IOC Report
bcLKBiuPHu.exe

loading gif

Files

File Path
Type
Category
Malicious
bcLKBiuPHu.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\_MEI63002\VCRUNTIME140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_brotli.cp311-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_bz2.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_decimal.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\_MEI63002\_hashlib.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_lzma.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_queue.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_socket.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\_ssl.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\charset_normalizer\md.cp311-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\charset_normalizer\md__mypyc.cp311-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\libcrypto-3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\libssl-3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\python311.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\select.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI63002\unicodedata.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
\Device\ConDrv
JSON data
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bcLKBiuPHu.exe
"C:\Users\user\Desktop\bcLKBiuPHu.exe"
malicious
C:\Users\user\Desktop\bcLKBiuPHu.exe
"C:\Users\user\Desktop\bcLKBiuPHu.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.ccleaner.com/business/ccleaner-business-edition
unknown
https://ccleaner.com/go/app_cc_license_agreement
unknown
https://www.ccleaner.com/docs/ccleaner/using-ccleaner/managing-auto-starting-programs
unknown
https://www.avast.com/lp-ppc-nbu-fav-cc
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.ccleaner.com/ccleaner
unknown
https://www.ccleaner.com/docs/ccleaner/ccleaner-settings/choosing-which-cookies-to-keep
unknown
https://secure.ccleaner.com/502/uurl-90zu4qtn5p?
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://www.ccleaner.com/go/app_du_support
unknown
https://piriform.zendesk.com/hc/en-us/articles/218109957-How-do-I-manage-browser-plugins-
unknown
https://peps.python.org/pep-0205/
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
http://crl.xrampsecurity.com/XGCA.crlwo
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
http://ns.useplus.org/ldf/xmp/1.0/
unknown
https://sciter.com/forums/topic/plus-custom-output-formatter-wont-work-if-they-are-written-in-htm/#p
unknown
https://www.ccleaner.com/go/app_cc_help_preloading
unknown
https://ccleaner.com/go/app_cc_privacy_data_factsheet
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://httpbin.org/
unknown
https://wwww.certigna.fr/autorites/
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://piriform.zendesk.com/hc/en-us/articles/204043884-Using-CCleaner-s-Drive-Wiper
unknown
https://www.ccleaner.com/go/app_po_survey
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://www.ccleaner.com/go/app_cc_help_schedule_setup?utm_source=ccleaner&utm_medium=application&ut
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://google.com/mail
unknown
https://www.ccleaner.com/go/app_deactivated_help
unknown
http://www.accv.es00
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
https://wwww.certigna.fr/autorites/r
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
http://repository.swisssign.com//0
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://github.com/BrowserCompanyLLC/-12/releases/download/semtag/Cloud.bat
unknown
https://www.ccleaner.com/ccleaner/browser
unknown
https://www.ccleaner.com/go/app_du_systemprotection
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://www.ccleaner.com/go/app_du_systemrestoreinfo
unknown
http://www.gimp.org/xmp/
unknown
https://httpbin.org/post
unknown
https://github.com/Ousret/charset_normalizer
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.avast.com0/
unknown
https://www.ccleaner.com/go/app_du_survey
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web
unknown
https://yahoo.com/
unknown
http://.ocx.cabhtml:file::LowTelemetry
unknown
http://crl.securetrust.com/STCA.crl0
unknown
https://www.ccleaner.com/business
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://secure.ccleaner.com/502/uurl-90zu4qtn5p?x-source=833
unknown
https://html.spec.whatwg.org/multipage/
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
https://requests.readthedocs.io
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://repository.swisssign.com/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
unknown
http://www.cert.fnmt.es/dpcs/j
unknown
https://www.ccleaner.com/docs/ccleaner/using-ccleaner/browser-cleaning
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://www.python.org
unknown
http://crl.dhimyotis.com/certignarootca.crln
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
http://iptc.org/std/Iptc4xmpExt/2008-02-29/
unknown
https://ccleaner.com/go/app_cc_privacy_product_policy
unknown
http://ocsp.accv.es0
unknown
https://www.python.org/
unknown
http://cacerts.digicert.coZ
unknown
https://json.org
unknown
https://ccleaner.com/go/app_cc_acknowledgements
unknown
https://twitter.com/
unknown
