IOC Report
lcc333.exe

loading gif

Files

File Path
Type
Category
Malicious
lcc333.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Windows\System32\AutoDesk.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\app_process.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\nircmd.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI6122\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI6122\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Desktop\lcc333.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\windows2.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\play.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\python.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c python.bat
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c play.bat
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\user\Desktop\lcc333.bat
malicious
C:\Windows\System32\cmd.exe
cmd /c "AutoDesk.exe --pubkey BQQYZKHfNhmUrdU2UhwZzWdVpiVzdBCa3qLerhDrcbAs"
malicious
C:\Windows\System32\nircmd.exe
nircmd exec hide "app_process.exe"
malicious
C:\Windows\System32\app_process.exe
"app_process.exe"
malicious
C:\Windows\System32\AutoDesk.exe
AutoDesk.exe --pubkey BQQYZKHfNhmUrdU2UhwZzWdVpiVzdBCa3qLerhDrcbAs
malicious
C:\Windows\System32\nircmd.exe
nircmd exec hide "app_process.exe"
malicious
C:\Windows\System32\app_process.exe
"app_process.exe"
malicious
C:\Windows\System32\cmd.exe
cmd /c "AutoDesk.exe --pubkey BQQYZKHfNhmUrdU2UhwZzWdVpiVzdBCa3qLerhDrcbAs"
malicious
C:\Windows\System32\AutoDesk.exe
AutoDesk.exe --pubkey BQQYZKHfNhmUrdU2UhwZzWdVpiVzdBCa3qLerhDrcbAs
malicious
C:\Windows\System32\nircmd.exe
nircmd exec hide "app_process.exe"
malicious
C:\Windows\System32\app_process.exe
"app_process.exe"
malicious
C:\Windows\System32\nircmd.exe
nircmd exec hide "app_process.exe"
malicious
C:\Windows\System32\app_process.exe
"app_process.exe"
malicious
C:\Users\user\Desktop\lcc333.exe
"C:\Users\user\Desktop\lcc333.exe"
C:\Users\user\Desktop\lcc333.exe
"C:\Users\user\Desktop\lcc333.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 120
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 600
C:\Windows\System32\taskkill.exe
taskkill /f /im AutoDesk.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 120
C:\Windows\System32\taskkill.exe
taskkill /f /im app_process.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 600
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://google.com/
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529527
172.233.211.124
https://ec1ipse.me/v2/ws?timestamp=1732529528
172.233.211.124
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://www.firmaprofesional.com/cps0
unknown
http://20.2.154.66:48080/admin-api/ore/wallet/getPri
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://nircmd.nirsoft.net/%s.htmlhttp://nircmd.nirsoft.net
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://github.com/clap-rs/clap/issues
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
http://crl.securetrust.com/STCA.crl0
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529493
172.233.211.124
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
http://repository.swisssign.com/E%
unknown
https://html.spec.whatwg.org/multipage/
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
https://www.nirsoft.netopenIf
unknown
http://43.199.41.35:8080/windows2.zip
43.199.41.35
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529467
172.233.211.124
https://ec1ipse.me/v2/ws?timestamp=1732529500
172.233.211.124
http://20.2.154.66:48080/admin-api/ore/wallet/updatePri?pub=4ACz7dexqbAN71zD5WANZLKDYQuhz8D4j6pdkmyK
unknown
https://github.com/clap-rs/clap/issuesI
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529501
172.233.211.124
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://repository.swisssign.com/
unknown
http://www.cert.fnmt.es/dpcs/w
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529460
172.233.211.124
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529508
172.233.211.124
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
http://20.2.154.66:48080/admin-api/ore/wallet/updatePri?pub=7KD5XxiuTcgebvuXysq3sFXGS4A2UZTkANkpjuZJ
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
http://crl.dhimyotis.com/certignarootca.crlo
unknown
https://json.org
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529514
172.233.211.124
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/howto/mro.html.
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529473
172.233.211.124
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://google.com/
unknown
http://nircmd.nirsoft.net
unknown
https://www.nirsoft.net
unknown
http://nircmd.nirsoft.net/%s.html
unknown
http://google.com/mail/
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
http://20.2.154.66:48080/admin-api/ore/wallet/getPrisrc
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://www.openssl.org/H
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529521
172.233.211.124
http://crl.certigna.fr/certignarootca.crl01
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529486
172.233.211.124
https://google.com/mail
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://ec1ipse.me/v2/ws?timestamp=1732529480
172.233.211.124
https://ec1ipse.me/miner/rewardspubkey
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://20.2.154.66:48080/admin-api/ore/wallet/updatePripubbalfirst
unknown
There are 68 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ec1ipse.me
172.233.211.124

IPs

IP
Domain
Country
Malicious
172.233.211.124
ec1ipse.me
United States
20.2.154.66
unknown
United States
43.199.41.35
unknown
Japan

Memdumps

Base Address
Regiontype
Protect
Malicious
2B936A12000
heap
page read and write
2B9367C2000
heap
page read and write
7FF714CBE000
unkown
page write copy
24D0E0C0000
direct allocation
page read and write
31AF8020000
direct allocation
page read and write
14001E000
unkown
page readonly
2B936462000
heap
page read and write
24D0C1A0000
direct allocation
page read and write
392DE040000
direct allocation
page read and write
8C383FF000
stack
page read and write
392DA220000
direct allocation
page read and write
7FF791F5C000
unkown
page readonly
24D0C289000
direct allocation
page read and write
143298B0000
heap
page read and write
2B937A1F000
heap
page read and write
2B937A1F000
heap
page read and write
2B936911000
heap
page read and write
EA968FF000
stack
page read and write
1FB17C85000
heap
page read and write
392DC0C0000
direct allocation
page read and write
2B936524000
heap
page read and write
2B936A12000
heap
page read and write
2B936529000
heap
page read and write
2B9368F7000
heap
page read and write
24D0C142000
direct allocation
page read and write
2575006A000
heap
page read and write
2B936532000
heap
page read and write
25F37D50000
heap
page read and write
31AF2120000
direct allocation
page read and write
24D0E080000
direct allocation
page read and write
31AF21F0000
direct allocation
page read and write
2B9364BC000
heap
page read and write
2B936530000
heap
page read and write
2B9364BC000
heap
page read and write
2168C931000
heap
page read and write
2B936936000
heap
page read and write
1C5E0C58000
heap
page read and write
