IOC Report
FLStudio24.1.2.4394.exe

loading gif

Files

File Path
Type
Category
Malicious
FLStudio24.1.2.4394.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0drsmbrp.uof.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cvqezkjt.yxp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ikiudhcc.10h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pj1m4xno.2bk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vt3iyjfl.fyb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xa5ko0zt.nx4.ps1
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FLStudio24.1.2.4394.exe
"C:\Users\user\Desktop\FLStudio24.1.2.4394.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Get-WmiObject Win32_PortConnector""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Get-WmiObject Win32_PortConnector"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "net session"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net.exe
net session
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 session
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/nodejs/node/pull/36061#discussion_r533718029
unknown
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRangesNoDash
unknown
https://github.com/chromium/chromium/blob/HEAD/third_party/blink/public/platform/web_crypto_algorith
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://gist.github.com/XVilka/8346728#gistcomment-2823421
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2876.
unknown
https://www.ecma-international.org/ecma-262/#sec-timeclip
unknown
https://console.spec.whatwg.org/#table
unknown
https://www.iana.org/assignments/tls-extensiontype-values
unknown
https://github.com/nodejs/node/issues/35475
unknown
https://github.com/chalk/ansi-regex/blob/HEAD/index.js
unknown
https://console.spec.whatwg.org/#console-namespace
unknown
https://nodejs.org/api/fs.html#fs_stat_time_values)
unknown
https://url.spec.whatwg.org/#url
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://github.com/nodejs/node/issues/13435
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtomNoDash
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.2
unknown
https://github.com/nodejs/node/commit/f7620fb96d339f704932f9bb9a0dceb9952df2d4
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtom
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassRanges
unknown
https://github.com/mysticatea/abort-controller
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://stackoverflow.com/a/5501711/3561
unknown
https://github.com/vercel/pkg/issues/1589
unknown
https://github.com/nodejs/node/pull/33661
unknown
https://github.com/heycam/webidl/pull/946.
unknown
https://github.com/nodejs/node/issues/35452
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-CharacterClassEscape
unknown
http://narwhaljs.org)
unknown
https://github.com/WICG/scheduling-apis
unknown
https://www.ecma-international.org/ecma-262/#sec-promise.all
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
https://fetch.spec.whatwg.org/#fetch-timing-info
unknown
https://github.com/tc39/proposal-iterator-helpers/issues/169
unknown
https://v8.dev/blog/v8-release-89
unknown
https://webassembly.github.io/spec/web-api
unknown
https://github.com/nodejs/node/issues/39707
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://tc39.es/ecma262/#sec-IsHTMLDDA-internal-slot
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Pattern
unknown
https://sourcemaps.info/spec.html
unknown
https://github.com/nodejs/node/pull/12342
unknown
https://github.com/nodejs/node/issues/39758
unknown
https://github.com/nodejs/node/pull/34375
unknown
https://nodejs.org/download/release/v18.5.0/node-v18.5.0.tar.gzhttps://nodejs.org/download/release/v
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
https://github.com/nodejs/node/pull/34010
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
https://github.com/da-x/rxvt-unicode/tree/v9.22-with-24bit-color
unknown
https://github.com/nodejs/node/issues
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-HexDigits
unknown
https://github.com/addaleax/eventemitter-asyncresource
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://github.com/chalk/supports-color
unknown
https://heycam.github.io/webidl/#Replaceable
unknown
https://github.com/nodejs/node/pull/30380#issuecomment-552948364
unknown
https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-setinterval
unknown
https://heycam.github.io/webidl/#dfn-class-string
unknown
https://heycam.github.io/webidl/#dfn-iterator-prototype-object
unknown
https://nodejs.org/api/cli.html#cli_unhandled_rejections_mode).
