IOC Report
xSO7sbN2j6

loading gif

Files

File Path
Type
Category
Malicious
xSO7sbN2j6.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI12682\exe\registers.exe
PE32 executable (console) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Users\user\AppData\Local\Temp\0muh7zmj
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\MSVCP140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\Pythonwin\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\Pythonwin\win32ui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_elementtree.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\charset_normalizer\md.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\charset_normalizer\md__mypyc.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\exe\netconn_properties.exe
PE32 executable (console) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\exe\upx.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\psutil\_psutil_windows.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\pywin32_system32\pythoncom38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\pywin32_system32\pywintypes38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\win32\_win32sysloader.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\win32\win32net.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\win32\win32security.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\win32\win32trace.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\win32\win32wnet.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\zstandard\_cffi.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI12682\zstandard\backend_c.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tmp179_cpv3\gen_py\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp179_cpv3\gen_py\dicts.dat
data
dropped
\Device\ConDrv
JSON data
dropped
There are 74 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xSO7sbN2j6.exe
"C:\Users\user\Desktop\xSO7sbN2j6.exe"
malicious
C:\Users\user\Desktop\xSO7sbN2j6.exe
"C:\Users\user\Desktop\xSO7sbN2j6.exe"
malicious
C:\Users\user\AppData\Local\Temp\_MEI12682\exe\registers.exe
C:\Users\user\AppData\Local\Temp\_MEI12682\exe/registers.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\_MEI12682\exe\netconn_properties.exe
C:\Users\user\AppData\Local\Temp\_MEI12682\exe/netconn_properties.exe

URLs

Name
IP
Malicious
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
https://github.com/urllib3/urllib3/issues/29200
unknown
https://github.com/giampaolo/psutil/issues/875.
unknown
http://.../back.jpeg
unknown
http://www.python.org/
unknown
https://github.com/mhammond/pywin32
unknown
https://httpbin.org/post
unknown
http://193.17.183.14:3000/)
unknown
https://github.com/Ousret/charset_normalizer
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://www.python.org/download/releases/2.3/mro/.
unknown
https://yahoo.com/
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://html.spec.whatwg.org/multipage/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
http://mail.python.org/pipermail/python-dev/2012-June/120787.html
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
http://goo.gl/zeJZl
unknown
https://requests.readthedocs.io
unknown
https://upx.github.ioT
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://www.python.org/dev/peps/pep-0205/
unknown
https://www.mandiant.com/resources/blog/tracking-malware-import-hashing
unknown
http://json.org
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
http://python.org/dev/peps/pep-0263/
unknown
https://httpbin.org/get
unknown
http://193.17.183.14:3000/
unknown
https://www.python.org
unknown
https://auscitte.github.io/systems%20blog/Exception-Directory-pefile#implementation-details
unknown
https://stackoverflow.com/questions/4457745#4457745
unknown
http://ocsp.thawte.com0
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://httpbin.org/
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://twitter.com/
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://google.com/
unknown
http://www.ntcore.com/files/richsign.htm
unknown
https://google.com/mail/
unknown
http://google.com/mail/
unknown
http://wwwsearch.sf.net/):
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://timgolden.me.uk/python/wmi.html
unknown
https://www.openssl.org/H
unknown
https://docs.python.org/3/library/socket.html#socket.socket.connect_ex
unknown
https://google.com/mail
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fp2e7a.wpc.phicdn.net
192.229.211.108

Memdumps

Base Address
Regiontype
Protect
Malicious
210306F2000
heap
page read and write
21030A90000
direct allocation
page read and write
7FF8A80EC000
unkown
page execute and read and write
7FF8B61C1000
unkown
page execute and read and write
2102E68B000
heap
page read and write
7FF8B90E0000
unkown
page readonly
210301C5000
heap
page read and write
2102DE5F000
heap
page read and write
1EB0964A000
heap
page read and write
210312D0000
direct allocation
page read and write
7FF8B617A000
unkown
page execute and read and write
210300A6000
heap
page read and write
21030934000
heap
page read and write
7FF8B8F9B000
unkown
page execute and write copy
1EB0963C000
heap
page read and write
7FF8B90FA000
unkown
page execute and read and write
7FF8B8AF1000
unkown
page execute and read and write
21030A0E000
heap
page read and write
21031150000
direct allocation
page read and write
7FF8A89D1000
unkown
page execute and read and write
21030080000
heap
page read and write
2103020C000
heap
page read and write
210306F5000
heap
page read and write
1EB0963C000
heap
page read and write
2102DE50000
heap
page read and write
7FF8A88E2000
unkown
page execute and read and write
AFE000
stack
page read and write
21031110000
direct allocation
page read and write
21030101000
heap
page read and write
210300DD000
heap
page read and write
2102DDE1000
heap
page read and write
1EB09810000
heap
page read and write
2102E64D000
heap
page read and write
7FF8B984A000
