IOC Report
tor-browser-windows-x86_64-portable-14.0.2.exe

loading gif

Files

File Path
Type
Category
Malicious
tor-browser-windows-x86_64-portable-14.0.2.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\PublicKey\_curve25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\PublicKey\_curve448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_brotli.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_cffi_backend.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\license_files\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\license_files\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography-43.0.3.dist-info\license_files\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\psutil\_psutil_windows.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\autocommand-2.2.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\autocommand-2.2.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\autocommand-2.2.2.dist-info\METADATA
Python script, ASCII text executable, with very long lines (855)
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\autocommand-2.2.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\autocommand-2.2.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\autocommand-2.2.2.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_resources-6.4.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_resources-6.4.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_resources-6.4.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_resources-6.4.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_resources-6.4.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\importlib_resources-6.4.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\inflect-7.3.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\inflect-7.3.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\inflect-7.3.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\inflect-7.3.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\inflect-7.3.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\inflect-7.3.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.context-5.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.context-5.3.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.context-5.3.0.dist-info\METADATA
ASCII text, with very long lines (406)
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.context-5.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.context-5.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.context-5.3.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.text-3.12.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.text-3.12.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.text-3.12.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco.text-3.12.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\jaraco\text\Lorem ipsum.txt
ASCII text, with very long lines (888)
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\more_itertools-10.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\more_itertools-10.3.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\more_itertools-10.3.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\more_itertools-10.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\more_itertools-10.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\packaging-24.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\platformdirs-4.2.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\platformdirs-4.2.2.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\platformdirs-4.2.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\platformdirs-4.2.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\platformdirs-4.2.2.dist-info\licenses\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\tomli-2.0.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\tomli-2.0.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\tomli-2.0.1.dist-info\METADATA
Python script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\tomli-2.0.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\tomli-2.0.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\LICENSE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typeguard-4.3.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typing_extensions-4.12.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typing_extensions-4.12.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typing_extensions-4.12.2.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typing_extensions-4.12.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\typing_extensions-4.12.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\wheel-0.43.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\wheel-0.43.0.dist-info\LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\wheel-0.43.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\wheel-0.43.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\wheel-0.43.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\wheel-0.43.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\zipp-3.19.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\zipp-3.19.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\zipp-3.19.2.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\zipp-3.19.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\zipp-3.19.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\setuptools\_vendor\zipp-3.19.2.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\LICENSE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\typeguard-4.3.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\wheel-0.43.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\wheel-0.43.0.dist-info\LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\wheel-0.43.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\wheel-0.43.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\wheel-0.43.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63882\wheel-0.43.0.dist-info\entry_points.txt
ASCII text
dropped
There are 183 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tor-browser-windows-x86_64-portable-14.0.2.exe
"C:\Users\user\Desktop\tor-browser-windows-x86_64-portable-14.0.2.exe"
malicious
C:\Users\user\Desktop\tor-browser-windows-x86_64-portable-14.0.2.exe
"C:\Users\user\Desktop\tor-browser-windows-x86_64-portable-14.0.2.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/pypa/packagingR
unknown
https://steamcomunty.comfo
unknown
https://github.com/jaraco/keyring/commit/a85a7cbc6c909f8121660ed1f7b487f99a1c2bf7
unknown
https://github.com/giampaolo/psutil/issues/875.
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.filter_except
unknown
https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packages
unknown
https://readthedocs.org/projects/jaracofunctools/badge/?version=latest
unknown
http://ocsp.accv.esls
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.zip_broadcast
unknown
https://github.com/jaraco/jaraco.text/actions?query=workflow%3A%22tests%22
unknown
https://docs.python.org/3/library/importlib.html#module-importlib.resources
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.random_product
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.groupby_transform
unknown
https://importlib-metadata.readthedocs.io/
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.sliding_window
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://github.com/pypa/packaging
unknown
http://www.accv.es/legislacion_c.htmQ
unknown
https://blog.jaraco.com/skeleton
unknown
https://tools.ietf.org/html/rfc3610
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.all_unique
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.partial_product
unknown
https://img.shields.io/pypi/pyversions/inflect.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.map_except
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.takewhile_inclusive
unknown
https://tidelift.com/subscription/pkg/pypi-jaraco.text?utm_source=pypi-jaraco.text&utm_medium=readme
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.powerset
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.zip_offset
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/jaraco/jaraco.context/actions?query=workflow%3A%22tests%22
unknown
https://pypi.org/project/build/).
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.pad_none
unknown
https://dev.to/martinheinz/tour-of-python-itertools-4122
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://tidelift.com/subscription/pkg/pypi-inflect?utm_source=pypi-inflect&utm_medium=readme
unknown
http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://img.shields.io/pypi/v/inflect.svg
unknown
https://cryptography.io/en/latest/installation/
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.ncycles
unknown
https://github.com/pypa/setuptools/issues/417#issuecomment-392298401
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.consume
unknown
https://jaracotext.readthedocs.io/en/latest/?badge=latest
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.split_when
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.consumer
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://google.com/mail
unknown
https://img.shields.io/pypi/v/importlib_metadata.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.nth_combination_with_replace
unknown
https://github.com/pyca/cryptography/issues
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.intersperse
unknown
https://readthedocs.org/projects/inflect/badge/?version=latest
unknown
http://html4/loose.dtd
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.collapse
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://api.ipify.orgp
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.one
unknown
https://pypi.org/project/jaraco.text
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://github.com/jaraco/jaraco.functools/actions?query=workflow%3A%22tests%22
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.countable
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.matmul
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.prepend
unknown
https://github.com/python/importlib_metadata/actions?query=workflow%3A%22tests%22
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.product_index
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.set_partitions
unknown
http://www.quovadisglobal.com/cps0
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.only
unknown
https://cryptography.io/en/latest/changelog/
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.bucket
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.distinct_permutations
unknown
https://mail.python.org/mailman/listinfo/cryptography-dev
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.split_into
unknown
https://github.com/jaraco/inflect/actions/workflows/main.yml/badge.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.nth_combination
unknown
https://readthedocs.org/projects/jaracocontext/badge/?version=latest
unknown
https://readthedocs.org/projects/more-itertools/badge/?version=latest
unknown
http://.jpg
unknown
https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbca
unknown
https://github.com/pypa/setuptools/issues/1024.
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.constrained_batches
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.split_after
unknown
https://img.shields.io/pypi/pyversions/jaraco.functools.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.repeat_each
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.iter_index
unknown
http://ocsp.accv.es0
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.interleave_evenly
unknown
https://stackoverflow.com/questions/4457745#4457745.