http://www.quovadisglobal.com/cps
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.4

IPs

IP
Domain
Country
Malicious
140.82.121.4
github.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
8427000
heap
page read and write
83F8000
heap
page read and write
191D000
unkown
page readonly
638C000
heap
page read and write
63A7000
heap
page read and write
642E000
heap
page read and write
89FD000
heap
page read and write
6439000
heap
page read and write
88DC000
heap
page read and write
6397000
heap
page read and write
845C000
heap
page read and write
6325000
heap
page read and write
88DA000
heap
page read and write
8888000
heap
page read and write
83D2000
heap
page read and write
62F2000
heap
page read and write
846B000
heap
page read and write
6359000
heap
page read and write
8610000
direct allocation
page read and write
6328000
heap
page read and write
8940000
heap
page read and write
191D000
unkown
page readonly
639B000
heap
page read and write
88A3000
heap
page read and write
630C000
heap
page read and write
8920000
heap
page read and write
88DA000
heap
page read and write
6340000
heap
page read and write
ED4000
unkown
page readonly
6372000
heap
page read and write
61F0000
heap
page readonly
7F6F000
stack
page read and write
83E9000
heap
page read and write
6200000
heap
page read and write
89E4000
heap
page read and write
63B1000
heap
page read and write
63F0000
heap
page read and write
642C000
heap
page read and write
6349000
heap
page read and write
1B9F000
unkown
page readonly
6349000
heap
page read and write
83DB000
heap
page read and write
8935000
heap
page read and write
6349000
heap
page read and write
846A000
heap
page read and write
8882000
heap
page read and write
63B1000
heap
page read and write
6362000
heap
page read and write
6369000
heap
page read and write
6359000
heap
page read and write
636F000
heap
page read and write
89C3000
heap
page read and write
8950000
heap
page read and write
8444000
heap
page read and write
8450000
heap
page read and write
843B000
heap
page read and write
6319000
heap
page read and write
1254000
unkown
page readonly
844C000
heap
page read and write
635B000
heap
page read and write
8991000
heap
page read and write
8433000
heap
page read and write
8444000
heap
page read and write
8982000
heap
page read and write
ED4000
unkown
page readonly
88A2000
heap
page read and write
8447000
heap
page read and write
636B000
heap
page read and write
63AD000
heap
page read and write
1BF6000
unkown
page readonly
83F4000
heap
page read and write
EC8000
unkown
page readonly
89A5000
heap
page read and write
8590000
direct allocation
page read and write
844C000
heap
page read and write
642C000
heap
page read and write
844C000
heap
page read and write
83E4000
heap
page read and write
6327000
heap
page read and write
890F000
heap
page read and write
626E000
stack
page read and write
256000
unkown
page read and write
88BE000
heap
page read and write
8471000
heap
page read and write
8442000
heap
page read and write
8986000
heap
page read and write
63AB000
heap
page read and write
8438000
heap
page read and write
62FB000
heap
page read and write
6368000
heap
page read and write
EC8000
unkown
page readonly
83D3000
heap
page read and write
83E4000
heap
page read and write
6373000
heap
page read and write
842C000
heap
page read and write
8407000
heap
page read and write
842C000
heap
page read and write
89C3000
heap
page read and write
8904000
heap
page read and write
844C000
heap
page read and write
ED4000
unkown
page readonly
8B00000
direct allocation
page read and write
888F000
heap
page read and write
888A000
heap
page read and write
6390000
heap
page read and write
846C000
heap
page read and write
849A000
heap
page read and write
88DA000
heap
page read and write
633C000
heap
page read and write
63BD000
heap
page read and write
635F000
heap
page read and write
63B1000
heap
page read and write
83E0000
heap
page read and write
632E000
heap
page read and write
C59000
unkown
page readonly
8858000
heap
page read and write
6373000
heap
page read and write
8455000
heap
page read and write
6373000
heap
page read and write
6349000
heap
page read and write
6356000
heap
page read and write
846A000
heap
page read and write
842F000
heap
page read and write
63B1000
heap
page read and write
1911000
unkown
page readonly
F82000
unkown
page readonly
83F1000
heap
page read and write
840F000
heap
page read and write
8965000
heap
page read and write
8405000
heap
page read and write
83F2000
heap
page read and write
6311000
heap
page read and write
8407000
heap
page read and write
898B000
heap
page read and write
83FF000
heap
page read and write
6397000
heap
page read and write
84B0000
heap
page read and write
88C5000
heap
page read and write
8881000
heap
page read and write
84C7000
heap
page read and write
639E000
heap
page read and write
888A000
heap
page read and write
638F000
heap
page read and write
8976000
heap
page read and write
6396000
heap
page read and write
88F1000
heap
page read and write
88F8000
heap
page read and write
6397000
heap
page read and write
630D000
heap
page read and write
88AE000
heap
page read and write
C59000
unkown
page readonly
88AC000
heap
page read and write
