IOC Report
BANK DETAILS CORRECTIONS.exe

loading gif

Files

File Path
Type
Category
Malicious
BANK DETAILS CORRECTIONS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpB1A6.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BANK DETAILS CORRECTIONS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fcLfLlfpmjf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\DC886F4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dshbixmz.por.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e1qwrqkl.r5e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3w1js1w.14s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvpmwg5p.wdx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4y0rj4m.1wo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rn1ggqsz.lup.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rvnvowfl.a2t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xwbispbp.uvf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC983.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BANK DETAILS CORRECTIONS.exe
C:\Users\user\Desktop\BANK DETAILS CORRECTIONS.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BANK DETAILS CORRECTIONS.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fcLfLlfpmjf" /XML "C:\Users\user\AppData\Local\Temp\tmpB1A6.tmp
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Desktop\BANK DETAILS CORRECTIONS.exe
C:\Users\user\Desktop\BANK DETAILS CORRECTIONS.exe
malicious
C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe
C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe
malicious
C:\Program Files (x86)\HITCmsolmmQgoXoEXeUlcJSOtoDkWjBbuzmRRaLEYkE\EnKifmZDGZ.exe
"C:\Program Files (x86)\HITCmsolmmQgoXoEXeUlcJSOtoDkWjBbuzmRRaLEYkE\EnKifmZDGZ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fcLfLlfpmjf" /XML "C:\Users\user\AppData\Local\Temp\tmpC983.tmp
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe
C:\Users\user\AppData\Roaming\fcLfLlfpmjf.exe
malicious
C:\Windows\SysWOW64\sdiagnhost.exe
C:\Windows\SysWOW64\sdiagnhost.exe
malicious
C:\Program Files (x86)\HITCmsolmmQgoXoEXeUlcJSOtoDkWjBbuzmRRaLEYkE\EnKifmZDGZ.exe
"C:\Program Files (x86)\HITCmsolmmQgoXoEXeUlcJSOtoDkWjBbuzmRRaLEYkE\EnKifmZDGZ.exe"
malicious
C:\Windows\SysWOW64\sdiagnhost.exe
C:\Windows\SysWOW64\sdiagnhost.exe
malicious
C:\Program Files (x86)\HITCmsolmmQgoXoEXeUlcJSOtoDkWjBbuzmRRaLEYkE\EnKifmZDGZ.exe
"C:\Program Files (x86)\HITCmsolmmQgoXoEXeUlcJSOtoDkWjBbuzmRRaLEYkE\EnKifmZDGZ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\Firefox.exe
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.hondamechanic.today/e6xn/?bvOt=u61FFSswTsQwZHK5Df1sdB0Y128x+tID5YHOMFlYU8e6X6f1CT0d10xaq3wUYzHCl9vsukjaIczYmr5kws9YFzoUz2fAyAt1utXToSD7Y3kRqMygPw==&CVZ=R6q4lTVpfZfT_D
64.190.62.22
malicious
http://www.hondamechanic.today/e6xn/
64.190.62.22
malicious
http://www.oc7o0.top/e6xn/
104.21.63.135
malicious
http://www.pro-ecoproduct.com/e6xn/?bvOt=qjLanAtLSG+g6YhcGMXKobFEDsC37gbqnajlfmukJF4TH11e5HWV02203YM0+S2fdiE5dYRNrz4LXrhHAApVOWSTzQMTxIdRoLo0SBW6YGOyo1TtwQ==&CVZ=R6q4lTVpfZfT_D
87.236.19.107
malicious
http://www.mgn.icu/e6xn/?bvOt=nPkHDMcb1JQH2fM03fg+aIDrHSSiblzQLJDfzfVFS5dXE5xkefwXFeSdKwFU7agvUteWFQW2j0bTvqR9HNEHAhnYAdzU3M7ag8PlDKnWcqNy6jrKrg==&CVZ=R6q4lTVpfZfT_D
49.0.230.183
malicious
http://www.supportstuiwords.com/e6xn/?bvOt=kzp/a47TZoeooijf6PAMz/PnwNMdJTtRUuOJK4qo3trrvBMD8vtq5KxCd9qMSTo59iVH98TL2IBESMiQybod0ACy6WBPglHFi3698tluOY189mrwzA==&CVZ=R6q4lTVpfZfT_D
154.7.21.55
malicious
http://www.605alibahis.com/e6xn/
192.64.119.184
malicious
http://www.cqyh.one/e6xn/?bvOt=ptLjcD60OGLEAEKwUIEQaugGR9tSXE/bjIUNt3iL6Qw6jfpYmMXFU+LQzVNpETLyO7HgKKKoK0NH56hBGNACCL/xDZHnLmeKZtapvr1OSuWcevHuIw==&CVZ=R6q4lTVpfZfT_D
149.88.64.51
malicious
http://www.d4ffo73dz.sbs/e6xn/?bvOt=CBgiEcAQTvmtp6KW0R4Z7j3tS9oH+Sd4wWgtDPe8rtmYg/trD2DMciPVEqfGjRspk89YWIqewcapqz5yHVGzQ5KlflxjVuoMuuz+sMTok+5fFnqu2w==&CVZ=R6q4lTVpfZfT_D
47.76.88.64
malicious
http://www.dxgsf.shop/e6xn/
103.197.25.241
malicious
http://www.supportstuiwords.com/e6xn/
154.7.21.55
malicious
http://www.605alibahis.com/e6xn/?bvOt=agiyDRT46qDSSmihlQ4LWL8xIgO+qfSg1vPRp09QaQzBVRWpSaW3tusYt1FhFwISNvV57xmnsnPpxHCL/G4hmICdRu2qyIf5a9CtW3wt0Qkcp+tj5w==&CVZ=R6q4lTVpfZfT_D
192.64.119.184
malicious
http://www.nikazo.xyz/e6xn/
66.29.152.141
malicious
http://www.appmystartup.com/e6xn/?bvOt=9Ok63Zp3UlyeFJncTpLan6F7UfPHzm35fZEpdutLQ03GKmXAn6TmeK19kU+o3seWSyf9rIWEGfMs+8v+auRJ5uWoro43dFLf6YZQGlVbKlE3Xt0YSA==&CVZ=R6q4lTVpfZfT_D
144.76.75.181
malicious
http://www.oc7o0.top/e6xn/?bvOt=2Kfb+Brrh9GrmqPqLtRK/jRr6sBFjt1I8ubTlYZTytp88LF+iTgF/zqvnUYpIzG87louehFzf7+JPcLVzBlhDb38gBs1IrPZ/tUzM/hN1wjivuIhpg==&CVZ=R6q4lTVpfZfT_D
104.21.63.135
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.oc7o0.top/wbb8f/mzs.pptx
