IOC Report
FluxusV2.exe

loading gif

Files

File Path
Type
Category
Malicious
FluxusV2.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\PublicKey\_x25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_cffi_backend.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography-41.0.7.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\autocommand-2.2.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\autocommand-2.2.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\autocommand-2.2.2.dist-info\METADATA
Python script, ASCII text executable, with very long lines (855)
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\autocommand-2.2.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\autocommand-2.2.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\autocommand-2.2.2.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\backports.tarfile-1.2.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_resources-6.4.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_resources-6.4.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_resources-6.4.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_resources-6.4.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_resources-6.4.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\importlib_resources-6.4.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\inflect-7.3.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\inflect-7.3.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\inflect-7.3.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\inflect-7.3.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\inflect-7.3.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\inflect-7.3.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.context-5.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.context-5.3.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.context-5.3.0.dist-info\METADATA
ASCII text, with very long lines (406)
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.context-5.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.context-5.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.context-5.3.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.text-3.12.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.text-3.12.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.text-3.12.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco.text-3.12.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\jaraco\text\Lorem ipsum.txt
ASCII text, with very long lines (888)
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\more_itertools-10.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\more_itertools-10.3.0.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\more_itertools-10.3.0.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\more_itertools-10.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\more_itertools-10.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\packaging-24.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\platformdirs-4.2.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\platformdirs-4.2.2.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\platformdirs-4.2.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\platformdirs-4.2.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\platformdirs-4.2.2.dist-info\licenses\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\tomli-2.0.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\tomli-2.0.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\tomli-2.0.1.dist-info\METADATA
Python script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\tomli-2.0.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\tomli-2.0.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\LICENSE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typeguard-4.3.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typing_extensions-4.12.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typing_extensions-4.12.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typing_extensions-4.12.2.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typing_extensions-4.12.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\typing_extensions-4.12.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\wheel-0.43.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\wheel-0.43.0.dist-info\LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\wheel-0.43.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\wheel-0.43.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\wheel-0.43.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\wheel-0.43.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\zipp-3.19.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\zipp-3.19.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\zipp-3.19.2.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\zipp-3.19.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\zipp-3.19.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\setuptools\_vendor\zipp-3.19.2.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\LICENSE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\typeguard-4.3.0.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\wheel-0.43.0.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\wheel-0.43.0.dist-info\LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\wheel-0.43.0.dist-info\METADATA
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\wheel-0.43.0.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\wheel-0.43.0.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI13962\wheel-0.43.0.dist-info\entry_points.txt
ASCII text
dropped
There are 217 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FluxusV2.exe
"C:\Users\user\Desktop\FluxusV2.exe"
malicious
C:\Users\user\Desktop\FluxusV2.exe
"C:\Users\user\Desktop\FluxusV2.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/jaraco/keyring/commit/a85a7cbc6c909f8121660ed1f7b487f99a1c2bf7
unknown
https://img.shields.io/pypi/pyversions/backports.tarfile.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.filter_except
unknown
https://readthedocs.org/projects/typeguard/badge/?version=latest
unknown
https://discord.gift/
unknown
https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packages
unknown
https://readthedocs.org/projects/jaracofunctools/badge/?version=latest
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.zip_broadcast
unknown
http://www.quovadisglobal.com/cpsQt
unknown
https://discord.com)
unknown
https://github.com/jaraco/jaraco.text/actions?query=workflow%3A%22tests%22
unknown
https://docs.python.org/3/library/importlib.html#module-importlib.resources
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.random_product
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.groupby_transform
unknown
https://importlib-metadata.readthedocs.io/
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.sliding_window
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://paypal.com)
unknown
https://github.com/pypa/packaging
unknown
https://github.com/ActiveState/appdirs/issues/79
unknown
https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
unknown
https://blog.jaraco.com/skeleton
unknown
https://tools.ietf.org/html/rfc3610
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.all_unique
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.partial_product
unknown
https://img.shields.io/pypi/pyversions/inflect.svg
unknown
https://github.com/jaraco/zipp/actions/workflows/main.yml/badge.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.map_except
unknown
https://rentry.co/n9t3khws/raw
unknown
https://github.com/pypa/.github/blob/main/CODE_OF_CONDUCT.md
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.takewhile_inclusive
unknown
https://tidelift.com/subscription/pkg/pypi-jaraco.text?utm_source=pypi-jaraco.text&utm_medium=readme
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.powerset
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.zip_offset
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://crunchyroll.com)
unknown
https://github.com/jaraco/jaraco.context/actions?query=workflow%3A%22tests%22
unknown
https://pypi.org/project/build/).