unknown
http://www.quovadisglobal.com/cps
unknown
https://tidelift.com/badges/package/pypi/jaraco.text
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.ichunked
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.is_sorted
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcomunty.com
104.21.35.75

IPs

IP
Domain
Country
Malicious
104.21.35.75
steamcomunty.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1F713774000
heap
page read and write
1F713774000
heap
page read and write
1E56AF36000
heap
page read and write
7FF8B7E3D000
unkown
page execute and read and write
1E56A58E000
heap
page read and write
1E56A7C6000
heap
page read and write
1E56A846000
heap
page read and write
7FF8B7DE0000
unkown
page readonly
1E56A8C2000
heap
page read and write
1F713774000
heap
page read and write
1E56AD4B000
heap
page read and write
1E56ACCA000
heap
page read and write
7FF8A8EF0000
unkown
page execute and read and write
7FF8B780A000
unkown
page read and write
1E56A8B3000
heap
page read and write
1E56AD9F000
heap
page read and write
1E56AC24000
heap
page read and write
1F713778000
heap
page read and write
1E56A71F000
heap
page read and write
7FF8BA256000
unkown
page read and write
1F713780000
heap
page read and write
1E568800000
heap
page read and write
1E56A796000
heap
page read and write
1F713774000
heap
page read and write
1F713774000
heap
page read and write
1E56AF7B000
heap
page read and write
1E56C0AC000
direct allocation
page read and write
1F713780000
heap
page read and write
1E56A832000
heap
page read and write
1E56A5A2000
heap
page read and write
1E56A60E000
heap
page read and write
1F713783000
heap
page read and write
1E56A8AB000
heap
page read and write
7FF8A8837000
unkown
page execute and write copy
1E56AC57000
heap
page read and write
1E56ACE2000
heap
page read and write
1353FDE000
stack
page read and write
1E56A8DD000
heap
page read and write
7FF8B7840000
unkown
page execute and read and write
1E56A787000
heap
page read and write
1E56AF28000
heap
page read and write
1E56AEDC000
heap
page read and write
1E56A7CB000
heap
page read and write
1E56A7F2000
heap
page read and write
1E56ACCC000
heap
page read and write
1E56A7D2000
heap
page read and write
1E5687F1000
heap
page read and write
1F713781000
heap
page read and write
1E56A8FD000
heap
page read and write
1E56B744000
direct allocation
page read and write
1E56A7CA000
heap
page read and write
1E56A89E000
heap
page read and write
1F713780000
heap
page read and write
1E56A900000
heap
page read and write
1E56A8B5000
heap
page read and write
1E56AE34000
heap
page read and write
1E56A77C000
heap
page read and write
7FF8A8E76000
unkown
page execute and read and write
1F713778000
heap
page read and write
1F713774000
heap
page read and write
7FF8B7E50000
unkown
page readonly
1F713776000
heap
page read and write
7FF8B7819000
unkown
page execute and write copy
1E56A60A000
heap
page read and write
1F713776000
heap
page read and write
1E56A765000
heap
page read and write
1E56A806000
heap
page read and write
1E56A55C000
heap
page read and write
1E56A866000
heap
page read and write
7FF8A9355000
unkown
page execute and read and write
1E56A75B000
heap
page read and write
1F713781000
heap
page read and write
7FF8A8722000
unkown
page execute and read and write
1E56A514000
heap
page read and write
1E56A56F000
heap
page read and write
1E56AEB5000
heap
page read and write
1E56AC40000
heap
page read and write
1E56C070000
direct allocation
page read and write
1E56A7B1000
heap
page read and write
1E56A56C000
heap
page read and write
1E56B734000
direct allocation
page read and write
1E56885E000
heap
page read and write
1E56ADA7000
heap
page read and write
1E5687FA000
heap
page read and write
1E56ADE2000
heap
page read and write
7FF8B6024000
unkown
page execute and read and write
7FF8BA4F1000
unkown
page execute and read and write
1E56A84F000
heap
page read and write
1E56ADA5000
heap
page read and write
1F71377A000
heap
page read and write
1E56A813000
heap
page read and write
1E56AFBE000
heap
page read and write
1E568836000
heap
page read and write
1E56A5A9000
heap
page read and write
1E56AE70000
heap
page read and write
1E56B7E9000
heap
page read and write
1E56A74C000
heap
page read and write
1E56A857000
heap
page read and write
1E56885E000
heap
page read and write
1E56A5CF000
heap
page read and write
7FF8B570E000
unkown
page execute and read and write
7FF8B8B14000
unkown
page read and write
1E56A837000
heap
page read and write
1F713774000
heap
page read and write
7FF8B605B000
unkown
page execute and write copy
1E56AD9B000
heap
page read and write
1E56A8CD000
heap
page read and write
1E56B8CA000
heap
page read and write
1E56A559000
heap
page read and write
7FF8A8D72000
unkown
page execute and read and write
1F713778000
heap
page read and write
1E56A8A6000
heap
page read and write
1E56A7B2000
heap
page read and write
1E56A765000
heap
page read and write
7FF8B560B000
unkown
page read and write
7FF8B8C17000
unkown
page execute and read and write
1F713780000
heap
page read and write
7FF8B6030000
unkown
page readonly
1E56A88C000
heap
page read and write
1F713781000
heap
page read and write
1E56A7C3000
heap
page read and write
1F713774000
heap
page read and write
1E56AEB5000
heap
page read and write
1E56AE14000
heap
page read and write
7FF8B8B11000
unkown
page execute and read and write
1E56A551000
heap
page read and write
1E56ACC7000
heap
page read and write
1F713782000
heap
page read and write
1E56A869000
heap
page read and write
1E56A800000
heap
page read and write
1E56A71F000
heap
page read and write
1E56A7EF000
heap
page read and write
7FF8B6045000
unkown
page execute and read and write
1E56A529000
heap
page read and write
1E56B7A8000
direct allocation
page read and write
1E56A813000
heap
page read and write
7FF8B8839000
unkown
page execute and write copy
1E56A850000
heap
page read and write
1E56ADF9000
heap
page read and write
1F713778000
heap
page read and write
1E56ACE3000
heap
page read and write
1E56AC27000
heap
page read and write
7FF8B93C1000
unkown
page execute and read and write
1F713774000
heap
page read and write
1E56ACCC000
heap
page read and write
1E56ACB9000
heap
page read and write
1E56A596000
heap
page read and write
1E56A801000
heap
page read and write
7FF8B5601000
unkown
page execute and read and write
1E568845000
heap
page read and write
1E56A728000
heap
page read and write
1E56A568000
heap
page read and write
1E56AC80000
heap
page read and write
1E56ACBC000
heap
page read and write
1E56A8AD000
heap
page read and write
1F713780000
heap
page read and write
1F71377C000
heap
page read and write
1E56ACAC000
heap
page read and write
1E56A863000
heap
page read and write
1E56B6F8000
direct allocation
page read and write
1E56AEAB000
heap
page read and write
7FF8B7818000
unkown
page execute and read and write
1E56A76B000
heap
page read and write
1E56A796000
heap
page read and write
1E56ADEC000
heap
page read and write
1E56AFC4000
heap
page read and write
1F713781000
heap
page read and write
1F713780000
heap
page read and write
1E56AFF6000
heap
page read and write
1E56B82F000
heap
page read and write
1F713776000
heap
page read and write
1E56A579000
heap
page read and write
1E56A8AD000
heap
page read and write
1E56A520000
heap
page read and write
1E56A51A000
heap
page read and write
1E56AD7F000
heap
page read and write
1F713781000
heap
page read and write
1E56A594000
heap
page read and write
1E56A790000
heap
page read and write
1F713780000
heap
page read and write
1E56AFC3000
heap
page read and write
1E56A891000
heap
page read and write
1E56A834000
heap
page read and write
7FF8B78C2000
unkown
page execute and write copy
2766DDF000
stack
page read and write
1E56A8A2000
heap
page read and write
7FF8A877A000
unkown
page execute and read and write
1E56ACC2000
heap
page read and write
1E56A819000
heap
page read and write
1E56ADA9000
heap
page read and write
1E56AF2D000
heap
page read and write
1E56A8E5000
heap
page read and write
7FF6E217B000
unkown
page readonly
7FF8A9397000
unkown
page execute and write copy
1E56A556000
heap
page read and write
1E56A806000
heap
page read and write
1F71377A000
heap
page read and write
1E56A7AA000
heap
page read and write
1E56A86B000
heap
page read and write
1E56A796000
heap
page read and write
1F713776000
heap
page read and write
1E56A7F9000
heap
page read and write
1E56A571000
heap
page read and write
1E56AC7D000
heap
page read and write
1E56AEAC000
heap
page read and write
7FF6E217B000
unkown
page readonly
1E56AC57000
heap
page read and write
1E56AE34000
heap
page read and write
1E56ADEC000
heap
page read and write
1F713774000
heap
page read and write
1E56A76B000
heap
page read and write
1E56A77B000
heap
page read and write
1F713778000
heap
page read and write
1E56A559000
heap
page read and write
1E56AD4B000
heap
page read and write
1F713774000
heap
page read and write
1E56AC20000
heap
page read and write
7FF8B8835000
unkown
page execute and read and write
1E56AD59000
heap
page read and write
1E56ADA4000
heap
page read and write
1E56A88C000
heap
page read and write
1F71377A000
heap
page read and write
1E56B8CB000
heap
page read and write
1E56AF25000
heap
