IOC Report
CDM212364_Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
CDM212364_Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\FE5EB6.tmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\Static\amd64\ftd2xx.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\Static\i386\ftd2xx.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftbusui.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftcserco.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftlang.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftser2k.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftserui2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftd2xx.h
C source, ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftdibus.cat
data
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftdibus.inf
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftdiport.cat
data
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftdiport.inf
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftbusui.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftcserco.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftd2xx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftd2xx.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftdibus.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftlang.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftser2k.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftserui2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\FTDI-Driver\licence.txt
ASCII text, with very long lines (583), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\SETAA8E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\SETAAAE.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA3D.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA4E.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA6E.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftcserco.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftser2k.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftserui2.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.inf (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\SET95D7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\SET95E8.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\FTLang.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET948B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET94DA.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET94FA.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET951B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftbusui.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftd2xx64.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftdibus.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.inf (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\i386\SET9721.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\i386\ftd2xx.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\DPINST.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\INF\oem4.inf
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\INF\oem5.inf
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\SETACF8.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\SETAD18.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACA7.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACC7.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACE7.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftcserco.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftser2k.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftserui2.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\ftdiport.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\ftdiport.inf (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\SETA095.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\SETA0A6.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\FTLang.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA024.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA044.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA064.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA075.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftbusui.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftd2xx64.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftdibus.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\ftdibus.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\ftdibus.inf (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\SETA0B6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\ftd2xx.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
modified
There are 73 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CDM212364_Setup.exe
"C:\Users\user\Desktop\CDM212364_Setup.exe"
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /sa
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.inf" "9" "4aa35cc23" "0000000000000150" "WinSta0\Default" "0000000000000160" "208" "c:\users\user\appdata\local\temp\ftdi-driver"
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.inf" "9" "47472827f" "0000000000000160" "WinSta0\Default" "000000000000015C" "208" "c:\users\user\appdata\local\temp\ftdi-driver"

URLs

Name
IP
Malicious
http://www.disoriented.com(
unknown
http://www.disoriented.com/
unknown
http://www.disoriented.com/openConfirm
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log

Memdumps

Base Address
Regiontype
Protect
Malicious
1C15B912000
heap
page read and write
ED4000
heap
page read and write
E86000
heap
page read and write
1C15B9B8000
heap
page read and write
3081000
trusted library allocation
page read and write
1C15B929000
heap
page read and write
F09000
heap
page read and write
EF6000
heap
page read and write
E89000
heap
page read and write
3710000
direct allocation
page read and write
EE3000
heap
page read and write
ED1000
heap
page read and write
38AC000
heap
page read and write
26305002000
heap
page read and write
F0A000
heap
page read and write
38AC000
heap
page read and write
1C15B91E000
heap
page read and write
EF6000
heap
page read and write
26304FDF000
heap
page read and write
38C3000
heap
page read and write
EF1000
heap
page read and write
38A7000
heap
page read and write
33D0000
direct allocation
page read and write
38A4000
heap
page read and write
EF2000
heap
page read and write
F18000
heap
page read and write
38BA000
heap
page read and write
EE3000
heap
page read and write
26304FEE000
heap
page read and write
2630508A000
heap
page read and write
1C15B9DD000
heap
page read and write
38AC000
heap
page read and write
2630501E000
heap
page read and write
F15000
heap
page read and write
1C15B958000
heap
page read and write
38D2000
heap
page read and write
1C15B92B000
heap
page read and write
400000
unkown
page readonly
26305205000
heap
page read and write
1C15B971000
heap
page read and write
1C15B918000
heap
page read and write
A82007F000
stack
page read and write
3630000
direct allocation
page read and write
2630501F000
heap
page read and write
35C0000
direct allocation
page read and write
1C15B934000
heap
page read and write
38DA000
heap
page read and write
26305017000
heap
page read and write
F12000
heap
page read and write
2630505A000
heap
page read and write
A8200FF000
stack
page read and write
EDC000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15B9E4000
heap
