IOC Report
6723653391970.vbs

loading gif

Files

File Path
Type
Category
Malicious
6723653391970.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\hcx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_672365339188b\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_672365339188b\BLOCKBUSTER.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\_672365339188b\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\_672365339188b\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\wewewe[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_672365339188b\BLOCKBUSTER.dll
data
dropped
C:\_672365339188b\MPDK.bat
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6723653391970.vbs"
malicious
C:\_672365339188b\BLOCKBUSTER.exe
"C:\_672365339188b\BLOCKBUSTER.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im BLOCKBUSTER.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 50 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://64.95.10.38/contador/index.php?nomepc=user-PC
64.95.10.38
malicious
http://tgb5255365e.servegame.com:2530/
70.34.247.142
malicious
http://64.95.10.38/wewewe.zip
64.95.10.38
malicious
http://64.95.10.38/contador/index.php?nomepc=
unknown
malicious
http://www.ghisler.com/plugins.htm
unknown
http://www.scootersoftware.com. 
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
http://worldtimeapi.org/api/ip
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://www.indyproject.org/
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://www.scootersoftware.com/upgrade
unknown
http://www.scootersoftware.com/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
http://70.34.247.142/UPLOADMAISL.phpU
unknown
http://www.scootersoftware.com/support.php
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://www.scootersoftware.com/download.php
unknown
http://www.scootersoftware.com/v3formats
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://worldtimeapi.org:80/api/ip
unknown
http://www.secureblackbox.com
unknown
http://www.scootersoftware.com/bugRepMailer.phpG
unknown
http://www.scootersoftware.com/upgrader
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tgb5255365e.servegame.com
70.34.247.142
malicious
worldtimeapi.org
213.188.196.246

IPs

IP
Domain
Country
Malicious
70.34.247.142
tgb5255365e.servegame.com
United States
malicious
64.95.10.38
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
213.188.196.246
worldtimeapi.org
Italy

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BLOCKBUSTER

Memdumps

Base Address
Regiontype
Protect
Malicious
1B9C9404000
heap
page read and write
543E000
stack
page read and write
1B9CAC70000
heap
page read and write
B825000
direct allocation
page read and write
6F8BF000
unkown
page read and write
2FE0000
heap
page read and write
1B9C94A2000
heap
page read and write
918F000
unkown
page read and write
DC6D000
heap
page read and write
1B9CADFC000
heap
page read and write
316F000
stack
page read and write
103E000
heap
page read and write
2C11000
heap
page read and write
1B9C9409000
heap
page read and write
2C11000
heap
page read and write
1B9CA5BC000
heap
page read and write
2C11000
heap
page read and write
B4FC000
trusted library allocation
page read and write
BC8D000
stack
page read and write
1B9C9CA0000
heap
page read and write
2A5F000
direct allocation
page read and write
2B53000
direct allocation
page read and write
31C6000
heap
page read and write
929B000
unkown
page read and write
30FC000
stack
page read and write
10E1000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2F4F000
stack
page read and write
2DD6000
heap
page read and write
1013000
heap
page read and write
95C6000
unkown
page readonly
1B9C93F9000
heap
page read and write
106B000
heap
page read and write
3000000
heap
page read and write
96AA000
unkown
page readonly
1B9C93ED000
heap
page read and write
3540000
heap
page read and write
95D6000
unkown
page readonly
31D4000
heap
page read and write
1B9CA431000
heap
page read and write
1B9C8A2E000
heap
page read and write
1B9C30E0000
heap
page read and write
2C11000
heap
page read and write
A6B0000
direct allocation
page read and write
1B9C9428000
heap
page read and write
3180000
heap
page read and write
1B9CAEC3000
heap
page read and write
2FA3000
heap
page read and write
94FD000
unkown
page readonly
33A0000
heap
page read and write
A2DD000
direct allocation
page read and write
10A2000
heap
page read and write
2C11000
heap
page read and write
B89B000
direct allocation
page read and write
2FAC000
heap
page read and write
1B9C9188000
heap
page read and write
DC53000
heap
page read and write
1B9C8E2E000
heap
page read and write
3216000
heap
page read and write
95BB000
unkown
page readonly
91B7000
unkown
page write copy
B37E000
direct allocation
page read and write
1B9C7E14000
heap
page read and write
2B04000
heap
page read and write
2C11000
heap
page read and write
9546000
unkown
page readonly
316F000
unkown
page read and write
304C000
heap
page read and write
964A000
unkown
page readonly
2C11000
heap
page read and write
1B9C93E7000
heap
page read and write
3223000
heap
page read and write
1B9C8B36000
heap
page read and write
1B9C93F7000
heap
page read and write
B29000
unkown
page read and write
1B9C8968000
heap
page read and write
2C11000
heap
page read and write
926A000
unkown
page read and write
2C11000
heap
page read and write
95C2000
unkown
page readonly
2C11000
heap
page read and write
1B9C93E9000
heap
page read and write
1B9C9778000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
965F000
unkown
page readonly
3279000
heap
page read and write
32E3000
heap
page read and write
2C11000
heap
page read and write
1B9C9409000
heap
page read and write
1B9C9432000
heap
page read and write
1B9C315D000
heap
page read and write
B4F9000
trusted library allocation
page read and write
1B9CA186000
heap
page read and write
1B9C96B2000
heap
page read and write
A82C000
stack
page read and write
1B9C9314000
heap
page read and write
B28000
unkown
page write copy
10F8000
heap
page read and write
BA4E000
stack
page read and write
33F0000