page read and write
1E56AE14000
heap
page read and write
1F713774000
heap
page read and write
1E56A602000
heap
page read and write
7FF8B5739000
unkown
page execute and write copy
1E56A8A8000
heap
page read and write
1E56A5B0000
heap
page read and write
1E56A553000
heap
page read and write
1E56AEC6000
heap
page read and write
7FF8B7804000
unkown
page execute and read and write
1E56A716000
heap
page read and write
7FF8B782A000
unkown
page read and write
7FF8B9841000
unkown
page execute and read and write
1F713776000
heap
page read and write
7FF8B617A000
unkown
page execute and write copy
1E56B7E0000
heap
page read and write
1E56AD5B000
heap
page read and write
1E56885A000
heap
page read and write
1E56AC65000
heap
page read and write
1E56AFBC000
heap
page read and write
1E5687FB000
heap
page read and write
1E56ADAA000
heap
page read and write
1E56AEAC000
heap
page read and write
1E56A7C3000
heap
page read and write
1E56A5E7000
heap
page read and write
1E56A578000
heap
page read and write
1E56A893000
heap
page read and write
1E56A57D000
heap
page read and write
1F713779000
heap
page read and write
1E56A83D000
heap
page read and write
1E56A7F9000
heap
page read and write
1E56A846000
heap
page read and write
1E56A55F000
heap
page read and write
1E56A5D4000
heap
page read and write
1E568844000
heap
page read and write
1E56AD80000
heap
page read and write
1E56A802000
heap
page read and write
1E56A558000
heap
page read and write
1E56AE27000
heap
page read and write
1E56AE5F000
heap
page read and write
1E56AD50000
heap
page read and write
1E56B8C2000
heap
page read and write
1E56AE66000
heap
page read and write
1E56AC9A000
heap
page read and write
1F713776000
heap
page read and write
1F713780000
heap
page read and write
1E56AF6C000
heap
page read and write
1E56A770000
heap
page read and write
1E56A57D000
heap
page read and write
1E56A811000
heap
page read and write
1F713778000
heap
page read and write
7FF8A8870000
unkown
page readonly
7FF8B5721000
unkown
page execute and read and write
7FF6E2191000
unkown
page read and write
1E56ACCA000
heap
page read and write
1E56A72B000
heap
page read and write
1E56B8AD000
heap
page read and write
7FF8B8B07000
unkown
page execute and read and write
1E56AC5F000
heap
page read and write
1E56A5D9000
heap
page read and write
1E56A60D000
heap
page read and write
1E56A8EA000
heap
page read and write
7FF8B8B4C000
unkown
page read and write
1E56ADE4000
heap
page read and write
1E56A410000
direct allocation
page read and write
1F713776000
heap
page read and write
1E56A737000
heap
page read and write
1F71377A000
heap
page read and write
1E56ADED000
heap
page read and write
1E568950000
heap
page read and write
1E56B7F8000
heap
page read and write
1F713774000
heap
page read and write
1E56ACBD000
heap
page read and write
1E56ADE4000
heap
page read and write
1E56AE34000
heap
page read and write
1F713776000
heap
page read and write
1E56A57F000
heap
page read and write
1E56A806000
heap
page read and write
7FF8B8CB0000
unkown
page readonly
1E56A834000
heap
page read and write
7FF8B5735000
unkown
page execute and read and write
1E5687EE000
heap
page read and write
1E56AD7B000
heap
page read and write
1E56AE31000
heap
page read and write
1E56AEAB000
heap
page read and write
1E56AC60000
heap
page read and write
7FF8A8F24000
unkown
page execute and read and write
1E56AE94000
heap
page read and write
1E56A785000
heap
page read and write
1F713774000
heap
page read and write
1E56AC57000
heap
page read and write
1F713774000
heap
page read and write
1F713759000
heap
page read and write
1E56A597000
heap
page read and write
1E56B840000
heap
page read and write
1E56ACA4000
heap
page read and write
1E56AE66000
heap
page read and write
1E56A8FD000
heap
page read and write
1E5687F3000
heap
page read and write
1E56ACDF000
heap
page read and write
1E56A609000
heap
page read and write
1E56A8A8000
heap
page read and write
1E56A578000
heap
page read and write
7FF6E217B000
unkown
page readonly
1E56A595000
heap
page read and write
1F713778000
heap
page read and write
1F713778000
heap
page read and write
1E568804000
heap
page read and write
1E568841000
heap
page read and write
7FF8A81A2000
unkown
page execute and read and write
7FF6E2194000
unkown
page readonly
1E56ADBC000
heap
page read and write
1E56A772000
heap
page read and write
1E568802000
heap
page read and write
1E56B83A000
heap
page read and write
1E56AD95000
heap
page read and write
1E56A8A5000
heap
page read and write
1F71377A000
heap
page read and write
1E56AE46000
heap
page read and write
1E56AF8A000
heap
page read and write
1F713781000
heap
page read and write
1E56AF89000
heap
page read and write
1E56AFBE000
heap
page read and write
1F713780000
heap
page read and write
1E56AEAC000
heap
page read and write
1E56AE46000
heap
page read and write
1E568803000
heap
page read and write
1F713774000
heap
page read and write
1E56A876000
heap
page read and write
1E56A56C000
heap
page read and write
1E56A770000
heap
page read and write
1E56A557000
heap
page read and write
1E56AC54000
heap
page read and write
1E56A5DC000
heap
page read and write
1E56A8DB000
heap
page read and write
1F713780000
heap
page read and write
1E56A8B1000
heap
page read and write
1E56A78B000
heap
page read and write
7FF6E218E000
unkown
page write copy
1F713774000
heap
page read and write
1E5687EB000
heap
page read and write
1E56AFF6000
heap
page read and write
1E5687E5000
heap
page read and write
2766BE0000
stack
page read and write
1E56AEAA000
heap
page read and write
1E56A596000
heap
page read and write
7FF8B7821000
unkown
page execute and read and write
1E56A75F000
heap
page read and write
1E56AE1B000
heap
page read and write
1E56A894000
heap
page read and write
7FF8A83DE000
unkown
page execute and read and write
1E56AF1F000
heap
page read and write
7FF8B573A000
unkown
page read and write
7FF8A8261000
unkown
page execute and read and write
1E56A56C000
heap
page read and write
1E56A74F000
heap
page read and write
1E568841000
heap
page read and write
1E56ADE4000
heap
page read and write
1E56A521000
heap
page read and write
1E56AE15000
heap
page read and write
1E56882E000
heap
page read and write
1E5687F9000
heap
page read and write
1E56A526000
heap
page read and write
1E56A819000
heap
page read and write
1E56AF7B000
heap
page read and write
1E56A5F0000
heap
page read and write
1E56ADE2000
heap
page read and write
1F713774000
heap
page read and write
1E56AEAD000
heap
page read and write
1F713781000
heap
page read and write
1E56A74E000
heap
page read and write
7FF8B570B000
unkown
page execute and read and write
1E56A5AA000
heap
page read and write
1E56C084000
direct allocation
page read and write
7FF8A8368000
unkown
page execute and read and write
1E56A805000
heap
page read and write
1E56AEB3000
heap
page read and write
7FF8B7E11000
unkown
page execute and read and write
1E56A511000
heap
page read and write
1E56A724000
heap
page read and write
1E56A77A000
heap
page read and write
1E56A8FD000
heap
page read and write
1E56B7EC000
heap
page read and write
1E56A583000
heap
page read and write
7FF8B6049000
unkown
page execute and write copy
1E56A74D000
heap
page read and write
1E56AF7B000
heap
page read and write
1E56A5D0000
heap
page read and write
7FF8B6170000
unkown
page readonly
1E56AFD2000
heap
page read and write
1E56A576000
heap
page read and write
1F71377C000
heap
page read and write
1E56AC2B000
heap
page read and write
1F713774000
heap
page read and write
1F713776000
heap
page read and write
1E56AC60000
heap
page read and write
1E56ADEA000
heap
page read and write
7FF8B5701000
unkown
page execute and read and write
1E56ACD6000
heap
page read and write
7FF6E2151000
unkown
page execute read
1E56A765000
heap
page read and write
1E56A580000
heap
page read and write
1E56ADE4000
heap
page read and write
1E56B8B1000
heap
page read and write
1E56A809000
heap
page read and write
1F713778000
heap
page read and write
1E56A55F000
heap
page read and write
1E56A758000
heap
page read and write
1E56A572000
heap
page read and write
1E56AC94000
heap
page read and write
1E56AE50000
heap
page read and write
1E56A711000
heap
page read and write
1E56A837000
heap
page read and write
7FF8B6027000
unkown
page execute and read and write
1E56A7FD000
heap
page read and write
1F713776000
heap
page read and write
1E56A87E000
heap
page read and write
1E56A883000
heap
page read and write
1E56AC60000
heap
page read and write
7FF6E2151000
unkown
page execute read
1E56A5BA000
heap
page read and write
1E56AE94000
heap
page read and write
1F713774000
heap
page read and write
1E56ADE4000
heap
page read and write
1E56AD4B000
heap
page read and write
1E56A5ED000
heap
page read and write
1E56A590000
heap
page read and write
1E56AF35000
heap
page read and write
1E56AD51000
heap
page read and write
7FF8B7844000
unkown
page execute and read and write
1E56AF64000
heap
page read and write
1E56A58B000
heap
page read and write
1E56A879000
heap
page read and write
1E56A5F3000
heap
page read and write
7FF6E2150000
unkown
page readonly
1E56883F000
heap
page read and write
7FF8B883A000
unkown
page read and write
7FF8B7E10000
unkown
page readonly
1E56A5E7000
heap
page read and write