page read and write
2630502C000
heap
page read and write
EE5000
heap
page read and write
2630501C000
heap
page read and write
3620000
direct allocation
page read and write
1C15B94F000
heap
page read and write
1C15B971000
heap
page read and write
26304FA0000
heap
page read and write
1C15B9D2000
heap
page read and write
1C15B91B000
heap
page read and write
1C15B929000
heap
page read and write
E90000
heap
page read and write
1C15B929000
heap
page read and write
33F0000
direct allocation
page read and write
1C15B948000
heap
page read and write
26305017000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15B8F0000
heap
page read and write
E4E000
heap
page read and write
1C15B9A2000
heap
page read and write
F09000
heap
page read and write
EF7000
heap
page read and write
2630500C000
heap
page read and write
25D0000
trusted library allocation
page read and write
EC8000
heap
page read and write
2630500E000
heap
page read and write
32BE000
stack
page read and write
1C15B98F000
heap
page read and write
412000
unkown
page readonly
1C15B9D0000
heap
page read and write
38B1000
heap
page read and write
1C15B972000
heap
page read and write
1C15B930000
heap
page read and write
1C15B942000
heap
page read and write
F1C000
heap
page read and write
2630502C000
heap
page read and write
F12000
heap
page read and write
B60000
heap
page read and write
38D2000
heap
page read and write
59C000
stack
page read and write
38A8000
heap
page read and write
2060000
heap
page read and write
ED1000
heap
page read and write
1C15B920000
heap
page read and write
38C9000
heap
page read and write
3A1F000
stack
page read and write
2920000
heap
page read and write
38AC000
heap
page read and write
1C15B9E1000
heap
page read and write
4E4F000
stack
page read and write
26305092000
heap
page read and write
38AC000
heap
page read and write
EF2000
heap
page read and write
26305091000
heap
page read and write
F12000
heap
page read and write
26305023000
heap
page read and write
E5A000
heap
page read and write
38DA000
heap
page read and write
26304FE4000
heap
page read and write
1C15B971000
heap
page read and write
9C0000
unkown
page readonly
35D0000
direct allocation
page read and write
25D0000
trusted library allocation
page read and write
26305058000
heap
page read and write
EFB000
heap
page read and write
EFD000
heap
page read and write
38BD000
heap
page read and write
29B0000
heap
page read and write
F0A000
heap
page read and write
B88000
heap
page read and write
EE3000
heap
page read and write
4B60000
direct allocation
page read and write
3080000
trusted library allocation
page read and write
1C15B958000
heap
page read and write
F15000
heap
page read and write
26305005000
heap
page read and write
38DB000
heap
page read and write
F12000
heap
page read and write
3470000
heap
page read and write
38A1000
heap
page read and write
1C15BAC0000
heap
page read and write
25D0000
trusted library allocation
page read and write
26305017000
heap
page read and write
38A5000
heap
page read and write
3710000
direct allocation
page read and write
1C15B9E1000
heap
page read and write
25D0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
26305065000
heap
page read and write
26305092000
heap
page read and write
1C15B962000
heap
page read and write
1C15B9BC000
heap
page read and write
2630501F000
heap
page read and write
1C15B9C1000
heap
page read and write
26305005000
heap
page read and write
1C15B944000
heap
page read and write
26305017000
heap
page read and write
E9A000
heap
page read and write
EE5000
heap
page read and write
E82000
heap
page read and write
56E000
stack
page read and write
EF1000
heap
page read and write
38AC000
heap
page read and write
38C1000
heap
page read and write
38AC000
heap
page read and write
2630508A000
heap
page read and write
1C15B958000
heap
page read and write
EF5000
heap
page read and write
26304FD9000
heap
page read and write
33A0000
direct allocation
page read and write
2630501F000
heap
page read and write
ED7000
heap
page read and write
3670000
direct allocation
page read and write
1C15B9DD000
heap
page read and write
38BE000
heap
page read and write
38AC000
heap
page read and write
2630501F000
heap
page read and write
ED4000
heap
page read and write
2630501E000
heap
page read and write
2520000
heap
page read and write
35E0000
direct allocation
page read and write
38A4000
heap
page read and write
1C15B958000
heap
page read and write
1C15B950000
heap
page read and write
2630500A000
heap
page read and write
38C3000
heap
page read and write
38AC000
heap
page read and write
26305038000
heap
page read and write
1C15B913000
heap
page read and write
26305038000
heap
page read and write
26304FFD000
heap
page read and write
BBF000
heap
page read and write
1C15B9D1000
heap
page read and write
36B0000
direct allocation
page read and write
1C15B9E1000
heap
page read and write
38BA000
heap
page read and write
1C15B9DD000
heap
page read and write
2630502B000
heap
page read and write
3075000
trusted library allocation
page read and write
2530000
heap
page read and write
38DB000
heap
page read and write
38C2000
heap
page read and write
26305018000
heap
page read and write
9CF000
unkown
page readonly
38AC000
heap
page read and write
1C15B933000
heap
page read and write
1C15BAE0000
heap
page read and write
1C15B9CB000
heap
page read and write
EDA000
heap
page read and write
29AF000
stack
page read and write
307C000
trusted library allocation
page read and write
1C15B9DA000
heap
page read and write
38A1000
heap
page read and write
35F0000
direct allocation
page read and write
1C15B92C000
heap
page read and write
2630500C000
heap
page read and write
EF6000
heap
page read and write
EE3000
heap
page read and write
EDA000
heap
page read and write
3630000
direct allocation
page read and write
1C15B9E1000
heap
page read and write
1C15B9C0000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15B971000
heap
page read and write
1C15B92B000
heap
page read and write
1C15B971000
heap
page read and write
4BA0000
direct allocation
page read and write
EE5000
heap
page read and write
F0D000
heap
page read and write
EF2000
heap
page read and write
1C15B9A0000
heap
page read and write
26304FC0000
heap
page read and write
1C15B9C1000
heap
page read and write
38DB000
heap
page read and write
1C15B972000
heap
page read and write
38B9000
heap
page read and write
38AF000
heap
page read and write
F0A000
heap
page read and write
26305017000
heap
page read and write
38C1000
heap
page read and write
3750000
direct allocation
page read and write
26305023000
heap
page read and write
1C15B962000
heap
page read and write
38A2000
heap
page read and write
26305023000
heap
page read and write
35D0000
direct allocation
page read and write
EFD000
heap
page read and write
1C15B904000
heap
page read and write
2630508E000
heap
page read and write
1C15B9A2000
heap
page read and write
26305023000
heap
page read and write
1C15B9E1000
heap
page read and write
33B0000
direct allocation
page read and write
1C15BB51000
heap
page read and write
3400000
direct allocation
page read and write
38BA000
heap
page read and write
38DA000
heap
page read and write
38DA000
heap
page read and write
38C7000
heap
page read and write
F12000
heap
page read and write
1C15B971000
heap
page read and write
6D8C27F000
stack
page read and write
EF2000
heap
page read and write
