IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\.cache\selenium\chromedriver\win32\114.0.5735.90\chromedriver.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\.cache\selenium\selenium-manager.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_elementtree.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\common\linux\selenium-manager
ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), static-pie linked, stripped
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\common\macos\selenium-manager
Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE|HAS_TLV_DESCRIPTORS>
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\common\mutation-listener.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\common\windows\selenium-manager.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\firefox\webdriver_prefs.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\remote\findElements.js
ASCII text, with very long lines (2269)
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\remote\getAttribute.js
ASCII text, with very long lines (1587)
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\remote\isDisplayed.js
ASCII text, with very long lines (1724)
dropped
C:\Users\user\AppData\Local\Temp\_MEI13642\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\selenium-managerIWMEOk\chromedriver_win32.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\BrowserMetrics\BrowserMetrics-6718FB28-878.pma
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Crashpad\settings.dat
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\491efee3-0538-4323-bcde-70682a4c0db8.tmp
very short file (no magic)
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Affiliation Database
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 5
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Cache\Cache_Data\data_1
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Cache\Cache_Data\data_2
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Cache\Cache_Data\data_3
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Code Cache\js\index
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Code Cache\wasm\index
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\DawnCache\data_1
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\DawnCache\data_2
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\DawnCache\data_3
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Rules\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Rules\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Scripts\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension State\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension State\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\GPUCache\data_1
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\GPUCache\data_2
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\GPUCache\data_3
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\History-journal
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\8f1f3396-203a-4db9-bd11-316da6732c0a.tmp
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\Reporting and NEL-journal
SQLite Rollback Journal
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\SCT Auditing Pending Reports~RF3aa89.TMP (copy)
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Network\f80e5f49-dde9-4727-88b2-7a2e069f26ee.tmp
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Preferences
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Session Storage\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Session Storage\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Site Characteristics Database\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Visited Links
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 50, cookie 0x21, schema 4, UTF-8, version-valid-for 2
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\DevToolsActivePort
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GrShaderCache\data_1
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GrShaderCache\data_2
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GrShaderCache\data_3
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GraphiteDawnCache\data_1
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GraphiteDawnCache\data_2
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GraphiteDawnCache\data_3
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Last Version
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Local State
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Local State~RF3a672.TMP (copy)
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\ShaderCache\data_1
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\ShaderCache\data_2
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\ShaderCache\data_3
data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\Variations
JSON data
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\chrome_debug.log
ASCII text
dropped
C:\Windows\SystemTemp\scoped_dir5588_1830855051\e1a8b6e0-70cb-49a2-adb2-7001ac8236cc.tmp
JSON data
dropped
\Device\ConDrv
JSON data
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 129 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\common\windows\selenium-manager.exe
C:\Users\user\AppData\Local\Temp\_MEI13642\selenium\webdriver\common\windows\selenium-manager.exe --browser chrome --output json
C:\Windows\SysWOW64\cmd.exe
"cmd" /v/c "wmic os get osarchitecture"
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic os get osarchitecture
C:\Windows\SysWOW64\cmd.exe
"cmd" /v/c "set PFILES=%PROGRAMFILES: (x86)=%&& wmic datafile where name='!PFILES:\=\\!\\Google\\Chrome\\Application\\chrome.exe' get Version /value"
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic datafile where name='C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe' get Version /value
C:\Windows\SysWOW64\cmd.exe
"cmd" /v/c "chromedriver --version"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Users\user\.cache\selenium\chromedriver\win32\114.0.5735.90\chromedriver.exe
C:\Users\user\.cache\selenium\chromedriver\win32\114.0.5735.90\chromedriver.exe --port=49712
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --allow-pre-commit-input --disable-background-networking --disable-backgrounding-occluded-windows --disable-client-side-phishing-detection --disable-default-apps --disable-hang-monitor --disable-popup-blocking --disable-prompt-on-repost --disable-sync --enable-automation --enable-logging --log-level=0 --no-first-run --no-service-autorun --password-store=basic --remote-debugging-port=0 --test-type=webdriver --use-mock-keychain --user-data-dir="C:\Windows\SystemTemp\scoped_dir5588_1830855051" data:,
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --enable-logging --log-level=0 --user-data-dir="C:\Windows\SystemTemp\scoped_dir5588_1830855051" --enable-logging --log-level=0 --mojo-platform-channel-handle=2084 --field-trial-handle=2036,i,13163750102934017534,8503344207815821219,262144 /prefetch:8
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/SeleniumHQ/selenium/wiki/JsonWireProtocol.
unknown
https://dns10.quad9.net/dns-query
unknown
https://w3c.github.io/webauthn/#credential-parameters.
unknown
https://doh.familyshield.opendns.com/dns-query
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
https://doh.cleanbrowsing.org/doh/security-filter
unknown
https://public.dns.iij.jp/
unknown
http://repository.swisssign.com/0
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://bit.ly/3rpDuEX.WebBundleURLLoaderFactory::OnResponseParsedX-Content-Type-OptionsInvalid
unknown
http://127.0.0.1:4444/wd/hub
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://chromedriver.stora
unknown
https://doh.cox.net/dns-query
unknown
https://www.nic.cz/odvr/
unknown
https://dns11.quad9.net/dns-query
unknown
https://www.selenium.dev/documentation/webdriver/troubleshooting/errors0
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
http://httpswsswsdevtools/browser/json/versionjson/listdevtools://chrome://print/..
unknown
https://chromedriver.chromium.org/homeg
unknown
https://www.nic.cz/odvr/CZ.NIC
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://www.selenium.dev/downloads/
unknown
https://chromium.googlesource.com/chromium/src/
unknown
https://w3c.github.io/webdriver/#dfn-
unknown
http://json.org
unknown
https://public.dns.iij.jp/IIJ
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://github.com/clap-rs/clap/issuesC:
unknown
https://github.com/mozilla/geckodriver/releases/
unknown
https://cleanbrowsing.org/privacyCleanBrowsing
unknown
https://nextdns.io/privacy
unknown
http://127.0.0.1:02
unknown
https://w3c.github.io/webdriver/#dfn-browser-version.
unknown
https://bit.ly/3rpDuEX.
unknown
https://alekberg.net/privacyalekberg.net
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxyb
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://p2p.binance.com/ru/trade/sell/USDT?fiat=RUB&payment=TinkoffNew&asset=USDTz9https://p2p.binan
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/ziglang/zig-bootstrap
unknown
https://developers.google.com/speed/public-dns/privacyGoogle
unknown
https://chrome.cloudflare-dns.com/dns-queryone.one.one.one1dot1dot1dot1.cloudflare-dns.com1.1.1.11.0
unknown
http://www.w3.or
unknown
https://httpbin.org/
unknown
https://dns64.dns.google/dns-query
unknown
https://w3c.github.io/webdriver/#timeouts.
unknown
https://doh.opendns.com/dns-query
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://p2p.binance.com/ru/trade/TinkoffNew/USDT?fiat=RUB
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539#
unknown
https://github.com/SeleniumHQ/selenium/wiki/DesiredCapabilities
unknown
https://dns.quad9.net/dns-query
unknown
http://certificates.godaddy.com/repository/gd_intermediate.crt0
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
http://s..