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.pad_none
unknown
https://dev.to/martinheinz/tour-of-python-itertools-4122
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://tidelift.com/subscription/pkg/pypi-inflect?utm_source=pypi-inflect&utm_medium=readme
unknown
https://img.shields.io/pypi/v/zipp.svg
unknown
https://ebay.com)
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://img.shields.io/pypi/v/inflect.svg
unknown
https://playstation.com)
unknown
https://docs.python.org/3.8/library/zipfile.html#path-objects
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.ncycles
unknown
https://readthedocs.org/projects/PROJECT_RTD/badge/?version=latest
unknown
https://sellix.io)
unknown
https://github.com/pypa/setuptools/issues/417#issuecomment-392298401
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.consume
unknown
https://discord.com/api/v6/guilds/
unknown
https://jaracotext.readthedocs.io/en/latest/?badge=latest
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.split_when
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.consumer
unknown
https://packaging.pypa.io/en/latest/development/
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/platformdirs/platformdirs/actions/workflows/check.yml/badge.svg
unknown
https://google.com/mail
unknown
https://img.shields.io/pypi/v/importlib_metadata.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.nth_combination_with_replace
unknown
https://typeguard.readthedocs.io/en/latest/
unknown
https://www.python.org/dev/peps/pep-0484/
unknown
https://rentry.co/u7hcdw7r/raw
unknown
https://github.com/jaraco/backports.tarfile/actions/workflows/main.yml/badge.svg
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.intersperse
unknown
https://readthedocs.org/projects/inflect/badge/?version=latest
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.collapse
unknown
https://rentry.co/u7hcdw7r/rawinfo
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.one
unknown
https://pypi.org/project/jaraco.text
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://netflix.com)
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://packaging.pypa.io/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://github.com/jaraco/jaraco.functools/actions?query=workflow%3A%22tests%22
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.countable
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.matmul
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.prepend
unknown
https://outlook.com)
unknown
https://github.com/python/importlib_metadata/actions?query=workflow%3A%22tests%22
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.product_index
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.set_partitions
unknown
http://www.quovadisglobal.com/cps0
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.only
unknown
https://spotify.com)
unknown
https://github.com/agronholm/typeguard/issues
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.bucket
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.distinct_permutations
unknown
https://more-itertools.readthedocs.io/en/stable/api.html#more_itertools.split_into
unknown
https://pypi.org/project/zipp
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rentry.co
104.26.3.16
malicious

IPs

IP
Domain
Country
Malicious
104.26.3.16
rentry.co
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
16AAECA0000
direct allocation
page read and write
malicious
16AAE0D7000
heap
page read and write
16AADBB2000
heap
page read and write
16AAE152000
heap
page read and write
16AADC02000
heap
page read and write
2147A44F000
heap
page read and write
2147A454000
heap
page read and write
16AAE3A1000
heap
page read and write
2147A453000
heap
page read and write
7FFD946DB000
unkown
page read and write
16AAE172000
heap
page read and write
2147A453000
heap
page read and write
16AADFFC000
heap
page read and write
2147A44D000
heap
page read and write
2147A451000
heap
page read and write
7FFDA4DA1000
unkown
page execute read
16AAF010000
heap
page read and write
16AAE172000
heap
page read and write
7FFDA3408000
unkown
page readonly
16AAE704000
heap
page read and write
16AAE556000
heap
page read and write
16AADFD7000
heap
page read and write
16AADF83000
heap
page read and write
16AAE164000
heap
page read and write
16AAE498000
heap
page read and write
16AAE03F000
heap
page read and write
2147A44D000
heap
page read and write
2147A454000
heap
page read and write
7FFD93C62000
unkown
page execute read
16AAE180000
direct allocation
page read and write
2147A44D000
heap
page read and write
2147A44F000
heap
page read and write
2147A446000
heap
page read and write
7FFDA2E91000
unkown
page execute read
16AAE052000
heap
page read and write
2147A454000
heap
page read and write
16AAE0E5000
heap
page read and write
2147A446000
heap
page read and write
16AAE101000
heap
page read and write
2147A44D000
heap
page read and write
7FFDA331F000
unkown
page readonly
16AAE4FD000
heap
page read and write
2147A453000
heap
page read and write
2147A453000
heap
page read and write
7FFD93A00000
unkown
page readonly
16AAE43F000
heap
page read and write
2147A446000
heap
page read and write
2147A428000
heap
page read and write
7FF6EB1E0000
unkown
page readonly
2147A44C000
heap
page read and write
2147A451000
heap
page read and write
16AAF14C000
heap
page read and write
2147A44E000
heap
page read and write
2147A44C000
heap
page read and write
2147A44D000
heap
page read and write
2147A44F000
heap
page read and write
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
16AAE032000
heap
page read and write
7FFDA3360000
unkown
page readonly
2147A451000
heap
page read and write
16AAE57A000
heap
page read and write
16AAE09C000
heap
page read and write
7FFDA5B80000
unkown
page readonly
2147A44F000
heap
page read and write
2147A44C000
heap
page read and write
16AAE0F0000
heap
page read and write
7FFDA336D000
unkown
page readonly
16AAE57A000
heap
page read and write
16AADD80000
direct allocation
page read and write
16AADFB2000
heap
page read and write
7FFD944E2000
unkown
page readonly
7FFD94392000
unkown
page readonly
16AAE531000
heap
page read and write
16AAE42C000
heap
page read and write
16AAE148000
heap
