page read and write
4E83000
heap
page read and write
4A9D000
heap
page read and write
4E88000
heap
page read and write
5B82000
heap
page read and write
4EC4000
heap
page read and write
5056000
heap
page read and write
4AA2000
heap
page read and write
504F000
heap
page read and write
5037000
heap
page read and write
4AB6000
heap
page read and write
4AA0000
heap
page read and write
467A000
heap
page read and write
4B09000
heap
page read and write
1569000
direct allocation
page read and write
4E95000
heap
page read and write
4A9E000
heap
page read and write
4E85000
heap
page read and write
4AAA000
heap
page read and write
4AD8000
heap
page read and write
4AB7000
heap
page read and write
4A9A000
heap
page read and write
546C000
heap
page read and write
4B09000
heap
page read and write
4793000
heap
page read and write
4AAB000
heap
page read and write
5CF5000
heap
page read and write
4ADE000
heap
page read and write
3869000
heap
page read and write
4E9B000
heap
page read and write
4AB4000
heap
page read and write
4E22000
heap
page read and write
4F1E000
heap
page read and write
4ABB000
heap
page read and write
4AAF000
heap
page read and write
4E7E000
heap
page read and write
4E69000
heap
page read and write
5053000
heap
page read and write
5048000
heap
page read and write
4DB2000
heap
page read and write
455C000
heap
page read and write
5CD7000
heap
page read and write
4AAF000
heap
page read and write
4F44000
heap
page read and write
4AA2000
heap
page read and write
4D9A000
heap
page read and write
5C5B000
heap
page read and write
4A9A000
heap
page read and write
4B00000
heap
page read and write
4AA9000
heap
page read and write
5098000
heap
page read and write
5075000
heap
page read and write
5049000
heap
page read and write
5B7A000
heap
page read and write
5056000
heap
page read and write
4A9F000
heap
page read and write
4A98000
heap
page read and write
4DE8000
heap
page read and write
4AAA000
heap
page read and write
4AA2000
heap
page read and write
4A9D000
heap
page read and write
4AFD000
heap
page read and write
5071000
heap
page read and write
4AC1000
heap
page read and write
3888000
heap
page read and write
5C73000
heap
page read and write
4AB2000
heap
page read and write
5052000
heap
page read and write
4F29000
heap
page read and write
5065000
heap
page read and write
503F000
heap
page read and write
5098000
heap
page read and write
4AAE000
heap
page read and write
5062000
heap
page read and write
4A99000
heap
page read and write
1390000
heap
page read and write
4AB1000
heap
page read and write
4E66000
heap
page read and write
4AB1000
heap
page read and write
4AA9000
heap
page read and write
4DCF000
heap
page read and write
4AAE000
heap
page read and write
4F3F000
heap
page read and write
4AB7000
heap
page read and write
4EC0000
heap
page read and write
44F1000
heap
page read and write
4B00000
heap
page read and write
5062000
heap
page read and write
4AAF000
heap
page read and write
4AA1000
heap
page read and write
4AB7000
heap
page read and write
4E3F000
heap
page read and write
4ABA000
heap
page read and write
4E2B000
heap
page read and write
4B09000
heap
page read and write
5BF1000
heap
page read and write
4F2E000
heap
page read and write
506F000
heap
page read and write
4DFB000
heap
page read and write
4AD3000
heap
page read and write
12D3000
unkown
page read and write
5059000
heap
page read and write
4E7E000
heap
page read and write
4F59000
heap
page read and write
4E7E000
heap
page read and write
5063000
heap
page read and write
4AA4000
heap
page read and write
4E2B000
heap
page read and write
4E2C000
heap
page read and write
4AC4000
heap
page read and write
5062000
heap
page read and write
4ADD000
heap
page read and write
5B41000
heap
page read and write
5073000
heap
page read and write
4B00000
heap
page read and write
5C5D000
heap
page read and write
4E45000