2B9364BC000
heap
page read and write
2B9364F9000
heap
page read and write
2B936524000
heap
page read and write
2B9368D5000
heap
page read and write
2B936932000
heap
page read and write
2746BBC9000
heap
page read and write
2B936FFE000
heap
page read and write
2B936932000
heap
page read and write
2172D7C0000
heap
page read and write
2B936A12000
heap
page read and write
1C5E0B10000
heap
page read and write
31AF21D0000
direct allocation
page read and write
2B936501000
heap
page read and write
392E4020000
direct allocation
page read and write
2574FFC0000
heap
page read and write
1C0000
heap
page read and write
2B936FF2000
heap
page read and write
52E02020000
direct allocation
page read and write
25750060000
heap
page read and write
275E8280000
direct allocation
page read and write
2B936FFE000
heap
page read and write
2B93652D000
heap
page read and write
392DC0A0000
direct allocation
page read and write
7FF791A01000
unkown
page execute read
25F37B9E000
heap
page read and write
1C0000
heap
page read and write
2B9364FE000
heap
page read and write
16B2CAB0000
heap
page read and write
2172D7DF000
heap
page read and write
2B93652D000
heap
page read and write
24D10010000
direct allocation
page read and write
2B93681B000
heap
page read and write
7FF714CC4000
unkown
page readonly
24D0C000000
direct allocation
page read and write
2B93688A000
heap
page read and write
392DA1B2000
direct allocation
page read and write
1E12800A000
heap
page read and write
392DA142000
direct allocation
page read and write
EA95EFF000
stack
page read and write
2B937101000
heap
page read and write
2B936976000
heap
page read and write
2B936420000
heap
page read and write
2B936948000
heap
page read and write
2B93656D000
heap
page read and write
7FF791A00000
unkown
page readonly
2172D7DF000
heap
page read and write
2B93652B000
heap
page read and write
7FF791F5C000
unkown
page readonly
1F0000
heap
page read and write
392DA100000
direct allocation
page read and write
2B936A12000
heap
page read and write
2B9364FF000
heap
page read and write
1FD3A7EB000
heap
page read and write
2B936A12000
heap
page read and write
2B936976000
heap
page read and write
392DA170000
direct allocation
page read and write
2746BBB3000
heap
page read and write
7FF791A00000
unkown
page readonly
81F000
stack
page read and write
2B936976000
heap
page read and write
2B936469000
heap
page read and write
2B93601A000
heap
page read and write
2B936911000
heap
page read and write
140000000
unkown
page readonly
2B936524000
heap
page read and write
2B936976000
heap
page read and write
31AF2180000
direct allocation
page read and write
1FD3A7FE000
heap
page read and write
2B936A36000
heap
page read and write
14001E000
unkown
page readonly
2B936A36000
heap
page read and write
7FF7AC006000
unkown
page execute read
2B9372B9000
heap
page read and write
24D10060000
direct allocation
page read and write
2B936424000
heap
page read and write
24D0C260000
direct allocation
page read and write
1E129900000
direct allocation
page read and write
2B9364F9000
heap
page read and write
24D10000000
direct allocation
page read and write
2B936529000
heap
page read and write
2B937101000
heap
page read and write
392DA1C0000
direct allocation
page read and write
31AF2220000
direct allocation
page read and write
37383FE000
stack
page read and write
2B936FFD000
heap
page read and write
2B936932000
heap
page read and write
7FF791FE0000
unkown
page readonly
190000
heap
page read and write
275E82D9000
heap
page read and write
2B937A15000
heap
page read and write
31AF2250000
direct allocation
page read and write
25F37B8B000
heap
page read and write
2B936932000
heap
page read and write
2B93647A000
heap
page read and write
2B93652D000
heap
page read and write
2B93603B000
heap
page read and write
2B936948000
heap
page read and write
24D0E0B2000
direct allocation
page read and write
2B9368F3000
heap
page read and write
31AF4020000
direct allocation
page read and write
2B9368C2000
heap
page read and write
BF8AFCF000
stack
page read and write
2B9364FE000
heap
page read and write
1E127F30000
heap
page read and write
7FF791FE0000
unkown
page readonly
7FF791E50000
unkown
page readonly
52DFE1C0000
direct allocation
page read and write
2B93694E000
heap
page read and write
52E02010000
direct allocation
page read and write
392E2070000
direct allocation
page read and write
2B936530000
heap
page read and write
1E129910000
direct allocation
page read and write
7FF791FA4000
unkown
page read and write
2B9364F9000
heap
page read and write
24D14020000
direct allocation
page read and write
2B9364B9000
heap
page read and write
143298D0000
heap
page read and write
2B936932000
heap
page read and write
2B936FF1000
heap
page read and write
24C3FD30000
heap
page read and write
2B93790C000
heap
page read and write
52E06000000
direct allocation
page read and write
2B9364AA000
heap
page read and write
2B936805000
heap
page read and write
F5000
stack
page read and write
2B936B7C000
heap
page read and write
275E82B0000
direct allocation
page read and write
2B936A46000
heap
page read and write
EA962FF000
stack
page read and write
2B9368C4000
heap
page read and write
2B936501000
heap
page read and write
2B936524000
heap
page read and write
2168C8A9000
heap
page read and write
392E20C0000
direct allocation
page read and write
52DFE020000
direct allocation
page read and write
31AF2060000
direct allocation
page read and write
1FD3A9C0000
heap
page read and write
392DC0F0000
direct allocation
page read and write
2B937907000
heap
page read and write
2B937237000
heap
page read and write
BA576FA000
stack
page read and write
2B936948000
heap
page read and write
2B936936000
heap
page read and write
3738AFE000
stack
page read and write
2168C890000
remote allocation
page read and write
2B936976000
heap
page read and write
2B936911000
heap
page read and write
2172D7E1000
heap
page read and write
2B935FE7000
heap
page read and write
D6AF5ED000
stack
page read and write
7FF7A8E50000
unkown
page readonly
2172D6A0000
heap
page read and write
2B936976000
heap
page read and write
2746BB60000
heap
page read and write
639B2FE000
stack
page read and write
2B9364BC000
heap
page read and write
2B936837000
heap
page read and write
2B93656D000
heap
page read and write
275E8230000
heap
page read and write
2B936A12000
heap
page read and write
2B9364B9000
heap
page read and write
2172D7E6000
heap
page read and write
2B9364BC000
heap
page read and write
14001E000
unkown
page readonly
392E2030000
direct allocation
page read and write
2B936FFA000
heap
page read and write
2B936524000
heap
page read and write
2B9367E6000
heap
page read and write
2B936568000
heap
page read and write
2B936948000
heap
page read and write
A60000
heap
page read and write
2B9364BC000
heap
page read and write
2B936FFA000
heap
page read and write
2B936FFD000
heap
page read and write
2B9371A7000
heap
page read and write
24D0C250000
direct allocation
page read and write
71F000
stack
page read and write
7FF791A01000
unkown
page execute read
7FF7AB606000
unkown
page execute read
143298F0000
direct allocation
page read and write
2B9364FE000
heap
page read and write
24D0C1C1000
direct allocation
page read and write
2746BBC9000
