IOC Report
6xmBUtHylU.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6xmBUtHylU.exe
"C:\Users\user\Desktop\6xmBUtHylU.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
https://citizencenturygoodwk.shop/api=/
unknown
malicious
https://citizencenturygoodwk.shop/ez
unknown
malicious
https://citizencenturygoodwk.shop/api9(
unknown
malicious
radiationnopp.shop
malicious
https://citizencenturygoodwk.shop/.
unknown
malicious
https://citizencenturygoodwk.shop/apiU6
unknown
malicious
publicitttyps.shop
malicious
answerrsdo.shop
malicious
https://citizencenturygoodwk.shop:443/api
unknown
malicious
citizencenturygoodwk.shop
malicious
https://citizencenturygoodwk.shop/apiX
unknown
malicious
https://citizencenturygoodwk.shop/apie6-
unknown
malicious
benchillppwo.shop
malicious
https://citizencenturygoodwk.shop/z
unknown
malicious
https://citizencenturygoodwk.shop/
unknown
malicious
bargainnykwo.shop
malicious
bouncedgowp.shop
malicious
https://citizencenturygoodwk.shop/api
188.114.96.3
malicious
bannngwko.shop
malicious
https://citizencenturygoodwk.shop/4Y
unknown
malicious
https://citizencenturygoodwk.shop:443/apiK
unknown
malicious
affecthorsedpo.shop
malicious
https://citizencenturygoodwk.shop/apiP
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://login.microsoftonline.com/stream
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://management.core.chinacloudapi.cnFrame
unknown
https://management.chinacloudapi.cnCONTINUATION
unknown
https://management.core.usgovcloudapi.nethttp2:
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://management.azure.cominvalid
unknown
https://login.chinacloudapi.cn/http2:
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.mozilla.or
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
citizencenturygoodwk.shop
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
citizencenturygoodwk.shop
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C0001BA000
direct allocation
page read and write
malicious
2871000
heap
page read and write
C00004F000
direct allocation
page read and write
7FF67F84B000
unkown
page read and write
C00009A000
direct allocation
page read and write
54B4000
trusted library allocation
page read and write
245B1FC8000
heap
page read and write
4D01000
heap
page read and write
2884000
heap
page read and write
4AF3000
trusted library allocation
page read and write
C00005E000
direct allocation
page read and write
4A4C000
trusted library allocation
page read and write
2871000
heap
page read and write
2807000
heap
page read and write
245B2225000
heap
page read and write
C000650000
direct allocation
page read and write
4AB6000
trusted library allocation
page read and write
4A9E000
trusted library allocation
page read and write
4A0A000
trusted library allocation
page read and write
C000018000
direct allocation
page read and write
245B1F78000
direct allocation
page read and write
288C000
heap
page read and write
4A13000
trusted library allocation
page read and write
4A42000
trusted library allocation
page read and write
245F7371000
direct allocation
page read and write
2884000
heap
page read and write
4A44000
trusted library allocation
page read and write
2814000
heap
page read and write
C00000E000
direct allocation
page read and write
E03FBFE000
stack
page read and write
4A44000
trusted library allocation
page read and write
2831000
heap
page read and write
C000010000
direct allocation
page read and write
C000144000
direct allocation
page read and write
4A9D000
trusted library allocation
page read and write
C000049000
direct allocation
page read and write
4A39000
trusted library allocation
page read and write
4A01000
trusted library allocation
page read and write
C000104000
direct allocation
page read and write
4A23000
trusted library allocation
page read and write
4AA5000
trusted library allocation
page read and write
C00013A000
direct allocation
page read and write
C000142000
direct allocation
page read and write
4A23000
trusted library allocation
page read and write
42FD000
stack
page read and write
2843000
heap
page read and write
4A34000
trusted library allocation
page read and write
4A91000
trusted library allocation
page read and write
4ABA000
trusted library allocation
page read and write
C000400000
direct allocation
page read and write
2809000
heap
page read and write
4A39000
trusted library allocation
page read and write
4A23000
trusted library allocation
page read and write
4A01000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
C000564000
direct allocation
page read and write
7FF67F458000
unkown
page write copy
4A43000
trusted library allocation
page read and write
E03F9FE000
stack
page read and write
4A33000
trusted library allocation
page read and write
4A09000
trusted library allocation
page read and write
4A57000
trusted library allocation
page read and write
2823000
heap
page read and write
4B31000
trusted library allocation
page read and write
245F7550000
direct allocation
page read and write
C00002D000
direct allocation
page read and write
23F7000
heap
page read and write
4A03000
trusted library allocation
page read and write
7FF67F7D4000
unkown
page read and write
4A43000
trusted library allocation
