IOC Report
6724f91d7b54a.vbs

loading gif

Files

File Path
Type
Category
Malicious
6724f91d7b54a.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\hcx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\CSRPS.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\_6724f91d7b3cb\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\d4454w[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_6724f91d7b3cb\CSRPS.dll
data
dropped
C:\_6724f91d7b3cb\MPDK.bat
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6724f91d7b54a.vbs"
malicious
C:\_6724f91d7b3cb\CSRPS.exe
"C:\_6724f91d7b3cb\CSRPS.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 41 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://64.94.85.196/contador/index.php?nomepc=
unknown
malicious
http://64.94.85.196/d4454w.zip
64.94.85.196
malicious
http://64.94.85.196/contador/index.php?nomepc=user-PC
64.94.85.196
malicious
http://www.ghisler.com/plugins.htm
unknown
http://www.scootersoftware.com. 
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
http://www.scootersoftware.com/bugRepMailer.phpwU
unknown
http://worldtimeapi.org:80/api/ip;
unknown
http://worldtimeapi.org/api/ip
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://worldtimeapi.org/8
unknown
http://www.indyproject.org/
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://www.scootersoftware.com/upgrade
unknown
http://www.scootersoftware.com/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
http://70.34.247.142/UPLOADMAISL.phpU
unknown
http://www.scootersoftware.com/support.php
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://www.scootersoftware.com/download.php
unknown
http://worldtimeapi.org/
unknown
http://www.scootersoftware.com/v3formats
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://www.secureblackbox.com
unknown
http://www.scootersoftware.com/upgrade1
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
worldtimeapi.org
213.188.196.246

IPs

IP
Domain
Country
Malicious
64.94.85.196
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
213.188.196.246
worldtimeapi.org
Italy

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
CSRPS

Memdumps

Base Address
Regiontype
Protect
Malicious
2D00000
heap
page read and write
9F83000
direct allocation
page read and write
B29000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C20000
heap
page read and write
24176F36000
heap
page read and write
92F2000
unkown
page readonly
D40000
heap
page read and write
2C11000
heap
page read and write
24176BFC000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
24177641000
heap
page read and write
92CE000
unkown
page readonly
2C11000
heap
page read and write
241712FB000
heap
page read and write
2417720C000
heap
page read and write
2C11000
heap
page read and write
24177633000
heap
page read and write
2C11000
heap
page read and write
A1C7000
direct allocation
page read and write
2C11000
heap
page read and write
A1A0000
direct allocation
page read and write
241712F9000
heap
page read and write
B18E000
stack
page read and write
2C11000
heap
page read and write
29F7000
direct allocation
page read and write
9F8E000
direct allocation
page read and write
104A000
heap
page read and write
68E7000
unkown
page execute read
2A46000
direct allocation
page read and write
ABC000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
18C000
stack
page read and write
24178522000
heap
page read and write
2EC0000
heap
page read and write
9359000
unkown
page readonly
2C37000
heap
page read and write
24177612000
heap
page read and write
A3E2000
direct allocation
page read and write
100E000
heap
page read and write
2C11000
heap
page read and write
241713A1000
heap
page read and write
2D80000
heap
page read and write
2FCC000
heap
page read and write
24177BDA000
heap
page read and write
9404000
unkown
page readonly
1045000
heap
page read and write
2C11000
heap
page read and write
2417760E000
heap
page read and write
2C11000
heap
page read and write
3556000
heap
page read and write
2417135F000
heap
page read and write
2C11000
heap
page read and write
ADFE000
direct allocation
page read and write
92D2000
unkown
page readonly
2C11000
heap
page read and write
28C1000
heap
page read and write
A016000
direct allocation
page read and write
650D000
unkown
page execute read
9F70000
direct allocation
page read and write
2417807E000
heap
page read and write
2901000
heap
page read and write
A3F0000
direct allocation
page read and write
283E000
unkown
page read and write
5480000
heap
page read and write
24177647000
heap
page read and write
310C000
heap
page read and write
2C11000
heap
page read and write
24177F76000
heap
page read and write
2417131E000
heap
page read and write
942F000
unkown
page readonly
D1B0000
remote allocation
page read and write
2417763E000
heap
page read and write
24177B14000
heap
page read and write
2C11000
heap
page read and write
24176D04000
heap
page read and write
1045000
heap
page read and write
283F000
unkown
page read and write
6FECF000
unkown
page read and write
24178B68000
heap
page read and write
93CB000
unkown
page readonly
7817000
unkown
page execute read
329F000
stack
page read and write
3030000
heap
page read and write
2C11000
heap
page read and write
933E000
unkown
page readonly
287E000
stack
page read and write
24177606000
heap
page read and write
2417900C000
heap
page read and write
2C11000
heap
page read and write
24177601000
heap
page read and write
9079000
unkown
page read and write
241778C2000
heap
page read and write
241713A1000
heap
page read and write
28E6000
heap
page read and write
24177623000
heap
page read and write
CCD1000
heap
page read and write
2C11000
heap
page read and write
2417720C000
heap
page read and write
A005000
direct allocation
page read and write
1016000
heap
page read and write
9446000
unkown
page readonly
A35C000
direct allocation
page read and write
1045000
heap
page read and write
24171BB0000
heap
page read and write
28E7000
heap
page read and write
2C11000
heap
page read and write
2E7F000
stack
page read and write
24178B68000
heap
page read and write