heap
page read and write
2B936B7C000
heap
page read and write
24C3FCF0000
heap
page read and write
140000000
unkown
page readonly
392DA1F0000
direct allocation
page read and write
2B936932000
heap
page read and write
24D0C2A0000
direct allocation
page read and write
392E2010000
direct allocation
page read and write
2B9364B9000
heap
page read and write
2B9364F9000
heap
page read and write
2B9364F9000
heap
page read and write
140017000
unkown
page readonly
2B936530000
heap
page read and write
7FF7AC01C000
unkown
page readonly
392DC100000
direct allocation
page read and write
BA57EFE000
stack
page read and write
2B9364F9000
heap
page read and write
37382F1000
stack
page read and write
A2F000
stack
page read and write
2B936A36000
heap
page read and write
2B936A36000
heap
page read and write
2B936500000
heap
page read and write
140001000
unkown
page execute read
2B9364F9000
heap
page read and write
2B937101000
heap
page read and write
2168C860000
direct allocation
page read and write
24D0E0D0000
direct allocation
page read and write
392E2040000
direct allocation
page read and write
52DFE260000
direct allocation
page read and write
2B9BB270000
heap
page read and write
2B937A10000
heap
page read and write
2B936976000
heap
page read and write
2B937101000
heap
page read and write
2B936FF1000
heap
page read and write
2168C890000
remote allocation
page read and write
2746BBB3000
heap
page read and write
24D14030000
direct allocation
page read and write
2B9364BC000
heap
page read and write
2172D7DF000
heap
page read and write
EA964FF000
stack
page read and write
2B936A12000
heap
page read and write
2B93652D000
heap
page read and write
2B936A12000
heap
page read and write
2B93603E000
heap
page read and write
25F37B9A000
heap
page read and write
7FF791A00000
unkown
page readonly
1E129A64000
heap
page read and write
2B9364BC000
heap
page read and write
2746BBCF000
heap
page read and write
2B936529000
heap
page read and write
2B936911000
heap
page read and write
2168C870000
direct allocation
page read and write
24D0C230000
direct allocation
page read and write
2B936948000
heap
page read and write
2746BA80000
heap
page read and write
2574FEE0000
heap
page read and write
2746BBCF000
heap
page read and write
2B936529000
heap
page read and write
1E129A60000
heap
page read and write
2B937101000
heap
page read and write
16DF5DC000
stack
page read and write
392DA270000
direct allocation
page read and write
2746BC90000
heap
page read and write
2B936A12000
heap
page read and write
14329929000
heap
page read and write
BF8ABED000
stack
page read and write
392DA190000
direct allocation
page read and write
A4E42FE000
stack
page read and write
2B937101000
heap
page read and write
2B936529000
heap
page read and write
2B93652D000
heap
page read and write
2B93656D000
heap
page read and write
2B936932000
heap
page read and write
2B9364B9000
heap
page read and write
24D0C281000
direct allocation
page read and write
140017000
unkown
page readonly
7FF7AB606000
unkown
page execute read
1C0000
heap
page read and write
2B936529000
heap
page read and write
52DFE220000
direct allocation
page read and write
C32587C000
stack
page read and write
2B9368F3000
heap
page read and write
2B9372A3000
heap
page read and write
31AF21C1000
direct allocation
page read and write
2B9364BC000
heap
page read and write
2B9364B9000
heap
page read and write
2B936936000
heap
page read and write
24D0C1D0000
direct allocation
page read and write
2B936524000
heap
page read and write
2B9364B9000
heap
page read and write
2B936FF1000
heap
page read and write
2B935FE6000
heap
page read and write
2168C710000
heap
page read and write
31AF2260000
direct allocation
page read and write
2B93656D000
heap
page read and write
52E00030000
direct allocation
page read and write
BA57FFE000
stack
page read and write
2B93656F000
heap
page read and write
392DA280000
direct allocation
page read and write
2B936911000
heap
page read and write
1C5E0C50000
heap
page read and write
2B9364BC000
heap
page read and write
2B936911000
heap
page read and write
2B937101000
heap
page read and write
392DA250000
direct allocation
page read and write
7FF791FE0000
unkown
page readonly
2B936902000
heap
page read and write
2B937310000
heap
page read and write
2B9364B9000
heap
page read and write
2B936A46000
heap
page read and write
25750065000
heap
page read and write
24D0C290000
direct allocation
page read and write
7FF791A01000
unkown
page execute read
52DFE170000
direct allocation
page read and write
2B936A12000
heap
page read and write
2B9364F9000
heap
page read and write
2172D7EE000
heap
page read and write
2B936002000
heap
page read and write
52DFE1F0000
direct allocation
page read and write
2B936467000
heap
page read and write
24C3FD38000
heap
page read and write
14001E000
unkown
page readonly
392DA240000
direct allocation
page read and write
2B936948000
heap
page read and write
2B93640A000
heap
page read and write
2B936501000
heap
page read and write
31AF2281000
direct allocation
page read and write
2B93603B000
heap
page read and write
24D12050000
direct allocation
page read and write
52DFE130000
direct allocation
page read and write
2B93656F000
heap
page read and write
31AF2270000
direct allocation
page read and write
31AF2190000
direct allocation
page read and write
7FF7AC006000
unkown
page execute read
7FF7AAC03000
unkown
page write copy
25F37E99000
heap
page read and write
2B93603B000
heap
page read and write
2B936936000
heap
page read and write
7FF791A00000
unkown
page readonly
14E000
stack
page read and write
2B937903000
heap
page read and write
2B93790D000
heap
page read and write
2B937A14000
heap
page read and write
2B936948000
heap
page read and write
468000
heap
page read and write
31AF4010000
direct allocation
page read and write
14E000
stack
page read and write
2B936FFE000
heap
page read and write
392DA200000
direct allocation
page read and write
140000000
unkown
page readonly
1FD3A7CA000
heap
page read and write
2746BBC8000
heap
page read and write
2B9364FE000
heap
page read and write
143297A0000
heap
page read and write
2B936976000
heap
page read and write
2746BBC8000
heap
page read and write
7FF791FA4000
unkown
page read and write
52DFE040000
direct allocation
page read and write
2B937237000
heap
page read and write
392DC030000
direct allocation
page read and write
52E00000000
direct allocation
page read and write
24D0C210000
direct allocation
page read and write
2B936472000
heap
page read and write
2B936A36000
heap
page read and write
52DFE060000
direct allocation
page read and write
24D0E0F0000
direct allocation
page read and write
250F2AA0000
heap
page read and write
140000000
unkown
page readonly
7FF791A01000
unkown
page execute read
2B936932000
heap
page read and write
2746BBC8000
heap
page read and write
2B936936000
heap
page read and write
2B9364EB000
heap
page read and write
2B93730F000
heap
page read and write
1C4000
heap
page read and write
24D16020000
direct allocation
page read and write
143298D4000
heap
page read and write
2B936843000
heap
page read and write
2B93643B000
heap
page read and write
2B936FF8000
heap
page read and write
73E000
stack
page read and write
2B93656D000
heap
