IOC Report
PAYMENT COPY.exe

loading gif

Files

File Path
Type
Category
Malicious
PAYMENT COPY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp525.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\4jm-6-hL7
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5mebfolc.liw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uzprlt2.ptq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqhej52h.2qy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sfot3gfl.h2a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtxbro3o.ale.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl53tnli.vg4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z55jwqv5.y2t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ztmcufib.3lt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1D60.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PAYMENT COPY.exe
"C:\Users\user\Desktop\PAYMENT COPY.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PAYMENT COPY.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bQrgcvrrXfGN" /XML "C:\Users\user\AppData\Local\Temp\tmp525.tmp"
malicious
C:\Users\user\Desktop\PAYMENT COPY.exe
"C:\Users\user\Desktop\PAYMENT COPY.exe"
malicious
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
malicious
C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe
"C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe"
malicious
C:\Windows\SysWOW64\gpresult.exe
"C:\Windows\SysWOW64\gpresult.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bQrgcvrrXfGN" /XML "C:\Users\user\AppData\Local\Temp\tmp1D60.tmp"
malicious
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
"C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe"
malicious
C:\Windows\SysWOW64\gpresult.exe
"C:\Windows\SysWOW64\gpresult.exe"
malicious
C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe
"C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.mediciconstanta.ro/jaeg/
89.42.218.92
https://duckduckgo.com/chrome_newtab
unknown
http://www.knockdubai.ae/s5gg/
103.120.178.210
https://duckduckgo.com/ac/?q=
unknown
https://www.instagram.com/hover_domains
unknown
http://celluslim.com.br/y8lu/?VlEHDVvh=mWlJviWR5LwtuCLZCQRXGA
unknown
http://www.skinut-ves.ru/pf45/?VlEHDVvh=+FYLzbf4tuJqmfBE/IGOfF0r+MHgP4o87eLDAHdmTpq2bw1UrUMWUoU66GOKJ7n5AfomTNLEJ4yDFS4nbynVDFN+PHUTvroy3xH/fpiwWIz3Kb5ThfITUHU=&BHPD=o2nt
31.31.198.106
https://www.zoho.com/sites/images/professionally-crafted-themes.png
unknown
http://www.shy-models.ru/spev/?VlEHDVvh=tbEztHv7aRBF16/vS4ReUtdihzrMDj2O7MCPG/vC1Jml0QkKRnSSU8sUdUNE92nxSgZvf0qXlo0KJW6hnlqWydczzuvw5M1cQ8Ki08JizjbM/1/wqRnw39c=&BHPD=o2nt
185.215.4.44
http://www.arsenjev.fun/oqq6/
217.107.219.102
https://tilda.cc
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)
unknown
http://www.embrace-counselor.com/5xhc/?VlEHDVvh=MlmeOAVABHl7V7JWE669wIJbTLHKaUkhN9NjdS3PgsP7eMcTlCivolpOMqUU2YL5bEhebrvuWwjxxfDDk/ZIeLQ1wF+hSOQ+omIdi18JN7A0f8vC6TD737s=&BHPD=o2nt
202.233.67.46
https://www.reg.ru/support/#request
unknown
https://www.google.com
unknown
http://www.drdavidglassman.com/rydx/?VlEHDVvh=yFQmHiiKcR7mSVWuRw8RQpo4LJVZTLcWi6hJF+Rn4pNF9HaZnauVsiHAA7JcJP010hHBzc/zc7n9tAOpAjixnZqk0gAODdt0gSRPUe/o9m+q8oWrf5RESRg=&BHPD=o2nt
199.59.243.225
https://files.reg.ru/fonts/inter/Inter-Regular.woff)
unknown
https://server5.hosting.reg.ru/manager
unknown
https://www.hover.com/domains/results
unknown
http://www.pinpointopia.com/w8kk/
216.40.34.41
http://help.yahoo.com/help/us/ysearch/slurp)
unknown
https://www.zoho.com/sites/?src=parkeddomain&dr=www.topscaleservices.com
unknown
http://www.supermontage.com/9i8t/
13.248.169.48
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.pinpointopia.com/w8kk/?VlEHDVvh=xApCedPshlFqhM+jKZfmvnpl71z0cBQVdhsyYTPYXO8jvxnjhAjWxt0ri1XYL1kB/lDsxIYle23q9eZueg3dcjYKciZZWPOZx8TMcQAQa9bvKBBzdKnYGI4=&BHPD=o2nt
216.40.34.41
http://www.celluslim.com.br/y8lu/?VlEHDVvh=mWlJviWR5LwtuCLZCQRXGA+vQb38eHFgRBz6unIHe4HBIxzvdSvdhO03jK4wsowAz3gHYbTW35gnt1fPF07v4JZ2cMipkMMw/S8lqxq9gNP1PGwmWBqthC4=&BHPD=o2nt
50.116.86.54
http://arsenjev.fun/oqq6/?VlEHDVvh=rwgwPlALEUzYU2aVnuvDPIeIRMF/prMxeEAjcX/DBUkDQJY
unknown
http://www.spotgush.top/ni9v/?VlEHDVvh=1qDi8Q0JYC/+jowmm6vhnz1nUg+FzSnwkBEF+9sZfgdAuqPr9wV9FjKgoqnVlqm9IHxz/wQEEdcJ3vr/ooFd412OQCGzSxMe6/jXu+QS8SjFcrOZORUu8fo=&BHPD=o2nt
66.29.149.46
http://www.spotgush.top/ni9v/
66.29.149.46
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.topscaleservices.com/uyud/
136.143.186.12
https://twitter.com/hover
unknown
http://www.arsenjev.fun/oqq6/?VlEHDVvh=rwgwPlALEUzYU2aVnuvDPIeIRMF/prMxeEAjcX/DBUkDQJY+y8rHCEXmR7eGsa/wgYTHR39WGVXgcrNwnNHcmkfubB89b8ls2WhHljXtxKg/z1p/kKzkfHY=&BHPD=o2nt
217.107.219.102
http://www.drdavidglassman.com/rydx/
199.59.243.225
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://files.reg.ru/fonts/inter/Inter-Medium.woff2)
unknown
http://www.chooceseafood.ca/ru1k/
199.59.243.225
http://www.shy-models.ru/spev/
185.215.4.44
https://2domains.ru
unknown
http://embrace-counselor.com/5xhc/?VlEHDVvh=MlmeOAVABHl7V7JWE669wIJbTLHKaUkhN9NjdS3PgsP7eMcTlCivolpO
unknown
http://www.drednents.es
unknown
https://ovipanel.in/tutorials
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)
unknown
http://www.knockdubai.ae/s5gg/?VlEHDVvh=Lex3y3SP4nMuJeMgNnltykKJrtse07Leq1Ynk5nBUbN+LWWMQkpVzy+EMOTic1Ks5WEW61I3b9noLb4lZz3/VBahdTtzKpjYDK5Fm2hl+YH8rBOlCQe91Nk=&BHPD=o2nt
103.120.178.210
http://www.drednents.es/9bwj/
172.67.137.210
https://www.ecosia.org/newtab/
unknown
