IOC Report
papercut-hive.exe

loading gif

Files

File Path
Type
Category
Malicious
papercut-hive.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\pc-print-client.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\queue_install.log
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\Prs295.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Setup Log 2024-10-25 #001.txt
Unicode text, UTF-8 (with BOM) text, with very long lines (375), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-7B4BH.tmp\papercut-hive.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\antivirus-info.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\.gitattributes
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcglobal.cat
data
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcglobal.inf
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcglobal.ppd
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcntns.ppd
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\printer-settings-us-ca.bin
data
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\printer-settings.bin
data
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\data\config\cloud-region.conf
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\ghost-trap-installer-1.5.10.03.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\idp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\post.bmp
PC bitmap, Windows 3.x format, 420 x 250 x 16, image size 210002, resolution 2834 x 2834 px/m, cbSize 210056, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\vcredist_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\~execwithresult.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF815.tmp
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF836.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF846.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF867.tmp
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.inf (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.ppd (copy)
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcntns.ppd (copy)
PPD file, version "4.3"
dropped
C:\Windows\INF\oem4.inf
Windows setup INFormation
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETF9DB.tmp
PPD file, version "4.3"
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETF9EB.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETF9FC.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETFA0C.tmp
PPD file, version "4.3"
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcglobal.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcglobal.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcglobal.ppd (copy)
PPD file, version "4.3"
dropped
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcntns.ppd (copy)
PPD file, version "4.3"
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\System32\spool\drivers\x64\3\pcntns.BPD
data
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""netstat" -anb > "C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\~execwithresult.txt""
malicious
C:\Windows\System32\NETSTAT.EXE
"netstat" -anb
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /C wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get * /value > "C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\antivirus-info.log" 2>&1
malicious
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\pc-print-client.exe
"C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\pc-print-client.exe" -installPrintQueue -printerId="PaperCut Printer" -printerName="PaperCut Printer" "-driverFilePath=C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\PCGlobal.inf" -logFile="C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\queue_install.log"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe printui.dll,PrintUIEntry /ia /m "PaperCut Global PostScript - NTNS" /f C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\PCGlobal.inf /u
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe printui.dll,PrintUIEntry /y /if /b "PaperCut Printer" /x /n "PaperCut Printer" /m "PaperCut Global PostScript - NTNS" /r http://localhost:9265/printers/papercutpocket /u /q
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe printui.dll,PrintUIEntry /q /y /n "PaperCut Printer"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe printui.dll,PrintUIEntry /q /Sr /n "PaperCut Printer" /a C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\printer-settings.bin p h i r g u d c 2
malicious
C:\Users\user\Desktop\papercut-hive.exe
"C:\Users\user\Desktop\papercut-hive.exe"
C:\Users\user\AppData\Local\Temp\is-7B4BH.tmp\papercut-hive.tmp
"C:\Users\user\AppData\Local\Temp\is-7B4BH.tmp\papercut-hive.tmp" /SL5="$1047A,31229352,845824,C:\Users\user\Desktop\papercut-hive.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get * /value
C:\Windows\System32\taskkill.exe
"taskkill.exe" /f /im "pc-print-client-service.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\taskkill.exe
"taskkill.exe" /f /im "pc-print-client.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net.exe
"net.exe" start spooler
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 start spooler
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.inf" "9" "48fde5adf" "000000000000015C" "WinSta0\Default" "0000000000000144" "208" "c:\users\user\appdata\local\temp\is-b2r1d.tmp\client\pc-global-print-driver"
C:\Windows\System32\PrintIsolationHost.exe
C:\Windows\system32\PrintIsolationHost.exe -Embedding
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/PaperCutSoftware/GhostTrapn;
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exe==
unknown
http://www.papercut.com/
unknown
https://.papercusoftwarehttp://lus-genestesttstau-stagitemplate
unknown
http://www.bohemiancoding.com/sketch
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictin
unknown
https://pc-pmitc.appspot.com//print-client/secure/printclient-gateway/org/%s/upload-support-logs/v1c
unknown
https://aka.ms/YoS(&
unknown
http://127.0.0.1:9263image:
unknown
https://www.papercut.com/kb/PaperCutPocketHive/PrinterInstallerIssue#portconflict
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exeH
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exe
104.119.110.121
https://cdn1.papercut.com/files/open-source/ghost-trap/ghost-trap-installer-1.5.10.03.exe
52.222.214.120
https://aka.ms/
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exet))
unknown
https://www.papercut.com/kb/PaperCutPocketHive/PrinterInstallerIssue#win
unknown
http://appsyndication.org/2006/appsynapplicationc:
unknown
https://multiverse.papercut.com
unknown
https://multiverse.papercut.software
unknown
https://www.remobjects.com/ps
unknown
http://localhostus-genesisstaginggngkernel32.dllC:
unknown
https://au-staging.pmitc.papercut.softwareinsufficient
unknown