page read and write
2B9368E3000
heap
page read and write
2B9364FE000
heap
page read and write
7FF7A8E50000
unkown
page readonly
2B93652D000
heap
page read and write
79E000
stack
page read and write
2B9368F3000
heap
page read and write
2B936524000
heap
page read and write
31AF2000000
direct allocation
page read and write
2B9368DB000
heap
page read and write
392E4000000
direct allocation
page read and write
2746BDA0000
heap
page read and write
1E127F20000
heap
page read and write
2B935FE0000
heap
page read and write
2B936529000
heap
page read and write
2B937101000
heap
page read and write
7FF7AB606000
unkown
page execute read
2B936FF3000
heap
page read and write
2B936A12000
heap
page read and write
2B9368DA000
heap
page read and write
2B936B77000
heap
page read and write
1E128005000
heap
page read and write
1C5E2690000
heap
page read and write
275E8294000
heap
page read and write
25F37E90000
heap
page read and write
52DFE230000
direct allocation
page read and write
392E2090000
direct allocation
page read and write
2B93652D000
heap
page read and write
2B936936000
heap
page read and write
2746BBC9000
heap
page read and write
52DFE100000
direct allocation
page read and write
2B936932000
heap
page read and write
24D0C240000
direct allocation
page read and write
2B9364B9000
heap
page read and write
2B936530000
heap
page read and write
2B936976000
heap
page read and write
2B936911000
heap
page read and write
2B9364B9000
heap
page read and write
2B936A36000
heap
page read and write
2B93652D000
heap
page read and write
392E2080000
direct allocation
page read and write
52DFE281000
direct allocation
page read and write
2B936911000
heap
page read and write
2B936932000
heap
page read and write
3738CFF000
stack
page read and write
2B936932000
heap
page read and write
24D10050000
direct allocation
page read and write
F6000
stack
page read and write
2B9368D5000
heap
page read and write
2B9368DA000
heap
page read and write
2B936529000
heap
page read and write
140017000
unkown
page readonly
2B936A36000
heap
page read and write
24D0C292000
direct allocation
page read and write
24D0E060000
direct allocation
page read and write
2B9364E8000
heap
page read and write
7FF7AAC06000
unkown
page execute read
2B936911000
heap
page read and write
24D16030000
direct allocation
page read and write
2B937904000
heap
page read and write
7FF791FA7000
unkown
page write copy
639B1FF000
stack
page read and write
2B936524000
heap
page read and write
2B935FA5000
heap
page read and write
7FF791FA4000
unkown
page read and write
2746BDA4000
heap
page read and write
16B2E470000
heap
page read and write
2B936472000
heap
page read and write
7FF714CAB000
unkown
page readonly
392DA1D0000
direct allocation
page read and write
24D0C020000
direct allocation
page read and write
16B2E530000
heap
page read and write
2B93656D000
heap
page read and write
2B936529000
heap
page read and write
7FF791FA4000
unkown
page read and write
2B936976000
heap
page read and write
2B936FF1000
heap
page read and write
2B936932000
heap
page read and write
52DFE000000
direct allocation
page read and write
2168E214000
heap
page read and write
2B93656D000
heap
page read and write
25F37E94000
heap
page read and write
2172D7E1000
heap
page read and write
7FF714CC2000
unkown
page read and write
24C415D0000
heap
page read and write
2B936936000
heap
page read and write
2B93656D000
heap
page read and write
1E127F60000
direct allocation
page read and write
2B936FFD000
heap
page read and write
25F37B20000
heap
page read and write
2B9364F9000
heap
page read and write
2B93640F000
heap
page read and write
392DA000000
direct allocation
page read and write
2B936B7C000
heap
page read and write
24D16010000
direct allocation
page read and write
7FF791FA4000
unkown
page write copy
BA578FF000
stack
page read and write
2B937101000
heap
page read and write
2B936911000
heap
page read and write
140000000
unkown
page readonly
2B93652D000
heap
page read and write
2B936911000
heap
page read and write
2B9364FD000
heap
page read and write
2B936FF7000
heap
page read and write
7FF791E50000
unkown
page readonly
1FD3A7C0000
heap
page read and write
2B936A12000
heap
page read and write
392DA1E0000
direct allocation
page read and write
2B936FFB000
heap
page read and write
BA1D9CB000
stack
page read and write
8C382FF000
unkown
page read and write
140001000
unkown
page execute read
2B936936000
heap
page read and write
2B936530000
heap
page read and write
31AF21B2000
direct allocation
page read and write
2B937A17000
heap
page read and write
2B936B7C000
heap
page read and write
639ADFB000
stack
page read and write
47D000
heap
page read and write
140017000
unkown
page readonly
2B93652D000
heap
page read and write
140001000
unkown
page execute read
24D0E0A0000
direct allocation
page read and write
140000000
unkown
page readonly
24D0C130000
direct allocation
page read and write
A64000
heap
page read and write
31AFA010000
direct allocation
page read and write
2B936895000
heap
page read and write
2B9364F9000
heap
page read and write
2B936936000
heap
page read and write
52DFE1E0000
direct allocation
page read and write
24D10070000
direct allocation
page read and write
2B936948000
heap
page read and write
7FF791E50000
unkown
page readonly
2168C850000
direct allocation
page read and write
7FF791FA4000
unkown
page write copy
2B936976000
heap
page read and write
2746BDB0000
heap
page read and write
528000
heap
page read and write
2B93603B000
heap
page read and write
24D12042000
direct allocation
page read and write
2B936932000
heap
page read and write
2B9368E3000
heap
page read and write
24D10092000
direct allocation
page read and write
1FB17C50000
heap
page read and write
1FB17C89000
heap
page read and write
2B9364F9000
heap
page read and write
C3258FE000
stack
page read and write
2B93652D000
heap
page read and write
14329900000
direct allocation
page read and write
2B9364BC000
heap
page read and write
2B9364B9000
heap
page read and write
52DFE1B2000
direct allocation
page read and write
31AF2150000
direct allocation
page read and write
2B936A12000
heap
page read and write
2746BBD0000
heap
page read and write
7FF7AAC06000
unkown
page execute read
BF8ADDF000
stack
page read and write
250F2A40000
heap
page read and write
1A0000
heap
page read and write
2B9364F9000
heap
page read and write
2172D7C8000
heap
page read and write
14001E000
unkown
page readonly
392E4030000
direct allocation
page read and write
2B936976000
heap
page read and write
2B93603B000
heap
page read and write
2172D7DF000
heap
page read and write
2746BBA0000
heap
page read and write
7FF791E50000
unkown
page readonly
2746BBC9000
heap
page read and write
2B935FCA000
heap
page read and write
2B93601A000
heap
page read and write
7FF791FE0000
unkown
page readonly
392DA130000
direct allocation
page read and write
2B936936000
heap
page read and write
2746BBC8000
heap
page read and write
2B936524000
heap
page read and write
2B936472000
heap
page read and write
2B9364FE000
heap
page read and write
2B936936000
heap
page read and write
F62857F000
stack
page read and write
2B9364B9000
heap
page read and write
520000
heap
page read and write
EA95B41000
stack
page read and write
392E2060000