unknown
http://report-example.test/test
unknown
https://dns.sb/privacy/DNS.SBhttps://doh.dns.sb/dns-query
unknown
http://127.0.0.1:
unknown
https://chromedriver.chromium.org/home
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://public.dns.iij.jp/dns-query
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.iana.org
unknown
https://p2p.binance.com/ru/trade/sell/USDT?fiat=RUB&payment=TinkoffNew&asset=USDT
unknown
https://google.com/mail
unknown
http://www.accv.es00
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
https://alekberg.net/privacy
unknown
https://dnsnl.alekberg.net/dns-query
unknown
https://tools.ietf.org/html/rfc3492)
unknown
https://dns11.quad9.net/dns-querydns11.quad9.net9.9.9.11149.112.112.112620:fe::112620:fe::fe:11
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
http://html4/loose.dtd
unknown
https://mahler:8092/site-updates.py
unknown
http://schemas.mi
unknown
https://doh.cox.net/dns-querydot.cox.net68.105.28.1168.105.28.122001:578:3f::30
unknown
http://127.0.0.1:4444
unknown
https://github.com/SeleniumHQ/selenium/wiki/JsonWireProtocol
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://chromium.dns.nextdns.io
unknown
https://myproxy.net:8080)TIMEOUTTimeout
unknown
https://w3c.github.io/webdriver/#dfn-platform-name.
unknown
http://clients3.google.com/cert_upload_json
unknown
https://chromedevtools.github.io/devtools-protocol/
unknown
http://www.firmaprofesional.com/cps0
unknown
https://dns.google/dns-query
unknown
https://p2p.binance.com/ru/trade/sell/USDT?fiat=RUB&payment=TinkoffNew&asset=USDTd
unknown
http://certificates.godaddy.com/repository100.
unknown
http://www.w3.orf
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://www.selenium.dev/documentation/webdriver/troubleshooting/errors
unknown
http://.css
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
16200243000
heap
page read and write
1EBAD45A000
heap
page read and write
1620029F000
heap
page read and write
52910000
direct allocation
page read and write
162002C3000
heap
page read and write
16200D6D000
heap
page read and write
1BD98980000
heap
page read and write
16200DD9000
heap
page read and write
EF6000
heap
page read and write
1620023E000
heap
page read and write
16200260000
heap
page read and write
37D3000
heap
page read and write
3AF8000
heap
page read and write
16200A10000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
16200260000
heap
page read and write
16203070000
direct allocation
page read and write
184000
heap
page read and write
16200E25000
heap
page read and write
37A0000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
1620028A000
heap
page read and write
16200ED4000
heap
page read and write
1620020C000
heap
page read and write
2C28000
heap
page read and write
52828000
direct allocation
page read and write
7FFDA5490000
unkown
page readonly
343E000
stack
page read and write
8B5C000
heap
page read and write
162002BE000
heap
page read and write
2601000
heap
page read and write
16200EB7000
heap
page read and write
EDB000
heap
page read and write
16200FF0000
direct allocation
page read and write
528E8000
direct allocation
page read and write
16200D41000
heap
page read and write
281D000
heap
page read and write
7FFDA3C07000
unkown
page readonly
1EBAD467000
heap
page read and write
16200DFF000
heap
page read and write
32E4000
heap
page read and write
1620026B000
heap
page read and write
6A393BF000
stack
page read and write
36D0000
trusted library allocation
page read and write
56B0000
heap
page read and write
16200EB7000
heap
page read and write
7FFDA3433000
unkown
page readonly
86BF000
stack
page read and write
2601000
heap
page read and write
16202AA1000
heap
page read and write
162002CA000
heap
page read and write
16200EB7000
heap
page read and write
16202AC6000
heap
page read and write
16200D20000
heap
page read and write
1620029E000
heap
page read and write
D8000
stack
page read and write
2601000
heap
page read and write
5291C000
direct allocation
page read and write
16200A2B000
heap
page read and write
16200E0A000
heap
page read and write
27AC000
heap
page read and write
16200D47000
heap
page read and write
52870000
direct allocation
page read and write
52941000
direct allocation
page read and write
16200E24000
heap
page read and write
EDC000
heap
page read and write
1EBAD45D000
heap
page read and write
1EBAD45D000
heap
page read and write
7FFD93EDF000
unkown
page read and write
1EBAD45D000
heap
page read and write
7FFDA4161000
unkown
page execute read
184000
heap
page read and write
1EBAD45A000
heap
page read and write
1620027C000
heap
page read and write
2601000
heap
page read and write
16202B0A000
heap
page read and write
3700000
heap
page read and write
ED8000
heap
page read and write
34C8000
heap
page read and write
8B7C000
heap
page read and write
1620025D000
heap
page read and write
5B90000
heap
page readonly
34B5000
heap
page read and write
46EF000
stack
page read and write
1620025A000
heap
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
27A0000
heap
page read and write
1EBAD46C000
heap
page read and write
35D1000
heap
page read and write
8367000
heap
page read and write
16200D45000
heap
page read and write
184000
heap
page read and write
1EBAD45A000
heap
page read and write
EDB000
heap
page read and write
16200A61000
heap
page read and write
184000
heap
page read and write
170D000
unkown
page read and write
32E4000
heap
page read and write
162002C3000
heap
page read and write
16200225000
heap
page read and write
47F4000
heap
page read and write
3483000
heap
page read and write
7FFD93E7E000
unkown
page readonly
1620028E000
heap
page read and write
16200D6D000
heap
page read and write
2601000
heap
page read and write
5B3F000
stack
page read and write
32E4000
heap
page read and write
16202AF6000
heap
page read and write
2C2A000
heap
page read and write
3BE9000
heap
page read and write
3BDA000
heap
page read and write
16200A37000
heap
page read and write
162001E4000
heap
page read and write
EEE000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
1620026A000
heap
page read and write
EB5000
heap
page read and write
1BD988F0000
heap
page read and write
32E4000
heap
page read and write
16200EDA000
heap
page read and write
32E4000
heap
page read and write
16200A41000
heap
page read and write
16200D2A000
heap
page read and write
16200D5E000
heap
page read and write
2D42000
heap
page read and write
CA9000
unkown
page readonly
16203074000
direct allocation
page read and write
7FFDA342C000
unkown
page read and write
184000
heap
page read and write
52908000
direct allocation
page read and write
7FFDA3391000
unkown
page execute read
32E4000
heap
page read and write
16200A18000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
EBE000
heap
page read and write
16200D5C000
heap
page read and write
16200D6D000
heap
page read and write
16202AA8000
heap
page read and write
16202E90000
direct allocation
page read and write
EEA000
heap
page read and write
1620026B000
heap
page read and write
83DA000
heap
page read and write
7FFD9463B000
unkown
page write copy
2815000
heap
page read and write
ED5000
heap
page read and write
7FFDA3350000
unkown
page readonly
32E4000
heap
page read and write
35D1000
heap
page read and write
32E4000
heap
page read and write
16200A2B000
heap
page read and write
1620026B000
heap
page read and write
1620027E000
heap
page read and write
16200D7D000
heap
page read and write
185000
heap
page read and write
16200AE1000
heap
page read and write
32E4000
heap
page read and write
16200DE0000
heap
page read and write
8B6C000
heap
page read and write
66C000
stack
page read and write
7FFD94169000
unkown
page readonly
184000
heap
page read and write
16200A3D000
heap
page read and write
34B3000
heap
page read and write
7FFD93E82000
unkown
page readonly
8B6C000
heap
page read and write
16200A38000
heap
page read and write
16202FEC000
