IOC Report
SecuriteInfo.com.FileRepMalware.7131.28226.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.7131.28226.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI21602\Pythonwin\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\Pythonwin\win32ui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\psutil\_psutil_windows.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\pywin32_system32\pythoncom312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\pywin32_system32\pywintypes312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\win32\_win32sysloader.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\win32\win32trace.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\zstandard\_cffi.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI21602\zstandard\backend_c.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.12\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.12\dicts.dat
data
dropped
There are 65 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7131.28226.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7131.28226.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7131.28226.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7131.28226.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://github.com/giampaolo/psutil/issues/875.
unknown
https://github.com/mhammond/pywin32
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://crl.dhimyotis.com/certignarootca.crl8
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://goo.gl/zeJZl.
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
http://repository.swisssign.com/_
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://peps.python.org/pep-0205/
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://github.com/RezWare-SoftWare/RezWares/releases/download/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
unknown
https://httpbin.org/
unknown
https://wwww.certigna.fr/autorites/
unknown
http://repository.swisssign.com/p
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
http://www.accv.es/legislacion_c.htm??g
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://www.python.org/psf/license/
unknown
https://wwww.certigna.fr/autorites/XfH
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
https://github.com/python/importlib_metadata/wiki/Development-Methodology
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://api.github.com/repos/RezWare-SoftWare/RezWares/releases/latest
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://google.com/mail
unknown
https://packaging.python.org/specifications/entry-points/
unknown
http://www.accv.es00
unknown
https://www.python.org/psf/license/)
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://httpbin.org/post
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://github.com/Ousret/charset_normalizer
unknown
http://www.firmaprofesional.com/cps0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://html.spec.whatwg.org/multipage/
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://requests.readthedocs.io
unknown
http://repository.swisssign.com/
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://www.python.org
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
http://ocsp.accv.es0
unknown
https://www.python.org/
unknown
https://json.org
unknown
https://docs.python.org/3/howto/mro.html.
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
unknown
https://twitter.com/
unknown
https://stackoverflow.com/questions/4457745#4457745.
unknown
http://www.quovadisglobal.com/cps
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
unknown
https://google.com/
unknown
https://google.com/mail/
unknown
http://google.com/mail/
unknown
https://github.com/urllib3/urllib3/issues/32902
unknown
https://github.com/urllib3/urllib3/issues/3290
unknown
http://repository.swisssign.com/&
unknown
https://www.openssl.org/H
unknown
http://crl.certigna.fr/certignarootca.crl01
unknown
https://docs.python.org/3/library/socket.html#socket.socket.connect_ex
unknown
https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
unknown
https://peps.python.org/pep-0263/
unknown
https://github.com/psf/requests/pull/6710
unknown
There are 89 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.github.com
140.82.121.5
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.43
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
140.82.121.5
api.github.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2D4DC3E0000
heap
page read and write
2D4DC491000
heap
page read and write
2D4D9DC0000
heap
page read and write
2D4DC384000
heap
page read and write
2D4DC1BD000
heap
page read and write
2117BC52000
heap
page read and write
7FFBAADA1000
unkown
page read and write
2D4DC483000
heap
page read and write
2D4DB840000
heap
page read and write
7FFBBB937000
unkown
page read and write
7FFBAB10C000
unkown
page readonly
2D4DBC71000
heap
page read and write
2D4DB886000
heap
page read and write
7FFBAA28D000
unkown
page read and write
2D4DB7DB000
heap
page read and write
2D4DB825000
heap
page read and write
2D4DC790000
direct allocation
page read and write
7FFBBC706000
unkown
page readonly
2D4DC1F9000
heap
page read and write
2D4DB87C000
heap
page read and write
2D4DB809000
heap
page read and write
2D4DC147000
heap
page read and write
2D4DC139000
heap
page read and write
7FFBAAD9F000
unkown
page read and write
2D4DC483000
heap
page read and write
2D4DB808000
heap
page read and write
2D4DB88E000
heap
page read and write
2D4DB7EA000
heap
page read and write
7FFBAA337000
unkown
page execute read
2D4DB839000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC13D000
heap
page read and write
2D4DC20A000
heap
page read and write
2D4DC470000
heap
page read and write
2D4DBCCE000
heap
page read and write
7FFBAA2C8000
unkown
page execute read
7FFBAA0F0000
unkown
page readonly
2117BC52000
heap
page read and write
2D4D9CCD000
heap
page read and write
2D4DC30C000
heap
page read and write
2D4DB7A7000
heap
page read and write
2D4DC201000
heap
page read and write
2D4D9CCF000