direct allocation
page read and write
392DA292000
direct allocation
page read and write
52E04020000
direct allocation
page read and write
2B935FBF000
heap
page read and write
2B935FA9000
heap
page read and write
478000
heap
page read and write
8C37F0C000
stack
page read and write
250F2AA4000
heap
page read and write
2B936A36000
heap
page read and write
2172D7E8000
heap
page read and write
7FF791FE0000
unkown
page readonly
31AF2200000
direct allocation
page read and write
24C3FC10000
heap
page read and write
392E0010000
direct allocation
page read and write
2B93652D000
heap
page read and write
2168E210000
heap
page read and write
25F37B8B000
heap
page read and write
24D0E0E0000
direct allocation
page read and write
52DFE010000
direct allocation
page read and write
2746BBA0000
heap
page read and write
52DFE1D0000
direct allocation
page read and write
D6AF9FE000
stack
page read and write
16B2CB90000
heap
page read and write
2B9364D8000
heap
page read and write
2B936529000
heap
page read and write
1D0000
heap
page read and write
2746BBC9000
heap
page read and write
2B936936000
heap
page read and write
31AF6010000
direct allocation
page read and write
532000
heap
page read and write
2B9364B2000
heap
page read and write
140001000
unkown
page execute read
31AFA020000
direct allocation
page read and write
2B936524000
heap
page read and write
2B936529000
heap
page read and write
2B93656D000
heap
page read and write
2B936501000
heap
page read and write
24D0C183000
direct allocation
page read and write
24D0C100000
direct allocation
page read and write
2B936976000
heap
page read and write
2B937905000
heap
page read and write
2B9BB440000
heap
page read and write
2B937902000
heap
page read and write
7FF714C80000
unkown
page readonly
16B2CBC8000
heap
page read and write
7FF714C81000
unkown
page execute read
2B936911000
heap
page read and write
25F37B30000
heap
page read and write
24C41604000
heap
page read and write
1FD3AB64000
heap
page read and write
1E129940000
remote allocation
page read and write
275E82D0000
heap
page read and write
BA574FA000
stack
page read and write
2B936001000
heap
page read and write
52DFE050000
direct allocation
page read and write
2746BB9B000
heap
page read and write
2B936571000
heap
page read and write
2B93656D000
heap
page read and write
2B9364F9000
heap
page read and write
24D0C170000
direct allocation
page read and write
143298E0000
direct allocation
page read and write
2746BBD0000
heap
page read and write
24D12010000
direct allocation
page read and write
31AF2230000
direct allocation
page read and write
2B936936000
heap
page read and write
2746BBC9000
heap
page read and write
1C5E2694000
heap
page read and write
24D0E050000
direct allocation
page read and write
72F000
stack
page read and write
1E127F76000
heap
page read and write
2172D7EF000
heap
page read and write
1FD3A7FE000
heap
page read and write
2B936A36000
heap
page read and write
31AF2170000
direct allocation
page read and write
2B936932000
heap
page read and write
7FF791A01000
unkown
page execute read
2B93603B000
heap
page read and write
7FF714CAB000
unkown
page readonly
24D0C050000
direct allocation
page read and write
2B935FBF000
heap
page read and write
2172D7EE000
heap
page read and write
2172F1F5000
heap
page read and write
2B936463000
heap
page read and write
392DE030000
direct allocation
page read and write
7FF791FA7000
unkown
page write copy
7FF791A01000
unkown
page execute read
140017000
unkown
page readonly
1A0000
heap
page read and write
24D12040000
direct allocation
page read and write
24D0C270000
direct allocation
page read and write
24D0C284000
direct allocation
page read and write
2B93652D000
heap
page read and write
2B936500000
heap
page read and write
7FF791A00000
unkown
page readonly
2B936B3E000
heap
page read and write
2B936976000
heap
page read and write
2B935FC9000
heap
page read and write
24D12080000
direct allocation
page read and write
2168C8B2000
heap
page read and write
24D12060000
direct allocation
page read and write
2B9364F9000
heap
page read and write
14001E000
unkown
page readonly
24D0E000000
direct allocation
page read and write
2B936976000
heap
page read and write
16DF87F000
stack
page read and write
2B936911000
heap
page read and write
2B935FEF000
heap
page read and write
2B9364BC000
heap
page read and write
275E8290000
heap
page read and write
14329910000
direct allocation
page read and write
250F2B28000
heap
page read and write
392DC080000
direct allocation
page read and write
2B936976000
heap
page read and write
2B936501000
heap
page read and write
2172F060000
heap
page read and write
2B936467000
heap
page read and write
980000
heap
page read and write
2B936530000
heap
page read and write
2B9372A4000
heap
page read and write
2B93652D000
heap
page read and write
24D0C060000
direct allocation
page read and write
392DC070000
direct allocation
page read and write
392E2020000
direct allocation
page read and write
2B936948000
heap
page read and write
2168C907000
heap
page read and write
24D0E020000
direct allocation
page read and write
7FF791F5C000
unkown
page readonly
2B936932000
heap
page read and write
392DA180000
direct allocation
page read and write
31AF2050000
direct allocation
page read and write
1FD3A8C0000
heap
page read and write
7FF7AC01C000
unkown
page readonly
2B9364F9000
heap
page read and write
2B93652D000
heap
page read and write
2B936591000
heap
page read and write
2746BBB3000
heap
page read and write
140001000
unkown
page execute read
2172D7DF000
heap
page read and write
2172D7DF000
heap
page read and write
7FF791E50000
unkown
page readonly
1C5E0BF0000
heap
page read and write
2B935FD1000
heap
page read and write
2B9364F9000
heap
page read and write
2B936948000
heap
page read and write
2B9367D0000
heap
page read and write
2B9364B9000
heap
page read and write
392DA1A0000
direct allocation
page read and write
37384FE000
stack
page read and write
2B937101000
heap
page read and write
7FF714C80000
unkown
page readonly
392E2050000
direct allocation
page read and write
2B936A12000
heap
page read and write
25F37B9A000
heap
page read and write
D3DF8FB000
stack
page read and write
2B937101000
heap
page read and write
2746BBC8000
heap
page read and write
2B9364B9000
heap
page read and write
2B936522000
heap
page read and write
2B936911000
heap
page read and write
140001000
unkown
page execute read
F6284FF000
stack
page read and write
2B936524000
heap
page read and write
250F2A80000
heap
page read and write
7FF791F5C000
unkown
page readonly
392E0020000
direct allocation
page read and write
52DFE030000
direct allocation
page read and write
2B936568000
heap
page read and write
639A8FA000
stack
page read and write
2B936529000
heap
page read and write
24D0C1F0000
direct allocation
page read and write
24D0C220000
direct allocation
page read and write
7FF791FAB000
unkown
page read and write
2B936936000
heap
page read and write
24D10040000
direct allocation
page read and write
2168C8A0000
heap
page read and write
140017000
unkown
page readonly
7FF791FE0000
unkown
page readonly
24D16040000
direct allocation
page read and write
2B936A36000
heap
page read and write
24D0C030000
direct allocation
page read and write
2172D7DF000