https://www.innosetup.com/
unknown
https://www.papercut.com/kb/PaperCutPocketHive/PrinterInstallerIssue#services
unknown
https://pmitc.papercut.com/
unknown
https://au.pmitc.papercut.comhttps://eu.pmitc.papercut.comhttps://uk.pmitc.papercut.cominteger
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exe4
unknown
http://bourbon.io
unknown
https://127.0.0.1:9266idna:
unknown
http://www.papercut.com/Yk
unknown
https://cdn1.papercut.com/
unknown
http://www.papercut.com/0http://www.papercut.com/0http://www.papercut.com/
unknown
https://github.com/PaperCutSoftware/GhostTrap
unknown
https://installer-downloader-dot-pc-pmitc.appspot.com/public/installer-downloader/upload-installer-l
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fg.microsoft.map.fastly.net
199.232.210.172
d1d4ywpuwg1f9b.cloudfront.net
52.222.214.120
aka.ms
104.119.110.121
pmitc.papercut.com
34.111.87.71
cdn1.papercut.com
unknown
198.187.3.20.in-addr.arpa
unknown
197.87.175.4.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
52.222.214.120
d1d4ywpuwg1f9b.cloudfront.net
United States
34.111.87.71
pmitc.papercut.com
United States
104.119.110.121
aka.ms
United States
199.232.210.172
fg.microsoft.map.fastly.net
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters
TrapPollTimeMilliSecs
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
HKEY_CURRENT_USER\Printers\Settings\Wizard
Default Attributes
HKEY_CURRENT_USER\Printers\Defaults\{9D3832B6-0358-4CFC-A417-56B61534AE5D}
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
IsMRUEstablished
HKEY_CURRENT_USER\Printers\DevModes2
PaperCut Printer

Memdumps

Base Address
Regiontype
Protect
Malicious
A3E000
heap
page read and write
A4E000
heap
page read and write
16AAE920000
direct allocation
page read and write
13B2000
unkown
page readonly
A2D000
heap
page read and write
A4E000
heap
page read and write
C0000E2000
direct allocation
page read and write
15A7000
heap
page read and write
1609000
heap
page read and write
A3E000
heap
page read and write
A3E000
heap
page read and write
1548000
heap
page read and write
A50000
heap
page read and write
1E21B9AA000
heap
page read and write
1572000
heap
page read and write
201583F0000
heap
page read and write
C0000E0000
direct allocation
page read and write
1742000
unkown
page read and write
1E21B720000
trusted library allocation
page read and write
19888760000
heap
page read and write
C000112000
direct allocation
page read and write
1E21B970000
heap
page read and write
181A42C9000
heap
page read and write
1CBD5F60000
heap
page read and write
1CBD5BE0000
heap
page read and write
C000222000
direct allocation
page read and write
C000282000
direct allocation
page read and write
A3E000
heap
page read and write
28F1D450000
heap
page read and write
3039000
direct allocation
page read and write
1A0C0630000
heap
page read and write
19888A65000
heap
page read and write
1E21B98E000
heap
page read and write
C00013C000
direct allocation
page read and write
1E21B7D8000
heap
page read and write
F7C887F000
stack
page read and write
1571000
heap
page read and write
A2D000
heap
page read and write
1E21BE50000
heap
page read and write
C000020000
direct allocation
page read and write
C00025C000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
41DF000
direct allocation
page read and write
3007000
direct allocation
page read and write
636F000
stack
page read and write
C0002A8000
direct allocation
page read and write
181A4460000
heap
page read and write
EBB000
stack
page read and write
C000236000
direct allocation
page read and write
28F1D275000
heap
page read and write
1790000
unkown
page read and write
C00042E000
direct allocation
page read and write
181A4244000
heap
page read and write
181A4266000
heap
page read and write
C000338000
direct allocation
page read and write
16A88966000
heap
page read and write
16AAE892000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
1C860A80000
heap
page read and write
181A422B000
heap
page read and write
A50000
heap
page read and write
C000364000
direct allocation
page read and write
C000066000
direct allocation
page read and write
67553FD000
stack
page read and write
C0003F8000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C00042A000
direct allocation
page read and write
181A425C000
heap
page read and write
1E21BF07000
heap
page read and write
A3E000
heap
page read and write
A50000
heap
page read and write
C000048000
direct allocation
page read and write
579000
unkown
page read and write
180F000
unkown
page readonly
A53000
heap
page read and write
1C85EF17000
heap
page read and write
C0000A8000
direct allocation
page read and write
A3E000
heap
page read and write
15D1000
heap
page read and write
C0000D8000
direct allocation
page read and write
A2D000
heap
page read and write
181A4286000
heap
page read and write
A37000
heap
page read and write
C000217000
direct allocation
page read and write
20158356000
heap
page read and write
6754DFE000
stack
page read and write
181A4254000
heap
page read and write
6755BFE000
stack
page read and write
6510000
remote allocation
page read and write
1581000
heap
page read and write
C000146000
direct allocation
page read and write
A50000
heap
page read and write
C000238000
direct allocation
page read and write
24817AB2000
heap
page read and write
C00002A000
direct allocation
page read and write
67557FC000
stack
page read and write
181A42B0000
heap
page read and write
A4E000
heap
page read and write
C000176000
direct allocation
page read and write
A53000
heap
page read and write
181A4266000
heap
page read and write
A48000
heap
page read and write
428D000
direct allocation
page read and write
1E21B988000
heap
page read and write
1E21B7B7000
heap
page read and write
A2D000
heap
page read and write
181A4251000
heap
page read and write
C000260000
direct allocation
page read and write
14F9000
heap
page read and write
174E000
unkown
page read and write
A3E000
heap
page read and write
17CE000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
2FF8000
direct allocation
page read and write
A3E000
heap
page read and write
1C85F1C5000
heap
page read and write
CA7A27E000
unkown
page read and write
179C000
unkown
page read and write
C00031A000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
308B000
direct allocation
page read and write
181A42B0000
heap
page read and write
2FB0000
direct allocation
page read and write
69AF69C000
stack
page read and write
A4E000
heap
page read and write
181A425C000
heap
page read and write
A3E000
heap
page read and write
C00021B000
direct allocation
page read and write
C000386000
direct allocation
page read and write
A4E000
heap
page read and write
181A426B000
heap
page read and write
A2D000
heap
page read and write
181A4266000
heap
page read and write
177D000
direct allocation