unknown
http://dz30.d5s8h.top/zlf64/
unknown
http://www.oc7o0.top/302/riold.ppt
unknown
https://duckduckgo.com/ac/?q=
unknown
http://hzw.avt.temporary.site/wp-content/plugins/custom-twitter-feeds/css/ctf-styles.min.css?ver=2.2
unknown
https://zbgzs.5pych.top/zic/qxk3gc.doc
unknown
http://www.oc7o0.top
unknown
http://jqyn6d.0dgqo.top/w876/7u54.doc
unknown
https://hxb.1cva0.top/hnz76/
unknown
http://bgj.sf3l2.top/1j7rknm/
unknown
http://lcj05un.1osh5.top/sucui0/7besnu.html
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
http://joahk.soaw8.top/0jyift/
unknown
http://hzw.avt.temporary.site/wp-includes/css/dist/block-library/style.min.css?ver=6.4.3
unknown
https://85bj22.jsj91.top/2xat4/m98nsm.xls
unknown
https://nyzn27r.8k4z2.top/fkh8x/
unknown
http://www.oc7o0.top/6neav/srn3y3.xls
unknown
https://v94nhnh.kwx2l.top/e94/ropif.docx
unknown
http://www.oc7o0.top/7qe/8l9zr.pptx
unknown
http://www.oc7o0.top/1dys/2jgjq.docx
unknown
https://6c4.l0yg7.top/nv6hczm/
unknown
http://www.oc7o0.top/2jtdy62/
unknown
http://www.oc7o0.top/3iwe/ay869g.xlsx
unknown
https://nrbh.gm2mv.top/oc5p/
unknown
http://hzw.avt.temporary.site/wp-content/plugins/custom-facebook-feed/assets/css/cff-style.min.css?v
unknown
http://www.oc7o0.top/hnvto/h15.html
unknown
https://error.kangleweb.net/?code=404&vh=vhsa57698
unknown
https://kpl507.bdx91.top/wd1/
unknown
http://cjmb1.9vjyq.top/6vs38u/9x6vjf.xls
unknown
http://www.oc7o0.top/5wkvv6a/
unknown
http://www.oc7o0.top/hw8q/jt5zl.docx
unknown
https://cj4x.fehs5.top/n93ovfl/
unknown
https://themegrill.com/themes/flash/
unknown
http://lg7.n89m5.top/qu2/
unknown
http://3djf.a1gao.top/3xe/xc9.xls
unknown
http://hzw.avt.temporary.site/wp-content/themes/flash/css/responsive.min.css?ver=6.4.3
unknown
http://hzw.avt.temporary.site/wp-content/cache/autoptimize/autoptimize_single_ac80d98b52b56292f7ce2d
unknown
http://wuka.gjgmm.top/9ii7k/
unknown
http://kiwbh1.soaw8.top/pl1wmh/y2yq.ppt
unknown
http://ix18.oqry7.top/zdg4qfy/stvr0o7.xlsx
unknown
https://zspo.sf3l2.top/0ie1ye/vlc52d.htm
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.oc7o0.top/e8miho/
unknown
http://osmfn1.djzcz.top/ipb/
unknown
http://www.oc7o0.top/ik0/
unknown
https://ijg.oc7o0.top/7a85xk/ua98sk.htm
unknown
http://www.oc7o0.top/4d7o8gx/wpst3.ppt
unknown
http://1mt8.ss1yp.top/g9sb/
unknown
http://g77.8v089.top/damu1/pl7.xlsx
unknown
https://4mt4jb.ko6sc.top/6d92ec/oicfh3p.doc
unknown
http://hzw.avt.temporary.site/wp-content/themes/flash/css/font-awesome.min.css?ver=6.4.3
unknown
http://www.oc7o0.top/sw1bs0t/qq05.xlsx
unknown
http://dnp53gn.ss1yp.top/f9qm/5bqu.pptx
unknown
http://f8subyg.x37kb.top/0nln/o72.doc
unknown
http://hzw.avt.temporary.site/wp-content/cache/autoptimize/autoptimize_single_7397d1bd83edde12ad6703
unknown
https://mozilla.org0/
unknown
http://www.oc7o0.top/l1qnt/
unknown
http://xr3f3p.1cva0.top/n1qm0f/kn1v2.xlsx
unknown
https://hzw.avt.temporary.site/wp-content/uploads/2024/01/cropped-sys-computer-logo-1-2-192x192.jpg
unknown
http://www.oc7o0.top/aek2/l7bry89.html
unknown
http://83zj4.d2um5.top/x88q/
unknown
https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css?ver=6.4.3
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://usqzg3b.s0kfn.top/q7gyjwg/roc.xls
unknown
https://q5cjh4.7fwhx.top/wd5qx9/
unknown
https://hzw.avt.temporary.site/wp-content/uploads/2024/01/cropped-sys-computer-logo-1-2-32x32.jpg
unknown
https://schema.org
unknown
https://5hm.u3gee.top/u4g28a/
unknown
https://www.ecosia.org/newtab/
unknown
https://bzem8k.8kb9n.top/umcbim/nf2.xlsx
unknown
http://hzw.avt.temporary.site/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
unknown
https://h8w.soaw8.top/mthsy3w/eonaph.doc
unknown
https://8j3my.stgu5.top/322/
unknown
http://www.oc7o0.top/2r7b/mulenc.doc
unknown
https://ua01qg.jsj91.top/b8pu1ee/
unknown
http://lxoo4j.laoli666.top/2e0w/xted.html
unknown
http://hzw.avt.temporary.site/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI
unknown
http://hzw.avt.temporary.site/wp-content/plugins/woocommerce/assets/js/js-cookie/js.cookie.min.js?ve
unknown
https://xajg3.mmdb8.top/ji0/b0kf5r.xls
unknown
http://www.oc7o0.top/7fdwd/
unknown
http://www.roblesprats.com
unknown
http://dof.nqku1.top/7f7/67mxw.xls
unknown
https://d17ced.6imvv.top/nutmwu9/mie.docx
unknown
http://is4ml0.2xexb.top/z07/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.nikazo.xyz
66.29.152.141
malicious
www.hondamechanic.today
64.190.62.22
malicious
dxgsf.shop
103.197.25.241
malicious
xiaoyue.zhuangkou.com
47.76.88.64
malicious
www.oc7o0.top
104.21.63.135
malicious
www.mgn.icu
49.0.230.183
malicious
vhs.zhaxiyun.com
149.88.64.51
malicious
www.supportstuiwords.com
154.7.21.55
malicious
www.605alibahis.com
192.64.119.184
malicious
www.le-kuk.shop