1883000
unkown
page readonly
8920000
heap
page read and write
62F8000
heap
page read and write
8926000
heap
page read and write
638A000
heap
page read and write
8982000
heap
page read and write
1257000
unkown
page readonly
6397000
heap
page read and write
6393000
heap
page read and write
89A1000
heap
page read and write
83EF000
heap
page read and write
83D2000
heap
page read and write
63B1000
heap
page read and write
8867000
heap
page read and write
8909000
heap
page read and write
635F000
heap
page read and write
8917000
heap
page read and write
88A3000
heap
page read and write
8404000
heap
page read and write
892E000
heap
page read and write
84B3000
heap
page read and write
83EF000
heap
page read and write
6396000
heap
page read and write
892E000
heap
page read and write
8918000
heap
page read and write
8410000
heap
page read and write
63B1000
heap
page read and write
889C000
heap
page read and write
6393000
heap
page read and write
8412000
heap
page read and write
844C000
heap
page read and write
8975000
heap
page read and write
88F8000
heap
page read and write
88BC000
heap
page read and write
89C3000
heap
page read and write
8471000
heap
page read and write
893A000
heap
page read and write
8976000
heap
page read and write
6290000
direct allocation
page read and write
89BF000
heap
page read and write
6314000
heap
page read and write
8462000
heap
page read and write
8926000
heap
page read and write
844C000
heap
page read and write
636C000
heap
page read and write
89C3000
heap
page read and write
88D7000
heap
page read and write
88AE000
heap
page read and write
6373000
heap
page read and write
88D0000
heap
page read and write
84BB000
heap
page read and write
6391000
heap
page read and write
885B000
heap
page read and write
83EF000
heap
page read and write
88A3000
heap
page read and write
8999000
heap
page read and write
8B40000
direct allocation
page read and write
61E0000
stack
page read and write
6393000
heap
page read and write
63B3000
heap
page read and write
6399000
heap
page read and write
F82000
unkown
page readonly
83E5000
heap
page read and write
1BF6000
unkown
page readonly
642E000
heap
page read and write
892E000
heap
page read and write
6351000
heap
page read and write
6357000
heap
page read and write
6329000
heap
page read and write
83EF000
heap
page read and write
83E7000
heap
page read and write
6333000
heap
page read and write
88DD000
heap
page read and write
63FB000
heap
page read and write
844C000
heap
page read and write
6349000
heap
page read and write
220000
unkown
page readonly
6398000
heap
page read and write
6349000
heap
page read and write
843B000
heap
page read and write
6338000
heap
page read and write
7CB0000
direct allocation
page read and write
6353000
heap
page read and write
83FE000
heap
page read and write
638A000
heap
page read and write
843D000
heap
page read and write
8497000
heap
page read and write
640D000
heap
page read and write
6359000
heap
page read and write
88F5000
heap
page read and write
8890000
heap
page read and write
88DD000
heap
page read and write
83EC000
heap
page read and write
6362000
heap
page read and write
63A4000
heap
page read and write
636A000
heap
page read and write
8920000
heap
page read and write
89A6000
heap
page read and write
88AF000
heap
page read and write
8409000
heap
page read and write
8497000
heap
page read and write
83EF000
heap
page read and write
6390000
heap
page read and write
84CA000
heap
page read and write
83F4000
heap
page read and write
83E5000
heap
page read and write
6354000
heap
page read and write
642C000
heap
page read and write
6390000
heap
page read and write
83E5000
heap
page read and write
888B000
heap
page read and write
892E000
heap
page read and write
8110000
direct allocation
page read and write
ED4000
unkown
page readonly
6373000
heap
page read and write
84B6000
heap
page read and write
890B000
heap
page read and write
1911000
unkown
page readonly
628E000
stack
page read and write
632B000
heap
page read and write
844C000
heap
page read and write
63B5000
heap
page read and write
8937000
heap
page read and write
636C000
heap
page read and write
83E3000
heap
page read and write
6396000
heap
page read and write
84B0000
heap
page read and write
84BD000
heap
page read and write
8471000
heap
page read and write
88DA000
heap
page read and write
6387000
heap
page read and write
8497000
heap
page read and write
631F000
heap
page read and write
638F000
heap
page read and write
88F1000
heap
page read and write
83DA000
heap
page read and write
83F0000
heap
page read and write
844F000
heap
page read and write
83F8000
heap
page read and write
83DB000
heap
page read and write
898B000
heap
page read and write
83F4000
heap
page read and write
89B4000
heap
page read and write
6370000
heap
page read and write
642E000
heap
page read and write
F80000
unkown
page readonly
88F1000
heap
page read and write
6305000
heap
page read and write
C59000
unkown
page readonly
635B000
heap
page read and write
8854000
heap
page read and write
6235000
heap
page read and write
8427000
heap
page read and write
1B9F000
unkown
page readonly
637A000
heap
page read and write
8914000
heap
page read and write
8986000