7FF8B6028000
unkown
page execute and write copy
1E56A809000
heap
page read and write
1E568820000
heap
page read and write
1E56AF24000
heap
page read and write
7FF8B984B000
unkown
page execute and write copy
1E56AE03000
heap
page read and write
1E56A609000
heap
page read and write
1E56B801000
heap
page read and write
1E56B848000
heap
page read and write
7FF8A8362000
unkown
page execute and read and write
1F713781000
heap
page read and write
1E56A77C000
heap
page read and write
1F71377A000
heap
page read and write
1E56A790000
heap
page read and write
1E56A610000
direct allocation
page read and write
1E56A559000
heap
page read and write
1E56A876000
heap
page read and write
7FF8A81F2000
unkown
page execute and read and write
1F713774000
heap
page read and write
7FF8B77F5000
unkown
page execute and read and write
1E56AE33000
heap
page read and write
7FF8B6048000
unkown
page execute and read and write
1F713780000
heap
page read and write
1E56A520000
heap
page read and write
1E56AF23000
heap
page read and write
1E56ADE2000
heap
page read and write
7FF8B7807000
unkown
page execute and read and write
1E56A57F000
heap
page read and write
1E56AD54000
heap
page read and write
1F713781000
heap
page read and write
1E56AE66000
heap
page read and write
1E56881D000
heap
page read and write
1E5687F0000
heap
page read and write
1E56B847000
heap
page read and write
1F713778000
heap
page read and write
1E56AD62000
heap
page read and write
1E56A5A7000
heap
page read and write
1E56A7D7000
heap
page read and write
7FF8B8AF1000
unkown
page execute and read and write
1E56ADE4000
heap
page read and write
1E56A71F000
heap
page read and write
1E56A77A000
heap
page read and write
1E56AF24000
heap
page read and write
1E56A54D000
heap
page read and write
1E568844000
heap
page read and write
1E56AF34000
heap
page read and write
1E56B807000
heap
page read and write
1F713774000
heap
page read and write
1F713776000
heap
page read and write
1F71377A000
heap
page read and write
1E56A8FD000
heap
page read and write
1E56AE95000
heap
page read and write
1E56A557000
heap
page read and write
7FF8B7829000
unkown
page execute and write copy
1E56AC8D000
heap
page read and write
1E56A852000
heap
page read and write
1E56AC84000
heap
page read and write
1E56A90C000
heap
page read and write
1E56ACB8000
heap
page read and write
1E56B7FB000
heap
page read and write
1E568851000
heap
page read and write
7FF8B8AF4000
unkown
page execute and read and write
1E56A8B1000
heap
page read and write
7FF8B5711000
unkown
page read and write
1E56A2C0000
heap
page read and write
1F715160000
heap
page read and write
1E56C0A0000
direct allocation
page read and write
7FF6E218E000
unkown
page read and write
7FF8B8CB9000
unkown
page execute and read and write
1F713781000
heap
page read and write
1E56A7FD000
heap
page read and write
1E56880E000
heap
page read and write
1E56ADBC000
heap
page read and write
1F71377A000
heap
page read and write
1F713774000
heap
page read and write
1E56883F000
heap
page read and write
1E56A80A000
heap
page read and write
1E56B837000
heap
page read and write
1E56B7C1000
heap
page read and write
1E56C06C000
direct allocation
page read and write
1F713776000
heap
page read and write
1E56A5AF000
heap
page read and write
7FF8B8F88000
unkown
page execute and read and write
7FF8B8798000
unkown
page execute and read and write
7FF8B8F70000
unkown
page readonly
1E56881B000
heap
page read and write
1E56ACCC000
heap
page read and write
13541CE000
stack
page read and write
1E56AF1E000
heap
page read and write
1E56AFD5000
heap
page read and write
1E56A56C000
heap
page read and write
1E56ADEC000
heap
page read and write
1E56A7D7000
heap
page read and write
1F713774000
heap
page read and write
7FF8BFABB000
unkown
page execute and read and write
7FF8B9840000
unkown
page readonly
1E56AE24000
heap
page read and write
1E56AF24000
heap
page read and write
1E56AE6D000
heap
page read and write
1E56AD5C000
heap
page read and write
1E56A606000
heap
page read and write
7FF8A8C74000
unkown
page execute and read and write
1E56ACCD000
heap
page read and write
1E56A5F8000
heap
page read and write
1E56ACA5000
heap
page read and write
1E568821000
heap
page read and write
1E56AD83000
heap
page read and write
7FF8B7E68000
unkown
page read and write
1E56C010000
direct allocation
page read and write
1E56A811000
heap
page read and write
1E56ADE2000
heap
page read and write
1E56A88F000
heap
page read and write
1E56A605000
heap
page read and write
1E56ADBC000
heap
page read and write
7FF6E2194000
unkown
page readonly
1E56A8CE000
heap
page read and write
1E56ADAA000
heap
page read and write
1E56ACDC000
heap
page read and write
1E56A738000
heap
page read and write
1E56A710000
heap
page read and write
7FF8B7DFB000
unkown
page execute and read and write
1F713776000
heap
page read and write
1E56B8CB000
heap
page read and write
7FF8B8C1A000
unkown
page read and write
1E56AFD3000
heap
page read and write
1E56AF7B000
heap
page read and write
7FF8B8B20000
unkown
page readonly
1E56ADDD000
heap
page read and write
7FF8B7830000
unkown
page readonly
1F713774000
heap
page read and write
1E56A52D000
heap
page read and write
1F71377A000
heap
page read and write
1E56A559000
heap
page read and write
1E56AD4C000
heap
page read and write
1E56ACE5000
heap
page read and write
1E56AE24000
heap
page read and write
1E56ACA0000
heap
page read and write
1E56882F000
heap
page read and write
1F713778000
heap
page read and write
1F713776000
heap
page read and write
1E56AE2D000
heap
page read and write
1E56A76A000
heap
page read and write
1E56A727000
heap
page read and write
1E56C0A8000
direct allocation
page read and write
1E56A52C000
heap
page read and write
1F713782000
heap
page read and write
1E56A786000
heap
page read and write
1F713776000
heap
page read and write
1E56A590000
heap
page read and write
1E56AD93000
heap
page read and write
1E56A8EA000
heap
page read and write
1E56A58E000
heap
page read and write
1E56ACCA000
heap
page read and write
1E56A900000
heap
page read and write
1E56B7C4000
heap
page read and write
7FF8BFABE000
unkown
page read and write
1E56ACC5000
heap
page read and write
1E56AE25000
heap
page read and write
1F71377A000
heap
page read and write
1E56AC9C000
heap
page read and write
7FF8A8257000
unkown
page execute and read and write
1E56A84F000
heap
page read and write
7FF8B5729000
unkown
page execute and read and write
1E56A813000
heap
page read and write
7FF8A9353000
unkown
page execute and read and write
1E56A2C4000
heap
page read and write
1E56A593000
heap
page read and write
1E56A5A8000
heap
page read and write
1E56AF7B000
heap
page read and write
1E56A8A5000
heap
page read and write
1F713774000
heap
page read and write
1E56A8A8000
heap
page read and write
7FF8A825A000
unkown
page read and write
1E56ADE2000
heap
page read and write
1E56AFC9000
heap
page read and write
7FF8B8AF7000
unkown
page execute and read and write
1E56A733000
heap
page read and write
1E56A857000
heap
page read and write
1E56A765000
heap
page read and write
7FF8B7E67000
unkown
page execute and write copy
7FF8B7E03000
unkown
page execute and read and write
1E56A8D4000
heap
page read and write
1F713690000
heap
page read and write
7FF8B7E39000
unkown
page execute and read and write
7FF8B93D8000
unkown
page read and write
1F713774000
heap
page read and write
1E56AEA6000
heap
page read and write
1E56ADBC000
heap
page read and write
1F713780000
heap
page read and write
7FF6E2194000
unkown
page readonly
1F713782000
heap
page read and write
1F713781000
heap
page read and write
1F71377A000
heap
page read and write
1E56A837000
heap
page read and write
1E56ADF9000
heap
page read and write
1E56AE03000
heap
page read and write
1E56A8B5000
heap
page read and write
1E56A526000
heap
page read and write
1E56880F000
heap
page read and write
1F71377A000
heap
page read and write
1F71377C000
heap
page read and write
1E56A872000
heap
page read and write
7FF8A937D000
unkown
page execute and read and write
1E56A877000
heap
page read and write
1E56AEDC000
heap
page read and write
1E56AF46000
heap
page read and write
1E56AC23000
heap
page read and write
1E568853000
heap
page read and write
1E56A5BA000
heap
page read and write
1E56C0B0000
direct allocation
page read and write
1E568821000
heap
page read and write
1E56AE69000
heap
page read and write
1E56A883000
heap
page read and write
1F713782000
heap
page read and write
1E568845000
heap
page read and write
1E56A75A000
heap
page read and write
7FF8B572A000
unkown
page execute and write copy
1E56AE30000
heap
page read and write
1E56B8C7000
heap
page read and write
1E56A570000
heap
page read and write
1F713774000
heap
page read and write
1F713780000
heap
page read and write
1E56A556000
heap
page read and write
1E56ACD7000
heap
page read and write
1E56A5BE000
heap
page read and write
1E56B7F9000
heap
page read and write
1E56AEC5000
heap
page read and write
7FF8B984C000
unkown
page read and write
1E56A8A3000
heap
page read and write
1E56AE54000
heap
page read and write
1F713776000
heap
page read and write
1E56C090000
direct allocation
page read and write
1E56AE55000
heap
page read and write
7FF8B93C0000
unkown
page readonly