unkown
page execute and write copy
2102DE59000
heap
page read and write
2102E68C000
heap
page read and write
2102DE58000
heap
page read and write
2102DE6B000
heap
page read and write
7FF8A824D000
unkown
page execute and read and write
21030111000
heap
page read and write
210306FB000
heap
page read and write
210301C9000
heap
page read and write
21030087000
heap
page read and write
2102DDDA000
heap
page read and write
1EB0963C000
heap
page read and write
21030738000
heap
page read and write
7FF8B801B000
unkown
page read and write
1EB09644000
heap
page read and write
21030490000
direct allocation
page read and write
7FF8A8900000
unkown
page readonly
1EB0964B000
heap
page read and write
2102DEF0000
direct allocation
page read and write
2103080A000
heap
page read and write
1EB0963C000
heap
page read and write
2103097D000
heap
page read and write
2103067F000
heap
page read and write
2102E695000
heap
page read and write
2103070B000
heap
page read and write
21031250000
direct allocation
page read and write
2103082A000
heap
page read and write
A27000
unkown
page write copy
21030083000
heap
page read and write
2102DE5F000
heap
page read and write
21031850000
direct allocation
page read and write
2102DDDE000
heap
page read and write
21031410000
direct allocation
page read and write
210316D0000
direct allocation
page read and write
7FF8A813B000
unkown
page execute and read and write
21030712000
heap
page read and write
2102DE4C000
heap
page read and write
21030771000
heap
page read and write
2102E61C000
heap
page read and write
21030172000
heap
page read and write
2103071F000
heap
page read and write
21030111000
heap
page read and write
7FF8A8090000
unkown
page readonly
210314D0000
direct allocation
page read and write
21030803000
heap
page read and write
210308D8000
heap
page read and write
2B8F000
stack
page read and write
210308FD000
heap
page read and write
21030702000
heap
page read and write
21030702000
heap
page read and write
7FF8B8010000
unkown
page execute and read and write
B2C000
stack
page read and write
7FF73D7EE000
unkown
page readonly
2103008A000
heap
page read and write
7FF8B8CB0000
unkown
page readonly
2102DE65000
heap
page read and write
1EB0963C000
heap
page read and write
2103010B000
heap
page read and write
2103007A000
heap
page read and write
1EB0964A000
heap
page read and write
7FF8B8112000
unkown
page readonly
CAA000
heap
page read and write
21030710000
heap
page read and write
B6E000
stack
page read and write
21030779000
heap
page read and write
70B000
stack
page read and write
1EB0963C000
heap
page read and write
1EB0963D000
heap
page read and write
21030682000
heap
page read and write
7FF8BFAD1000
unkown
page readonly
21030779000
heap
page read and write
1EB0964A000
heap
page read and write
2103010B000
heap
page read and write
2103091D000
heap
page read and write
210308FD000
heap
page read and write
21031610000
direct allocation
page read and write
21031410000
direct allocation
page read and write
21030208000
heap
page read and write
1EB0963C000
heap
page read and write
21030270000
direct allocation
page read and write
E5C47ED000
stack
page read and write
210300AC000
heap
page read and write
1EB0963A000
heap
page read and write
7FF8A8240000
unkown
page execute and read and write
7FF73D7A1000
unkown
page execute read
2103070B000
heap
page read and write
210309C9000
heap
page read and write
2102DE12000
heap
page read and write
7FF8B78A0000
unkown
page readonly
2102DE25000
heap
page read and write
2103093C000
heap
page read and write
21031210000
direct allocation
page read and write
7FF8B61D4000
unkown
page execute and read and write
21030761000
heap
page read and write
76D000
stack
page read and write
1EB0963C000
heap
page read and write
7FF8B8AF8000
unkown
page execute and write copy
260000
unkown
page readonly
2102E68D000
heap
page read and write
2103097D000
heap
page read and write
7FF8B8F9A000
unkown
page execute and read and write
21030C20000
direct allocation
page read and write
1EB0963C000
heap
page read and write
21030111000
heap
page read and write
7FF8BFAC0000
unkown
page readonly
7FF73D7A0000
unkown
page readonly
1EB0964B000
heap
page read and write
2103071F000
heap
page read and write
BA0000
heap
page read and write
210301C1000
heap
page read and write
7FF73D7A1000
unkown
page execute read
2102DDBD000
heap
page read and write
2BCE000
stack
page read and write
1EB0963F000
heap
page read and write
1EB0963C000
heap
page read and write
2102DE1B000
heap
page read and write
21030723000
heap
page read and write
E9E000
stack
page read and write
210300F3000
heap
page read and write
7FF8A81BD000
unkown
page execute and read and write
2102DFF0000
direct allocation
page read and write
210306FB000
heap
page read and write
2102DE58000
heap
page read and write
2102E6DF000
heap
page read and write
2102E6ED000
heap
page read and write
2102E6D6000
heap
page read and write
7FF73D7A0000
unkown
page readonly
2102E66D000
heap
page read and write
2103016B000
heap
page read and write
7FF8B9104000
unkown
page execute and write copy
7FF8B9849000
unkown
page execute and read and write
2102E603000
heap
page read and write
7FF8BFAD5000
unkown
page read and write
2103081F000
heap
page read and write
2102DE50000
heap
page read and write
2102DE61000
heap
page read and write
7FF73D7EE000
unkown
page readonly
2102DE4C000
heap
page read and write
2102DE4C000
heap
page read and write
2102DE70000
direct allocation
page read and write
1EB0963F000
heap
page read and write
1EB0963F000
heap
page read and write
21030797000
heap
page read and write
7FF8B27D5000
unkown
page read and write
2102FFF0000
direct allocation
page read and write
21030081000
heap
page read and write
210302B0000
direct allocation
page read and write
21030F00000
direct allocation
page read and write
2102FFB0000
direct allocation
page read and write
2102DE50000
heap
page read and write
7FF8B572D000
unkown
page execute and read and write