heap
page read and write
2D4DB7DB000
heap
page read and write
2D4DB87F000
heap
page read and write
2D4DBC27000
heap
page read and write
2D4DC141000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC40A000
heap
page read and write
2D4DC0F0000
heap
page read and write
2D4DB838000
heap
page read and write
2D4DBC6F000
heap
page read and write
2D4DBC10000
heap
page read and write
2D4DBBD8000
heap
page read and write
2D4D9CAF000
heap
page read and write
2D4D9CE0000
heap
page read and write
2D4DB848000
heap
page read and write
2D4DC447000
heap
page read and write
7FF6A4AB6000
unkown
page readonly
2D4DBAD0000
heap
page read and write
2D4DBBF2000
heap
page read and write
2D4DC141000
heap
page read and write
7FFBBB939000
unkown
page readonly
2D4DB86B000
heap
page read and write
2D4DB82E000
heap
page read and write
7FFBAADD0000
unkown
page read and write
2D4DBB5B000
heap
page read and write
7FFBAA68F000
unkown
page readonly
2117BBB0000
heap
page read and write
2D4DB848000
heap
page read and write
2D4DB7B9000
heap
page read and write
2D4DC191000
heap
page read and write
2D4DB680000
heap
page read and write
2D4D9CC2000
heap
page read and write
2D4DB87B000
heap
page read and write
7FFBB7FBE000
unkown
page readonly
2D4DBC41000
heap
page read and write
2D4DBC73000
heap
page read and write
2117BC5F000
heap
page read and write
7FFBB7FB0000
unkown
page readonly
2D4DBB9A000
heap
page read and write
2117BC52000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC138000
heap
page read and write
2D4DB803000
heap
page read and write
2D4DC710000
direct allocation
page read and write
2D4DB871000
heap
page read and write
7FFBB051E000
unkown
page read and write
2D4DB880000
heap
page read and write
2D4DC41A000
heap
page read and write
2D4DB851000
heap
page read and write
2D4DC3AE000
heap
page read and write
2D4DB807000
heap
page read and write
2D4DB844000
heap
page read and write
2D4DB888000
heap
page read and write
2D4DC49A000
heap
page read and write
2D4DB7F0000
heap
page read and write
2D4DC377000
heap
page read and write
2D4DBC87000
heap
page read and write
2117BC60000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DB79D000
heap
page read and write
2D4DBB17000
heap
page read and write
2D4DBB2A000
heap
page read and write
2D4DB7BF000
heap
page read and write
2D4DC3C8000
heap
page read and write
2D4DC2DA000
heap
page read and write
A2523ED000
stack
page read and write
2D4D9CBF000
heap
page read and write
2D4DC6D4000
direct allocation
page read and write
2D4DBBEB000
heap
page read and write
2D4DC49A000
heap
page read and write
2D4DBB69000
heap
page read and write
2D4DB885000
heap
page read and write
2117BC30000
heap
page read and write
2D4DB87E000
heap
page read and write
7FFBAA09C000
unkown
page readonly
2D4DB7D4000
heap
page read and write
2D4DBC3A000
heap
page read and write
2D4DB7BB000
heap
page read and write
2D4D9CCF000
heap
page read and write
7FFBAA327000
unkown
page execute read
2D4DBB0F000
heap
page read and write
2D4D9CC1000
heap
page read and write
7FFBAAA52000
unkown
page readonly
2D4DB88E000
heap
page read and write
2D4DB87D000
heap
page read and write
2D4DC136000
heap
page read and write
7FF6A4AB4000
unkown
page read and write
2D4DC38E000
heap
page read and write
2D4DC204000
heap
page read and write
2D4DBB16000
heap
page read and write
2D4DBAEA000
heap
page read and write
2D4DB87D000
heap
page read and write
2D4DBC8B000
heap
page read and write
2D4D9BE0000
heap
page read and write
2D4DBB57000
heap
page read and write
7FFBAAD9C000
unkown
page write copy
2D4DBB99000
heap
page read and write
2D4DB84B000
heap
page read and write
2D4DB871000
heap
page read and write
2D4DBBFF000
heap
page read and write
2D4DB82A000
heap
page read and write
2D4DBB29000
heap
page read and write
2D4DB81C000
heap
page read and write
2D4DC389000
heap
page read and write
7FFBAB008000
unkown
page readonly
2D4DBC55000
heap
page read and write
2D4DC18B000
heap
page read and write
7FFBAA0DA000
unkown
page write copy
2D4DC13C000
heap
page read and write
7FFBB04D1000
unkown
page execute read
7FFBAA0F5000
unkown
page readonly
2117BC52000
heap
page read and write
2D4DB837000
heap
page read and write
7FFBC3148000
unkown
page read and write
2117BC60000
heap
page read and write
2D4DC3D8000
heap
page read and write
2D4DBC5E000
heap
page read and write
2D4DBB96000
heap
page read and write
2117BC50000
heap
page read and write
2D4DC920000
heap
page read and write
7FFBAA652000
unkown
page readonly
2D4DBBAA000
heap
page read and write
2D4DC441000
heap
page read and write
7FF6A4AB6000
unkown
page readonly
2D4D9CA9000
heap
page read and write
2D4DC1F9000
heap
page read and write
7FFBBC151000
unkown
page execute read
2117BC52000
heap
page read and write
2D4D9C79000
heap
page read and write
2117BC52000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC205000
heap
page read and write
7FFBAAA61000
unkown
page readonly
2117BC52000
heap
page read and write
2D4DC172000
heap
page read and write
2D4DC455000
heap
page read and write
2D4DC1C6000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC35A000
heap
page read and write
7FFBBCA20000
unkown
page readonly
7FFBAA19E000
unkown
page readonly
2D4DC13C000
heap
page read and write
7FF6A4AB0000
unkown
page write copy
2D4DB7BA000
heap
page read and write
7FFBB0500000
unkown
page readonly
2D4DB7F0000
heap
page read and write
2D4DC470000
heap
page read and write
2D4DC175000
heap
page read and write
7FFBAAA32000
unkown
page readonly
2D4DC194000
heap
page read and write
2D4DBC96000
heap
page read and write
2D4D9CB3000
heap
page read and write
2D4DC466000
heap
page read and write
2D4DC136000
heap
page read and write
2D4DB829000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC0F1000
heap
page read and write
2D4DC13C000
heap
page read and write
2D4DBB83000
heap
page read and write
7FFBAA211000
unkown
page execute read
2D4DC150000
heap
page read and write
2D4DB876000
heap
page read and write
7FFBAADAB000
unkown
page readonly
2D4DC132000
heap
page read and write
2D4DBB68000
heap