page read and write
2147A449000
heap
page read and write
7FFD9F3C1000
unkown
page execute read
16AADBA9000
heap
page read and write
2147A44C000
heap
page read and write
7FFD93B20000
unkown
page readonly
16AAE502000
heap
page read and write
2147A446000
heap
page read and write
16AAE0EC000
heap
page read and write
2147A44D000
heap
page read and write
7FFDA3330000
unkown
page readonly
16AAE020000
heap
page read and write
7FFDA0864000
unkown
page readonly
2147A44D000
heap
page read and write
16AAE15D000
heap
page read and write
16AAE465000
heap
page read and write
2147A45A000
heap
page read and write
16AAE44C000
heap
page read and write
16AAF149000
heap
page read and write
16AAE6C3000
heap
page read and write
2147A44F000
heap
page read and write
16AAE481000
heap
page read and write
2147A454000
heap
page read and write
2147A454000
heap
page read and write
16AAE119000
heap
page read and write
2147A446000
heap
page read and write
16AAE3ED000
heap
page read and write
2147A44D000
heap
page read and write
16AAC0A0000
heap
page read and write
16AAE164000
heap
page read and write
2147A453000
heap
page read and write
16AAE380000
heap
page read and write
7FFDA3300000
unkown
page readonly
16AAE587000
heap
page read and write
2147A446000
heap
page read and write
16AAEBA0000
direct allocation
page read and write
7FFDA2EA3000
unkown
page readonly
16AAE10A000
heap
page read and write
16AAE3CD000
heap
page read and write
7FFDA3AE0000
unkown
page readonly
16AAE119000
heap
page read and write
2147A446000
heap
page read and write
2147A446000
heap
page read and write
16AAE057000
heap
page read and write
7FF6EB1E0000
unkown
page readonly
2147A44D000
heap
page read and write
2147A451000
heap
page read and write
2147A44D000
heap
page read and write
16AADFC6000
heap
page read and write
2147A44C000
heap
page read and write
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
7FF6EB21E000
unkown
page read and write
16AADBF7000
heap
page read and write
16AADFD7000
heap
page read and write
16AAE587000
heap
page read and write
16AAE556000
heap
page read and write
16AAE10A000
heap
page read and write
7FFDA3AF2000
unkown
page read and write
7FFDA2E95000
unkown
page readonly
7FFD9DF45000
unkown
page readonly
2147A446000
heap
page read and write
16AAE119000
heap
page read and write
2147A446000
heap
page read and write
16AAE3F9000
heap
page read and write
2147A446000
heap
page read and write
16AAE640000
heap
page read and write
7FFD9DF31000
unkown
page execute read
16AAF864000
direct allocation
page read and write
2147A44F000
heap
page read and write
2147A453000
heap
page read and write
16AADB40000
heap
page read and write
2147A44D000
heap
page read and write
16AAE111000
heap
page read and write
16AAE404000
heap
page read and write
2147A446000
heap
page read and write
2147A453000
heap
page read and write
2147A44F000
heap
page read and write
2147A451000
heap
page read and write
7FFDA417C000
unkown
page readonly
16AAE085000
heap
page read and write
2147A446000
heap
page read and write
7FFDA0870000
unkown
page readonly
16AAE15C000
heap
page read and write
2147A454000
heap
page read and write
16AADBD3000
heap
page read and write
16AAE027000
heap
page read and write
16AADFF7000
heap
page read and write
2147A44D000
heap
page read and write
16AAE164000
heap
page read and write
2147A456000
heap
page read and write
7FFD9F7F0000
unkown
page readonly
16AAE148000
heap
page read and write
16AAE647000
heap
page read and write
2147A44D000
heap
page read and write
7FFD9464D000
unkown
page write copy
2147A453000
heap
page read and write
16AADFA2000
heap
page read and write
16AAE119000
heap
page read and write
2147A44D000
heap
page read and write
16AAE048000
heap
page read and write
2147A453000
heap
page read and write
16AAE053000
heap
page read and write
16AAE119000
heap
page read and write
16AAE577000
heap
page read and write
2147A44C000
heap
page read and write
7FFD94722000
unkown
page read and write
16AAE506000
heap
page read and write
2147A44F000
heap
page read and write
2147A44C000
heap
page read and write
16AADFBE000
heap
page read and write
2147A453000
heap
page read and write
2147A451000
heap
page read and write
7FFDA0871000
unkown
page execute read
16AAE000000
heap
page read and write
2147A446000
heap
page read and write
16AAE02F000
heap
page read and write
7FFD9F3B0000
unkown
page readonly
2147A451000
heap
page read and write
16AADFB2000
heap
page read and write
2147A451000
heap
page read and write
16AADBB2000
heap
page read and write
16AAE119000
heap
page read and write
16AAE62A000
heap
page read and write
16AAE556000
heap
page read and write
7FFD93B0F000
unkown
page readonly
2147A449000
heap
page read and write
7FFDA3FD0000
unkown
page readonly
16AAE587000
heap
page read and write
7FF6EB1E1000
unkown
page execute read
2147A44C000
heap
page read and write
16AAE148000
heap
page read and write
16AAE0F0000
heap
page read and write
7FFDA5B81000
unkown
page execute read
16AADFAC000
heap
page read and write
2147A446000
heap
page read and write
16AAE3E0000
heap
page read and write
2147A44F000
heap
page read and write
7FFD9F3E6000
unkown
page readonly
7FFDA4DA8000
unkown
page readonly
16AAE152000
heap
page read and write
2147A44C000
heap
page read and write
16AAE0D1000
heap
page read and write
16AAE094000
heap
page read and write
7FFD9F3B3000
unkown
page readonly
2147A350000
heap
page read and write
7FFDA3A93000
unkown
page readonly
2147A44D000
heap
page read and write
16AAE01F000
heap
page read and write
2147A446000
heap
page read and write
2147A446000
heap
page read and write
7FFDA4635000
unkown
page readonly
16AADC02000
heap
page read and write
7FFDA33DB000
unkown
page read and write
7FFD93BF1000
unkown
page execute read
16AADC01000
heap
page read and write
7FFDA3329000
unkown
page read and write
7FFD945E6000
unkown
page read and write
16AAE692000
heap
page read and write
16AAE449000
heap
page read and write
16AAE531000
heap
page read and write
2147A453000
heap
page read and write
16AAE0D7000
heap
page read and write
2147A453000
heap
page read and write
16AADBEF000
heap
page read and write
16AAE0DD000
heap
page read and write
2147A449000
heap
page read and write
7FF6EB222000
unkown
page read and write