7FF8B7847000
unkown
page read and write
1E56A784000
heap
page read and write
1E56AC8D000
heap
page read and write
1E56AF4A000
heap
page read and write
1E56A57A000
heap
page read and write
1E56A51B000
heap
page read and write
1F713774000
heap
page read and write
1E56AFDC000
heap
page read and write
1F713776000
heap
page read and write
1F713776000
heap
page read and write
1E56AEBC000
heap
page read and write
1E568870000
heap
page read and write
1F71377A000
heap
page read and write
1E56AC80000
heap
page read and write
1E56A56B000
heap
page read and write
1E56A790000
heap
page read and write
1E56A78D000
heap
page read and write
1E56A5D4000
heap
page read and write
7FF8B7E66000
unkown
page execute and read and write
1E56A75A000
heap
page read and write
1E56AE70000
heap
page read and write
1E56A862000
heap
page read and write
1F713776000
heap
page read and write
1E56A567000
heap
page read and write
1E56A5A2000
heap
page read and write
1E56AD4B000
heap
page read and write
7FF8B7890000
unkown
page readonly
1E56ACB8000
heap
page read and write
1F713774000
heap
page read and write
7FF8B5D09000
unkown
page execute and write copy
1E56AE5B000
heap
page read and write
1E56ADBC000
heap
page read and write
1E56AECB000
heap
page read and write
1F713774000
heap
page read and write
1E56A893000
heap
page read and write
1F713780000
heap
page read and write
7FF8B8CBC000
unkown
page read and write
1E56ACA1000
heap
page read and write
1E56AF65000
heap
page read and write
1F713781000
heap
page read and write
1E56881E000
heap
page read and write
1E568809000
heap
page read and write
1E56C0BC000
direct allocation
page read and write
1E56A8AD000
heap
page read and write
1E56B6C0000
direct allocation
page read and write
7FF8A8341000
unkown
page execute and read and write
1E56A8D2000
heap
page read and write
1E56AE34000
heap
page read and write
1F713774000
heap
page read and write
1E56AD84000
heap
page read and write
7FF8B8B0E000
unkown
page execute and read and write
1E56ACCA000
heap
page read and write
1E56A77A000
heap
page read and write
1E56AE69000
heap
page read and write
1E56AD4B000
heap
page read and write
7FF8B8B49000
unkown
page execute and read and write
1E56AE24000
heap
page read and write
7FF8B8C10000
unkown
page readonly
1E56A790000
heap
page read and write
1F71377A000
heap
page read and write
1E56A553000
heap
page read and write
1E56A80F000
heap
page read and write
7FF8B7E42000
unkown
page read and write
1E56AF98000
heap
page read and write
7FF8BA251000
unkown
page readonly
1E56B7C7000
heap
page read and write
7FF8B8C18000
unkown
page execute and write copy
1E56A534000
heap
page read and write
7FF8B6039000
unkown
page execute and write copy
7FF8A83C7000
unkown
page execute and read and write
1E56A857000
heap
page read and write
1E56A609000
heap
page read and write
1E56A597000
heap
page read and write
1E5687EC000
heap
page read and write
1E56A835000
heap
page read and write
7FF8B8F71000
unkown
page execute and read and write
1E56AF88000
heap
page read and write
1E56A89E000
heap
page read and write
1F713774000
heap
page read and write
1F713774000
heap
page read and write
1E56A852000
heap
page read and write
1E56A574000
heap
page read and write
1E568827000
heap
page read and write
1E56A76F000
heap
page read and write
7FF8B5700000
unkown
page readonly
1E56A718000
heap
page read and write
1F713780000
heap
page read and write
1E56ADE8000
heap
page read and write
1E56AD83000
heap
page read and write
1F713780000
heap
page read and write
1E56AF6C000
heap
page read and write
1E56AEB2000
heap
page read and write
1E56A8D2000
heap
page read and write
1E56B823000
heap
page read and write
1E56A59F000
heap
page read and write
1E56AFC8000
heap
page read and write
1E56B8C2000
heap
page read and write
1F713778000
heap
page read and write
1E56AFDC000
heap
page read and write
2766BED000
stack
page read and write
1E56A7A0000
heap
page read and write
1E56AE8F000
heap
page read and write
1E56AD51000
heap
page read and write
1F713774000
heap
page read and write
1F713776000
heap
page read and write
1E56B7F5000
heap
page read and write
1F71377A000
heap
page read and write
7FF6E2150000
unkown
page readonly
1F715350000
heap
page read and write
1E56A846000
heap
page read and write
1E56A866000
heap
page read and write
1E56B80F000
heap
page read and write
1E56AD4C000
heap
page read and write
1E56C08C000
direct allocation
page read and write
1F713774000
heap
page read and write
1E56A5B0000
heap
page read and write
1F713774000
heap
page read and write
1E56B82E000
heap
page read and write
1E56A8D3000
heap
page read and write
1E56AC22000
heap
page read and write
1E56A574000
heap
page read and write
1E56A717000
heap
page read and write
1E56A7F0000
heap
page read and write
7FF8B8B44000
unkown
page execute and read and write
1E56A750000
heap
page read and write
1E56A598000
heap
page read and write
1E56ADE2000
heap
page read and write
1E56A900000
heap
page read and write
1E56A81C000
heap
page read and write
1E56AF27000
heap
page read and write
1E5687F8000
heap
page read and write
1F71377C000
heap
page read and write
1E56A8FD000
heap
page read and write
1E56A8A5000
heap
page read and write
7FF8B6020000
unkown
page readonly
1E56A844000
heap
page read and write
1E5687E9000
heap
page read and write
1F713774000
heap
page read and write
1E56A802000
heap
page read and write
1E568810000
heap
page read and write
1F71377A000
heap
page read and write
1E56ACDC000
heap
page read and write
7FF8B604B000
unkown
page read and write
1E56AC9C000
heap
page read and write
1E56A90E000
heap
page read and write
1E56A769000
heap
page read and write
7FF8B8831000
unkown
page execute and read and write
1E56884E000
heap
page read and write
1E56AE15000
heap
page read and write
1E56B7F7000
heap
page read and write
1E56AC8D000
heap
page read and write
1E56AF44000
heap
page read and write
7FF8A8D6E000
unkown
page execute and read and write
1E56B7CA000
heap
page read and write
1F713783000
heap
page read and write
1E56A809000
heap
page read and write
1F713774000
heap
page read and write
1F713773000
heap
page read and write
1E56A609000
heap
page read and write
1E568845000
heap
page read and write
1F713774000
heap
page read and write
1E56A717000
heap
page read and write
1E56A74D000
heap
page read and write
1E56A5C1000
heap
page read and write
1E56A7A0000
heap
page read and write
1E56A8A5000
heap
page read and write
1E56A770000
heap
page read and write
1E568856000
heap
page read and write
1F713780000
heap
page read and write
1E56A730000
heap
page read and write
1E568837000
heap
page read and write
7FF8B5600000
unkown
page readonly
1E56A8FD000
heap
page read and write
1E568810000
heap
page read and write
1E56B806000
heap
page read and write
1E56AE5A000
heap
page read and write
1E56881F000
heap
page read and write
1E56A8D4000
heap
page read and write
1E56A74C000
heap
page read and write
1E56AC8C000
heap
page read and write
1E56A7C8000
heap
page read and write
1F71377C000
heap
page read and write
1F71377C000
heap
page read and write
1E56A7B1000
heap
page read and write
7FF8B8B12000
unkown
page execute and write copy
7FF8B5D08000
unkown
page execute and read and write
1F713776000
heap
page read and write
1E56AC2F000
heap
page read and write
7FF8B5730000
unkown
page readonly
1E56B140000
direct allocation
page read and write
1F71376E000
heap
page read and write
1E56AF6C000
heap
page read and write
1E56AF6B000
heap
page read and write
1F713774000
heap
page read and write
1E568831000
heap
page read and write
1E56B480000
direct allocation
page read and write
1E56AFD8000
heap
page read and write
1E56AC51000
heap
page read and write
1F713780000
heap
page read and write
1E56AE24000
heap
page read and write
1E56A7A1000
heap
page read and write
1E56AC2B000
heap
page read and write
1E56A86B000
heap
page read and write
1E568840000
heap
page read and write
1E56AC83000
heap
page read and write
1E56AF44000
heap
page read and write
7FF6E218E000
unkown
page read and write
7FF8A8F0B000
unkown
page execute and read and write
1E56A88F000
heap
page read and write
1E56ADBC000
heap
page read and write
1E56A780000
heap
page read and write
1E56A583000
heap
page read and write
1E56A76A000
heap
page read and write
1F713783000
heap
page read and write
1F71377A000
heap
page read and write
1E56A78D000
heap
page read and write
7FF8B8B01000
unkown
page execute and read and write
7FF8B8799000
unkown
page execute and write copy
1E56AC30000
heap
page read and write
1E56AF84000
heap
page read and write
1F713774000
heap
page read and write
7FF8A83D7000
unkown
page execute and read and write
1E56A78C000
heap
page read and write
1E56AD4B000
heap
page read and write
1F713782000
heap
page read and write
1E56A8CD000
heap
page read and write
1E56AFBC000
heap
page read and write
1E56A7A0000
heap
page read and write
1E56A860000
heap
page read and write
1E56ADE2000
heap
page read and write
7FF8B6031000
unkown
page execute and read and write
7FF8A8839000
unkown
page read and write
1E56A7D0000
heap
page read and write
7FF8A83EC000
unkown
page execute and read and write
1E56A56F000
heap
page read and write
1E56AF24000
heap
page read and write
1E56AEAA000
heap
page read and write