heap
page read and write
4DBB000
heap
page read and write
3640000
heap
page read and write
4DCB000
heap
page read and write
4AB2000
heap
page read and write
4E06000
heap
page read and write
4E45000
heap
page read and write
4FD7000
heap
page read and write
4AF9000
heap
page read and write
45ED000
heap
page read and write
4ECF000
heap
page read and write
4F95000
heap
page read and write
4E76000
heap
page read and write
4B00000
heap
page read and write
4AF5000
heap
page read and write
4AAB000
heap
page read and write
5D24000
heap
page read and write
4E41000
heap
page read and write
5033000
heap
page read and write
5063000
heap
page read and write
3999000
heap
page read and write
5D8F000
heap
page read and write
5062000
heap
page read and write
4EF6000
heap
page read and write
5D6B000
heap
page read and write
4AFB000
heap
page read and write
4E6E000
heap
page read and write
4E95000
heap
page read and write
5063000
heap
page read and write
4EB8000
heap
page read and write
4AAE000
heap
page read and write
4AA4000
heap
page read and write
4AA9000
heap
page read and write
4A9A000
heap
page read and write
4E8B000
heap
page read and write
4EC4000
heap
page read and write
4B09000
heap
page read and write
4B0D000
heap
page read and write
5053000
heap
page read and write
550000
unkown
page readonly
4AA4000
heap
page read and write
5072000
heap
page read and write
4AB7000
heap
page read and write
4E65000
heap
page read and write
5062000
heap
page read and write
4F5E000
heap
page read and write
4D91000
heap
page read and write
4AD8000
heap
page read and write
4AA5000
heap
page read and write
4AA4000
heap
page read and write
4F9D000
heap
page read and write
4B00000
heap
page read and write
4E1F000
heap
page read and write
4A9D000
heap
page read and write
5058000
heap
page read and write
137B000
unkown
page execute and read and write
4A9D000
heap
page read and write
4AB3000
heap
page read and write
5B36000
heap
page read and write
4AC2000
heap
page read and write
4F34000
heap
page read and write
4AA9000
heap
page read and write
144E000
heap
page read and write
4AA5000
heap
page read and write
4B09000
heap
page read and write
4B00000
heap
page read and write
4AA4000
heap
page read and write
4A99000
heap
page read and write
4AA8000
heap
page read and write
5044000
heap
page read and write
1371000
unkown
page write copy
4AB9000
heap
page read and write
4E67000
heap
page read and write
5BE5000
heap
page read and write
4AA4000
heap
page read and write
4B00000
heap
page read and write
4E35000
heap
page read and write
4DD9000
heap
page read and write
5031000
heap
page read and write
5466000
heap
page read and write
5062000
heap
page read and write
4ACA000
heap
page read and write
4AA1000
heap
page read and write
4ABE000
heap
page read and write
5062000
heap
page read and write
4AB5000
heap
page read and write
4A9B000
heap
page read and write
4ABE000
heap
page read and write
333C000
heap
page read and write
5073000
heap
page read and write
504B000
heap
page read and write
5075000
heap
page read and write
5C63000
heap
page read and write
4AB8000
heap
page read and write
4AA5000
heap
page read and write
543B000
heap
page read and write
4E65000
heap
page read and write
5D60000
heap
page read and write
5B98000
heap
page read and write
5A84C000
direct allocation
page read and write
5064000
heap
page read and write
4A99000
heap
page read and write
5C04000
heap
page read and write
4AAE000
heap
page read and write
4EA0000
heap
page read and write
1371000
unkown
page write copy
4DB2000
heap
page read and write
5BDD000
heap
page read and write
4ED6000
heap
page read and write
16F0000
heap
page read and write
4FCB000
heap
page read and write
4B0E000
heap
page read and write
4DE4000
heap
page read and write
4ED0000
heap
page read and write
4AAA000
heap
page read and write
4E75000
heap
page read and write