page read and write
C00016A000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
280E000
heap
page read and write
4AA3000
trusted library allocation
page read and write
7FF67F40D000
unkown
page read and write
4ADC000
trusted library allocation
page read and write
29DF000
stack
page read and write
2887000
heap
page read and write
2871000
heap
page read and write
4A10000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
4A4A000
trusted library allocation
page read and write
4A9E000
trusted library allocation
page read and write
4A9A000
trusted library allocation
page read and write
4A65000
trusted library allocation
page read and write
2823000
heap
page read and write
4A22000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
4AB6000
trusted library allocation
page read and write
C000524000
direct allocation
page read and write
C000114000
direct allocation
page read and write
23F0000
heap
page read and write
C000171000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
4B29000
trusted library allocation
page read and write
4B39000
trusted library allocation
page read and write
27CF000
stack
page read and write
4AA0000
trusted library allocation
page read and write
C000554000
direct allocation
page read and write
23F5000
heap
page read and write
4A4C000
trusted library allocation
page read and write
4AEB000
trusted library allocation
page read and write
2823000
heap
page read and write
7FF67F190000
unkown
page readonly
7FF67F191000
unkown
page execute read
4DB4000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
4AD6000
trusted library allocation
page read and write
C00051E000
direct allocation
page read and write
C000087000
direct allocation
page read and write
E03FFFE000
stack
page read and write
4B07000
trusted library allocation
page read and write
4ADA000
trusted library allocation
page read and write
C000100000
direct allocation
page read and write
30E000
stack
page read and write
4A23000
trusted library allocation
page read and write
C0000AC000
direct allocation
page read and write
4A14000
trusted library allocation
page read and write
4AA6000
trusted library allocation
page read and write
4ACE000
trusted library allocation
page read and write
2831000
heap
page read and write
7FF67F84C000
unkown
page write copy
4A23000
trusted library allocation
page read and write
4B39000
trusted library allocation
page read and write
280E000
heap
page read and write
245F73B0000
direct allocation
page read and write
4E7C000
trusted library allocation
page read and write
C000168000
direct allocation
page read and write
4A10000
trusted library allocation
page read and write
4B08000
trusted library allocation
page read and write
4A99000
trusted library allocation
page read and write
C000610000
direct allocation
page read and write
4A34000
trusted library allocation
page read and write
4B1F000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
27D0000
remote allocation
page read and write
7FF67F410000
unkown
page read and write
27E0000
heap
page read and write
2884000
heap
page read and write
282E000
heap
page read and write
2875000
heap
page read and write
C0004E4000
direct allocation
page read and write
2886000
heap
page read and write
C000136000
direct allocation
page read and write
27D0000
remote allocation
page read and write
C0004DA000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
2807000
heap
page read and write
4D44000
trusted library allocation
page read and write
4A59000
trusted library allocation
page read and write
4AD3000
trusted library allocation
page read and write
4A98000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
4AF3000
trusted library allocation
page read and write
2807000
heap
page read and write
2831000
heap
page read and write
4A32000
trusted library allocation
page read and write
280E000
heap
page read and write
4A44000
trusted library allocation
page read and write
7FF67F44B000
unkown
page write copy
27FB000
heap
page read and write
7FF67F45D000
unkown
page write copy
4A34000
trusted library allocation
page read and write
280E000
heap
page read and write
4AA4000
trusted library allocation
page read and write
C000062000
direct allocation
page read and write
4A02000
trusted library allocation
page read and write
4AF3000
trusted library allocation
page read and write
4E5E000
stack
page read and write
2895000
heap
page read and write
7FF67F84F000
unkown
page write copy
4A10000
trusted library allocation
page read and write
4A9D000
trusted library allocation
page read and write
245F7331000
direct allocation
page read and write
7FF67F7DB000
unkown
page read and write
4B01000
trusted library allocation
page read and write
C000072000
direct allocation
page read and write
4AC0000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4B19000
trusted library allocation
page read and write
288C000
heap
page read and write
4AB6000
trusted library allocation
page read and write
245B1F74000
direct allocation
page read and write
4B01000
trusted library allocation
page read and write
4A21000
trusted library allocation
page read and write
280E000
heap
page read and write
2871000
heap
page read and write
4B29000
trusted library allocation
page read and write