page read and write
1E21B7D4000
heap
page read and write
C000022000
direct allocation
page read and write
181A4288000
heap
page read and write
3FD8000
direct allocation
page read and write
1E21B7F6000
heap
page read and write
1E21B985000
heap
page read and write
A4E000
heap
page read and write
C00003E000
direct allocation
page read and write
181A4275000
heap
page read and write
C000428000
direct allocation
page read and write
A4F000
heap
page read and write
A2D000
heap
page read and write
1740000
unkown
page read and write
1CBD5CF0000
heap
page read and write
C00031E000
direct allocation
page read and write
ABE487C000
stack
page read and write
A50000
heap
page read and write
A48000
heap
page read and write
181A4288000
heap
page read and write
6EE857F000
stack
page read and write
181A42DA000
heap
page read and write
14E0000
direct allocation
page execute and read and write
CA7A3FE000
stack
page read and write
A3E000
heap
page read and write
C00028C000
direct allocation
page read and write
A2D000
heap
page read and write
181A425C000
heap
page read and write
A3E000
heap
page read and write
C00004F000
direct allocation
page read and write
28F1D285000
heap
page read and write
17A1000
direct allocation
page read and write
17B7000
direct allocation
page read and write
28F1D240000
heap
page read and write
16AAE50B000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
181A426B000
heap
page read and write
C000322000
direct allocation
page read and write
1E21B988000
heap
page read and write
A36000
heap
page read and write
A3E000
heap
page read and write
181A4251000
heap
page read and write
181A427D000
heap
page read and write
181A4305000
heap
page read and write
69AF79F000
stack
page read and write
24817AA6000
heap
page read and write
C000202000
direct allocation
page read and write
A3E000
heap
page read and write
1E21B7F9000
heap
page read and write
16A88BF5000
heap
page read and write
C00035A000
direct allocation
page read and write
3D495DF000
stack
page read and write
13D5000
heap
page read and write
C0000BE000
direct allocation
page read and write
24817AAA000
heap
page read and write
2015834A000
heap
page read and write
24817AE0000
heap
page read and write
A51000
heap
page read and write
D6BFB7F000
stack
page read and write
6754FFE000
stack
page read and write
A2D000
heap
page read and write
181A4200000
heap
page read and write
C00014D000
direct allocation
page read and write
C000026000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
ABE497E000
stack
page read and write
176F000
direct allocation
page read and write
23F79898000
heap
page read and write
4010000
heap
page read and write
181A425C000
heap
page read and write
1CBD5DD0000
heap
page read and write
A3E000
heap
page read and write
C0000FF000
direct allocation
page read and write
9E0000
heap
page read and write
666A000
heap
page read and write
16A88919000
direct allocation
page read and write
A3E000
heap
page read and write
A2D000
heap
page read and write
1E21B982000
heap
page read and write
A3E000
heap
page read and write
A4E000
heap
page read and write
1A0C0915000
heap
page read and write
181A425F000
heap
page read and write
181A427C000
heap
page read and write
4273000
direct allocation
page read and write
C0003D8000
direct allocation
page read and write
3040000
direct allocation
page read and write
C000398000
direct allocation
page read and write
17A3000
unkown
page write copy
A4E000
heap
page read and write
1E21BF0A000
heap
page read and write
28F1D28D000
heap
page read and write
19888940000
heap
page read and write
A53000
heap
page read and write
1CBD5C43000
heap
page read and write
A2D000
heap
page read and write
F7C87FE000
stack
page read and write
28F1D305000
heap
page read and write
2FD4000
direct allocation
page read and write
7F0DB000
direct allocation
page read and write
666F000
heap
page read and write
1CBD5C28000
heap
page read and write
C000240000
direct allocation
page read and write
1836000
direct allocation
page read and write
A36000
heap
page read and write
1E21B984000
heap
page read and write
C000160000
direct allocation
page read and write
C000366000
direct allocation
page read and write
A37000
heap
page read and write
1E21B7D5000
heap
page read and write
1E21B99A000
heap
page read and write
CA7A2FE000
stack
page read and write
A2D000
heap
page read and write
A2D000
heap
page read and write
1562000
heap
page read and write
24817AA6000
heap
page read and write
C0000DE000
direct allocation
page read and write
B00000
unkown
page readonly
A3E000
heap
page read and write
30DA000
direct allocation
page read and write
C00032C000
direct allocation
page read and write
1E21B99A000
heap
page read and write
1CBD5C39000
heap
page read and write
2A40000
trusted library allocation
page read and write
2015832A000
heap
page read and write
162F000
stack
page read and write
181A4244000
heap
page read and write
C00022A000
direct allocation
page read and write
16AAE8D0000
direct allocation
page read and write
A3E000
heap
page read and write
A3E000
heap
page read and write
C000310000
direct allocation
page read and write
28F1D301000
heap
page read and write
C000080000
direct allocation
page read and write
28F1D505000
heap
page read and write
A2D000
heap
page read and write
C000252000
direct allocation
page read and write
201582F0000
heap
page read and write
4218000
direct allocation
page read and write
57B000
unkown
page read and write
181A4254000
heap
page read and write
1609000
heap
page read and write
181A426B000
heap
page read and write
181A4254000
heap
page read and write
1E21D7F0000
heap
page read and write
A4E000
heap
page read and write
28F1D430000
heap
page read and write
13D0000
heap
page read and write
C0000C4000
direct allocation
page read and write
181A426B000
heap
page read and write
3F80000
direct allocation
page read and write
C000256000
direct allocation
page read and write
24817AC8000
heap
page read and write
C00032E000
direct allocation
page read and write
28F1D273000
heap
page read and write
A4E000
heap
page read and write
1812000
direct allocation
page read and write
181A4274000
heap
page read and write
41FA000
direct allocation
page read and write
A3E000
heap
page read and write
A44000
heap
page read and write
C0000BA000
direct allocation
page read and write
1CBD5C37000
heap
page read and write
1E21B7D7000
heap
page read and write
14F5000
heap
page read and write
1E21B97E000
heap
page read and write
C000420000
direct allocation
page read and write
A3E000
heap
page read and write
2015833B000
heap
page read and write
A3E000
heap
page read and write
C00005A000
direct allocation
page read and write
1E21B7F6000
heap
page read and write
C0002FA000
direct allocation
page read and write
C0003B0000
direct allocation
page read and write
C000279000
direct allocation