heap
page read and write
8904000
heap
page read and write
8408000
heap
page read and write
631E000
heap
page read and write
6373000
heap
page read and write
844C000
heap
page read and write
83E5000
heap
page read and write
1BA1000
unkown
page readonly
6373000
heap
page read and write
6396000
heap
page read and write
1257000
unkown
page readonly
642C000
heap
page read and write
8474000
heap
page read and write
1911000
unkown
page readonly
88E2000
heap
page read and write
8475000
heap
page read and write
6335000
heap
page read and write
6397000
heap
page read and write
83F8000
heap
page read and write
8926000
heap
page read and write
83F4000
heap
page read and write
6361000
heap
page read and write
83D8000
heap
page read and write
6325000
heap
page read and write
6302000
heap
page read and write
8465000
heap
page read and write
6347000
heap
page read and write
6397000
heap
page read and write
642E000
heap
page read and write
6329000
heap
page read and write
83EB000
heap
page read and write
6390000
heap
page read and write
6325000
heap
page read and write
6349000
heap
page read and write
8430000
heap
page read and write
6359000
heap
page read and write
63A9000
heap
page read and write
83F8000
heap
page read and write
631E000
heap
page read and write
8BE0000
direct allocation
page read and write
6396000
heap
page read and write
8971000
heap
page read and write
89C3000
heap
page read and write
89BC000
heap
page read and write
6393000
heap
page read and write
6326000
heap
page read and write
6349000
heap
page read and write
88AE000
heap
page read and write
7CAE000
stack
page read and write
635D000
heap
page read and write
84B7000
heap
page read and write
6386000
heap
page read and write
844E000
heap
page read and write
642E000
heap
page read and write
221000
unkown
page execute read
6349000
heap
page read and write
84BE000
heap
page read and write
63B3000
heap
page read and write
8471000
heap
page read and write
635F000
heap
page read and write
88BC000
heap
page read and write
63A8000
heap
page read and write
8926000
heap
page read and write
8874000
heap
page read and write
63AA000
heap
page read and write
6650000
heap
page read and write
84C7000
heap
page read and write
83EF000
heap
page read and write
8972000
heap
page read and write
8444000
heap
page read and write
6390000
heap
page read and write
8430000
heap
page read and write
8442000
heap
page read and write
639D000
heap
page read and write
6390000
heap
page read and write
891E000
heap
page read and write
83DE000
heap
page read and write
844F000
heap
page read and write
6390000
heap
page read and write
F82000
unkown
page readonly
6311000
heap
page read and write
6373000
heap
page read and write
63B9000
heap
page read and write
639E000
heap
page read and write
6325000
heap
page read and write
83F8000
heap
page read and write
639C000
heap
page read and write
892E000
heap
page read and write
6397000
heap
page read and write
6349000
heap
page read and write
6319000
heap
page read and write
843D000
heap
page read and write
62FC000
heap
page read and write
84BF000
heap
page read and write
8862000
heap
page read and write
84B0000
heap
page read and write
EC8000
unkown
page readonly
259000
unkown
page readonly
6397000
heap
page read and write
6393000
heap
page read and write
6429000
heap
page read and write
83F4000
heap
page read and write
845F000
heap
page read and write
6330000
heap
page read and write
256000
unkown
page write copy
8469000
heap
page read and write
639D000
heap
page read and write
630F000
heap
page read and write
89F2000
heap
page read and write
F82000
unkown
page readonly
83DE000
heap
page read and write
845C000
heap
page read and write
6230000
heap
page read and write
C59000
unkown
page readonly
6356000
heap
page read and write
8429000
heap
page read and write
898E000
heap
page read and write
635F000
heap
page read and write
62FA000
heap
page read and write
63A8000
heap
page read and write
F80000
unkown
page readonly
635F000
heap
page read and write
8443000
heap
page read and write
1254000
unkown
page readonly
894C000
heap
page read and write
88EB000
heap
page read and write
88DA000
heap
page read and write
638D000
heap
page read and write
8426000
heap
page read and write
66B0000
heap
page read and write
1883000
unkown
page readonly
84C6000
heap
page read and write
893E000
heap
page read and write
6397000
heap
page read and write
635E000
heap
page read and write
8447000
heap
page read and write
8462000
heap
page read and write
638F000
heap
page read and write
844E000
heap
page read and write
6390000
heap
page read and write
8939000
heap
page read and write
8870000
heap
page read and write
88F1000
heap
page read and write
6320000
heap
page read and write
7D20000
heap
page read and write
898E000
heap
page read and write
6369000
heap
page read and write
88E2000
heap
page read and write
637E000
heap
page read and write
892E000
heap
page read and write
6345000
heap
page read and write
891F000
heap
page read and write
637E000
heap
page read and write
8931000
heap
page read and write
642E000
heap
page read and write
83D1000
heap
page read and write
6390000
heap
page read and write
8920000
heap
page read and write
844C000