4EC1000
heap
page read and write
4AA0000
heap
page read and write
4AAD000
heap
page read and write
5059000
heap
page read and write
4E95000
heap
page read and write
5062000
heap
page read and write
4E95000
heap
page read and write
4A9D000
heap
page read and write
386F000
heap
page read and write
5B5C000
heap
page read and write
4AAE000
heap
page read and write
4A98000
heap
page read and write
4AB7000
heap
page read and write
5049000
heap
page read and write
5465000
heap
page read and write
4AA4000
heap
page read and write
1557000
direct allocation
page read and write
4A9A000
heap
page read and write
4AA9000
heap
page read and write
4A9A000
heap
page read and write
4A9A000
heap
page read and write
4DE0000
heap
page read and write
4AAD000
heap
page read and write
4AA2000
heap
page read and write
5062000
heap
page read and write
3110000
direct allocation
page read and write
4AB7000
heap
page read and write
4AAF000
heap
page read and write
4A9B000
heap
page read and write
4DE1000
heap
page read and write
4E69000
heap
page read and write
5C4F000
heap
page read and write
4A9C000
heap
page read and write
4AB5000
heap
page read and write
313E000
heap
page read and write
5A818000
direct allocation
page read and write
4AB7000
heap
page read and write
5E30000
heap
page read and write
4ACA000
heap
page read and write
4B0D000
heap
page read and write
4AB3000
heap
page read and write
12D8000
unkown
page execute read
3000000
direct allocation
page read and write
50AC000
heap
page read and write
5C8F000
heap
page read and write
4EEF000
heap
page read and write
5D13000
heap
page read and write
5BEF000
heap
page read and write
5D35000
heap
page read and write
4A9D000
heap
page read and write
401000
unkown
page execute and write copy
4AB1000
heap
page read and write
550000
unkown
page write copy
4AD6000
heap
page read and write
4DB3000
heap
page read and write
5053000
heap
page read and write
3131000
heap
page read and write
4E67000
heap
page read and write
4EE6000
heap
page read and write
4A9A000
heap
page read and write
4AAE000
heap
page read and write
4A9A000
heap
page read and write
4F57000
heap
page read and write
3110000
direct allocation
page read and write
5B46000
heap
page read and write
1440000
heap
page read and write
5031000
heap
page read and write
506B000
heap
page read and write
5C3F000
heap
page read and write
4DEB000
heap
page read and write
5BA7000
heap
page read and write
5052000
heap
page read and write
4B0E000
heap
page read and write
4FA4000
heap
page read and write
4AB7000
heap
page read and write
6830000
heap
page read and write
5DA6000
heap
page read and write
4F2E000
heap
page read and write
4A98000
heap
page read and write
4E95000
heap
page read and write
5062000
heap
page read and write
5053000
heap
page read and write
5053000
heap
page read and write
4B00000
heap
page read and write
4AA0000
heap
page read and write
4AAE000
heap
page read and write
4AB1000
heap
page read and write
4AA9000
heap
page read and write
4DE8000
heap
page read and write
4D91000
heap
page read and write
4E30000
heap
page read and write
4AAB000
heap
page read and write
4F1D000
heap
page read and write
4E06000
heap
page read and write
5480000
heap
page read and write
4492000
heap
page read and write
4DB2000
heap
page read and write
4ECF000
heap
page read and write
5075000
heap
page read and write
4E7E000
heap
page read and write
4E2B000
heap
page read and write
4F1D000
heap
page read and write
4AB7000
heap
page read and write
5095000
heap
page read and write
4F74000
heap
page read and write
4ED8000
heap
page read and write
F50000
unkown
page readonly
4E48000
heap
page read and write
4F9F000
heap
page read and write
543B000
heap
page read and write
4A9A000
heap
page read and write
5043000
heap
page read and write
4AA0000
heap
page read and write
4E95000
heap
page read and write
7036000