89.31.143.90
malicious
www.pro-ecoproduct.com
87.236.19.107
malicious
syscomputerrd.info
50.6.160.34
malicious
appmystartup.com
144.76.75.181
malicious
www.agroamsterdam.com
unknown
malicious
www.syscomputerrd.info
unknown
malicious
www.d4ffo73dz.sbs
unknown
malicious
www.dxgsf.shop
unknown
malicious
www.appmystartup.com
unknown
malicious
www.cqyh.one
unknown
malicious
www.betful.site
unknown
malicious
www.roblesprats.com
208.91.197.132
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.64.119.184
www.605alibahis.com
United States
malicious
87.236.19.107
www.pro-ecoproduct.com
Russian Federation
malicious
66.29.152.141
www.nikazo.xyz
United States
malicious
103.197.25.241
dxgsf.shop
Hong Kong
malicious
64.190.62.22
www.hondamechanic.today
United States
malicious
47.76.88.64
xiaoyue.zhuangkou.com
United States
malicious
144.76.75.181
appmystartup.com
Germany
malicious
104.21.63.135
www.oc7o0.top
United States
malicious
49.0.230.183
www.mgn.icu
Mongolia
malicious
50.6.160.34
syscomputerrd.info
United States
malicious
149.88.64.51
vhs.zhaxiyun.com
United States
malicious
154.7.21.55
www.supportstuiwords.com
United States
malicious
89.31.143.90
www.le-kuk.shop
Germany
malicious
208.91.197.132
www.roblesprats.com
Virgin Islands (BRITISH)
There are 4 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
28F0000
trusted library allocation
page read and write
malicious
5360000
system
page execute and read and write
malicious
2DB1000
trusted library allocation
page read and write
malicious
5A00000
trusted library section
page read and write
malicious
2881000
trusted library allocation
page read and write
malicious
1860000
unclassified section
page execute and read and write
malicious
19A0000
unclassified section
page execute and read and write
malicious
2320000
system
page execute and read and write
malicious
2900000
system
page execute and read and write
malicious
3690000
unkown
page execute and read and write
malicious
28B0000
trusted library allocation
page read and write
malicious
2C30000
unkown
page execute and read and write
malicious
2880000
unclassified section
page execute and read and write
malicious
40E1000
heap
page read and write
2D15000
heap
page read and write
56D0000
heap
page read and write
17A6000
direct allocation
page execute and read and write
AF30000
trusted library allocation
page read and write
1E70000
heap
page read and write
14E7000
direct allocation
page execute and read and write
BD0000
unkown
page readonly
40E1000
heap
page read and write
BD0000
unkown
page readonly
40E1000
heap
page read and write
1609000
direct allocation
page execute and read and write
57ED000
stack
page read and write
9DE000
stack
page read and write
75E4000
heap
page read and write
7614000
heap
page read and write
10F0000
heap
page read and write
F20000
unkown
page read and write
C7A000
heap
page read and write
269F000
heap
page read and write
2974000
heap
page read and write
4BE0000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
4569000
direct allocation
page execute and read and write
10B4000
heap
page read and write
1506000
direct allocation
page execute and read and write
2F60000
heap
page read and write
269A000
heap
page read and write
4C06000
trusted library allocation
page read and write
40E1000
heap
page read and write
1E80000
unclassified section
page execute and read and write
28DD000
stack
page read and write
1040000
heap
page read and write
2F5F000
stack
page read and write
294E000
trusted library allocation
page read and write
BD4000
heap
page read and write
E00000
heap
page read and write
1C1000
unkown
page execute read
4BC0000
trusted library allocation
page execute and read and write
56B0000
trusted library section
page readonly
2B70000
heap
page read and write
9B0000
unkown
page readonly
DF0000
heap
page read and write
1D5000
unkown
page read and write
2B9F000
stack
page read and write
2890000
trusted library allocation
page read and write
40E1000
heap
page read and write
9A0000
unkown
page readonly
40E1000
heap
page read and write
1A8E000
direct allocation
page execute and read and write
40E1000
heap
page read and write
2B30000
heap
page read and write
40E1000
heap
page read and write
6CB0000
heap
page read and write
29C0000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
4C20000
trusted library allocation
page read and write
746D000
stack
page read and write
40E1000
heap
page read and write
2710000
trusted library allocation
page read and write
E60000
heap
page read and write
40E1000
heap
page read and write
562E000
stack
page read and write
6CD7000
heap
page read and write
75EA000
heap
page read and write
40E1000
heap
page read and write
267E000
stack
page read and write
40E1000
heap
page read and write