page read and write
B85000
heap
page read and write
A4E000
heap
page read and write
1853000
direct allocation
page read and write
C000258000
direct allocation
page read and write
A3E000
heap
page read and write
181A4275000
heap
page read and write
42B1000
direct allocation
page read and write
3430000
heap
page read and write
15F2000
heap
page read and write
24817AD3000
heap
page read and write
6EE84FE000
stack
page read and write
A53000
heap
page read and write
26EB000
stack
page read and write
181A42E5000
heap
page read and write
182B000
unkown
page readonly
181A42CF000
heap
page read and write
181A426E000
heap
page read and write
28F1F160000
trusted library allocation
page read and write
C000230000
direct allocation
page read and write
15FB000
heap
page read and write
C0000EE000
direct allocation
page read and write
30C4000
direct allocation
page read and write
A30000
unkown
page readonly
181A42C8000
heap
page read and write
E27000
unkown
page readonly
A2D000
heap
page read and write
A4E000
heap
page read and write
A53000
heap
page read and write
30A8000
direct allocation
page read and write
181A42E5000
heap
page read and write
C000400000
direct allocation
page read and write
C0002F6000
direct allocation
page read and write
1562000
heap
page read and write
2242FBD9000
heap
page read and write
A37000
heap
page read and write
A3E000
heap
page read and write
15D5000
heap
page read and write
A3E000
heap
page read and write
1E21B7F9000
heap
page read and write
181A424B000
heap
page read and write
A4B5696000
stack
page read and write
15F7000
heap
page read and write
3FBC000
direct allocation
page read and write
174D000
unkown
page write copy
4C4E000
stack
page read and write
5CFD2FE000
stack
page read and write
157C000
heap
page read and write
D6BFA7F000
stack
page read and write
A3E000
heap
page read and write
C00022C000
direct allocation
page read and write
F7C88FF000
stack
page read and write
1880000
heap
page read and write
C0000EC000
direct allocation
page read and write
C000030000
direct allocation
page read and write
A3E000
heap
page read and write
156D000
heap
page read and write
1603000
heap
page read and write
1CBD5C34000
heap
page read and write
A3E000
heap
page read and write
A2D000
heap
page read and write
1576000
heap
page read and write
2015831C000
heap
page read and write
C000498000
direct allocation
page read and write
44B5000
direct allocation
page read and write
C0002DC000
direct allocation
page read and write
1E21BF0E000
heap
page read and write
A2D000
heap
page read and write
C00042C000
direct allocation
page read and write
24817AC4000
heap
page read and write
17A4000
unkown
page read and write
C000024000
direct allocation
page read and write
179A000
direct allocation
page read and write
1569000
heap
page read and write
1E21B7E5000
heap
page read and write
C0003F0000
direct allocation
page read and write
181A42E5000
heap
page read and write
1CBD5C15000
heap
page read and write
181A42B2000
heap
page read and write
6EE8176000
stack
page read and write
A53000
heap
page read and write
C00032A000
direct allocation
page read and write
24817AD3000
heap
page read and write
181A4100000
heap
page read and write
A52000
heap
page read and write
A3E000
heap
page read and write
C00020C000
direct allocation
page read and write
1577000
heap
page read and write
1CBD5C37000
heap
page read and write
A3E000
heap
page read and write
181A426B000
heap
page read and write
28F1D350000
heap
page read and write
304B000
direct allocation
page read and write
181A4236000
heap
page read and write
181A4254000
heap
page read and write
6755FFF000
stack
page read and write
1290000
heap
page read and write
181A4266000
heap
page read and write
DB5000
unkown
page read and write
1748000
direct allocation
page read and write
1E21B9A5000
heap
page read and write
42A7000
direct allocation
page read and write
1510000
heap
page read and write
1C85F1C0000
heap
page read and write
C000368000
direct allocation
page read and write
C000132000
direct allocation
page read and write
15B3000
heap
page read and write
16A88950000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
D6BF7CF000
stack
page read and write
24817ACC000
heap
page read and write
1CBD5DF0000
heap
page read and write
1E21B9A1000
heap
page read and write
1300000
heap
page read and write
C000110000
direct allocation
page read and write
424B000
direct allocation
page read and write
1E21BA9D000
heap
page read and write
1988876D000
heap
page read and write
C0000DC000
direct allocation
page read and write
17B0000
direct allocation
page read and write
BFF17CE000
unkown
page read and write
305D000
direct allocation
page read and write
1E21B99A000
heap
page read and write
C000290000
direct allocation
page read and write
181A4305000
heap
page read and write
181A4288000
heap
page read and write
1796000
unkown
page write copy
AE2FD9D000
stack
page read and write
A4E000
heap
page read and write
C00009D000
direct allocation
page read and write
181A4286000
heap
page read and write
A4E000
heap
page read and write
A2D000
heap
page read and write
5A0000
heap
page read and write
A2D000
heap
page read and write
A53000
heap
page read and write
181A4251000
heap
page read and write
181A4220000
heap
page read and write
1E21B98E000
heap
page read and write
15C8000
heap
page read and write
24817A88000
heap
page read and write
154F000
heap
page read and write
A53000
heap
page read and write
182B000
unkown
page readonly
14D0000
heap
page read and write
C00024A000
direct allocation
page read and write
12EE000
stack
page read and write
A4E000
heap
page read and write
181A4288000
heap
page read and write
23F7B470000
heap
page read and write
181A4251000
heap
page read and write
1551000
heap
page read and write
180F000
unkown
page readonly
CA7A47F000
stack
page read and write
A4E000
heap
page read and write
1E21BF0E000
heap
page read and write
A55000
heap
page read and write
181A42E5000
heap
page read and write
181A4239000
heap
page read and write
4FCC000
stack
page read and write
A48000
heap
page read and write
34B0000
heap
page read and write
C000277000
direct allocation
page read and write
180E000
unkown
page write copy
654E000
stack
page read and write
1C85EF1E000
heap
page read and write
1E21B9AD000
heap
page read and write
181A4286000
heap
page read and write
589000
unkown
page readonly
C000006000
direct allocation
page read and write
4230000
direct allocation
page read and write
A50000
heap
page read and write
24817AB7000
heap
page read and write
181A425F000
heap
page read and write
69AF71E000
stack
page read and write
B5F000
stack
page read and write
15D0000
heap
page read and write
A4E000
heap
page read and write
4207000
direct allocation
page read and write
1A0C0910000
heap
page read and write
2242FBD0000