1E56A567000
heap
page read and write
1E56AD90000
heap
page read and write
1E56A834000
heap
page read and write
7FF8A881F000
unkown
page execute and read and write
1F713774000
heap
page read and write
1E56ACC2000
heap
page read and write
1E568810000
heap
page read and write
1E56AE8B000
heap
page read and write
1E56B8CB000
heap
page read and write
7FF8B602A000
unkown
page read and write
7FF8A86A9000
unkown
page execute and read and write
1E56A7C9000
heap
page read and write
1E56A78D000
heap
page read and write
1F713774000
heap
page read and write
7FF8A92D1000
unkown
page execute and read and write
1F713776000
heap
page read and write
1E56AE24000
heap
page read and write
1E56A5AD000
heap
page read and write
1E56AFC8000
heap
page read and write
1F713774000
heap
page read and write
1F713774000
heap
page read and write
1E56B004000
heap
page read and write
1E56A5C8000
heap
page read and write
7FF8B93D6000
unkown
page execute and write copy
1E56A796000
heap
page read and write
1E56AF35000
heap
page read and write
7FF8B8830000
unkown
page readonly
1E56A80E000
heap
page read and write
1E56AC9D000
heap
page read and write
1E56A56C000
heap
page read and write
1E56A7C8000
heap
page read and write
1E56A553000
heap
page read and write
1F713780000
heap
page read and write
7FF8B8791000
unkown
page execute and read and write
1E56A877000
heap
page read and write
1E56A89D000
heap
page read and write
1E56B6C4000
direct allocation
page read and write
1E56A811000
heap
page read and write
7FF8A9388000
unkown
page execute and read and write
7FF8A832D000
unkown
page execute and read and write
1E56AFDF000
heap
page read and write
1E56B7E6000
heap
page read and write
1E56A8FD000
heap
page read and write
1F71377B000
heap
page read and write
1E56A7B9000
heap
page read and write
7FF8B572C000
unkown
page read and write
1E56A5FA000
heap
page read and write
1E56A7C1000
heap
page read and write
1E56A85F000
heap
page read and write
1E56A834000
heap
page read and write
1F713776000
heap
page read and write
1E56ACC5000
heap
page read and write
1E56ADAA000
heap
page read and write
1E56A606000
heap
page read and write
1F713782000
heap
page read and write
1E56A81E000
heap
page read and write
1E56ACB8000
heap
page read and write
1F713580000
heap
page read and write
1E568842000
heap
page read and write
1E56A783000
heap
page read and write
1E56AE54000
heap
page read and write
1E56A90E000
heap
page read and write
1E56AD7B000
heap
page read and write
7FF8B603A000
unkown
page read and write
1F713774000
heap
page read and write
1F713778000
heap
page read and write
1F71377C000
heap
page read and write
1E56A8EA000
heap
page read and write
1E56AFF7000
heap
page read and write
1E56A772000
heap
page read and write
1E56A811000
heap
page read and write
1E56AD4B000
heap
page read and write
1353DDD000
stack
page read and write
1E56AF43000
heap
page read and write
1E56A598000
heap
page read and write
1E56A86B000
heap
page read and write
1E56A770000
heap
page read and write
1E56ADDC000
heap
page read and write
7FF8BFABC000
unkown
page execute and write copy
1E56ADE4000
heap
page read and write
1E56ACE3000
heap
page read and write
1F713782000
heap
page read and write
1E56A730000
heap
page read and write
1E56A802000
heap
page read and write
1F713660000
heap
page read and write
1E56AF28000
heap
page read and write
1E568844000
heap
page read and write
1E56AB20000
direct allocation
page read and write
7FF8B93D5000
unkown
page execute and read and write
1E56A85B000
heap
page read and write
1F713774000
heap
page read and write
1F71377A000
heap
page read and write
7FF8B6050000
unkown
page readonly
1E56ADFE000
heap
page read and write
1F713778000
heap
page read and write
1E56ACC1000
heap
page read and write
1E56A88F000
heap
page read and write
1E56AE56000
heap
page read and write
1E56AF6C000
heap
page read and write
7FF8A8F31000
unkown
page execute and write copy
1F713776000
heap
page read and write
1E56A120000
heap
page read and write
1E56A788000
heap
page read and write
7FF8B8838000
unkown
page execute and read and write
1F71377A000
heap
page read and write
1E56B899000
heap
page read and write
1F713776000
heap
page read and write
1E56A89D000
heap
page read and write
1E56A5A3000
heap
page read and write
1E56AF7B000
heap
page read and write
7FF8A9398000
unkown
page read and write
1E56ADBC000
heap
page read and write
1F713778000
heap
page read and write
7FF8B8C11000
unkown
page execute and read and write
1F713780000
heap
page read and write
1F713774000
heap
page read and write
1E56A5D0000
heap
page read and write
1E56AEAB000
heap
page read and write
1F713782000
heap
page read and write
1F713782000
heap
page read and write
1F713776000
heap
page read and write
1E56AF3F000
heap
page read and write
1E56A5A3000
heap
page read and write
1E56AC2D000
heap
page read and write
1F713774000
heap
page read and write
7FF8A824F000
unkown
page execute and read and write
1E56A8E5000
heap
page read and write
1E56B7D1000
heap
page read and write
7FF8B8F94000
unkown
page read and write
1E56B7D4000
heap
page read and write
1E56A88D000
heap
page read and write
1F713780000
heap
page read and write
7FF8B5D01000
unkown
page execute and read and write
7FF6E2150000
unkown
page readonly
1E56A8B3000
heap
page read and write
1E56A809000
heap
page read and write
1E56AE24000
heap
page read and write
1F713781000
heap
page read and write
1E56A59F000
heap
page read and write
1E56A5F3000
heap
page read and write
1E56ACDC000
heap
page read and write
1F713774000
heap
page read and write
1E56AC55000
heap
page read and write
1E56B7EC000
heap
page read and write
1E56AE70000
heap
page read and write
1E56A547000
heap
page read and write
1E56B8CC000
heap
page read and write
1E56AE94000
heap
page read and write
1E56A60A000
heap
page read and write
1E56AF65000
heap
page read and write
1E56A57F000
heap
page read and write
1E56A7FA000
heap
page read and write
1E56A78D000
heap
page read and write
1E56B89F000
heap
page read and write
7FF8B8F92000
unkown
page execute and write copy
1E56AE70000
heap
page read and write
1E56A56F000
heap
page read and write
1E56A85B000
heap
page read and write
1E56A5AD000
heap
page read and write
1F713774000
heap
page read and write
7FF8B781B000
unkown
page read and write
7FF8B7E63000
unkown
page execute and read and write
1F713780000
heap
page read and write
1E56ACE2000
heap
page read and write
1E56ACE1000
heap
page read and write
1F713780000
heap
page read and write
1E56A60E000
heap
page read and write
7FF6E2151000
unkown
page execute read
1E56A717000
heap
page read and write
1E56A5BA000
heap
page read and write
1E56A7DB000
heap
page read and write
1F713774000
heap
page read and write
7FF8B8CBA000
unkown
page execute and write copy
1F713781000
heap
page read and write
1E56AF98000
heap
page read and write
1F713780000
heap
page read and write
1E56A8D2000
heap
page read and write
1E5687E7000
heap
page read and write
7FF8A8E6B000
unkown
page execute and read and write
1F713778000
heap
page read and write
1F713776000
heap
page read and write
1E56A806000
heap
page read and write
1E56ADBC000
heap
page read and write
1E56A5BA000
heap
page read and write
1E56A898000
heap
page read and write
7FF6E2194000
unkown
page readonly
1E56AC5D000
heap
page read and write
1E56A819000
heap
page read and write
1E56A5B0000
heap
page read and write
1F713776000
heap
page read and write
1F713772000
heap
page read and write
1F713774000
heap
page read and write
1E56ADE4000
heap
page read and write
1E56A852000
heap
page read and write
7FF8B5731000
unkown
page execute and read and write
1E56A594000
heap
page read and write
1E56A833000
heap
page read and write
1E56B7C0000
heap
page read and write
1E56AC2F000
heap
page read and write
7FF8B6021000
unkown
page execute and read and write
1E56A78D000
heap
page read and write
1E56B8B1000
heap
page read and write
1E56A60C000
heap
page read and write
1E56AE69000
heap
page read and write
1E56A78D000
heap
page read and write
7FF8A8330000
unkown
page read and write
1F713774000
heap
page read and write
7FF6E218E000
unkown
page write copy
1E56A88E000
heap
page read and write
1E56A572000
heap
page read and write
7FF8B7825000
unkown
page execute and read and write
1E56A5D1000
heap
page read and write
1E56A8CD000
heap
page read and write
1E56A598000
heap
page read and write
1F713774000
heap
page read and write
1E56A8CD000
heap
page read and write
1E56A836000
heap
page read and write
1F713774000
heap
page read and write
1E56ACCC000
heap
page read and write
1F713776000
heap
page read and write
1E56A52F000
heap
page read and write
7FF8B6041000
unkown
page execute and read and write
1F713774000
heap
page read and write
1E56AFBC000
heap
page read and write
1E56AEB5000
heap
page read and write
1E56A510000
heap
page read and write
1E56AC9A000
heap
page read and write
1E56A7EE000
heap
page read and write
1E56A160000
direct allocation
page read and write
1E56ACAB000
heap
page read and write
7FF8B617C000
unkown
page read and write
1F71377A000
heap
page read and write
1E56A7DC000
heap
page read and write
1E56AC9D000
heap
page read and write
1E56A88F000
heap
page read and write
1E56A771000
heap
page read and write
1F713778000