page read and write
2D4DC491000
heap
page read and write
2D4DBB6E000
heap
page read and write
2D4DC41D000
heap
page read and write
2D4DBB8B000
heap
page read and write
2117BC60000
heap
page read and write
2D4DBAE5000
heap
page read and write
7FFBAB002000
unkown
page readonly
2D4DBCB6000
heap
page read and write
2D4DB85D000
heap
page read and write
2117BC52000
heap
page read and write
2D4DD21C000
direct allocation
page read and write
2D4DBBEE000
heap
page read and write
7FFBAA0DB000
unkown
page read and write
2117BC52000
heap
page read and write
2D4DC20E000
heap
page read and write
2D4DBC1F000
heap
page read and write
2D4DB7F2000
heap
page read and write
2D4DC137000
heap
page read and write
7FFBAAE24000
unkown
page read and write
7FFBB04F1000
unkown
page readonly
2D4DB7CB000
heap
page read and write
7FFBAAD19000
unkown
page write copy
2D4D9CA1000
heap
page read and write
7FFBAB010000
unkown
page readonly
2D4DB690000
direct allocation
page read and write
2D4DC4C1000
heap
page read and write
7FFBAA762000
unkown
page readonly
2D4DC447000
heap
page read and write
2D4DC1FC000
heap
page read and write
2D4DC3C4000
heap
page read and write
7FFBB5CD4000
unkown
page read and write
2D4DC17C000
heap
page read and write
2D4DBB57000
heap
page read and write
2D4DB87D000
heap
page read and write
2D4DB883000
heap
page read and write
2D4DB80D000
heap
page read and write
2D4DBC87000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC182000
heap
page read and write
2D4DB7FA000
heap
page read and write
2D4DC194000
heap
page read and write
2D4DB85B000
heap
page read and write
2D4DC200000
heap
page read and write
2D4DBB5D000
heap
page read and write
7FFBAA28E000
unkown
page readonly
2D4D9C9A000
heap
page read and write
7FFBAADD5000
unkown
page read and write
2117BC52000
heap
page read and write
2D4DC908000
direct allocation
page read and write
2D4DC4C1000
heap
page read and write
2117BC52000
heap
page read and write
2D4D9CB7000
heap
page read and write
7FFBAA28B000
unkown
page read and write
2D4DC1C9000
heap
page read and write
2D4DB7CF000
heap
page read and write
2D4DC455000
heap
page read and write
2D4D9CB4000
heap
page read and write
2117BC60000
heap
page read and write
7FFBB0521000
unkown
page readonly
2D4DC379000
heap
page read and write
2D4DB81C000
heap
page read and write
2D4DBAE0000
heap
page read and write
2D4DB7EC000
heap
page read and write
2D4DC13E000
heap
page read and write
2117BC52000
heap
page read and write
7FFBBC150000
unkown
page readonly
2D4DC0D8000
heap
page read and write
2D4DB852000
heap
page read and write
2D4DC104000
heap
page read and write
2D4DC135000
heap
page read and write
2D4DC491000
heap
page read and write
2D4DB7BF000
heap
page read and write
2D4D9CC0000
heap
page read and write
2D4DBB9B000
heap
page read and write
2D4DC0F0000
heap
page read and write
2D4DB87A000
heap
page read and write
2D4DB7AC000
heap
page read and write
7FFBB7FB1000
unkown
page execute read
2117BC5F000
heap
page read and write
7FFBAB020000
unkown
page readonly
7FFBAB109000
unkown
page read and write
2D4DC3B6000
heap
page read and write
7FFBAA52E000
unkown
page execute read
2D4DC3C8000
heap
page read and write
7FFBAA312000
unkown
page execute read
2D4DC483000
heap
page read and write
7FFBAB021000
unkown
page execute read
2D4DB836000
heap
page read and write
2117BC52000
heap
page read and write
2117BC52000
heap
page read and write
7FFBAA7B1000
unkown
page execute read
2D4DB800000
heap
page read and write
7FFBB5CB1000
unkown
page execute read
2D4DB837000
heap
page read and write
2D4DBC56000
heap
page read and write
2117BC52000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC3E3000
heap
page read and write
2D4DBC9F000
heap
page read and write
2D4DC3F9000
heap
page read and write
2D4DC362000
heap
page read and write
7FFBBC703000
unkown
page readonly
2D4DD224000
direct allocation
page read and write
2D4DB82F000
heap
page read and write
2117BBE0000
heap
page read and write
2D4DB86B000
heap
page read and write
2117BC60000
heap
page read and write
2D4DB9D0000
direct allocation
page read and write
2D4DBC5B000
heap
page read and write
2D4DB7D2000
heap
page read and write
2D4DC399000
heap
page read and write
7FFBBBE96000
unkown
page readonly
2D4DC3DE000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB7D4000
heap
page read and write
2D4DB814000
heap
page read and write
2117BC52000
heap
page read and write
2D4DBB7F000
heap
page read and write
2D4D9CC8000
heap
page read and write
2D4DB803000
heap
page read and write
2D4DC1F9000
heap
page read and write
2D4DB79F000
heap
page read and write
2D4DBB6A000
heap
page read and write
2D4DBCBD000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB871000
heap
page read and write
7FFBAA7B0000
unkown
page readonly
2D4DC17C000
heap
page read and write
2D4DBB90000
heap
page read and write
2D4DB7F0000
heap
page read and write
2D4DBC9F000
heap
page read and write
2D4DC0F0000
heap
page read and write
2D4DC2E7000
heap
page read and write
2D4DC17E000
heap
page read and write
2D4DB876000
heap
page read and write
2D4DC940000
heap
page read and write
2D4DB883000
heap
page read and write
2D4DB7FB000
heap
page read and write
2D4DB70C000
direct allocation
page read and write
2D4DBC2E000
heap
page read and write
2D4DBB1B000
heap
page read and write
2D4DC8CC000
direct allocation
page read and write
2D4DC13C000
heap
page read and write
7FFBB0510000
unkown
page readonly
2D4DB832000
heap
page read and write
2D4DC470000
heap
page read and write
2D4DC483000
heap
page read and write
2D4DB851000
heap
page read and write
2D4DD204000
direct allocation
page read and write
2D4DB815000
heap
page read and write
2D4DB883000
heap
page read and write
2D4DBB80000
heap
page read and write
2D4DBBF3000
heap
page read and write
2117BC52000
heap
page read and write
7FFBBB8FC000
unkown
page read and write
2D4DC174000
heap
page read and write
2D4D9CA7000
heap
page read and write
7FFBAA2B2000
unkown
page execute read
2D4DC213000
heap
page read and write
2D4DB884000
heap
page read and write
7FFBAA0E4000