2730000
heap
page read and write
24177626000
heap
page read and write
29F0000
direct allocation
page read and write
24178BEC000
heap
page read and write
2917000
heap
page read and write
24177398000
heap
page read and write
FBA000
heap
page read and write
A28E000
direct allocation
page read and write
9FB9000
direct allocation
page read and write
657A000
unkown
page execute read
24176A71000
heap
page read and write
29BA000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
24177DA9000
heap
page read and write
1052000
heap
page read and write
105F000
heap
page read and write
24178FCB000
heap
page read and write
2417745E000
heap
page read and write
2C0C000
heap
page read and write
932F000
unkown
page readonly
9328000
unkown
page readonly
2FF7000
heap
page read and write
24176C3E000
heap
page read and write
2AC0000
heap
page read and write
3126000
heap
page read and write
24178AE4000
heap
page read and write
5491000
unkown
page execute read
241768F4000
heap
page read and write
24178D37000
heap
page read and write
24178354000
heap
page read and write
B16000
unkown
page read and write
29A1000
heap
page read and write
2C11000
heap
page read and write
CC6E000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
24179090000
heap
page read and write
28AC000
heap
page read and write
2C11000
heap
page read and write
241775EA000
heap
page read and write
10DDD000
stack
page read and write
29B9000
heap
page read and write
2C11000
heap
page read and write
2417763F000
heap
page read and write
2C11000
heap
page read and write
2C37000
heap
page read and write
24174C5B000
heap
page read and write
24178D78000
heap
page read and write
2A0F000
direct allocation
page read and write
2417824C000
heap
page read and write
2A6D000
stack
page read and write
241713A1000
heap
page read and write
24177778000
heap
page read and write
92A6000
unkown
page readonly
2C11000
heap
page read and write
24177188000
heap
page read and write
24177CE2000
heap
page read and write
2C11000
heap
page read and write
A361000
direct allocation
page read and write
24178F88000
heap
page read and write
29BA000
heap
page read and write
2C11000
heap
page read and write
3170000
heap
page read and write
28C5000
heap
page read and write
93FD000
unkown
page readonly
24177633000
heap
page read and write
9059000
unkown
page read and write
241777BA000
heap
page read and write
105F000
heap
page read and write
73CF0000
unkown
page readonly
2C11000
heap
page read and write
29B6000
heap
page read and write
101D000
heap
page read and write
92AA000
unkown
page readonly
2C11000
heap
page read and write
8F70000
unkown
page write copy
10A7000
heap
page read and write
CCEA000
heap
page read and write
A35F000
direct allocation
page read and write
2417763E000
heap
page read and write
2C11000
heap
page read and write
314F000
stack
page read and write
2C11000
heap
page read and write
2F90000
heap
page read and write
2C11000
heap
page read and write
28D1000
heap
page read and write
3126000
heap
page read and write
2C11000
heap
page read and write
FEC000
heap
page read and write
24177629000
heap
page read and write
6FEA0000
unkown
page readonly
24177E2C000
heap
page read and write
2A1E000
direct allocation
page read and write
A355000
direct allocation
page read and write
241792B1000
heap
page read and write
1058000
heap
page read and write
C914000
trusted library allocation
page read and write
2C11000
heap
page read and write
2F8F000
unkown
page read and write
2C11000
heap
page read and write
24177DA8000
heap
page read and write
2417131E000
heap
page read and write
2FE6000
heap
page read and write
25AE000
unkown
page read and write
CC6E000
direct allocation
page read and write
24177612000
heap
page read and write
24177C5E000
heap
page read and write
25EE000
unkown
page read and write
2C11000
heap
page read and write
24177612000
heap
page read and write
24176B70000
heap
page read and write
24177641000
heap
page read and write
241769BA000
heap
page read and write
24177633000
heap
page read and write
24178850000
heap
page read and write
2C11000
heap
page read and write
24178F47000
heap
page read and write
241771CA000
heap
page read and write
241778C2000
heap
page read and write
A2CC000
direct allocation
page read and write
61F5000
unkown
page execute read
2F4E000
stack
page read and write
8F57000
unkown
page read and write
3556000
heap
page read and write
93EF000
unkown
page readonly
2D3F000
stack
page read and write
29D000
stack
page read and write
2C11000
heap
page read and write
24176C80000
heap
page read and write
24178DFC000
heap
page read and write
24177D24000
heap
page read and write
2C11000
heap
page read and write
24177629000
heap
page read and write
2BE0000
heap
page read and write
C910000
trusted library allocation
page read and write
2A37000
direct allocation
page read and write
E6E000
stack
page read and write
29A6000
heap
page read and write
2417820A000
heap
page read and write
3556000
heap
page read and write
1016000
heap
page read and write
2C11000
heap
page read and write
24178396000
heap
page read and write
2560000
heap
page read and write
2A4D000
direct allocation
page read and write
24178CB3000
heap
page read and write
24178748000
heap
page read and write
24178F88000
heap
page read and write
241774E2000
heap
page read and write
24178D78000
heap
page read and write
CD3E000
heap
page read and write
24176EF4000
heap
page read and write
24177626000
heap
page read and write
2E1E000
unkown
page read and write
28C6000
heap
page read and write
2FE1000
heap
page read and write
3545000
heap
page read and write
24177641000
heap
page read and write
2C11000
heap
page read and write
29A5000
heap
page read and write
2C10000
heap
page read and write
2BF0000
heap
page read and write
B04E000
stack
page read and write
241773DA000
heap
page read and write
A570000
heap
page read and write
2C11000
heap
page read and write
28DA000
heap
page read and write
2C11000
heap
page read and write
944F000
unkown
page readonly
241779CA000
heap
page read and write
241768B2000
heap
page read and write
3190000
heap
