IOC Report
lcc222.exe

loading gif

Files

File Path
Type
Category
Malicious
lcc222.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\_MEI72642\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI72642\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lcc222.exe
"C:\Users\user\Desktop\lcc222.exe"
C:\Users\user\Desktop\lcc222.exe
"C:\Users\user\Desktop\lcc222.exe"

URLs

Name
IP
Malicious
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://httpbin.org/post
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://github.com/Ousret/charset_normalizer
unknown
https://pub-df330fbbea624b19b9a4fa4f71271742.r2.dev/windows.zip0
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html
unknown
http://www.firmaprofesional.com/cps0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cpsd
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://html.spec.whatwg.org/multipage/
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
http://crl.dhimyotis.com/certignarootca.crlL
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://requests.readthedocs.io
unknown
https://peps.python.org/pep-0205/
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
https://pub-df330fbbea624b19b9a4fa4f71271742.r2.dev/windows.zipdd
unknown
http://repository.swisssign.com/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://www.python.org
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
http://crl.dhimyotis.com/certignarootca.crlg
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://pub-df330fbbea624b19b9a4fa4f71271742.r2.dev/windows.zip
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://ocsp.accv.es0
unknown
https://www.python.org/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://json.org
unknown
https://httpbin.org/
unknown
https://wwww.certigna.fr/autorites/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/howto/mro.html.
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://twitter.com/
unknown
http://www.quovadisglobal.com/cps
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://google.com/
unknown
https://google.com/mail/
unknown
https://www.python.org/psf/license/
unknown
http://google.com/mail/
unknown
https://github.com/urllib3/urllib3/issues/32902
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
https://github.com/python/importlib_metadata/wiki/Development-Methodology
unknown
https://github.com/urllib3/urllib3/issues/3290
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://www.openssl.org/H
unknown
http://crl.certigna.fr/certignarootca.crl01
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://docs.python.org/3/library/socket.html#socket.socket.connect_ex
unknown
https://google.com/mail
unknown
https://packaging.python.org/specifications/entry-points/
unknown
http://www.accv.es00
unknown
https://www.python.org/psf/license/)
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
unknown
http://crl.securetrust.com/STCA.crlP
unknown
https://peps.python.org/pep-0263/
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
https://github.com/psf/requests/pull/6710
unknown
There are 84 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pub-df330fbbea624b19b9a4fa4f71271742.r2.dev
172.66.0.235

IPs

IP
Domain
Country
Malicious
172.66.0.235
pub-df330fbbea624b19b9a4fa4f71271742.r2.dev
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1D633DAC000
heap
page read and write
1D633F0F000
heap
page read and write
7FFBC3135000
unkown
page read and write
1D633B97000
heap
page read and write
1D634990000
direct allocation
page read and write
1F8625F7000
heap
page read and write
1D633B4B000
heap
page read and write
1D6348EC000
direct allocation
page read and write
7FFBA9B08000
unkown
page execute read
1F8625F1000
heap
page read and write
7FF6CA26E000
unkown
page read and write
1D633B95000
heap
page read and write
1D633EDC000
heap
page read and write
73685E3000
stack
page read and write
1D631EA8000
heap
page read and write
7FF6CA26E000
unkown
page write copy
1D633B91000
heap
page read and write
7FFBAB560000
unkown