heap
page read and write
1B9C941C000
heap
page read and write
1B9C941C000
heap
page read and write
9667000
unkown
page readonly
2C11000
heap
page read and write
1B9CABEC000
heap
page read and write
2A3B000
heap
page read and write
1B9CAF88000
heap
page read and write
1B9C93FD000
heap
page read and write
6B51000
unkown
page execute read
1B9CA640000
heap
page read and write
2C11000
heap
page read and write
B8A9000
direct allocation
page read and write
2DE4000
heap
page read and write
1B9C366F000
heap
page read and write
2DB0000
heap
page read and write
1B9CA24C000
heap
page read and write
2C11000
heap
page read and write
1B9C9409000
heap
page read and write
1B9C8CA2000
heap
page read and write
2C11000
heap
page read and write
B0F0000
remote allocation
page read and write
1B9C9412000
heap
page read and write
A319000
direct allocation
page read and write
9266000
unkown
page read and write
2C11000
heap
page read and write
3990000
heap
page read and write
1B9C8BFC000
heap
page read and write
54CC000
unkown
page execute read
3073000
heap
page read and write
3279000
heap
page read and write
2A7E000
unkown
page read and write
7CD6000
unkown
page execute read
2C11000
heap
page read and write
2B28000
direct allocation
page read and write
1B9C941C000
heap
page read and write
2B04000
direct allocation
page read and write
2F70000
heap
page read and write
1B9C9B14000
heap
page read and write
1B9C3471000
heap
page read and write
1B9CAAE4000
heap
page read and write
10C9000
heap
page read and write
1B9C8D27000
heap
page read and write
1B9C30B6000
heap
page read and write
1B9C89EC000
heap
page read and write
B50B000
trusted library allocation
page read and write
954B000
unkown
page readonly
1B9C30DA000
heap
page read and write
68F8000
unkown
page execute read
1B9CB00C000
heap
page read and write
2C11000
heap
page read and write
1B9C8CE4000
heap
page read and write
1B9C93FD000
heap
page read and write
B6F1000
direct allocation
page read and write
DB95000
heap
page read and write
2DBC000
heap
page read and write
DBC3000
heap
page read and write
1B9C99CA000
heap
page read and write
5460000
direct allocation
page execute and read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9C9421000
heap
page read and write
343E000
stack
page read and write
A3AB000
direct allocation
page read and write
1B9C89EC000
heap
page read and write
2C11000
heap
page read and write
915A000
unkown
page execute read
B4F9000
trusted library allocation
page read and write
1B9C9BDA000
heap
page read and write
1B9C9671000
heap
page read and write
1067000
heap
page read and write
1B9C93ED000
heap
page read and write
1B9C98C2000
heap
page read and write
2C11000
heap
page read and write
2ADD000
stack
page read and write
1B9CA20A000
heap
page read and write
DB81000
heap
page read and write
B2E4000
direct allocation
page read and write
2C11000
heap
page read and write
1B9CACB2000
heap
page read and write
1B9C86A2000
heap
page read and write
B2E0000
direct allocation
page read and write
1B9CA5FF000
heap
page read and write
968A000
unkown
page readonly
DBEB000
heap
page read and write
DC15000
heap
page read and write
3420000
heap
page read and write
54B3000
unkown
page execute read
95D3000
unkown
page readonly
1114000
heap
page read and write
1B9CB00C000
heap
page read and write
31F0000
heap
page read and write
9524000
unkown
page readonly
9596000
unkown
page readonly
95EE000
unkown
page readonly
1B9CA4F6000
heap
page read and write
B640000
direct allocation
page read and write
1B9CAE80000
heap
page read and write
AB6000
unkown
page read and write
1B9C924E000
heap
page read and write
294D000
stack
page read and write
1B9C9B99000
heap
page read and write
1B9C9406000
heap
page read and write
2C11000
heap
page read and write
31AE000
stack
page read and write
2C11000
heap
page read and write
1B9C8F36000
heap
page read and write
1B9CAA60000
heap
page read and write
1287C000
stack
page read and write
12CFF000
stack
page read and write
2A35000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9C315D000
heap
page read and write
1B9C30E0000
heap
page read and write
A410000
direct allocation
page read and write
1B9CA2D0000
heap
page read and write
1B9CA4B4000
heap
page read and write
3460000
heap
page read and write
76FE000
unkown
page execute read
32E4000
heap
page read and write
B4F1000
trusted library allocation
page read and write
B4E6000
trusted library allocation
page read and write
2DEA000
heap
page read and write
9583000
unkown
page readonly
A76E000
direct allocation
page read and write
B6FC000
direct allocation
page read and write
1B9C8E70000
heap
page read and write
2C11000
heap
page read and write
1B9C8D68000
heap
page read and write
2A8E000
direct allocation
page read and write
B6E3000
direct allocation
page read and write
2C11000
heap
page read and write
9626000
unkown
page readonly
2B04000
heap
page read and write
3273000
heap
page read and write
1B9C8AB2000
heap
page read and write
7A1F000
unkown
page execute read
2C3D000
stack
page read and write
32D1000
heap
page read and write
1B9CAAA2000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9C93E3000
heap
page read and write
1B9C93F9000
heap
page read and write
31D4000
heap
page read and write
9686000
unkown
page readonly
967A000
unkown
page readonly
1B9C9428000
heap
page read and write
B37C000
direct allocation
page read and write
2C11000
heap
page read and write
1B9C93E9000
heap
page read and write
967F000
unkown
page readonly
6206000
unkown
page execute read
2D0C000
heap
page read and write
956D000
unkown
page readonly
2C11000
heap
page read and write
955D000
unkown
page readonly
91A4000
unkown
page read and write
1B9C8F78000
heap
page read and write
1B9C91CA000
heap
page read and write
2C11000
heap
page read and write
1B9C941C000
heap
page read and write
2FA3000
heap
page read and write
3273000
heap
page read and write
2A20000
heap
page read and write
3061000
heap
page read and write
2EEE000
unkown
page read and write
2C11000
heap
page read and write
12ABC000
stack
page read and write
2C11000
heap