page read and write
291A000
heap
page read and write
931C000
unkown
page readonly
FDE000
heap
page read and write
24178A1E000
heap
page read and write
2918000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
8F90000
unkown
page read and write
2C11000
heap
page read and write
9388000
unkown
page readonly
2917000
heap
page read and write
D1B0000
remote allocation
page read and write
AD2000
unkown
page read and write
24178F88000
heap
page read and write
9F95000
direct allocation
page read and write
2FF7000
heap
page read and write
24177736000
heap
page read and write
2417760F000
heap
page read and write
28E6000
heap
page read and write
105F000
heap
page read and write
B13000
unkown
page read and write
A1CE000
direct allocation
page read and write
2C11000
heap
page read and write
93C5000
unkown
page readonly
28AC000
heap
page read and write
9FE1000
direct allocation
page read and write
241783D8000
heap
page read and write
10AF7000
heap
page read and write
FBE000
heap
page read and write
8F5F000
unkown
page read and write
2417425B000
heap
page read and write
8FA1000
unkown
page write copy
371F000
unkown
page read and write
241792A1000
heap
page read and write
2417841A000
heap
page read and write
2C11000
heap
page read and write
241713A1000
heap
page read and write
3440000
heap
page read and write
24179114000
heap
page read and write
24176DC1000
heap
page read and write
2417763A000
heap
page read and write
24179156000
heap
page read and write
A2D8000
direct allocation
page read and write
3138000
heap
page read and write
D1AC000
stack
page read and write
29A6000
heap
page read and write
24177B98000
heap
page read and write
5EBD000
unkown
page execute read
2C11000
heap
page read and write
2C11000
heap
page read and write
D1B0000
remote allocation
page read and write
2C11000
heap
page read and write
CD41000
heap
page read and write
2CFD000
stack
page read and write
1093000
heap
page read and write
24177DEA000
heap
page read and write
241776B2000
heap
page read and write
E84000
heap
page read and write
2417763E000
heap
page read and write
2FF7000
heap
page read and write
241775A8000
heap
page read and write
9406000
unkown
page readonly
24178312000
heap
page read and write
48A000
unkown
page execute read
89BC000
unkown
page execute read
24179198000
heap
page read and write
1056000
heap
page read and write
24177604000
heap
page read and write
2C11000
heap
page read and write
35C0000
heap
page read and write
2C11000
heap
page read and write
2BE0000
heap
page read and write
267E000
stack
page read and write
AB3000
unkown
page write copy
2417131E000
heap
page read and write
33FF000
stack
page read and write
678B000
unkown
page execute read
2C11000
heap
page read and write
2D80000
heap
page read and write
2C37000
heap
page read and write
CD22000
heap
page read and write
2C11000
heap
page read and write
25C0000
heap
page read and write
24178CB2000
heap
page read and write
901C000
unkown
page read and write
241713A1000
heap
page read and write
28D6000
heap
page read and write
A042000
direct allocation
page read and write
24171AB1000
heap
page read and write
24177CA0000
heap
page read and write
2A54000
direct allocation
page read and write
E84000
heap
page read and write
AE97000
direct allocation
page read and write
24177A4E000
heap
page read and write
2417763E000
heap
page read and write
24176B78000
heap
page read and write
24176D46000
heap
page read and write
2FF7000
heap
page read and write
24179198000
heap
page read and write
2C11000
heap
page read and write
24178144000
heap
page read and write
24177641000
heap
page read and write
A1B8000
direct allocation
page read and write
2A81000
direct allocation
page read and write
3BD000
stack
page read and write
10B19000
heap
page read and write
2BA0000
heap
page read and write
24178DFC000
heap
page read and write
241713A1000
heap
page read and write
1016000
heap
page read and write
2417760B000
heap
page read and write
24177642000
heap
page read and write
241792C6000
heap
page read and write
A284000
direct allocation
page read and write
24176EF4000
heap
page read and write
ADDE000
direct allocation
page read and write
2417131E000
heap
page read and write
241773DA000
heap
page read and write
2D80000
heap
page read and write
2A0E000
stack
page read and write
B5FA000
trusted library allocation
page read and write
2BDF000
stack
page read and write
24176AB2000
heap
page read and write
92FF000
unkown
page readonly
3900000
heap
page read and write
F8F000
stack
page read and write
2AAC000
direct allocation
page read and write
CD1B000
heap
page read and write
CD4F000
heap
page read and write
24177641000
heap
page read and write
24177641000
heap
page read and write
2417803C000
heap
page read and write
2EC0000
heap
page read and write
2C11000
heap
page read and write
2C21000
heap
page read and write
24177604000
heap
page read and write
241772D2000
heap
page read and write
E84000
heap
page read and write
2AD1000
direct allocation
page read and write
24177524000
heap
page read and write
CD37000
heap
page read and write
24176978000
heap
page read and write
ACB000
unkown
page write copy
AFD000
unkown
page read and write
101C000
heap
page read and write
2417763E000
heap
page read and write
2417899A000
heap
page read and write
2A79000
direct allocation
page read and write
28DA000
heap
page read and write
2F0F000
unkown
page read and write
2917000
heap
page read and write
906E000
unkown
page read and write
CA5B000
trusted library allocation
page read and write
CDD0000
heap
page read and write
10AE0000
heap
page read and write
24176F78000
heap
page read and write
2417824D000
heap
page read and write
C910000
trusted library allocation
page read and write
24177641000
heap
page read and write
2F30000
heap
page read and write
24178CF4000
heap
page read and write
2C11000
heap
page read and write
24179157000
heap
page read and write
2C11000
heap
page read and write
6C96000
unkown
page execute read
2A3E000
direct allocation
page read and write
2C11000
heap
page read and write
2AC0000
heap
page read and write
FB0000
heap