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlLetter
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Quantifier
unknown
https://github.com/nodejs/node/pull/38614)
unknown
https://github.com/nodejs/node/issues/10673
unknown
https://github.com/acornjs/acorn/issues/575
unknown
https://github.com/nodejs/node/pull/33515.
unknown
https://developer.mozilla.org/en-US/docs/Web/API/PerformanceResourceTiming
unknown
https://github.com/mafintosh/pump
unknown
https://tc39.es/ecma262/#sec-%typedarray%-intrinsic-object
unknown
https://github.com/nodejs/node/issues/19009
unknown
https://url.spec.whatwg.org/#concept-urlencoded-parser
unknown
https://tc39.github.io/ecma262/#sec-%typedarray%.of
unknown
There are 90 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22C5A5A0000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5A6A3000
heap
page read and write
22C5A6A1000
heap
page read and write
22C5C2BF000
heap
page read and write
1E4CBC1000
direct allocation
page read and write
1A3E5FF0000
heap
page read and write
22C5BFA9000
heap
page read and write
22C5C1B7000
heap
page read and write
22C5C261000
heap
page read and write
22C5C5AE000
heap
page read and write
22C5C258000
heap
page read and write
23FEA277000
heap
page read and write
22C5C4D6000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C2AE000
heap
page read and write
D3621FE000
stack
page read and write
22C5C695000
heap
page read and write
22C5C60E000
heap
page read and write
22C5C616000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C599000
heap
page read and write
7FF7C00A1000
unkown
page execute read
22C5C6C4000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5BF86000
heap
page read and write
22C5C6E4000
heap
page read and write
22C5C579000
heap
page read and write
22C5A73E000
heap
page read and write
1ADBD110000
heap
page read and write
22C5C679000
heap
page read and write
22C5C619000
heap
page read and write
22C5C638000
heap
page read and write
22C5C5D9000
heap
page read and write
22C5C601000
heap
page read and write
22C5BFAA000
heap
page read and write
22C5C629000
heap
page read and write
22C5BF9A000
heap
page read and write
22C5C6B1000
heap
page read and write
22C5C55F000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5A6A4000
heap
page read and write
22C5C610000
heap
page read and write
22C5C609000
heap
page read and write
22C5BF97000
heap
page read and write
22C5C55D000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C647000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C57D000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5C5DF000
heap
page read and write
22C5C253000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C64A000
heap
page read and write
22C5C6AA000
heap
page read and write
22C5C697000
heap
page read and write
22C5C739000
heap
page read and write
22C5C1EF000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C4F2000
heap
page read and write
2F17BAF000
direct allocation
page read and write
22C5C2D1000
heap
page read and write
22C5BF86000
heap
page read and write
22C5C619000
heap
page read and write
22C5C667000
heap
page read and write
23FEA28A000
heap
page read and write
22C5C1F4000
heap
page read and write
385272C1000
direct allocation
page read and write
22C5C04E000
heap
page read and write
7D166FE000
stack
page read and write
3A045B81000
direct allocation
page read and write
22C5C6C5000
heap
page read and write
22C5A6A6000
heap
page read and write
22C5A702000
heap
page read and write
22C5C5DF000
heap
page read and write
22C5C630000
heap
page read and write
10017F000
stack
page read and write
22C5A718000
heap
page read and write
2F17BBE000
direct allocation
page read and write
22C5C57F000
heap
page read and write
22C5C1D3000
heap
page read and write
AD188C0000
direct allocation
page read and write
22C5C626000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C57F000
heap
page read and write
22C5BFDB000
heap
page read and write
22C5C64E000
heap
page read and write
22C5C6B1000
heap
page read and write
22C5C2E4000
heap
page read and write
22C5C5E9000
heap
page read and write
22C5BF51000
heap
page read and write
23FEA2B0000
heap
page read and write
22C5C207000
heap
page read and write
22C5C6C4000
heap
page read and write
22C5C68E000
heap
page read and write