http://mediciconstanta.ro/jaeg/?VlEHDVvh=9Opn4WO2xZgxxNDkNGsIia6GoKuxBfXh3HU6nJUJOovQ2Daq2EsR8T6osHZ
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.drednents.es/9bwj/?VlEHDVvh=+7XJqbUQcguxa/KcUhsZdHSIPDv12M145Gf+kZkuNm6BJEH5M4YG3TEKS2nGgF42YhScJBjRA7U3xzFEvpUC1m9E0lF3kGvEoHdRMqPZgXJQjJurfTYwuhc=&BHPD=o2nt
172.67.137.210
https://files.reg.ru/fonts/inter/Inter-Medium.woff)
unknown
https://codepen.io/uzcho_/pens/popular/?grid_type=list
unknown
https://ovipanel.in/
unknown
https://codepen.io/uzcho_/pen/eYdmdXw.css
unknown
http://www.mediciconstanta.ro/jaeg/?VlEHDVvh=9Opn4WO2xZgxxNDkNGsIia6GoKuxBfXh3HU6nJUJOovQ2Daq2EsR8T6osHZN6Oos26YiOKjRaUape58pdui5fF9pfPUX5VWYS5msIkgnGD14mtGY1feIQ7U=&BHPD=o2nt
89.42.218.92
http://www.celluslim.com.br/y8lu/
50.116.86.54
https://files.reg.ru/fonts/inter/Inter-Regular.woff2)
unknown
https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404
unknown
http://www.supermontage.com/9i8t/?VlEHDVvh=2T5+pGPdigXxZZx8gY/OSLODLjvvwj0MjlV7S+1Ldbgia1Gm71jO+3C1ccfYbIwVvCUgnk/aeboESokRLTli2QWqQswZxn4Hxw0zC18njeajG3czp+Bsx3U=&BHPD=o2nt
13.248.169.48
https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumb
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.topscaleservices.com/uyud/?VlEHDVvh=a4DuWa1aWcmJH21/SNxRR+JRQb1v/kzaj3WKu4zLUxUUlKGTu9D1sWAogGI9gEZiY1gr5T6O35XBnrIr/I/ZCy9af/SljyarCQCdkJfuLPpdjFvVaxfdqpU=&BHPD=o2nt
136.143.186.12
http://www.embrace-counselor.com/5xhc/
202.233.67.46
https://reg.ru?target=_blank
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.digishieldu.online
unknown
malicious
www.mediciconstanta.ro
unknown
malicious
www.knockdubai.ae
unknown
malicious
www.shy-models.ru
unknown
malicious
www.celluslim.com.br
unknown
malicious
www.topscaleservices.com
unknown
malicious
www.onitango-test.com
unknown
malicious
mediciconstanta.ro
89.42.218.92
www.arsenjev.fun
217.107.219.102
shy-models.ru
185.215.4.44
www.spotgush.top
66.29.149.46
www.chooceseafood.ca
199.59.243.225
www.drednents.es
172.67.137.210
www.pinpointopia.com
216.40.34.41
celluslim.com.br
50.116.86.54
www.supermontage.com
13.248.169.48
zhs.zohosites.com
136.143.186.12
www.drdavidglassman.com
199.59.243.225
www.embrace-counselor.com
202.233.67.46
knockdubai.ae
103.120.178.210
www.skinut-ves.ru
31.31.198.106
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.supermontage.com
United States
136.143.186.12
zhs.zohosites.com
United States
103.120.178.210
knockdubai.ae
India
89.42.218.92
mediciconstanta.ro
Romania
172.67.137.210
www.drednents.es
United States
66.29.149.46
www.spotgush.top
United States
199.59.243.225
www.chooceseafood.ca
United States
50.116.86.54
celluslim.com.br
United States
217.107.219.102
www.arsenjev.fun
Russian Federation
202.233.67.46
www.embrace-counselor.com
Japan
185.215.4.44
shy-models.ru
Denmark
31.31.198.106
www.skinut-ves.ru
Russian Federation
216.40.34.41
www.pinpointopia.com
Canada
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C60000
system
page execute and read and write
malicious
13F0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
45F0000
trusted library allocation
page read and write
malicious
4630000
trusted library allocation
page read and write
malicious
2CE0000
unclassified section
page execute and read and write
malicious
38F0000
unkown
page execute and read and write
malicious
860000
system
page execute and read and write
malicious
4B20000
system
page execute and read and write
malicious
5CB0000
system
page execute and read and write
malicious
33E0000
unclassified section
page execute and read and write
malicious
22E0000
unclassified section
page execute and read and write
40AE000
trusted library allocation
page read and write
EFF000
stack
page read and write
B03000
heap
page read and write
70D0000
trusted library section
page read and write
3210000
heap
page read and write
10D0000
trusted library allocation
page read and write
4A2E000
direct allocation
page execute and read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
7AD0000
heap
page read and write
A98000
heap
page read and write
DC1000
heap
page read and write
A4AB000
stack
page read and write
470A000
trusted library allocation
page read and write
53C000
stack
page read and write
3100000
heap
page read and write
4B5D000
direct allocation
page execute and read and write
DC1000
heap
page read and write
DD0000
heap
page read and write
2DCF000
stack
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
1110000
trusted library allocation
page execute and read and write
53A0000
heap
page read and write
3100000
heap
page read and write
7ABB000
heap
page read and write
10E0000
trusted library allocation
page read and write
5C10000
unclassified section
page read and write
22CE0645000
system
page execute and read and write
670E000
unclassified section
page read and write
812F000
stack
page read and write
BC0000
heap
page read and write
17D8000
direct allocation
page execute and read and write
AA5000
heap
page read and write
26AA000
heap
page read and write
7990000
trusted library allocation
page read and write
3100000
heap
page read and write
4FF5000
trusted library allocation
page read and write
E3F000
stack
page read and write
3A81000
trusted library allocation
page read and write
DC1000
heap
page read and write
22CE2421000
trusted library allocation
page read and write
4B61000
direct allocation
page execute and read and write
8466000
trusted library allocation
page read and write
DC1000
heap
page read and write
B2D000
heap
page read and write
10B4000