unkown
page readonly
2D4DC1D4000
heap
page read and write
2D4DC1E8000
heap
page read and write
2D4DBBEB000
heap
page read and write
2117BC4B000
heap
page read and write
2D4DBBE7000
heap
page read and write
2D4DB85A000
heap
page read and write
2117BC52000
heap
page read and write
2D4DBAD9000
heap
page read and write
2D4DC134000
heap
page read and write
2D4DBC2B000
heap
page read and write
2D4DC326000
heap
page read and write
2D4D9CA6000
heap
page read and write
2D4DBC8B000
heap
page read and write
7FFBAAD9B000
unkown
page read and write
2D4DC4C1000
heap
page read and write
A2527CF000
stack
page read and write
2D4DC14C000
heap
page read and write
2D4DB88D000
heap
page read and write
2D4DC150000
heap
page read and write
2D4DC49A000
heap
page read and write
2D4DB834000
heap
page read and write
2D4DC466000
heap
page read and write
2D4DB7BF000
heap
page read and write
2D4DC20F000
heap
page read and write
2D4DB7BE000
heap
page read and write
2D4DBBB2000
heap
page read and write
2D4DB590000
heap
page read and write
2D4DB7D4000
heap
page read and write
2D4DC222000
heap
page read and write
2D4DBB90000
heap
page read and write
7FFBBCD5C000
unkown
page readonly
2D4DBB27000
heap
page read and write
2D4DBED0000
direct allocation
page read and write
7FFBBCA01000
unkown
page execute read
7FFBBC158000
unkown
page read and write
2D4DBC32000
heap
page read and write
2D4DB80B000
heap
page read and write
7FF6A4AB6000
unkown
page readonly
7FFBBCD5E000
unkown
page readonly
2D4DBB99000
heap
page read and write
2D4D9C85000
heap
page read and write
2D4DB684000
heap
page read and write
2D4DB804000
heap
page read and write
2D4DB807000
heap
page read and write
2D4DB85D000
heap
page read and write
7FFBAA1A2000
unkown
page readonly
2D4DB87D000
heap
page read and write
2D4DB7F3000
heap
page read and write
2D4DC17F000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC4A4000
heap
page read and write
7FFBB7FC3000
unkown
page readonly
2D4DD228000
direct allocation
page read and write
2D4DBC87000
heap
page read and write
7FFBB5CCC000
unkown
page readonly
2117BC5F000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC13A000
heap
page read and write
2117BC52000
heap
page read and write
7FF6A4AB0000
unkown
page write copy
2D4DC221000
heap
page read and write
2D4DC136000
heap
page read and write
7FFBAA152000
unkown
page readonly
2D4DB7ED000
heap
page read and write
2D4DC288000
heap
page read and write
2D4DBB87000
heap
page read and write
2D4DC3C8000
heap
page read and write
7FFBBBE95000
unkown
page read and write
2D4DC352000
heap
page read and write
2D4DBB83000
heap
page read and write
2D4DB81E000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC413000
heap
page read and write
2D4DBC41000
heap
page read and write
7FFBBBE90000
unkown
page readonly
2D4DBBCB000
heap
page read and write
2D4DC348000
heap
page read and write
7FFBAA041000
unkown
page execute read
2117BC60000
heap
page read and write
2D4DC3DB000
heap
page read and write
2D4DBB96000
heap
page read and write
2D4D9CCE000
heap
page read and write
2D4DBAE8000
heap
page read and write
2D4DC45D000
heap
page read and write
2117BC52000
heap
page read and write
2D4DBB58000
heap
page read and write
7FFBB0501000
unkown
page execute read
2D4DB5C0000
direct allocation
page read and write
7FF6A4A9D000
unkown
page readonly
2D4D9CD9000
heap
page read and write
2D4DBC27000
heap
page read and write
2D4DC1F8000
heap
page read and write
2D4DBB65000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC3A9000
heap
page read and write
2D4DC208000
heap
page read and write
2D4DBBAA000
heap
page read and write
2D4DBB90000
heap
page read and write
2D4DBBAA000
heap
page read and write
7FFBB6290000
unkown
page readonly
2D4DB881000
heap
page read and write
2D4DBC49000
heap
page read and write
2D4DB828000
heap
page read and write
2D4DC17C000
heap
page read and write
7FFBAA2C2000
unkown
page execute read
2117BC52000
heap
page read and write
2D4DC139000
heap
page read and write
2D4DC7E4000
direct allocation
page read and write
2D4DBB84000
heap
page read and write
2D4DC3A7000
heap
page read and write
2D4DC447000
heap
page read and write
7FFBBB552000
unkown
page readonly
2D4DC1F5000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC17E000
heap
page read and write
2D4DB7D2000
heap
page read and write
2D4D9CA4000
heap
page read and write
2D4D9CC0000
heap
page read and write
2D4DBB64000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DC440000
heap
page read and write
7FFBBC155000
unkown
page readonly
2D4DBAE9000
heap
page read and write
2D4DB81B000
heap
page read and write
7FFBC3149000
unkown
page readonly
2D4DC466000
heap
page read and write
2D4DC0E0000
heap
page read and write
FF77DEE000
stack
page read and write
2117BC5F000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB874000
heap
page read and write
FF779F0000
stack
page read and write
2D4DBB1B000
heap
page read and write
7FFBAAF51000
unkown
page execute read
2D4DC992000
heap
page read and write
2117BC52000
heap
page read and write
2D4D9C82000
heap
page read and write
2D4DBB1B000
heap
page read and write
7FFBBCD51000
unkown
page readonly
2D4DC389000
heap
page read and write
2117BC52000
heap
page read and write
7FFBAA75D000
unkown
page write copy
2D4DB7EB000
heap
page read and write
2D4DB876000
heap
page read and write
2D4DC171000
heap
page read and write
2D4DC45D000
heap
page read and write
2D4DC0D0000
heap
page read and write
2D4DC157000
heap
page read and write
2D4DC4A4000
heap
page read and write
2D4DB807000
heap
page read and write
2D4DBB97000
heap
page read and write
7FFBBC347000
unkown
page read and write
2D4DB837000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DB7D0000
heap
page read and write
7FFBB1880000
unkown
page readonly
2D4DBBF5000
heap
page read and write
2D4DC18A000
heap
page read and write
2D4DC49A000
heap
page read and write
2D4DBC8A000
heap
page read and write
7FF6A4A70000
unkown
page readonly
2D4DC45D000
heap
page read and write
2D4DC41B000
heap
page read and write
2D4DB876000
heap