22C5A69C000
heap
page read and write
22C5C5DF000
heap
page read and write
168F341000
direct allocation
page read and write
22C5C2BF000
heap
page read and write
22C5C4EA000
heap
page read and write
7FF740F03000
direct allocation
page execute read
22C5C261000
heap
page read and write
22C5C57F000
heap
page read and write
22C5C57F000
heap
page read and write
22C5BF89000
heap
page read and write
22C5C1B7000
heap
page read and write
22C5C58F000
heap
page read and write
7FF7C260A000
unkown
page readonly
22C5C560000
heap
page read and write
22C5A6E7000
heap
page read and write
22C5C533000
heap
page read and write
22C5C679000
heap
page read and write
23FEA210000
heap
page read and write
22C5C695000
heap
page read and write
22C5C6B1000
heap
page read and write
33F9A741000
direct allocation
page read and write
23FEA2AB000
heap
page read and write
22C5C57D000
heap
page read and write
22C5C57D000
heap
page read and write
22C5BF9F000
heap
page read and write
22C5C687000
heap
page read and write
22C5C6C4000
heap
page read and write
22C5C2C3000
heap
page read and write
22C5C55F000
heap
page read and write
22C5A6CD000
heap
page read and write
22C5A6E0000
heap
page read and write
32F858C0000
direct allocation
page read and write
22C5C2D2000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C2A7000
heap
page read and write
16FD0A40000
direct allocation
page read and write
22C5BFB6000
heap
page read and write
22C5C60D000
heap
page read and write
23FEA299000
heap
page read and write
22C5C600000
heap
page read and write
3BC34BC0000
direct allocation
page read and write
22C5C1C1000
heap
page read and write
22C5C57F000
heap
page read and write
25441800000
direct allocation
page read and write
22C5C610000
heap
page read and write
22C5A702000
heap
page read and write
22C5C5E0000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C7A5000
heap
page read and write
22C5C5A8000
heap
page read and write
22C5A728000
heap
page read and write
22C5C17C000
heap
page read and write
22C5BFDB000
heap
page read and write
22C5C4FA000
heap
page read and write
22C5C626000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C5F9000
heap
page read and write
AFDFCC0000
direct allocation
page read and write
22C5C214000
heap
page read and write
22C5C6BA000
heap
page read and write
22C5C55F000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5A6A5000
heap
page read and write
22C5C150000
heap
page read and write
22C5C4C1000
heap
page read and write
22C5C261000
heap
page read and write
22C5C5E2000
heap
page read and write
22C5C608000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C57D000
heap
page read and write
22C5C63D000
heap
page read and write
22C5A69E000
heap
page read and write
22C5C2C1000
heap
page read and write
7FF7C0AA1000
unkown
page execute read
22C5C4EB000
heap
page read and write
22C5BF9F000
heap
page read and write
22C5C682000
heap
page read and write
7FF7C2346000
unkown
page write copy
22C5C5AB000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5C6BA000
heap
page read and write
22C5BFA8000
heap
page read and write
22C5A69E000
heap
page read and write
22C5C253000
heap
page read and write
22C5C2CC000
heap
page read and write
22C5C579000
heap
page read and write
22C5C626000
heap
page read and write
22C5C1B3000
heap
page read and write
22C5C203000
heap
page read and write
22C5C599000
heap
page read and write
22C5C2BF000
heap
page read and write
23FEA2A6000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C57F000
heap
page read and write
22C5C579000
heap
page read and write
22C5C7A9000
heap
page read and write
22C5C715000
heap
page read and write
22C5BFB0000
heap
page read and write
3E8D0081000
direct allocation
page read and write
22C5C74A000
heap
page read and write
22C5C28A000
heap
page read and write
22C5BFBD000
heap
page read and write
22C5C2DB000
heap
page read and write
22C5C2D2000
heap
page read and write
22C5BFD4000
heap
page read and write
22C5C669000
heap
page read and write
22C5C667000
heap
page read and write
1A3E5DF0000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C261000
heap
page read and write
22C5C261000
heap
page read and write
22C5C6FD000
heap
page read and write
22C5C1D6000
heap
page read and write
1ADBD010000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C554000
heap