7FFD940A3000
unkown
page write copy
7FFD93B14000
unkown
page readonly
2147A453000
heap
page read and write
7FFD9DEE1000
unkown
page execute read
16AAE4D7000
heap
page read and write
7FF6EB21E000
unkown
page write copy
7FFDA5B86000
unkown
page readonly
16AAE007000
heap
page read and write
7FFD93AAE000
unkown
page readonly
7FFDA3EB4000
unkown
page readonly
7FFDA3FD6000
unkown
page readonly
2147A44D000
heap
page read and write
7FFD9F3D6000
unkown
page read and write
7FF6EB224000
unkown
page readonly
2147A453000
heap
page read and write
2147A44C000
heap
page read and write
16AAE543000
heap
page read and write
7FFDA0873000
unkown
page readonly
7FFDA417E000
unkown
page readonly
16AADFC6000
heap
page read and write
2147A446000
heap
page read and write
7FFDA4638000
unkown
page read and write
16AAE112000
heap
page read and write
16AADFFD000
heap
page read and write
16AAE493000
heap
page read and write
16AADB42000
heap
page read and write
2147A454000
heap
page read and write
7FFDA2E90000
unkown
page readonly
7FFDA339E000
unkown
page readonly
16AAE577000
heap
page read and write
16AAF15B000
heap
page read and write
7FFD9F3D7000
unkown
page readonly
7FFDA3EB1000
unkown
page execute read
2147A420000
heap
page read and write
2147A453000
heap
page read and write
7FFDA3301000
unkown
page execute read
16AADF8E000
heap
page read and write
2147A451000
heap
page read and write
16AAE035000
heap
page read and write
2147A454000
heap
page read and write
7FFD9E840000
unkown
page readonly
7FF6EB20B000
unkown
page readonly
16AAE10E000
heap
page read and write
7FFDA4160000
unkown
page readonly
2147A453000
heap
page read and write
16AAE41B000
heap
page read and write
2147A44D000
heap
page read and write
16AAD9A0000
direct allocation
page read and write
16AAFF03000
heap
page read and write
7FFD946EB000
unkown
page readonly
16AAE403000
heap
page read and write
16AAE08B000
heap
page read and write
16AAE10A000
heap
page read and write
16AAE172000
heap
page read and write
16AADBF7000
heap
page read and write
16AAE0E5000
heap
page read and write
7FFDA4178000
unkown
page read and write
7FFDA334F000
unkown
page readonly
7FF6EB20B000
unkown
page readonly
7FFDA3A80000
unkown
page readonly
16AADB7A000
heap
page read and write
16AAE0AC000
heap
page read and write
2147A446000
heap
page read and write
16AAE6F4000
heap
page read and write
16AAE035000
heap
page read and write
16AAE104000
heap
page read and write
2147A44C000
heap
page read and write
7FFDA3A91000
unkown
page read and write
16AAE09C000
heap
page read and write
2147A44D000
heap
page read and write
16AAE429000
heap
page read and write
2147A44D000
heap
page read and write
16AAE173000
heap
page read and write
7FFD94070000
unkown
page readonly
16AADFF1000
heap
page read and write
2147A446000
heap
page read and write
7FFD9E854000
unkown
page readonly
7FFDA33B1000
unkown
page execute read
16AADB9C000
heap
page read and write
2147A451000
heap
page read and write
2147A454000
heap
page read and write
16AAE588000
heap
page read and write
16AAE15D000
heap
page read and write
7FFD93880000
unkown
page readonly
16AADFD5000
heap
page read and write
7FFDA3A81000
unkown
page execute read
2147BE90000
heap
page read and write
2147A454000
heap
page read and write
16AAE0EC000
heap
page read and write
16AAC0F0000
unkown
page readonly
16AAE057000
heap
page read and write
16AADFD2000
heap
page read and write
2147A453000
heap
page read and write
16AAE42C000
heap
page read and write
2147A44D000
heap
page read and write
2147A44E000
heap
page read and write
2147A453000
heap
page read and write
16AAE164000
heap
page read and write
16AAE622000
heap
page read and write
16AAE0F0000
heap
page read and write
7FFDA3387000
unkown
page read and write
2147A44D000
heap
page read and write
16AAE5C7000
heap
page read and write
16AAE10E000
heap
page read and write
2147A45A000
heap
page read and write
7FFD9F3C5000
unkown
page readonly
2147A44D000
heap
page read and write
2147A445000
heap
page read and write
2147A451000
heap
page read and write
16AAE4FD000
heap
page read and write
7FFD9DF35000
unkown
page read and write
16AADFE9000
heap
page read and write
16AADBB4000
heap
page read and write
7FFD9DEEB000
unkown
page readonly
16AADFD5000
heap
page read and write
7FFDA3390000
unkown
page readonly
16AAE09C000
heap
page read and write
2147A451000
heap
page read and write
7FFDA334B000
unkown
page read and write
2147A45A000
heap
page read and write
7FFDA3389000
unkown
page readonly
2147A451000
heap
page read and write
7FFDA3FD3000
unkown
page readonly
2147A44F000
heap
page read and write
16AAE10E000
heap
page read and write
7FFDA3509000
unkown
page read and write
7FFDA0874000
unkown
page read and write
16AAEFC4000
direct allocation
page read and write
16AAE46F000
heap
page read and write
16AADB8A000
heap
page read and write
16AADBF7000
heap
page read and write
7FFDA2EA5000
unkown
page readonly
7FF6EB221000
unkown
page read and write
7FFDA4331000
unkown
page execute read
16AAE5C7000
heap
page read and write
16AADBC2000
heap
page read and write
7FFDA2EA4000
unkown
page read and write
16AAE3AE000
heap
page read and write
16AAE4D8000
heap
page read and write
7FFDA4343000
unkown
page readonly
16AAE780000
direct allocation
page read and write
16AAE033000
heap
page read and write
16AAF878000
direct allocation
page read and write
16AAFF00000
heap
page read and write
2147A449000
heap
page read and write
7FFDA3AEE000
unkown
page readonly
2147A44C000
heap
page read and write
2147A44F000
heap
page read and write
30C2BAE000
stack
page read and write
2147A446000
heap
page read and write
2147A446000
heap
page read and write
7FFDA5491000
unkown
page execute read
2147A453000
heap
page read and write
2147A446000
heap
page read and write
7FFDA350C000
unkown
page readonly
7FFD93AB7000
unkown
page readonly
16AADBF5000
heap
page read and write
2147A390000
heap
page read and write
7FFDA3361000
unkown
page execute read
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
7FFDA32F1000
unkown
page execute read
7FFDA3380000
unkown
page read and write
16AAE10A000
heap
page read and write
2147A451000
heap
page read and write
16AAE10A000
heap
page read and write
2147A453000
heap
page read and write