trusted library allocation
page read and write
453A000
heap
page read and write
AB0000
heap
page read and write
EF64BFF000
stack
page read and write
7510000
heap
page read and write
C67000
unkown
page readonly
8CBF000
stack
page read and write
6F0000
heap
page read and write
AB7000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
BF0000
heap
page read and write
2B19000
trusted library allocation
page read and write
4E09000
direct allocation
page execute and read and write
DC1000
heap
page read and write
7A56000
heap
page read and write
DC1000
heap
page read and write
22CE085C000
heap
page read and write
252C000
unkown
page read and write
B32000
heap
page read and write
4883000
heap
page read and write
A5EE000
stack
page read and write
8ED0000
heap
page read and write
DC1000
heap
page read and write
5540000
heap
page read and write
6AE000
stack
page read and write
90BE000
stack
page read and write
20C24000
system
page read and write
10DA000
trusted library allocation
page execute and read and write
3106000
heap
page read and write
42D000
remote allocation
page execute and read and write
7DE000
unkown
page readonly
26EC000
unkown
page read and write
74DE000
stack
page read and write
6A32000
unclassified section
page read and write
DC1000
heap
page read and write
2A3E000
stack
page read and write
5660000
heap
page read and write
DC1000
heap
page read and write
5022000
direct allocation
page execute and read and write
9DBE000
stack
page read and write
2EF0000
unkown
page execute and read and write
2E0E000
stack
page read and write
942C000
stack
page read and write
FF0000
heap
page read and write
4981000
heap
page read and write
DC1000
heap
page read and write
C30000
heap
page read and write
710000
heap
page read and write
1C0000
unkown
page readonly
2F5000
unkown
page read and write
C50000
unkown
page readonly
7A61000
heap
page read and write
4B5A000
trusted library allocation
page read and write
63F000
heap
page read and write
7A40000
trusted library allocation
page read and write
DC1000
heap
page read and write
FAE000
stack
page read and write
DC0000
heap
page read and write
96B1000
trusted library allocation
page read and write
5CFE000
stack
page read and write
20622000
system
page read and write
DC1000
heap
page read and write
4FCD000
trusted library allocation
page read and write
DC1000
heap
page read and write
A7A000
stack
page read and write
4B5B000
stack
page read and write
22F0000
heap
page read and write
10B3000
trusted library allocation
page execute and read and write
DC1000
heap
page read and write
87A6000
trusted library allocation
page read and write
AE5000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
6C1000
unkown
page readonly
92EE000
stack
page read and write
5670000
trusted library allocation
page execute and read and write
B5C000
heap
page read and write
6DA6000
trusted library allocation
page read and write
4E0D000
direct allocation
page execute and read and write
DC1000
heap
page read and write
7FDA0000
trusted library allocation
page execute and read and write
DC1000
heap
page read and write
714000
heap
page read and write
DC1000
heap
page read and write
1120000
heap
page read and write
5F0000
unkown
page read and write
5020000
trusted library allocation
page read and write
9EC000
stack
page read and write
DC1000
heap
page read and write
3DCF000
trusted library allocation
page read and write
7AC6000
heap
page read and write
F09000
system
page execute and read and write
86EF000
stack
page read and write
1140000
heap
page read and write
730000
unkown
page readonly
4BE3000
system
page execute and read and write
720000
heap
page read and write
43A000
stack
page read and write
714000
heap
page read and write
AAE000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
23DF000
unkown
page read and write
47D0000
trusted library allocation
page read and write
15B9000
direct allocation
page execute and read and write
DC1000
heap
page read and write
2EB0000
heap
page read and write
2E4E000
stack
page read and write
B7B000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
10C0000
trusted library allocation
page read and write
DC1000
heap
page read and write
3D91000
trusted library allocation
page read and write
4FCC000
stack
page read and write
1205000
heap
page read and write
10BD000
trusted library allocation
page execute and read and write
2A40000
trusted library allocation
page read and write
EF633FB000
stack
page read and write
DC1000
heap
page read and write
4AFE000
stack
page read and write
1030000
direct allocation
page execute and read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
5360000
heap
page read and write
2E80000
trusted library allocation
page read and write
BF0000
heap
page read and write
4812000
heap
page read and write
1157000
heap
page read and write
DC1000
heap
page read and write
2F28000
trusted library allocation
page read and write
A1FE000
stack
page read and write
22CE0847000
heap
page read and write
1261000
direct allocation
page execute and read and write
8EBD000
stack
page read and write
5430000
heap
page read and write
630000
unkown
page readonly
DC1000
heap
page read and write
23FF000
stack
page read and write
F60000
heap
page read and write
B03000
heap
page read and write
4FC1000
trusted library allocation
page read and write
838000
stack
page read and write
26EC000
unkown
page read and write
CEB000
heap
page read and write
3440000
unkown
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