heap
page read and write
5457000
heap
page read and write
457C000
heap
page read and write
4B07000
heap
page read and write
4AAF000
heap
page read and write
4AB2000
heap
page read and write
4DE8000
heap
page read and write
4EAF000
heap
page read and write
4AB8000
heap
page read and write
4A9D000
heap
page read and write
5D17000
heap
page read and write
507D000
heap
page read and write
504C000
heap
page read and write
4AA4000
heap
page read and write
4AA4000
heap
page read and write
4AC1000
heap
page read and write
462C000
heap
page read and write
4E89000
heap
page read and write
4ADA000
heap
page read and write
4B00000
heap
page read and write
4B00000
heap
page read and write
4ACF000
heap
page read and write
4AB1000
heap
page read and write
4F19000
heap
page read and write
5053000
heap
page read and write
30D0000
heap
page read and write
4ACF000
heap
page read and write
5053000
heap
page read and write
5C19000
heap
page read and write
4ACF000
heap
page read and write
4D92000
heap
page read and write
5062000
heap
page read and write
4AB4000
heap
page read and write
1701000
heap
page read and write
4DDE000
heap
page read and write
4AB7000
heap
page read and write
4ECB000
heap
page read and write
4AFC000
heap
page read and write
4AAC000
heap
page read and write
4DDD000
heap
page read and write
4A9F000
heap
page read and write
5062000
heap
page read and write
4E92000
heap
page read and write
4AAF000
heap
page read and write
4AB0000
heap
page read and write
4AB7000
heap
page read and write
4AAA000
heap
page read and write
5088000
heap
page read and write
5B8F000
heap
page read and write
5031000
heap
page read and write
4AA6000
heap
page read and write
1630000
direct allocation
page read and write
4AA6000
heap
page read and write
5D71000
heap
page read and write
31DA000
heap
page read and write
4E2B000
heap
page read and write
4E86000
heap
page read and write
4A9A000
heap
page read and write
4A9F000
heap
page read and write
4AAF000
heap
page read and write
4E95000
heap
page read and write
4F0B000
heap
page read and write
5052000
heap
page read and write
4AAB000
heap
page read and write
1727000
heap
page read and write
4E7D000
heap
page read and write
4ADE000
heap
page read and write
4ACC000
heap
page read and write
4A9A000
heap
page read and write
5061000
heap
page read and write
5CCB000
heap
page read and write
4DE8000
heap
page read and write
5062000
heap
page read and write
4A9F000
heap
page read and write
4AA1000
heap
page read and write
4AAB000
heap
page read and write
4AAB000
heap
page read and write
4AA4000
heap
page read and write
4AB2000
heap
page read and write
4AAE000
heap
page read and write
4E74000
heap
page read and write
4ED8000
heap
page read and write
4E6C000
heap
page read and write
4AE7000
heap
page read and write
4580000
heap
page read and write
4ABE000
heap
page read and write
4DFB000
heap
page read and write
46CE000
heap
page read and write
4B00000
heap
page read and write
4ED4000
heap
page read and write
4AB3000
heap
page read and write
4AAE000
heap
page read and write
4AA2000
heap
page read and write
4AFC000
heap
page read and write
4AB5000
heap
page read and write
4A9E000
heap
page read and write
4E76000
heap
page read and write
5A82C000
direct allocation
page read and write
401000
unkown
page execute and write copy
4AFC000
heap
page read and write
5077000
heap
page read and write
5B3E000
heap
page read and write
545D000
heap
page read and write
4E7C000
heap
page read and write
5031000
heap
page read and write
4B00000
heap
page read and write
4AB8000
heap
page read and write
4AC0000
heap
page read and write
4ECB000
heap
page read and write
4AA9000
heap
page read and write
4F62000
heap
page read and write
5059000
heap
page read and write
4AB7000
heap
page read and write
3140000
heap
page read and write
4E16000
heap
page read and write
5C68000
heap