33F0000
direct allocation
page read and write
EE4000
heap
page read and write
1C15B9B1000
heap
page read and write
ECC000
heap
page read and write
3071000
trusted library allocation
page read and write
2630505A000
heap
page read and write
26304FD9000
heap
page read and write
BB6000
heap
page read and write
ECE000
heap
page read and write
F19000
heap
page read and write
F19000
heap
page read and write
2630500C000
heap
page read and write
2630502C000
heap
page read and write
38A7000
heap
page read and write
26305092000
heap
page read and write
26305038000
heap
page read and write
26305017000
heap
page read and write
2630500C000
heap
page read and write
F0C000
heap
page read and write
26304FEB000
heap
page read and write
26305028000
heap
page read and write
F1C000
heap
page read and write
2630503A000
heap
page read and write
38A1000
heap
page read and write
1C15B93A000
heap
page read and write
38A7000
heap
page read and write
EF6000
heap
page read and write
38DA000
heap
page read and write
1C15B9E1000
heap
page read and write
1C15B92E000
heap
page read and write
2630501F000
heap
page read and write
E85000
heap
page read and write
401000
unkown
page execute read
4B20000
direct allocation
page read and write
EDD000
heap
page read and write
1C15B946000
heap
page read and write
2630508E000
heap
page read and write
1C15B94F000
heap
page read and write
1C15B92F000
heap
page read and write
2630500C000
heap
page read and write
38D5000
heap
page read and write
38D5000
heap
page read and write
EF7000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15B948000
heap
page read and write
263050A9000
heap
page read and write
1C15B9C2000
heap
page read and write
26305017000
heap
page read and write
4B80000
direct allocation
page read and write
BA0000
heap
page read and write
EE5000
heap
page read and write
ED3000
heap
page read and write
1C15B972000
heap
page read and write
1C15BB50000
heap
page read and write
1C15B9A2000
heap
page read and write
1F0000
heap
page read and write
38A3000
heap
page read and write
1C15B936000
heap
page read and write
26305038000
heap
page read and write
EDA000
heap
page read and write
38B9000
heap
page read and write
1C15B9D1000
heap
page read and write
E20000
heap
page read and write
EF2000
heap
page read and write
3630000
direct allocation
page read and write
1C15B9D4000
heap
page read and write
38B9000
heap
page read and write
F03000
heap
page read and write
EF6000
heap
page read and write
B80000
heap
page read and write
3520000
direct allocation
page read and write
890000
heap
page read and write
BBC000
heap
page read and write
2630508A000
heap
page read and write
1C15B9E1000
heap
page read and write
1C15B956000
heap
page read and write
1C15B90A000
heap
page read and write
25D0000
trusted library allocation
page read and write
EFB000
heap
page read and write
ED3000
heap
page read and write
1C15B919000
heap
page read and write
3078000
trusted library allocation
page read and write
1C15B953000
heap
page read and write
2630507C000
heap
page read and write
7FF6D8958000
unkown
page readonly
26304FEC000
heap
page read and write
F0A000
heap
page read and write
4B80000
direct allocation
page read and write
2630501F000
heap
page read and write
38A1000
heap
page read and write
1C15B999000
heap
page read and write
1C15B972000
heap
page read and write
26305082000
heap
page read and write
26305038000
heap
page read and write
1C15B920000
heap
page read and write
EC8000
heap
page read and write
F19000
heap
page read and write
26305032000
heap
page read and write
EF4000
heap
page read and write
EF2000
heap
page read and write
EF2000
heap
page read and write
38B1000
heap
page read and write
1C15B9A2000
heap
page read and write
1C15B9E0000
heap
page read and write
1C15B9CB000
heap
page read and write
EDA000
heap
page read and write
1C15B918000
heap
page read and write
2630500C000
heap
page read and write
EDF000
heap
page read and write
38A9000
heap
page read and write
1C15B929000
heap
page read and write
2630502B000
heap
page read and write
6D8BFBF000
stack
page read and write
F0A000
heap
page read and write
38B9000
heap
page read and write
263050A9000
heap
page read and write
F19000
heap
page read and write
38BA000
heap
page read and write
F19000
heap
page read and write
EF4000
heap
page read and write
1C15B9DA000
heap
page read and write
26304FFA000
heap
page read and write
38A8000
heap
page read and write
EF2000
heap
page read and write
38D5000
heap
page read and write
1C15B9CB000
heap
page read and write
1C15B9A2000
heap
page read and write
26304FEF000
heap
page read and write
26305065000
heap
page read and write
1C15B942000
heap
page read and write
1C15B950000
heap
page read and write
25D0000
trusted library allocation
page read and write
1C15B8FB000
heap
page read and write
38AF000
heap
page read and write
7FF6D88C1000
unkown
page execute read
1C15B9A2000
heap
page read and write
26305038000
heap
page read and write
38DA000
heap
page read and write
1C15B905000
heap
page read and write
1C15B959000
heap
page read and write
1C15B98B000
heap
page read and write
26304FF8000
heap
page read and write
1C15B9E4000
heap
page read and write
1C15B9E1000
heap
page read and write
2630507D000
heap
page read and write
EF2000
heap
page read and write
1C15BC90000
heap
page read and write
25D0000
trusted library allocation
page read and write
38BA000
heap
page read and write
1C15B9D1000
heap
page read and write
1C15B971000
heap
page read and write
26305038000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15B95D000
heap
page read and write
ECE000
heap
page read and write
38AF000
heap
page read and write
1C15B9E4000
heap
page read and write
1C15B9E4000
heap
page read and write
38D2000
heap
page read and write
26305023000
heap
page read and write
EF2000
heap
page read and write
ECC000
heap
page read and write
E90000
heap
page read and write
EE5000
heap
page read and write
EF2000
heap
page read and write
1C15B92F000
heap
page read and write
1C15B94F000
heap
page read and write
EFB000
heap
page read and write
26305017000
heap
page read and write
38C8000
heap
page read and write
38D5000
heap
page read and write
1C15B92B000
heap
page read and write
F19000
heap
page read and write
1C15B918000
heap
page read and write
1C15B95C000
heap
page read and write
1C15B9C0000
heap
page read and write
EDA000
heap
page read and write
38A1000
heap
page read and write
1C15BB31000
heap
page read and write
3730000
direct allocation
page read and write
6D8C2FF000
stack
page read and write
2630502F000
heap
page read and write
2630501C000
heap
page read and write
9C7000
unkown
page readonly
307F000
trusted library allocation
page read and write
263050A9000
heap
page read and write
F03000
heap
page read and write
F03000
heap
page read and write
1C15B972000
heap
page read and write
38BF000
heap
page read and write
4BC0000
direct allocation
page read and write
35C0000
direct allocation
page read and write
38BA000
heap
page read and write
F0C000
heap
page read and write
35C0000
direct allocation
page read and write
1C15B984000
heap
page read and write
38DA000
heap
page read and write
38A2000
heap
page read and write
1C15B929000
heap
page read and write
F05000
heap
page read and write
2630500C000
heap
page read and write
BF0000
heap
page read and write
F03000
heap
page read and write
38C6000
heap