10F7000
heap
page read and write
29CE000
stack
page read and write
2EB0000
trusted library allocation
page read and write
15A2000
direct allocation
page execute and read and write
990000
unkown
page readonly
403D000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
1C0000
unkown
page readonly
29A0000
trusted library allocation
page read and write
B4D000
trusted library allocation
page execute and read and write
5463000
heap
page read and write
40E1000
heap
page read and write
4E54000
unclassified section
page read and write
AC9E000
stack
page read and write
4A50000
direct allocation
page execute and read and write
40E1000
heap
page read and write
8FF8000
trusted library allocation
page read and write
40E1000
heap
page read and write
A10000
unkown
page readonly
72DE000
heap
page read and write
ACDC000
stack
page read and write
3AEE000
unkown
page read and write
E90000
heap
page read and write
2970000
heap
page read and write
52F0000
trusted library allocation
page execute and read and write
23D0000
heap
page read and write
2910000
unkown
page read and write
1070000
heap
page read and write
DE0000
heap
page read and write
E4E000
stack
page read and write
40E1000
heap
page read and write
30E0000
heap
page read and write
2ACD000
stack
page read and write
29C4000
heap
page read and write
2DA0000
heap
page read and write
2680000
heap
page read and write
43C0000
heap
page read and write
40E1000
heap
page read and write
A1FE000
stack
page read and write
269F000
heap
page read and write
269B000
heap
page read and write
13CB000
system
page execute and read and write
A70000
unkown
page readonly
6BB0000
heap
page read and write
3F8E000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
40E1000
heap
page read and write
B44000
trusted library allocation
page read and write
3660000
heap
page read and write
40E1000
heap
page read and write
307A000
stack
page read and write
29A0000
unkown
page readonly
26DE000
heap
page read and write
BAE000
heap
page read and write
40E1000
heap
page read and write
753F000
stack
page read and write
6F2D000
trusted library allocation
page read and write
32C7000
unkown
page execute and read and write
40E1000
heap
page read and write
2E6E000
stack
page read and write
71B0000
trusted library allocation
page read and write
1D3F000
stack
page read and write
40E1000
heap
page read and write
4DF5000
trusted library allocation
page read and write
133B000
stack
page read and write
E50000
unkown
page readonly
28B000
stack
page read and write
40E1000
heap
page read and write
593E000
stack
page read and write
E00000
heap
page read and write
40E1000
heap
page read and write
9E7000
heap
page read and write
74F0000
heap
page read and write
5136000
unkown
page execute and read and write
1140000
unkown
page readonly
52D0000
trusted library allocation
page read and write
1BBD000
direct allocation
page execute and read and write
1C0000
unkown
page readonly
E3E000
stack
page read and write
40E1000
heap
page read and write
B7B000
trusted library allocation
page execute and read and write
D60000
unkown
page readonly
7619000
heap
page read and write
40E1000
heap
page read and write
2D90000
trusted library allocation
page read and write
26A5000
heap
page read and write
53D3000
system
page execute and read and write
771E000
stack
page read and write
1CE000
unkown
page readonly
4080000
trusted library allocation
page read and write
A60000
unkown
page readonly
75B5000
heap
page read and write
ED0000
unkown
page read and write
13E9000
system
page execute and read and write
3314000
unkown
page read and write
18F0000
direct allocation
page execute and read and write
1D7000
unkown
page readonly
5350000
trusted library allocation
page read and write
40E1000
heap
page read and write
2F2C000
unkown
page read and write
3B0D000
trusted library allocation
page read and write
106F000
stack
page read and write
40E1000
heap
page read and write
2D0F000
heap
page read and write
950000
heap
page read and write
40E0000
heap
page read and write
29D0000
heap
page read and write
2370000
heap
page read and write
1D5000
unkown
page read and write
10D0000
unkown
page read and write
40E1000
heap
page read and write
7618000
heap
page read and write
4E3D000
stack
page read and write
1300000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
E60000
heap
page read and write
53B0000
trusted library allocation
page execute and read and write
296C000
unkown
page read and write
C62000
heap
page read and write
40E1000
heap
page read and write
B77000
trusted library allocation
page execute and read and write
33B0000
heap
page read and write
557C000
unkown
page read and write
2A34000
heap
page read and write
EB0000
unkown
page read and write
40E1000
heap
page read and write