heap
page read and write
25F37E99000
heap
page read and write
D6AFAFF000
stack
page read and write
2746BBCE000
heap
page read and write
2B935FAE000
heap
page read and write
2168C890000
remote allocation
page read and write
2B936936000
heap
page read and write
2B936948000
heap
page read and write
2B9364BC000
heap
page read and write
2B936948000
heap
page read and write
2B9364F9000
heap
page read and write
EA960FE000
stack
page read and write
2172D7E1000
heap
page read and write
275E82C0000
direct allocation
page read and write
392DC020000
direct allocation
page read and write
2746BBCE000
heap
page read and write
392DA040000
direct allocation
page read and write
639B0FB000
stack
page read and write
2B9364AA000
heap
page read and write
2B93694F000
heap
page read and write
3738CFB000
stack
page read and write
2172F1F0000
heap
page read and write
2B936976000
heap
page read and write
BF8ABE3000
stack
page read and write
8C91C9C000
stack
page read and write
2B937909000
heap
page read and write
2B936936000
heap
page read and write
24D10030000
direct allocation
page read and write
2B937904000
heap
page read and write
14329934000
heap
page read and write
7FF791FAB000
unkown
page read and write
7FF7AAC06000
unkown
page execute read
BA56EF0000
stack
page read and write
392DA290000
direct allocation
page read and write
7FF791F5C000
unkown
page readonly
1FD3AB60000
heap
page read and write
1FB17C80000
heap
page read and write
1E129920000
direct allocation
page read and write
7FF7A8E50000
unkown
page readonly
2B937101000
heap
page read and write
7FF791A00000
unkown
page readonly
2B93656D000
heap
page read and write
2B936A36000
heap
page read and write
2B93646A000
heap
page read and write
1FB17C8F000
heap
page read and write
140017000
unkown
page readonly
52DFE160000
direct allocation
page read and write
2B9364B9000
heap
page read and write
2B936A36000
heap
page read and write
31AF21A0000
direct allocation
page read and write
392DC000000
direct allocation
page read and write
2B93656D000
heap
page read and write
2B9364F9000
heap
page read and write
2B93656D000
heap
page read and write
2B936A36000
heap
page read and write
639B3FE000
stack
page read and write
2B936911000
heap
page read and write
639AAFA000
stack
page read and write
2B9368E5000
heap
page read and write
2B9364BC000
heap
page read and write
2B936FF4000
heap
page read and write
2B9364B9000
heap
page read and write
24D0E040000
direct allocation
page read and write
2B935FC2000
heap
page read and write
2B9368DA000
heap
page read and write
2B936948000
heap
page read and write
140000000
unkown
page readonly
2B936529000
heap
page read and write
460000
heap
page read and write
24D0E070000
direct allocation
page read and write
392DA010000
direct allocation
page read and write
25F37D30000
heap
page read and write
2B9368CB000
heap
page read and write
2B937904000
heap
page read and write
2B9364F9000
heap
page read and write
2B9364AA000
heap
page read and write
2B9364FE000
heap
page read and write
2172D7DF000
heap
page read and write
7FF791E50000
unkown
page readonly
2B936936000
heap
page read and write
2B937A18000
heap
page read and write
31AF4030000
direct allocation
page read and write
2B936A36000
heap
page read and write
2B936B3E000
heap
page read and write
392DA288000
direct allocation
page read and write
2B9364B2000
heap
page read and write
7FF791FE0000
unkown
page readonly
31AF2030000
direct allocation
page read and write
2B936530000
heap
page read and write
1FD3A7EB000
heap
page read and write
2B9368CB000
heap
page read and write
392E2036000
direct allocation
page read and write
2B9364B9000
heap
page read and write
2B936B7C000
heap
page read and write
7FF7A8E50000
unkown
page readonly
2B936A12000
heap
page read and write
7FF714CAB000
unkown
page readonly
31AF2160000
direct allocation
page read and write
2B93656D000
heap
page read and write
52DFE1A0000
direct allocation
page read and write
52DFE200000
direct allocation
page read and write
392E20D0000
direct allocation
page read and write
2B937A18000
heap
page read and write
392DA285000
direct allocation
page read and write
1A0000
heap
page read and write
2B936A36000
heap
page read and write
2172D7E1000
heap
page read and write
2B936932000
heap
page read and write
2B936501000
heap
page read and write
14001E000
unkown
page readonly
392DC0D0000
direct allocation
page read and write
2B936529000
heap
page read and write
7FF714CBE000
unkown
page write copy
16B2E534000
heap
page read and write
1FB17C40000
heap
page read and write
2B936FF8000
heap
page read and write
7FF791FA7000
unkown
page write copy
392DC0E0000
direct allocation
page read and write
2B936FF7000
heap
page read and write
2B93603B000
heap
page read and write
275E8150000
heap
page read and write
1FD3A7FE000
heap
page read and write
52DFE190000
direct allocation
page read and write
2B936976000
heap
page read and write
1FD3A7FE000
heap
page read and write
25F37B99000
heap
page read and write
2B936500000
heap
page read and write
7FF7AAC03000
unkown
page read and write
7FF714C81000
unkown
page execute read
2B9364B9000
heap
page read and write
392DA120000
direct allocation
page read and write
2B936526000
heap
page read and write
25F37B9A000
heap
page read and write
7FF791FA4000
unkown
page write copy
BA57DFE000
stack
page read and write
7FF7AC01C000
unkown
page readonly
24D0C1E0000
direct allocation
page read and write
392DC060000
direct allocation
page read and write
24D12030000
direct allocation
page read and write
392DC040000
direct allocation
page read and write
31AF8010000
direct allocation
page read and write
7FF791FAB000
unkown
page read and write
392E2034000
direct allocation
page read and write
2B936A12000
heap
page read and write
3738DFF000
stack
page read and write
2B936A36000
heap
page read and write
392DA230000
direct allocation
page read and write
2B936522000
heap
page read and write
1FD3A7E4000
heap
page read and write
2B936A12000
heap
page read and write
190000
heap
page read and write
2B9368CF000
heap
page read and write
2B9364BC000
heap
page read and write
41A698C000
stack
page read and write
2B9364F9000
heap
page read and write
F62847C000
stack
page read and write
24D0C190000
direct allocation
page read and write
2B935FA0000
heap
page read and write
2B936FF7000
heap
page read and write
24D0E090000
direct allocation
page read and write
392DE000000
direct allocation
page read and write
2172D780000
heap
page read and write
2B9BB390000
heap
page read and write
2B937101000
heap
page read and write
2B936403000
heap
page read and write
2B937101000
heap
page read and write
2B936A12000
heap
page read and write
2B93656D000
heap
page read and write
2B9BCE94000
heap
page read and write
2B93652B000
heap
page read and write
392DA260000
direct allocation
page read and write
2B936524000
heap
page read and write
2B9364B9000
heap
page read and write
2B936911000
heap
page read and write
2B9368CB000
heap
page read and write
24C41600000
heap
page read and write
7FF7AB606000
unkown
page execute read
24D0E030000
direct allocation
page read and write
392DE020000
direct allocation
page read and write
24C3FD40000
heap
page read and write
2B9364BC000
heap
page read and write
52E06010000