page read and write
54BD000
unkown
page execute read
9363000
unkown
page readonly
10B05000
heap
page read and write
241774E2000
heap
page read and write
A3DB000
direct allocation
page read and write
24177946000
heap
page read and write
2417761A000
heap
page read and write
24177623000
heap
page read and write
2C11000
heap
page read and write
939E000
unkown
page readonly
241716B1000
heap
page read and write
2C11000
heap
page read and write
24176EB2000
heap
page read and write
2C11000
heap
page read and write
1063000
heap
page read and write
2C03000
heap
page read and write
24178FCA000
heap
page read and write
C939000
trusted library allocation
page read and write
2C06000
heap
page read and write
C910000
trusted library allocation
page read and write
AEEC000
direct allocation
page read and write
24177642000
heap
page read and write
9392000
unkown
page readonly
28E6000
heap
page read and write
2C20000
heap
page read and write
2AFC000
direct allocation
page read and write
24177642000
heap
page read and write
24178102000
heap
page read and write
907C000
unkown
page read and write
904E000
unkown
page read and write
3760000
heap
page read and write
2E80000
heap
page read and write
24177633000
heap
page read and write
D16C000
stack
page read and write
24177633000
heap
page read and write
93F7000
unkown
page readonly
2FFA000
heap
page read and write
24178354000
heap
page read and write
5420000
direct allocation
page execute and read and write
93B9000
unkown
page readonly
74BD000
unkown
page execute read
2417763E000
heap
page read and write
9EB4000
unkown
page readonly
ACF000
unkown
page read and write
24178958000
heap
page read and write
9421000
unkown
page readonly
2C1A000
heap
page read and write
24177633000
heap
page read and write
2C18000
heap
page read and write
2E6E000
stack
page read and write
C95C000
stack
page read and write
241780C1000
heap
page read and write
24177625000
heap
page read and write
24179114000
heap
page read and write
2C11000
heap
page read and write
9415000
unkown
page readonly
24178641000
heap
page read and write
CBD4000
direct allocation
page read and write
2C11000
heap
page read and write
93F9000
unkown
page readonly
C916000
trusted library allocation
page read and write
3545000
heap
page read and write
C937000
trusted library allocation
page read and write
2D70000
heap
page read and write
942B000
unkown
page readonly
9301000
unkown
page readonly
2417761A000
heap
page read and write
24177EF2000
heap
page read and write
92BC000
unkown
page readonly
2417763E000
heap
page read and write
24177641000
heap
page read and write
24171321000
heap
page read and write
10A1000
heap
page read and write
24176E71000
heap
page read and write
24177A4E000
heap
page read and write
291A000
heap
page read and write
24177DEA000
heap
page read and write
2EC0000
heap
page read and write
28D7000
heap
page read and write
A1B0000
direct allocation
page read and write
2C11000
heap
page read and write
24178F04000
heap
page read and write
93C1000
unkown
page readonly
24179090000
heap
page read and write
930E000
unkown
page readonly
2C11000
heap
page read and write
3170000
heap
page read and write
2A6A000
direct allocation
page read and write
8FA5000
unkown
page write copy
B2CE000
stack
page read and write
24177A90000
heap
page read and write
CBD0000
direct allocation
page read and write
11EE000
stack
page read and write
8F5D000
unkown
page read and write
2C11000
heap
page read and write
CC6E000
direct allocation
page read and write
CBD4000
direct allocation
page read and write
241783D8000
heap
page read and write
24178AA3000
heap
page read and write
2417762C000
heap
page read and write
24177641000
heap
page read and write
401000
unkown
page execute read
24178564000
heap
page read and write
24176E0C000
heap
page read and write
241779CA000
heap
page read and write
3010000
heap
page read and write
2FF8000
heap
page read and write
92E4000
unkown
page readonly
3440000
heap
page read and write
2C11000
heap
page read and write
6FEC9000
unkown
page read and write
C8D0000
direct allocation
page execute and read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
241784E0000
heap
page read and write
2BF0000
heap
page read and write
41C000
unkown
page execute read
24179198000
heap
page read and write
24177601000
heap
page read and write
2917000
heap
page read and write
105F000
heap
page read and write
2A27000
direct allocation
page read and write
2FE8000
heap
page read and write
24177642000
heap
page read and write
2B90000
heap
page read and write
3559000
heap
page read and write
2C00000
heap
page read and write
24177629000
heap
page read and write
C938000
trusted library allocation
page read and write
2C11000
heap
page read and write
312E000
stack
page read and write
936A000
unkown
page readonly
CCCF000
stack
page read and write
24177641000
heap
page read and write
2C11000
heap
page read and write
24177629000
heap
page read and write
2C11000
heap
page read and write
2490000
heap
page read and write
28D8000
heap
page read and write
241785A6000
heap
page read and write
2417880F000
heap
page read and write
24177C1D000
heap
page read and write
2540000
heap
page read and write
9086000
unkown
page read and write
9324000
unkown
page readonly
2C11000
heap
page read and write
2C11000
heap
page read and write
9FAA000
direct allocation
page read and write
24177641000
heap
page read and write
6826000
unkown
page execute read
24176BBA000
heap
page read and write
2BEC000
heap
page read and write
24177626000
heap
page read and write
2417904F000
heap
page read and write
9FC4000
direct allocation
page read and write
2590000
heap
page read and write
24177630000
heap
page read and write
24177641000
heap
page read and write
241772D2000
heap
page read and write
2417763E000
heap
page read and write
10B1C000
heap
page read and write
AED3000
direct allocation
page read and write
2417763A000
heap
page read and write
CD74000
heap
page read and write
24177604000
heap
page read and write
2417845C000
heap
page read and write
24177641000
heap
page read and write
24177633000