page read and write
22C5C4EA000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C553000
heap
page read and write
22C5C679000
heap
page read and write
22C5BF79000
heap
page read and write
22C5C6C4000
heap
page read and write
22C5C261000
heap
page read and write
22C5C695000
heap
page read and write
22C5C669000
heap
page read and write
22C5C2D5000
heap
page read and write
23FEA27C000
heap
page read and write
22C5C536000
heap
page read and write
22C5C4EA000
heap
page read and write
22C5C573000
heap
page read and write
22C5C6E1000
heap
page read and write
22C5BFAC000
heap
page read and write
22C5C1D6000
heap
page read and write
7FF740F00000
direct allocation
page read and write
22C5C5B5000
heap
page read and write
23FEA299000
heap
page read and write
22C5BF99000
heap
page read and write
22C5C4EF000
heap
page read and write
22C5C5DE000
heap
page read and write
22C5C579000
heap
page read and write
22C5C0E0000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5A705000
heap
page read and write
22C5A6FA000
heap
page read and write
22C5C5E1000
heap
page read and write
D3628FF000
stack
page read and write
8288F7D000
stack
page read and write
22C5BFB5000
heap
page read and write
3EA93981000
direct allocation
page read and write
7B3A081000
direct allocation
page read and write
22C5C235000
heap
page read and write
22C5A640000
heap
page read and write
22C5C1B6000
heap
page read and write
22C5C228000
heap
page read and write
3F7DE481000
direct allocation
page read and write
22C5BFED000
heap
page read and write
22C5C55D000
heap
page read and write
22C5C62D000
heap
page read and write
22C5A735000
heap
page read and write
22C5BFE8000
heap
page read and write
22C5C629000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5A6E3000
heap
page read and write
22C5C258000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5BF9F000
heap
page read and write
22C5C036000
heap
page read and write
22C5C5E9000
heap
page read and write
22C5C679000
heap
page read and write
22C5C6F1000
heap
page read and write
22C5BFE7000
heap
page read and write
22C5C66C000
heap
page read and write
1ADBD425000
heap
page read and write
22C5A712000
heap
page read and write
22C5A70F000
heap
page read and write
22C5C60E000
heap
page read and write
22C5C243000
heap
page read and write
22C5C261000
heap
page read and write
22C5C560000
heap
page read and write
22C5C6F2000
heap
page read and write
22C5C695000
heap
page read and write
22C5C1B8000
heap
page read and write
7FF7C1D4B000
unkown
page readonly
22C5C719000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C228000
heap
page read and write
22C5C2CC000
heap
page read and write
22C5C6B1000
heap
page read and write
22C5A6CB000
heap
page read and write
346EE8C1000
direct allocation
page read and write
22C5C57F000
heap
page read and write
22C5C6EA000
heap
page read and write
7D167FE000
stack
page read and write
22C5C6E1000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C554000
heap
page read and write
23FEA2AB000
heap
page read and write
7D1667E000
stack
page read and write
22C5C5E1000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C66C000
heap
page read and write
22C5A70E000
heap
page read and write
22C5C68A000
heap
page read and write
22C5BF7B000
heap
page read and write
22C5C5D1000
heap
page read and write
22C5A736000
heap
page read and write
22C5C63A000
heap
page read and write
22C5C5DB000
heap
page read and write
22C5C65A000
heap
page read and write
22C5C2A2000
heap
page read and write
22C5C550000
heap
page read and write
2B368D40000
direct allocation
page read and write
22C5C261000
heap
page read and write
22C5C1F5000
heap
page read and write
22C5A6A3000
heap
page read and write
22C5C257000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5C257000
heap
page read and write
22C5C632000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C6F1000
heap
page read and write
22C5A691000
heap
page read and write
22C5C218000
heap
page read and write
3F7DE485000
direct allocation
page read and write
22C5C59F000
heap
page read and write
22C5C1B6000
heap
page read and write
22C5A73E000
heap
page read and write
22C5C6BA000
heap
page read and write
22C5C235000
heap
page read and write
22C5C7B1000
heap
page read and write
1B1C53C0000
direct allocation
page read and write