heap
page read and write
20158316000
heap
page read and write
4D4E000
stack
page read and write
A2D000
heap
page read and write
425B000
direct allocation
page read and write
1CBD5C03000
heap
page read and write
19888767000
heap
page read and write
C00017E000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
429C000
direct allocation
page read and write
1861000
direct allocation
page read and write
181A42C2000
heap
page read and write
1797000
unkown
page read and write
178C000
direct allocation
page read and write
DB0000
unkown
page read and write
4D1000
unkown
page execute read
160E000
heap
page read and write
C0002FC000
direct allocation
page read and write
A2D000
heap
page read and write
C000072000
direct allocation
page read and write
A3E000
heap
page read and write
A3E000
heap
page read and write
184C000
direct allocation
page read and write
1E21B97F000
heap
page read and write
C00049E000
direct allocation
page read and write
181A4305000
heap
page read and write
C000210000
direct allocation
page read and write
1E21B7FE000
heap
page read and write
28F1D271000
heap
page read and write
28F1D275000
heap
page read and write
1E21B7F6000
heap
page read and write
1E21B989000
heap
page read and write
1E21B720000
trusted library allocation
page read and write
181A426D000
heap
page read and write
201584D0000
heap
page read and write
1E21B99A000
heap
page read and write
23F7B940000
heap
page read and write
36F0000
heap
page read and write
F7C877E000
stack
page read and write
181A4272000
heap
page read and write
181A4268000
heap
page read and write
4015000
heap
page read and write
A2D000
heap
page read and write
C000272000
direct allocation
page read and write
181A4271000
heap
page read and write
23F7B2C0000
heap
page read and write
B01000
unkown
page execute read
28F1D2D8000
heap
page read and write
A2D000
heap
page read and write
24817AD9000
heap
page read and write
3F90000
direct allocation
page read and write
1C85EEE0000
heap
page read and write
A2D000
heap
page read and write
17BE000
direct allocation
page read and write
24817AD4000
heap
page read and write
181A426B000
heap
page read and write
16A887F0000
heap
page read and write
181A4305000
heap
page read and write
C000350000
direct allocation
page read and write
1798000
unkown
page write copy
CA79F9B000
stack
page read and write
19888860000
heap
page read and write
41EA000
direct allocation
page read and write
C00030A000
direct allocation
page read and write
1563000
heap
page read and write
A4E000
heap
page read and write
15EC000
heap
page read and write
185A000
direct allocation
page read and write
A4B5A7F000
stack
page read and write
1E21B97C000
heap
page read and write
1568000
heap
page read and write
1E21B7FD000
heap
page read and write
C000232000
direct allocation
page read and write
27EE000
stack
page read and write
1E21BF07000
heap
page read and write
1CBD5C35000
heap
page read and write
6510000
remote allocation
page read and write
1CBD5F65000
heap
page read and write
181A425C000
heap
page read and write
A37000
heap
page read and write
C000053000
direct allocation
page read and write
181A4305000
heap
page read and write
A2D000
heap
page read and write
F7C867B000
stack
page read and write
181A4286000
heap
page read and write
A4E000
heap
page read and write
181A42E3000
heap
page read and write
C0000CC000
direct allocation
page read and write
1E21BF0A000
heap
page read and write
201584F0000
heap
page read and write
63BE000
stack
page read and write
17D5000
direct allocation
page read and write
15ED000
heap
page read and write
23F79A60000
heap
page read and write
181A4257000
heap
page read and write
4AFE000
direct allocation
page read and write
28F1D2E0000
heap
page read and write
1E21B6D0000
heap
page read and write
1E21B98E000
heap
page read and write
C000094000
direct allocation
page read and write
C00034A000
direct allocation
page read and write
24817AA6000
heap
page read and write
A3E000
heap
page read and write
181A4254000
heap
page read and write
181A4266000
heap
page read and write
B80000
heap
page read and write
1E21BF00000
heap
page read and write
F85000
unkown
page readonly
1844000
direct allocation
page read and write
A53000
heap
page read and write
C000264000
direct allocation
page read and write
C000118000
direct allocation
page read and write
C0000F2000
direct allocation
page read and write
C000200000
direct allocation
page read and write
24817AD0000
heap
page read and write
30D3000
direct allocation
page read and write
1741000
unkown
page write copy
A2D000
heap
page read and write
A53000
heap
page read and write
A2D000
heap
page read and write
181A4274000
heap
page read and write
16A88BC6000
direct allocation
page read and write
1E21B7F6000
heap
page read and write
23F79780000
heap
page read and write
64BE000
stack
page read and write
A53000
heap
page read and write
1E21B97C000
heap
page read and write
C00021D000
direct allocation
page read and write
3F80000
direct allocation
page read and write
A3E000
heap
page read and write
15E9000
heap
page read and write
34D0000
direct allocation
page read and write
16A888D0000
heap
page read and write
DAE000
unkown
page read and write
A4B5BFE000
stack
page read and write
C00035E000
direct allocation
page read and write
3FA0000
heap
page read and write
A4E000
heap
page read and write
181A4269000
heap
page read and write
1C85EEC0000
heap
page read and write
181A424B000
heap
page read and write
C000084000
direct allocation
page read and write
3064000
direct allocation
page read and write
181A426E000
heap
page read and write
1740000
unkown
page write copy
4ECD000
stack
page read and write
181A4309000
heap
page read and write
1E21B98E000
heap
page read and write
C00030E000
direct allocation
page read and write
4310000
direct allocation
page read and write
1E21B9A0000
heap
page read and write
181A4286000
heap
page read and write
A2D000
heap
page read and write
15E5000
heap
page read and write
181A4275000
heap
page read and write
C000328000
direct allocation
page read and write
1E21B7A0000
heap
page read and write
A3E000
heap
page read and write
C000308000
direct allocation
page read and write
A3E000
heap
page read and write
1CBD5C15000
heap
page read and write
2242FAF0000
heap
page read and write
A4E000
heap
page read and write
34D0000
direct allocation
page read and write
C000140000
direct allocation
page read and write
181A4305000
heap
page read and write
181A426D000
heap
page read and write
C0000F0000
direct allocation
page read and write
D6BFAFF000
stack
page read and write
28F1D2A2000
heap
page read and write
1360000
heap
page read and write
181A42E5000
heap
page read and write
2015833B000
heap
page read and write
6760000
heap
page read and write
6755DFD000
stack
page read and write
A4F000
heap
page read and write