heap
page read and write
241718AF000
heap
page read and write
E84000
heap
page read and write
24178748000
heap
page read and write
9FFE000
direct allocation
page read and write
907B000
unkown
page write copy
2C11000
heap
page read and write
24178E3F000
heap
page read and write
2DEF000
stack
page read and write
9087000
unkown
page write copy
A024000
direct allocation
page read and write
AE4E000
direct allocation
page read and write
2C11000
heap
page read and write
3137000
heap
page read and write
24178E80000
heap
page read and write
24177290000
heap
page read and write
2417828E000
heap
page read and write
422000
unkown
page execute read
2C10000
heap
page read and write
1013000
heap
page read and write
24178892000
heap
page read and write
2417741D000
heap
page read and write
405000
unkown
page execute read
2FDE000
unkown
page read and write
2C11000
heap
page read and write
8FA2000
unkown
page read and write
AE0D000
direct allocation
page read and write
241786C4000
heap
page read and write
24171321000
heap
page read and write
24177BDA000
heap
page read and write
2C11000
heap
page read and write
105A000
heap
page read and write
92FB000
unkown
page readonly
24177988000
heap
page read and write
2417763E000
heap
page read and write
8F6C000
unkown
page write copy
2C11000
heap
page read and write
2C11000
heap
page read and write
2B6F000
unkown
page read and write
2E0E000
unkown
page read and write
3121000
heap
page read and write
29E5000
heap
page read and write
907E000
unkown
page write copy
9379000
unkown
page readonly
6B40000
unkown
page execute read
2417878A000
heap
page read and write
2417845C000
heap
page read and write
9F9C000
direct allocation
page read and write
24176E0C000
heap
page read and write
400000
heap
page read and write
253D000
stack
page read and write
2C11000
heap
page read and write
24177633000
heap
page read and write
2417820A000
heap
page read and write
2C17000
heap
page read and write
241775F9000
heap
page read and write
2E20000
heap
page read and write
2F2D000
stack
page read and write
241785A7000
heap
page read and write
2417921C000
heap
page read and write
1045000
heap
page read and write
2906000
heap
page read and write
2C11000
heap
page read and write
8F8A000
unkown
page write copy
241778C2000
heap
page read and write
2417783E000
heap
page read and write
241712F6000
heap
page read and write
241792C6000
heap
page read and write
CC6E000
direct allocation
page read and write
9312000
unkown
page readonly
A1F0000
direct allocation
page read and write
CD2B000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
93AA000
unkown
page readonly
A12D000
direct allocation
page read and write
8F31000
unkown
page execute read
E20000
heap
page read and write
9443000
unkown
page readonly
2C11000
heap
page read and write
241777FC000
heap
page read and write
CD9C000
heap
page read and write
54A2000
unkown
page execute and read and write
9424000
unkown
page readonly
1050000
heap
page read and write
54A3000
unkown
page execute read
903D000
unkown
page read and write
108B000
heap
page read and write
24177629000
heap
page read and write
24176F78000
heap
page read and write
43C0000
heap
page read and write
24176BFC000
heap
page read and write
2FF7000
heap
page read and write
24171325000
heap
page read and write
9335000
unkown
page readonly
2FC0000
heap
page read and write
24177616000
heap
page read and write
73DB000
unkown
page execute read
28B0000
heap
page read and write
9332000
unkown
page readonly
2417763E000
heap
page read and write
24177B56000
heap
page read and write
24177080000
heap
page read and write
24177604000
heap
page read and write
2FF7000
heap
page read and write
2C11000
heap
page read and write
24171325000
heap
page read and write
10B26000
heap
page read and write
2C11000
heap
page read and write
24176CC2000
heap
page read and write
4AC000
unkown
page execute read
2C11000
heap
page read and write
618C000
unkown
page execute read
A0B0000
direct allocation
page read and write
24177904000
heap
page read and write
24179090000
heap
page read and write
B28000
unkown
page write copy
2C11000
heap
page read and write
ACCA000
stack
page read and write
29E0000
heap
page read and write
24178958000
heap
page read and write
2AF5000
direct allocation
page read and write
3760000
heap
page read and write
9063000
unkown
page read and write
3556000
heap
page read and write
24171326000
heap
page read and write
2AB4000
direct allocation
page read and write
24176FFC000
heap
page read and write
241786C4000
heap
page read and write
24178DFC000
heap
page read and write
2417899B000
heap
page read and write
930A000
unkown
page readonly
414000
unkown
page execute read
A352000
direct allocation
page read and write
28D3000
heap
page read and write
8F59000
unkown
page read and write
24178707000
heap
page read and write
104F000
heap
page read and write
A67E000
stack
page read and write
A172000
direct allocation
page read and write
24178DBA000
heap
page read and write
3556000
heap
page read and write
24177188000
heap
page read and write
2AA5000
direct allocation
page read and write
333E000
stack
page read and write
24177FB8000
heap
page read and write
2B8F000
unkown
page read and write
24176DCA000
heap
page read and write
9367000
unkown
page readonly
2C11000
heap
page read and write
28C6000
heap
page read and write
2C11000
heap
page read and write
24178102000
heap
page read and write
C938000
trusted library allocation
page read and write
92F8000
unkown
page readonly
24178102000
heap
page read and write
29B6000
heap
page read and write
2C11000
heap
page read and write
28D7000
heap
page read and write
28D6000
heap
page read and write
2C11000
heap
page read and write
241788D4000
heap
page read and write
24177C1C000
heap
page read and write
241791DA000
heap
page read and write
2C20000
heap
page read and write
2C3A000
heap
page read and write
CD57000
heap
page read and write
24177633000
heap
page read and write
902E000
unkown
page read and write
8F66000
unkown
page write copy
28E6000
heap
page read and write
93E2000
unkown
page readonly
2BA0000
heap