4B8F000
system
page execute and read and write
A23E000
stack
page read and write
DC1000
heap
page read and write
3234000
trusted library allocation
page read and write
3100000
heap
page read and write
1C0000
unkown
page readonly
DC1000
heap
page read and write
B8C000
stack
page read and write
DC1000
heap
page read and write
5060000
heap
page read and write
580000
unkown
page readonly
31A0000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
528C000
stack
page read and write
5390000
trusted library allocation
page read and write
EF7000
stack
page read and write
DC1000
heap
page read and write
12FE000
trusted library allocation
page read and write
C14000
heap
page read and write
DC1000
heap
page read and write
2E76000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
10C3000
trusted library allocation
page read and write
22CE240A000
trusted library allocation
page read and write
C19000
heap
page read and write
4890000
direct allocation
page execute and read and write
B37000
heap
page read and write
2ABF000
trusted library allocation
page read and write
2083C000
system
page read and write
4BE2000
unclassified section
page read and write
8E4000
heap
page read and write
580000
unkown
page readonly
721E000
stack
page read and write
6F0000
heap
page read and write
B10000
heap
page read and write
30E8000
heap
page read and write
DC1000
heap
page read and write
63EA000
unclassified section
page read and write
2E74000
trusted library allocation
page read and write
7375000
heap
page read and write
620000
heap
page read and write
DC1000
heap
page read and write
726000
heap
page read and write
22CE25CE000
trusted library allocation
page read and write
CD0000
heap
page read and write
F00000
system
page execute and read and write
22CE2200000
heap
page read and write
2FE1000
trusted library allocation
page read and write
8E0000
heap
page read and write
FA3000
trusted library allocation
page execute and read and write
AF6000
heap
page read and write
4FBE000
trusted library allocation
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
B0A000
heap
page read and write
35D2000
unkown
page read and write
DC1000
heap
page read and write
AB0000
heap
page read and write
B5E000
stack
page read and write
C50000
unkown
page readonly
30F5000
heap
page read and write
40D0000
unkown
page read and write
8BBF000
stack
page read and write
601000
unkown
page readonly
22CE2300000
trusted library allocation
page read and write
719E000
stack
page read and write
7ACB000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
B32000
heap
page read and write
EF643FE000
stack
page read and write
3ED1000
trusted library allocation
page read and write
7AC1000
heap
page read and write
7999000
heap
page read and write
5EE000
stack
page read and write
1100000
trusted library allocation
page read and write
DC1000
heap
page read and write
5A0000
heap
page read and write
DC1000
heap
page read and write
2350000
heap
page read and write
590000
unkown
page readonly
E1D000
stack
page read and write
DC1000
heap
page read and write
5D45000
heap
page read and write
22CE0840000
heap
page read and write
5711000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
49BD000
direct allocation
page execute and read and write
B7A000
stack
page read and write
DC1000
heap
page read and write
11AD000
heap
page read and write
18DF000
stack
page read and write
A5AC000
stack
page read and write
162E000
direct allocation
page execute and read and write
43A000
stack
page read and write
B80000
unkown
page read and write
768E000
stack
page read and write
5070000
trusted library allocation
page read and write
EF63BFD000
stack
page read and write
1037000
heap
page read and write
F28000
system
page execute and read and write
DC1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
1150000
heap
page read and write
2DE4000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
270000
unkown
page readonly
4B38000
heap
page read and write
590000
unkown
page readonly
BF0000
heap
page read and write
DC1000
heap
page read and write
4670000
trusted library allocation
page read and write
C50000
unkown
page readonly
2400000
unkown
page readonly
44D7000
unclassified section
page execute and read and write
8E4000
heap
page read and write
DC1000
heap
page read and write
6BC000
stack
page read and write
DC1000
heap
page read and write
6B0000
unkown
page read and write
DC1000
heap
page read and write
1280000
trusted library allocation
page read and write
2F0B000
heap
page read and write
732000
unkown
page readonly
5725000
heap
page read and write
22CE2020000
trusted library allocation
page read and write
CE4000
heap
page read and write
EAE000
stack
page read and write
96C0000
trusted library allocation
page read and write
4659000
heap
page read and write
DC1000
heap
page read and write
700000
unkown
page readonly
73A1000
heap
page read and write
2FDF000
trusted library allocation
page read and write
5420000
heap
page read and write
DC1000
heap
page read and write
5570000
trusted library allocation
page execute and read and write
C25000
heap
page read and write
A700000
trusted library allocation
page read and write
DC1000
heap
page read and write
2FD9000
trusted library allocation
page read and write
68A0000
unclassified section
page read and write
AB0000
heap
page read and write
5340000
heap
page execute and read and write
4262000
unkown
page read and write
A6F0000
trusted library allocation