page readonly
1D63433E000
heap
page read and write
1D633B6B000
heap
page read and write
1D633BE3000
heap
page read and write
7FFBAB69B000
unkown
page read and write
1D633BEB000
heap
page read and write
7FFBAB5C2000
unkown
page readonly
1F8625F2000
heap
page read and write
1D633EDC000
heap
page read and write
7FFBAA9C1000
unkown
page write copy
1D634346000
heap
page read and write
1D633DC8000
heap
page read and write
1D633D20000
heap
page read and write
7FFBAA8F6000
unkown
page write copy
1D633BA3000
heap
page read and write
1D633BE4000
heap
page read and write
1D633BBB000
heap
page read and write
1D6344C3000
heap
page read and write
1D633C0B000
heap
page read and write
7FFBAA641000
unkown
page readonly
7FFBBC340000
unkown
page readonly
7FFBC3133000
unkown
page readonly
7FFBAB7C0000
unkown
page readonly
1D6349F0000
direct allocation
page read and write
1D633BB6000
heap
page read and write
7FF6CA25B000
unkown
page readonly
7FFBAAA04000
unkown
page read and write
7FFBAA9B3000
unkown
page write copy
1D633BB6000
heap
page read and write
7FFBAA8F5000
unkown
page read and write
1D633BC0000
heap
page read and write
1D634326000
heap
page read and write
1D633E73000
heap
page read and write
7FFBAA390000
unkown
page readonly
1D634579000
heap
page read and write
1D633BA3000
heap
page read and write
7FFBAB60E000
unkown
page readonly
1D633B8B000
heap
page read and write
1D633D81000
heap
page read and write
1D634A04000
direct allocation
page read and write
7FFBB629C000
unkown
page read and write
1D631F99000
heap
page read and write
7FF6CA25B000
unkown
page readonly
7FFBAB6E1000
unkown
page execute read
1D633F0F000
heap
page read and write
1D633B8D000
heap
page read and write
1D633B91000
heap
page read and write
A159BDE000
stack
page read and write
1D634221000
heap
page read and write
7FFBA9E92000
unkown
page readonly
1D633BB6000
heap
page read and write
1D633BB0000
heap
page read and write
1D633DFF000
heap
page read and write
1D633BDE000
heap
page read and write
7FF6CA231000
unkown
page execute read
1D633BEB000
heap
page read and write
1D634264000
heap
page read and write
7FFBBBD90000
unkown
page readonly
1D6342EA000
heap
page read and write
1D633D4B000
heap
page read and write
7FFBAB7B2000
unkown
page readonly
1D63426E000
heap
page read and write
1D634332000
heap
page read and write
1D633B77000
heap
page read and write
7FFBBC151000
unkown
page execute read
7FF6CA25B000
unkown
page readonly
1D633BDF000
heap
page read and write
1D633BB0000
heap
page read and write
1D6343AF000
heap
page read and write
7FFBAB617000
unkown
page readonly
7FFBB6290000
unkown
page readonly
1D633BB6000
heap
page read and write
1D631E50000
heap
page read and write
1D633B8E000
heap
page read and write
1D6349E4000
direct allocation
page read and write
1F8625F2000
heap
page read and write
1D633B71000
heap
page read and write
7FF6CA230000
unkown
page readonly
1D633B97000
heap
page read and write
1D633BA3000
heap
page read and write
7FF6CA274000
unkown
page readonly
7FF6CA231000
unkown
page execute read
1D633B50000
heap
page read and write
7FF6CA230000
unkown
page readonly
7368BBF000
stack
page read and write
7FFBAA9B5000
unkown
page read and write
1D633D81000
heap
page read and write
1D633E93000
heap
page read and write
7FFBBC345000
unkown
page read and write
1D633BD6000
heap
page read and write
7FFBAA981000
unkown
page read and write
7FFBBB6D9000
unkown
page readonly
1F8625F1000
heap
page read and write
1D633D92000
heap
page read and write
1F863FF5000
heap
page read and write
1D633BEF000
heap
page read and write
7FFBAA612000
unkown
page readonly
1D633BA3000
heap
page read and write
7FF6CA230000
unkown
page readonly
1D633DC8000
heap
page read and write
7FFBA9F9C000
unkown
page read and write
1D633B95000
heap
page read and write
1D633BD6000
heap
page read and write
7FFBA9E5B000
unkown
page readonly
7FFBAB6D5000
unkown
page readonly
1D63444A000
heap
page read and write
1D633B9F000
heap
page read and write
1D633DE6000
heap
page read and write
1D633B61000
heap
page read and write