direct allocation
page read and write
2601000
heap
page read and write
16200D5D000
heap
page read and write
6A38DD3000
stack
page read and write
7FFDA3AF4000
unkown
page readonly
F10000
heap
page read and write
16200256000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
5BD8000
heap
page read and write
16202AC5000
heap
page read and write
7FFD93E32000
unkown
page readonly
2601000
heap
page read and write
1422000
unkown
page readonly
52914000
direct allocation
page read and write
16200A2C000
heap
page read and write
32E4000
heap
page read and write
16200ABF000
heap
page read and write
1620028A000
heap
page read and write
E9E000
heap
page read and write
1EBAD455000
heap
page read and write
16200E11000
heap
page read and write
16200ABD000
heap
page read and write
16200AD9000
heap
page read and write
2601000
heap
page read and write
16200DC1000
heap
page read and write
16200D30000
heap
page read and write
16200A0E000
heap
page read and write
9B000
stack
page read and write
16200226000
heap
page read and write
7FFDA3428000
unkown
page write copy
3BF0000
heap
page read and write
16200A37000
heap
page read and write
F04000
heap
page read and write
37E0000
heap
page read and write
16200A1E000
heap
page read and write
1620024F000
heap
page read and write
52830000
direct allocation
page read and write
16200D59000
heap
page read and write
1EBAD380000
heap
page readonly
32E4000
heap
page read and write
184000
heap
page read and write
284E000
heap
page read and write
16200231000
heap
page read and write
7FFDA4DAB000
unkown
page read and write
184000
heap
page read and write
E7A000
heap
page read and write
1EBAD45D000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
796E000
stack
page read and write
1EBAD3A0000
heap
page read and write
16200DDF000
heap
page read and write
7FFDA3FD1000
unkown
page execute read
184000
heap
page read and write
16200D21000
heap
page read and write
16200D7D000
heap
page read and write
16200EEA000
heap
page read and write
16200D09000
heap
page read and write
16200EEC000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
16200D45000
heap
page read and write
2823000
heap
page read and write
34B3000
heap
page read and write
1620028A000
heap
page read and write
32E4000
heap
page read and write
7FF6DCD91000
unkown
page execute read
16200A60000
heap
page read and write
3791000
heap
page read and write
7FFDA4172000
unkown
page readonly
1EBAD45A000
heap
page read and write
52880000
direct allocation
page read and write
2700000
trusted library allocation
page read and write
16200EF0000
direct allocation
page read and write
184000
heap
page read and write
2601000
heap
page read and write
7FFDA3465000
unkown
page readonly
47F8000
heap
page read and write
7FFD94658000
unkown
page read and write
16200AC5000
heap
page read and write
16200A50000
heap
page read and write
7FF6DCDBA000
unkown
page readonly
16200E11000
heap
page read and write
2601000
heap
page read and write
F64000
heap
page read and write
2C29000
heap
page read and write
1620027E000
heap
page read and write
162002D0000
direct allocation
page read and write
16200268000
heap
page read and write
16200D33000
heap
page read and write
F10000
heap
page read and write
2601000
heap
page read and write
1620023C000
heap
page read and write
ED5000
heap
page read and write
16200A3D000
heap
page read and write
EC7000
heap
page read and write
F3E000
heap
page read and write
162002C9000
heap
page read and write
3452000
heap
page read and write
1620026A000
heap
page read and write
36E0000
heap
page read and write
52900000
direct allocation
page read and write
F32000
heap
page read and write
184000
heap
page read and write
7FFD94654000
unkown
page read and write
16200A29000
heap
page read and write
283D000
heap
page read and write
16200D6D000
heap
page read and write
16200280000
heap
page read and write
2601000
heap
page read and write
2C2D000
heap
page read and write
281D000
heap
page read and write
2601000
heap
page read and write
422C3FF000
unkown
page read and write
16200A73000
heap
page read and write
32E4000
heap
page read and write
F6C000
heap
page read and write
16202B0A000
heap
page read and write
1620028A000
heap
page read and write
16200D43000
heap
page read and write
F32000
heap
page read and write
1EBAD460000
heap
page read and write
EEC000
heap
page read and write
7FFD9419A000
unkown
page readonly
54EE000
stack
page read and write
5B56000
heap
page read and write
2601000
heap
page read and write
528F4000
direct allocation
page read and write
2601000
heap
page read and write
162002AE000
heap
page read and write
2601000
heap
page read and write
EDD000
heap
page read and write
27B0000
heap
page read and write
2601000
heap
page read and write
85BE000
stack
page read and write
16200267000
heap
page read and write
7FFD9420E000
unkown
page write copy
EDF000
heap
page read and write
EB6000
heap
page read and write
16200256000
heap
page read and write
1620020F000
heap
page read and write
16200E06000
heap
page read and write
ED9000
heap
page read and write
7FFDA5496000
unkown
page readonly
16200236000
heap
page read and write
1EBAD45A000
heap
page read and write
F3A000
heap
page read and write
16200ECE000
heap
page read and write
184000
heap
page read and write
7FFDA4160000
unkown
page readonly
EB7000
heap
page read and write
16200230000
heap
page read and write
16200D40000
heap
page read and write
16202A99000
heap
page read and write
3BE7000
heap
page read and write
7FF6DCDCD000
unkown
page read and write
162007B0000
direct allocation
page read and write
16200A2D000
heap
page read and write
2601000
heap
page read and write
F24000
heap
page read and write
16200A0E000
heap
page read and write
16200A60000
heap
page read and write
16200AD5000
heap
page read and write
2878000
heap
page read and write
16200ADA000
heap
page read and write
1620028A000
heap
page read and write
1620028A000
heap
page read and write
32E4000
heap
page read and write
34C8000
heap
page read and write
1620024F000
heap
page read and write
357E000
stack
page read and write
EF9000
heap
page read and write
184000
heap
page read and write
EC1000
heap
page read and write
2C26000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
2C31000
heap
page read and write
32E4000
heap
page read and write
7FFDA3C13000
unkown
page read and write
54A0000
heap
page read and write
472E000
stack
page read and write
34C8000
heap
page read and write
7FFD94233000
unkown
page readonly
1620300C000
direct allocation
page read and write
162002AE000
heap
page read and write
171B000
unkown
page execute read
16200278000
heap
page read and write
3BE0000
heap
page read and write
32E4000
heap
page read and write
16202A60000
direct allocation
page read and write
396C000
heap
page read and write
16200ECF000
heap
page read and write
2601000
heap
page read and write
3483000
heap
page read and write
184000
heap
page read and write
BA0000
unkown
page readonly
16202AA2000
heap
page read and write
52838000
direct allocation
page read and write
52804000
direct allocation
page read and write
1620029B000
heap
page read and write
7FFDA343A000
unkown
page readonly
16200110000
heap
page readonly
16203064000
direct allocation
page read and write
7FF6DCDCD000
unkown
page write copy
2601000
heap
page read and write
16200A7B000
heap
page read and write
16202B34000
heap
page read and write
27E0000
heap
page read and write
32E4000
heap
page read and write
16200273000
heap
page read and write
16200EEA000
heap
page read and write
2601000
heap
page read and write
EE4000
heap
page read and write
1620025A000
heap
page read and write
1620029E000
heap
page read and write
162002C3000
heap
page read and write
EDA000
heap
page read and write
162002C0000
heap
page read and write
5C22000
heap
page read and write
3790000
heap
page read and write
7FFDA3AFB000
unkown
page read and write
184000
heap
page read and write