direct allocation
page read and write
24D14010000
direct allocation
page read and write
52E00020000
direct allocation
page read and write
7FF791A00000
unkown
page readonly
2B936A36000
heap
page read and write
392E2000000
direct allocation
page read and write
190000
heap
page read and write
2B937907000
heap
page read and write
2746BBC9000
heap
page read and write
2B93790E000
heap
page read and write
2B936932000
heap
page read and write
392E20A0000
direct allocation
page read and write
392DA160000
direct allocation
page read and write
2B936524000
heap
page read and write
BF8B1BE000
stack
page read and write
2B93656D000
heap
page read and write
2B9364B9000
heap
page read and write
2B9368DA000
heap
page read and write
7FF7AC006000
unkown
page execute read
2B936A12000
heap
page read and write
639AEFE000
stack
page read and write
2B936526000
heap
page read and write
7FF714C80000
unkown
page readonly
392DA020000
direct allocation
page read and write
2B936954000
heap
page read and write
2B936976000
heap
page read and write
2B93688E000
heap
page read and write
2B93652D000
heap
page read and write
52E00010000
direct allocation
page read and write
2B936976000
heap
page read and write
2B936976000
heap
page read and write
2B936932000
heap
page read and write
A4E3FED000
stack
page read and write
2B93603E000
heap
page read and write
24D0C180000
direct allocation
page read and write
52DFE250000
direct allocation
page read and write
2B937A19000
heap
page read and write
1FD3A9A0000
heap
page read and write
2B936936000
heap
page read and write
2B936B53000
heap
page read and write
2B9364F2000
heap
page read and write
2B936948000
heap
page read and write
2B936865000
heap
page read and write
1F4000
heap
page read and write
5A0000
heap
page read and write
2B936524000
heap
page read and write
47F000
heap
page read and write
2172D7DF000
heap
page read and write
5A7000
heap
page read and write
25F37B9A000
heap
page read and write
2B93641B000
heap
page read and write
2168C909000
heap
page read and write
2B936B7C000
heap
page read and write
2B936532000
heap
page read and write
2746BBCF000
heap
page read and write
2B93652B000
heap
page read and write
392DE096000
direct allocation
page read and write
2B936500000
heap
page read and write
2B936524000
heap
page read and write
2B93790A000
heap
page read and write
F6000
stack
page read and write
2B935FE6000
heap
page read and write
639A110000
stack
page read and write
2B936596000
heap
page read and write
2B936948000
heap
page read and write
2172F190000
heap
page read and write
470000
heap
page read and write
2B9363FD000
heap
page read and write
24D12000000
direct allocation
page read and write
24D16050000
direct allocation
page read and write
2B936A36000
heap
page read and write
2B936516000
heap
page read and write
140017000
unkown
page readonly
2B93645A000
heap
page read and write
24D0E010000
direct allocation
page read and write
2B937101000
heap
page read and write
24D0C040000
direct allocation
page read and write
BA57CFF000
stack
page read and write
2B9368CB000
heap
page read and write
2B936936000
heap
page read and write
2B936524000
heap
page read and write
2B936A36000
heap
page read and write
25F37B9A000
heap
page read and write
7FF714CBE000
unkown
page read and write
24D0C160000
direct allocation
page read and write
2B93645A000
heap
page read and write
2B935FDB000
heap
page read and write
250F2960000
heap
page read and write
2B936002000
heap
page read and write
2B9365A9000
heap
page read and write
392DC010000
direct allocation
page read and write
2B9364F1000
heap
page read and write
2B937101000
heap
page read and write
2B936A36000
heap
page read and write
2B935FCD000
heap
page read and write
2746BB90000
heap
page read and write
25F37B84000
heap
page read and write
14E000
stack
page read and write
16DF8FF000
stack
page read and write
2B936911000
heap
page read and write
1E129940000
remote allocation
page read and write
25F37B9E000
heap
page read and write
24D12070000
direct allocation
page read and write
140000000
unkown
page readonly
2B9364BC000
heap
page read and write
275E82A0000
direct allocation
page read and write
14E000
stack
page read and write
2B9364B9000
heap
page read and write
52E04010000
direct allocation
page read and write
392DC050000
direct allocation
page read and write
2B936911000
heap
page read and write
2B936500000
heap
page read and write
2B936502000
heap
page read and write
2B937328000
heap
page read and write
2B936B77000
heap
page read and write
25F37B9A000
heap
page read and write
2B9364BC000
heap
page read and write
1FD3A9E0000
heap
page read and write
392E20B0000
direct allocation
page read and write
2B936948000
heap
page read and write
7FF791F5C000
unkown
page readonly
2B9364BC000
heap
page read and write
2168C880000
direct allocation
page read and write
2B936948000
heap
page read and write
639A6FA000
stack
page read and write
2746BBCE000
heap
page read and write
2B936A36000
heap
page read and write
2B936A36000
heap
page read and write
EA967FF000
stack
page read and write
2B936FF9000
heap
page read and write
2B93652D000
heap
page read and write
2B936524000
heap
page read and write
7FF7AC006000
unkown
page execute read
2B936529000
heap
page read and write
EA966FB000
stack
page read and write
2B936A12000
heap
page read and write
392DE080000
direct allocation
page read and write
2B936A12000
heap
page read and write
2746BBD0000
heap
page read and write
392DE060000
direct allocation
page read and write
52DFE120000
direct allocation
page read and write
2B936800000
heap
page read and write
2B9364BC000
heap
page read and write
2B937101000
heap
page read and write
2B935FC5000
heap
page read and write
7FF791FE0000
unkown
page readonly
24D0C120000
direct allocation
page read and write
25F37B6B000
heap
page read and write
7FF791F5C000
unkown
page readonly
2B9365A9000
heap
page read and write
2B93652D000
heap
page read and write
2B935FC3000
heap
page read and write
2B936522000
heap
page read and write
25F37B60000
heap
page read and write
7FF791FA7000
unkown
page write copy
7FF791FA4000
unkown
page write copy
2B937904000
heap
page read and write
37386FF000
stack
page read and write
392DA060000
direct allocation
page read and write
1E1298E0000
heap
page read and write
2B936A36000
heap
page read and write
2B9BCE90000
heap
page read and write
52DFE150000
direct allocation
page read and write
2B936FF4000
heap
page read and write
2B936530000
heap
page read and write
2B936A12000
heap
page read and write
2B936FF5000
heap
page read and write
2172D7DF000
heap
page read and write
2B937A1F000
heap
page read and write
392DE010000
direct allocation
page read and write
2B9364FE000
heap
page read and write
7FF791A01000
unkown
page execute read
7FF791E50000
unkown
page readonly
31AF6020000
direct allocation
page read and write
392DA030000
direct allocation
page read and write
24D10020000
direct allocation
page read and write
2B9364F9000
heap
page read and write
2B935FB1000
heap
page read and write
392E4010000
direct allocation
page read and write
52DFE270000
direct allocation
page read and write
2B936FF9000
heap
page read and write
7FF7AAC03000
unkown
page write copy
2B936472000
heap
page read and write