1D633BA2000
heap
page read and write
1D633D4C000
heap
page read and write
7368DAE000
stack
page read and write
7FFBAB681000
unkown
page execute read
1D633B8D000
heap
page read and write
1D633E1B000
heap
page read and write
7FFBAB6B0000
unkown
page readonly
1F863F00000
heap
page read and write
1D631EB0000
heap
page read and write
A159BEC000
stack
page read and write
1F8625B0000
heap
page read and write
1D633B65000
heap
page read and write
1D633D61000
heap
page read and write
1D633DE6000
heap
page read and write
1D6349A8000
direct allocation
page read and write
1F8625F1000
heap
page read and write
7FFBB18A7000
unkown
page read and write
1D633BD6000
heap
page read and write
1F8624D0000
heap
page read and write
1D633BA3000
heap
page read and write
1D633D6E000
heap
page read and write
1D633B95000
heap
page read and write
1D633BAD000
heap
page read and write
1D633B95000
heap
page read and write
1D633EBE000
heap
page read and write
1D633E23000
heap
page read and write
7FFBA9FD4000
unkown
page readonly
1D633BBB000
heap
page read and write
1D63424E000
heap
page read and write
1D633DD1000
heap
page read and write
1D634820000
direct allocation
page read and write
7FFBB1881000
unkown
page execute read
1D633BBB000
heap
page read and write
1D633D87000
heap
page read and write
1D634346000
heap
page read and write
7FFBA9AF2000
unkown
page execute read
1D633B95000
heap
page read and write
7FFBAB66F000
unkown
page readonly
7FFBA9FA2000
unkown
page readonly
1D633B91000
heap
page read and write
7FFBAB672000
unkown
page read and write
7FFBA9B52000
unkown
page execute read
7FFBA9FD0000
unkown
page readonly
7FFBAA9C2000
unkown
page read and write
1D633BD6000
heap
page read and write
1F8625D8000
heap
page read and write
7FFBAB785000
unkown
page readonly
7FFBAA391000
unkown
page execute read
1D634A30000
heap
page read and write
1D633F0F000
heap
page read and write
1F862600000
heap
page read and write
1F8625D0000
heap
page read and write
1D6339D4000
heap
page read and write
1D633B39000
heap
page read and write
7FFBAB700000
unkown
page readonly
1D6342D1000
heap
page read and write
7FFBA9AE0000
unkown
page readonly
1D633B9F000
heap
page read and write
1D633B8D000
heap
page read and write
1D633D51000
heap
page read and write
7FFBAB6E0000
unkown
page readonly
1D633B73000
heap
page read and write
7FFBAB561000
unkown
page execute read
1D6349DC000
direct allocation
page read and write
1D633B97000
heap
page read and write
7FFBBB6E3000
unkown
page readonly
1D634229000
heap
page read and write
1D633BDE000
heap
page read and write
1D633B90000
heap
page read and write
1D633B90000
heap
page read and write
1D633B8D000
heap
page read and write
1D633BEB000
heap
page read and write
7FFBAB6F2000
unkown
page read and write
1D633BDD000
heap
page read and write
1D633B45000
heap
page read and write
7FFBBB6E1000
unkown
page read and write
1D633BA3000
heap
page read and write
7FFBAA8ED000
unkown
page write copy
7FFBA9E59000
unkown
page execute read
7FFBAA97B000
unkown
page read and write
1D634720000
direct allocation
page read and write
7FFBA9F9B000
unkown
page write copy
7FFBAA98B000
unkown
page readonly
1D633BEB000
heap
page read and write
1D633D6E000
heap
page read and write
1D633D95000
heap
page read and write
1D63493C000
direct allocation
page read and write
7FFBBC341000
unkown
page execute read
1F8625F1000
heap
page read and write
1F863FF0000
heap
page read and write
7FFBB18A1000
unkown
page write copy
1D634220000
heap
page read and write
1D633DEA000
heap
page read and write
1F8625F2000
heap
page read and write
1D633EE0000
heap
page read and write
1D634A00000
direct allocation
page read and write
7FFBAB6C8000
unkown
page readonly
1D633DC3000
heap
page read and write
1D633E23000
heap
page read and write
1D633B94000
heap
page read and write
1D6349F8000
direct allocation
page read and write
7FFBAB7AD000
unkown
page read and write
7FFBB1880000
unkown
page readonly
1D633B97000
heap
page read and write
7FFBA9D6E000
unkown
page execute read
1D633E8B000
heap
page read and write