714D000
stack
page read and write
2890000
heap
page read and write
EE0000
heap
page read and write
29C4000
heap
page read and write
D50000
unkown
page readonly
AF1E000
stack
page read and write
40E1000
heap
page read and write
1088000
heap
page read and write
2B60000
unkown
page readonly
7E26000
heap
page read and write
6F30000
trusted library allocation
page read and write
4D1D000
direct allocation
page execute and read and write
1BB6000
direct allocation
page execute and read and write
1580000
unkown
page readonly
11AF000
stack
page read and write
2F892000
system
page read and write
5320000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
5AE4000
unclassified section
page read and write
20A6000
unclassified section
page execute and read and write
40E1000
heap
page read and write
4F5E000
stack
page read and write
45DE000
direct allocation
page execute and read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
1540000
unkown
page readonly
E20000
heap
page read and write
AE1E000
stack
page read and write
60CE000
stack
page read and write
2748000
heap
page read and write
B60000
trusted library allocation
page read and write
12FD000
trusted library allocation
page execute and read and write
40E1000
heap
page read and write
5110000
trusted library allocation
page read and write
126E000
stack
page read and write
2D80000
heap
page execute and read and write
40E1000
heap
page read and write
3D36000
unkown
page execute and read and write
40E1000
heap
page read and write
74E5000
heap
page read and write
1338000
heap
page read and write
49CD000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
4F70000
heap
page read and write
3928000
unclassified section
page execute and read and write
1CE000
unkown
page readonly
1312000
trusted library allocation
page read and write
40E1000
heap
page read and write
2980000
heap
page read and write
40E1000
heap
page read and write
2D0A000
heap
page read and write
40E1000
heap
page read and write
75A6000
heap
page read and write
E95000
heap
page read and write
4D40000
heap
page read and write
2984000
heap
page read and write
52FD000
trusted library allocation
page read and write
B53000
trusted library allocation
page read and write
2F2C000
unkown
page read and write
760E000
heap
page read and write
2D0F000
heap
page read and write
562E000
unclassified section
page read and write
5E08000
unclassified section
page read and write
40E1000
heap
page read and write
508E000
stack
page read and write
2384000
heap
page read and write
75B2000
heap
page read and write
40E1000
heap
page read and write
138B000
direct allocation
page read and write
5302000
trusted library allocation
page read and write
5AAF000
stack
page read and write
E90000
heap
page read and write
1140000
unkown
page readonly
26A5000
heap
page read and write
40E1000
heap
page read and write
10D0000
unkown
page read and write
942000
unkown
page readonly
1C1000
unkown
page execute read
10A6000
heap
page read and write
F31000
unkown
page readonly
4CB0000
heap
page read and write
42C8000
unkown
page read and write
2930000
heap
page read and write
75A0000
heap
page read and write
EE7000
heap
page read and write
52F6000
trusted library allocation
page read and write
40E1000
heap
page read and write
1099000
heap
page read and write
789D000
stack
page read and write
C47000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
4297000
heap
page read and write
1030000
unkown
page readonly
1566000
direct allocation
page execute and read and write
5820000
trusted library allocation
page execute and read and write
7540000
heap
page read and write
31FE000
unkown
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
BEC000
stack
page read and write
10F7000
heap
page read and write
3FA4000
unkown
page read and write
26F0000
heap
page read and write
46F0000
heap
page read and write
40E1000
heap
page read and write
2980000
heap
page read and write
49D1000
heap
page read and write
32BE000
stack
page read and write
1360000
heap
page read and write
7F50000
trusted library section
page read and write
7790000
heap
page read and write
61D0000
heap
page read and write
269F000
heap
page read and write
40E1000
heap
page read and write
2D0F000
heap
page read and write
40E1000
heap
page read and write
4D43000
heap
page read and write
99E000
stack
page read and write
BE0000
unkown
page readonly
4DF0000
trusted library allocation
page read and write
4736000
unkown
page execute and read and write
D77000
stack
page read and write
40E1000
heap
page read and write
12E4000
trusted library allocation
page read and write
E20000
heap
page read and write
1CE000
unkown
page readonly
4782000
direct allocation
page execute and read and write
40E1000
heap
page read and write