210307CF000
heap
page read and write
2102E603000
heap
page read and write
1EB09644000
heap
page read and write
1EB0963C000
heap
page read and write
F9F000
stack
page read and write
7FF8B8CBC000
unkown
page read and write
2103094A000
heap
page read and write
210307B3000
heap
page read and write
21030771000
heap
page read and write
210308EA000
heap
page read and write
21030163000
heap
page read and write
2102DE50000
heap
page read and write
21030DC0000
direct allocation
page read and write
7FF8B8266000
unkown
page execute and read and write
2102DDE9000
heap
page read and write
2102DDB4000
heap
page read and write
7FF8B8021000
unkown
page execute read
210307ED000
heap
page read and write
1EB0963C000
heap
page read and write
7FF8A8832000
unkown
page execute and write copy
7FF8A847A000
unkown
page execute and read and write
2102DE50000
heap
page read and write
BAA000
heap
page read and write
7FF8B6191000
unkown
page execute and read and write
210301C9000
heap
page read and write
210301BF000
heap
page read and write
1EB09600000
heap
page readonly
2102DE50000
heap
page read and write
21030735000
heap
page read and write
21030490000
direct allocation
page read and write
2102DE53000
heap
page read and write
2102DE23000
heap
page read and write
21030713000
heap
page read and write
210308B5000
heap
page read and write
210301FF000
heap
page read and write
7FF8A8CCC000
unkown
page execute and read and write
1EB0963D000
heap
page read and write
2102DE6C000
heap
page read and write
2103026E000
heap
page read and write
2102DD70000
heap
page read and write
2102E671000
heap
page read and write
210307C7000
heap
page read and write
21030CA0000
direct allocation
page read and write
21030269000
heap
page read and write
210306EE000
heap
page read and write
7FF8A819F000
unkown
page execute and write copy
1EB0963F000
heap
page read and write
1EB0963C000
heap
page read and write
1EB0963F000
heap
page read and write
7FF8B6170000
unkown
page readonly
7FF8B78A1000
unkown
page execute and read and write
210309C9000
heap
page read and write
7FF8A81B1000
unkown
page execute and read and write
2102E6CB000
heap
page read and write
21030172000
heap
page read and write
7FF8A8834000
unkown
page read and write
1EB0964A000
heap
page read and write
21031090000
direct allocation
page read and write
7FF8B61BA000
unkown
page execute and read and write
21030779000
heap
page read and write
21030687000
heap
page read and write
7FF8BFAD6000
unkown
page readonly
21030173000
heap
page read and write
2102DE66000
heap
page read and write
1EB0964A000
heap
page read and write
21030761000
heap
page read and write
210306C3000
heap
page read and write
21030683000
heap
page read and write
210306B1000
heap
page read and write
1EB0963C000
heap
page read and write
1EB0963C000
heap
page read and write
2103010B000
heap
page read and write
21030A0D000
heap
page read and write
7FF73D7EC000
unkown
page read and write
210302B0000
direct allocation
page read and write
21030E90000
direct allocation
page read and write
1EB0964A000
heap
page read and write
21030807000
heap
page read and write
21030224000
heap
page read and write
2102DD84000
heap
page read and write
2102DE4C000
heap
page read and write
21030330000
direct allocation
page read and write
A27000
unkown
page read and write
2102E652000
heap
page read and write
CAE000
heap
page read and write
2102E672000
heap
page read and write
2102DE67000
heap
page read and write
2102DE67000
heap
page read and write
2103014A000
heap
page read and write
1EB0964B000
heap
page read and write
21031050000
direct allocation
page read and write
2102DE12000
heap
page read and write
21030180000
heap
page read and write
780000
heap
page read and write
2102DE67000
heap
page read and write
7FF73D7DD000
unkown
page read and write
1EB0964A000
heap
page read and write
260000
unkown
page readonly
1EB0964A000
heap
page read and write
210300E3000
heap
page read and write
21030741000
heap
page read and write
2102DCD0000
heap
page readonly
7FF8B6176000
unkown
page execute and read and write
21030C20000
direct allocation
page read and write
2102DE50000
heap
page read and write
21031490000
direct allocation
page read and write
2102DDF8000
heap
page read and write
7E0000
heap
page read and write
21030A34000
heap
page read and write
7FF8B61B6000
unkown
page execute and read and write
2102FF10000
direct allocation
page read and write
7FF73D7DD000
unkown
page read and write
210307E1000
heap
page read and write
1EB09649000
heap
page read and write
2102DE65000
heap
page read and write
2102E620000
heap
page read and write
21030C20000
direct allocation
page read and write
21030253000
heap
page read and write
26B000
unkown
page read and write
210307D0000
heap
page read and write
210300FB000
heap
page read and write
210306CD000
heap
page read and write
1EB0964A000
heap
page read and write
1150000
heap
page read and write
21030726000
heap
page read and write
7FF8A8840000
unkown
page readonly
1EB0963C000
heap
page read and write
7FF8B78C9000
unkown
page execute and write copy
210306C7000
heap
page read and write
2102E5FC000
heap
page read and write
7FF8A8E07000
unkown
page read and write
1EB0964A000
heap
page read and write
7FF73D7A0000
unkown
page readonly
21030C20000
direct allocation
page read and write
2103017E000
heap
page read and write
21030263000
heap
page read and write
2102DE51000
heap
page read and write
2103021F000
heap
page read and write
21030370000
direct allocation
page read and write
2102E686000
heap
page read and write
210307CB000
heap
page read and write
7FF8B61BC000
unkown
page execute and write copy
210315D0000
direct allocation
page read and write
A25000
unkown
page execute and write copy
21031090000
direct allocation
page read and write
1EB0963C000
heap
page read and write
21030087000
heap
page read and write
2102DE16000
heap
page read and write
21030901000
heap
page read and write
210306C9000
heap
page read and write