2147A44C000
heap
page read and write
16AAE027000
heap
page read and write
2147A446000
heap
page read and write
7FFDA0861000
unkown
page execute read
2147A446000
heap
page read and write
2147A453000
heap
page read and write
7FFD9F3D5000
unkown
page readonly
7FFD94764000
unkown
page read and write
16AADBE9000
heap
page read and write
16AAE042000
heap
page read and write
16AAE5B8000
heap
page read and write
2147A453000
heap
page read and write
16AAE08A000
heap
page read and write
16AAE521000
heap
page read and write
16AADC01000
heap
page read and write
2147A44C000
heap
page read and write
2147A446000
heap
page read and write
16AAE0AC000
heap
page read and write
16AAE04D000
heap
page read and write
16AAE148000
heap
page read and write
7FFD93FD6000
unkown
page readonly
7FFDA3391000
unkown
page execute read
16AAE5ED000
heap
page read and write
16AADB83000
heap
page read and write
2147A44F000
heap
page read and write
2147A44D000
heap
page read and write
16AADFE0000
heap
page read and write
7FFD9E841000
unkown
page execute read
16AADFC7000
heap
page read and write
16AAE0F0000
heap
page read and write
16AADF80000
heap
page read and write
7FFDA4DA7000
unkown
page read and write
7FFDA4630000
unkown
page readonly
16AAE699000
heap
page read and write
2147A453000
heap
page read and write
16AAE09C000
heap
page read and write
2147A446000
heap
page read and write
16AAE172000
heap
page read and write
7FFD943A1000
unkown
page readonly
16AAE04D000
heap
page read and write
16AAE02A000
heap
page read and write
2147A44D000
heap
page read and write
2147A451000
heap
page read and write
16AAE0F0000
heap
page read and write
16AAE0EA000
heap
page read and write
2147A45A000
heap
page read and write
7FFD9F3E4000
unkown
page readonly
2147A453000
heap
page read and write
7FFD9DF30000
unkown
page readonly
7FFDA3311000
unkown
page execute read
7FFD939E9000
unkown
page readonly
2147A449000
heap
page read and write
16AAE422000
heap
page read and write
16AAE02F000
heap
page read and write
2147A45A000
heap
page read and write
16AAE07B000
heap
page read and write
16AAE007000
heap
page read and write
7FFD940A1000
unkown
page write copy
16AAEE54000
direct allocation
page read and write
16AADFF8000
heap
page read and write
16AAE152000
heap
page read and write
16AAE3DD000
heap
page read and write
2147A44F000
heap
page read and write
7FFD9F3D1000
unkown
page execute read
7FFD94655000
unkown
page read and write
16AAE429000
heap
page read and write
16AAE000000
heap
page read and write
7FF6EB1E0000
unkown
page readonly
2147A446000
heap
page read and write
2147A44D000
heap
page read and write
16AAEAA0000
direct allocation
page read and write
16AAE15B000
heap
page read and write
16AAE03F000
heap
page read and write
16AADBC4000
heap
page read and write
2147A44F000
heap
page read and write
16AAE04D000
heap
page read and write
16AADF9E000
heap
page read and write
16AAE488000
heap
page read and write
16AAE0EA000
heap
page read and write
2147A453000
heap
page read and write
7FFDA33F0000
unkown
page readonly
16AAE643000
heap
page read and write
2147A446000
heap
page read and write
16AAE00F000
heap
page read and write
16AADB73000
heap
page read and write
7FFD9F3E5000
unkown
page read and write
2147A451000
heap
page read and write
7FFD946E1000
unkown
page read and write
7FFDA3421000
unkown
page execute read
7FFD9DED0000
unkown
page readonly
7FFD93C02000
unkown
page execute read
2147A446000
heap
page read and write
16AAE10F000
heap
page read and write
2147A44C000
heap
page read and write
2147A446000
heap
page read and write
16AAE0D7000
heap
page read and write
7FFD9DEE0000
unkown
page readonly
16AAE556000
heap
page read and write
2147A360000
heap
page read and write
7FFDA0875000
unkown
page readonly
16AAE3E0000
heap
page read and write
16AAE543000
heap
page read and write
16AAEF08000
direct allocation
page read and write
7FF6EB224000
unkown
page readonly
7FFD93BD1000
unkown
page readonly
16AAE0AC000
heap
page read and write
16AAE106000
heap
page read and write
2147A453000
heap
page read and write
2147A44C000
heap
page read and write
16AAE111000
heap
page read and write
16AAEFB8000
direct allocation
page read and write
2147A451000
heap
page read and write
2147A453000
heap
page read and write
16AAF880000
direct allocation
page read and write
16AAE03F000
heap
page read and write
2147A44D000
heap
page read and write
16AAE119000
heap
page read and write
16AADFE9000
heap
page read and write
7FFD9E843000
unkown
page readonly
7FFD93A05000
unkown
page readonly
2147A446000
heap
page read and write
16AAF870000
direct allocation
page read and write
2147A449000
heap
page read and write
2147A446000
heap
page read and write
16AAE164000
heap
page read and write
2147A456000
heap
page read and write
2147A44C000
heap
page read and write
2147A446000
heap
page read and write
7FFD940F0000
unkown
page readonly
16AAE0F7000
heap
page read and write
7FFD94658000
unkown
page write copy
2147A44F000
heap
page read and write
7FFD9DF40000
unkown
page readonly
2147A446000
heap
page read and write
2147A446000
heap
page read and write
16AADFF7000
heap
page read and write
16AAE08A000
heap
page read and write
16AAE007000
heap
page read and write
16AAC100000
heap
page read and write
7FFD946DC000
unkown
page write copy
7FFDA0860000
unkown
page readonly
30C23EC000
stack
page read and write
2147A451000
heap
page read and write
16AAE980000
direct allocation
page read and write
2147A446000
heap
page read and write
16AAE5C1000
heap
page read and write
7FFDA4348000
unkown
page read and write
16AAE09A000
heap
page read and write
2147A453000
heap
page read and write
16AAE06B000
heap
page read and write
7FFD93BDF000
unkown
page readonly
2147A443000
heap
page read and write
16AADFBE000
heap
page read and write
7FFDA3AE1000
unkown
page execute read
2147A44F000
heap
page read and write
2147A446000
heap
page read and write
2147A44D000
heap
page read and write
16AAE16B000
heap
page read and write
2147A446000
heap
page read and write
2147A446000
heap
page read and write
2147A454000
heap
page read and write
16AAF16B000
heap
page read and write
2147A446000
heap
page read and write
16AAE587000
heap
page read and write
2147A451000
heap
page read and write