page read and write
1C15B929000
heap
page read and write
1C15B920000
heap
page read and write
420000
heap
page read and write
ECB000
heap
page read and write
26305005000
heap
page read and write
106D000
stack
page read and write
E94000
heap
page read and write
1C15B920000
heap
page read and write
38A4000
heap
page read and write
26304FEF000
heap
page read and write
415000
unkown
page write copy
F19000
heap
page read and write
1C15B901000
heap
page read and write
35E0000
direct allocation
page read and write
1C15B913000
heap
page read and write
E85000
heap
page read and write
38AC000
heap
page read and write
2630502C000
heap
page read and write
38C2000
heap
page read and write
ED8000
heap
page read and write
2630501F000
heap
page read and write
38D5000
heap
page read and write
26305068000
heap
page read and write
F15000
heap
page read and write
F0A000
heap
page read and write
38B1000
heap
page read and write
26304FF5000
heap
page read and write
F15000
heap
page read and write
263050A9000
heap
page read and write
38BA000
heap
page read and write
1C15B9C1000
heap
page read and write
BC4000
heap
page read and write
1C15B9A2000
heap
page read and write
4AE0000
direct allocation
page read and write
26304FDF000
heap
page read and write
EE7000
heap
page read and write
2630501E000
heap
page read and write
38B9000
heap
page read and write
38D2000
heap
page read and write
1C15B95D000
heap
page read and write
F1A000
heap
page read and write
3630000
direct allocation
page read and write
2630508E000
heap
page read and write
EF2000
heap
page read and write
26305200000
heap
page read and write
1C15B9E4000
heap
page read and write
26305033000
heap
page read and write
26304FEF000
heap
page read and write
38A8000
heap
page read and write
38C6000
heap
page read and write
38AC000
heap
page read and write
1C15B9B0000
heap
page read and write
B9C000
heap
page read and write
1C15B9E4000
heap
page read and write
1C15B942000
heap
page read and write
9C000
stack
page read and write
ED8000
heap
page read and write
1C15B953000
heap
page read and write
32FE000
stack
page read and write
2630502F000
heap
page read and write
1C15B9BF000
heap
page read and write
1C15B91D000
heap
page read and write
EE7000
heap
page read and write
2630501F000
heap
page read and write
EF2000
heap
page read and write
EE7000
heap
page read and write
F15000
heap
page read and write
1C15B9D2000
heap
page read and write
38BC000
heap
page read and write
F15000
heap
page read and write
26305000000
heap
page read and write
1C15B94F000
heap
page read and write
BBF000
heap
page read and write
263050A9000
heap
page read and write
6D8BEB4000
stack
page read and write
38AC000
heap
page read and write
1C15B971000
heap
page read and write
E82000
heap
page read and write
1C15B9D1000
heap
page read and write
7FF6D8943000
unkown
page readonly
38DA000
heap
page read and write
1C15B971000
heap
page read and write
38C2000
heap
page read and write
26305091000
heap
page read and write
F19000
heap
page read and write
35F0000
direct allocation
page read and write
1C15B94F000
heap
page read and write
3520000
direct allocation
page read and write
26304FDA000
heap
page read and write
263050A9000
heap
page read and write
3620000
direct allocation
page read and write
3620000
direct allocation
page read and write
3083000
trusted library allocation
page read and write
1C15B953000
heap
page read and write
EF2000
heap
page read and write
3630000
direct allocation
page read and write
3070000
trusted library allocation
page read and write
35F0000
direct allocation
page read and write
1C15B9A2000
heap
page read and write
1C15B9A2000
heap
page read and write
1C15B929000
heap
page read and write
F19000
heap
page read and write
1C15B936000
heap
page read and write
26305033000
heap
page read and write
2630500C000
heap
page read and write
EDA000
heap
page read and write
38A6000
heap
page read and write
2630508A000
heap
page read and write
F19000
heap
page read and write
EFB000
heap
page read and write
1C15B8E0000
heap
page read and write
7FF6D8943000
unkown
page readonly
EFD000
heap
page read and write
26305058000
heap
page read and write
33D0000
direct allocation
page read and write
BF5000
heap
page read and write
1C15B9D1000
heap
page read and write
2630500C000
heap
page read and write
3082000
trusted library allocation
page read and write
1C15B95D000
heap
page read and write
26304FD3000
heap
page read and write
F16000
heap
page read and write
38BE000
heap
page read and write
1C15B9CC000
heap
page read and write
2630500C000
heap
page read and write
EF2000
heap
page read and write
38BD000
heap
page read and write
1C15B9A0000
heap
page read and write
F15000
heap
page read and write
1C15B9D2000
heap
page read and write
1C15B948000
heap
page read and write
38B5000
heap
page read and write
38D2000
heap
page read and write
38AC000
heap
page read and write
2630508A000
heap
page read and write
38A1000
heap
page read and write
F15000
heap
page read and write
9CD000
unkown
page read and write
1C15B9E1000
heap
page read and write
43E000
heap
page read and write
2630502C000
heap
page read and write
38E1000
heap
page read and write
1C15B915000
heap
page read and write
38BA000
heap
page read and write
35F0000
direct allocation
page read and write
1C15B92B000
heap
page read and write
1C15B920000
heap
page read and write
3750000
direct allocation
page read and write
3074000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
1C15B9E4000
heap
page read and write
7FF6D88C0000
unkown
page readonly
38BA000
heap
page read and write
3470000
unkown
page readonly
38D5000
heap
page read and write
1C15B9E4000
heap
page read and write
1C15B9D1000
heap
page read and write
1C15B9DD000
heap
page read and write
26305017000
heap
page read and write
1C15BB51000
heap
page read and write
4BA0000
direct allocation
page read and write
25D0000
trusted library allocation
page read and write
1C15B9CC000
heap
page read and write
EF6000
heap
page read and write
35D0000
direct allocation
page read and write
EF2000
heap
page read and write
26305058000
heap
page read and write
26305028000
heap
page read and write
F19000
heap
page read and write
1C15B9DD000
heap
page read and write
36D0000
direct allocation
page read and write
ECE000
heap
page read and write
26305005000
heap
page read and write
1C15B913000
heap
page read and write
B9C000
heap
page read and write
1C15B953000
heap
page read and write
800000
heap
page read and write
38AC000
heap
page read and write
EF2000
heap
page read and write
38C6000
heap
page read and write
1C15B962000
heap
page read and write
3520000
direct allocation
page read and write
38BF000
heap
page read and write
1C15B9C9000
heap
page read and write
38BB000
heap
page read and write
38A1000
heap
page read and write
43A000
heap
page read and write
1C15B9D1000
heap
page read and write
2630501E000
heap
page read and write
4B40000
direct allocation
page read and write
A81FD2E000
stack
page read and write
1C15B9A0000
heap
page read and write
1C15B90A000
heap
page read and write
1C15B933000
heap
page read and write
26305017000
heap
page read and write
1C15B957000
heap
page read and write
EF1000
heap
page read and write
1C15B953000
heap
page read and write
9C1000
unkown
page execute read
F19000
heap
page read and write
1C15B91B000
heap
page read and write
2630500C000
heap