E90000
heap
page read and write
269F000
heap
page read and write
940000
heap
page read and write
13B0000
heap
page read and write
5800000
trusted library allocation
page read and write
1317000
trusted library allocation
page execute and read and write
E8E000
stack
page read and write
53B5000
system
page execute and read and write
A0BC000
stack
page read and write
E40000
unkown
page readonly
2A90000
heap
page read and write
2752000
heap
page read and write
52BD000
trusted library allocation
page read and write
123C000
stack
page read and write
BE0000
unkown
page readonly
2720000
heap
page read and write
40E1000
heap
page read and write
A89000
unkown
page read and write
EE0000
heap
page read and write
3E55000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
7626000
heap
page read and write
1990000
heap
page read and write
7623000
heap
page read and write
6F80000
trusted library allocation
page execute and read and write
46F1000
heap
page read and write
2984000
heap
page read and write
1C38000
direct allocation
page execute and read and write
11F0000
unkown
page readonly
269F000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
A9A000
stack
page read and write
3D38000
unkown
page execute and read and write
26C0000
heap
page read and write
1A1EF940000
heap
page read and write
7601000
heap
page read and write
46F1000
heap
page read and write
D70000
unkown
page readonly
26BC000
stack
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
271F000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
40E1000
heap
page read and write
A00000
heap
page read and write
BE2000
heap
page read and write
40E1000
heap
page read and write
7730000
trusted library allocation
page read and write
5138000
unkown
page execute and read and write
AF33000
trusted library allocation
page read and write
26F7000
heap
page read and write
12D0000
trusted library allocation
page read and write
566E000
stack
page read and write
1125000
heap
page read and write
3C80000
unkown
page read and write
40E1000
heap
page read and write
522F000
stack
page read and write
5AC0000
heap
page read and write
54E0000
trusted library allocation
page execute and read and write
2ED0000
trusted library allocation
page read and write
7D5F000
stack
page read and write
40E1000
heap
page read and write
275D000
stack
page read and write
B9B000
stack
page read and write
4136000
unkown
page read and write
4C12000
trusted library allocation
page read and write
56C0000
heap
page read and write
A2FE000
stack
page read and write
4792000
unclassified section
page read and write
6EF0000
trusted library allocation
page execute and read and write
40E1000
heap
page read and write
3AED000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
1D7000
unkown
page readonly
83D6000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
75DF000
heap
page read and write
2B0A000
stack
page read and write
EAE000
stack
page read and write
EDE000
stack
page read and write
40E1000
heap
page read and write
303D000
stack
page read and write
42D000
remote allocation
page execute and read and write
9EC000
unkown
page readonly
59AE000
stack
page read and write
1070000
heap
page read and write
286B000
stack
page read and write
40E1000
heap
page read and write
D3C000
stack
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
2C52000
unkown
page read and write
5EAD5FD000
stack
page read and write
271D000
heap
page read and write
E60000
unkown
page read and write
EE7000
heap
page read and write
549C000
unclassified section
page read and write
52EE000
trusted library allocation
page read and write
2384000
heap
page read and write
28EB000
trusted library allocation
page read and write
40E1000
heap
page read and write
2D0F000
heap
page read and write
D70000
unkown
page readonly
761E000
heap
page read and write
6BBE000
heap
page read and write
13C8000
heap
page read and write
A9A000
stack
page read and write
4F8C000
stack
page read and write
26E3000
heap
page read and write
990000
unkown
page readonly
A43E000
stack
page read and write
57C0000
unclassified section
page read and write
2B40000
unkown
page readonly
761D000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
4BE4000
trusted library allocation
page read and write
2380000
heap
page read and write
395C000
unkown
page read and write
1D7000
unkown
page readonly
4C0D000
trusted library allocation
page read and write
10F4000
heap
page read and write
40E1000
heap
page read and write
75B8000
heap
page read and write
1A1D000
direct allocation
page execute and read and write
11B0000
unkown
page readonly
755E000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
3881000
trusted library allocation
page read and write
14E0000
direct allocation
page execute and read and write