7FF8A81A1000
unkown
page read and write
1EB0963F000
heap
page read and write
2103097C000
heap
page read and write
7FF8B8250000
unkown
page readonly
1EB0963C000
heap
page read and write
7FF8B7FF1000
unkown
page execute and read and write
CA0000
heap
page read and write
21030211000
heap
page read and write
1EB0964A000
heap
page read and write
210309A1000
heap
page read and write
7FF8A8C5E000
unkown
page execute and read and write
2103024F000
heap
page read and write
2102E5FF000
heap
page read and write
21030A35000
heap
page read and write
21030921000
heap
page read and write
7FF8B8CB9000
unkown
page execute and read and write
7FF8A8994000
unkown
page execute and read and write
7FF8B9F79000
unkown
page execute and read and write
2102E6ED000
heap
page read and write
7FF8B8017000
unkown
page execute and read and write
21030C60000
direct allocation
page read and write
2102E730000
direct allocation
page read and write
1EB0963C000
heap
page read and write
2102DE66000
heap
page read and write
2102DE50000
heap
page read and write
2102DDE7000
heap
page read and write
210308BC000
heap
page read and write
2102E669000
heap
page read and write
2102DE6A000
heap
page read and write
1EB0964A000
heap
page read and write
E5C4DBE000
stack
page read and write
2102E6DF000
heap
page read and write
210307B2000
heap
page read and write
2102E6D6000
heap
page read and write
7C0000
heap
page read and write
2102DE6C000
heap
page read and write
1EB0963C000
heap
page read and write
294E000
stack
page read and write
7FF8A8E05000
unkown
page execute and write copy
7FF8B93C1000
unkown
page execute and read and write
21030A2F000
heap
page read and write
7FF8A89B9000
unkown
page execute and read and write
7FF8A88EC000
unkown
page execute and read and write
7FF8B61DA000
unkown
page execute and read and write
21030D30000
direct allocation
page read and write
2103070B000
heap
page read and write
265000
unkown
page execute and read and write
7FF8B7FE8000
unkown
page execute and read and write
7FF8B9F7E000
unkown
page read and write
21030C20000
direct allocation
page read and write
7FF8A83F6000
unkown
page execute and read and write
2102DE50000
heap
page read and write
2102DBF0000
heap
page read and write
21030A14000
heap
page read and write
C2D000
stack
page read and write
7FF8B61DD000
unkown
page execute and read and write
7FF8B8261000
unkown
page execute and read and write
2102DDEC000
heap
page read and write
2102DDA2000
heap
page read and write
21030686000
heap
page read and write
21031590000
direct allocation
page read and write
2102E6D6000
heap
page read and write
210306A1000
heap
page read and write
210300A7000
heap
page read and write
210307CA000
heap
page read and write
21030955000
heap
page read and write
210307DD000
heap
page read and write
21030934000
heap
page read and write
2103010B000
heap
page read and write
21030430000
direct allocation
page read and write
2102DE4C000
heap
page read and write
21031000000
direct allocation
page read and write
2102DDEB000
heap
page read and write
1EB09642000
heap
page read and write
2102DD30000
direct allocation
page read and write
21030771000
heap
page read and write
7FF8B61C0000
unkown
page readonly
1EB0963F000
heap
page read and write
21030225000
heap
page read and write
2103020E000
heap
page read and write
7FF8A88D7000
unkown
page execute and read and write
210307EB000
heap
page read and write
7FF8A8D68000
unkown
page execute and read and write
210306FB000
heap
page read and write
21030262000
heap
page read and write
210306C4000
heap
page read and write
2102DE26000
heap
page read and write
1EB0963C000
heap
page read and write
21030913000
heap
page read and write
21030111000
heap
page read and write
210300FD000
heap
page read and write
1EB0963F000
heap
page read and write
2102DE67000
heap
page read and write
1EB0963C000
heap
page read and write
2102DE57000
heap
page read and write
2102DE12000
heap
page read and write
7FF8A89BC000
unkown
page execute and write copy
2102DE50000
heap
page read and write
1EB0963C000
heap
page read and write
21030244000
heap
page read and write
210302F0000
direct allocation
page read and write
21030241000
heap
page read and write
2102DE12000
heap
page read and write
33BBFEA000
stack
page read and write
21031350000
direct allocation
page read and write
21030676000
heap
page read and write
7FF8A8195000
unkown
page execute and read and write
2103073F000
heap
page read and write
210300A2000
heap
page read and write
2102DDED000
heap
page read and write
21030143000
heap
page read and write
2102DDF7000
heap
page read and write
21030266000
heap
page read and write
2102E6EC000
heap
page read and write
2102DE25000
heap
page read and write
7FF8B9F69000
unkown
page readonly
7FF8A88EF000
unkown
page execute and write copy
21030238000
heap
page read and write
21030771000
heap
page read and write
210307C4000
heap
page read and write
2103023D000
heap
page read and write
7FF8A84FE000
unkown
page read and write
7FF8A8DD7000
unkown
page execute and read and write
7FF8A89AD000
unkown
page execute and read and write
A24000
unkown
page execute and read and write
7FF8A8780000
unkown
page readonly
2102DDEB000
heap
page read and write
2103026A000
heap
page read and write
2102E5F1000
heap
page read and write
2A8E000
stack
page read and write
1EB0963C000
heap
page read and write
2102DE65000
heap
page read and write
7FF8A8091000
unkown
page execute and read and write
7FF8B78CB000
unkown
page read and write
7FF8A89D0000
unkown
page readonly
2103067E000
heap
page read and write
7FF73D7A1000
unkown
page execute read
21030540000
direct allocation
page read and write
7FF8B7FE9000
unkown
page execute and write copy
1EB0963C000
heap
page read and write
21031750000
direct allocation
page read and write
1EB0963C000
heap
page read and write
2103016A000
heap
page read and write
7FF8B8F71000
unkown
page execute and read and write
1EB0963C000
heap
page read and write
2103071F000
heap
page read and write