page read and write
38BD000
heap
page read and write
1C15B91E000
heap
page read and write
38A1000
heap
page read and write
F0A000
heap
page read and write
26305038000
heap
page read and write
37B0000
direct allocation
page read and write
F1A000
heap
page read and write
EC6000
heap
page read and write
EE7000
heap
page read and write
38C9000
heap
page read and write
2630507C000
heap
page read and write
1C15B947000
heap
page read and write
1C15B936000
heap
page read and write
A81FDAF000
stack
page read and write
F15000
heap
page read and write
38C6000
heap
page read and write
1C15B9D1000
heap
page read and write
EE3000
heap
page read and write
1C15B953000
heap
page read and write
4B60000
direct allocation
page read and write
1C15B951000
heap
page read and write
EF1000
heap
page read and write
26304FEC000
heap
page read and write
307B000
trusted library allocation
page read and write
ED6000
heap
page read and write
1C15B98B000
heap
page read and write
26304FF8000
heap
page read and write
1C15B967000
heap
page read and write
F19000
heap
page read and write
EF3000
heap
page read and write
38A1000
heap
page read and write
1C15B936000
heap
page read and write
1C15B933000
heap
page read and write
F1E000
heap
page read and write
38C1000
heap
page read and write
1C15B906000
heap
page read and write
E4E000
heap
page read and write
1C15B9E0000
heap
page read and write
BA0000
heap
page read and write
1C15B953000
heap
page read and write
26305017000
heap
page read and write
1C15B9A0000
heap
page read and write
26305034000
heap
page read and write
F19000
heap
page read and write
7FF6D88C0000
unkown
page readonly
1C15B9E4000
heap
page read and write
970000
heap
page read and write
EF2000
heap
page read and write
1C15B95D000
heap
page read and write
BC1000
heap
page read and write
EE5000
heap
page read and write
2630503C000
heap
page read and write
ED9000
heap
page read and write
38A1000
heap
page read and write
38D2000
heap
page read and write
E5C000
heap
page read and write
38C8000
heap
page read and write
38D5000
heap
page read and write
263050A9000
heap
page read and write
38ED000
heap
page read and write
F19000
heap
page read and write
1C15B91E000
heap
page read and write
F0D000
heap
page read and write
F03000
heap
page read and write
1C15B936000
heap
page read and write
35D0000
direct allocation
page read and write
1C15B9CB000
heap
page read and write
1C15B961000
heap
page read and write
1C15B9A2000
heap
page read and write
1C15B9A2000
heap
page read and write
1C15B9CC000
heap
page read and write
26305028000
heap
page read and write
EF6000
heap
page read and write
3630000
direct allocation
page read and write
1C15B9D1000
heap
page read and write
EF2000
heap
page read and write
369F000
direct allocation
page read and write
1C15B92C000
heap
page read and write
26305003000
heap
page read and write
1C15B9BF000
heap
page read and write
38BD000
heap
page read and write
1C15B942000
heap
page read and write
26305005000
heap
page read and write
1C15BFE0000
heap
page read and write
28A0000
trusted library allocation
page read and write
2630502C000
heap
page read and write
3630000
direct allocation
page read and write
EE3000
heap
page read and write
1C15B9C0000
heap
page read and write
1C15B9CB000
heap
page read and write
1C15B9CB000
heap
page read and write
26305017000
heap
page read and write
EF6000
heap
page read and write
26305017000
heap
page read and write
38BF000
heap
page read and write
2890000
heap
page read and write
1C15B92E000
heap
page read and write
401000
unkown
page execute read
38A1000
heap
page read and write
26305091000
heap
page read and write
BB6000
heap
page read and write
1C15B962000
heap
page read and write
1C15B94F000
heap
page read and write
F0B000
heap
page read and write
26304FEB000
heap
page read and write
EF6000
heap
page read and write
36F0000
direct allocation
page read and write
415000
unkown
page read and write
4B00000
direct allocation
page read and write
E8D000
heap
page read and write
BA3000
heap
page read and write
2630508A000
heap
page read and write
3630000
direct allocation
page read and write
412000
unkown
page readonly
EDF000
heap
page read and write
2630500E000
heap
page read and write
38C6000
heap
page read and write
1C15B920000
heap
page read and write
1C15B9C1000
heap
page read and write
1C15B9DD000
heap
page read and write
3620000
direct allocation
page read and write
35E0000
direct allocation
page read and write
1C15B913000
heap
page read and write
EDF000
heap
page read and write
F12000
heap
page read and write
2630502C000
heap
page read and write
1C15B942000
heap
page read and write
EDF000
heap
page read and write
EFB000
heap
page read and write
1C15B920000
heap
page read and write
26305028000
heap
page read and write
1C15B95D000
heap
page read and write
EF2000
heap
page read and write
1C15B9D2000
heap
page read and write
F15000
heap
page read and write
3650000
direct allocation
page read and write
38A1000
heap
page read and write
E82000
heap
page read and write
25D0000
trusted library allocation
page read and write
ADE000
stack
page read and write
38A2000
heap
page read and write
BA6000
heap
page read and write
1C15B929000
heap
page read and write
3079000
trusted library allocation
page read and write
26305082000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15BB56000
heap
page read and write
1C15B9A0000
heap
page read and write
38B9000
heap
page read and write
1C15B91B000
heap
page read and write
3620000
direct allocation
page read and write
1C15B9A0000
heap
page read and write
1C15BB51000
heap
page read and write
3620000
direct allocation
page read and write
1C15B9A0000
heap
page read and write
1C15B973000
heap
page read and write
D7E000
stack
page read and write
84E000
stack
page read and write
1C15B931000
heap
page read and write
A81FCA4000
stack
page read and write
38A6000
heap
page read and write
1C15B92B000
heap
page read and write
26304FF3000
heap
page read and write
2630508E000
heap
page read and write
E5C000
heap
page read and write
3610000
direct allocation
page read and write
EDF000
heap
page read and write
1C15B9C1000
heap
page read and write
1C15B948000
heap
page read and write
ECE000
heap
page read and write
38A7000
heap
page read and write
26304FEB000
heap
page read and write
F03000
heap
page read and write
26304FEF000
heap
page read and write
1C15B9DA000
heap
page read and write
1C15B933000
heap
page read and write
38D2000
heap
page read and write
26305058000
heap
page read and write
88E000
stack
page read and write
1F5E000
stack
page read and write
2630505A000
heap
page read and write
3630000
direct allocation
page read and write
EF2000
heap
page read and write
1C15B91A000
heap
page read and write
35F0000
direct allocation
page read and write
3630000
direct allocation
page read and write
38DA000
heap
page read and write
1C15B920000
heap
page read and write
1C15B92B000
heap
page read and write
EF4000
heap
page read and write
F15000
heap
page read and write
26305002000
heap
page read and write
26305002000
heap
page read and write
26304FF8000
heap
page read and write
3600000
direct allocation
page read and write
3084000
trusted library allocation
page read and write
2630500C000
heap
page read and write
38A5000
heap
page read and write
26305017000
heap
page read and write
F0D000
heap
page read and write
38C7000
heap