22C5A698000
heap
page read and write
22C5A935000
heap
page read and write
22C5C4EA000
heap
page read and write
22C5C2CC000
heap
page read and write
22C5C261000
heap
page read and write
22C5C74A000
heap
page read and write
22C5BF9C000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5A580000
heap
page read and write
22C5A6AA000
heap
page read and write
22C5C554000
heap
page read and write
7D163DE000
stack
page read and write
828927F000
stack
page read and write
22C5C20B000
heap
page read and write
22C5C235000
heap
page read and write
23FEA29C000
heap
page read and write
22C5BF55000
heap
page read and write
22C5A6FF000
heap
page read and write
C857E81000
direct allocation
page read and write
22C5C4CE000
heap
page read and write
22C5C568000
heap
page read and write
22C5C1F1000
heap
page read and write
22C5C1D9000
heap
page read and write
22C5C2BF000
heap
page read and write
23FEA470000
heap
page read and write
22C5C619000
heap
page read and write
22C5BFB6000
heap
page read and write
22C5C283000
heap
page read and write
22C5C5E2000
heap
page read and write
22C5C1F6000
heap
page read and write
22C5C548000
heap
page read and write
23FEA275000
heap
page read and write
23FEA299000
heap
page read and write
22C5A6FD000
heap
page read and write
22C5BF86000
heap
page read and write
22C5C600000
heap
page read and write
22C5C1F2000
heap
page read and write
22C5C712000
heap
page read and write
22C5C5F8000
heap
page read and write
22C5C235000
heap
page read and write
22C5C567000
heap
page read and write
1000FF000
stack
page read and write
22C5C59F000
heap
page read and write
22C5BF7F000
heap
page read and write
22C5C4EA000
heap
page read and write
22C5C4D1000
heap
page read and write
22C5C5A0000
heap
page read and write
22C5A6B8000
heap
page read and write
22C5C55F000
heap
page read and write
22C5C67A000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C0E1000
heap
page read and write
22C5BFCE000
heap
page read and write
22C5C210000
heap
page read and write
22C5BF7F000
heap
page read and write
22C5C22F000
heap
page read and write
22C5C57F000
heap
page read and write
22C5C2BF000
heap
page read and write
127E3000000
direct allocation
page read and write
22C5C6E2000
heap
page read and write
22C5C579000
heap
page read and write
22C5C5D7000
heap
page read and write
22C5C6C9000
heap
page read and write
22C5A6CC000
heap
page read and write
22C5C5A0000
heap
page read and write
22C5BF69000
heap
page read and write
23FEA2A3000
heap
page read and write
22C5C5F1000
heap
page read and write
1ADBD0F0000
heap
page read and write
22C5C214000
heap
page read and write
22C5A70D000
heap
page read and write
22C5C679000
heap
page read and write
22C5C5D1000
heap
page read and write
22C5C5F1000
heap
page read and write
1ADBD148000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C695000
heap
page read and write
22C5BFD5000
heap
page read and write
22C5C232000
heap
page read and write
22C5BFB6000
heap
page read and write
22C5C533000
heap
page read and write
22C5A6DE000
heap
page read and write
22C5C6F9000
heap
page read and write
22C5C2AD000
heap
page read and write
22C5A73E000
heap
page read and write
22C5C235000
heap
page read and write
22C5C682000
heap
page read and write
22C5C5DA000
heap
page read and write
22C5C570000
heap
page read and write
22C5BFED000
heap
page read and write
22C5C224000
heap
page read and write
23FEA475000
heap
page read and write
3C106D00000
direct allocation
page read and write
22C5C58F000
heap
page read and write
22C5C235000
heap
page read and write
22C5A6BB000
heap
page read and write
F372440000
direct allocation
page read and write
22C5C6B1000
heap
page read and write
1A3E6000000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5C210000
heap
page read and write
22C5A73E000
heap
page read and write
22C5BFE5000
heap
page read and write
22C5C5DF000
heap
page read and write
22C5C2D1000
heap
page read and write
1A3E5DF8000
heap
page read and write
22C5C578000
heap
page read and write
22C5C5E9000
heap
page read and write
22C5C253000
heap
page read and write
22C5C230000
heap
page read and write
22C5C4CD000
heap
page read and write
22C5C261000
heap
page read and write
22C5C532000
heap
page read and write
22C5BFDC000
heap
page read and write
22C5BF86000
heap
page read and write