page read and write
2117BC52000
heap
page read and write
7FFBB7FC2000
unkown
page read and write
2D4DBBAA000
heap
page read and write
2D4DBBF5000
heap
page read and write
2D4DB7F5000
heap
page read and write
7FFBAA040000
unkown
page readonly
2117BC52000
heap
page read and write
2D4DB7DB000
heap
page read and write
2D4DB7D4000
heap
page read and write
2D4DD244000
direct allocation
page read and write
7FFBB04EE000
unkown
page read and write
7FFBAAFD5000
unkown
page readonly
2D4DC3E3000
heap
page read and write
7FFBAA6EA000
unkown
page readonly
2D4DB81A000
heap
page read and write
2D4DBB1A000
heap
page read and write
2D4DC8B0000
direct allocation
page read and write
7FFBBB551000
unkown
page execute read
2D4DB878000
heap
page read and write
FF77FDE000
stack
page read and write
2D4DBC4D000
heap
page read and write
2D4DC17C000
heap
page read and write
2D4DC491000
heap
page read and write
7FFBB62A0000
unkown
page read and write
2D4DB790000
heap
page read and write
7FFBAA794000
unkown
page readonly
7FFBBB910000
unkown
page readonly
2D4DB841000
heap
page read and write
2D4DB85B000
heap
page read and write
2D4DB7B2000
heap
page read and write
2D4DC441000
heap
page read and write
2D4DC1F9000
heap
page read and write
2D4DBC92000
heap
page read and write
7FFBBCD40000
unkown
page readonly
2D4DC455000
heap
page read and write
2D4DB877000
heap
page read and write
2D4DC36B000
heap
page read and write
7FFBB5CC8000
unkown
page readonly
2D4DC194000
heap
page read and write
2D4DBC2B000
heap
page read and write
A2523E3000
stack
page read and write
2D4DB5D0000
unkown
page readonly
2D4DBC41000
heap
page read and write
2D4DC21A000
heap
page read and write
7FFBAABA2000
unkown
page readonly
2D4DB87D000
heap
page read and write
2D4DB87C000
heap
page read and write
2D4DBB67000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC466000
heap
page read and write
2D4DBB29000
heap
page read and write
2D4DBB1D000
heap
page read and write
7FFBAA202000
unkown
page read and write
2117BC52000
heap
page read and write
2D4DC131000
heap
page read and write
2D4DC840000
direct allocation
page read and write
2D4DBBEC000
heap
page read and write
2D4DBC25000
heap
page read and write
2D4DC3E3000
heap
page read and write
2D4DC7B4000
direct allocation
page read and write
2D4D9CA3000
heap
page read and write
2D4DB888000
heap
page read and write
7FFBBCA11000
unkown
page read and write
2D4DC981000
heap
page read and write
2117BC52000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DBC21000
heap
page read and write
2D4DB7B9000
heap
page read and write
2D4D9CD2000
heap
page read and write
7FFBAA204000
unkown
page readonly
2D4DC288000
heap
page read and write
2D4DBC05000
heap
page read and write
7FFBAAD13000
unkown
page write copy
2D4DC3BF000
heap
page read and write
2D4DBB66000
heap
page read and write
7FFBBC159000
unkown
page readonly
7FFBAAF50000
unkown
page readonly
2117BC52000
heap
page read and write
2D4DC491000
heap
page read and write
2D4DBB95000
heap
page read and write
7FFBAA75E000
unkown
page read and write
2D4DC212000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB883000
heap
page read and write
2D4DC140000
heap
page read and write
2D4DC1DD000
heap
page read and write
2D4DBC05000
heap
page read and write
2D4DC4C1000
heap
page read and write
2D4DBBD5000
heap
page read and write
7FFBBCD41000
unkown
page execute read
2D4DB7F0000
heap
page read and write
2D4D9CCF000
heap
page read and write
2D4DC810000
direct allocation
page read and write
2D4DB7DB000
heap
page read and write
2D4DC172000
heap
page read and write
2D4DBBB2000
heap
page read and write
2D4DC34E000
heap
page read and write
2117BC52000
heap
page read and write
7FF6A4AB0000
unkown
page read and write
2D4DC193000
heap
page read and write
7FFBAA2A0000
unkown
page readonly
2D4DB7F2000
heap
page read and write
2D4DBB66000
heap
page read and write
2D4DBC77000
heap
page read and write
2D4DBAF4000
heap
page read and write
2D4DD1F0000
heap
page read and write
2D4D9C65000
heap
page read and write
2D4DB7DB000
heap
page read and write
2D4DC21A000
heap
page read and write
2117BC52000
heap
page read and write
7FFBAAFD3000
unkown
page execute read
2D4DBBD2000
heap
page read and write
2D4DB87B000
heap
page read and write
2D4DC328000
heap
page read and write
2D4DC288000
heap
page read and write
2D4DC17C000
heap
page read and write
2D4DC4B9000
heap
page read and write
2D4DC13E000
heap
page read and write
2D4DB7D4000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC470000
heap
page read and write
7FFBBB931000
unkown
page write copy
2117BC52000
heap
page read and write
7FFBAA1A7000
unkown
page readonly
2D4DC32D000
heap
page read and write
7FFBBCD58000
unkown
page read and write
2D4DD238000
direct allocation
page read and write
2D4DBCB1000
heap
page read and write
7FFBAA75B000
unkown
page write copy
2D4DD208000
direct allocation
page read and write
2D4DBBD6000
heap
page read and write
7FFBAADE1000
unkown
page write copy
2D4DBC95000
heap
page read and write
2D4DBB82000
heap
page read and write
2117BC52000
heap
page read and write
2D4D9C8A000
heap
page read and write
2117BC52000
heap
page read and write
2D4DBAD8000
heap
page read and write
2D4DC2E5000
heap
page read and write
2D4DBB99000
heap
page read and write
2D4DBBA2000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC334000
heap
page read and write
2D4DC968000
heap
page read and write
2D4DBAE4000
heap
page read and write
2D4DC1E8000
heap
page read and write
7FFBBB8F7000
unkown
page readonly
2D4DB85D000
heap
page read and write
2D4DB81C000
heap
page read and write
2D4DC43C000
heap
page read and write
2117BC52000
heap
page read and write
2D4D9CD0000
heap
page read and write
2D4DC0E0000
heap
page read and write
2117BC60000
heap
page read and write
2D4DBC6B000
heap
page read and write
7FF6A4A9D000
unkown
page readonly
7FFBB5CB0000
unkown
page readonly
2D4DC289000
heap
page read and write
2D4DBBF5000
heap
page read and write
2D4DBAD1000
heap
page read and write
2D4DC136000
heap
page read and write
2D4D9CB6000
heap