heap
page read and write
844E000
heap
page read and write
83E3000
heap
page read and write
84D0000
direct allocation
page read and write
62FB000
heap
page read and write
8999000
heap
page read and write
8438000
heap
page read and write
83F4000
heap
page read and write
6397000
heap
page read and write
842E000
heap
page read and write
83FB000
heap
page read and write
6319000
heap
page read and write
8471000
heap
page read and write
84B0000
heap
page read and write
6385000
heap
page read and write
8909000
heap
page read and write
6373000
heap
page read and write
88FC000
heap
page read and write
6390000
heap
page read and write
63A3000
heap
page read and write
ECC000
unkown
page readonly
6390000
heap
page read and write
8915000
heap
page read and write
83E5000
heap
page read and write
8462000
heap
page read and write
8409000
heap
page read and write
8888000
heap
page read and write
6312000
heap
page read and write
248000
unkown
page readonly
8982000
heap
page read and write
6397000
heap
page read and write
896C000
heap
page read and write
63BD000
heap
page read and write
844C000
heap
page read and write
6398000
heap
page read and write
8403000
heap
page read and write
83DC000
heap
page read and write
8405000
heap
page read and write
6337000
heap
page read and write
8926000
heap
page read and write
83E6000
heap
page read and write
6341000
heap
page read and write
5D9C000
stack
page read and write
ECC000
unkown
page readonly
840B000
heap
page read and write
846D000
heap
page read and write
89FE000
heap
page read and write
8889000
heap
page read and write
635A000
heap
page read and write
63B3000
heap
page read and write
8455000
heap
page read and write
89A6000
heap
page read and write
635B000
heap
page read and write
84BA000
heap
page read and write
6343000
heap
page read and write
8417000
heap
page read and write
633F000
heap
page read and write
639F000
heap
page read and write
6397000
heap
page read and write
84C8000
heap
page read and write
1254000
unkown
page readonly
63A7000
heap
page read and write
63BD000
heap
page read and write
63B3000
heap
page read and write
8431000
heap
page read and write
639C000
heap
page read and write
63A9000
heap
page read and write
63A9000
heap
page read and write
8920000
heap
page read and write
63B3000
heap
page read and write
892E000
heap
page read and write
892E000
heap
page read and write
6318000
heap
page read and write
89CD000
heap
page read and write
1911000
unkown
page readonly
84CD000
heap
page read and write
8926000
heap
page read and write
88FA000
heap
page read and write
642C000
heap
page read and write
83E5000
heap
page read and write
258000
unkown
page read and write
89BE000
heap
page read and write
637C000
heap
page read and write
62FD000
heap
page read and write
ECC000
unkown
page readonly
191D000
unkown
page readonly
6361000
heap
page read and write
6361000
heap
page read and write
8471000
heap
page read and write
844C000
heap
page read and write
6373000
heap
page read and write
8471000
heap
page read and write
635F000
heap
page read and write
6397000
heap
page read and write
6373000
heap
page read and write
8990000
heap
page read and write
6344000
heap
page read and write
888B000
heap
page read and write
88DB000
heap
page read and write
844E000
heap
page read and write
8942000
heap
page read and write
6390000
heap
page read and write
83D0000
heap
page read and write
6373000
heap
page read and write
8418000
heap
page read and write
89BC000
heap
page read and write
83E3000
heap
page read and write
89F2000
heap
page read and write
890C000
heap
page read and write
842F000
heap
page read and write
890C000
heap
page read and write
6340000
heap
page read and write
844C000
heap
page read and write
63B1000
heap
page read and write
8468000
heap
page read and write
6373000
heap
page read and write
8405000
heap
page read and write
844E000
heap
page read and write
84B0000
heap
page read and write
88BC000
heap
page read and write
844C000
heap
page read and write
88F1000
heap
page read and write
892F000
heap
page read and write
8451000
heap
page read and write
83EF000
heap
page read and write
6347000
heap
page read and write
6342000
heap
page read and write
8920000
heap
page read and write
88F1000
heap
page read and write
8426000
heap
page read and write
89E8000
heap
page read and write
8423000
heap
page read and write
89DC000
heap
page read and write
634E000
heap
page read and write
63B1000
heap
page read and write
8879000
heap
page read and write
888F000
heap
page read and write
62C0000
heap
page read and write
8427000
heap
page read and write
6393000
heap
page read and write
6366000
heap
page read and write
6396000
heap
page read and write
63B3000
heap
page read and write
889F000
heap
page read and write
844C000
heap
page read and write
83DC000
heap
page read and write
1883000
unkown
page readonly
6373000
heap
page read and write
89AA000
heap
page read and write
631F000
heap
page read and write
6327000
heap
page read and write
5DF0000
heap
page read and write
88F1000
heap
page read and write
844C000
heap
page read and write
89D6000
heap
page read and write
84CE000
heap
page read and write
EC8000
unkown
page readonly
8967000
heap
page read and write