22C5BFE5000
heap
page read and write
22C5A6C1000
heap
page read and write
22C5BFA7000
heap
page read and write
22C5C253000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C5D6000
heap
page read and write
22C5A6E1000
heap
page read and write
22C5A69E000
heap
page read and write
22C5C657000
heap
page read and write
22C5C66C000
heap
page read and write
22C5C4FA000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C69E000
heap
page read and write
22C5BFB1000
heap
page read and write
22C5C2CC000
heap
page read and write
22C5C6F9000
heap
page read and write
22C5A69D000
heap
page read and write
22C5C5A0000
heap
page read and write
22C5C716000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C59F000
heap
page read and write
23FEA2AB000
heap
page read and write
22C5C679000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C55D000
heap
page read and write
22C5C65E000
heap
page read and write
22C5C1D5000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5C6A1000
heap
page read and write
22C5C608000
heap
page read and write
22C5C6C9000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C1B7000
heap
page read and write
8288FFF000
stack
page read and write
22C5C4FA000
heap
page read and write
22C5C564000
heap
page read and write
1ADBD420000
heap
page read and write
22C5C567000
heap
page read and write
22C5C670000
heap
page read and write
22C5C1D6000
heap
page read and write
22C5C18F000
heap
page read and write
22C5C214000
heap
page read and write
22C5C66A000
heap
page read and write
14755237000
direct allocation
page read and write
22C5C57F000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C59F000
heap
page read and write
22C5BF50000
heap
page read and write
22C5A711000
heap
page read and write
22C5C57D000
heap
page read and write
23FEA28A000
heap
page read and write
7FF7C00A0000
unkown
page readonly
22C5C67E000
heap
page read and write
22C5C7AE000
heap
page read and write
22C5C568000
heap
page read and write
22C5BFA6000
heap
page read and write
22C5C58F000
heap
page read and write
22C5C558000
heap
page read and write
22C5C534000
heap
page read and write
22C5C6DD000
heap
page read and write
23FEA258000
heap
page read and write
22C5C6C4000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C6E9000
heap
page read and write
22C5C560000
heap
page read and write
22C5C679000
heap
page read and write
22C5A6DB000
heap
page read and write
22C5C532000
heap
page read and write
22C5C55F000
heap
page read and write
22C5BF8D000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C693000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C4EB000
heap
page read and write
7FF7C134B000
unkown
page readonly
22C5C1D3000
heap
page read and write
22C5BF5F000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C59F000
heap
page read and write
22C5A6F6000
heap
page read and write
22C5BF6C000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5C261000
heap
page read and write
22C5A70D000
heap
page read and write
22C5C5DB000
heap
page read and write
22C5BFA9000
heap
page read and write
22C5C74C000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5BFBB000
heap
page read and write
22C5BFD2000
heap
page read and write
22C5C5A8000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C570000
heap
page read and write
22C5BFD8000
heap
page read and write
22C5C64E000
heap
page read and write
22C5C5A0000
heap
page read and write
22C5C622000
heap
page read and write
22C5C232000
heap
page read and write
22C5BFED000
heap
page read and write
22C5C4C0000
heap
page read and write
1ADBD140000
heap
page read and write
22C5C5E0000
heap
page read and write
D3622FF000
stack
page read and write
22C5BF90000
heap
page read and write
22C5C261000
heap
page read and write
22C5C2BF000
heap
page read and write
1E18DCC1000
direct allocation
page readonly
22C5C687000
heap
page read and write
22C5C4FA000
heap
page read and write
22C5C75D000
heap
page read and write
22C5C5D9000
heap
page read and write
22C5C52B000
heap
page read and write
22C5C548000
heap
page read and write
10007D000
stack
page read and write
22C5C63D000
heap
page read and write
22C5BFA9000
heap
page read and write
22C5C1BA000
heap
page read and write
22C5BFEC000
heap
page read and write
22C5A699000
heap
page read and write
22C5C261000
heap
page read and write