page read and write
9518000
unkown
page readonly
1B9CA144000
heap
page read and write
A6F9000
direct allocation
page read and write
34C4000
heap
page read and write
1B9CB0F3000
heap
page read and write
385F000
stack
page read and write
B6A7000
direct allocation
page read and write
1B9CAFCA000
heap
page read and write
2B04000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9CA99B000
heap
page read and write
34F0000
heap
page read and write
2E40000
heap
page read and write
1B9C9356000
heap
page read and write
1B9CAF47000
heap
page read and write
11AC6000
heap
page read and write
1B9CA538000
heap
page read and write
2B3D000
direct allocation
page read and write
B0F0000
remote allocation
page read and write
A324000
direct allocation
page read and write
B04A000
stack
page read and write
1092000
heap
page read and write
2C11000
heap
page read and write
2DE3000
heap
page read and write
1B9C97FC000
heap
page read and write
1B9C9F76000
heap
page read and write
2FA3000
heap
page read and write
966E000
unkown
page readonly
1B9CA8D4000
heap
page read and write
31C1000
heap
page read and write
6F890000
unkown
page readonly
1B9CA28E000
heap
page read and write
42C000
unkown
page execute read
92AB000
unkown
page write copy
1010000
heap
page read and write
1128000
heap
page read and write
B7CF000
direct allocation
page read and write
329F000
unkown
page read and write
EF4000
heap
page read and write
2C11000
heap
page read and write
B16000
unkown
page read and write
2C11000
heap
page read and write
1B9C941C000
heap
page read and write
A2EC000
direct allocation
page read and write
2AC9000
direct allocation
page read and write
9635000
unkown
page readonly
2E90000
heap
page read and write
1B9C376E000
heap
page read and write
2C11000
heap
page read and write
1B9CA850000
heap
page read and write
2E00000
heap
page read and write
1B9CADBB000
heap
page read and write
2C11000
heap
page read and write
2C20000
heap
page read and write
2F10000
heap
page read and write
ADF000
unkown
page write copy
6837000
unkown
page execute read
9590000
unkown
page readonly
B4FC000
trusted library allocation
page read and write
2C11000
heap
page read and write
1B9C9419000
heap
page read and write
9556000
unkown
page readonly
95E3000
unkown
page readonly
3100000
heap
page read and write
A6DC000
direct allocation
page read and write
B50B000
trusted library allocation
page read and write
1B9C941C000
heap
page read and write
B160000
direct allocation
page execute and read and write
2C11000
heap
page read and write
1B9C9421000
heap
page read and write
34C3000
heap
page read and write
2C11000
heap
page read and write
1B9C95AA000
heap
page read and write
1B9C9401000
heap
page read and write
1B9C9EF2000
heap
page read and write
2DDE000
stack
page read and write
9586000
unkown
page readonly
1B9C9D24000
heap
page read and write
1B9CAAA3000
heap
page read and write
2C11000
heap
page read and write
1B9C9A4E000
heap
page read and write
2B0B000
direct allocation
page read and write
B4E0000
trusted library allocation
page read and write
2A3D000
heap
page read and write
2C11000
heap
page read and write
1B9CACF4000
heap
page read and write
1B9CAF04000
heap
page read and write
DC55000
heap
page read and write
2A30000
heap
page read and write
B79C000
direct allocation
page read and write
1B9C9411000
heap
page read and write
2C11000
heap
page read and write
1B9C920D000
heap
page read and write
2F20000
heap
page read and write
FFD60000
direct allocation
page read and write
6F8C2000
unkown
page readonly
1B9C9428000
heap
page read and write
1B9CA958000
heap
page read and write
B4F1000
trusted library allocation
page read and write
951C000
unkown
page readonly
9529000
unkown
page readonly
2EFD000
stack
page read and write
1B9C942C000
heap
page read and write
108C000
heap
page read and write
2D35000
heap
page read and write
31C0000
heap
page read and write
2C11000
heap
page read and write
54A1000
unkown
page execute read
A757000
direct allocation
page read and write
FFF000
stack
page read and write
B50B000
trusted library allocation
page read and write
1B9CAA60000
heap
page read and write
1B9CB04F000
heap
page read and write
1B9CB09E000
heap
page read and write
B4F1000
trusted library allocation
page read and write
1B9CA102000
heap
page read and write
29FE000
unkown
page read and write
DB8F000
heap
page read and write
1B9C8BFC000
heap
page read and write
2A0E000
stack
page read and write
1B9C30B9000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9C8FBB000
heap
page read and write
1B9CA354000
heap
page read and write
2B03000
heap
page read and write
1B9CAF46000
heap
page read and write
DB87000
heap
page read and write
1B9C87EC000
heap
page read and write
2AD1000
direct allocation
page read and write
5450000
heap
page read and write
12BBD000
stack
page read and write
1B9C9526000
heap
page read and write
31A0000
heap
page read and write
1B9CB0EE000
heap
page read and write
B4E0000
trusted library allocation
page read and write
1B9C9421000
heap
page read and write
7928000
unkown
page execute read
1B9C93F5000
heap
page read and write
B37E000
direct allocation
page read and write
1B9C96F4000
heap
page read and write
2FA4000
heap
page read and write
1B9C9E2C000
heap
page read and write
1B9CB0F9000
heap
page read and write
33D0000
heap
page read and write
337F000
stack
page read and write
1B9C9409000
heap
page read and write
1B9C93FA000
heap
page read and write
1B9CA187000
heap
page read and write
9553000
unkown
page readonly
2D3C000
stack
page read and write
1B9C93FA000
heap
page read and write
2C11000
heap
page read and write
31D3000
heap
page read and write
1B9CADFC000
heap
page read and write
1B9CABEC000
heap
page read and write
10CB000
heap
page read and write
2C11000
heap
page read and write
A74F000
direct allocation
page read and write
2F5E000
unkown
page read and write
2C11000
heap
page read and write
2F90000
heap
page read and write
1B9C8968000
heap
page read and write
1B9C88A2000
heap
page read and write
1B9C9A90000
heap
page read and write
400000
unkown
page readonly
3650000