7FFD9DF43000
unkown
page readonly
16AAE095000
heap
page read and write
16AAE119000
heap
page read and write
16AAE487000
heap
page read and write
16AADFB0000
heap
page read and write
16AAF163000
heap
page read and write
2147A453000
heap
page read and write
7FF6EB224000
unkown
page readonly
16AABF90000
heap
page read and write
7FFDA5493000
unkown
page readonly
16AAE0FC000
heap
page read and write
16AAE05A000
heap
page read and write
7FFD93B21000
unkown
page execute read
2147A44D000
heap
page read and write
16AAE16B000
heap
page read and write
16AAE007000
heap
page read and write
16AADFEB000
heap
page read and write
2147A44D000
heap
page read and write
16AAE0E5000
heap
page read and write
14EEFE3000
stack
page read and write
2147A44C000
heap
page read and write
16AAC108000
heap
page read and write
2147A44D000
heap
page read and write
7FFD9E845000
unkown
page readonly
7FFDA5496000
unkown
page readonly
16AAE46F000
heap
page read and write
7FFDA4631000
unkown
page execute read
16AAE119000
heap
page read and write
2147A454000
heap
page read and write
16AAE143000
heap
page read and write
16AAE09C000
heap
page read and write
7FFD940D6000
unkown
page readonly
7FFDA4DA4000
unkown
page readonly
16AAE10A000
heap
page read and write
7FFD93C12000
unkown
page execute read
7FFD946DF000
unkown
page read and write
16AAE0E5000
heap
page read and write
2147A453000
heap
page read and write
7FFD9F3E0000
unkown
page readonly
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
16AADFD5000
heap
page read and write
16AAE622000
heap
page read and write
7FFDA340C000
unkown
page readonly
16AAE03F000
heap
page read and write
7FFDA4349000
unkown
page readonly
2147A451000
heap
page read and write
16AAE731000
heap
page read and write
2147A446000
heap
page read and write
7FFDA33F1000
unkown
page execute read
7FFD94713000
unkown
page write copy
2147A453000
heap
page read and write
16AAE645000
heap
page read and write
2147A44D000
heap
page read and write
16AAE10A000
heap
page read and write
7FFDA332B000
unkown
page readonly
16AAE09C000
heap
page read and write
2147A453000
heap
page read and write
16AAE0F0000
heap
page read and write
16AAE16B000
heap
page read and write
7FFDA0862000
unkown
page readonly
2147A446000
heap
page read and write
7FF6EB20B000
unkown
page readonly
16AAE0D8000
heap
page read and write
16AAE404000
heap
page read and write
16AAE035000
heap
page read and write
16AAE3A1000
heap
page read and write
7FFD93B12000
unkown
page read and write
7FFDA32F3000
unkown
page readonly
16AADFA6000
heap
page read and write
2147A453000
heap
page read and write
16AAE09C000
heap
page read and write
2147A453000
heap
page read and write
16AAE172000
heap
page read and write
2147A44F000
heap
page read and write
7FFDA3397000
unkown
page readonly
7FFD9DEE6000
unkown
page readonly
2147A446000
heap
page read and write
16AAE5BF000
heap
page read and write
16AAE027000
heap
page read and write
7FFD9DED5000
unkown
page readonly
16AAE0EC000
heap
page read and write
2147A447000
heap
page read and write
16AAE172000
heap
page read and write
2147A44D000
heap
page read and write
2147A44C000
heap
page read and write
7FFD9DED3000
unkown
page readonly
16AAE62A000
heap
page read and write
2147A453000
heap
page read and write
2147A453000
heap
page read and write
16AAE044000
heap
page read and write
16AAE45E000
heap
page read and write
16AAE3A1000
heap
page read and write
16AADF9E000
heap
page read and write
16AAE6C2000
heap
page read and write
2147A44F000
heap
page read and write
16AAE71D000
heap
page read and write
16AAEED0000
direct allocation
page read and write
7FFD94721000
unkown
page write copy
16AADFC6000
heap
page read and write
16AAE03F000
heap
page read and write
2147A451000
heap
page read and write
2147C040000
heap
page read and write
16AAE43F000
heap
page read and write
16AADFF7000
heap
page read and write
7FF6EB1E1000
unkown
page execute read
16AAF021000
heap
page read and write
14EF5BE000
stack
page read and write
2147A453000
heap
page read and write
2147A44D000
heap
page read and write
16AAE486000
heap
page read and write
16AADFF3000
heap
page read and write
7FFD94656000
unkown
page write copy
7FFD9DED4000
unkown
page read and write
2147A447000
heap
page read and write
7FFD93F60000
unkown
page execute read
2147A44D000
heap
page read and write
7FFD93BCC000
unkown
page read and write
16AAE09C000
heap
page read and write
7FFD9F3B4000
unkown
page read and write
16AAE15B000
heap
page read and write
16AAF87C000
direct allocation
page read and write
16AADBD9000
heap
page read and write
2147A44D000
heap
page read and write
7FFDA3302000
unkown
page readonly
2147A453000
heap
page read and write
16AAE119000
heap
page read and write
16AAE481000
heap
page read and write
7FFD93C87000
unkown
page execute read
16AAE10A000
heap
page read and write
7FFD94417000
unkown
page readonly
7FFD93C9C000
unkown
page execute read
2147A44C000
heap
page read and write
2147A44F000
heap
page read and write
7FFDA3EB0000
unkown
page readonly
16AAE10A000
heap
page read and write
2147A446000
heap
page read and write
16AAE10E000
heap
page read and write
16AAE172000
heap
page read and write
2147A453000
heap
page read and write
16AAE3F7000
heap
page read and write
16AAE0F3000
heap
page read and write
16AAE488000
heap
page read and write
7FF6EB21E000
unkown
page write copy
2147A44D000
heap
page read and write
7FFD9F3B1000
unkown
page execute read
16AAEE68000
direct allocation
page read and write
16AAE543000
heap
page read and write
2147A446000
heap
page read and write
2147A453000
heap
page read and write
7FFD94712000
unkown
page read and write
2147A446000
heap
page read and write
7FF6EB224000
unkown
page readonly
7FFDA34D1000
unkown
page readonly
16AAE172000
heap
page read and write
16AAE404000
heap
page read and write
16AADC36000
heap
page read and write
16AAF888000
direct allocation
page read and write
2147A45A000
heap
page read and write
7FFDA3414000
unkown
page read and write
16AADC02000
heap
page read and write
7FF6EB21E000
unkown
page read and write
2147A453000
heap
page read and write
2147A44C000
heap
page read and write
16AAE622000
heap
page read and write
7FFD94710000
unkown
page read and write
16AAE597000
heap