7FFBAB695000
unkown
page readonly
1D633B9E000
heap
page read and write
7FFBA9B02000
unkown
page execute read
1D63432B000
heap
page read and write
1F8625F1000
heap
page read and write
1D633B20000
heap
page read and write
1F8625F1000
heap
page read and write
1D633B5F000
heap
page read and write
1D633BBB000
heap
page read and write
1F8625F2000
heap
page read and write
7FFBBC343000
unkown
page readonly
7FFBBC152000
unkown
page readonly
7FFBAB680000
unkown
page readonly
A15A1BE000
stack
page read and write
1F862601000
heap
page read and write
1F8625F1000
heap
page read and write
7FFBAA886000
unkown
page read and write
1D633B97000
heap
page read and write
1D631E10000
heap
page read and write
7FFBBBDA8000
unkown
page read and write
1D63388C000
direct allocation
page read and write
1D633E33000
heap
page read and write
1F8625F1000
heap
page read and write
7FFBBBDA9000
unkown
page readonly
1D633B95000
heap
page read and write
1D633D9C000
heap
page read and write
7FFBAB565000
unkown
page readonly
1D633D86000
heap
page read and write
7FFBBC346000
unkown
page readonly
1D633BF4000
heap
page read and write
1D6349EC000
direct allocation
page read and write
7FFBAA97C000
unkown
page write copy
1D633B6B000
heap
page read and write
1F8625F1000
heap
page read and write
1D633F20000
direct allocation
page read and write
1D634246000
heap
page read and write
1D634A80000
heap
page read and write
7FFBC3136000
unkown
page readonly
1D633BE1000
heap
page read and write
7FFBAB7B8000
unkown
page readonly
7FFBAA6B7000
unkown
page readonly
1D633DC5000
heap
page read and write
7FFBAB6EE000
unkown
page readonly
1D633BBB000
heap
page read and write
1D6348E0000
direct allocation
page read and write
1F8625FE000
heap
page read and write
1D633BB0000
heap
page read and write
1D633BA2000
heap
page read and write
1D633BEB000
heap
page read and write
1D633BDE000
heap
page read and write
7FFBA9F9D000
unkown
page write copy
1D634904000
direct allocation
page read and write
1D6339D0000
heap
page read and write
7FFBAA9B0000
unkown
page read and write
7FFBB18A9000
unkown
page readonly
7FFBBBD91000
unkown
page execute read
7FFBAA782000
unkown
page readonly
1D633C20000
direct allocation
page read and write
7FFBB629E000
unkown
page readonly
7FFBA9AE1000
unkown
page execute read
1D634120000
direct allocation
page read and write
7FF6CA231000
unkown
page execute read
1D63433A000
heap
page read and write
1D633B9F000
heap
page read and write
1D633BBB000
heap
page read and write
1D633DD1000
heap
page read and write
1D633E9A000
heap
page read and write
1D633B4C000
heap
page read and write
1D6342C1000
heap
page read and write
1D6344AC000
heap
page read and write
1D633B39000
heap
page read and write
7FF6CA26E000
unkown
page write copy
1D633B9F000
heap
page read and write
1D631F21000
heap
page read and write
1D633B71000
heap
page read and write
1D634330000
heap
page read and write
7FFBAB6D4000
unkown
page read and write
1D633B8D000
heap
page read and write
7FFBB6297000
unkown
page readonly
1F8625FF000
heap
page read and write
1D633D7A000
heap
page read and write
1D633DF3000
heap
page read and write
7FFBA9B8C000
unkown
page execute read
1D634A83000
heap
page read and write
7FF6CA274000
unkown
page readonly
1D633EBD000
heap
page read and write
1D633BB6000
heap
page read and write
7FFBB6291000
unkown
page execute read
7FF6CA274000
unkown
page readonly
1D633BD6000
heap
page read and write
1D633EFB000
heap
page read and write
7FF6CA26E000
unkown
page read and write
1F8625F9000
heap
page read and write
7FFBA9F69000
unkown
page readonly
7FFBAA9B2000
unkown
page read and write
1D631E20000
heap
page read and write
1D633DEA000
heap
page read and write
7FFBC3130000
unkown
page readonly
1F8625F2000
heap
page read and write
7FFBA9B67000
unkown
page execute read
1D633B7F000
heap
page read and write
7FFBA9B77000
unkown
page execute read
7FFBAB701000
unkown
page execute read
7FF6CA25B000
unkown
page readonly
1D6343C2000
heap
page read and write
7FF6CA271000
unkown
page read and write
1D633BDB000