heap
page read and write
2B21000
direct allocation
page read and write
2DE3000
heap
page read and write
2CFD000
stack
page read and write
1108000
heap
page read and write
1B9CAEC2000
heap
page read and write
956A000
unkown
page readonly
B832000
direct allocation
page read and write
91B9000
unkown
page read and write
1B9C95AA000
heap
page read and write
9608000
unkown
page readonly
12BFE000
stack
page read and write
1B9C93EC000
heap
page read and write
2C11000
heap
page read and write
2DE3000
heap
page read and write
1B9C895F000
heap
page read and write
1B9CACF4000
heap
page read and write
95F7000
unkown
page readonly
962D000
unkown
page readonly
1B9C97BA000
heap
page read and write
1B9CAC70000
heap
page read and write
1B9CB090000
heap
page read and write
2C11000
heap
page read and write
1B9CA2D0000
heap
page read and write
2C11000
heap
page read and write
B13E000
stack
page read and write
2C11000
heap
page read and write
92B2000
unkown
page read and write
1B9CAB68000
heap
page read and write
1B9C8861000
heap
page read and write
1B9C9CE2000
heap
page read and write
1B9C9B56000
heap
page read and write
1B9C9421000
heap
page read and write
E6E000
stack
page read and write
2D22000
heap
page read and write
2C11000
heap
page read and write
1B9C93DA000
heap
page read and write
3223000
heap
page read and write
1B9CABAB000
heap
page read and write
AFD000
unkown
page read and write
2B04000
heap
page read and write
2FA4000
heap
page read and write
3074000
heap
page read and write
91A7000
unkown
page write copy
3066000
heap
page read and write
2AF1000
heap
page read and write
1B9C93E6000
heap
page read and write
B37E000
direct allocation
page read and write
2C11000
heap
page read and write
31C3000
heap
page read and write
2C11000
heap
page read and write
2F93000
heap
page read and write
1B9C9404000
heap
page read and write
957A000
unkown
page readonly
2B45000
direct allocation
page read and write
DC26000
heap
page read and write
B665000
direct allocation
page read and write
1B9C8960000
heap
page read and write
3170000
heap
page read and write
2DE3000
heap
page read and write
DC1D000
heap
page read and write
1B9C941C000
heap
page read and write
A540000
direct allocation
page read and write
B7B2000
direct allocation
page read and write
2B03000
heap
page read and write
2C11000
heap
page read and write
9570000
unkown
page readonly
B4E0000
trusted library allocation
page read and write
2AED000
direct allocation
page read and write
1B9CA6C4000
heap
page read and write
DB8C000
heap
page read and write
1B9C9F34000
heap
page read and write
D16F000
stack
page read and write
2BCC000
stack
page read and write
1B9CB0E6000
heap
page read and write
B51E000
stack
page read and write
B37E000
direct allocation
page read and write
360F000
stack
page read and write
32E4000
heap
page read and write
1B9CAD36000
heap
page read and write
1B9CABEC000
heap
page read and write
1B9C8EF4000
heap
page read and write
9521000
unkown
page readonly
1B9CAD37000
heap
page read and write
2AB2000
direct allocation
page read and write
1B9C9434000
heap
page read and write
12980000
heap
page read and write
9671000
unkown
page readonly
3190000
heap
page read and write
2C11000
heap
page read and write
2C29000
heap
page read and write
1B9C9146000
heap
page read and write
B4E0000
trusted library allocation
page read and write
1B9C9D66000
heap
page read and write
2C11000
heap
page read and write
A1A5000
unkown
page readonly
3074000
heap
page read and write
1B9C7414000
heap
page read and write
2F7C000
heap
page read and write
32E4000
heap
page read and write
2C11000
heap
page read and write
2F8E000
stack
page read and write
1B9CA07E000
heap
page read and write
2C11000
heap
page read and write
3280000
heap
page read and write
1B9C9430000
heap
page read and write
31C0000
heap
page read and write
1B9C8DAA000
heap
page read and write
1B9CA78B000
heap
page read and write
2EEE000
stack
page read and write
95B4000
unkown
page readonly
1B9CB09E000
heap
page read and write
2E4E000
stack
page read and write
2C11000
heap
page read and write
2F91000
heap
page read and write
91C7000
unkown
page read and write
1B9C94A2000
heap
page read and write
2DE3000
heap
page read and write
1B9C9461000
heap
page read and write
6CA7000
unkown
page execute read
34C3000
heap
page read and write
A2CF000
stack
page read and write
B65E000
direct allocation
page read and write
2E7D000
stack
page read and write
1B9C3970000
heap
page read and write
2C11000
heap
page read and write
2BF0000
heap
page read and write
1B9C9AD2000
heap
page read and write
1B9CADFC000
heap
page read and write
1B9CA78A000
heap
page read and write
31CE000
unkown
page read and write
320E000
stack
page read and write
2D9F000
unkown
page read and write
1B9CAC2E000
heap
page read and write
2F40000
heap
page read and write
1B9C9404000
heap
page read and write
1B9C9428000
heap
page read and write
B4F9000
trusted library allocation
page read and write
2C11000
heap
page read and write
1B9CA958000
heap
page read and write
2AFC000
direct allocation
page read and write
32E4000
heap
page read and write
679C000
unkown
page execute read
2C11000
heap
page read and write
1B9CAC2F000
heap
page read and write
1B9C941C000
heap
page read and write
1B9C903E000
heap
page read and write
1B9CA9DC000
heap
page read and write
FFDD0000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
B2E4000
direct allocation
page read and write
1B9CA397000
heap
page read and write
ACB000
unkown
page write copy
3990000
heap
page read and write
1B9C8F78000
heap
page read and write
1B9C9FFA000
heap
page read and write
1B9C9080000
heap
page read and write
DBFD000
heap
page read and write
2C11000
heap
page read and write
1B9C93ED000
heap
page read and write
1B9C9398000
heap
page read and write
92A1000
unkown
page read and write
B4DD000
trusted library allocation
page read and write
7E5F000
unkown
page execute read
A2FC000
direct allocation
page read and write
95F9000
unkown
page readonly
34C4000
heap
page read and write
A341000
direct allocation
page read and write
B87E000