page read and write
24178E3E000
heap
page read and write
AF10000
trusted library allocation
page read and write
3CC000
stack
page read and write
2A04000
direct allocation
page read and write
24178EC2000
heap
page read and write
9376000
unkown
page readonly
24177CE2000
heap
page read and write
2417921C000
heap
page read and write
241790D3000
heap
page read and write
25FC000
stack
page read and write
24177647000
heap
page read and write
1048000
heap
page read and write
24177633000
heap
page read and write
5490000
unkown
page readonly
931F000
unkown
page readonly
400000
unkown
page readonly
C910000
trusted library allocation
page read and write
2C20000
heap
page read and write
24177880000
heap
page read and write
241791DB000
heap
page read and write
32FC000
stack
page read and write
24177F76000
heap
page read and write
241714B1000
heap
page read and write
A052000
direct allocation
page read and write
ABC7000
stack
page read and write
3545000
heap
page read and write
2A62000
direct allocation
page read and write
43D0000
direct allocation
page execute and read and write
1F0000
heap
page read and write
2C17000
heap
page read and write
2C11000
heap
page read and write
FFDD0000
direct allocation
page read and write
241776B2000
heap
page read and write
9039000
unkown
page read and write
256C000
stack
page read and write
24178F04000
heap
page read and write
28D7000
heap
page read and write
2C06000
heap
page read and write
29ED000
heap
page read and write
2AC9000
direct allocation
page read and write
2C11000
heap
page read and write
10EE000
stack
page read and write
AB3000
unkown
page read and write
2C11000
heap
page read and write
241781C8000
heap
page read and write
24171328000
heap
page read and write
28D7000
heap
page read and write
8F83000
unkown
page read and write
3557000
heap
page read and write
25A0000
heap
page read and write
2C11000
heap
page read and write
3100000
heap
page read and write
24177C5E000
heap
page read and write
2D1F000
stack
page read and write
24177629000
heap
page read and write
A02D000
direct allocation
page read and write
28E6000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
9338000
unkown
page readonly
2C11000
heap
page read and write
2417807E000
heap
page read and write
3556000
heap
page read and write
24177AD2000
heap
page read and write
3520000
heap
page read and write
2917000
heap
page read and write
2C11000
heap
page read and write
24178F04000
heap
page read and write
FE6000
heap
page read and write
2417828E000
heap
page read and write
1052000
heap
page read and write
AB6000
unkown
page read and write
2C11000
heap
page read and write
A34E000
direct allocation
page read and write
105B000
heap
page read and write
2417783E000
heap
page read and write
73D0D000
unkown
page read and write
73CF1000
unkown
page execute read
2C11000
heap
page read and write
2417605B000
heap
page read and write
2C11000
heap
page read and write
28E6000
heap
page read and write
24177633000
heap
page read and write
93DA000
unkown
page readonly
29B9000
heap
page read and write
1009000
heap
page read and write
24178564000
heap
page read and write
2417900C000
heap
page read and write
AEC000
unkown
page write copy
C938000
trusted library allocation
page read and write
932B000
unkown
page readonly
2A5B000
direct allocation
page read and write
1052000
heap
page read and write
ADF000
unkown
page write copy
2FF7000
heap
page read and write
29DE000
stack
page read and write
24178A60000
heap
page read and write
2C26000
heap
page read and write
1082000
heap
page read and write
2BF0000
heap
page read and write
CD66000
heap
page read and write
93E8000
unkown
page readonly
1068000
heap
page read and write
CDB3000
heap
page read and write
313A000
heap
page read and write
24176F78000
heap
page read and write
24177314000
heap
page read and write
241790D2000
heap
page read and write
2C11000
heap
page read and write
24176B6F000
heap
page read and write
CDB7000
heap
page read and write
307E000
unkown
page read and write
241787CC000
heap
page read and write
241770C2000
heap
page read and write
24178BAA000
heap
page read and write
24178C70000
heap
page read and write
105B000
heap
page read and write
2CEE000
stack
page read and write
FEA000
heap
page read and write
241776F4000
heap
page read and write
24177671000
heap
page read and write
2560000
heap
page read and write
2C11000
heap
page read and write
2417131E000
heap
page read and write
93C3000
unkown
page readonly
2AD8000
direct allocation
page read and write
6FEA1000
unkown
page execute read
299D000
stack
page read and write
24177D66000
heap
page read and write
2C01000
heap
page read and write
ADEF000
direct allocation
page read and write
2C30000
heap
page read and write
2C11000
heap
page read and write
100B000
heap
page read and write
241792BF000
heap
page read and write
24178F46000
heap
page read and write
9413000
unkown
page readonly
24178C2E000
heap
page read and write
2C11000
heap
page read and write
28BC000
heap
page read and write
24176936000
heap
page read and write
A179000
direct allocation
page read and write
2C11000
heap
page read and write
9FB2000
direct allocation
page read and write
24176C81000
heap
page read and write
29B6000
heap
page read and write
24177A0C000
heap
page read and write
241787CC000
heap
page read and write
24177D66000
heap
page read and write
6FED2000
unkown
page readonly
25EE000
stack
page read and write
33B0000
heap
page read and write
CD04000
heap
page read and write
93A3000
unkown
page readonly
24178850000
heap
page read and write
9307000
unkown
page readonly
A41B000
direct allocation
page read and write
24178EC3000
heap
page read and write
2C11000
heap
page read and write
313A000
heap
page read and write
2C11000
heap
page read and write
2417763E000
heap
page read and write
B14F000
stack
page read and write
2417760C000
heap
page read and write
24177104000
heap
page read and write
105B000
heap
page read and write
935C000
unkown
page readonly
24177633000
heap
page read and write
8FA6000
unkown
page read and write
9FEF000
direct allocation
page read and write