21030CE0000
direct allocation
page read and write
2102E5FB000
heap
page read and write
FAE000
stack
page read and write
2103091D000
heap
page read and write
210306B1000
heap
page read and write
2103097D000
heap
page read and write
1EB09620000
heap
page read and write
269000
unkown
page execute and write copy
2102DE1A000
heap
page read and write
21030580000
direct allocation
page read and write
2103097D000
heap
page read and write
2103082D000
heap
page read and write
2102E654000
heap
page read and write
210306F2000
heap
page read and write
2102DE4C000
heap
page read and write
7FF73D7A1000
unkown
page execute read
2103020D000
heap
page read and write
21030973000
heap
page read and write
2103021A000
heap
page read and write
7FF8B617F000
unkown
page execute and write copy
1EB0964A000
heap
page read and write
21030684000
heap
page read and write
E5C47D9000
stack
page read and write
210307EB000
heap
page read and write
2102DE67000
heap
page read and write
7FF8B8263000
unkown
page execute and read and write
7FF8B8AFA000
unkown
page read and write
2102DE5F000
heap
page read and write
2102DE50000
heap
page read and write
2102DDDA000
heap
page read and write
21030795000
heap
page read and write
2102DE06000
heap
page read and write
7FF8BA4F2000
unkown
page readonly
7FF8A8DCC000
unkown
page execute and read and write
2102DE50000
heap
page read and write
1EB0963D000
heap
page read and write
21030811000
heap
page read and write
7FF8A88F1000
unkown
page read and write
21030255000
heap
page read and write
7FF8B61E1000
unkown
page read and write
2102DE5D000
heap
page read and write
2102DE12000
heap
page read and write
7FF8A8901000
unkown
page execute and read and write
1EB0963C000
heap
page read and write
1EB0964A000
heap
page read and write
2103071B000
heap
page read and write
21030918000
heap
page read and write
210306CD000
heap
page read and write
21030926000
heap
page read and write
21031710000
direct allocation
page read and write
2102DDCF000
heap
page read and write
2102DE26000
heap
page read and write
21031910000
direct allocation
page read and write
1EB0964A000
heap
page read and write
7FF8B8AF0000
unkown
page readonly
210308FF000
heap
page read and write
2102E060000
heap
page read and write
27CE000
stack
page read and write
2103010B000
heap
page read and write
7FF8B800D000
unkown
page execute and read and write
21030702000
heap
page read and write
A18000
unkown
page execute and write copy
A00000
unkown
page readonly
7FF8B617E000
unkown
page execute and read and write
1EB09634000
heap
page read and write
2102E6D2000
heap
page read and write
33BC1DF000
stack
page read and write
7FF8B9106000
unkown
page read and write
7FF8B61BE000
unkown
page read and write
2103026A000
heap
page read and write
7D0000
heap
page read and write
210305D0000
direct allocation
page read and write
2103023E000
heap
page read and write
7FF8A8831000
unkown
page execute and read and write
2102DDB3000
heap
page read and write
2102E61C000
heap
page read and write
1EB0964A000
heap
page read and write
2103097D000
heap
page read and write
2102DDE1000
heap
page read and write
7FF8BA4F0000
unkown
page readonly
7FF8B9102000
unkown
page execute and read and write
2102DDF1000
heap
page read and write
7FF8B9F61000
unkown
page execute read
7FF73D7CA000
unkown
page readonly
21030698000
heap
page read and write
E5C519E000
stack
page read and write
2102DE50000
heap
page read and write
21030650000
heap
page read and write
7FF8B5737000
unkown
page execute and read and write
2102DE50000
heap
page read and write
7FF8B8F8D000
unkown
page execute and read and write
1EB0963F000
heap
page read and write
7FF8A8E00000
unkown
page execute and read and write
21030734000
heap
page read and write
2103020E000
heap
page read and write
21030E10000
direct allocation
page read and write
21030238000
heap
page read and write
2102E62E000
heap
page read and write
21030C20000
direct allocation
page read and write
1EB0963C000
heap
page read and write
2102E608000
heap
page read and write
21030870000
heap
page read and write
21030197000
heap
page read and write
1EB09649000
heap
page read and write
7FF8B8F70000
unkown
page readonly
210307B1000
heap
page read and write
2103068B000
heap
page read and write
21030E90000
direct allocation
page read and write
7FF8A8822000
unkown
page execute and read and write
2102DDD6000
heap
page read and write
2102DE06000
heap
page read and write
1EB0963C000
heap
page read and write
21030795000
heap
page read and write
21030C20000
direct allocation
page read and write
7FF8A8841000
unkown
page execute and read and write
2102DE5C000
heap
page read and write
1EB0962F000
heap
page read and write
E6E000
stack
page read and write
E5C4FAE000
stack
page read and write
1EB0963C000
heap
page read and write
1EB0964A000
heap
page read and write
1EB0963F000
heap
page read and write
2102DE63000
heap
page read and write
2102DDA3000
heap
page read and write
21030738000
heap
page read and write
1EB0963C000
heap
page read and write
1EB0963C000
heap
page read and write
21030C20000
direct allocation
page read and write
2102E64D000
heap
page read and write
7FF8A8781000
unkown
page execute and read and write
21031550000
direct allocation
page read and write
210307E0000
heap
page read and write
7FF8A84FC000
unkown
page execute and write copy
210308EF000
heap
page read and write
1EB097F0000
heap
page read and write
21030795000
heap
page read and write
210308F3000
heap
page read and write
33BBFDF000
stack
page read and write
21030DC0000
direct allocation
page read and write
2103016C000
heap
page read and write
2103079A000
heap
page read and write
2102DE24000
heap
page read and write
7FF73D7EC000
unkown
page read and write
7FF8B93D8000
unkown
page execute and read and write
7FF8B8269000
unkown
page read and write
1EB0963C000
heap
page read and write
210311D0000
direct allocation
page read and write
7FF8B90E1000
unkown
page execute and read and write
1EB0964A000