6510000
remote allocation
page read and write
C000086000
direct allocation
page read and write
A3E000
heap
page read and write
181A4272000
heap
page read and write
1E21B98E000
heap
page read and write
23F79860000
heap
page read and write
2242FB80000
heap
page read and write
C0002D8000
direct allocation
page read and write
582000
unkown
page read and write
24817DC0000
heap
page read and write
1E21BF04000
heap
page read and write
17FE000
unkown
page read and write
A3E000
heap
page read and write
1E21B98E000
heap
page read and write
4268000
direct allocation
page read and write
1E21B9AD000
heap
page read and write
16A88960000
heap
page read and write
12A0000
heap
page read and write
BFF1A7E000
stack
page read and write
17D1000
unkown
page read and write
15AB000
heap
page read and write
181A4286000
heap
page read and write
C000174000
direct allocation
page read and write
C000320000
direct allocation
page read and write
A31000
unkown
page execute read
1A0C0840000
heap
page read and write
24817A80000
heap
page read and write
6650000
heap
page read and write
C000204000
direct allocation
page read and write
30CC000
direct allocation
page read and write
181A424B000
heap
page read and write
24817AD9000
heap
page read and write
A4B571E000
stack
page read and write
F85000
unkown
page readonly
181A42E3000
heap
page read and write
35FE000
stack
page read and write
A3E000
heap
page read and write
1C85EEB0000
heap
page read and write
C000426000
direct allocation
page read and write
C0003D0000
direct allocation
page read and write
2242F9F0000
heap
page read and write
181A4251000
heap
page read and write
1A0C072F000
heap
page read and write
1E21B7B7000
heap
page read and write
C00036C000
direct allocation
page read and write
23F79A65000
heap
page read and write
181A4286000
heap
page read and write
C000186000
direct allocation
page read and write
C000422000
direct allocation
page read and write
A2D000
heap
page read and write
C0003DA000
direct allocation
page read and write
C00025A000
direct allocation
page read and write
181A4465000
heap
page read and write
1E21B99A000
heap
page read and write
5CFD37E000
stack
page read and write
A2D000
heap
page read and write
C000055000
direct allocation
page read and write
1CBD5C38000
heap
page read and write
154B000
heap
page read and write
A4E000
heap
page read and write
1868000
direct allocation
page read and write
A2D000
heap
page read and write
30E8000
direct allocation
page read and write
C000396000
direct allocation
page read and write
4D8D000
stack
page read and write
A2D000
heap
page read and write
1E21B7A8000
heap
page read and write
A2D000
heap
page read and write
3056000
direct allocation
page read and write
1E21BA90000
heap
page read and write
A4E000
heap
page read and write
F7C86FF000
stack
page read and write
1E21B700000
heap
page read and write
4D0000
unkown
page readonly
17E3000
direct allocation
page read and write
C000028000
direct allocation
page read and write
1518000
heap
page read and write
C0000D4000
direct allocation
page read and write
A4E000
heap
page read and write
181A42B2000
heap
page read and write
24817DC5000
heap
page read and write
C000248000
direct allocation
page read and write
A3E000
heap
page read and write
C00026C000
direct allocation
page read and write
4E8E000
stack
page read and write
9E8000
heap
page read and write
181A425F000
heap
page read and write
C000480000
direct allocation
page read and write
160E000
heap
page read and write
24817ACB000
heap
page read and write
15ED000
heap
page read and write
17C5000
direct allocation
page read and write
DC5000
unkown
page readonly
1E21B750000
heap
page read and write
67555FE000
stack
page read and write
1E21BF05000
heap
page read and write
181A4266000
heap
page read and write
15FA000
heap
page read and write
3610000
heap
page read and write
4211000
direct allocation
page read and write
A4F000
heap
page read and write
181A4275000
heap
page read and write
181A426B000
heap
page read and write
A2D000
heap
page read and write
A2D000
heap
page read and write
A2D000
heap
page read and write
16A88914000
direct allocation
page read and write
A4B5B7F000
stack
page read and write
182F000
direct allocation
page read and write
1CBD5C09000
heap
page read and write
A2D000
heap
page read and write
C000314000
direct allocation
page read and write
1E21B803000
heap
page read and write
16A88910000
direct allocation
page read and write
A4E000
heap
page read and write
1586000
heap
page read and write
2FB8000
direct allocation
page read and write
A3E000
heap
page read and write
A53000
heap
page read and write
371F000
stack
page read and write
C00025E000
direct allocation
page read and write
181A4286000
heap
page read and write
67551FF000
stack
page read and write
1565000
heap
page read and write
181A4271000
heap
page read and write
C000352000
direct allocation
page read and write
3FB4000
direct allocation
page read and write
2A30000
heap
page read and write
A3E000
heap
page read and write
1E21B6E0000
heap
page read and write
24817AC7000
heap
page read and write
A50000
heap
page read and write
24817D70000
heap
page read and write
1E21B977000
heap
page read and write
20158353000
heap
page read and write
C000360000
direct allocation
page read and write
181A4286000
heap
page read and write
1E21B7B2000
heap
page read and write
1E21B99A000
heap
page read and write
C00024E000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
1761000
direct allocation
page read and write
C000275000
direct allocation
page read and write
307B000
direct allocation
page read and write
A51000
heap
page read and write
A53000
heap
page read and write
1CBD5C28000
heap
page read and write
20158354000
heap
page read and write
A2D000
heap
page read and write
13B2000
unkown
page readonly
28F1D500000
heap
page read and write
28F1D285000
heap
page read and write
C00006A000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
181A425F000
heap
page read and write
A3E000
heap
page read and write
FBC000
stack
page read and write
3092000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
A2D000
heap
page read and write
1E21B720000
trusted library allocation
page read and write
1A0C0739000
heap
page read and write
1595000
heap
page read and write
2015834A000
heap
page read and write
DBD000
unkown
page read and write
1C85EF10000
heap
page read and write
AE2FC9B000
stack
page read and write
C000004000
direct allocation
page read and write
181A4287000
heap
page read and write
1CBD5C28000
heap
page read and write
19888960000
heap
page read and write
A50000
heap
page read and write
201582F8000
heap
page read and write
A3E000
heap
page read and write
A3E000
heap
page read and write
A3E000
heap
page read and write
181A426B000
heap
page read and write
D6BF6C7000
stack
page read and write