heap
page read and write
7FF8A8C6D000
unkown
page execute and read and write
1E56AF02000
heap
page read and write
7FF8B8F90000
unkown
page execute and read and write
1E56A712000
heap
page read and write
1E56AC29000
heap
page read and write
1E56A7A2000
heap
page read and write
1E56B80B000
heap
page read and write
7FF8BA240000
unkown
page readonly
7FF8BA4F0000
unkown
page readonly
1E56AD54000
heap
page read and write
1E56A5B9000
heap
page read and write
7FF8A832E000
unkown
page execute and write copy
1E56A57C000
heap
page read and write
1E56A59B000
heap
page read and write
1E56AE90000
heap
page read and write
1E56A583000
heap
page read and write
1E56ADFD000
heap
page read and write
1E56AF7B000
heap
page read and write
1E56A846000
heap
page read and write
1E56C080000
direct allocation
page read and write
1E56AF98000
heap
page read and write
1E568840000
heap
page read and write
1F713780000
heap
page read and write
7FF8B7891000
unkown
page execute and read and write
1E56AF6A000
heap
page read and write
1E56AF87000
heap
page read and write
1E568840000
heap
page read and write
1E568832000
heap
page read and write
1E56A909000
heap
page read and write
1E56A8A2000
heap
page read and write
7FF8B570F000
unkown
page execute and write copy
1E56A733000
heap
page read and write
1F713776000
heap
page read and write
1E56ACE5000
heap
page read and write
1E56A5D1000
heap
page read and write
1F713774000
heap
page read and write
1E56AF7C000
heap
page read and write
1E56A5D7000
heap
page read and write
7FF8B6040000
unkown
page readonly
1E56AC87000
heap
page read and write
1E56A55B000
heap
page read and write
7FF8B7820000
unkown
page readonly
1E56A7D4000
heap
page read and write
1E56A7B4000
heap
page read and write
1E56B01E000
heap
page read and write
1E56AF46000
heap
page read and write
7FF6E217B000
unkown
page readonly
1E568810000
heap
page read and write
7FF8B77F9000
unkown
page execute and write copy
1E56A788000
heap
page read and write
1E56A554000
heap
page read and write
1E568849000
heap
page read and write
7FF8B605D000
unkown
page read and write
1E56A601000
heap
page read and write
7FF8B605A000
unkown
page execute and read and write
1E56A805000
heap
page read and write
1E56A90C000
heap
page read and write
1E56ACB2000
heap
page read and write
1F713774000
heap
page read and write
1E56ACB8000
heap
page read and write
1E56A5CD000
heap
page read and write
1E56A5A5000
heap
page read and write
7FF8A8B1F000
unkown
page execute and read and write
1E56A75A000
heap
page read and write
1E56A7C2000
heap
page read and write
7FF8BFAB9000
unkown
page execute and read and write
1E56ACE3000
heap
page read and write
7FF8B77F0000
unkown
page readonly
7FF8B5D05000
unkown
page execute and read and write
1E56B270000
direct allocation
page read and write
1E56A583000
heap
page read and write
1E56AEB5000
heap
page read and write
1E56A8D2000
heap
page read and write
1E56A77A000
heap
page read and write
1E56AF66000
heap
page read and write
1E56A57D000
heap
page read and write
1E56A876000
heap
page read and write
1E56A805000
heap
page read and write
1E56A877000
heap
page read and write
1E56AD65000
heap
page read and write
1E56B8CB000
heap
page read and write
7FF8B7808000
unkown
page execute and write copy
1E568845000
heap
page read and write
1E56AE99000
heap
page read and write
7FF8B5720000
unkown
page readonly
1E568803000
heap
page read and write
1E56ADFB000
heap
page read and write
7FF8B879B000
unkown
page read and write
1F713774000
heap
page read and write
1E56AD61000
heap
page read and write
7FF8A87EA000
unkown
page execute and read and write
1E56A747000
heap
page read and write
7FF8B8C14000
unkown
page execute and read and write
7FF8B7828000
unkown
page execute and read and write
1E56A8CE000
heap
page read and write
1E56ACC2000
heap
page read and write
7FF8B984A000
unkown
page execute and read and write
1E56AC6D000
heap
page read and write
1E56AD5B000
heap
page read and write
1E56A56F000
heap
page read and write
7FF8A8140000
unkown
page readonly
7FF8A86E2000
unkown
page execute and read and write
1E56A80B000
heap
page read and write
1F713781000
heap
page read and write
1E56B370000
direct allocation
page read and write
1E56AD99000
heap
page read and write
1E56AC80000
heap
page read and write
1E56A5CE000
heap
page read and write
1E56C068000
direct allocation
page read and write
2766FCF000
stack
page read and write
1E56B7C2000
heap
page read and write
1E568827000
heap
page read and write
1E56AE28000
heap
page read and write
1E56AF53000
heap
page read and write
7FF8B5D0B000
unkown
page read and write
1E56AE25000
heap
page read and write
1F713782000
heap
page read and write
7FF8B8CB1000
unkown
page execute and read and write
1E56A57B000
heap
page read and write
1F71377C000
heap
page read and write
1F713778000
heap
page read and write
1E56AF21000
heap
page read and write
1F713774000
heap
page read and write
7FF8B7E06000
unkown
page read and write
1E56A740000
heap
page read and write
1E56A5CD000
heap
page read and write
1E56B01E000
heap
page read and write
1E56A57F000
heap
page read and write
1E56ACB4000
heap
page read and write
7FF8A8260000
unkown
page readonly
1E56A5C8000
heap
page read and write
1F713774000
heap
page read and write
1E56B7FB000
heap
page read and write
1E56A7DA000
heap
page read and write
1E5687FB000
heap
page read and write
1F713774000
heap
page read and write
1E56A57A000
heap
page read and write
1E56A578000
heap
page read and write
7FF8B77F1000
unkown
page execute and read and write
1E56C074000
direct allocation
page read and write
7FF8B7E30000
unkown
page execute and read and write
1E56AD9F000
heap
page read and write
7FF8A82B6000
unkown
page execute and read and write
1E56ADE0000
heap
page read and write
1E56A810000
heap
page read and write
7FF8B78C3000
unkown
page read and write
1F71377A000
heap
page read and write
1E56AD7B000
heap
page read and write
7FF8BA4FA000
unkown
page execute and write copy
1E56AC59000
heap
page read and write
1E56A582000
heap
page read and write
1F71377A000
heap
page read and write
7FF8B5D00000
unkown
page readonly
1E56A60E000
heap
page read and write
7FF8B7800000
unkown
page readonly
7FF8B78C1000
unkown
page execute and read and write
1E56AF35000
heap
page read and write
1E56A85C000
heap
page read and write
1F713774000
heap
page read and write
1E56A782000
heap
page read and write
1E56A54B000
heap
page read and write
1F713780000
heap
page read and write
1E56AE24000
heap
page read and write
7FF8A81F7000
unkown
page execute and read and write
1E56AC8C000
heap
page read and write
1F713780000
heap
page read and write
1E56A74F000
heap
page read and write
1E56A81D000
heap
page read and write
1E56A88A000
heap
page read and write
1F713781000
heap
page read and write
1E56A73F000
heap
page read and write
1E56A78D000
heap
page read and write
1E56A582000
heap
page read and write
7FF8A8340000
unkown
page readonly
1E56A7C7000
heap
page read and write
1E56A90C000
heap
page read and write
1E56AE46000
heap
page read and write
7FF8A8871000
unkown
page execute and read and write
1F713774000
heap
page read and write
1E568844000
heap
page read and write
1E56A78F000
heap
page read and write
7FF8B8AF0000
unkown
page readonly
1E56A600000
heap
page read and write
1E56882E000
heap
page read and write
7FF8B7811000
unkown
page execute and read and write
1E56B00D000
heap
page read and write
1F713774000
heap
page read and write
1E56A86B000
heap
page read and write
1E56AFBC000
heap
page read and write
1E56B77C000
direct allocation
page read and write
1E56AC68000
heap
page read and write
1E56A7D2000
heap
page read and write
1E56A5D0000
heap
page read and write
7FF8B6179000
unkown
page execute and read and write
1E56A597000
heap
page read and write
1E56A1DC000
direct allocation
page read and write
1E56ACC8000
heap
page read and write
1F713774000
heap
page read and write
1F713774000
heap
page read and write
1E56AD83000
heap
page read and write
1E56B040000
direct allocation
page read and write
1F713750000
heap
page read and write
1E568844000
heap
page read and write
1E56B008000
heap
page read and write
1E56ADE4000
heap
page read and write
1E56A5F3000
heap
page read and write
1F713780000
heap
page read and write
7FF8B7E61000
unkown
page execute and read and write
1E56A8FF000
heap
page read and write
1E56AC21000
heap
page read and write
7FF8B77F8000
unkown
page execute and read and write
1E56A5BC000
heap
page read and write
1E56A5A6000
heap
page read and write
1E56A7ED000
heap
page read and write
1F713778000
heap
page read and write
1E56A8A8000
heap
page read and write
1F71377C000
heap
page read and write
1E56A599000
heap
page read and write
1E56A8AD000
heap
page read and write
1E56B8C9000
heap
page read and write
1E56A894000
heap
page read and write
1E56A5B1000
heap
page read and write
1E56B8CB000
heap
page read and write
1F71377A000
heap
page read and write
1F713778000
heap
page read and write
1E56AC9C000
heap
page read and write
1F713781000
heap
page read and write
1E56B84B000
heap
page read and write
1E56ADBC000
heap
page read and write
7FF8A8F32000
unkown
page read and write
1E56AD59000
heap
page read and write
1E56ACAC000
heap
page read and write
7FF8A8831000