93D2000
unkown
page readonly
8F37000
unkown
page execute read
24178D78000
heap
page read and write
2417131E000
heap
page read and write
93EA000
unkown
page readonly
2C11000
heap
page read and write
5410000
heap
page read and write
2A9D000
direct allocation
page read and write
241775FB000
heap
page read and write
2A88000
direct allocation
page read and write
908A000
unkown
page readonly
6049000
unkown
page execute read
1077000
heap
page read and write
941F000
unkown
page readonly
28A0000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
24177630000
heap
page read and write
10AF0000
heap
page read and write
2BE0000
heap
page read and write
2A40000
heap
page read and write
101D000
heap
page read and write
8F2B000
unkown
page execute read
241713A1000
heap
page read and write
2C11000
heap
page read and write
8F5C000
unkown
page write copy
24176D88000
heap
page read and write
2417745E000
heap
page read and write
2417849E000
heap
page read and write
2417763E000
heap
page read and write
2FF7000
heap
page read and write
2EFC000
stack
page read and write
1045000
heap
page read and write
24177F35000
heap
page read and write
1A0000
heap
page read and write
B28E000
stack
page read and write
9FD1000
direct allocation
page read and write
A445000
direct allocation
page read and write
24176AF4000
heap
page read and write
2C3A000
heap
page read and write
2C26000
heap
page read and write
108F000
heap
page read and write
241782D0000
heap
page read and write
24177633000
heap
page read and write
24177080000
heap
page read and write
2FE6000
heap
page read and write
2417724E000
heap
page read and write
2417741C000
heap
page read and write
298C000
heap
page read and write
24178AA2000
heap
page read and write
24178D36000
heap
page read and write
24177626000
heap
page read and write
933B000
unkown
page readonly
CC6E000
direct allocation
page read and write
2417763E000
heap
page read and write
CDC2000
heap
page read and write
92C5000
unkown
page readonly
2A9F000
stack
page read and write
2C11000
heap
page read and write
1052000
heap
page read and write
101D000
heap
page read and write
2C37000
heap
page read and write
24177604000
heap
page read and write
73D06000
unkown
page readonly
24176F37000
heap
page read and write
92C9000
unkown
page readonly
24178E80000
heap
page read and write
24176871000
heap
page read and write
24E0000
heap
page read and write
2ADF000
direct allocation
page read and write
29A5000
heap
page read and write
241719AE000
heap
page read and write
24171360000
heap
page read and write
AE55000
direct allocation
page read and write
2C11000
heap
page read and write
24177146000
heap
page read and write
13D000
stack
page read and write
24178186000
heap
page read and write
A188000
direct allocation
page read and write
3D4F000
stack
page read and write
E80000
heap
page read and write
2C11000
heap
page read and write
24177626000
heap
page read and write
CB92000
direct allocation
page read and write
A4AC000
stack
page read and write
CC6C000
direct allocation
page read and write
2417760A000
heap
page read and write
2C11000
heap
page read and write
29B6000
heap
page read and write
24177633000
heap
page read and write
92A1000
unkown
page readonly
1012000
heap
page read and write
24176CC2000
heap
page read and write
24177F34000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
24177642000
heap
page read and write
24178E80000
heap
page read and write
24178BAB000
heap
page read and write
2C00000
heap
page read and write
3137000
heap
page read and write
2417763E000
heap
page read and write
2FFA000
heap
page read and write
3556000
heap
page read and write
241789DC000
heap
page read and write
24177626000
heap
page read and write
400000
unkown
page readonly
2417565B000
heap
page read and write
6E4B000
unkown
page execute read
2C38000
heap
page read and write
28C1000
heap
page read and write
3440000
heap
page read and write
24177633000
heap
page read and write
24176C3E000
heap
page read and write
92C1000
unkown
page readonly
8F6A000
unkown
page read and write
8E000
stack
page read and write
2C11000
heap
page read and write
AE0B000
direct allocation
page read and write
2BCD000
stack
page read and write
24176DCA000
heap
page read and write
29A5000
heap
page read and write
FE9000
heap
page read and write
CD61000
heap
page read and write
24176BBA000
heap
page read and write
24178C70000
heap
page read and write
24177642000
heap
page read and write
2417132A000
heap
page read and write
1054000
heap
page read and write
2B03000
direct allocation
page read and write
241769FC000
heap
page read and write
936C000
unkown
page readonly
2B6D000
stack
page read and write
92D4000
unkown
page readonly
24177633000
heap
page read and write
2CD000
stack
page read and write
24178916000
heap
page read and write
FE6000
heap
page read and write
A04B000
direct allocation
page read and write
24178850000
heap
page read and write
B3CD000
stack
page read and write
24177629000
heap
page read and write
2C37000
heap
page read and write
253E000
stack
page read and write
2FF7000
heap
page read and write
9F41000
unkown
page readonly
29B6000
heap
page read and write
75AA000
unkown
page execute read
24177FFA000
heap
page read and write
24178AE4000
heap
page read and write
9428000
unkown
page readonly
2C17000
heap
page read and write
93E6000
unkown
page readonly
2417904E000
heap
page read and write
24178706000
heap
page read and write
B1C000
unkown
page read and write
B41E000
stack
page read and write
352C000
heap
page read and write
3137000
heap
page read and write
2C1A000
heap
page read and write
28D3000
heap
page read and write
2C11000
heap
page read and write
24177615000
heap
page read and write
3546000
heap
page read and write
92E1000
unkown
page readonly
2417763E000
heap
page read and write
2ABB000
direct allocation
page read and write
42C000
unkown
page execute read
241777BA000
heap
page read and write
104F000
heap
page read and write
28AE000
unkown
page read and write
24177EF2000
heap
page read and write
1EE000
unkown
page read and write
241788D4000
heap
page read and write