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
2F0F000
trusted library allocation
page read and write
745E000
stack
page read and write
1D0000
unkown
page readonly
750000
heap
page read and write
BC5000
heap
page read and write
15BD000
direct allocation
page execute and read and write
4CA2000
unclassified section
page read and write
1301000
trusted library allocation
page read and write
DC1000
heap
page read and write
5B5E000
heap
page read and write
DFE000
stack
page read and write
319F000
stack
page read and write
280000
unkown
page readonly
15E0000
unclassified section
page execute and read and write
2FF0000
heap
page read and write
7A93000
heap
page read and write
22CE0872000
heap
page read and write
2AD4000
unkown
page read and write
AA7000
heap
page read and write
4989000
heap
page read and write
5EB000
stack
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
480E000
heap
page read and write
CAE000
stack
page read and write
758000
heap
page read and write
DC1000
heap
page read and write
5F0000
unkown
page read and write
5410000
trusted library section
page readonly
DC1000
heap
page read and write
22CE2020000
trusted library allocation
page read and write
DC1000
heap
page read and write
B37000
heap
page read and write
5DA2000
unclassified section
page read and write
5450000
heap
page read and write
B43000
heap
page read and write
DC1000
heap
page read and write
4C65000
heap
page read and write
2FD1000
trusted library allocation
page read and write
DC1000
heap
page read and write
231F000
stack
page read and write
730000
unkown
page read and write
2E79000
stack
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
60C6000
unclassified section
page read and write
10EB000
trusted library allocation
page execute and read and write
6DFE000
stack
page read and write
2F85000
trusted library allocation
page read and write
DC1000
heap
page read and write
B60000
unkown
page readonly
B17000
heap
page read and write
DC1000
heap
page read and write
2320000
unkown
page readonly
4530000
trusted library allocation
page read and write
BFA000
heap
page read and write
1276000
direct allocation
page execute and read and write
720000
heap
page read and write
5D30000
trusted library section
page read and write
DC1000
heap
page read and write
2412000
unkown
page read and write
E11000
unkown
page readonly
6D50000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
DC1000
heap
page read and write
2FD7000
trusted library allocation
page read and write
8FF000
stack
page read and write
DC1000
heap
page read and write
BFE000
heap
page read and write
22CE2414000
trusted library allocation
page read and write
3C5E000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
315E000
stack
page read and write
10CD000
trusted library allocation
page execute and read and write
2F87000
unclassified section
page execute and read and write
B03000
heap
page read and write
C51000
unkown
page execute read
7A66000
heap
page read and write
22CE2403000
trusted library allocation
page read and write
C65000
unkown
page read and write
FD0000
heap
page read and write
570000
unkown
page readonly
DC1000
heap
page read and write
5A0000
heap
page read and write
5220000
trusted library allocation
page read and write
932C000
stack
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
FB7000
direct allocation
page execute and read and write
C67000
unkown
page readonly
2FD3000
trusted library allocation
page read and write
DC1000
heap
page read and write
C5E000
unkown
page readonly
B20000
heap
page read and write
4FE0000
heap
page read and write
70BE000
stack
page read and write
52A4000
unclassified section
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
FC5000
heap
page read and write
3100000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
B00000
heap
page read and write
DC1000
heap
page read and write
7A68000
heap
page read and write
7A51000
heap
page read and write
FA0000
trusted library allocation
page read and write
6DA7000
system
page execute and read and write
F5E000
stack
page read and write
640000
unkown
page readonly
DC1000
heap
page read and write
DC1000
heap
page read and write
4FC6000
trusted library allocation
page read and write
DC1000
heap
page read and write
3B74000
trusted library allocation
page read and write
4C61000
heap
page read and write
30FB000
heap
page read and write
C10000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
3B97000
unkown
page execute and read and write
DC1000
heap
page read and write
10E2000
trusted library allocation
page read and write
22CE086F000
heap
page read and write
7364000
heap
page read and write
956E000
stack
page read and write
5720000
heap
page read and write
95AE000
stack
page read and write
5D00000
trusted library section
page read and write
22CE06E0000
heap
page read and write
DC1000
heap
page read and write
2412000
unkown
page read and write
47D0000
trusted library allocation
page read and write
4FD2000
trusted library allocation
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
CB0000
direct allocation
page read and write
48B0000
system
page execute and read and write
4B70000
system
page execute and read and write
DC1000
heap
page read and write
22CE2020000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
FAD000
trusted library allocation
page execute and read and write
1036000
direct allocation
page execute and read and write
C51000
unkown
page execute read
3106000
heap
page read and write
DC1000
heap
page read and write