direct allocation
page read and write
1B9C8DEC000
heap
page read and write
9593000
unkown
page readonly
2C11000
heap
page read and write
BA0D000
stack
page read and write
1B9CA354000
heap
page read and write
1B9C9421000
heap
page read and write
9507000
unkown
page readonly
2EA0000
heap
page read and write
B801000
direct allocation
page read and write
5490000
heap
page read and write
3063000
heap
page read and write
1B9C9E6E000
heap
page read and write
1B9C9BDA000
heap
page read and write
1B9C97BA000
heap
page read and write
2E40000
heap
page read and write
2F20000
heap
page read and write
34B3000
heap
page read and write
9580000
unkown
page readonly
B82B000
direct allocation
page read and write
2D35000
heap
page read and write
961C000
unkown
page readonly
10A5000
heap
page read and write
2C11000
heap
page read and write
1B9C92D2000
heap
page read and write
2A96000
direct allocation
page read and write
BE0E000
stack
page read and write
1087000
heap
page read and write
1B9C315D000
heap
page read and write
1B9C9400000
heap
page read and write
2AF6000
heap
page read and write
2D00000
heap
page read and write
1B9CA5BC000
heap
page read and write
1B9CA1C8000
heap
page read and write
2F60000
heap
page read and write
A739000
direct allocation
page read and write
A747000
direct allocation
page read and write
B50B000
trusted library allocation
page read and write
2A6E000
direct allocation
page read and write
B4FC000
trusted library allocation
page read and write
33EF000
stack
page read and write
D40000
heap
page read and write
30E0000
heap
page read and write
401000
unkown
page execute read
A92E000
stack
page read and write
1B9C93F8000
heap
page read and write
2C11000
heap
page read and write
1B9C8BB1000
heap
page read and write
2DA0000
heap
page read and write
34B6000
heap
page read and write
92A6000
unkown
page read and write
1B9C9B98000
heap
page read and write
1B9CA4B4000
heap
page read and write
1B9CA538000
heap
page read and write
1B9C9988000
heap
page read and write
1B9C9A0D000
heap
page read and write
A2D0000
direct allocation
page read and write
DB76000
heap
page read and write
AF8000
unkown
page read and write
1067000
heap
page read and write
1B9CB04E000
heap
page read and write
1B9CAF88000
heap
page read and write
303D000
stack
page read and write
103A000
heap
page read and write
B8B8000
direct allocation
page read and write
1B9C9421000
heap
page read and write
2C11000
heap
page read and write
ACB000
unkown
page read and write
32DE000
unkown
page read and write
2FA4000
heap
page read and write
B50B000
trusted library allocation
page read and write
1B9C9FFA000
heap
page read and write
1B9C8661000
heap
page read and write
91E0000
unkown
page read and write
31D4000
heap
page read and write
1B9C9409000
heap
page read and write
2A80000
heap
page read and write
2D26000
heap
page read and write
2F3E000
unkown
page read and write
B31000
unkown
page readonly
B1C000
unkown
page read and write
9676000
unkown
page readonly
A537000
direct allocation
page read and write
2C11000
heap
page read and write
1B9CA748000
heap
page read and write
1B9CAF88000
heap
page read and write
32BF000
unkown
page read and write
73EC000
unkown
page execute read
B4FC000
trusted library allocation
page read and write
1B9C93FD000
heap
page read and write
2C11000
heap
page read and write
2AA4000
direct allocation
page read and write
11AC0000
heap
page read and write
E20000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
AB3000
unkown
page write copy
3180000
heap
page read and write
B13000
unkown
page read and write
41C000
unkown
page execute read
1B9C983E000
heap
page read and write
1B9CACF4000
heap
page read and write
1B9CAD78000
heap
page read and write
329F000
stack
page read and write
400000
unkown
page readonly
2B2F000
direct allocation
page read and write
1B9CADBA000
heap
page read and write
1B9C8C61000
heap
page read and write
2C11000
heap
page read and write
1B9C9412000
heap
page read and write
651F000
unkown
page execute read
2F96000
heap
page read and write
1B9C315D000
heap
page read and write
1B9CA9DC000
heap
page read and write
2F7D000
stack
page read and write
B0A000
unkown
page read and write
2AA0000
heap
page read and write
3990000
heap
page read and write
1B9C315D000
heap
page read and write
2EFD000
stack
page read and write
963D000
unkown
page readonly
108F000
heap
page read and write
1B9C9C5E000
heap
page read and write
2C11000
heap
page read and write
2AD8000
direct allocation
page read and write
313C000
stack
page read and write
2C11000
heap
page read and write
2A47000
direct allocation
page read and write
1B9C983E000
heap
page read and write
2C11000
heap
page read and write
1B9C9400000
heap
page read and write
B4E0000
trusted library allocation
page read and write
A678000
direct allocation
page read and write
6F891000
unkown
page execute read
1B9C93F5000
heap
page read and write
BCCE000
stack
page read and write
DB7D000
heap
page read and write
2C11000
heap
page read and write
1B9C941C000
heap
page read and write
32E3000
heap
page read and write
DBDE000
heap
page read and write
958D000
unkown
page readonly
1B9CA538000
heap
page read and write
1B9C8BBA000
heap
page read and write
112E000
heap
page read and write
3272000
heap
page read and write
3224000
heap
page read and write
B4F9000
trusted library allocation
page read and write
1B9C8D68000
heap
page read and write
1B9C8926000
heap
page read and write
1B9C8E70000
heap
page read and write
6F8B9000
unkown
page read and write
5ECC000
unkown
page execute read
54A0000
unkown
page readonly
1B9C8AB2000
heap
page read and write
32D6000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9C30B3000
heap
page read and write
92A9000
unkown
page read and write
1B9C93E3000
heap
page read and write
2F70000
heap
page read and write
2C11000
heap
page read and write
7B27000
unkown
page execute read
1B9C6014000
heap
page read and write
B4E2000
trusted library allocation
page read and write
3272000
heap
page read and write
2A54000
direct allocation
page read and write
34C3000
heap