4A0A000
trusted library allocation
page read and write
4B08000
trusted library allocation
page read and write
4A2C000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
2826000
heap
page read and write
7FF67F842000
unkown
page read and write
4A1B000
trusted library allocation
page read and write
4A21000
trusted library allocation
page read and write
4A0A000
trusted library allocation
page read and write
C000600000
direct allocation
page read and write
2885000
heap
page read and write
4A44000
trusted library allocation
page read and write
C000670000
direct allocation
page read and write
2873000
heap
page read and write
4A33000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
4A16000
trusted library allocation
page read and write
C00004B000
direct allocation
page read and write
E03F7FE000
stack
page read and write
4B39000
trusted library allocation
page read and write
2871000
heap
page read and write
E03F5FF000
stack
page read and write
C00056A000
direct allocation
page read and write
4A10000
trusted library allocation
page read and write
4AC5000
trusted library allocation
page read and write
4AC8000
trusted library allocation
page read and write
4A31000
trusted library allocation
page read and write
4AF3000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
2807000
heap
page read and write
2880000
heap
page read and write
2814000
heap
page read and write
4AEB000
trusted library allocation
page read and write
245F7510000
direct allocation
page read and write
4A60000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
245F7540000
direct allocation
page read and write
49FE000
stack
page read and write
4A71000
trusted library allocation
page read and write
4B08000
trusted library allocation
page read and write
4A48000
trusted library allocation
page read and write
C0000B6000
direct allocation
page read and write
2885000
heap
page read and write
2802000
heap
page read and write
4A3C000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
245B1FB0000
direct allocation
page read and write
4A34000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4A68000
trusted library allocation
page read and write
27E8000
heap
page read and write
7FF67F461000
unkown
page readonly
4AA4000
trusted library allocation
page read and write
2831000
heap
page read and write
4ACF000
trusted library allocation
page read and write
2823000
heap
page read and write
C00008D000
direct allocation
page read and write
C000128000
direct allocation
page read and write
245B1F20000
heap
page read and write
1BB000
stack
page read and write
4D00000
heap
page read and write
7FF67F408000
unkown
page read and write
4AA0000
trusted library allocation
page read and write
4A23000
trusted library allocation
page read and write
245F737A000
direct allocation
page read and write
4AEB000
trusted library allocation
page read and write
C000620000
direct allocation
page read and write
C000158000
direct allocation
page read and write
4FB4000
trusted library allocation
page read and write
4B37000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
C000044000
direct allocation
page read and write
4ACE000
trusted library allocation
page read and write
4A6A000
trusted library allocation
page read and write
C000162000
direct allocation
page read and write
4B2B000
trusted library allocation
page read and write
4D2C000
trusted library allocation
page read and write
C000132000
direct allocation
page read and write
C000534000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C0005F6000
direct allocation
page read and write
4A34000
trusted library allocation
page read and write
4B2B000
trusted library allocation
page read and write
27D0000
remote allocation
page read and write
4B29000
trusted library allocation
page read and write
2893000
heap
page read and write
4AA9000
trusted library allocation
page read and write
4B12000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
4B01000
trusted library allocation
page read and write
C00010A000
direct allocation
page read and write
4AA0000
trusted library allocation
page read and write
2871000
heap
page read and write
4A23000
trusted library allocation
page read and write
245B2220000
heap
page read and write
4AEB000
trusted library allocation
page read and write
C00015E000
direct allocation
page read and write
4A42000
trusted library allocation
page read and write
C0000AE000
direct allocation
page read and write
4A09000
trusted library allocation
page read and write
7FF67F408000
unkown
page write copy
4A01000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
C00003D000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
4AB6000
trusted library allocation
page read and write
7FF67F896000
unkown
page readonly
C000014000
direct allocation
page read and write
4E9F000
stack
page read and write
C00008B000
direct allocation
page read and write
4A33000
trusted library allocation
page read and write
C000630000
direct allocation
page read and write
4A3C000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
2884000
heap
page read and write
4A9D000
trusted library allocation
page read and write
4A39000
trusted library allocation
page read and write
4B01000
trusted library allocation