page read and write
7FF6D8941000
unkown
page write copy
1C15B948000
heap
page read and write
2630500A000
heap
page read and write
ED7000
heap
page read and write
BFE000
heap
page read and write
3620000
direct allocation
page read and write
1C15B9D1000
heap
page read and write
38C1000
heap
page read and write
1C15B92B000
heap
page read and write
1C15B92B000
heap
page read and write
1C15B9E4000
heap
page read and write
36F0000
direct allocation
page read and write
1C15B942000
heap
page read and write
1C15B936000
heap
page read and write
1C15B94F000
heap
page read and write
1C15B9E4000
heap
page read and write
EF6000
heap
page read and write
EFB000
heap
page read and write
26304FE4000
heap
page read and write
36B0000
direct allocation
page read and write
26305009000
heap
page read and write
38B9000
heap
page read and write
26305005000
heap
page read and write
3077000
trusted library allocation
page read and write
3482000
heap
page read and write
1C15B9C1000
heap
page read and write
38A1000
heap
page read and write
1C15B962000
heap
page read and write
EF2000
heap
page read and write
9CF000
unkown
page readonly
1C15B9CB000
heap
page read and write
1C15B920000
heap
page read and write
2630502A000
heap
page read and write
38A9000
heap
page read and write
1C15B91B000
heap
page read and write
EF6000
heap
page read and write
26305005000
heap
page read and write
EF7000
heap
page read and write
9C1000
unkown
page execute read
2E20000
heap
page read and write
E00000
heap
page read and write
1C15B972000
heap
page read and write
38AC000
heap
page read and write
EFB000
heap
page read and write
38C6000
heap
page read and write
1C15B9E4000
heap
page read and write
EF3000
heap
page read and write
3690000
direct allocation
page read and write
36D0000
direct allocation
page read and write
2630501F000
heap
page read and write
2630501C000
heap
page read and write
38BA000
heap
page read and write
26305002000
heap
page read and write
E5A000
heap
page read and write
F12000
heap
page read and write
38C8000
heap
page read and write
1C15B9A0000
heap
page read and write
3620000
direct allocation
page read and write
2630502C000
heap
page read and write
1C15B972000
heap
page read and write
37D0000
direct allocation
page read and write
38D2000
heap
page read and write
1C15B94F000
heap
page read and write
1C15B92B000
heap
page read and write
25D0000
trusted library allocation
page read and write
EFB000
heap
page read and write
EDA000
heap
page read and write
26304FF8000
heap
page read and write
26305028000
heap
page read and write
38B9000
heap
page read and write
38BD000
heap
page read and write
26305028000
heap
page read and write
400000
unkown
page readonly
EF7000
heap
page read and write
BBF000
heap
page read and write
26305005000
heap
page read and write
F19000
heap
page read and write
38E0000
heap
page read and write
26304FF8000
heap
page read and write
38A1000
heap
page read and write
2630502C000
heap
page read and write
3630000
direct allocation
page read and write
2630501F000
heap
page read and write
1C15B92E000
heap
page read and write
9C0000
unkown
page readonly
EE5000
heap
page read and write
26305023000
heap
page read and write
F0B000
heap
page read and write
3060000
heap
page read and write
1C15B94F000
heap
page read and write
2630507F000
heap
page read and write
2630502F000
heap
page read and write
E85000
heap
page read and write
26305091000
heap
page read and write
E90000
heap
page read and write
38C0000
heap
page read and write
BA6000
heap
page read and write
1C15B9C1000
heap
page read and write
1C15B94F000
heap
page read and write
2630508E000
heap
page read and write
26305003000
heap
page read and write
26305005000
heap
page read and write
2630500E000
heap
page read and write
2630509E000
heap
page read and write
38D5000
heap
page read and write
F1D000
heap
page read and write
38D2000
heap
page read and write
1C15B9CC000
heap
page read and write
4B40000
direct allocation
page read and write
1C15B9A0000
heap
page read and write
3690000
direct allocation
page read and write
1C15B962000
heap
page read and write
1C15B973000
heap
page read and write
2630500C000
heap
page read and write
38A0000
heap
page read and write
35D0000
direct allocation
page read and write
38A4000
heap
page read and write
EFB000
heap
page read and write
EDA000
heap
page read and write
3670000
direct allocation
page read and write
26304FCB000
heap
page read and write
38C6000
heap
page read and write
35C0000
direct allocation
page read and write
38BA000
heap
page read and write
F0D000
heap
page read and write
26304FD5000
heap
page read and write
26304FEB000
heap
page read and write
38AC000
heap
page read and write
3481000
heap
page read and write
38BA000
heap
page read and write
3610000
direct allocation
page read and write
2630507A000
heap
page read and write
F19000
heap
page read and write
EBE000
heap
page read and write
E85000
heap
page read and write
26304FF8000
heap
page read and write
1C15B9E4000
heap
page read and write
F19000
heap
page read and write
1C15B9A2000
heap
page read and write
1C15B942000
heap
page read and write
1C15B91D000
heap
page read and write
F03000
heap
page read and write
EF2000
heap
page read and write
1C15B929000
heap
page read and write
F1E000
heap
page read and write
9CA000
unkown
page read and write
EC1000
heap
page read and write
2630501F000
heap
page read and write
26305038000
heap
page read and write
38DA000
heap
page read and write
1C15B9D3000
heap
page read and write
1C15B9E4000
heap
page read and write
1C15B9E4000
heap
page read and write
38A1000
heap
page read and write
38D2000
heap
page read and write
38C2000
heap
page read and write
3610000
direct allocation
page read and write
26305023000
heap
page read and write
1C15B9C1000
heap
page read and write
3620000
direct allocation
page read and write
1C15B93A000
heap
page read and write
1C15B948000
heap
page read and write
1C15B954000
heap
page read and write
1C15B9A0000
heap
page read and write
26305034000
heap
page read and write
26305065000
heap
page read and write
1C15B93A000
heap
page read and write
1C15B9D1000
heap
page read and write
2630501F000
heap
page read and write
F07000
heap
page read and write
26305091000
heap
page read and write
BC1000
heap
page read and write
EDA000
heap
page read and write
263050A9000
heap
page read and write
2D00000
heap
page read and write
38DA000
heap
page read and write
ED1000
heap
page read and write
2EB0000
heap
page read and write
3620000
direct allocation
page read and write
3770000
direct allocation
page read and write
3630000
direct allocation
page read and write
EE1000
heap
page read and write
38A2000
heap
page read and write
26304FFA000
heap
page read and write
EDA000
heap
page read and write
26305091000
heap
page read and write
26305034000
heap
page read and write
1C15B93A000
heap
page read and write
1C15B9A0000
heap
page read and write
26305082000
heap
page read and write
1C15B9E1000
heap
page read and write
38C8000
heap
page read and write
25D0000
trusted library allocation
page read and write
EDD000
heap
page read and write
38D5000
heap
page read and write
26305017000
heap
page read and write
1C15B942000
heap
page read and write
1C15B92C000
heap
page read and write
26305092000
heap
page read and write
F0D000
heap
page read and write
38C6000
heap
page read and write
EE1000
heap