page read and write
7FFBBCA09000
unkown
page readonly
7FFBBC705000
unkown
page read and write
2D4DC3B1000
heap
page read and write
2D4DC30C000
heap
page read and write
2117BC60000
heap
page read and write
2D4DBB58000
heap
page read and write
2D4DBC5E000
heap
page read and write
7FFBAAFFD000
unkown
page read and write
2D4DC138000
heap
page read and write
2D4DC175000
heap
page read and write
2D4DBCC2000
heap
page read and write
7FFBB04D0000
unkown
page readonly
7FFBAA0F1000
unkown
page execute read
2117D650000
heap
page read and write
2D4DBAF4000
heap
page read and write
2D4DBC4B000
heap
page read and write
2D4DBB6A000
heap
page read and write
2D4DBCB7000
heap
page read and write
2D4DC18A000
heap
page read and write
7FFBBB91D000
unkown
page readonly
2D4DBC60000
heap
page read and write
2D4DC344000
heap
page read and write
2D4DC12A000
heap
page read and write
2D4DB7E6000
heap
page read and write
A2525DF000
stack
page read and write
2D4DBAE9000
heap
page read and write
2D4DBC15000
heap
page read and write
2D4DBC37000
heap
page read and write
2D4DB84C000
heap
page read and write
2D4DB811000
heap
page read and write
2D4DBC05000
heap
page read and write
2D4DBBAA000
heap
page read and write
7FFBB04E3000
unkown
page readonly
2D4DC416000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB83F000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC0DD000
heap
page read and write
2D4DC4A4000
heap
page read and write
2D4DC3E3000
heap
page read and write
2D4DBBAA000
heap
page read and write
2D4DBC70000
heap
page read and write
2D4DB7DB000
heap
page read and write
7FFBBCA26000
unkown
page readonly
7FFBC3131000
unkown
page execute read
2D4DB803000
heap
page read and write
2D4DC3C8000
heap
page read and write
2117BC52000
heap
page read and write
2D4D9CC0000
heap
page read and write
2D4DC491000
heap
page read and write
2D4DC13B000
heap
page read and write
2D4DC0E0000
heap
page read and write
2D4DB79E000
heap
page read and write
2D4DC1E9000
heap
page read and write
7FFBAA729000
unkown
page readonly
2D4DC45D000
heap
page read and write
2D4DC200000
heap
page read and write
2D4DC103000
heap
page read and write
2D4DC41B000
heap
page read and write
2D4DB843000
heap
page read and write
2117BC60000
heap
page read and write
2D4DB7B5000
heap
page read and write
2D4DB871000
heap
page read and write
2D4DBAF4000
heap
page read and write
7FF6A4A9D000
unkown
page readonly
2D4DB7A3000
heap
page read and write
7FFBB6291000
unkown
page execute read
2117BC5F000
heap
page read and write
2117BC51000
heap
page read and write
2D4DB876000
heap
page read and write
2D4DC3E3000
heap
page read and write
2D4DB803000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC12F000
heap
page read and write
2D4DC288000
heap
page read and write
2D4DBBF1000
heap
page read and write
2D4DC5E0000
direct allocation
page read and write
2D4DC466000
heap
page read and write
2D4DB87E000
heap
page read and write
7FFBC3143000
unkown
page readonly
2117BC52000
heap
page read and write
7FFBAA28C000
unkown
page write copy
2D4DB7D4000
heap
page read and write
2D4DBB8A000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC1D3000
heap
page read and write
2D4DBB6B000
heap
page read and write
7FFBBCA13000
unkown
page readonly
2D4DBC8D000
heap
page read and write
2D4DBC93000
heap
page read and write
2D4DC13E000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC18C000
heap
page read and write
2D4DC2E7000
heap
page read and write
2D4DBC2B000
heap
page read and write
2D4DBC41000
heap
page read and write
2117BC52000
heap
page read and write
2117BC3F000
heap
page read and write
2D4DB88E000
heap
page read and write
2D4DC441000
heap
page read and write
2D4DBC4B000
heap
page read and write
2D4DC133000
heap
page read and write
2D4DBCB7000
heap
page read and write
2D4DB814000
heap
page read and write
7FFBBB554000
unkown
page readonly
7FFBB629B000
unkown
page readonly
7FF6A4AB0000
unkown
page read and write
2D4DB7B9000
heap
page read and write
2D4DC13C000
heap
page read and write
2D4DBAEA000
heap
page read and write
2D4DBB8D000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC1C7000
heap
page read and write
2D4DB7BA000
heap
page read and write
2D4DBDD0000
direct allocation
page read and write
7FF6A4A9D000
unkown
page readonly
7FFBBB8F0000
unkown
page readonly
2D4DB7DB000
heap
page read and write
2D4DBB67000
heap
page read and write
2D4DB875000
heap
page read and write
2D4DB885000
heap
page read and write
2D4DBC0E000
heap
page read and write
2D4DC373000
heap
page read and write
2D4DBB15000
heap
page read and write
2D4DC142000
heap
page read and write
7FFBAACA6000
unkown
page read and write
7FFBBB930000
unkown
page read and write
2D4DB88E000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DB7B7000
heap
page read and write
7FFBBC700000
unkown
page readonly
2D4DBC1B000
heap
page read and write
2D4DBBEF000
heap
page read and write
2D4DC3A4000
heap
page read and write
2D4DBB99000
heap
page read and write
2D4DBC27000
heap
page read and write
7FFBBBE93000
unkown
page readonly
7FFBAA2A1000
unkown
page execute read
2D4DBCB0000
heap
page read and write
2D4DBB01000
heap
page read and write
2D4DC1C7000
heap
page read and write
7FF6A4A70000
unkown
page readonly
7FFBBB8FE000
unkown
page readonly
7FF6A4A71000
unkown
page execute read
2D4DBADA000
heap
page read and write
7FFBBCA29000
unkown
page readonly
2D4DC223000
heap
page read and write
2D4DB871000
heap
page read and write
7FFBBB8F1000
unkown
page execute read
2D4DB7F8000
heap
page read and write
2D4DBB11000
heap
page read and write
2D4DB7D4000
heap
page read and write
2D4DBAE1000
heap
page read and write
2D4DBB96000
heap
page read and write
2D4DB84B000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC13C000
heap
page read and write
2D4DB811000
heap
page read and write
2D4DC133000
heap
page read and write
2D4DC4C1000
heap
page read and write
2D4DB81B000
heap
page read and write
7FFBAA210000
unkown
page readonly
2D4DB791000
heap
page read and write
7FFBAAE41000
unkown
page readonly
2D4DB7D4000
heap