758000
heap
page read and write
4220000
trusted library allocation
page read and write
C10000
heap
page read and write
136F000
stack
page read and write
B27000
heap
page read and write
2DF8000
unkown
page read and write
2E90000
trusted library allocation
page read and write
9EBD000
stack
page read and write
2EC0000
heap
page read and write
15D0000
heap
page read and write
5B50000
heap
page read and write
CE0000
heap
page read and write
A70000
heap
page read and write
488E000
stack
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
A40000
heap
page read and write
22CE086B000
heap
page read and write
B77000
stack
page read and write
22CE25BE000
trusted library allocation
page read and write
A20000
unkown
page readonly
900000
unkown
page readonly
EFA000
stack
page read and write
C51000
unkown
page execute read
7AD9000
heap
page read and write
7A50000
heap
page read and write
3FC000
stack
page read and write
5310000
trusted library allocation
page read and write
23E0000
heap
page read and write
946E000
stack
page read and write
484D000
stack
page read and write
142F000
stack
page read and write
5372000
trusted library allocation
page read and write
9EC0000
heap
page read and write
7D60000
heap
page read and write
DC1000
heap
page read and write
5370000
trusted library allocation
page read and write
3DAC000
unkown
page read and write
7A5B000
heap
page read and write
5290000
heap
page execute and read and write
2400000
unkown
page readonly
31F7000
trusted library allocation
page read and write
650000
unkown
page readonly
FB0000
heap
page read and write
5A7E000
unclassified section
page read and write
DC1000
heap
page read and write
660000
heap
page read and write
620000
heap
page read and write
CE4000
heap
page read and write
C10000
heap
page read and write
640000
unkown
page readonly
6339000
system
page execute and read and write
4AAC000
heap
page read and write
41E1000
trusted library allocation
page read and write
DC1000
heap
page read and write
E11000
unkown
page readonly
DC1000
heap
page read and write
DC1000
heap
page read and write
610000
unkown
page read and write
1312000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5072000
trusted library allocation
page read and write
B00000
heap
page read and write
10B0000
trusted library allocation
page read and write
1756000
direct allocation
page execute and read and write
540B000
stack
page read and write
8E4000
heap
page read and write
4980000
heap
page read and write
22CE240E000
trusted library allocation
page read and write
B67000
heap
page read and write
DC1000
heap
page read and write
C50000
unkown
page readonly
1B0000
unkown
page readonly
601000
unkown
page readonly
BFC000
unkown
page read and write
DC1000
heap
page read and write
10D2000
trusted library allocation
page read and write
B20000
heap
page read and write
CB9000
direct allocation
page read and write
4FE3000
heap
page read and write
4B80000
system
page execute and read and write
79AB000
heap
page read and write
5440000
heap
page read and write
7A62000
heap
page read and write
DC1000
heap
page read and write
91EE000
stack
page read and write
C3D000
stack
page read and write
58EC000
unclassified section
page read and write
311C000
unkown
page read and write
749D000
stack
page read and write
539D000
stack
page read and write
2EFE000
unkown
page read and write
DC1000
heap
page read and write
2A81000
trusted library allocation
page read and write
280000
unkown
page readonly
C5E000
unkown
page readonly
269F000
stack
page read and write
10D6000
trusted library allocation
page execute and read and write
DC1000
heap
page read and write
5430000
heap
page read and write
AAB000
heap
page read and write
2A50000
trusted library allocation
page read and write
7BB000
stack
page read and write
7A98000
heap
page read and write
7066000
trusted library allocation
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
12EB000
trusted library allocation
page read and write
7A6B000
heap
page read and write
C5E000
unkown
page readonly
C32000
heap
page read and write
49B9000
direct allocation
page execute and read and write
7FCC0000
trusted library allocation
page execute and read and write
5550000
heap
page read and write
4EBC000
unclassified section
page read and write
C65000
unkown
page read and write
96AE000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
2FA000
stack
page read and write
130D000
trusted library allocation
page read and write
22F0000
heap
page read and write
3F3E000
unkown
page read and write
127E000
stack
page read and write
7070000
trusted library allocation
page execute and read and write
DC1000
heap
page read and write
B30000
heap
page read and write
DC1000
heap
page read and write
1130000
heap
page read and write
DC1000
heap
page read and write
B80000
unkown
page read and write
10D2000
trusted library allocation
page read and write
AAB000
heap
page read and write
FA4000
trusted library allocation
page read and write
7AB2000
heap
page read and write
739E000
heap
page read and write
127D000
direct allocation
page execute and read and write
1320000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
630000
unkown
page readonly
12DB000
stack
page read and write
628000
heap
page read and write
7A8D000
heap
page read and write
7060000
trusted library allocation
page read and write
9CBE000
stack
page read and write
DC1000
heap
page read and write
B27000
heap
page read and write
DC1000
heap
page read and write