unkown
page execute and read and write
1E56B8AC000
heap
page read and write
1E56A713000
heap
page read and write
1E56A5A9000
heap
page read and write
1E56A56D000
heap
page read and write
7FF8B6038000
unkown
page execute and read and write
1E56A878000
heap
page read and write
7FF8B8B00000
unkown
page readonly
1E56AEB9000
heap
page read and write
7FF8B7801000
unkown
page execute and read and write
1E56A5FD000
heap
page read and write
1E56A5BA000
heap
page read and write
7FF8A9393000
unkown
page execute and read and write
1E56AD4B000
heap
page read and write
1E56AF44000
heap
page read and write
7FF8A8258000
unkown
page execute and write copy
1E56A5BA000
heap
page read and write
1E56A82E000
heap
page read and write
7FF8B7E51000
unkown
page execute and read and write
1F71377A000
heap
page read and write
1E56AD83000
heap
page read and write
7FF8B8B4A000
unkown
page execute and write copy
1E56A5AB000
heap
page read and write
1E56A7DB000
heap
page read and write
1E56AE24000
heap
page read and write
1F713780000
heap
page read and write
1F713778000
heap
page read and write
1E5687FB000
heap
page read and write
1E56A8EA000
heap
page read and write
1F713781000
heap
page read and write
1E56A5FD000
heap
page read and write
1E56AD4B000
heap
page read and write
1E56A8AD000
heap
page read and write
1E56A89D000
heap
page read and write
1E56B7E0000
heap
page read and write
1E56AF44000
heap
page read and write
1E56A5A3000
heap
page read and write
1E56AD4B000
heap
page read and write
1E56ADFF000
heap
page read and write
7FF8BA241000
unkown
page execute read
1F713776000
heap
page read and write
1E56A56F000
heap
page read and write
1F713774000
heap
page read and write
1F71377C000
heap
page read and write
1E56ACE3000
heap
page read and write
1E56AD69000
heap
page read and write
1F713776000
heap
page read and write
7FF8A8BA2000
unkown
page execute and read and write
1E56A59B000
heap
page read and write
1E56A882000
heap
page read and write
1E56A5BA000
heap
page read and write
1E56A7C7000
heap
page read and write
1F713780000
heap
page read and write
1E56A5FD000
heap
page read and write
1E56AC99000
heap
page read and write
1E56A56B000
heap
page read and write
1E56A783000
heap
page read and write
1E56AE34000
heap
page read and write
1E56A5D0000
heap
page read and write
1E56A5BA000
heap
page read and write
7FF8B8AF8000
unkown
page execute and write copy
1E56AED7000
heap
page read and write
1E56C064000
direct allocation
page read and write
1E56A763000
heap
page read and write
1E56A552000
heap
page read and write
1E56AC7F000
heap
page read and write
1E56AC21000
heap
page read and write
7FF8B7DE1000
unkown
page execute and read and write
1F71377A000
heap
page read and write
7FF8B7E40000
unkown
page execute and write copy
1E56AF65000
heap
page read and write
1E56C094000
direct allocation
page read and write
1E568807000
heap
page read and write
1F713774000
heap
page read and write
7FF8B7E04000
unkown
page execute and write copy
1E56A841000
heap
page read and write
1E56AA10000
direct allocation
page read and write
1E56AEBB000
heap
page read and write
1F713774000
heap
page read and write
7FF8A8B2C000
unkown
page execute and read and write
1E56A7C3000
heap
page read and write
1E56A7A2000
heap
page read and write
1F713774000
heap
page read and write
1E56A781000
heap
page read and write
1E56ACB2000
heap
page read and write
7FF8A8352000
unkown
page execute and read and write
1E56A572000
heap
page read and write
7FF8A83B2000
unkown
page execute and read and write
1E56A77B000
heap
page read and write
1E56A819000
heap
page read and write
7FF8B6171000
unkown
page execute and read and write
1E56A7B4000
heap
page read and write
7FF8BFAB1000
unkown
page execute and read and write
1E56C054000
direct allocation
page read and write
1F713778000
heap
page read and write
1E56AFE7000
heap
page read and write
1E56A270000
unkown
page readonly
1E56ACE1000
heap
page read and write
1E56A60E000
heap
page read and write
1E56A809000
heap
page read and write
1E56AE69000
heap
page read and write
1E56AF7B000
heap
page read and write
1E56AE24000
heap
page read and write
7FF8B77FB000
unkown
page read and write
1E56A8C2000
heap
page read and write
7FF8B7845000
unkown
page execute and write copy
1E568810000
heap
page read and write
1E56AE04000
heap
page read and write
1E568850000
heap
page read and write
7FF6E2192000
unkown
page read and write
1E56AD6B000
heap
page read and write
1E56A8A2000
heap
page read and write
1E56A78B000
heap
page read and write
1E56B7E3000
heap
page read and write
1F713774000
heap
page read and write
7FF8B6051000
unkown
page execute and read and write
7FF8A8141000
unkown
page execute and read and write
1E56AEBA000
heap
page read and write
1E568841000
heap
page read and write
1E56AC66000
heap
page read and write
1F71376B000
heap
page read and write
1E5687F7000
heap
page read and write
1E56A71D000
heap
page read and write
1E568769000
heap
page read and write
1E56A852000
heap
page read and write
1E56ACAC000
heap
page read and write
1E56AC2F000
heap
page read and write
1F713774000
heap
page read and write
1E56AF6F000
heap
page read and write
1E56B88C000
heap
page read and write
1E56ADE2000
heap
page read and write
1E56AD5C000
heap
page read and write
1F713783000
heap
page read and write
1E56A5A9000
heap
page read and write
1E56A812000
heap
page read and write
7FF8B8B21000
unkown
page execute and read and write
1F713774000
heap
page read and write
1E56A557000
heap
page read and write
1E56A7CB000
heap
page read and write
1E56A910000
direct allocation
page read and write
1E56B7FD000
heap
page read and write
1E56A83D000
heap
page read and write
7FF8A92D0000
unkown
page readonly
1E56A260000
direct allocation
page read and write
7FF8A86AB000
unkown
page execute and read and write
1E56A559000
heap
page read and write
1E56ADBC000
heap
page read and write
7FF8B7810000
unkown
page readonly
1E56ADE2000
heap
page read and write
1E568841000
heap
page read and write
1E56A8A2000
heap
page read and write
1F713783000
heap
page read and write
1E56AC7F000
heap
page read and write
1E568822000
heap
page read and write
1F71377A000
heap
page read and write
1E56A753000
heap
page read and write
1E56AF5E000
heap
page read and write
1E56AE70000
heap
page read and write
1E56C09C000
direct allocation
page read and write
7FF8BFAB0000
unkown
page readonly
1F713780000
heap
page read and write
7FF8B7831000
unkown
page execute and read and write
1E56AF28000
heap
page read and write
1E56A57F000
heap
page read and write
1E56A846000
heap
page read and write
1F713776000
heap
page read and write
1E56AE34000
heap
page read and write
1E56AFF6000
heap
page read and write
1F713774000
heap
page read and write
1E56AE03000
heap
page read and write
1E56A736000
heap
page read and write
1E56A75E000
heap
page read and write
1E56A572000
heap
page read and write
1E56AFEA000
heap
page read and write
1E568760000
heap
page read and write
1F713774000
heap
page read and write
1E56AE54000
heap
page read and write
1E568811000
heap
page read and write
1F713773000
heap
page read and write
7FF8B5608000
unkown
page execute and read and write
1E56A717000
heap
page read and write
1E56A815000
heap
page read and write
1E56ADFB000
heap
page read and write
7FF6E2151000
unkown
page execute read
1F713778000
heap
page read and write
1F713776000
heap
page read and write
7FF8B8AFA000
unkown
page read and write
1F713778000
heap
page read and write
7FF8B5609000
unkown
page execute and write copy
1E56AD99000
heap
page read and write
1E56A719000
heap
page read and write
1E56A884000
heap
page read and write
1E56A80C000
heap
page read and write
1E56ACA8000
heap
page read and write
1E56AC58000
heap
page read and write
1E56ACB8000
heap
page read and write
1E56A8DB000
heap
page read and write
1E56AF33000
heap
page read and write
1E56A57B000
heap
page read and write
7FF8A8254000
unkown
page execute and read and write
7FF8A81EE000
unkown
page execute and read and write
7FF6E2150000
unkown
page readonly
1E56B590000
direct allocation
page read and write
7FF8BA4FC000
unkown
page read and write
1E56A781000
heap
page read and write
1E56A815000
heap
page read and write
1E56ACE4000
heap
page read and write
7FF8BA257000
unkown
page readonly
1E56A7C1000
heap
page read and write
1E56ADC2000
heap
page read and write
7FF8B8790000
unkown
page readonly
1E56ADEC000
heap
page read and write
7FF8B5738000
unkown
page execute and read and write
1E56B005000
heap
page read and write
1E56A56B000
heap
page read and write
1E56A871000
heap
page read and write
1E56AF82000
heap
page read and write
7FF8BA4F9000
unkown
page execute and read and write
1E56A730000
heap
page read and write
1E56AFCE000
heap
page read and write
1E56A714000
heap
page read and write
7FF8B8B3C000
unkown
page execute and read and write
1E56A893000
heap
page read and write
1E56A8AE000
heap
page read and write
1E56A836000
heap
page read and write
1E56A7D2000
heap
page read and write
1E56A90E000
heap
page read and write
1E56ACE2000
heap
page read and write
1E56AD83000
heap
page read and write
1E56A753000
heap
page read and write
1E56AFF6000
heap
page read and write
There are 1623 hidden memdumps, click here to show them.