page read and write
2147A454000
heap
page read and write
16AAE09C000
heap
page read and write
7FFDA3415000
unkown
page readonly
16AADFBE000
heap
page read and write
16AAE057000
heap
page read and write
30C29BF000
stack
page read and write
16AAE0F0000
heap
page read and write
2147A44C000
heap
page read and write
2147A446000
heap
page read and write
16AAE3B9000
heap
page read and write
7FFDA5495000
unkown
page read and write
2147A44C000
heap
page read and write
16AAE057000
heap
page read and write
16AAE172000
heap
page read and write
7FFDA33DE000
unkown
page readonly
16AAE152000
heap
page read and write
16AADE80000
direct allocation
page read and write
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
16AAE10A000
heap
page read and write
2147A449000
heap
page read and write
2147A453000
heap
page read and write
7FFD9E851000
unkown
page execute read
16AAC121000
heap
page read and write
16AAE531000
heap
page read and write
2147A44D000
heap
page read and write
16AAE5C7000
heap
page read and write
2147A446000
heap
page read and write
16AADFF7000
heap
page read and write
7FFD93AB2000
unkown
page readonly
16AADFB3000
heap
page read and write
7FFDA33D2000
unkown
page readonly
16AAEDA0000
direct allocation
page read and write
2147A45A000
heap
page read and write
16AAF88C000
direct allocation
page read and write
2147A44F000
heap
page read and write
7FFDA3381000
unkown
page write copy
7FFD94781000
unkown
page readonly
7FFD93BD7000
unkown
page readonly
2147A456000
heap
page read and write
2147A44C000
heap
page read and write
16AAE567000
heap
page read and write
2147A44C000
heap
page read and write
16AAE09C000
heap
page read and write
2147A451000
heap
page read and write
16AADFA7000
heap
page read and write
16AAE64F000
heap
page read and write
7FFDA2EA1000
unkown
page execute read
7FFD9DF41000
unkown
page execute read
2147A446000
heap
page read and write
2147A453000
heap
page read and write
2147A454000
heap
page read and write
16AADFF3000
heap
page read and write
16AAE172000
heap
page read and write
2147A446000
heap
page read and write
16AADC2C000
heap
page read and write
16AAE094000
heap
page read and write
2147A451000
heap
page read and write
2147A44D000
heap
page read and write
2147A446000
heap
page read and write
16AAE164000
heap
page read and write
7FFDA3304000
unkown
page readonly
2147A454000
heap
page read and write
16AAE43E000
heap
page read and write
16AAE567000
heap
page read and write
7FFD93BA4000
unkown
page readonly
2147A44F000
heap
page read and write
16AADFCB000
heap
page read and write
7FFD940F1000
unkown
page execute read
16AAE10A000
heap
page read and write
16AAE07B000
heap
page read and write
16AAEFC8000
direct allocation
page read and write
2147A44D000
heap
page read and write
2147A44F000
heap
page read and write
16AAE036000
heap
page read and write
7FFDA4330000
unkown
page readonly
2147A44F000
heap
page read and write
2147A446000
heap
page read and write
16AAC0E0000
direct allocation
page read and write
16AAE487000
heap
page read and write
16AAE026000
heap
page read and write
2147A446000
heap
page read and write
16AAE03F000
heap
page read and write
16AADFC8000
heap
page read and write
16AAE0F2000
heap
page read and write
7FFD9F3C0000
unkown
page readonly
16AAE0F1000
heap
page read and write
16AADBB2000
heap
page read and write
7FF6EB1E1000
unkown
page execute read
7FFD94657000
unkown
page read and write
2147A451000
heap
page read and write
2147A43A000
heap
page read and write
16AAE502000
heap
page read and write
2147A44A000
heap
page read and write
2147A453000
heap
page read and write
2147A44D000
heap
page read and write
7FFDA4DA0000
unkown
page readonly
16AADFE0000
heap
page read and write
7FFDA32F0000
unkown
page readonly
16AAE007000
heap
page read and write
2147A453000
heap
page read and write
16AAE0EA000
heap
page read and write
16AAE020000
heap
page read and write
16AAE63F000
heap
page read and write
16AAE280000
direct allocation
page read and write
2147A451000
heap
page read and write
7FFDA3AF3000
unkown
page readonly
2147A44F000
heap
page read and write
16AAE880000
direct allocation
page read and write
7FFDA3345000
unkown
page readonly
16AAE035000
heap
page read and write
16AADBD9000
heap
page read and write
16AAF884000
direct allocation
page read and write
7FFD9F3E1000
unkown
page execute read
16AAE45E000
heap
page read and write
7FFD940A8000
unkown
page readonly
16AAE10E000
heap
page read and write
16AAE4FD000
heap
page read and write
2147A44D000
heap
page read and write
2147A446000
heap
page read and write
7FFDA3331000
unkown
page execute read
16AAE08B000
heap
page read and write
2147A44D000
heap
page read and write
2147A44C000
heap
page read and write
2147A44D000
heap
page read and write
7FF6EB1E1000
unkown
page execute read
16AADBC0000
heap
page read and write
7FFDA3420000
unkown
page readonly
2147A453000
heap
page read and write
7FFDA339C000
unkown
page read and write
7FFD94715000
unkown
page read and write
16AAE5C1000
heap
page read and write
16AADA1C000
direct allocation
page read and write
7FFDA3FD1000
unkown
page execute read
2147A451000
heap
page read and write
16AAE081000
heap
page read and write
2147A453000
heap
page read and write
2147A44D000
heap
page read and write
7FFD9F3D0000
unkown
page readonly
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
16AAE0D7000
heap
page read and write
16AAE164000
heap
page read and write
16AAE566000
heap
page read and write
2147A446000
heap
page read and write
7FFD940A2000
unkown
page read and write
7FFD93F99000
unkown
page readonly
16AAE172000
heap
page read and write
7FFD9E850000
unkown
page readonly
2147A44F000
heap
page read and write
16AAE45E000
heap
page read and write
2147A44F000
heap
page read and write
2147A44D000
heap
page read and write
2147BE95000
heap
page read and write
2147A44F000
heap
page read and write
7FFD93BF0000
unkown
page readonly
2147A44D000
heap
page read and write
2147A45A000
heap
page read and write
7FFD93BA2000
unkown
page execute read
16AAF030000
heap
page read and write
2147A455000
heap
page read and write
2147A44F000
heap
page read and write
2147A455000
heap
page read and write
16AAE10A000
heap
page read and write
7FFD9DF36000
unkown
page readonly