16202AF5000
heap
page read and write
16202AF4000
heap
page read and write
2601000
heap
page read and write
162002B2000
heap
page read and write
1EBAD455000
heap
page read and write
2601000
heap
page read and write
3BE8000
heap
page read and write
1620028A000
heap
page read and write
16202FC8000
direct allocation
page read and write
F2D000
heap
page read and write
162002AA000
heap
page read and write
16200DF9000
heap
page read and write
162002AE000
heap
page read and write
7FFD94478000
unkown
page readonly
184000
heap
page read and write
16200227000
heap
page read and write
1411000
unkown
page readonly
16202AFA000
heap
page read and write
171D000
unkown
page execute read
2601000
heap
page read and write
184000
heap
page read and write
16202AB5000
heap
page read and write
1620029F000
heap
page read and write
16200273000
heap
page read and write
3BF1000
heap
page read and write
184000
heap
page read and write
16200D9C000
heap
page read and write
16200D6D000
heap
page read and write
16200274000
heap
page read and write
2601000
heap
page read and write
162002AE000
heap
page read and write
16200234000
heap
page read and write
162002C8000
heap
page read and write
184000
heap
page read and write
162002AE000
heap
page read and write
16200D6D000
heap
page read and write
5285C000
direct allocation
page read and write
2D4C000
heap
page read and write
32E4000
heap
page read and write
16200A2D000
heap
page read and write
16200A2B000
heap
page read and write
1620023C000
heap
page read and write
2601000
heap
page read and write
16200DAD000
heap
page read and write
32E4000
heap
page read and write
33FE000
stack
page read and write
F38000
heap
page read and write
2601000
heap
page read and write
7FFDA5491000
unkown
page execute read
16200249000
heap
page read and write
6A38DCA000
stack
page read and write
16202B0A000
heap
page read and write
528B8000
direct allocation
page read and write
47F1000
heap
page read and write
7FFDA3372000
unkown
page readonly
1620025D000
heap
page read and write
23EE000
stack
page read and write
16200D9A000
heap
page read and write
2601000
heap
page read and write
16200AD9000
heap
page read and write
1EBAD46A000
heap
page read and write
7C0000
heap
page read and write
16200237000
heap
page read and write
184000
heap
page read and write
6A38DED000
stack
page read and write
16200AC5000
heap
page read and write
5292C000
direct allocation
page read and write
16200DDF000
heap
page read and write
184000
heap
page read and write
16200A82000
heap
page read and write
16200DF9000
heap
page read and write
16200D45000
heap
page read and write
CA9000
unkown
page readonly
2601000
heap
page read and write
7FFD93EF0000
unkown
page readonly
F24000
heap
page read and write
162002BC000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
162002C9000
heap
page read and write
16200ADC000
heap
page read and write
162002AF000
heap
page read and write
7FFDA345E000
unkown
page read and write
16200E24000
heap
page read and write
180000
heap
page read and write
162002C6000
heap
page read and write
32E4000
heap
page read and write
16200A38000
heap
page read and write
16200AC2000
heap
page read and write
3794000
heap
page read and write
32E4000
heap
page read and write
E9E000
heap
page read and write
184000
heap
page read and write
2D46000
heap
page read and write
16200EDA000
heap
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
1EBAD45A000
heap
page read and write
F3E000
heap
page read and write
16200A50000
heap
page read and write
8B6C000
heap
page read and write
E9D000
heap
page read and write
7FFD9465B000
unkown
page read and write
184000
heap
page read and write
CA6000
unkown
page write copy
2601000
heap
page read and write
2C2F000
heap
page read and write
9B0000
unkown
page readonly
16202AE5000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
16200DEA000
heap
page read and write
1717000
unkown
page read and write
16200DA4000
heap
page read and write
184000
heap
page read and write
7FFDA3C31000
unkown
page read and write
1EBAD45A000
heap
page read and write
7FFD9413C000
unkown
page execute read
2601000
heap
page read and write
2601000
heap
page read and write
F09000
heap
page read and write
162002AE000
heap
page read and write
16200246000
heap
page read and write
16200AE8000
heap
page read and write
16200264000
heap
page read and write
16200214000
heap
page read and write
3BD6000
heap
page read and write
7FF6DCDDE000
unkown
page readonly
2601000
heap
page read and write
C78000
unkown
page readonly
16200D45000
heap
page read and write
3BD3000
heap
page read and write
16200A7B000
heap
page read and write
2601000
heap
page read and write
37DA000
heap
page read and write
16200228000
heap
page read and write
1620027E000
heap
page read and write
16200D21000
heap
page read and write
162002BD000
heap
page read and write
1EBAD465000
heap
page read and write
16FA000
unkown
page read and write
E7E000
heap
page read and write
7FF6DCD90000
unkown
page readonly
162002BB000
heap
page read and write
1620025C000
heap
page read and write
2878000
heap
page read and write
32E4000
heap
page read and write
EBB000
heap
page read and write
16200DC4000
heap
page read and write
1EBAD45A000
heap
page read and write
2849000
heap
page read and write
16200A3D000
heap
page read and write
32E4000
heap
page read and write
16202AA2000
heap
page read and write
34A0000
heap
page read and write
F5D000
heap
page read and write
562F000
stack
page read and write
7FF6DCDCD000
unkown
page write copy
1620024E000
heap
page read and write
7FFDA3403000
unkown
page execute read
7FFD9420F000
unkown
page read and write
16200EB7000
heap
page read and write
2813000
heap
page read and write
16202AFA000
heap
page read and write
16200232000
heap
page read and write
1EBAD45A000
heap
page read and write
1620029D000
heap
page read and write
EEC000
heap
page read and write
32E4000
heap
page read and write
16200A10000
heap
page read and write
47F0000
heap
page read and write
1EBAD3C0000
heap
page read and write
5B80000
heap
page read and write
2601000
heap
page read and write
EF9000
heap
page read and write
184000
heap
page read and write
16200241000
heap
page read and write
9B1000
unkown
page execute read
16200A75000
heap
page read and write
F51000
heap
page read and write
1EBAD45A000
heap
page read and write
3BEA000
heap
page read and write
EB5000
heap
page read and write
ECC000
heap
page read and write
528E0000
direct allocation
page read and write
284C000
heap
page read and write
1620307C000
direct allocation
page read and write
2813000
heap
page read and write
7FFDA3405000
unkown
page readonly
3478000
heap
page read and write
F25000
heap
page read and write
16200460000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
16200279000
heap
page read and write
1620028A000
heap
page read and write
EC0000
heap
page read and write
184000
heap
page read and write
16200A8C000
heap
page read and write
16200E26000
heap
page read and write
2601000
heap
page read and write
EB6000
heap
page read and write
6A38DCE000
stack
page read and write
16200AC5000
heap
page read and write
16200A2D000
heap
page read and write
7FFDA3C2D000
unkown
page readonly
7FFDA3351000
unkown
page execute read
F15000
heap
page read and write
7FF6DCD90000
unkown
page readonly
EE4000
heap
page read and write
16200DEF000
heap
page read and write
16200AE7000
heap
page read and write
2601000
heap
page read and write
8B3D000
heap
page read and write
16200D5A000
heap
page read and write
16200261000
heap
page read and write
1EBAD467000
heap
page read and write
106E000
stack
page read and write
16200DD0000
heap
page read and write
2601000
heap
page read and write
528A6000
direct allocation
page read and write
16202F90000
direct allocation
page read and write
1EBAD45A000
heap
page read and write
162002AF000
heap
page read and write
346F000
heap
page read and write
16200A1B000