page read and write
9606000
unkown
page readonly
2C11000
heap
page read and write
1B9CAB68000
heap
page read and write
1B9CA850000
heap
page read and write
2C11000
heap
page read and write
A570000
direct allocation
page read and write
ABC000
unkown
page read and write
95FE000
unkown
page readonly
1B9C93EB000
heap
page read and write
306F000
unkown
page read and write
9639000
unkown
page readonly
1B9C941C000
heap
page read and write
2BDD000
stack
page read and write
3150000
heap
page read and write
31AC000
heap
page read and write
333F000
stack
page read and write
1B9C98C2000
heap
page read and write
2C11000
heap
page read and write
961E000
unkown
page readonly
1B9C962E000
heap
page read and write
1B9C9290000
heap
page read and write
1B9C93E3000
heap
page read and write
30FE000
unkown
page read and write
1B9CAE80000
heap
page read and write
967C000
unkown
page readonly
1B9C8FFC000
heap
page read and write
324B000
heap
page read and write
EF0000
heap
page read and write
1B9CA7CC000
heap
page read and write
DC0C000
heap
page read and write
1B9C8726000
heap
page read and write
1B9C93E4000
heap
page read and write
3410000
heap
page read and write
1B9C3097000
heap
page read and write
2B86000
heap
page read and write
2C10000
heap
page read and write
2B36000
direct allocation
page read and write
32BC000
heap
page read and write
2C11000
heap
page read and write
10FC000
heap
page read and write
9643000
unkown
page readonly
34C4000
heap
page read and write
92B3000
unkown
page write copy
B4E0000
trusted library allocation
page read and write
2ADF000
direct allocation
page read and write
105F000
heap
page read and write
2C11000
heap
page read and write
B4E0000
trusted library allocation
page read and write
1B9CA5FE000
heap
page read and write
2C11000
heap
page read and write
1B9CA640000
heap
page read and write
1B9C9430000
heap
page read and write
953C000
unkown
page readonly
92B4000
unkown
page readonly
3540000
heap
page read and write
1B9CA4F7000
heap
page read and write
1B9CAAE4000
heap
page read and write
1B9C93FA000
heap
page read and write
2C11000
heap
page read and write
969F000
unkown
page readonly
1B9CB098000
heap
page read and write
2DD3000
heap
page read and write
1B9CA03D000
heap
page read and write
1B9C88E4000
heap
page read and write
9641000
unkown
page readonly
AEC000
unkown
page write copy
1B9C93E3000
heap
page read and write
1B9C9BDA000
heap
page read and write
918B000
unkown
page write copy
A394000
direct allocation
page read and write
95D1000
unkown
page readonly
1B9C8FBA000
heap
page read and write
1B9C8AB2000
heap
page read and write
1121000
heap
page read and write
9155000
unkown
page execute read
2C11000
heap
page read and write
1B9C9880000
heap
page read and write
1B9C8CE4000
heap
page read and write
1B9C311C000
heap
page read and write
1B9CA8D4000
heap
page read and write
1B9CB102000
heap
page read and write
3074000
heap
page read and write
9191000
unkown
page write copy
3440000
heap
page read and write
2DE4000
heap
page read and write
1B9C99CA000
heap
page read and write
B37E000
direct allocation
page read and write
350F000
unkown
page read and write
1B9CA706000
heap
page read and write
33BF000
stack
page read and write
2A9D000
direct allocation
page read and write
1B9C9A4E000
heap
page read and write
32E0000
heap
page read and write
95B7000
unkown
page readonly
2C11000
heap
page read and write
1B9C9421000
heap
page read and write
3940000
heap
page read and write
2DE4000
heap
page read and write
2DE3000
heap
page read and write
2DED000
stack
page read and write
DBA9000
heap
page read and write
7F7A000
unkown
page execute read
2FC3000
heap
page read and write
EF4000
heap
page read and write
9562000
unkown
page readonly
1B9CA1C8000
heap
page read and write
2C11000
heap
page read and write
9659000
unkown
page readonly
3224000
heap
page read and write
1B9C9104000
heap
page read and write
7FD5000
unkown
page execute read
32E3000
heap
page read and write
955B000
unkown
page readonly
1B9CAC70000
heap
page read and write
A77E000
direct allocation
page read and write
1B9C9401000
heap
page read and write
1B9C9670000
heap
page read and write
2ABA000
direct allocation
page read and write
3224000
heap
page read and write
1B9C96B2000
heap
page read and write
34BF000
unkown
page read and write
3660000
heap
page read and write
1B9C9B56000
heap
page read and write
3650000
heap
page read and write
3540000
heap
page read and write
1B9C93EA000
heap
page read and write
2AF5000
direct allocation
page read and write
B828000
direct allocation
page read and write
2C11000
heap
page read and write
1B9C9568000
heap
page read and write
BB4E000
stack
page read and write
A335000
direct allocation
page read and write
1B9C941C000
heap
page read and write
3650000
heap
page read and write
3213000
heap
page read and write
1B9C6A14000
heap
page read and write
3490000
heap
page read and write
2C11000
heap
page read and write
658C000
unkown
page execute read
1B9C9DA8000
heap
page read and write
1B9C9DEA000
heap
page read and write
1B9CACB3000
heap
page read and write
AF47000
stack
page read and write
2AC1000
direct allocation
page read and write
B8B0000
direct allocation
page read and write
1B9CAB27000
heap
page read and write
1B9C9AD2000
heap
page read and write
3460000
heap
page read and write
2C11000
heap
page read and write
32D3000
heap
page read and write
1B9CA472000
heap
page read and write
1B9C9EB1000
heap
page read and write
80E0000
unkown
page execute read
1B9C92D2000
heap
page read and write
122F000
stack
page read and write
34C3000
heap
page read and write
DC01000
heap
page read and write
3240000
heap
page read and write
1B9C941C000
heap
page read and write
2B03000
heap
page read and write
3280000
heap
page read and write
8E000
stack
page read and write
2D3C000
heap
page read and write
3660000
heap
page read and write
B8A2000
direct allocation
page read and write
92A8000
unkown
page write copy
DBE5000
heap
page read and write
29B0000
heap
page read and write
A990000
heap
page read and write
1B9C95EC000
heap
page read and write
B7D6000