page read and write
C000156000
direct allocation
page read and write
4A60000
trusted library allocation
page read and write
4A98000
trusted library allocation
page read and write
4A2C000
trusted library allocation
page read and write
2871000
heap
page read and write
4A10000
trusted library allocation
page read and write
2823000
heap
page read and write
4A21000
trusted library allocation
page read and write
4A0A000
trusted library allocation
page read and write
4A3B000
trusted library allocation
page read and write
7FF67F45F000
unkown
page read and write
2895000
heap
page read and write
C000126000
direct allocation
page read and write
4A23000
trusted library allocation
page read and write
2880000
heap
page read and write
245B21F0000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
4B2F000
trusted library allocation
page read and write
48BF000
stack
page read and write
C00002F000
direct allocation
page read and write
4A65000
trusted library allocation
page read and write
4A0D000
trusted library allocation
page read and write
4AB6000
trusted library allocation
page read and write
4ABA000
trusted library allocation
page read and write
4ACB000
trusted library allocation
page read and write
7FF67F190000
unkown
page readonly
2871000
heap
page read and write
C000640000
direct allocation
page read and write
4B39000
trusted library allocation
page read and write
C00056A000
direct allocation
page read and write
245B1F40000
heap
page read and write
4A44000
trusted library allocation
page read and write
2831000
heap
page read and write
4B08000
trusted library allocation
page read and write
2880000
heap
page read and write
4A0F000
trusted library allocation
page read and write
4ED9000
trusted library allocation
page read and write
4A09000
trusted library allocation
page read and write
7FF67F45B000
unkown
page read and write
C00007C000
direct allocation
page read and write
4A44000
trusted library allocation
page read and write
4A2C000
trusted library allocation
page read and write
2825000
heap
page read and write
4A3F000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4A43000
trusted library allocation
page read and write
4A9F000
trusted library allocation
page read and write
7FF67F411000
unkown
page write copy
4A44000
trusted library allocation
page read and write
C000002000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
4B29000
trusted library allocation
page read and write
4ADD000
trusted library allocation
page read and write
289C000
heap
page read and write
7FF67F191000
unkown
page execute read
E03FDFC000
stack
page read and write
2831000
heap
page read and write
4A01000
trusted library allocation
page read and write
4A9E000
trusted library allocation
page read and write
7FF67F40E000
unkown
page write copy
4AB0000
trusted library allocation
page read and write
7FF67F461000
unkown
page readonly
4A34000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
4AF3000
trusted library allocation
page read and write
2894000
heap
page read and write
4A09000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
4A98000
trusted library allocation
page read and write
4A16000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
7FF67F84F000
unkown
page write copy
4AD6000
trusted library allocation
page read and write
4A1B000
trusted library allocation
page read and write
245B2200000
direct allocation
page read and write
4A49000
trusted library allocation
page read and write
4A9A000
trusted library allocation
page read and write
C000008000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
288E000
heap
page read and write
447D000
stack
page read and write
C00005A000
direct allocation
page read and write
7FF67F7BB000
unkown
page read and write
2823000
heap
page read and write
C000146000
direct allocation
page read and write
4A18000
trusted library allocation
page read and write
23B0000
heap
page read and write
C000023000
direct allocation
page read and write
280E000
heap
page read and write
C0000B4000
direct allocation
page read and write
4B08000
trusted library allocation
page read and write
4AC8000
trusted library allocation
page read and write
230000
remote allocation
page execute and read and write
245B1E40000
heap
page read and write
2899000
heap
page read and write
245F7333000
direct allocation
page read and write
4A33000
trusted library allocation
page read and write
C000076000
direct allocation
page read and write
2823000
heap
page read and write
E03F3FD000
stack
page read and write
C00015A000
direct allocation
page read and write
C000180000
direct allocation
page read and write
4A33000
trusted library allocation
page read and write
C000080000
direct allocation
page read and write
4DEC000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
283E000
heap
page read and write
C000140000
direct allocation
page read and write
4A0A000
trusted library allocation
page read and write
42BE000
stack
page read and write
4A33000
trusted library allocation
page read and write
C000084000
direct allocation
page read and write
4A15000
trusted library allocation
page read and write
4B08000
trusted library allocation
page read and write
4B2F000
trusted library allocation
page read and write
287E000
heap