heap
page read and write
F04000
heap
page read and write
16200A27000
heap
page read and write
32E4000
heap
page read and write
286D000
heap
page read and write
2849000
heap
page read and write
184000
heap
page read and write
7FFDA5461000
unkown
page execute read
171E000
unkown
page readonly
2869000
heap
page read and write
16200D6D000
heap
page read and write
16202B34000
heap
page read and write
1EBAD45A000
heap
page read and write
528C4000
direct allocation
page read and write
34CD000
heap
page read and write
184000
heap
page read and write
7FFD93F80000
unkown
page execute read
2601000
heap
page read and write
37A8000
heap
page read and write
16200D6D000
heap
page read and write
16200E24000
heap
page read and write
96E000
stack
page read and write
7FFDA344D000
unkown
page readonly
7FFDA4635000
unkown
page read and write
2601000
heap
page read and write
171D000
unkown
page execute read
16200A17000
heap
page read and write
184000
heap
page read and write
2D47000
heap
page read and write
F3A000
heap
page read and write
7FFDA5477000
unkown
page readonly
47F8000
heap
page read and write
601F000
stack
page read and write
1EBAD45D000
heap
page read and write
16200D3D000
heap
page read and write
184000
heap
page read and write
7FFD93EF1000
unkown
page execute read
27EF000
heap
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
7FFDA5460000
unkown
page readonly
16200E0A000
heap
page read and write
16200AEE000
heap
page read and write
EDC000
heap
page read and write
1EBAD45A000
heap
page read and write
16200A51000
heap
page read and write
EC2000
heap
page read and write
EDA000
heap
page read and write
52884000
direct allocation
page read and write
34CE000
heap
page read and write
F3A000
heap
page read and write
1620029E000
heap
page read and write
286A000
heap
page read and write
16200A60000
heap
page read and write
7FFDA3FD3000
unkown
page read and write
7FFDA3C32000
unkown
page readonly
1620028A000
heap
page read and write
1620026A000
heap
page read and write
7FFDA5495000
unkown
page read and write
1BD987FA000
heap
page read and write
ED2000
heap
page read and write
16200E24000
heap
page read and write
5A8F7CE000
stack
page read and write
16200286000
heap
page read and write
EB9000
heap
page read and write
7FF6DCD91000
unkown
page execute read
EB6000
heap
page read and write
2879000
heap
page read and write
5CCC000
heap
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
162002AA000
heap
page read and write
1620024F000
heap
page read and write
2601000
heap
page read and write
16200030000
heap
page read and write
16202B14000
heap
page read and write
1422000
unkown
page readonly
1620027E000
heap
page read and write
1620029E000
heap
page read and write
2601000
heap
page read and write
16200E11000
heap
page read and write
7FF6DCD91000
unkown
page execute read
7FFD94241000
unkown
page execute read
EE9000
heap
page read and write
C78000
unkown
page readonly
F32000
heap
page read and write
422C2FD000
stack
page read and write
52950000
direct allocation
page read and write
2C29000
heap
page read and write
16200CF0000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
1EBAD461000
heap
page read and write
7FFDA345F000
unkown
page write copy
E70000
heap
page read and write
52860000
direct allocation
page read and write
16200243000
heap
page read and write
16200120000
heap
page read and write
850000
heap
page read and write
16200EEA000
heap
page read and write
16200AC3000
heap
page read and write
16200288000
heap
page read and write
EF6000
heap
page read and write
278E000
stack
page read and write
5C29000
heap
page read and write
16200249000
heap
page read and write
162002C4000
heap
page read and write
7FFDA337B000
unkown
page read and write
1620025A000
heap
page read and write
2601000
heap
page read and write
7FFD9461B000
unkown
page read and write
3897000
heap
page read and write
16200A0E000
heap
page read and write
346E000
heap
page read and write
2601000
heap
page read and write
16200A50000
heap
page read and write
2601000
heap
page read and write
16200A29000
heap
page read and write
7FFDA4DA0000
unkown
page readonly
16200A0C000
heap
page read and write
E9D000
heap
page read and write
5C2D000
heap
page read and write
184000
heap
page read and write
16200A3D000
heap
page read and write
16203088000
direct allocation
page read and write
2601000
heap
page read and write
16FD000
unkown
page read and write
16200D2A000
heap
page read and write
2601000
heap
page read and write
37D3000
heap
page read and write
16200DF9000
heap
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
6A38DEA000
stack
page read and write
16200A23000
heap
page read and write
184000
heap
page read and write
1620027E000
heap
page read and write
528AC000
direct allocation
page read and write
2601000
heap
page read and write
7FFDA4DA6000
unkown
page readonly
EF6000
heap
page read and write
16200E11000
heap
page read and write
28CE000
stack
page read and write
1EBAD45D000
heap
page read and write
8B6C000
heap
page read and write
16200A45000
heap
page read and write
162002C7000
heap
page read and write
162002AF000
heap
page read and write
16200ACC000
heap
page read and write
32E4000
heap
page read and write
ED9000
heap
page read and write
32E4000
heap
page read and write
7FFDA3AFD000
unkown
page readonly
184000
heap
page read and write
16200AC1000
heap
page read and write
184000
heap
page read and write
ED1000
heap
page read and write
16200A50000
heap
page read and write
E9E000
heap
page read and write
16200A36000
heap
page read and write
34C8000
heap
page read and write
7FF6DCDDE000
unkown
page readonly
184000
heap
page read and write
2601000
heap
page read and write
7FFDA5493000
unkown
page readonly
141A000
unkown
page readonly
1620025B000
heap
page read and write
16200ACC000
heap
page read and write
F09000
heap
page read and write
1EBAD45A000
heap
page read and write
EDC000
heap
page read and write
16200EEA000
heap
page read and write
7D0000
heap
page read and write
16200EEA000
heap
page read and write
1620027E000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
52801000
direct allocation
page read and write
16200EB7000
heap
page read and write
16200A60000
heap
page read and write
16200EEB000
heap
page read and write
16200DF2000
heap
page read and write
E9E000
heap
page read and write
2601000
heap
page read and write
B78000
unkown
page readonly
2D49000
heap
page read and write
7FFDA3AE1000
unkown
page execute read
16200D1C000
heap
page read and write
3448000
heap
page read and write
16200EC6000
heap
page read and write
16202AFA000
heap
page read and write
EDC000
heap
page read and write
16200268000
heap
page read and write
7FF6DCDBA000
unkown
page readonly
348F000
heap
page read and write
7D2E000
stack
page read and write
2601000
heap
page read and write
16200DD1000
heap
page read and write
ED0000
heap
page read and write
EDF000
heap
page read and write
1620025D000
heap
page read and write
7FFD94687000
unkown
page readonly
162002C0000
heap
page read and write
F09000
heap
page read and write
32E4000
heap
page read and write
16200DF9000
heap
page read and write
32E4000
heap
page read and write
7FFDA4631000
unkown
page execute read
16200A50000
heap
page read and write
184000
heap
page read and write
F30000
heap
page read and write
16200279000
heap
page read and write
16200A50000
heap
page read and write
EF6000
heap
page read and write
16200E24000
heap
page read and write
184000
heap
page read and write
162009F1000
heap
page read and write
7FFD93DD1000
unkown
page execute read
32E4000
heap
page read and write
16200DFA000
heap
page read and write
F6E000
heap
page read and write
5BF9000
heap
page read and write
2601000
heap
page read and write
ED7000
heap
page read and write
3710000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
162002C4000
heap
page read and write
2877000
heap
page read and write