2172D7E0000
heap
page read and write
BA57BFB000
stack
page read and write
1A0000
heap
page read and write
2B936475000
heap
page read and write
7FF714CC4000
unkown
page readonly
2B93652D000
heap
page read and write
2172D7E1000
heap
page read and write
2172D7E8000
heap
page read and write
7FF791A01000
unkown
page execute read
2B9363F4000
heap
page read and write
2B936A36000
heap
page read and write
2B93656D000
heap
page read and write
24D0C200000
direct allocation
page read and write
2B936500000
heap
page read and write
2B936948000
heap
page read and write
2B936976000
heap
page read and write
2B9364BC000
heap
page read and write
2B9BB449000
heap
page read and write
392DC0B2000
direct allocation
page read and write
F6000
stack
page read and write
140001000
unkown
page execute read
392DE050000
direct allocation
page read and write
24D0C010000
direct allocation
page read and write
24D0C150000
direct allocation
page read and write
2B93790A000
heap
page read and write
2B93656D000
heap
page read and write
7FF714C81000
unkown
page execute read
16B2CBC0000
heap
page read and write
2B9364F9000
heap
page read and write
392DE092000
direct allocation
page read and write
7FF791E50000
unkown
page readonly
2B9364B9000
heap
page read and write
2B935FE4000
heap
page read and write
392DE070000
direct allocation
page read and write
190000
heap
page read and write
31AFA000000
direct allocation
page read and write
2B9368BC000
heap
page read and write
2B936932000
heap
page read and write
24D0C1B2000
direct allocation
page read and write
31AF2100000
direct allocation
page read and write
7FF7AC01C000
unkown
page readonly
31AF2183000
direct allocation
page read and write
2B936932000
heap
page read and write
275E8260000
heap
page read and write
2B936948000
heap
page read and write
2B936976000
heap
page read and write
2B936591000
heap
page read and write
31AF2290000
direct allocation
page read and write
BA572FA000
stack
page read and write
2B936911000
heap
page read and write
392DA283000
direct allocation
page read and write
2B936524000
heap
page read and write
2B934508000
heap
page read and write
24D12090000
direct allocation
page read and write
1E127F70000
heap
page read and write
31AF2210000
direct allocation
page read and write
2B937101000
heap
page read and write
BA579FF000
stack
page read and write
984000
heap
page read and write
14329880000
heap
page read and write
2B93682B000
heap
page read and write
2B936911000
heap
page read and write
C32597E000
stack
page read and write
24D12046000
direct allocation
page read and write
1C5E0C30000
heap
page read and write
392DC090000
direct allocation
page read and write
2B935FA7000
heap
page read and write
24D12020000
direct allocation
page read and write
2B93603E000
heap
page read and write
2B936936000
heap
page read and write
2B936911000
heap
page read and write
2B936526000
heap
page read and write
24D10096000
direct allocation
page read and write
2B93688F000
heap
page read and write
89E000
stack
page read and write
2B936A37000
heap
page read and write
25F37B99000
heap
page read and write
14329920000
heap
page read and write
2B93601A000
heap
page read and write
2746BBC8000
heap
page read and write
2B936A12000
heap
page read and write
2B936932000
heap
page read and write
2B936469000
heap
page read and write
2B9364B9000
heap
page read and write
2B9364FF000
heap
page read and write
2B935FD9000
heap
page read and write
7FF714CC4000
unkown
page readonly
1E129930000
direct allocation
page read and write
24D14000000
direct allocation
page read and write
31AF2130000
direct allocation
page read and write
2B9371CD000
heap
page read and write
250F2B20000
heap
page read and write
2B9BB350000
heap
page read and write
24D10080000
direct allocation
page read and write
2B936501000
heap
page read and write
275E82E1000
heap
page read and write
2B9363F4000
heap
page read and write
392DA2A0000
direct allocation
page read and write
2B93640A000
heap
page read and write
2B937101000
heap
page read and write
2B936529000
heap
page read and write
2B936524000
heap
page read and write
2B935FEA000
heap
page read and write
7FF7AAC06000
unkown
page execute read
2B937236000
heap
page read and write
31AF2040000
direct allocation
page read and write
83F000
stack
page read and write
2B93656D000
heap
page read and write
7FF791FAB000
unkown
page read and write
31AF2020000
direct allocation
page read and write
2B9364FE000
heap
page read and write
1E127F7C000
heap
page read and write
2B936501000
heap
page read and write
2B936936000
heap
page read and write
392DA050000
direct allocation
page read and write
52DFE210000
direct allocation
page read and write
14001E000
unkown
page readonly
31AF21E0000
direct allocation
page read and write
2B936B77000
heap
page read and write
2168C7F0000
heap
page read and write
37388FF000
stack
page read and write
392DA210000
direct allocation
page read and write
2B936A12000
heap
page read and write
BF8B3AE000
stack
page read and write
2B935FD2000
heap
page read and write
639B4FF000
stack
page read and write
2B936599000
heap
page read and write
2B9364FE000
heap
page read and write
31AF4000000
direct allocation
page read and write
2B937101000
heap
page read and write
24D16000000
direct allocation
page read and write
2B936932000
heap
page read and write
2B936040000
heap
page read and write
2B9364B9000
heap
page read and write
52E06020000
direct allocation
page read and write
2B935FCD000
heap
page read and write
2B936948000
heap
page read and write
2B936529000
heap
page read and write
2B937A13000
heap
page read and write
2B936948000
heap
page read and write
2168C840000
direct allocation
page read and write
1E129940000
remote allocation
page read and write
2B936936000
heap
page read and write
2B93656D000
heap
page read and write
140001000
unkown
page execute read
24D0C286000
direct allocation
page read and write
31AF2010000
direct allocation
page read and write
2B93656D000
heap
page read and write
2B936FF7000
heap
page read and write
2172D7E1000
heap
page read and write
1FD3A7FD000
heap
page read and write
7FF791F5C000
unkown
page readonly
2B93640F000
heap
page read and write
52DFE180000
direct allocation
page read and write
1C0000
heap
page read and write
24D120A0000
direct allocation
page read and write
2B936529000
heap
page read and write
7FF7AAC03000
unkown
page read and write
392DA150000
direct allocation
page read and write
D6AF8FE000
stack
page read and write
2B937A1B000
heap
page read and write
2B937908000
heap
page read and write
2B9364BC000
heap
page read and write
2172D7E1000
heap
page read and write
2B935FA0000
heap
page read and write
2B936976000
heap
page read and write
52DFE290000
direct allocation
page read and write
2B936932000
heap
page read and write
2B937101000
heap
page read and write
2B93656D000
heap
page read and write
2B936948000
heap
page read and write
2168C820000
heap
page read and write
7FF791A00000
unkown
page readonly
2B936932000
heap
page read and write
2B937901000
heap
page read and write
2B936529000
heap
page read and write
2B9364BC000
heap
page read and write
2B936540000
heap
page read and write
2B937101000
heap
page read and write
There are 1297 hidden memdumps, click here to show them.