heap
page read and write
7FF8A8137000
unkown
page execute and read and write
2103086D000
heap
page read and write
1EB09634000
heap
page read and write
210307E6000
heap
page read and write
2102DE67000
heap
page read and write
210307D1000
heap
page read and write
2CCF000
stack
page read and write
7FF8B9F7C000
unkown
page execute and write copy
1EB0963C000
heap
page read and write
1EB0964A000
heap
page read and write
1EB0964A000
heap
page read and write
21030D80000
direct allocation
page read and write
210310D0000
direct allocation
page read and write
268000
unkown
page execute and read and write
2102DDDE000
heap
page read and write
2102E6EE000
heap
page read and write
7FF8B6190000
unkown
page readonly
2102FF50000
direct allocation
page read and write
2102DF70000
direct allocation
page read and write
21031510000
direct allocation
page read and write
2102DE17000
heap
page read and write
2103025E000
heap
page read and write
7FF73D7A0000
unkown
page readonly
210307D8000
heap
page read and write
21030674000
heap
page read and write
2102DE19000
heap
page read and write
A1F000
unkown
page execute and read and write
BAE000
heap
page read and write
2102DE12000
heap
page read and write
21031450000
direct allocation
page read and write
2103097D000
heap
page read and write
2102DE23000
heap
page read and write
7FF8A8D6B000
unkown
page execute and read and write
21030813000
heap
page read and write
2102DE23000
heap
page read and write
CBA000
heap
page read and write
21031990000
direct allocation
page read and write
2102DDE7000
heap
page read and write
21031710000
direct allocation
page read and write
7FF8A84F8000
unkown
page execute and read and write
2103073E000
heap
page read and write
2103024F000
heap
page read and write
210307FD000
heap
page read and write
1EB0964A000
heap
page read and write
7FF8B27D3000
unkown
page execute and write copy
21031290000
direct allocation
page read and write
7FF8A84CF000
unkown
page execute and read and write
1EB095F0000
heap
page read and write
1EB0963C000
heap
page read and write
210306C4000
heap
page read and write
21031310000
direct allocation
page read and write
2103092F000
heap
page read and write
2102DE57000
heap
page read and write
1EB0963C000
heap
page read and write
21030872000
heap
page read and write
2103025E000
heap
page read and write
7FF8B573C000
unkown
page read and write
210307AF000
heap
page read and write
2103082C000
heap
page read and write
7FF8A8CA0000
unkown
page execute and read and write
210309DC000
heap
page read and write
2102DE4D000
heap
page read and write
7FF73D7DD000
unkown
page write copy
21030254000
heap
page read and write
2102DCE0000
heap
page read and write
2103079E000
heap
page read and write
21030267000
heap
page read and write
7FF8B8CB1000
unkown
page execute and read and write
21030710000
heap
page read and write
2102DE26000
heap
page read and write
21030796000
heap
page read and write
7FF8B27B0000
unkown
page readonly
1EB0964B000
heap
page read and write
21031890000
direct allocation
page read and write
210306F0000
heap
page read and write
21030082000
heap
page read and write
21030FC0000
direct allocation
page read and write
2102DE17000
heap
page read and write
21030921000
heap
page read and write
210318D0000
direct allocation
page read and write
210306F0000
heap
page read and write
2103010B000
heap
page read and write
2780000
heap
page read and write
21031090000
direct allocation
page read and write
21030817000
heap
page read and write
A00000
unkown
page readonly
290F000
stack
page read and write
2102DE4C000
heap
page read and write
2102DDD6000
heap
page read and write
7FF8A8CC4000
unkown
page execute and read and write
770000
heap
page read and write
21031790000
direct allocation
page read and write
21030697000
heap
page read and write
210302B0000
direct allocation
page read and write
210309C9000
heap
page read and write
2102DE2C000
heap
page read and write
2102DE4C000
heap
page read and write
7FF8B6180000
unkown
page read and write
21030795000
heap
page read and write
2102DD00000
heap
page read and write
210306F5000
heap
page read and write
2103080E000
heap
page read and write
21030761000
heap
page read and write
7FF8A819E000
unkown
page execute and read and write
2102DDF1000
heap
page read and write
2103071B000
heap
page read and write
21030084000
heap
page read and write
2102DDCD000
heap
page read and write
21030C20000
direct allocation
page read and write
7FF8A81B0000
unkown
page readonly
33BBFE3000
stack
page read and write
7FF8B7FD1000
unkown
page execute and read and write
21030030000
direct allocation
page read and write
7FF8B810F000
unkown
page read and write
2102DE61000
heap
page read and write
21030697000
heap
page read and write
2A4F000
stack
page read and write
1EB0963F000
heap
page read and write
1EB0963C000
heap
page read and write
2102DE65000
heap
page read and write
2102DE59000
heap
page read and write
A01000
unkown
page execute and read and write
7FF8B984C000
unkown
page read and write
7FF8B9F7B000
unkown
page execute and read and write
7FF73D7CA000
unkown
page readonly
210301C9000
heap
page read and write
7FF73D7E0000
unkown
page read and write
7FF8A8423000
unkown
page execute and read and write
7FF8B9F68000
unkown
page read and write
210300AE000
heap
page read and write
1EB0963F000
heap
page read and write
2102DE4D000
heap
page read and write
21030955000
heap
page read and write
21030196000
heap
page read and write
2103021F000
heap
page read and write
1EB0964A000
heap
page read and write
21030F80000
direct allocation
page read and write
2102DDF8000
heap
page read and write
2102DE4C000
heap
page read and write
2102E6DF000
heap
page read and write
21030164000
heap
page read and write
21030500000
direct allocation
page read and write
1EB0964A000
heap
page read and write
21030F40000
direct allocation
page read and write
21031190000
direct allocation
page read and write
1EB0963C000
heap
page read and write