22C5A6D9000
heap
page read and write
22C5C640000
heap
page read and write
22C5A73E000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5A73E000
heap
page read and write
22C5C679000
heap
page read and write
22C5C1EF000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C679000
heap
page read and write
22C5A734000
heap
page read and write
30E85680000
direct allocation
page read and write
23FEA2A2000
heap
page read and write
22C5C5D6000
heap
page read and write
23FEA420000
heap
page read and write
22C5BF51000
heap
page read and write
22C5C59F000
heap
page read and write
D3620ED000
stack
page read and write
22C5C56F000
heap
page read and write
22C5C601000
heap
page read and write
22C5C261000
heap
page read and write
22C5C5D0000
heap
page read and write
22C5C55D000
heap
page read and write
22C5BFB2000
heap
page read and write
7D1635B000
stack
page read and write
1A3E5FF5000
heap
page read and write
22C5C257000
heap
page read and write
22C5BF72000
heap
page read and write
732B6C1000
direct allocation
page read and write
22C5C21F000
heap
page read and write
22C5C554000
heap
page read and write
22C5C619000
heap
page read and write
22C5C25F000
heap
page read and write
3267C900000
direct allocation
page read and write
22C5C1B7000
heap
page read and write
23FEA29F000
heap
page read and write
22C5C1FA000
heap
page read and write
23FEA220000
heap
page read and write
22C5C4CF000
heap
page read and write
22C5BF53000
heap
page read and write
22C5C621000
heap
page read and write
1A3E5DD0000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C599000
heap
page read and write
22C5C243000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C2DE000
heap
page read and write
22C5C695000
heap
page read and write
22C5A6A5000
heap
page read and write
22C5C5B8000
heap
page read and write
22C5C59F000
heap
page read and write
22C5C261000
heap
page read and write
22C5A734000
heap
page read and write
22C5BFEF000
heap
page read and write
22C5BFD5000
heap
page read and write
22C5C7DD000
heap
page read and write
23FEA299000
heap
page read and write
22C5C5DB000
heap
page read and write
22C5C579000
heap
page read and write
7FF7C00A1000
unkown
page execute read
22C5C1D3000
heap
page read and write
22C5C298000
heap
page read and write
23FEA2A4000
heap
page read and write
22C5C6C4000
heap
page read and write
14755201000
direct allocation
page read and write
22C5BFA1000
heap
page read and write
22C5C1B7000
heap
page read and write
22C5BF62000
heap
page read and write
1A3E5FC0000
heap
page read and write
DB168C0000
direct allocation
page read and write
22C5C5DB000
heap
page read and write
22C5C1D6000
heap
page read and write
22C5C235000
heap
page read and write
22C5C4FA000
heap
page read and write
7FF7C00A0000
unkown
page readonly
22C5C60D000
heap
page read and write
7FF740EC3000
direct allocation
page execute read
23FEA285000
heap
page read and write
22C5A6AC000
heap
page read and write
22C5C0D0000
heap
page read and write
22C5C5D1000
heap
page read and write
22C5C1BB000
heap
page read and write
22C5C766000
heap
page read and write
22C5C558000
heap
page read and write
22C5C567000
heap
page read and write
22C5C22F000
heap
page read and write
22C5C1D3000
heap
page read and write
22C5C1BF000
heap
page read and write
22C5C1F9000
heap
page read and write
7FF740EC0000
direct allocation
page read and write
22C5BFAB000
heap
page read and write
22C5C6B1000
heap
page read and write
22C5C5AF000
heap
page read and write
22C5C1D8000
heap
page read and write
22C5C5DF000
heap
page read and write
23FEA2AB000
heap
page read and write
B9AF41000
direct allocation
page read and write
22C5C6F1000
heap
page read and write
22C5A695000
heap
page read and write
22C5A930000
heap
page read and write
2F17B80000
direct allocation
page read and write
22C5C210000
heap
page read and write
22C5BFA7000
heap
page read and write
22C5C64E000
heap
page read and write
22C5C69E000
heap
page read and write
23FEA250000
heap
page read and write
22C5BFDB000
heap
page read and write
22C5C669000
heap
page read and write
7FF7C0AA1000
unkown
page execute read
22C5C548000
heap
page read and write
22C5C5AF000
heap
page read and write
22C5C179000
heap
page read and write
22C5C4D4000
heap
page read and write
22C5C579000
heap
page read and write