642F000
heap
page read and write
6327000
heap
page read and write
6390000
heap
page read and write
83DB000
heap
page read and write
6397000
heap
page read and write
1911000
unkown
page readonly
844C000
heap
page read and write
8465000
heap
page read and write
8431000
heap
page read and write
639C000
heap
page read and write
84B0000
heap
page read and write
83D7000
heap
page read and write
8471000
heap
page read and write
8991000
heap
page read and write
88B0000
heap
page read and write
890D000
heap
page read and write
259000
unkown
page readonly
8926000
heap
page read and write
8443000
heap
page read and write
892E000
heap
page read and write
634E000
heap
page read and write
635F000
heap
page read and write
844A000
heap
page read and write
8550000
direct allocation
page read and write
1257000
unkown
page readonly
8920000
heap
page read and write
8458000
heap
page read and write
6349000
heap
page read and write
632F000
heap
page read and write
6325000
heap
page read and write
89D2000
heap
page read and write
642C000
heap
page read and write
8936000
heap
page read and write
8460000
heap
page read and write
F80000
unkown
page readonly
88DA000
heap
page read and write
C59000
unkown
page readonly
636C000
heap
page read and write
8878000
heap
page read and write
6397000
heap
page read and write
6390000
heap
page read and write
83F1000
heap
page read and write
8949000
heap
page read and write
633C000
heap
page read and write
634F000
heap
page read and write
6393000
heap
page read and write
6399000
heap
page read and write
5DF0000
heap
page read and write
220000
unkown
page readonly
83F2000
heap
page read and write
259000
unkown
page readonly
6390000
heap
page read and write
8510000
direct allocation
page read and write
6373000
heap
page read and write
8426000
heap
page read and write
8476000
heap
page read and write
6332000
heap
page read and write
88BC000
heap
page read and write
63A5000
heap
page read and write
6390000
heap
page read and write
6332000
heap
page read and write
89B3000
heap
page read and write
885B000
heap
page read and write
1883000
unkown
page readonly
8433000
heap
page read and write
631F000
heap
page read and write
83FB000
heap
page read and write
6310000
heap
page read and write
8439000
heap
page read and write
256000
unkown
page read and write
639D000
heap
page read and write
636C000
heap
page read and write
6373000
heap
page read and write
6349000
heap
page read and write
1B9F000
unkown
page readonly
7F1E000
stack
page read and write
6397000
heap
page read and write
221000
unkown
page execute read
6397000
heap
page read and write
F82000
unkown
page readonly
888A000
heap
page read and write
892E000
heap
page read and write
6349000
heap
page read and write
6340000
heap
page read and write
8886000
heap
page read and write
642E000
heap
page read and write
843A000
heap
page read and write
1911000
unkown
page readonly
84B0000
heap
page read and write
8476000
heap
page read and write
888A000
heap
page read and write
63B3000
heap
page read and write
642C000
heap
page read and write
ECC000
unkown
page readonly
6390000
heap
page read and write
83F4000
heap
page read and write
846F000
heap
page read and write
6397000
heap
page read and write
631D000
heap
page read and write
88C1000
heap
page read and write
891C000
heap
page read and write
8431000
heap
page read and write
84B0000
heap
page read and write
6373000
heap
page read and write
83D9000
heap
page read and write
1BA1000
unkown
page readonly
83E3000
heap
page read and write
88D0000
heap
page read and write
88CF000
heap
page read and write
6390000
heap
page read and write
6390000
heap
page read and write
62FF000
heap
page read and write
89C3000
heap
page read and write
891E000
heap
page read and write
83F4000
heap
page read and write
89B3000
heap
page read and write
6373000
heap
page read and write
8920000
heap
page read and write
8418000
heap
page read and write
8947000
heap
page read and write
63A1000
heap
page read and write
8870000
heap
page read and write
83F2000
heap
page read and write
1BF6000
unkown
page readonly
6374000
heap
page read and write
89CC000
heap
page read and write
83D7000
heap
page read and write
6373000
heap
page read and write
63B1000
heap
page read and write
844C000
heap
page read and write
8863000
heap
page read and write
6371000
heap
page read and write
89D9000
heap
page read and write
63B3000
heap
page read and write
843D000
heap
page read and write
8468000
heap
page read and write
62FC000
heap
page read and write
EC8000
unkown
page readonly
6390000
heap
page read and write
83FB000
heap
page read and write
6397000
heap
page read and write
642C000
heap
page read and write
6397000
heap
page read and write
88D0000
heap
page read and write
88FC000
heap
page read and write
890C000
heap
page read and write
642C000
heap
page read and write
83EF000
heap
page read and write
88A2000
heap
page read and write
88A0000
heap
page read and write
632D000
heap
page read and write
1883000
unkown
page readonly
8446000
heap
page read and write
83EF000
heap
page read and write
8916000
heap
page read and write
6351000
heap
page read and write
8412000
heap
page read and write
83DB000
heap
page read and write