7FF8B7FF0000
unkown
page readonly
210306FB000
heap
page read and write
21030710000
heap
page read and write
2103097D000
heap
page read and write
1EB0964A000
heap
page read and write
261000
unkown
page execute and read and write
33BBFED000
stack
page read and write
C6E000
stack
page read and write
2103068A000
heap
page read and write
2102FFF0000
direct allocation
page read and write
2102DE58000
heap
page read and write
21031310000
direct allocation
page read and write
1EB0963F000
heap
page read and write
2102DDE7000
heap
page read and write
2102DE6B000
heap
page read and write
21030248000
heap
page read and write
1EB0963C000
heap
page read and write
7FF8B5710000
unkown
page readonly
1EB098C0000
heap
page read and write
21030955000
heap
page read and write
2103094C000
heap
page read and write
7FF8B9841000
unkown
page execute and read and write
210301C2000
heap
page read and write
1EB0964A000
heap
page read and write
2102E6DF000
heap
page read and write
2102DE50000
heap
page read and write
2102E6DA000
heap
page read and write
21031650000
direct allocation
page read and write
7FF8B9840000
unkown
page readonly
21030725000
heap
page read and write
21030111000
heap
page read and write
2102DDF8000
heap
page read and write
7FF8B9F71000
unkown
page execute and read and write
2800000
heap
page read and write
2103007C000
heap
page read and write
1EB0964A000
heap
page read and write
7FF8B573A000
unkown
page execute and write copy
21031090000
direct allocation
page read and write
2102DE4C000
heap
page read and write
21030198000
heap
page read and write
7FF8A88B4000
unkown
page execute and read and write
2102DE1B000
heap
page read and write
21030251000
heap
page read and write
2103080F000
heap
page read and write
21031810000
direct allocation
page read and write
210307D8000
heap
page read and write
2102FFF0000
direct allocation
page read and write
21030675000
heap
page read and write
21030194000
heap
page read and write
21031690000
direct allocation
page read and write
21030610000
direct allocation
page read and write
7FF8B5711000
unkown
page execute and read and write
21031090000
direct allocation
page read and write
2102DE12000
heap
page read and write
7FF8A88B2000
unkown
page execute and read and write
7FF8B93DB000
unkown
page read and write
7FF8A819B000
unkown
page execute and read and write
1EB0963F000
heap
page read and write
21030A50000
direct allocation
page read and write
21030C20000
direct allocation
page read and write
210307CD000
heap
page read and write
21030111000
heap
page read and write
210307FF000
heap
page read and write
2102DE12000
heap
page read and write
21030198000
heap
page read and write
2102DE16000
heap
page read and write
210300F2000
heap
page read and write
2102DE63000
heap
page read and write
21030803000
heap
page read and write
2102E5F0000
heap
page read and write
1EB09628000
heap
page read and write
21030710000
heap
page read and write
2102E6DF000
heap
page read and write
1EB0963C000
heap
page read and write
21030070000
heap
page read and write
21030A35000
heap
page read and write
7FF8B9F65000
unkown
page readonly
7FF8B80D5000
unkown
page readonly
21030209000
heap
page read and write
2102DF30000
direct allocation
page read and write
21030085000
heap
page read and write
21030174000
heap
page read and write
21030248000
heap
page read and write
2102DE5F000
heap
page read and write
2103082A000
heap
page read and write
1EB0964A000
heap
page read and write
21030239000
heap
page read and write
210307EA000
heap
page read and write
21030182000
heap
page read and write
7FF8B6171000
unkown
page execute and read and write
2102E60A000
heap
page read and write
2103068A000
heap
page read and write
7FF8A8229000
unkown
page execute and read and write
2102DE63000
heap
page read and write
210306F5000
heap
page read and write
21030817000
heap
page read and write
7FF8B8267000
unkown
page execute and write copy
2102E67F000
heap
page read and write
21030762000
heap
page read and write
7FF8A84C7000
unkown
page execute and read and write
1EB0963C000
heap
page read and write
2103072B000
heap
page read and write
1EB0963F000
heap
page read and write
2103010B000
heap
page read and write
210301A1000
heap
page read and write
2103011A000
heap
page read and write
210317D0000
direct allocation
page read and write
2102DE0A000
heap
page read and write
268000
unkown
page execute and write copy
1EB0963F000
heap
page read and write
2103067E000
heap
page read and write
21030651000
heap
page read and write
7FF8B27CA000
unkown
page execute and read and write
33BC3CF000
stack
page read and write
21030761000
heap
page read and write
1EB0964A000
heap
page read and write
21030085000
heap
page read and write
2102DE4C000
heap
page read and write
21030230000
heap
page read and write
1EB0964A000
heap
page read and write
2102DE12000
heap
page read and write
7FF8B9F60000
unkown
page readonly
1EB0963C000
heap
page read and write
2102E6D7000
heap
page read and write
1EB0964A000
heap
page read and write
1EB0963F000
heap
page read and write
1EB0963C000
heap
page read and write
7FF8B78BF000
unkown
page execute and read and write
1EB0964A000
heap
page read and write
2102DE08000
heap
page read and write
210303F0000
heap
page read and write
7FF8B8AF4000
unkown
page execute and read and write
210301C9000
heap
page read and write
1EB0964A000
heap
page read and write
7FF8A83F8000
unkown
page execute and read and write
7FF8BFAC1000
unkown
page execute read
2102DDEF000
heap
page read and write
21030089000
heap
page read and write
21031950000
direct allocation
page read and write
21030210000
heap
page read and write
21030AD3000
heap
page read and write
21030C20000
direct allocation
page read and write
2102DE53000
heap
page read and write
7FF8B8020000
unkown
page readonly
2102E5FB000
heap
page read and write
2102DDE7000
heap
page read and write
7FF73D7EE000
unkown
page readonly
E5C49DE000
stack
page read and write
E5C4BCE000
stack
page read and write