22C5A6AD000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5BF95000
heap
page read and write
22C5C640000
heap
page read and write
22C5C243000
heap
page read and write
22C5C548000
heap
page read and write
22C5C5A0000
heap
page read and write
22C5C1B7000
heap
page read and write
7FF7C2331000
unkown
page write copy
22C5C59F000
heap
page read and write
22C5C6B1000
heap
page read and write
22C5C55D000
heap
page read and write
22C5A718000
heap
page read and write
22C5BF5F000
heap
page read and write
22C5A71C000
heap
page read and write
22C5C2BF000
heap
page read and write
25441809000
direct allocation
page read and write
22C5C646000
heap
page read and write
30A2B681000
direct allocation
page read and write
22C5C6C9000
heap
page read and write
22C5C2A8000
heap
page read and write
22C5A4A0000
heap
page read and write
22C5C253000
heap
page read and write
23FEA28A000
heap
page read and write
22C5BFAB000
heap
page read and write
22C5A711000
heap
page read and write
22C5BFE0000
heap
page read and write
35F53980000
direct allocation
page read and write
22C5C2BF000
heap
page read and write
22C5C4CD000
heap
page read and write
22C5C621000
heap
page read and write
7D1677E000
stack
page read and write
22C5C5F9000
heap
page read and write
23FEA275000
heap
page read and write
22C5C5E2000
heap
page read and write
22C5BF69000
heap
page read and write
22C5C203000
heap
page read and write
22C5C56C000
heap
page read and write
22C5A6A7000
heap
page read and write
22C5C261000
heap
page read and write
22C5BFCE000
heap
page read and write
22C5C550000
heap
page read and write
22C5C7DD000
heap
page read and write
22C5C5B3000
heap
page read and write
3E04CAC1000
direct allocation
page read and write
22C5BF74000
heap
page read and write
22C5C657000
heap
page read and write
22C5C5B3000
heap
page read and write
22C5C548000
heap
page read and write
22C5C679000
heap
page read and write
22C5C5E9000
heap
page read and write
22C5C670000
heap
page read and write
22C5A6A4000
heap
page read and write
22C5C5F8000
heap
page read and write
23FEA287000
heap
page read and write
22C5C4CE000
heap
page read and write
22C5C732000
heap
page read and write
22C5C261000
heap
page read and write
22C5C1EF000
heap
page read and write
22C5C704000
heap
page read and write
22C5C4EA000
heap
page read and write
22C5C2BF000
heap
page read and write
22C5C5E9000
heap
page read and write
22C5C28C000
heap
page read and write
22C5C5F1000
heap
page read and write
22C5C232000
heap
page read and write
22C5C712000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C68E000
heap
page read and write
3F52FC81000
direct allocation
page read and write
22C5A6E0000
heap
page read and write
22C5C686000
heap
page read and write
22C5C548000
heap
page read and write
22C5C5AA000
heap
page read and write
3CA8EB41000
direct allocation
page read and write
22C5C5E9000
heap
page read and write
22C5C5B5000
heap
page read and write
22C5C679000
heap
page read and write
22C5C5DB000
heap
page read and write
16A5DAC0000
direct allocation
page read and write
22C5C20C000
heap
page read and write
22C5C5E1000
heap
page read and write
22C5C6B1000
heap
page read and write
22C5C261000
heap
page read and write
22C5C6E1000
heap
page read and write
1E6DA501000
direct allocation
page read and write
22C5C64E000
heap
page read and write
22C5C578000
heap
page read and write
22C5C56F000
heap
page read and write
22C5C661000
heap
page read and write
22C5C24B000
heap
page read and write
22C5C29B000
heap
page read and write
22C5C60D000
heap
page read and write
22C5C548000
heap
page read and write
14896381000
direct allocation
page read and write
22C5A6B7000
heap
page read and write
22C5BF83000
heap
page read and write
22C5C24B000
heap
page read and write
22C5C10E000
heap
page read and write
22C5BF5F000
heap
page read and write
22C5C5A0000
heap
page read and write
22C5A700000
heap
page read and write
22C5C25F000
heap
page read and write
22C5C75A000
heap
page read and write
23FEA2AE000
heap
page read and write
22C5C52B000
heap
page read and write
3F7DE488000
direct allocation
page read and write
22C5BFC6000
heap
page read and write
22C5C550000
heap
page read and write
22C5C60E000
heap
page read and write
22C5C600000
heap
page read and write
There are 788 hidden memdumps, click here to show them.