direct allocation
page read and write
8AE0000
unkown
page execute read
9184000
unkown
page read and write
1101000
heap
page read and write
10DB000
heap
page read and write
1090000
heap
page read and write
2FA0000
heap
page read and write
B7AB000
direct allocation
page read and write
A34F000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3280000
heap
page read and write
917D000
unkown
page write copy
9662000
unkown
page readonly
10ED000
heap
page read and write
1B9C90C2000
heap
page read and write
2C11000
heap
page read and write
3074000
heap
page read and write
96A1000
unkown
page readonly
B7B9000
direct allocation
page read and write
9510000
unkown
page readonly
1B9CAE80000
heap
page read and write
1B9C9EF2000
heap
page read and write
1B9C8AF4000
heap
page read and write
1B9CA57A000
heap
page read and write
2C11000
heap
page read and write
B0F0000
remote allocation
page read and write
306E000
unkown
page read and write
3190000
heap
page read and write
1B9CA28F000
heap
page read and write
1B9CA144000
heap
page read and write
3073000
heap
page read and write
3073000
heap
page read and write
9183000
unkown
page write copy
B4F9000
trusted library allocation
page read and write
2C11000
heap
page read and write
1B9C9DEA000
heap
page read and write
9565000
unkown
page readonly
1B9CA893000
heap
page read and write
917E000
unkown
page read and write
3460000
heap
page read and write
1B9CA312000
heap
page read and write
1B9C3271000
heap
page read and write
2F90000
heap
page read and write
1B9C8A70000
heap
page read and write
1B9C8A71000
heap
page read and write
2FA4000
heap
page read and write
1B9C87AA000
heap
page read and write
B673000
direct allocation
page read and write
9195000
unkown
page write copy
2B03000
heap
page read and write
31C0000
heap
page read and write
B2DA000
trusted library allocation
page read and write
2C11000
heap
page read and write
1B9CA80E000
heap
page read and write
BB8E000
stack
page read and write
2C11000
heap
page read and write
323F000
unkown
page read and write
2E30000
heap
page read and write
1B9C93EF000
heap
page read and write
2E7E000
unkown
page read and write
DB70000
heap
page read and write
EAE000
stack
page read and write
313E000
stack
page read and write
1B9C9409000
heap
page read and write
952F000
unkown
page readonly
1B9C9CE2000
heap
page read and write
3760000
heap
page read and write
2C11000
heap
page read and write
10A9000
heap
page read and write
18C000
stack
page read and write
110F000
heap
page read and write
A780000
direct allocation
page read and write
2C11000
heap
page read and write
B3DF000
stack
page read and write
314F000
stack
page read and write
A116000
unkown
page readonly
2C11000
heap
page read and write
B4F9000
trusted library allocation
page read and write
1030000
heap
page read and write
33EE000
unkown
page read and write
3266000
heap
page read and write
2C11000
heap
page read and write
3223000
heap
page read and write
1B9C94E4000
heap
page read and write
4AC000
unkown
page execute read
91D5000
unkown
page read and write
1B9C315D000
heap
page read and write
1B9CB00C000
heap
page read and write
43C0000
heap
page read and write
1B9C89AA000
heap
page read and write
3170000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9CAE3E000
heap
page read and write
1B9CA396000
heap
page read and write
1B9CAF04000
heap
page read and write
343F000
stack
page read and write
2C11000
heap
page read and write
3660000
heap
page read and write
1B9C93E6000
heap
page read and write
1B9CA03C000
heap
page read and write
1B9C9409000
heap
page read and write
A6BD000
direct allocation
page read and write
31D3000
heap
page read and write
1B9C8FFC000
heap
page read and write
2B8D000
stack
page read and write
27CD000
stack
page read and write
1B9C91CA000
heap
page read and write
1B9C941C000
heap
page read and write
2ACD000
stack
page read and write
1B9C9C1C000
heap
page read and write
9621000
unkown
page readonly
745D000
unkown
page execute read
1B9C924E000
heap
page read and write
34C4000
heap
page read and write
3510000
heap
page read and write
2C11000
heap
page read and write
26CD000
stack
page read and write
2D27000
heap
page read and write
1B9C311B000
heap
page read and write
1B9C3570000
heap
page read and write
2C00000
direct allocation
page execute and read and write
1B9C3871000
heap
page read and write
2B4C000
direct allocation
page read and write
74CF000
unkown
page execute read
1B9CA6C4000
heap
page read and write
2A40000
direct allocation
page read and write
2C11000
heap
page read and write
B4F1000
trusted library allocation
page read and write
422000
unkown
page execute read
2DD1000
heap
page read and write
B820000
direct allocation
page read and write
2C11000
heap
page read and write
1B9C9D25000
heap
page read and write
2C11000
heap
page read and write
1B9C8768000
heap
page read and write
405000
unkown
page execute read
1B9C9946000
heap
page read and write
48A000
unkown
page execute read
2FA3000
heap
page read and write
2D90000
heap
page read and write
1B9C8A2E000
heap
page read and write
9645000
unkown
page readonly
323D000
stack
page read and write
2C11000
heap
page read and write
962B000
unkown
page readonly
91CE000
unkown
page write copy
1B9CB090000
heap
page read and write
B7A4000
direct allocation
page read and write
414000
unkown
page execute read
3223000
heap
page read and write
A66A000
direct allocation
page read and write
375F000
unkown
page read and write
1B9CA24C000
heap
page read and write
1B9C90C2000
heap
page read and write
B835000
direct allocation
page read and write
2AF3000
heap
page read and write
2C11000
heap
page read and write
323F000
unkown
page read and write
2FC5000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
9599000
unkown
page readonly
A38D000
direct allocation
page read and write
958A000
unkown
page readonly
1B9CAD78000
heap
page read and write
2D36000
heap
page read and write
925B000
unkown
page read and write
2B19000
direct allocation
page read and write
9290000
unkown
page read and write
1B9C940B000
heap
page read and write
1B9C920C000