16200D87000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
56E0000
heap
page read and write
16200DF9000
heap
page read and write
5DDE000
stack
page read and write
CA6000
unkown
page read and write
1EBAD45A000
heap
page read and write
7FFDA4636000
unkown
page readonly
184000
heap
page read and write
16202B14000
heap
page read and write
184000
heap
page read and write
16200A45000
heap
page read and write
16200273000
heap
page read and write
82B2000
heap
page read and write
52930000
direct allocation
page read and write
184000
heap
page read and write
EC4000
heap
page read and write
7FFDA3390000
unkown
page readonly
16200EEA000
heap
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
16200D36000
heap
page read and write
2601000
heap
page read and write
3483000
heap
page read and write
37D2000
heap
page read and write
16200DCA000
heap
page read and write
16200235000
heap
page read and write
184000
heap
page read and write
2D4A000
heap
page read and write
16200D2F000
heap
page read and write
16200A01000
heap
page read and write
32E4000
heap
page read and write
1EBAD448000
heap
page read and write
32E4000
heap
page read and write
ED4000
heap
page read and write
27A8000
heap
page read and write
EDB000
heap
page read and write
81E000
stack
page read and write
7FFDA3FD2000
unkown
page readonly
2878000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
16200D9C000
heap
page read and write
16200E24000
heap
page read and write
1620025C000
heap
page read and write
2601000
heap
page read and write
16202B31000
heap
page read and write
344F000
heap
page read and write
1EBAD45A000
heap
page read and write
2C30000
heap
page read and write
F2C000
heap
page read and write
1702000
unkown
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
162002CE000
heap
page read and write
162002AE000
heap
page read and write
7FFD93F55000
unkown
page execute read
16200BF0000
direct allocation
page read and write
16200A63000
heap
page read and write
16203000000
direct allocation
page read and write
16200140000
heap
page read and write
466F000
stack
page read and write
1EBAD455000
heap
page read and write
162002AE000
heap
page read and write
27AC000
heap
page read and write
2601000
heap
page read and write
16200EDA000
heap
page read and write
32E4000
heap
page read and write
ED2000
heap
page read and write
F2C000
heap
page read and write
16202AA8000
heap
page read and write
8304000
heap
page read and write
1EBAD390000
heap
page read and write
3BD2000
heap
page read and write
1EBAD467000
heap
page read and write
EE9000
heap
page read and write
16200EEA000
heap
page read and write
1620028B000
heap
page read and write
16200A2B000
heap
page read and write
7BAE000
stack
page read and write
16200DF0000
heap
page read and write
2601000
heap
page read and write
6A38DE4000
stack
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
2869000
heap
page read and write
7FFD93F69000
unkown
page execute read
16203060000
direct allocation
page read and write
2601000
heap
page read and write
162009F8000
heap
page read and write
32E4000
heap
page read and write
32E4000
heap
page read and write
1620028A000
heap
page read and write
162002BD000
heap
page read and write
16200236000
heap
page read and write
27E8000
heap
page read and write
16200A8C000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
1BD986E0000
heap
page read and write
16200A46000
heap
page read and write
9B0000
unkown
page readonly
BA1000
unkown
page execute read
34CE000
heap
page read and write
16203078000
direct allocation
page read and write
16200AC3000
heap
page read and write
EB6000
heap
page read and write
16200D90000
heap
page read and write
32E4000
heap
page read and write
378F000
stack
page read and write
7FF6DCDD0000
unkown
page read and write
1EBAD46C000
heap
page read and write
2601000
heap
page read and write
16200265000
heap
page read and write
16200EB9000
heap
page read and write
184000
heap
page read and write
284F000
heap
page read and write
556E000
stack
page read and write
16203038000
direct allocation
page read and write
16200D91000
heap
page read and write
2601000
heap
page read and write
52944000
direct allocation
page read and write
286B000
heap
page read and write
141A000
unkown
page readonly
5BA0000
heap
page read and write
5EDF000
stack
page read and write
16200D91000
heap
page read and write
16200D40000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
7FFDA3BF1000
unkown
page execute read
857F000
stack
page read and write
348E000
heap
page read and write
184000
heap
page read and write
EB5000
heap
page read and write
16202AB5000
heap
page read and write
184000
heap
page read and write
3483000
heap
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
52894000
direct allocation
page read and write
32E4000
heap
page read and write
1620025B000
heap
page read and write
16200240000
heap
page read and write
2C24000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
2869000
heap
page read and write
281D000
heap
page read and write
7FF6DCDDC000
unkown
page read and write
1EBAD45A000
heap
page read and write
2601000
heap
page read and write
16202AF6000
heap
page read and write
1EBAD46C000
heap
page read and write
184000
heap
page read and write
7FFDA3BF0000
unkown
page readonly
16200E0A000
heap
page read and write
32E4000
heap
page read and write
16200DB8000
heap
page read and write
16200256000
heap
page read and write
16202AA8000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
16200A61000
heap
page read and write
2601000
heap
page read and write
7FFD9456E000
unkown
page readonly
162002AE000
heap
page read and write
34C8000
heap
page read and write
16200A45000
heap
page read and write
16200DD1000
heap
page read and write
1EBAD450000
heap
page read and write
32E4000
heap
page read and write
5A3C000
stack
page read and write
32C0000
heap
page read and write
7FFD94665000
unkown
page readonly
16200ADB000
heap
page read and write
32E4000
heap
page read and write
7FFDA5476000
unkown
page read and write
16200D72000
heap
page read and write
16FA000
unkown
page write copy
7FFDA342D000
unkown
page readonly
16200215000
heap
page read and write
1620306C000
direct allocation
page read and write
7FFDA4DA1000
unkown
page execute read
2601000
heap
page read and write
765000
stack
page read and write
16200D2A000
heap
page read and write
16200D7D000
heap
page read and write
2601000
heap
page read and write
F09000
heap
page read and write
EF9000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
7FFDA3C21000
unkown
page execute read
528D0000
direct allocation
page read and write
16202B0F000
heap
page read and write
282D000
heap
page read and write
3BD7000
heap
page read and write
16200A2E000
heap
page read and write
7FFD93F8D000
unkown
page execute read
55AF000
stack
page read and write
8B6C000
heap
page read and write
32E0000
heap
page read and write
2D4A000
heap
page read and write
32E4000
heap
page read and write
1EBAD460000
heap
page read and write
23F0000
heap
page read and write
52854000
direct allocation
page read and write
2601000
heap
page read and write
16200A02000
heap
page read and write
16200D15000
heap
page read and write
6040000
heap
page read and write
16202B31000
heap
page read and write
EB6000
heap
page read and write
16200265000
heap
page read and write
7FFDA3FD4000
unkown
page readonly
7AAE000
stack
page read and write
2823000
heap
page read and write
7FFD94507000
unkown
page readonly
184000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
2600000
heap
page read and write
16200246000
heap
page read and write
16200D36000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
184000
heap
page read and write
F40000
heap
page read and write
EDF000
heap
page read and write
16202A5C000
direct allocation
page read and write
184000
heap
page read and write
2C28000
heap
page read and write
1EBAD2A0000
heap
page read and write
16200ADD000
heap