3760000
heap
page read and write
24178B26000
heap
page read and write
938F000
unkown
page readonly
AEE1000
direct allocation
page read and write
24DE000
unkown
page read and write
2BF0000
heap
page read and write
24177612000
heap
page read and write
A3C5000
direct allocation
page read and write
3170000
heap
page read and write
8FB3000
unkown
page read and write
24178397000
heap
page read and write
2A8F000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2417762B000
heap
page read and write
935F000
unkown
page readonly
28E0000
heap
page read and write
3545000
heap
page read and write
241712DB000
heap
page read and write
AE16000
direct allocation
page read and write
2C11000
heap
page read and write
24178748000
heap
page read and write
2C11000
heap
page read and write
24176C3E000
heap
page read and write
54BC000
unkown
page execute and read and write
2A71000
direct allocation
page read and write
2B4F000
unkown
page read and write
A03B000
direct allocation
page read and write
2906000
heap
page read and write
241713A1000
heap
page read and write
24177633000
heap
page read and write
939B000
unkown
page readonly
24177626000
heap
page read and write
24177881000
heap
page read and write
10B2A000
heap
page read and write
32FF000
unkown
page read and write
24177DEA000
heap
page read and write
24178682000
heap
page read and write
24179114000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
8F82000
unkown
page write copy
29B6000
heap
page read and write
73D0F000
unkown
page readonly
93DE000
unkown
page readonly
2C11000
heap
page read and write
2A96000
direct allocation
page read and write
2C11000
heap
page read and write
CCD7000
heap
page read and write
6FEC5000
unkown
page readonly
24F0000
heap
page read and write
24178A60000
heap
page read and write
10AE000
heap
page read and write
B31000
unkown
page readonly
2C11000
heap
page read and write
24177AD2000
heap
page read and write
1012000
heap
page read and write
2417880E000
heap
page read and write
92EB000
unkown
page readonly
24178DBB000
heap
page read and write
2417703E000
heap
page read and write
2C11000
heap
page read and write
3020000
heap
page read and write
A286000
direct allocation
page read and write
2FE0000
heap
page read and write
1015000
heap
page read and write
8F7F000
unkown
page read and write
A09A000
direct allocation
page read and write
C910000
trusted library allocation
page read and write
2417761D000
heap
page read and write
28FD000
stack
page read and write
8F58000
unkown
page write copy
28FF000
unkown
page read and write
A357000
direct allocation
page read and write
2417849F000
heap
page read and write
28A0000
heap
page read and write
2C11000
heap
page read and write
2C17000
heap
page read and write
24FD000
stack
page read and write
24177641000
heap
page read and write
24178CF4000
heap
page read and write
24178BEC000
heap
page read and write
24177566000
heap
page read and write
AF8000
unkown
page read and write
A1D5000
direct allocation
page read and write
241789DC000
heap
page read and write
24177629000
heap
page read and write
941B000
unkown
page readonly
2C11000
heap
page read and write
24177EB0000
heap
page read and write
8F5E000
unkown
page write copy
8F9D000
unkown
page read and write
24176FBA000
heap
page read and write
24176B36000
heap
page read and write
2C11000
heap
page read and write
3546000
heap
page read and write
2C11000
heap
page read and write
28E9000
heap
page read and write
AE63000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
241713A1000
heap
page read and write
6AE5000
unkown
page execute read
1054000
heap
page read and write
ADD0000
direct allocation
page read and write
241775EA000
heap
page read and write
7FBC000
unkown
page execute read
241784E0000
heap
page read and write
2ADF000
unkown
page read and write
2C17000
heap
page read and write
28D7000
heap
page read and write
2C11000
heap
page read and write
2AED000
direct allocation
page read and write
9FF7000
direct allocation
page read and write
24177623000
heap
page read and write
2B90000
heap
page read and write
2417131E000
heap
page read and write
25F0000
heap
page read and write
2C11000
heap
page read and write
30BE000
stack
page read and write
9400000
unkown
page readonly
2C11000
heap
page read and write
241774A0000
heap
page read and write
2980000
heap
page read and write
256D000
stack
page read and write
24177641000
heap
page read and write
93AD000
unkown
page readonly
6940000
unkown
page execute read
39D000
stack
page read and write
2AC0000
heap
page read and write
2C11000
heap
page read and write
29B0000
heap
page read and write
2417900C000
heap
page read and write
24177612000
heap
page read and write
24177610000
heap
page read and write
A034000
direct allocation
page read and write
CD8E000
heap
page read and write
92B9000
unkown
page readonly
241717B0000
heap
page read and write
A3CC000
direct allocation
page read and write
29BA000
heap
page read and write
937B000
unkown
page readonly
2C11000
heap
page read and write
2AE6000
direct allocation
page read and write
2C11000
heap
page read and write
241771CB000
heap
page read and write
24176CC2000
heap
page read and write
CED0000
heap
page read and write
92F0000
unkown
page readonly
3556000
heap
page read and write
24177E6E000
heap
page read and write
241780C0000
heap
page read and write
24178CF4000
heap
page read and write
24177633000
heap
page read and write
C910000
trusted library allocation
page read and write
2C11000
heap
page read and write
9088000
unkown
page readonly
2860000
heap
page read and write
2C11000
heap
page read and write
93D0000
unkown
page readonly
2580000
heap
page read and write
3541000
heap
page read and write
28EC000
heap
page read and write
B0A000
unkown
page read and write
24176B78000
heap
page read and write
76ED000
unkown
page execute read
24177FFA000
heap
page read and write
ACB000
unkown
page read and write
8F97000
unkown
page write copy
241713A1000
heap
page read and write
24177356000
heap
page read and write
29B7000
heap
page read and write
There are 1301 hidden memdumps, click here to show them.