8497000
heap
page read and write
83EB000
heap
page read and write
891D000
heap
page read and write
248000
unkown
page readonly
8981000
heap
page read and write
8445000
heap
page read and write
899E000
heap
page read and write
844C000
heap
page read and write
8407000
heap
page read and write
6358000
heap
page read and write
6373000
heap
page read and write
6390000
heap
page read and write
88E2000
heap
page read and write
638E000
heap
page read and write
8432000
heap
page read and write
61E6000
stack
page read and write
1257000
unkown
page readonly
F82000
unkown
page readonly
8863000
heap
page read and write
888B000
heap
page read and write
63B3000
heap
page read and write
63B3000
heap
page read and write
6397000
heap
page read and write
810F000
stack
page read and write
8449000
heap
page read and write
6373000
heap
page read and write
8497000
heap
page read and write
8467000
heap
page read and write
84B0000
heap
page read and write
61E4000
stack
page read and write
637A000
heap
page read and write
6280000
heap
page read and write
643B000
heap
page read and write
842A000
heap
page read and write
84B0000
heap
page read and write
8890000
heap
page read and write
ECC000
unkown
page readonly
EC8000
unkown
page readonly
220000
unkown
page readonly
84B0000
heap
page read and write
248000
unkown
page readonly
1257000
unkown
page readonly
62F7000
heap
page read and write
88A3000
heap
page read and write
638F000
heap
page read and write
ECC000
unkown
page readonly
6388000
heap
page read and write
259000
unkown
page readonly
844C000
heap
page read and write
8476000
heap
page read and write
8926000
heap
page read and write
8497000
heap
page read and write
6329000
heap
page read and write
637A000
heap
page read and write
8455000
heap
page read and write
8465000
heap
page read and write
8903000
heap
page read and write
8460000
heap
page read and write
634C000
heap
page read and write
F80000
unkown
page readonly
6396000
heap
page read and write
6354000
heap
page read and write
885B000
heap
page read and write
6200000
heap
page read and write
63BD000
heap
page read and write
84CA000
heap
page read and write
6352000
heap
page read and write
842D000
heap
page read and write
6373000
heap
page read and write
8892000
heap
page read and write
63B3000
heap
page read and write
6620000
heap
page read and write
8497000
heap
page read and write
63B3000
heap
page read and write
83EF000
heap
page read and write
88FB000
heap
page read and write
8463000
heap
page read and write
890E000
heap
page read and write
6334000
heap
page read and write
6329000
heap
page read and write
63B6000
heap
page read and write
6398000
heap
page read and write
83F3000
heap
page read and write
259000
unkown
page readonly
84BD000
heap
page read and write
6363000
heap
page read and write
630F000
heap
page read and write
844C000
heap
page read and write
6348000
heap
page read and write
636C000
heap
page read and write
83F2000
heap
page read and write
63BA000
heap
page read and write
8877000
heap
page read and write
8457000
heap
page read and write
6327000
heap
page read and write
8431000
heap
page read and write
F80000
unkown
page readonly
844C000
heap
page read and write
6328000
heap
page read and write
636F000
heap
page read and write
88DA000
heap
page read and write
843B000
heap
page read and write
220000
unkown
page readonly
6358000
heap
page read and write
62FB000
heap
page read and write
893E000
heap
page read and write
885A000
heap
page read and write
62F6000
heap
page read and write
63B3000
heap
page read and write
8851000
heap
page read and write
635F000
heap
page read and write
844C000
heap
page read and write
6319000
heap
page read and write
191D000
unkown
page readonly
891A000
heap
page read and write
8790000
direct allocation
page read and write
88D1000
heap
page read and write
84C7000
heap
page read and write
88D9000
heap
page read and write
6362000
heap
page read and write
631C000
heap
page read and write
8474000
heap
page read and write
635F000
heap
page read and write
846D000
heap
page read and write
6379000
heap
page read and write
6397000
heap
page read and write
84B0000
heap
page read and write
1254000
unkown
page readonly
8412000
heap
page read and write
6438000
heap
page read and write
843D000
heap
page read and write
191D000
unkown
page readonly
6313000
heap
page read and write
89D6000
heap
page read and write
F80000
unkown
page readonly
62F9000
heap
page read and write
ED4000
unkown
page readonly
89B3000
heap
page read and write
6349000
heap
page read and write
8432000
heap
page read and write
8650000
direct allocation
page read and write
8407000
heap
page read and write
1883000
unkown
page readonly
8497000
heap
page read and write
88D8000
heap
page read and write
887B000
heap
page read and write
62F5000
heap
page read and write
6319000
heap
page read and write
898D000
heap
page read and write
8470000
heap
page read and write
6389000
heap
page read and write
8871000
heap
page read and write
892E000
heap
page read and write
256000
unkown
page write copy
6349000
heap
page read and write
85D0000
direct allocation
page read and write
221000
unkown
page execute read
8445000
heap
page read and write
8926000
heap