1EB0963D000
heap
page read and write
1EB0964A000
heap
page read and write
2102DFB0000
direct allocation
page read and write
2103073D000
heap
page read and write
1EB0963C000
heap
page read and write
21030779000
heap
page read and write
21030245000
heap
page read and write
7FF8B93D4000
unkown
page execute and read and write
7FF8B27B1000
unkown
page execute and read and write
210306F2000
heap
page read and write
210301C9000
heap
page read and write
1EB09649000
heap
page read and write
2102DE50000
heap
page read and write
210301A9000
heap
page read and write
2102E6D6000
heap
page read and write
210300FB000
heap
page read and write
2102E5FC000
heap
page read and write
1EB09634000
heap
page read and write
1EB0963C000
heap
page read and write
1EB0963F000
heap
page read and write
BE0000
heap
page read and write
7FF73D7DD000
unkown
page write copy
21030112000
heap
page read and write
7FF8B8F9D000
unkown
page read and write
1EB09649000
heap
page read and write
21030698000
heap
page read and write
210300AF000
heap
page read and write
2102DE57000
heap
page read and write
7FF8A8215000
unkown
page execute and read and write
21030808000
heap
page read and write
7FF8B78C6000
unkown
page execute and read and write
210309C9000
heap
page read and write
21030C20000
direct allocation
page read and write
21030100000
heap
page read and write
2103082A000
heap
page read and write
2102DE63000
heap
page read and write
21030779000
heap
page read and write
1EB0963D000
heap
page read and write
21030098000
heap
page read and write
21030795000
heap
page read and write
21030268000
heap
page read and write
210307E8000
heap
page read and write
210300C1000
heap
page read and write
21030229000
heap
page read and write
7FF8B93C0000
unkown
page readonly
2102E6F0000
direct allocation
page read and write
210313D0000
direct allocation
page read and write
21030C20000
direct allocation
page read and write
2102DE26000
heap
page read and write
1EB0964A000
heap
page read and write
2102DEB0000
direct allocation
page read and write
21030111000
heap
page read and write
2102DE58000
heap
page read and write
21030256000
heap
page read and write
7FF8A8DAF000
unkown
page execute and read and write
210308FD000
heap
page read and write
210306F5000
heap
page read and write
7FF8B8019000
unkown
page execute and write copy
1EB0963C000
heap
page read and write
7FF8B8251000
unkown
page execute and read and write
2103070B000
heap
page read and write
21030771000
heap
page read and write
2103082F000
heap
page read and write
2103024E000
heap
page read and write
21030193000
heap
page read and write
2103007F000
heap
page read and write
21030E50000
direct allocation
page read and write
21030C20000
direct allocation
page read and write
7FF8B27D2000
unkown
page execute and read and write
210306F2000
heap
page read and write
2103024B000
heap
page read and write
1EB0963C000
heap
page read and write
EAE000
stack
page read and write
2102E5F1000
heap
page read and write
2102DDD6000
heap
page read and write
21030822000
heap
page read and write
21030702000
heap
page read and write
21030A30000
heap
page read and write
21030819000
heap
page read and write
7FF8B7FE1000
unkown
page execute and read and write
7FF8B7FEB000
unkown
page read and write
21030250000
heap
page read and write
210309EA000
heap
page read and write
1EB0964B000
heap
page read and write
2102DDBD000
heap
page read and write
1EB0963C000
heap
page read and write
1EB0964A000
heap
page read and write
2102DE16000
heap
page read and write
2102DDEB000
heap
page read and write
7FF8A8140000
unkown
page execute and read and write
2102DDE9000
heap
page read and write
2102E065000
heap
page read and write
1EB09641000
heap
page read and write
2102DE06000
heap
page read and write
21030171000
heap
page read and write
26B000
unkown
page write copy
2102DE5B000
heap
page read and write
7FF8A8454000
unkown
page execute and read and write
210307D1000
heap
page read and write
2103071B000
heap
page read and write
210300AD000
heap
page read and write
7FF8B93D9000
unkown
page execute and write copy
210300A8000
heap
page read and write
21030684000
heap
page read and write
210307EA000
heap
page read and write
210315D0000
direct allocation
page read and write
210308E9000
heap
page read and write
1EB0964A000
heap
page read and write
2102E607000
heap
page read and write
21031390000
direct allocation
page read and write
1EB0963A000
heap
page read and write
1EB0964A000
heap
page read and write
2102DE12000
heap
page read and write
7FF8A84EB000
unkown
page execute and read and write
7FF8B61DF000
unkown
page execute and write copy
1EB0963C000
heap
page read and write
1EB0964A000
heap
page read and write
2102DE50000
heap
page read and write
2103079F000
heap
page read and write
210307CE000
heap
page read and write
1EB0963C000
heap
page read and write
7FF73D7EE000
unkown
page readonly
7FF8A823A000
unkown
page execute and read and write
2102DDC2000
heap
page read and write
21030086000
heap
page read and write
2102E5FF000
heap
page read and write
1EB0964A000
heap
page read and write
7FF8B9F70000
unkown
page readonly
210309DB000
heap
page read and write
7FF8B61B3000
unkown
page execute and read and write
7FF8A8998000
unkown
page execute and read and write
2102DDDA000
heap
page read and write
2102DDEC000
heap
page read and write
7FF8B8CBA000
unkown
page execute and write copy
7FF73D7CA000
unkown
page readonly
7FF8B7FD0000
unkown
page readonly
1EB0963C000
heap
page read and write
7FF73D7CA000
unkown
page readonly
1EB0963F000
heap
page read and write
21030694000
heap
page read and write
7FF8A89BD000
unkown
page read and write
7FF8B8AF7000
unkown
page execute and read and write
210307E1000
heap
page read and write
7FF8B8F95000
unkown
page execute and read and write
7FF8A8C4C000
unkown
page execute and read and write
1EB0963C000
heap
page read and write
2102E61A000
heap
page read and write
There are 1061 hidden memdumps, click here to show them.