53A0000
trusted library section
page readonly
9BBF000
stack
page read and write
A6F2000
trusted library allocation
page read and write
735B000
heap
page read and write
8D0000
heap
page read and write
CF0000
heap
page read and write
1741000
direct allocation
page execute and read and write
DC1000
heap
page read and write
C67000
unkown
page readonly
1173000
heap
page read and write
303E000
unkown
page read and write
A20000
heap
page read and write
10D3000
direct allocation
page execute and read and write
3C1A000
unkown
page read and write
239E000
unkown
page read and write
1130000
trusted library allocation
page execute and read and write
117E000
heap
page read and write
582D000
stack
page read and write
80EE000
stack
page read and write
B43000
heap
page read and write
1FE0000
unclassified section
page execute and read and write
B0A000
heap
page read and write
BE0000
heap
page read and write
DC1000
heap
page read and write
3764000
unkown
page read and write
2F60000
trusted library allocation
page read and write
541F000
trusted library section
page readonly
DC1000
heap
page read and write
290000
unkown
page readonly
D08000
heap
page read and write
3A69000
unclassified section
page execute and read and write
2F5F000
stack
page read and write
B0A000
heap
page read and write
52B0000
system
page execute and read and write
2FCF000
trusted library allocation
page read and write
3FC000
stack
page read and write
CE4000
heap
page read and write
2E95000
trusted library allocation
page read and write
79AB000
heap
page read and write
B90000
unkown
page read and write
E11000
unkown
page readonly
4FA0000
trusted library allocation
page read and write
750000
heap
page read and write
DC1000
heap
page read and write
F3E000
stack
page read and write
DC1000
heap
page read and write
AF1000
heap
page read and write
DC1000
heap
page read and write
752E000
heap
page read and write
C65000
unkown
page read and write
DC1000
heap
page read and write
22CE2400000
trusted library allocation
page read and write
1D0000
unkown
page readonly
10C3000
trusted library allocation
page read and write
DC1000
heap
page read and write
2F00000
heap
page read and write
3100000
heap
page read and write
7050000
trusted library allocation
page read and write
5840000
heap
page read and write
2A70000
heap
page execute and read and write
AB6000
heap
page read and write
DC1000
heap
page read and write
B00000
heap
page read and write
AB6000
heap
page read and write
DC1000
heap
page read and write
5380000
trusted library allocation
page execute and read and write
1100000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
778F000
stack
page read and write
1490000
direct allocation
page execute and read and write
13B0000
direct allocation
page read and write
F90000
trusted library allocation
page read and write
A1F000
stack
page read and write
5830000
heap
page read and write
22CE25C4000
trusted library allocation
page read and write
4981000
heap
page read and write
22CE0800000
heap
page read and write
A0FD000
stack
page read and write
53A3000
heap
page read and write
22CE0647000
system
page execute and read and write
DC1000
heap
page read and write
270000
unkown
page readonly
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
3A88000
unkown
page read and write
2FF5000
unclassified section
page execute and read and write
265E000
stack
page read and write
6F10000
heap
page read and write
570000
unkown
page readonly
10D7000
trusted library allocation
page execute and read and write
22EA000
stack
page read and write
C67000
unkown
page readonly
C51000
unkown
page execute read
DC1000
heap
page read and write
5D40000
heap
page read and write
3C05000
unkown
page execute and read and write
73A5000
heap
page read and write
C6E000
stack
page read and write
DC1000
heap
page read and write
24F0000
unkown
page execute and read and write
DC1000
heap
page read and write
B17000
heap
page read and write
10D9000
direct allocation
page execute and read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
3A89000
trusted library allocation
page read and write
AA5000
heap
page read and write
DC1000
heap
page read and write
F67000
heap
page read and write
AB0000
heap
page read and write
610000
unkown
page read and write
DC1000
heap
page read and write
C5E000
unkown
page readonly
12E0000
trusted library allocation
page read and write
413D000
trusted library allocation
page read and write
DC1000
heap
page read and write
B60000
unkown
page readonly
2320000
unkown
page readonly
AB0000
heap
page read and write
10EB000
trusted library allocation
page execute and read and write
22CE2501000
trusted library allocation
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
20562000
system
page read and write
30E0000
heap
page read and write
55C8000
unclassified section
page read and write
7A76000
heap
page read and write
8DBE000
stack
page read and write
D30000
heap
page read and write
293E000
stack
page read and write
6B0000
unkown
page read and write
8A1E000
stack
page read and write
4E7E000
direct allocation
page execute and read and write
6D90000
trusted library allocation
page read and write
DC1000
heap
page read and write
1B0000
unkown
page readonly
6DB0000
trusted library allocation
page execute and read and write
71DD000
stack
page read and write
DC1000
heap
page read and write
10DA000
trusted library allocation
page execute and read and write
B17000
heap
page read and write
A20000
unkown
page readonly
FC0000
heap