3889000
trusted library allocation
page read and write
1030000
unkown
page readonly
57F0000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
1070000
heap
page read and write
2722000
heap
page read and write
40E1000
heap
page read and write
270E000
heap
page read and write
A20000
unkown
page readonly
5952000
unclassified section
page read and write
40E1000
heap
page read and write
5C76000
unclassified section
page read and write
B5D000
trusted library allocation
page execute and read and write
40E1000
heap
page read and write
2AD0000
unkown
page read and write
40E1000
heap
page read and write
4F80000
heap
page execute and read and write
4A42000
heap
page read and write
26F2000
heap
page read and write
1C1000
unkown
page execute read
40E1000
heap
page read and write
5830000
heap
page read and write
40E1000
heap
page read and write
2B40000
unkown
page readonly
B40000
trusted library allocation
page read and write
C55000
heap
page read and write
D80000
heap
page read and write
13A0000
heap
page read and write
B72000
trusted library allocation
page read and write
4328000
unclassified section
page execute and read and write
2D12000
unkown
page read and write
40E1000
heap
page read and write
5470000
trusted library allocation
page read and write
2BBE000
unkown
page read and write
4C30000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
4435000
heap
page read and write
28F0000
unkown
page read and write
2FAAC000
system
page read and write
40E1000
heap
page read and write
48A4000
heap
page read and write
B50000
trusted library allocation
page read and write
B43000
trusted library allocation
page execute and read and write
299E000
stack
page read and write
2A34000
heap
page read and write
E7E000
stack
page read and write
B9C000
stack
page read and write
75BA000
heap
page read and write
F1E000
stack
page read and write
C32000
heap
page read and write
4FA000
stack
page read and write
4C50000
trusted library allocation
page read and write
2EAF000
stack
page read and write
D80000
heap
page read and write
1820000
direct allocation
page read and write
9B0000
unkown
page readonly
40E1000
heap
page read and write
2D15000
heap
page read and write
4D21000
direct allocation
page execute and read and write
12AE000
stack
page read and write
3D0A000
trusted library allocation
page read and write
BC7000
heap
page read and write
40E1000
heap
page read and write
15A0000
heap
page read and write
2704000
heap
page read and write
26F0000
heap
page read and write
12E0000
trusted library allocation
page read and write
EC1000
unkown
page readonly
5AB0000
heap
page read and write
75B0000
heap
page read and write
270E000
stack
page read and write
102E000
stack
page read and write
7590000
trusted library allocation
page read and write
3638000
unkown
page read and write
269A000
heap
page read and write
40E1000
heap
page read and write
74F5000
heap
page read and write
45EC000
unkown
page read and write
40E1000
heap
page read and write
7670000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
929E000
stack
page read and write
1302000
trusted library allocation
page read and write
17AD000
direct allocation
page execute and read and write
1CE000
unkown
page readonly
1078000
heap
page read and write
4C01000
trusted library allocation
page read and write
106E000
stack
page read and write
11B0000
unkown
page readonly
40E1000
heap
page read and write
4B7D000
direct allocation
page execute and read and write
2D0F000
heap
page read and write
34A6000
unclassified section
page execute and read and write
1306000
trusted library allocation
page execute and read and write
10F0000
heap
page read and write
860000
heap
page read and write
137F000
stack
page read and write
2974000
heap
page read and write
4CC0000
trusted library allocation
page read and write
1D5000
unkown
page read and write
2AD0000
unkown
page read and write
40E1000
heap
page read and write
4F1B000
stack
page read and write
3E07000
trusted library allocation
page read and write
7D1E000
stack
page read and write
481E000
heap
page read and write
17DF000
stack
page read and write
F40000
unkown
page read and write
2B5F000
stack
page read and write
B62000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
7680000
trusted library allocation
page read and write
40E1000
heap
page read and write
2F28000
unclassified section
page execute and read and write
5120000
heap
page read and write
50CE000
stack
page read and write
4711000
direct allocation
page execute and read and write
41E8000
heap
page read and write
477E000
unkown
page read and write
2696000
heap
page read and write
130A000
trusted library allocation
page execute and read and write
2EB9000
unclassified section
page execute and read and write
D50000