page read and write
1070000
heap
page read and write
1C15B95E000
heap
page read and write
1C15B95D000
heap
page read and write
1C15B9C0000
heap
page read and write
38BD000
heap
page read and write
38AF000
heap
page read and write
25D0000
trusted library allocation
page read and write
2580000
heap
page read and write
26305017000
heap
page read and write
1C15B98B000
heap
page read and write
38D5000
heap
page read and write
26305032000
heap
page read and write
26305018000
heap
page read and write
38AC000
heap
page read and write
1C15B942000
heap
page read and write
7FF6D8958000
unkown
page readonly
1C15B9A2000
heap
page read and write
4DC0000
trusted library allocation
page read and write
F19000
heap
page read and write
E49000
heap
page read and write
2630500E000
heap
page read and write
BEE000
stack
page read and write
38D8000
heap
page read and write
1C15B9BF000
heap
page read and write
26305038000
heap
page read and write
38BA000
heap
page read and write
3620000
direct allocation
page read and write
BB6000
heap
page read and write
1C15B971000
heap
page read and write
1C15B9D2000
heap
page read and write
26305023000
heap
page read and write
26304FEF000
heap
page read and write
1C15B92B000
heap
page read and write
3630000
direct allocation
page read and write
38AC000
heap
page read and write
F03000
heap
page read and write
F03000
heap
page read and write
EF6000
heap
page read and write
26305550000
heap
page read and write
38BC000
heap
page read and write
307D000
trusted library allocation
page read and write
1C15B958000
heap
page read and write
1C15B9BD000
heap
page read and write
1C15B92B000
heap
page read and write
1C15B972000
heap
page read and write
EDA000
heap
page read and write
26304FEB000
heap
page read and write
1C15B98B000
heap
page read and write
1C15B92E000
heap
page read and write
E82000
heap
page read and write
EF5000
heap
page read and write
1C15B93A000
heap
page read and write
1C15B94F000
heap
page read and write
38E4000
heap
page read and write
38D5000
heap
page read and write
38A1000
heap
page read and write
EF9000
heap
page read and write
38C9000
heap
page read and write
26305034000
heap
page read and write
35D0000
direct allocation
page read and write
BC4000
heap
page read and write
35F0000
direct allocation
page read and write
1C15B962000
heap
page read and write
ED4000
heap
page read and write
2630565F000
heap
page read and write
1C15B9E1000
heap
page read and write
38DA000
heap
page read and write
9C7000
unkown
page readonly
26305003000
heap
page read and write
EF6000
heap
page read and write
26305038000
heap
page read and write
1C15B9E1000
heap
page read and write
1C15B958000
heap
page read and write
205F000
stack
page read and write
1C15B91B000
heap
page read and write
9C9000
unkown
page write copy
1C15B9D1000
heap
page read and write
38A8000
heap
page read and write
1C15B920000
heap
page read and write
38A1000
heap
page read and write
2630505A000
heap
page read and write
2630500C000
heap
page read and write
BD6000
heap
page read and write
26305082000
heap
page read and write
26305038000
heap
page read and write
26305190000
heap
page read and write
263051B0000
heap
page read and write
37B0000
direct allocation
page read and write
1C15B9A2000
heap
page read and write
26304FE4000
heap
page read and write
2630502C000
heap
page read and write
2630502C000
heap
page read and write
26305002000
heap
page read and write
2630507A000
heap
page read and write
1C15BB3C000
heap
page read and write
F15000
heap
page read and write
38A6000
heap
page read and write
EF6000
heap
page read and write
26305033000
heap
page read and write
1C15B9CC000
heap
page read and write
3790000
direct allocation
page read and write
ED1000
heap
page read and write
1C15B9A2000
heap
page read and write
1C15B972000
heap
page read and write
2630501F000
heap
page read and write
E90000
heap
page read and write
1C15B971000
heap
page read and write
26305665000
heap
page read and write
26304FFA000
heap
page read and write
38AF000
heap
page read and write
38D2000
heap
page read and write
1C15B90A000
heap
page read and write
2630507D000
heap
page read and write
38AC000
heap
page read and write
28E0000
heap
page read and write
1C15B9B1000
heap
page read and write
ECC000
heap
page read and write
26305003000
heap
page read and write
26305017000
heap
page read and write
38C6000
heap
page read and write
EF3000
heap
page read and write
F19000
heap
page read and write
38CE000
heap
page read and write
38DB000
heap
page read and write
3630000
direct allocation
page read and write
1C15B953000
heap
page read and write
26304FF8000
heap
page read and write
6D8BF3F000
stack
page read and write
E82000
heap
page read and write
3620000
direct allocation
page read and write
38A1000
heap
page read and write
F12000
heap
page read and write
F0A000
heap
page read and write
9C9000
unkown
page write copy
3770000
direct allocation
page read and write
430000
heap
page read and write
26305034000
heap
page read and write
26305670000
heap
page read and write
26304FFC000
heap
page read and write
1C15B9A0000
heap
page read and write
1C15B95D000
heap
page read and write
1C15B92F000
heap
page read and write
38AC000
heap
page read and write
1C15B933000
heap
page read and write
1C15B972000
heap
page read and write
2630502C000
heap
page read and write
E2C000
heap
page read and write
38C1000
heap
page read and write
38D2000
heap
page read and write
F15000
heap
page read and write
2630508E000
heap
page read and write
38D2000
heap
page read and write
263050A9000
heap
page read and write
38D2000
heap
page read and write
1C15B92B000
heap
page read and write
1C15BB45000
heap
page read and write
347D000
heap
page read and write
BBD000
heap
page read and write
26305002000
heap
page read and write
1C15BC95000
heap
page read and write
26305034000
heap
page read and write
263050A9000
heap
page read and write
1C15B9A0000
heap
page read and write
307E000
trusted library allocation
page read and write
2630506E000
heap
page read and write
EF2000
heap
page read and write
1C15B936000
heap
page read and write
ED9000
heap
page read and write
19D000
stack
page read and write
29B3000
heap
page read and write
1C15B9D2000
heap
page read and write
F12000
heap
page read and write
EC8000
heap
page read and write
EC8000
heap
page read and write
1C15B92B000
heap
page read and write
35E0000
direct allocation
page read and write
2584000
heap
page read and write
26305038000
heap
page read and write
26305028000
heap
page read and write
ED1000
heap
page read and write
F15000
heap
page read and write
2630500D000
heap
page read and write
1C15B971000
heap
page read and write
1C15B91C000
heap
page read and write
1C15B9D2000
heap
page read and write
1C15B930000
heap
page read and write
2630506D000
heap
page read and write
3076000
trusted library allocation
page read and write
F15000
heap
page read and write
1C15B94F000
heap
page read and write
EDF000
heap
page read and write
EE7000
heap
page read and write
38F4000
heap
page read and write
26305038000
heap
page read and write
EFB000
heap
page read and write
1C15B9D1000
heap
page read and write
263050A9000
heap
page read and write
1C15B93A000
heap
page read and write
38AC000
heap
page read and write
1C15B942000
heap
page read and write
25C5000
heap
page read and write
1C15BB36000
heap
page read and write
1C15B9D2000
heap