C000037000
direct allocation
page read and write
A4E000
heap
page read and write
1E21B983000
heap
page read and write
15DE000
heap
page read and write
4229000
direct allocation
page read and write
23F79990000
heap
page read and write
1E21B98E000
heap
page read and write
16A88BB0000
direct allocation
page read and write
C000340000
direct allocation
page read and write
A36000
heap
page read and write
C000070000
direct allocation
page read and write
2FCD000
direct allocation
page read and write
1220000
heap
page read and write
1E21B806000
heap
page read and write
181A41E0000
heap
page read and write
C000138000
direct allocation
page read and write
A53000
heap
page read and write
1558000
heap
page read and write
A48000
heap
page read and write
470C000
direct allocation
page read and write
181A425C000
heap
page read and write
28F1D249000
heap
page read and write
A4E000
heap
page read and write
1E21B7F9000
heap
page read and write
C0000FC000
direct allocation
page read and write
1E21B988000
heap
page read and write
A4E000
heap
page read and write
16A88B80000
direct allocation
page read and write
A3E000
heap
page read and write
1E21B99F000
heap
page read and write
181A426B000
heap
page read and write
17A8000
direct allocation
page read and write
DC7000
unkown
page readonly
1350000
heap
page read and write
C00012A000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
423A000
direct allocation
page read and write
C000250000
direct allocation
page read and write
1768000
direct allocation
page read and write
A4B579E000
stack
page read and write
1E21B7F9000
heap
page read and write
A3E000
heap
page read and write
A4E000
heap
page read and write
2FDC000
direct allocation
page read and write
1819000
direct allocation
page read and write
C000254000
direct allocation
page read and write
16A888F0000
heap
page read and write
6754BFB000
stack
page read and write
C00001A000
direct allocation
page read and write
6EE847E000
stack
page read and write
181A4255000
heap
page read and write
C000430000
direct allocation
page read and write
181A4254000
heap
page read and write
2015833B000
heap
page read and write
A3E000
heap
page read and write
180E000
unkown
page write copy
30B6000
direct allocation
page read and write
C000438000
direct allocation
page read and write
15F6000
heap
page read and write
1828000
direct allocation
page read and write
A50000
heap
page read and write
C000382000
direct allocation
page read and write
1368000
heap
page read and write
4205000
direct allocation
page read and write
A2D000
heap
page read and write
C000104000
direct allocation
page read and write
587000
unkown
page readonly
1E21B99D000
heap
page read and write
20158345000
heap
page read and write
5CFD27E000
stack
page read and write
7F0C0000
direct allocation
page read and write
2FEA000
direct allocation
page read and write
A4E000
heap
page read and write
A2D000
heap
page read and write
A2D000
heap
page read and write
AE2FD1E000
stack
page read and write
1555000
heap
page read and write
A3E000
heap
page read and write
20158625000
heap
page read and write
1E21B720000
trusted library allocation
page read and write
C000008000
direct allocation
page read and write
1750000
unkown
page write copy
C00033A000
direct allocation
page read and write
1E21B9AD000
heap
page read and write
16A88B88000
direct allocation
page read and write
3780000
trusted library allocation
page read and write
A4E000
heap
page read and write
C000326000
direct allocation
page read and write
2A33000
heap
page read and write
A3E000
heap
page read and write
181A425C000
heap
page read and write
A4B5AFE000
stack
page read and write
20158329000
heap
page read and write
A2D000
heap
page read and write
1776000
direct allocation
page read and write
1E21BA9B000
heap
page read and write
248179E0000
heap
page read and write
A4E000
heap
page read and write
181A42E5000
heap
page read and write
A4E000
heap
page read and write
181A4268000
heap
page read and write
1A0C0820000
heap
page read and write
C000334000
direct allocation
page read and write
1E21B7E6000
heap
page read and write
15F7000
heap
page read and write
34B3000
heap
page read and write
1CBD5C16000
heap
page read and write
1E21B809000
heap
page read and write
16AAE500000
direct allocation
page read and write
C000324000
direct allocation
page read and write
181A4253000
heap
page read and write
C00030C000
direct allocation
page read and write
C000362000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
156E000
heap
page read and write
C000114000
direct allocation
page read and write
C000354000
direct allocation
page read and write
C000144000
direct allocation
page read and write
A4E000
heap
page read and write
A4E000
heap
page read and write
A2D000
heap
page read and write
28F1D285000
heap
page read and write
C0000A1000
direct allocation
page read and write
A2D000
heap
page read and write
A2D000
heap
page read and write
C000316000
direct allocation
page read and write
C000032000
direct allocation
page read and write
181A425C000
heap
page read and write
1E21B7F9000
heap
page read and write
C000356000
direct allocation
page read and write
157C000
heap
page read and write
A2D000
heap
page read and write
181A425C000
heap
page read and write
7F3DA000
direct allocation
page read and write
181A426B000
heap
page read and write
181A426B000
heap
page read and write
A4E000
heap
page read and write
A4E000
heap
page read and write
28F0000
heap
page read and write
181A4275000
heap
page read and write
16A88B8E000
direct allocation
page read and write
A2C000
heap
page read and write
17D7000
unkown
page read and write
181A4251000
heap
page read and write
28F1EDE0000
heap
page read and write
C0000B6000
direct allocation
page read and write
A2D000
heap
page read and write
1E21BF03000
heap
page read and write
A2D000
heap
page read and write
181A4275000
heap
page read and write
ABE48FE000
stack
page read and write
1820000
direct allocation
page read and write
4209000
direct allocation
page read and write
24817AB7000
heap
page read and write
A2D000
heap
page read and write
24817AB7000
heap
page read and write
28F1D2C2000
heap
page read and write
A3E000
heap
page read and write
1E21B979000
heap
page read and write
1E21BF0A000
heap
page read and write
5CFCFCC000
stack
page read and write
35EE000
direct allocation
page read and write
666A000
heap
page read and write
157A000
heap
page read and write
C0000A3000
direct allocation
page read and write
67559FF000
stack
page read and write
15E4000
heap
page read and write
181A4309000
heap
page read and write
181A4266000
heap
page read and write
A2D000
heap
page read and write
126E000
stack
page read and write
181A425C000
heap
page read and write
A4E000
heap
page read and write
A2D000
heap
page read and write
A4E000
heap