page read and write
7FF6DCD90000
unkown
page readonly
16202A95000
heap
page read and write
16200E24000
heap
page read and write
BA0000
unkown
page readonly
16203010000
direct allocation
page read and write
16200358000
direct allocation
page read and write
EC4000
heap
page read and write
EB5000
heap
page read and write
16200A27000
heap
page read and write
1620028E000
heap
page read and write
16202AFA000
heap
page read and write
ED5000
heap
page read and write
232E000
stack
page read and write
2601000
heap
page read and write
16200AE2000
heap
page read and write
34CE000
heap
page read and write
16200D40000
heap
page read and write
EDB000
heap
page read and write
280D000
heap
page read and write
16200CF1000
heap
page read and write
7FFDA4633000
unkown
page readonly
B78000
unkown
page readonly
16202990000
direct allocation
page read and write
EF6000
heap
page read and write
16200D45000
heap
page read and write
552F000
stack
page read and write
16202B31000
heap
page read and write
1EBAD45D000
heap
page read and write
2601000
heap
page read and write
16200A07000
heap
page read and write
32E4000
heap
page read and write
16203020000
direct allocation
page read and write
7FFDA3C20000
unkown
page readonly
2601000
heap
page read and write
16200EB7000
heap
page read and write
32E4000
heap
page read and write
32E4000
heap
page read and write
EEC000
heap
page read and write
2D47000
heap
page read and write
16200A3D000
heap
page read and write
16203040000
direct allocation
page read and write
7FF6DCDCD000
unkown
page read and write
7FF6DCD90000
unkown
page readonly
7FFDA3464000
unkown
page read and write
16200DFF000
heap
page read and write
EF9000
heap
page read and write
32E4000
heap
page read and write
F25000
heap
page read and write
32E4000
heap
page read and write
162001D8000
heap
page read and write
2D43000
heap
page read and write
7FF6DCDDE000
unkown
page readonly
16200DC3000
heap
page read and write
3278000
stack
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
162002AF000
heap
page read and write
16200A04000
heap
page read and write
286B000
heap
page read and write
ED8000
heap
page read and write
184000
heap
page read and write
16200A21000
heap
page read and write
6020000
heap
page read and write
7FFDA4DAD000
unkown
page readonly
16203084000
direct allocation
page read and write
E9E000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
16200A44000
heap
page read and write
3483000
heap
page read and write
8AB0000
heap
page read and write
162002C4000
heap
page read and write
16200E24000
heap
page read and write
16200ADA000
heap
page read and write
282D000
heap
page read and write
1EBAD46C000
heap
page read and write
EB9000
heap
page read and write
7FFD93EDB000
unkown
page readonly
16200E25000
heap
page read and write
F64000
heap
page read and write
162002BD000
heap
page read and write
46AE000
stack
page read and write
16200D35000
heap
page read and write
32E4000
heap
page read and write
27F2000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
1620022E000
heap
page read and write
EC0000
heap
page read and write
162002C0000
heap
page read and write
323B000
stack
page read and write
184000
heap
page read and write
1620025F000
heap
page read and write
8B3C000
heap
page read and write
37E0000
heap
page read and write
2601000
heap
page read and write
F09000
heap
page read and write
3BE4000
heap
page read and write
16200D30000
heap
page read and write
DBE000
stack
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
3718000
heap
page read and write
55EE000
stack
page read and write
16200D01000
heap
page read and write
ED5000
heap
page read and write
BA1000
unkown
page execute read
43D9000
heap
page read and write
7FFD94216000
unkown
page readonly
2813000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
16202F1C000
direct allocation
page read and write
32E4000
heap
page read and write
16202B34000
heap
page read and write
1BD987C0000
heap
page read and write
285C000
heap
page read and write
2940000
heap
page read and write
171B000
unkown
page execute read
283D000
heap
page read and write
184000
heap
page read and write
EDF000
heap
page read and write
16FC000
unkown
page write copy
F09000
heap
page read and write
2700000
trusted library allocation
page read and write
16200D11000
heap
page read and write
2823000
heap
page read and write
184000
heap
page read and write
3BE5000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
847E000
stack
page read and write
F3A000
heap
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
2869000
heap
page read and write
1620025D000
heap
page read and write
1620027B000
heap
page read and write
32E4000
heap
page read and write
35BE000
stack
page read and write
2601000
heap
page read and write
16200A22000
heap
page read and write
2C20000
heap
page read and write
8B7C000
heap
page read and write
32E4000
heap
page read and write
1620025A000
heap
page read and write
16202AF3000
heap
page read and write
1620026A000
heap
page read and write
EB9000
heap
page read and write
EE1000
heap
page read and write
16200DFA000
heap
page read and write
5F1E000
stack
page read and write
16200DFA000
heap
page read and write
5A8F9DE000
stack
page read and write
184000
heap
page read and write
3BD0000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
5BD0000
heap
page read and write
36D0000
trusted library allocation
page read and write
7FFDA4168000
unkown
page readonly
EF9000
heap
page read and write
32E4000
heap
page read and write
F3A000
heap
page read and write
16202AC5000
heap
page read and write
34CE000
heap
page read and write
2601000
heap
page read and write
16200A7A000
heap
page read and write
16200D0F000
heap
page read and write
32E4000
heap
page read and write
16200D0C000
heap
page read and write
16202AF4000
heap
page read and write
16200D3B000
heap
page read and write
5280C000
direct allocation
page read and write
162009F0000
heap
page read and write
1620023B000
heap
page read and write
16200A25000
heap
page read and write
16200D8C000
heap
page read and write
16202A90000
heap
page read and write
140000
heap
page read and write
75B000
stack
page read and write
7FFDA5471000
unkown
page readonly
16202AB5000
heap
page read and write
16200DBC000
heap
page read and write
EDE000
heap
page read and write
7FFDA3AE0000
unkown
page readonly
32E4000
heap
page read and write
282C000
heap
page read and write
7A6E000
stack
page read and write
162002BC000
heap
page read and write
171E000
unkown
page readonly
16200D6D000
heap
page read and write
34C6000
heap
page read and write
32D0000
heap
page read and write
2601000
heap
page read and write
1EBAD440000
heap
page read and write
184000
heap
page read and write
162002AE000
heap
page read and write
34CE000
heap
page read and write
2601000
heap
page read and write
16200A02000
heap
page read and write
5A8F7EC000
stack
page read and write
16200EB7000
heap
page read and write
16200EB7000
heap
page read and write
1EBAD45A000
heap
page read and write
7FFD94240000
unkown
page readonly
85B000
heap
page read and write
16200D5C000
heap
page read and write
162002C8000
heap
page read and write
2601000
heap
page read and write
16200E0A000
heap
page read and write
16200A50000
heap
page read and write
2601000
heap
page read and write
16200E24000
heap
page read and write
27AB000
heap
page read and write
2D40000
heap
page read and write
16200A46000
heap
page read and write
2D4A000
heap
page read and write
2601000
heap
page read and write
EC5000
heap
page read and write
1620028A000
heap
page read and write
16200A01000
heap
page read and write
7FFD93DD0000
unkown
page readonly
5A8FBCE000
stack
page read and write
2601000
heap
page read and write
2601000
heap
page read and write
286B000
heap
page read and write
16200273000
heap
page read and write
16200DFA000
heap
page read and write
52874000
direct allocation
page read and write