heap
page read and write
A15A3AE000
stack
page read and write
1D633BD6000
heap
page read and write
7FFBBC154000
unkown
page readonly
1D633B66000
heap
page read and write
1D634998000
direct allocation
page read and write
7FFBBBDA3000
unkown
page readonly
73685E7000
stack
page read and write
1D633BE3000
heap
page read and write
1D633B6B000
heap
page read and write
1D633D76000
heap
page read and write
7FFBB188D000
unkown
page readonly
1D633D7F000
heap
page read and write
1D633B7A000
heap
page read and write
1D633E6C000
heap
page read and write
7FFBBC150000
unkown
page readonly
7FFBA9B7E000
unkown
page execute read
1D633B97000
heap
page read and write
1D634336000
heap
page read and write
1D633DDC000
heap
page read and write
1D6349B4000
direct allocation
page read and write
7FFBAA632000
unkown
page readonly
1D63425E000
heap
page read and write
1D6349C0000
direct allocation
page read and write
1D633BB6000
heap
page read and write
7FFBAA8F7000
unkown
page read and write
1D633BEA000
heap
page read and write
1D633B45000
heap
page read and write
1D633D8D000
heap
page read and write
1D633DF3000
heap
page read and write
1D633B95000
heap
page read and write
1D63433A000
heap
page read and write
1D634312000
heap
page read and write
1D633E02000
heap
page read and write
7FF6CA272000
unkown
page read and write
1D633B9D000
heap
page read and write
1D633810000
direct allocation
page read and write
1D634974000
direct allocation
page read and write
1D634620000
direct allocation
page read and write
1D633B9F000
heap
page read and write
7FFBBB6D1000
unkown
page execute read
1D631E90000
direct allocation
page read and write
1F863E80000
heap
page read and write
7FF6CA231000
unkown
page execute read
1D633E97000
heap
page read and write
7FFBA9F2A000
unkown
page readonly
1D633C13000
heap
page read and write
1D634370000
heap
page read and write
1D634520000
heap
page read and write
1D6342C1000
heap
page read and write
7FFBAA9B1000
unkown
page write copy
1D634305000
heap
page read and write
1D6345A9000
heap
page read and write
7FFBA9ECF000
unkown
page readonly
7FFBAB69F000
unkown
page readonly
1D6342F6000
heap
page read and write
1D634920000
direct allocation
page read and write
73685ED000
stack
page read and write
1D634020000
direct allocation
page read and write
1D63427E000
heap
page read and write
1D633BD6000
heap
page read and write
1D63442A000
heap
page read and write
7FFBAB612000
unkown
page readonly
1D631EA0000
heap
page read and write
1F8625F1000
heap
page read and write
7FFBA9F9E000
unkown
page read and write
7FFBAAA21000
unkown
page readonly
7FFBAB783000
unkown
page execute read
1F8625F2000
heap
page read and write
1D6349C4000
direct allocation
page read and write
1D6343A2000
heap
page read and write
1D633B97000
heap
page read and write
1D633BBB000
heap
page read and write
7FFBAB6CC000
unkown
page readonly
7FFBAA97F000
unkown
page read and write
1D633E90000
heap
page read and write
1D633B9F000
heap
page read and write
1D633B6B000
heap
page read and write
1D633BA9000
heap
page read and write
1F8625F2000
heap
page read and write
7FFBAB6F3000
unkown
page readonly
1D633B63000
heap
page read and write
7FFBC3131000
unkown
page execute read
7FFBAA8F8000
unkown
page write copy
1D6349FC000
direct allocation
page read and write
1D633B9F000
heap
page read and write
7FF6CA230000
unkown
page readonly
1D633BB6000
heap
page read and write
1D634984000
direct allocation
page read and write
1D6349D8000
direct allocation
page read and write
7FFBAB674000
unkown
page readonly
1F8625DD000
heap
page read and write
7FFBBB6D0000
unkown
page readonly
1F8625F1000
heap
page read and write
7FFBB18A0000
unkown
page read and write
1D633BD6000
heap
page read and write
1D633BF4000
heap
page read and write
7FFBAB6B1000
unkown
page execute read
1D633B6B000
heap
page read and write
1D633BC8000
heap
page read and write
1D633B61000
heap
page read and write
7FF6CA274000
unkown
page readonly
1D633BA3000
heap
page read and write
There are 431 hidden memdumps, click here to show them.