page read and write
6349000
heap
page read and write
8471000
heap
page read and write
83D1000
heap
page read and write
88A7000
heap
page read and write
635B000
heap
page read and write
1B9F000
unkown
page readonly
6390000
heap
page read and write
191D000
unkown
page readonly
8474000
heap
page read and write
248000
unkown
page readonly
6307000
heap
page read and write
6396000
heap
page read and write
8868000
heap
page read and write
63BD000
heap
page read and write
630E000
heap
page read and write
221000
unkown
page execute read
8407000
heap
page read and write
1257000
unkown
page readonly
636E000
heap
page read and write
6374000
heap
page read and write
8430000
heap
page read and write
88A9000
heap
page read and write
63BD000
heap
page read and write
8412000
heap
page read and write
634D000
heap
page read and write
8883000
heap
page read and write
6329000
heap
page read and write
83F4000
heap
page read and write
8952000
heap
page read and write
62FF000
heap
page read and write
6398000
heap
page read and write
83F2000
heap
page read and write
84B4000
heap
page read and write
8442000
heap
page read and write
6350000
heap
page read and write
6397000
heap
page read and write
83F2000
heap
page read and write
6399000
heap
page read and write
1BA1000
unkown
page readonly
6397000
heap
page read and write
8438000
heap
page read and write
83D2000
heap
page read and write
6393000
heap
page read and write
8471000
heap
page read and write
88F1000
heap
page read and write
C59000
unkown
page readonly
88FF000
heap
page read and write
638E000
heap
page read and write
845B000
heap
page read and write
84CE000
heap
page read and write
8926000
heap
page read and write
8863000
heap
page read and write
6397000
heap
page read and write
1254000
unkown
page readonly
83E7000
heap
page read and write
259000
unkown
page readonly
83D6000
heap
page read and write
636C000
heap
page read and write
896D000
heap
page read and write
6359000
heap
page read and write
6363000
heap
page read and write
6397000
heap
page read and write
844D000
heap
page read and write
8926000
heap
page read and write
5D9C000
stack
page read and write
842C000
heap
page read and write
6390000
heap
page read and write
83D1000
heap
page read and write
89C2000
heap
page read and write
88A8000
heap
page read and write
8926000
heap
page read and write
83DE000
heap
page read and write
642C000
heap
page read and write
83D2000
heap
page read and write
6349000
heap
page read and write
8150000
direct allocation
page read and write
634A000
heap
page read and write
8861000
heap
page read and write
842C000
heap
page read and write
6390000
heap
page read and write
889B000
heap
page read and write
83E5000
heap
page read and write
638E000
heap
page read and write
637D000
heap
page read and write
1254000
unkown
page readonly
633D000
heap
page read and write
83D1000
heap
page read and write
846D000
heap
page read and write
63BD000
heap
page read and write
845E000
heap
page read and write
890C000
heap
page read and write
8964000
heap
page read and write
8877000
heap
page read and write
63B2000
heap
page read and write
6397000
heap
page read and write
8431000
heap
page read and write
ED4000
unkown
page readonly
631B000
heap
page read and write
8442000
heap
page read and write
6373000
heap
page read and write
8455000
heap
page read and write
1BF6000
unkown
page readonly
8860000
heap
page read and write
844E000
heap
page read and write
631E000
heap
page read and write
61F0000
heap
page readonly
6390000
heap
page read and write
845E000
heap
page read and write
88D5000
heap
page read and write
8438000
heap
page read and write
8920000
heap
page read and write
6386000
heap
page read and write
63A7000
heap
page read and write
83F0000
heap
page read and write
84C7000
heap
page read and write
635F000
heap
page read and write
6373000
heap
page read and write
63B3000
heap
page read and write
8405000
heap
page read and write
8943000
heap
page read and write
8471000
heap
page read and write
8883000
heap
page read and write
88CE000
heap
page read and write
83E5000
heap
page read and write
6397000
heap
page read and write
892F000
heap
page read and write
83F2000
heap
page read and write
638C000
heap
page read and write
6397000
heap
page read and write
893C000
heap
page read and write
89DA000
heap
page read and write
89FD000
heap
page read and write
258000
unkown
page read and write
8497000
heap
page read and write
83EF000
heap
page read and write
8920000
heap
page read and write
6347000
heap
page read and write
8968000
heap
page read and write
63B1000
heap
page read and write
6340000
heap
page read and write
642C000
heap
page read and write
6304000
heap
page read and write
6390000
heap
page read and write
1BA1000
unkown
page readonly
83F8000
heap
page read and write
8457000
heap
page read and write
8451000
heap
page read and write
83E7000
heap
page read and write
83FE000
heap
page read and write
633B000
heap
page read and write
7D70000
heap
page read and write
6319000
heap
page read and write
6332000
heap
page read and write
8432000
heap
page read and write
892E000
heap
page read and write
6429000
heap
page read and write
There are 1087 hidden memdumps, click here to show them.