page read and write
DC1000
heap
page read and write
3ED9000
trusted library allocation
page read and write
B10000
heap
page read and write
22AD000
stack
page read and write
7AD7000
heap
page read and write
7010000
trusted library allocation
page read and write
DC1000
heap
page read and write
27A0000
heap
page read and write
4CFC000
unclassified section
page read and write
DC1000
heap
page read and write
7CB000
heap
page read and write
2E70000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
DC1000
heap
page read and write
657C000
unclassified section
page read and write
A0BE000
stack
page read and write
D00000
heap
page read and write
6D0000
unkown
page read and write
DC1000
heap
page read and write
1110000
heap
page read and write
38F6000
unkown
page read and write
2A60000
trusted library allocation
page read and write
DC1000
heap
page read and write
730000
unkown
page read and write
2CCF000
stack
page read and write
B61000
heap
page read and write
710000
heap
page read and write
2E3D000
stack
page read and write
FD6000
direct allocation
page execute and read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
22CE05D0000
system
page execute and read and write
CA5000
heap
page read and write
2ED1000
trusted library allocation
page read and write
DC1000
heap
page read and write
E40000
heap
page read and write
3EB0000
system
page execute and read and write
DC1000
heap
page read and write
13FF000
stack
page read and write
334F000
trusted library allocation
page read and write
4BD2000
direct allocation
page execute and read and write
6D0000
unkown
page read and write
F1E000
stack
page read and write
7A9D000
heap
page read and write
8EC0000
heap
page read and write
B2D000
heap
page read and write
114A000
heap
page read and write
A33E000
stack
page read and write
2B80000
trusted library allocation
page read and write
FB0000
direct allocation
page execute and read and write
4FA4000
trusted library allocation
page read and write
4CD6000
heap
page read and write
1450000
heap
page read and write
660000
heap
page read and write
22CE2410000
trusted library allocation
page read and write
6258000
unclassified section
page read and write
DC1000
heap
page read and write
900000
unkown
page readonly
76E0000
trusted library allocation
page read and write
24D2000
unkown
page read and write
7350000
heap
page read and write
3AD7000
unclassified section
page execute and read and write
29E0000
unclassified section
page execute and read and write
650000
unkown
page readonly
3040000
heap
page read and write
10E2000
trusted library allocation
page read and write
22CE07C0000
heap
page read and write
4ABE000
stack
page read and write
63A7000
system
page execute and read and write
18E0000
unclassified section
page execute and read and write
C65000
unkown
page read and write
126E000
stack
page read and write
5F34000
unclassified section
page read and write
175D000
direct allocation
page execute and read and write
DC1000
heap
page read and write
700000
unkown
page readonly
1130000
heap
page read and write
DC1000
heap
page read and write
4C5C000
stack
page read and write
DC1000
heap
page read and write
B00000
heap
page read and write
4720000
trusted library allocation
page execute and read and write
E11000
unkown
page readonly
A6EE000
stack
page read and write
5080000
trusted library allocation
page execute and read and write
628000
heap
page read and write
10BE000
stack
page read and write
1180000
heap
page read and write
13AE000
stack
page read and write
22CE0872000
heap
page read and write
A90000
heap
page read and write
30FB000
heap
page read and write
225E000
stack
page read and write
4FB1000
direct allocation
page execute and read and write
1290000
heap
page execute and read and write
2FDB000
trusted library allocation
page read and write
DC1000
heap
page read and write
7564000
heap
page read and write
C14000
heap
page read and write
30F5000
heap
page read and write
DC1000
heap
page read and write
42D5000
trusted library allocation
page read and write
DC1000
heap
page read and write
114E000
heap
page read and write
2920000
heap
page read and write
1030000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
290000
unkown
page readonly
5000000
trusted library allocation
page read and write
B56000
heap
page read and write
2FD5000
trusted library allocation
page read and write
AB0000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
DC1000
heap
page read and write
2FA000
stack
page read and write
4536000
heap
page read and write
DC1000
heap
page read and write
4FAD000
direct allocation
page execute and read and write
DC1000
heap
page read and write
1072000
direct allocation
page execute and read and write
32AE000
unkown
page read and write
22CE25B1000
trusted library allocation
page read and write
12E4000
trusted library allocation
page read and write
41C1000
trusted library allocation
page read and write
734E000
stack
page read and write
26A0000
heap
page read and write
DC1000
heap
page read and write
4D2C000
unkown
page read and write
53C000
stack
page read and write
B20000
heap
page read and write
46E5000
heap
page read and write
6C1000
unkown
page readonly
11E2000
heap
page read and write
2DA7000
trusted library allocation
page read and write
4B8C000
system
page execute and read and write
3FC4000
trusted library allocation
page read and write
1306000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
There are 931 hidden memdumps, click here to show them.