heap
page read and write
2FBE000
stack
page read and write
1B9C940B000
heap
page read and write
1B9CAE3F000
heap
page read and write
965B000
unkown
page readonly
2BBD000
stack
page read and write
2A87000
direct allocation
page read and write
1B9C86E4000
heap
page read and write
2C11000
heap
page read and write
34AF000
stack
page read and write
2C11000
heap
page read and write
1B9C8BBA000
heap
page read and write
91A8000
unkown
page read and write
1B9C9736000
heap
page read and write
361F000
stack
page read and write
34FE000
stack
page read and write
1B9CA99A000
heap
page read and write
2C11000
heap
page read and write
1B9C96B2000
heap
page read and write
1B9C93E3000
heap
page read and write
2DE3000
heap
page read and write
2D37000
heap
page read and write
2ADC000
heap
page read and write
1B9C315D000
heap
page read and write
31D4000
heap
page read and write
6952000
unkown
page execute read
2C11000
heap
page read and write
1B9C962E000
heap
page read and write
953F000
unkown
page readonly
B4FC000
trusted library allocation
page read and write
1B9CA748000
heap
page read and write
3211000
heap
page read and write
32E3000
heap
page read and write
2A30000
heap
page read and write
B4F1000
trusted library allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
DBF6000
heap
page read and write
1B9CA916000
heap
page read and write
2C11000
heap
page read and write
605A000
unkown
page execute read
3224000
heap
page read and write
914F000
unkown
page execute read
1B9C93F8000
heap
page read and write
1B9CB0F9000
heap
page read and write
927B000
unkown
page read and write
1B9C8D26000
heap
page read and write
31D3000
heap
page read and write
1B9C93DA000
heap
page read and write
2C11000
heap
page read and write
9286000
unkown
page read and write
92B6000
unkown
page readonly
7828000
unkown
page execute read
A331000
direct allocation
page read and write
7F31000
unkown
page execute read
DB73000
heap
page read and write
B50B000
trusted library allocation
page read and write
1B9CA892000
heap
page read and write
1B9CA0C0000
heap
page read and write
1B9C9404000
heap
page read and write
9652000
unkown
page readonly
2DE4000
heap
page read and write
7B6E000
unkown
page execute read
2C11000
heap
page read and write
2C11000
heap
page read and write
34B1000
heap
page read and write
2C11000
heap
page read and write
1B9CAD78000
heap
page read and write
2A77000
direct allocation
page read and write
1B9C9EF2000
heap
page read and write
EF4000
heap
page read and write
1B9C9428000
heap
page read and write
AB3000
unkown
page read and write
2AD0000
heap
page read and write
ACF000
unkown
page read and write
B4FC000
trusted library allocation
page read and write
3073000
heap
page read and write
2D36000
heap
page read and write
2AAB000
direct allocation
page read and write
9515000
unkown
page readonly
1B9CAB26000
heap
page read and write
2C11000
heap
page read and write
2E80000
heap
page read and write
2C11000
heap
page read and write
1B9C8EB2000
heap
page read and write
2C11000
heap
page read and write
AD2000
unkown
page read and write
1B9CA07E000
heap
page read and write
54CB000
unkown
page execute and read and write
3400000
heap
page read and write
1B9C9400000
heap
page read and write
2C11000
heap
page read and write
3020000
heap
page read and write
1B9CAFCB000
heap
page read and write
924A000
unkown
page read and write
54B2000
unkown
page execute and read and write
3261000
heap
page read and write
31FC000
heap
page read and write
A376000
direct allocation
page read and write
1B9C9428000
heap
page read and write
1B9C89AA000
heap
page read and write
1B9CAF04000
heap
page read and write
30FF000
unkown
page read and write
7D79000
unkown
page execute read
B4F1000
trusted library allocation
page read and write
1B9C9421000
heap
page read and write
3040000
heap
page read and write
2C11000
heap
page read and write
6F8B5000
unkown
page readonly
1297C000
stack
page read and write
EF4000
heap
page read and write
1B9CAB68000
heap
page read and write
1B9CABAA000
heap
page read and write
75BC000
unkown
page execute read
1B9C9A0C000
heap
page read and write
1B9C941C000
heap
page read and write
1B9C9400000
heap
page read and write
2C11000
heap
page read and write
1B9C8A2E000
heap
page read and write
349C000
heap
page read and write
917C000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2AE6000
direct allocation
page read and write
2F90000
heap
page read and write
6AF7000
unkown
page execute read
3160000
heap
page read and write
2E8E000
stack
page read and write
3420000
heap
page read and write
32E9000
heap
page read and write
619D000
unkown
page execute read
1B9C9FB8000
heap
page read and write
BDCF000
stack
page read and write
32B0000
heap
page read and write
FFCF0000
direct allocation
page read and write
1B9CA640000
heap
page read and write
95EA000
unkown
page readonly
1B9C8B78000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1B9C9904000
heap
page read and write
2C11000
heap
page read and write
1B9CB098000
heap
page read and write
1B9C9400000
heap
page read and write
3263000
heap
page read and write
DC39000
heap
page read and write
1B9C8D68000
heap
page read and write
314E000
stack
page read and write
10A9000
heap
page read and write
1B9CAA1E000
heap
page read and write
2D3C000
heap
page read and write
2C11000
heap
page read and write
91C2000
unkown
page write copy
2C11000
heap
page read and write
6E5C000
unkown
page execute read
1B9C93F4000
heap
page read and write
1B9C9E6E000
heap
page read and write
952D000
unkown
page readonly
A30A000
direct allocation
page read and write
1B9C30DA000
heap
page read and write
2C11000
heap
page read and write
2FC1000
heap
page read and write
333D000
stack
page read and write
1B9CA7CC000
heap
page read and write
31D3000
heap
page read and write
1B9C9434000
heap
page read and write
3420000
heap
page read and write
1B9C9D66000
heap
page read and write
1B9CA682000
heap
page read and write
1B9C9EB0000
heap
page read and write
1B9CAAE4000
heap
page read and write
There are 1280 hidden memdumps, click here to show them.