7FFD93EE1000
unkown
page readonly
16200DE5000
heap
page read and write
2C2E000
heap
page read and write
16200EB7000
heap
page read and write
16200D28000
heap
page read and write
2601000
heap
page read and write
16200D6D000
heap
page read and write
EDE000
heap
page read and write
284C000
heap
page read and write
16200DBC000
heap
page read and write
16200A21000
heap
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
47F8000
heap
page read and write
7FF6DCDDE000
unkown
page readonly
F30000
heap
page read and write
1620020F000
heap
page read and write
1620027E000
heap
page read and write
F10000
heap
page read and write
F10000
heap
page read and write
7FFDA4170000
unkown
page read and write
16200D45000
heap
page read and write
6A38FDE000
stack
page read and write
7FFD941C0000
unkown
page readonly
16200D6E000
heap
page read and write
281D000
heap
page read and write
16200A6F000
heap
page read and write
2D43000
heap
page read and write
32E4000
heap
page read and write
16200A18000
heap
page read and write
32E4000
heap
page read and write
F40000
heap
page read and write
6A38DDF000
stack
page read and write
16200EDA000
heap
page read and write
7FFDA3C0B000
unkown
page readonly
1620308C000
direct allocation
page read and write
F26000
heap
page read and write
16200265000
heap
page read and write
162002B6000
heap
page read and write
184000
heap
page read and write
162002C4000
heap
page read and write
16200233000
heap
page read and write
162002C7000
heap
page read and write
5B3C000
stack
page read and write
184000
heap
page read and write
162001D0000
heap
page read and write
16200273000
heap
page read and write
1620026A000
heap
page read and write
16200DDB000
heap
page read and write
16200DE0000
heap
page read and write
184000
heap
page read and write
32E4000
heap
page read and write
16202AFA000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
1620028A000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
16200EB7000
heap
page read and write
7FFDA3440000
unkown
page readonly
16200A23000
heap
page read and write
16200DF2000
heap
page read and write
EDD000
heap
page read and write
F3C000
heap
page read and write
184000
heap
page read and write
7FFD9413E000
unkown
page readonly
52824000
direct allocation
page read and write
16200DFF000
heap
page read and write
52830000
direct allocation
page read and write
52814000
direct allocation
page read and write
260000
heap
page read and write
162009FA000
heap
page read and write
162002C9000
heap
page read and write
EDE000
heap
page read and write
16200ADA000
heap
page read and write
184000
heap
page read and write
184000
heap
page read and write
7FF6DCDBA000
unkown
page readonly
150000
heap
page read and write
16202B12000
heap
page read and write
16200E28000
heap
page read and write
184000
heap
page read and write
16203044000
direct allocation
page read and write
184000
heap
page read and write
1411000
unkown
page readonly
16200D2F000
heap
page read and write
16200A2D000
heap
page read and write
F3E000
heap
page read and write
16200EEA000
heap
page read and write
16200273000
heap
page read and write
F34000
heap
page read and write
1620020C000
heap
page read and write
23AE000
stack
page read and write
7FFD93EFD000
unkown
page execute read
F10000
heap
page read and write
2601000
heap
page read and write
EDF000
heap
page read and write
16200E24000
heap
page read and write
16202AF6000
heap
page read and write
32E4000
heap
page read and write
1620025A000
heap
page read and write
7FF6DCDBA000
unkown
page readonly
528AC000
direct allocation
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
7FF6DCD91000
unkown
page execute read
2601000
heap
page read and write
F10000
heap
page read and write
184000
heap
page read and write
16200DA4000
heap
page read and write
2601000
heap
page read and write
284E000
heap
page read and write
7FFD94237000
unkown
page readonly
2823000
heap
page read and write
7FFDA3FD0000
unkown
page readonly
7FFDA337D000
unkown
page readonly
32E4000
heap
page read and write
236F000
stack
page read and write
16200D72000
heap
page read and write
7E2F000
stack
page read and write
3BF3000
heap
page read and write
2816000
heap
page read and write
F04000
heap
page read and write
2601000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
16200DEE000
heap
page read and write
1620027E000
heap
page read and write
7FFDA3C14000
unkown
page readonly
32E4000
heap
page read and write
184000
heap
page read and write
16200A32000
heap
page read and write
528C0000
direct allocation
page read and write
2740000
heap
page read and write
16200AC3000
heap
page read and write
52844000
direct allocation
page read and write
16200A23000
heap
page read and write
16200A50000
heap
page read and write
1EBAD460000
heap
page read and write
1BD98970000
heap
page read and write
3BD9000
heap
page read and write
16202AC5000
heap
page read and write
162002AF000
heap
page read and write
7FFDA4630000
unkown
page readonly
32E4000
heap
page read and write
16200EB8000
heap
page read and write
2601000
heap
page read and write
1EBAD45D000
heap
page read and write
3BED000
heap
page read and write
1620024C000
heap
page read and write
16200D44000
heap
page read and write
EDA000
heap
page read and write
16200ADC000
heap
page read and write
162001F3000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
3477000
heap
page read and write
184000
heap
page read and write
2601000
heap
page read and write
34B3000
heap
page read and write
3440000
heap
page read and write
16200A50000
heap
page read and write
EF9000
heap
page read and write
16200D01000
heap
page read and write
16200DDF000
heap
page read and write
1620028A000
heap
page read and write
162002AE000
heap
page read and write
16202AF6000
heap
page read and write
F2C000
heap
page read and write
16202B34000
heap
page read and write
F04000
heap
page read and write
F30000
heap
page read and write
F04000
heap
page read and write
16200D0C000
heap
page read and write
2601000
heap
page read and write
32E4000
heap
page read and write
476F000
stack
page read and write
16200D44000
heap
page read and write
16200DF9000
heap
page read and write
5B50000
heap
page read and write
7FFDA3441000
unkown
page execute read
32E4000
heap
page read and write
7FFD93DD6000
unkown
page readonly
16200DFF000
heap
page read and write
2601000
heap
page read and write
ED0000
heap
page read and write
ED8000
heap
page read and write
E9B000
heap
page read and write
7FF6DCDDC000
unkown
page read and write
9B1000
unkown
page execute read
2601000
heap
page read and write
16200D45000
heap
page read and write
184000
heap
page read and write
16200A31000
heap
page read and write
3BE6000
heap
page read and write
7FFD93F7A000
unkown
page execute read
16200D86000
heap
page read and write
162002C5000
heap
page read and write
32E4000
heap
page read and write
184000
heap
page read and write
16200D45000
heap
page read and write
16200D09000
heap
page read and write
280C000
heap
page read and write
F24000
heap
page read and write
32E4000
heap
page read and write
16200EEA000
heap
page read and write
6A38DDA000
stack
page read and write
EDE000
heap
page read and write
16200A63000
heap
page read and write
162010F0000
direct allocation
page read and write
2601000
heap
page read and write
16200A83000
heap
page read and write
16200D58000
heap
page read and write
3DF1000
heap
page read and write
37AC000
heap
page read and write
7FFD94549000
unkown
page readonly
16200AD9000
heap
page read and write
16200A2E000
heap
page read and write
EF6000
heap
page read and write
16200D30000
heap
page read and write
2871000
heap
page read and write
16200D1F000
heap
page read and write
32E4000
heap
page read and write
3791000
heap
page read and write
1BD987F0000
heap
page read and write
32E4000
heap
page read and write
2601000
heap
page read and write
There are 1544 hidden memdumps, click here to show them.