page read and write
D6BF74F000
stack
page read and write
BFF1BFE000
stack
page read and write
14F0000
heap
page read and write
A4E000
heap
page read and write
181A42CD000
heap
page read and write
181A4269000
heap
page read and write
181A4286000
heap
page read and write
A3E000
heap
page read and write
24817AB2000
heap
page read and write
C000188000
direct allocation
page read and write
A3E000
heap
page read and write
3FC6000
direct allocation
page read and write
C000058000
direct allocation
page read and write
2015834D000
heap
page read and write
A50000
heap
page read and write
16A8896C000
heap
page read and write
28EB000
stack
page read and write
C000122000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
1270000
heap
page read and write
1E21B987000
heap
page read and write
C0000E4000
direct allocation
page read and write
A2D000
heap
page read and write
154B000
heap
page read and write
C0000C2000
direct allocation
page read and write
A3E000
heap
page read and write
579000
unkown
page write copy
C000302000
direct allocation
page read and write
3D494DD000
stack
page read and write
1A0C0720000
heap
page read and write
3F80000
direct allocation
page read and write
1E21B989000
heap
page read and write
C000092000
direct allocation
page read and write
3D4955F000
stack
page read and write
16A88BF0000
heap
page read and write
A4F000
heap
page read and write
C000214000
direct allocation
page read and write
A3C000
heap
page read and write
179E000
unkown
page write copy
20158317000
heap
page read and write
2FFF000
direct allocation
page read and write
C000124000
direct allocation
page read and write
1E21BF02000
heap
page read and write
23F79890000
heap
page read and write
A3E000
heap
page read and write
C00012C000
direct allocation
page read and write
DC0000
unkown
page write copy
C000062000
direct allocation
page read and write
30E1000
direct allocation
page read and write
A53000
heap
page read and write
3084000
direct allocation
page read and write
28F1D272000
heap
page read and write
19888A60000
heap
page read and write
C000045000
direct allocation
page read and write
A2D000
heap
page read and write
1CBD5C34000
heap
page read and write
2FBF000
direct allocation
page read and write
3074000
direct allocation
page read and write
1CBD5C33000
heap
page read and write
1784000
direct allocation
page read and write
C000234000
direct allocation
page read and write
18A0000
heap
page read and write
28F1D2D4000
heap
page read and write
A2D000
heap
page read and write
A3E000
heap
page read and write
A3E000
heap
page read and write
24817AB6000
heap
page read and write
1A0C0728000
heap
page read and write
1E21BF0B000
heap
page read and write
28F1D2A2000
heap
page read and write
A3E000
heap
page read and write
A2D000
heap
page read and write
181A4254000
heap
page read and write
24817A10000
heap
page read and write
A53000
heap
page read and write
C00023A000
direct allocation
page read and write
17DC000
direct allocation
page read and write
16AAE910000
direct allocation
page read and write
A2D000
heap
page read and write
181A423E000
heap
page read and write
DAE000
unkown
page write copy
2FF1000
direct allocation
page read and write
A2D000
heap
page read and write
180B000
direct allocation
page read and write
1E21B99A000
heap
page read and write
1E21B7D5000
heap
page read and write
181A42E3000
heap
page read and write
20158620000
heap
page read and write
590000
heap
page read and write
500E000
stack
page read and write
1295000
heap
page read and write
A2D000
heap
page read and write
1590000
heap
page read and write
183D000
direct allocation
page read and write
C000219000
direct allocation
page read and write
C00035C000
direct allocation
page read and write
427E000
direct allocation
page read and write
A31000
unkown
page execute read
248179F0000
heap
page read and write
C00033E000
direct allocation
page read and write
181A425F000
heap
page read and write
3F90000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
1E21B7D5000
heap
page read and write
A53000
heap
page read and write
A2D000
heap
page read and write
28F1D292000
heap
page read and write
16AAE890000
direct allocation
page read and write
A2D000
heap
page read and write
16AAE912000
direct allocation
page read and write
C0002F4000
direct allocation
page read and write
181A42E3000
heap
page read and write
181A423A000
heap
page read and write
C000348000
direct allocation
page read and write
5C0000
heap
page read and write
6EE81FE000
stack
page read and write
F93000
stack
page read and write
C00034E000
direct allocation
page read and write
A30000
unkown
page readonly
A2D000
heap
page read and write
A54000
heap
page read and write
2242FAD0000
heap
page read and write
2FE3000
direct allocation
page read and write
A36000
heap
page read and write
CA7A37E000
stack
page read and write
55C000
stack
page read and write
A3E000
heap
page read and write
181A42E3000
heap
page read and write
C000330000
direct allocation
page read and write
C00027B000
direct allocation
page read and write
C000244000
direct allocation
page read and write
181A4266000
heap
page read and write
1E21BA95000
heap
page read and write
181A424F000
heap
page read and write
16A889B3000
heap
page read and write
C000358000
direct allocation
page read and write
1CBD5C34000
heap
page read and write
C0000CA000
direct allocation
page read and write
181A424B000
heap
page read and write
1E21B983000
heap
page read and write
664E000
stack
page read and write
16A88BB7000
direct allocation
page read and write
A52000
heap
page read and write
A2D000
heap
page read and write
1CBD5BE8000
heap
page read and write
A4E000
heap
page read and write
181A4244000
heap
page read and write
A2D000
heap
page read and write
C0002CA000
direct allocation
page read and write
17A2000
unkown
page read and write
A4E000
heap
page read and write
C000192000
direct allocation
page read and write
BFF1AFE000
stack
page read and write
BFF1B7E000
stack
page read and write
181A424B000
heap
page read and write
1793000
direct allocation
page read and write
A3E000
heap
page read and write
A4E000
heap
page read and write
1603000
heap
page read and write
A3E000
heap
page read and write
C000002000
direct allocation
page read and write
276B000
stack
page read and write
181A4286000
heap
page read and write
15F2000
heap
page read and write
C00033C000
direct allocation
page read and write
A2D000
heap
page read and write
C0002D4000
direct allocation
page read and write
A3E000
heap
page read and write
1590000
heap
page read and write
585000
unkown
page write copy
A55000
heap
page read and write
24817AC2000
heap
page read and write
A3E000
heap
page read and write
181A4287000
heap
page read and write
BFF174B000
stack
page read and write
There are 1181 hidden memdumps, click here to show them.