page read and write
2807000
heap
page read and write
59CD000
trusted library allocation
page read and write
2880000
heap
page read and write
C000680000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
4A0A000
trusted library allocation
page read and write
2885000
heap
page read and write
280E000
heap
page read and write
4AA7000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
C000660000
direct allocation
page read and write
4A99000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C000094000
direct allocation
page read and write
1FA000
stack
page read and write
4FA0000
heap
page read and write
4B2B000
trusted library allocation
page read and write
C000058000
direct allocation
page read and write
280E000
heap
page read and write
4A34000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
4B39000
trusted library allocation
page read and write
2831000
heap
page read and write
2884000
heap
page read and write
4B2B000
trusted library allocation
page read and write
C000028000
direct allocation
page read and write
4AA5000
trusted library allocation
page read and write
4A9A000
trusted library allocation
page read and write
4A23000
trusted library allocation
page read and write
C000544000
direct allocation
page read and write
4B39000
trusted library allocation
page read and write
4B27000
trusted library allocation
page read and write
4A99000
trusted library allocation
page read and write
4A01000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
41BD000
stack
page read and write
2885000
heap
page read and write
4A42000
trusted library allocation
page read and write
C00010E000
direct allocation
page read and write
7FF67F44C000
unkown
page read and write
C000006000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
4B31000
trusted library allocation
page read and write
C00033A000
direct allocation
page read and write
C000012000
direct allocation
page read and write
4A47000
trusted library allocation
page read and write
C000374000
direct allocation
page read and write
4A14000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
C000154000
direct allocation
page read and write
4B08000
trusted library allocation
page read and write
C00014C000
direct allocation
page read and write
4B0D000
trusted library allocation
page read and write
C00000A000
direct allocation
page read and write
245B1FC0000
heap
page read and write
4A99000
trusted library allocation
page read and write
C00012C000
direct allocation
page read and write
4B39000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
7FF67F847000
unkown
page read and write
4A44000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4AA5000
trusted library allocation
page read and write
245F7501000
direct allocation
page read and write
4A9A000
trusted library allocation
page read and write
4AC3000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
2871000
heap
page read and write
4A18000
trusted library allocation
page read and write
4370000
heap
page read and write
4A13000
trusted library allocation
page read and write
4A13000
trusted library allocation
page read and write
4A01000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
C000038000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
310000
heap
page read and write
7FF67F84B000
unkown
page write copy
281000
remote allocation
page execute and read and write
4A23000
trusted library allocation
page read and write
4B39000
trusted library allocation
page read and write
4A23000
trusted library allocation
page read and write
239E000
stack
page read and write
2807000
heap
page read and write
C000166000
direct allocation
page read and write
4D13000
trusted library allocation
page read and write
2823000
heap
page read and write
7FF67F449000
unkown
page read and write
C000090000
direct allocation
page read and write
48FE000
stack
page read and write
2831000
heap
page read and write
C000016000
direct allocation
page read and write
4A1B000
trusted library allocation
page read and write
2807000
heap
page read and write
4A05000
trusted library allocation
page read and write
4A23000
trusted library allocation
page read and write
245F74B0000
direct allocation
page read and write
4A23000
trusted library allocation
page read and write
C000122000
direct allocation
page read and write
4A13000
trusted library allocation
page read and write
2896000
heap
page read and write
4A03000
trusted library allocation
page read and write
2814000
heap
page read and write
435E000
stack
page read and write
245B1F70000
direct allocation
page read and write
4A6A000
trusted library allocation
page read and write
4DE4000
trusted library allocation
page read and write
4A36000
trusted library allocation
page read and write
2C0000
heap
page read and write
2814000
heap
page read and write
4B29000
trusted library allocation
page read and write
4D0D000
trusted library allocation
page read and write
2895000
heap
page read and write
4ABA000
trusted library allocation
page read and write
7FF67F896000
unkown
page readonly
C000152000
direct allocation
page read and write
4A34000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
7FF67F40C000
unkown
page write copy
There are 535 hidden memdumps, click here to show them.