page read and write
7FFBBC348000
unkown
page readonly
2117BC52000
heap
page read and write
2D4DBC5B000
heap
page read and write
2D4DB798000
heap
page read and write
2D4DC206000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC133000
heap
page read and write
2D4DC466000
heap
page read and write
2D4DB86B000
heap
page read and write
2D4DC318000
heap
page read and write
2D4DC2E7000
heap
page read and write
2D4DC8B4000
direct allocation
page read and write
2D4DB81D000
heap
page read and write
7FFBAA1FF000
unkown
page readonly
7FF6A4AB3000
unkown
page read and write
2D4DBB0A000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB88E000
heap
page read and write
2D4DBBF1000
heap
page read and write
2D4DBC76000
heap
page read and write
2D4DBC26000
heap
page read and write
2D4DBC3B000
heap
page read and write
2D4DC4AD000
heap
page read and write
7FFBAADE2000
unkown
page read and write
2D4DC4AB000
heap
page read and write
7FF6A4A70000
unkown
page readonly
2D4DC36E000
heap
page read and write
2117BBA0000
heap
page read and write
2D4DBAD1000
heap
page read and write
7FFBB1881000
unkown
page execute read
2D4DBAD1000
heap
page read and write
2D4DC483000
heap
page read and write
2D4DB7F0000
heap
page read and write
2D4DBC1D000
heap
page read and write
2D4DB807000
heap
page read and write
2D4DC3A4000
heap
page read and write
2D4DC4A4000
heap
page read and write
2D4DC30C000
heap
page read and write
2D4DC288000
heap
page read and write
2D4DC8BC000
direct allocation
page read and write
2D4DC210000
heap
page read and write
2D4DB7EA000
heap
page read and write
2D4DC2E6000
heap
page read and write
2D4DC2E8000
heap
page read and write
2D4DC15F000
heap
page read and write
2D4DB831000
heap
page read and write
2D4DB87B000
heap
page read and write
2D4DC136000
heap
page read and write
2D4DBB1D000
heap
page read and write
2D4DBB1E000
heap
page read and write
2D4DBC1C000
heap
page read and write
2D4DBCB4000
heap
page read and write
2D4DB7D2000
heap
page read and write
7FFBC3130000
unkown
page readonly
2D4DC7DC000
direct allocation
page read and write
2D4DC8AC000
direct allocation
page read and write
7FFBB5CD5000
unkown
page readonly
2D4D9CB4000
heap
page read and write
2D4DB80C000
heap
page read and write
2D4DB7B1000
heap
page read and write
2D4DC483000
heap
page read and write
2D4DBB99000
heap
page read and write
2D4DB7BE000
heap
page read and write
2D4D9CCF000
heap
page read and write
2D4DBB58000
heap
page read and write
2D4DBC72000
heap
page read and write
2D4DBBAA000
heap
page read and write
2D4DC1E8000
heap
page read and write
7FFBAADD3000
unkown
page write copy
2D4DBB11000
heap
page read and write
7FF6A4A70000
unkown
page readonly
7FFBAAAD7000
unkown
page readonly
2117BC52000
heap
page read and write
2D4DC222000
heap
page read and write
2D4DB814000
heap
page read and write
2D4D9CC0000
heap
page read and write
2D4DC455000
heap
page read and write
2D4DB87E000
heap
page read and write
2D4DB7A3000
heap
page read and write
2D4DB86B000
heap
page read and write
2D4DB811000
heap
page read and write
2D4DB7BF000
heap
page read and write
2D4DC331000
heap
page read and write
2D4DB84B000
heap
page read and write
2117BC60000
heap
page read and write
2D4DBB1C000
heap
page read and write
7FFBAAD15000
unkown
page read and write
2D4DB7C6000
heap
page read and write
2117BC52000
heap
page read and write
2D4DBC2A000
heap
page read and write
2D4DC185000
heap
page read and write
2D4DC205000
heap
page read and write
2D4DB825000
heap
page read and write
2D4DB7DB000
heap
page read and write
7FFBBCA00000
unkown
page readonly
2D4DC104000
heap
page read and write
2D4DC131000
heap
page read and write
2D4DBBEF000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC0DE000
heap
page read and write
2D4DBB88000
heap
page read and write
7FF6A4A71000
unkown
page execute read
2117BC60000
heap
page read and write
2D4DBC94000
heap
page read and write
2117BC52000
heap
page read and write
2D4D9C66000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC323000
heap
page read and write
2D4DC14D000
heap
page read and write
2D4DBBF0000
heap
page read and write
2D4DC141000
heap
page read and write
7FF6A4AB6000
unkown
page readonly
2D4DBBD6000
heap
page read and write
2D4DBC68000
heap
page read and write
2D4DC447000
heap
page read and write
2D4DD200000
direct allocation
page read and write
2D4DBB96000
heap
page read and write
7FFBAA790000
unkown
page readonly
2117BC60000
heap
page read and write
2D4DC3C8000
heap
page read and write
2D4DC150000
heap
page read and write
2D4DB825000
heap
page read and write
2D4DB819000
heap
page read and write
2D4DB7D2000
heap
page read and write
2D4DC4A4000
heap
page read and write
2D4DBAF2000
heap
page read and write
2117BC60000
heap
page read and write
2D4DB87E000
heap
page read and write
2D4DC1F4000
heap
page read and write
2D4DC155000
heap
page read and write
7FFBBCA21000
unkown
page execute read
7FFBBB911000
unkown
page execute read
2D4DB84B000
heap
page read and write
2D4DB7A3000
heap
page read and write
2D4DB7D4000
heap
page read and write
2D4DBB52000
heap
page read and write
2D4DC4A8000
heap
page read and write
2D4DBB4B000
heap
page read and write
2D4DB880000
heap
page read and write
2D4DB871000
heap
page read and write
2D4DB7D4000
heap
page read and write
2D4DC41D000
heap
page read and write
2D4DC36E000
heap
page read and write
7FFBB62A1000
unkown
page readonly
2D4DBC36000
heap
page read and write
2D4DB7DB000
heap
page read and write
2D4DBC4F000
heap
page read and write
2D4DBBEF000
heap
page read and write
2D4DC2D5000
heap
page read and write
2D4DB7DB000
heap
page read and write
2D4DC49A000
heap
page read and write
2D4DC210000
heap
page read and write
2D4DB7C2000
heap
page read and write
2D4DC288000
heap
page read and write
2D4DB879000
heap
page read and write
2D4DBAD8000
heap
page read and write
2D4DB86C000
heap
page read and write
7FFBBC701000
unkown
page execute read
2D4DC455000
heap
page read and write
2D4DC41D000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DBB90000
heap
page read and write