page read and write
3866000
heap
page read and write
5050000
heap
page read and write
5062000
heap
page read and write
4DDA000
heap
page read and write
4A98000
heap
page read and write
5D2E000
heap
page read and write
5B6C000
heap
page read and write
4FAE000
heap
page read and write
5B67000
heap
page read and write
4E45000
heap
page read and write
5052000
heap
page read and write
4AA6000
heap
page read and write
4E16000
heap
page read and write
4AB6000
heap
page read and write
4548000
heap
page read and write
4AB1000
heap
page read and write
5053000
heap
page read and write
4B00000
heap
page read and write
4E41000
heap
page read and write
5059000
heap
page read and write
503E000
heap
page read and write
503E000
heap
page read and write
4F65000
heap
page read and write
4E9B000
heap
page read and write
4AAE000
heap
page read and write
46B8000
heap
page read and write
5C93000
heap
page read and write
4AA9000
heap
page read and write
5C43000
heap
page read and write
4A99000
heap
page read and write
4E30000
heap
page read and write
5075000
heap
page read and write
4AA2000
heap
page read and write
4AB4000
heap
page read and write
4AC9000
heap
page read and write
4B00000
heap
page read and write
4AAE000
heap
page read and write
4AA1000
heap
page read and write
4FEA000
heap
page read and write
544E000
heap
page read and write
5058000
heap
page read and write
4A98000
heap
page read and write
5D02000
heap
page read and write
5C79000
heap
page read and write
4F77000
heap
page read and write
4AA5000
heap
page read and write
4EC1000
heap
page read and write
550000
unkown
page write copy
4EA2000
heap
page read and write
5063000
heap
page read and write
4AB8000
heap
page read and write
5062000
heap
page read and write
4E8B000
heap
page read and write
4DEE000
heap
page read and write
5053000
heap
page read and write
4AB1000
heap
page read and write
4AB3000
heap
page read and write
4E95000
heap
page read and write
5063000
heap
page read and write
5452000
heap
page read and write
4AD8000
heap
page read and write
5058000
heap
page read and write
1490000
direct allocation
page read and write
645D000
heap
page read and write
4AA0000
heap
page read and write
4E65000
heap
page read and write
4AC8000
heap
page read and write
4AA1000
heap
page read and write
4AA7000
heap
page read and write
4ABB000
heap
page read and write
4B0D000
heap
page read and write
4E9B000
heap
page read and write
4A99000
heap
page read and write
4AAE000
heap
page read and write
4A9B000
heap
page read and write
4E7A000
heap
page read and write
4F26000
heap
page read and write
4AAE000
heap
page read and write
4ED4000
heap
page read and write
503E000
heap
page read and write
1540000
heap
page read and write
4EFF000
heap
page read and write
4AA4000
heap
page read and write
4AFC000
heap
page read and write
5C4A000
heap
page read and write
4AA2000
heap
page read and write
5052000
heap
page read and write
3260000
direct allocation
page read and write
4DB2000
heap
page read and write
5056000
heap
page read and write
50B6000
heap
page read and write
5052000
heap
page read and write
4510000
heap
page read and write
4B0D000
heap
page read and write
5075000
heap
page read and write
637A000
heap
page read and write
3240000
heap
page read and write
4DEE000
heap
page read and write
4AB7000
heap
page read and write
1381000
unkown
page execute and write copy
5053000
heap
page read and write
4AA6000
heap
page read and write
5475000
heap
page read and write
4DEB000
heap
page read and write
4AA3000
heap
page read and write
5039000
heap
page read and write
4AA0000
heap
page read and write
4E4F000
heap
page read and write
597A000
heap
page read and write
4A99000
heap
page read and write
5BFE000
heap
page read and write
4E7B000
heap
page read and write
4AA2000
heap
page read and write
There are 1440 hidden memdumps, click here to show them.