page read and write
26305033000
heap
page read and write
1C15B971000
heap
page read and write
37D0000
direct allocation
page read and write
38A5000
heap
page read and write
38BC000
heap
page read and write
2630508A000
heap
page read and write
3630000
direct allocation
page read and write
1C15B9A2000
heap
page read and write
EDA000
heap
page read and write
1C15B948000
heap
page read and write
26305069000
heap
page read and write
26305038000
heap
page read and write
1C15B9C1000
heap
page read and write
38B9000
heap
page read and write
EF9000
heap
page read and write
1C15B9A2000
heap
page read and write
38A8000
heap
page read and write
1C15B9E1000
heap
page read and write
2630500C000
heap
page read and write
3410000
heap
page read and write
1C15B920000
heap
page read and write
4F4F000
stack
page read and write
1C15B9DD000
heap
page read and write
1C15B93A000
heap
page read and write
1C15B90F000
heap
page read and write
26305017000
heap
page read and write
1C15B920000
heap
page read and write
38DA000
heap
page read and write
1C15B9CB000
heap
page read and write
EDD000
heap
page read and write
38BC000
heap
page read and write
25C9000
heap
page read and write
1C15B92B000
heap
page read and write
F19000
heap
page read and write
E82000
heap
page read and write
1C15B981000
heap
page read and write
26304FEC000
heap
page read and write
1C15B9B6000
heap
page read and write
26305023000
heap
page read and write
26305038000
heap
page read and write
1C15B972000
heap
page read and write
38B9000
heap
page read and write
1C15B92F000
heap
page read and write
38DA000
heap
page read and write
1C15B958000
heap
page read and write
1C15B90F000
heap
page read and write
EFD000
heap
page read and write
26305005000
heap
page read and write
26305005000
heap
page read and write
1C15B92D000
heap
page read and write
7FF6D8941000
unkown
page read and write
3790000
direct allocation
page read and write
35C0000
direct allocation
page read and write
ECB000
heap
page read and write
26305091000
heap
page read and write
F0A000
heap
page read and write
1C15B9D1000
heap
page read and write
26304FFA000
heap
page read and write
26305092000
heap
page read and write
3476000
heap
page read and write
3478000
heap
page read and write
26305082000
heap
page read and write
1C15B9DA000
heap
page read and write
F03000
heap
page read and write
2630501F000
heap
page read and write
5A0000
heap
page read and write
EF3000
heap
page read and write
1C15B920000
heap
page read and write
2EA0000
heap
page read and write
4B20000
direct allocation
page read and write
1C15B93D000
heap
page read and write
35C0000
direct allocation
page read and write
3073000
trusted library allocation
page read and write
1C15B9A2000
heap
page read and write
26305082000
heap
page read and write
ED3000
heap
page read and write
1C15B932000
heap
page read and write
1C15B934000
heap
page read and write
77F000
stack
page read and write
B1A000
stack
page read and write
38BF000
heap
page read and write
1C15B93A000
heap
page read and write
28F0000
heap
page read and write
1C15B95D000
heap
page read and write
38C7000
heap
page read and write
38BB000
heap
page read and write
1C15B91D000
heap
page read and write
ECC000
heap
page read and write
26305028000
heap
page read and write
F08000
heap
page read and write
38E9000
heap
page read and write
1C15B92B000
heap
page read and write
38BD000
heap
page read and write
1C15B92D000
heap
page read and write
1C15B9D2000
heap
page read and write
38C1000
heap
page read and write
1C15B94F000
heap
page read and write
F19000
heap
page read and write
F0A000
heap
page read and write
1C15B9E1000
heap
page read and write
2630500E000
heap
page read and write
307A000
trusted library allocation
page read and write
26305017000
heap
page read and write
2630502F000
heap
page read and write
1C15B91B000
heap
page read and write
38A4000
heap
page read and write
498000
stack
page read and write
BA0000
heap
page read and write
F0D000
heap
page read and write
1C15B915000
heap
page read and write
38D5000
heap
page read and write
1C15BB51000
heap
page read and write
26304FF8000
heap
page read and write
EDD000
heap
page read and write
1C15B92B000
heap
page read and write
2630502F000
heap
page read and write
1C15B948000
heap
page read and write
1C15B947000
heap
page read and write
1C15B961000
heap
page read and write
EE0000
heap
page read and write
1C15BB30000
heap
page read and write
26305038000
heap
page read and write
38A8000
heap
page read and write
EF8000
heap
page read and write
2630508A000
heap
page read and write
2630502C000
heap
page read and write
26305028000
heap
page read and write
26305017000
heap
page read and write
1C15B90A000
heap
page read and write
1C15B9C1000
heap
page read and write
990000
direct allocation
page read and write
E26000
heap
page read and write
E90000
heap
page read and write
1C15B953000
heap
page read and write
3A9E000
stack
page read and write
F07000
heap
page read and write
38A2000
heap
page read and write
EE7000
heap
page read and write
35D0000
direct allocation
page read and write
38C3000
heap
page read and write
1C15B92B000
heap
page read and write
1C15BBCA000
heap
page read and write
26305091000
heap
page read and write
F1E000
heap
page read and write
1C15B9DD000
heap
page read and write
BCB000
heap
page read and write
EF9000
heap
page read and write
26305023000
heap
page read and write
263050A9000
heap
page read and write
2630501C000
heap
page read and write
26305005000
heap
page read and write
38BA000
heap
page read and write
1C15B9A2000
heap
page read and write
3072000
trusted library allocation
page read and write
3650000
direct allocation
page read and write
E90000
heap
page read and write
2630507D000
heap
page read and write
1C15B971000
heap
page read and write
1C15B9CB000
heap
page read and write
EFB000
heap
page read and write
EFB000
heap
page read and write
26305005000
heap
page read and write
26305052000
heap
page read and write
2080000
heap
page read and write
26305038000
heap
page read and write
4AE0000
direct allocation
page read and write
26305038000
heap
page read and write
38DA000
heap
page read and write
2630507D000
heap
page read and write
EF2000
heap
page read and write
EFB000
heap
page read and write
26305028000
heap
page read and write
1C15B962000
heap
page read and write
1C15B942000
heap
page read and write
1C15B9C1000
heap
page read and write
38AF000
heap
page read and write
2630502F000
heap
page read and write
1C15B9E1000
heap
page read and write
7FF6D88C1000
unkown
page execute read
1C15B920000
heap
page read and write
EDF000
heap
page read and write
1C15B973000
heap
page read and write
3730000
direct allocation
page read and write
26305038000
heap
page read and write
1C15B936000
heap
page read and write
25C0000
heap
page read and write
E85000
heap
page read and write
1C15B936000
heap
page read and write
25D0000
trusted library allocation
page read and write
BC1000
heap
page read and write
2630508E000
heap
page read and write
3620000
direct allocation
page read and write
F12000
heap
page read and write
26305650000
heap
page read and write
26304FF8000
heap
page read and write
38B9000
heap
page read and write
26305018000
heap
page read and write
35D0000
direct allocation
page read and write
ED8000
heap
page read and write
There are 1457 hidden memdumps, click here to show them.