2D4DC1FB000
heap
page read and write
2D4D9CCF000
heap
page read and write
7FFBAA75C000
unkown
page read and write
7FFBAA0CF000
unkown
page read and write
2D4DB820000
heap
page read and write
2D4DB876000
heap
page read and write
2D4DC342000
heap
page read and write
2D4DBB5A000
heap
page read and write
2D4DC318000
heap
page read and write
2D4DBC77000
heap
page read and write
2D4DB822000
heap
page read and write
2D4DC39C000
heap
page read and write
2D4DC4A5000
heap
page read and write
2D4DC45D000
heap
page read and write
2D4D9CC3000
heap
page read and write
2D4DC182000
heap
page read and write
2D4DBBC9000
heap
page read and write
2D4DC0D1000
heap
page read and write
2117BC52000
heap
page read and write
2117BC52000
heap
page read and write
7FFBBB550000
unkown
page readonly
7FFBAA27F000
unkown
page readonly
2D4DC31B000
heap
page read and write
2D4DC158000
heap
page read and write
7FFBB1895000
unkown
page readonly
2D4DC35F000
heap
page read and write
2D4D9CA0000
heap
page read and write
2D4DBBD8000
heap
page read and write
2D4DB804000
heap
page read and write
2D4DC3C5000
heap
page read and write
7FF6A4A71000
unkown
page execute read
2D4DBB9B000
heap
page read and write
7FFBB189B000
unkown
page read and write
2D4DB862000
heap
page read and write
7FFBAA619000
unkown
page execute read
7FF6A4A71000
unkown
page execute read
2D4DBBFE000
heap
page read and write
2D4DBFD0000
direct allocation
page read and write
7FFBAA33E000
unkown
page execute read
2D4DC3B1000
heap
page read and write
2D4DBCB7000
heap
page read and write
2D4DB7BE000
heap
page read and write
7FFBAA61B000
unkown
page readonly
2D4DC455000
heap
page read and write
2D4D9CDE000
heap
page read and write
2D4D9CD2000
heap
page read and write
7FFBB189F000
unkown
page readonly
2D4DBCD0000
direct allocation
page read and write
2D4DBC1F000
heap
page read and write
2D4DC176000
heap
page read and write
2D4DBC9B000
heap
page read and write
2D4DC331000
heap
page read and write
2D4DBBFC000
heap
page read and write
2D4DC1E8000
heap
page read and write
2117BC52000
heap
page read and write
2D4DB862000
heap
page read and write
2D4DBCBC000
heap
page read and write
2D4DC4C1000
heap
page read and write
2D4DB88C000
heap
page read and write
2D4DB7D6000
heap
page read and write
2D4DB805000
heap
page read and write
2D4DC447000
heap
page read and write
2D4DBBD4000
heap
page read and write
7FFBAA34C000
unkown
page execute read
2117BC60000
heap
page read and write
2D4DBB96000
heap
page read and write
7FFBAAD17000
unkown
page read and write
2D4DBC2B000
heap
page read and write
2D4DC0F0000
heap
page read and write
2D4DC3B1000
heap
page read and write
2D4DC139000
heap
page read and write
2D4DB7B2000
heap
page read and write
2D4DD220000
direct allocation
page read and write
2D4DC4A4000
heap
page read and write
2D4DB88B000
heap
page read and write
2D4DC376000
heap
page read and write
2D4DBC40000
heap
page read and write
2D4DB811000
heap
page read and write
2117BC5A000
heap
page read and write
2D4DBAE9000
heap
page read and write
2D4DBC4F000
heap
page read and write
2D4DBB94000
heap
page read and write
2D4DBC6F000
heap
page read and write
2D4DC134000
heap
page read and write
2D4DC447000
heap
page read and write
2D4DBC72000
heap
page read and write
2D4DBC21000
heap
page read and write
2D4DC2CA000
heap
page read and write
2D4DC104000
heap
page read and write
2D4DC84C000
direct allocation
page read and write
2D4DC8A0000
direct allocation
page read and write
2117BC52000
heap
page read and write
2D4DC180000
heap
page read and write
2D4DC470000
heap
page read and write
7FFBBC340000
unkown
page readonly
2D4DB880000
heap
page read and write
2D4DBCCD000
heap
page read and write
2D4DBC16000
heap
page read and write
2D4DBCC5000
heap
page read and write
2D4DBBF3000
heap
page read and write
2D4DBAD5000
heap
page read and write
2D4DC3B1000
heap
page read and write
2D4DC41D000
heap
page read and write
2117BC60000
heap
page read and write
2D4DC185000
heap
page read and write
2117BC5F000
heap
page read and write
2D4DC3B1000
heap
page read and write
2117BC38000
heap
page read and write
2117BC52000
heap
page read and write
2D4DC318000
heap
page read and write
7FFBAAD16000
unkown
page write copy
2D4DB86C000
heap
page read and write
2117BC52000
heap
page read and write
2117D730000
heap
page read and write
2D4DBB96000
heap
page read and write
7FFBBC341000
unkown
page execute read
7FFBBC344000
unkown
page readonly
2117BC60000
heap
page read and write
2D4DBAE8000
heap
page read and write
2D4DB87B000
heap
page read and write
2D4DC49A000
heap
page read and write
2117BC60000
heap
page read and write
2117BC60000
heap
page read and write
2D4DBB83000
heap
page read and write
2D4DC170000
heap
page read and write
2D4DC131000
heap
page read and write
2D4DC329000
heap
page read and write
2D4DC20E000
heap
page read and write
2D4DC34C000
heap
page read and write
2D4D9CA1000
heap
page read and write
2D4DC18C000
heap
page read and write
2D4DBB0D000
heap
page read and write
2D4DBADF000
heap
page read and write
2D4D9C9E000
heap
page read and write
2D4DBAE8000
heap
page read and write
2D4DBBEB000
heap
page read and write
2D4DB849000
heap
page read and write
2117BC60000
heap
page read and write
2D4D9CBC000
heap
page read and write
2117BC60000
heap
page read and write
2117BC52000
heap
page read and write
2D4DBAF4000
heap
page read and write
2D4DBB69000
heap
page read and write
2D4DC18C000
heap
page read and write
2D4DBAF9000
heap
page read and write
2D4DB819000
heap
page read and write
2117BC57000
heap
page read and write
2D4DC136000
heap
page read and write
7FFBAB0D1000
unkown
page readonly
2D4DB7C7000
heap
page read and write
2D4DD214000
direct allocation
page read and write
7FFBBBE91000
unkown
page execute read
2D4DC470000
heap
page read and write
2D4DBADA000
heap
page read and write
2D4DC45D000
heap
page read and write
2D4DBCCE000
heap
page read and write
2D4DC4D0000
direct allocation
page read and write
2D4DBC04000
heap
page read and write
There are 1169 hidden memdumps, click here to show them.