16AAE036000
heap
page read and write
16AAE51C000
heap
page read and write
16AAF130000
heap
page read and write
7FFD9F7F3000
unkown
page readonly
7FFDA5B89000
unkown
page readonly
2147A453000
heap
page read and write
16AAE035000
heap
page read and write
7FFD940DA000
unkown
page readonly
16AAF195000
heap
page read and write
7FFDA3FD5000
unkown
page read and write
7FFD93881000
unkown
page execute read
7FFDA4161000
unkown
page execute read
2147A453000
heap
page read and write
16AAE119000
heap
page read and write
16AADBC0000
heap
page read and write
16AAE653000
heap
page read and write
7FFD93F62000
unkown
page readonly
16AADB34000
heap
page read and write
7FFDA4639000
unkown
page readonly
16AADF8B000
heap
page read and write
16AAE000000
heap
page read and write
2147A451000
heap
page read and write
16AADB30000
heap
page read and write
2147A455000
heap
page read and write
16AADFF1000
heap
page read and write
7FFD9F3B5000
unkown
page readonly
7FFD94031000
unkown
page readonly
16AADFB9000
heap
page read and write
16AAE10F000
heap
page read and write
2147A446000
heap
page read and write
16AAE164000
heap
page read and write
2147A45A000
heap
page read and write
16AAE119000
heap
page read and write
16AAC070000
heap
page read and write
7FFD93C8E000
unkown
page execute read
2147A446000
heap
page read and write
2147A446000
heap
page read and write
7FFD9F7F5000
unkown
page readonly
2147A44D000
heap
page read and write
16AAEFCC000
direct allocation
page read and write
7FFD9E852000
unkown
page readonly
2147A446000
heap
page read and write
16AADBD9000
heap
page read and write
16AAE457000
heap
page read and write
16AADFD5000
heap
page read and write
16AADC01000
heap
page read and write
2147A446000
heap
page read and write
16AAE556000
heap
page read and write
7FFD93A01000
unkown
page execute read
2147A44D000
heap
page read and write
16AAE152000
heap
page read and write
16AAE556000
heap
page read and write
16AAE03F000
heap
page read and write
2147A455000
heap
page read and write
2147A446000
heap
page read and write
16AAE449000
heap
page read and write
16AAE531000
heap
page read and write
2147A45A000
heap
page read and write
16AADFC6000
heap
page read and write
16AAE630000
heap
page read and write
16AAEE90000
direct allocation
page read and write
16AAE543000
heap
page read and write
16AAE699000
heap
page read and write
16AADFB2000
heap
page read and write
2147A446000
heap
page read and write
2147A452000
heap
page read and write
16AAE4FD000
heap
page read and write
7FFD93C18000
unkown
page execute read
7FFDA2EA0000
unkown
page readonly
7FFD93A62000
unkown
page readonly
16AAE0F0000
heap
page read and write
2147A446000
heap
page read and write
16AAE4FD000
heap
page read and write
2147A44D000
heap
page read and write
16AAE6C3000
heap
page read and write
16AADFF1000
heap
page read and write
16AAE164000
heap
page read and write
16AAFE60000
heap
page read and write
16AAE0EC000
heap
page read and write
2147A453000
heap
page read and write
2147A44C000
heap
page read and write
2147A446000
heap
page read and write
16AAE0D9000
heap
page read and write
16AAF890000
direct allocation
page read and write
2147A44F000
heap
page read and write
7FFD9F7F1000
unkown
page execute read
7FFD940A4000
unkown
page read and write
16AAE02E000
heap
page read and write
2147A45A000
heap
page read and write
16AAE70B000
heap
page read and write
2147A446000
heap
page read and write
7FFD939E4000
unkown
page read and write
16AAE04D000
heap
page read and write
7FFD94372000
unkown
page readonly
2147A44D000
heap
page read and write
16AAE164000
heap
page read and write
7FFD939B5000
unkown
page readonly
16AAF860000
direct allocation
page read and write
16AADBE9000
heap
page read and write
16AAE749000
heap
page read and write
16AAE3A5000
heap
page read and write
16AADFF1000
heap
page read and write
2147A454000
heap
page read and write
2147A44C000
heap
page read and write
16AAE0AC000
heap
page read and write
16AAE41F000
heap
page read and write
7FFDA2E93000
unkown
page readonly
16AAE543000
heap
page read and write
16AAE45E000
heap
page read and write
16AAE10A000
heap
page read and write
16AADC2E000
heap
page read and write
2147A44C000
heap
page read and write
2147A447000
heap
page read and write
14EF7AF000
stack
page read and write
16AAE09C000
heap
page read and write
16AADC02000
heap
page read and write
16AAF86C000
direct allocation
page read and write
16AAE10F000
heap
page read and write
16AAE531000
heap
page read and write
7FFD9F3C3000
unkown
page readonly
2147A453000
heap
page read and write
16AAE020000
heap
page read and write
16AAE566000
heap
page read and write
2147A454000
heap
page read and write
16AADFD5000
heap
page read and write
7FFD94711000
unkown
page write copy
2147A454000
heap
page read and write
16AAE035000
heap
page read and write
16AAE587000
heap
page read and write
7FFD9DF34000
unkown
page readonly
2147A454000
heap
page read and write
16AAE0B0000
heap
page read and write
16AAE426000
heap
page read and write
16AADFE9000
heap
page read and write
7FFDA3A89000
unkown
page readonly
30C23E0000
stack
page read and write
16AAE60E000
heap
page read and write
16AAE07D000
heap
page read and write
2147A44F000
heap
page read and write
2147A44D000
heap
page read and write
2147A44D000
heap
page read and write
2147A44C000
heap
page read and write
2147A455000
heap
page read and write
16AAE0D8000
heap
page read and write
2147A44D000
heap
page read and write
16AAE149000
heap
page read and write
16AAE164000
heap
page read and write
7FFD93C77000
unkown
page execute read
2147A44C000
heap
page read and write
7FFDA3310000
unkown
page readonly
7FFDA3EB2000
unkown
page readonly
2147A446000
heap
page read and write
2147A455000
heap
page read and write
7FFDA4171000
unkown
page readonly
7FFDA32F5000
unkown
page readonly
7FF6EB20B000
unkown
page readonly
16AAE0D7000
heap
page read and write
7FF6EB1E0000
unkown
page readonly
7FFDA5490000
unkown
page readonly
16AAE0D3000
heap
page read and write
16AAC18B000
heap
page read and write
7FFDA33B0000
unkown
page readonly
7FFD9DED1000
unkown
page execute read
16AAE566000
heap
page read and write
16AAE3F9000
heap
page read and write
There are 1063 hidden memdumps, click here to show them.