unkown
page readonly
76C0000
trusted library allocation
page read and write
2733000
heap
page read and write
1D5000
unkown
page read and write
131B000
trusted library allocation
page execute and read and write
146E000
stack
page read and write
BEC000
stack
page read and write
12F3000
trusted library allocation
page read and write
2D06000
heap
page read and write
75FE000
heap
page read and write
14D0000
unkown
page readonly
F60000
heap
page read and write
530A000
unclassified section
page read and write
F40000
unkown
page read and write
40E1000
heap
page read and write
2696000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
26A5000
heap
page read and write
9BE0000
heap
page read and write
2758000
heap
page read and write
40E1000
heap
page read and write
74AE000
stack
page read and write
1CE000
unkown
page readonly
5835000
heap
page read and write
2F7D2000
system
page read and write
312B000
heap
page read and write
46FB000
heap
page read and write
40E1000
heap
page read and write
4CE0000
trusted library allocation
page read and write
E00000
heap
page read and write
6FE0000
trusted library allocation
page read and write
2E2E000
stack
page read and write
E71000
unkown
page readonly
4D30000
trusted library section
page readonly
40E1000
heap
page read and write
40E1000
heap
page read and write
2E1B000
trusted library allocation
page read and write
D9F000
stack
page read and write
75D9000
heap
page read and write
BF0000
unkown
page readonly
4FE6000
unclassified section
page read and write
6FDD000
stack
page read and write
2694000
heap
page read and write
40E1000
heap
page read and write
52D4000
trusted library allocation
page read and write
2D0F000
heap
page read and write
2A30000
heap
page read and write
48AC000
unclassified section
page read and write
C3A000
stack
page read and write
E30000
unkown
page readonly
40E1000
heap
page read and write
40E1000
heap
page read and write
26ED000
heap
page read and write
7553000
heap
page read and write
269F000
heap
page read and write
D3C000
stack
page read and write
BAA000
heap
page read and write
40E1000
heap
page read and write
1C1000
unkown
page execute read
1040000
heap
page read and write
4340000
trusted library allocation
page execute and read and write
59FE000
stack
page read and write
A1BC000
stack
page read and write
40E1000
heap
page read and write
2AA6000
unclassified section
page execute and read and write
1350000
trusted library allocation
page execute and read and write
E60000
unkown
page read and write
52B0000
trusted library allocation
page read and write
E80000
unkown
page read and write
AEA000
stack
page read and write
2D04000
heap
page read and write
34A6000
unkown
page read and write
40E1000
heap
page read and write
2FE94000
system
page read and write
3DB1000
trusted library allocation
page read and write
4CC5000
trusted library allocation
page read and write
2900000
unkown
page read and write
40E1000
heap
page read and write
1C0000
unkown
page readonly
28F0000
unkown
page read and write
2719000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
B9C000
stack
page read and write
257E000
stack
page read and write
A80000
unkown
page readonly
56E0000
heap
page read and write
26F7000
heap
page read and write
276C000
heap
page read and write
F20000
unkown
page read and write
2D0B000
heap
page read and write
5325000
trusted library allocation
page read and write
EC1000
unkown
page readonly
40E1000
heap
page read and write
29A0000
unkown
page readonly
272A000
heap
page read and write
40E1000
heap
page read and write
2C52000
unkown
page read and write
2A50000
heap
page read and write
ED0000
unkown
page read and write
40E1000
heap
page read and write
3336000
unkown
page execute and read and write
43E0000
trusted library allocation
page read and write
274E000
heap
page read and write
75AB000
heap
page read and write
2974000
heap
page read and write
1330000
heap
page read and write
3200000
heap
page read and write
1080000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
16DE000
stack
page read and write
2CF0000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
2D04000
heap
page read and write
40E1000
heap
page read and write
4C26000
trusted library allocation
page read and write
2D4E000
stack
page read and write
2D50000
heap
page read and write
2B30000
heap
page read and write
40E1000
heap
page read and write
3CC9000
unkown
page execute and read and write
1C0000
unkown
page readonly
72D0000
heap
page read and write
2688000
heap
page read and write
13C0000
heap
page read and write
40E1000
heap
page read and write
3E12000
unkown
page read and write
7D77000
heap
page read and write
40E1000
heap
page read and write
14D0000
unkown
page readonly
40E1000
heap
page read and write
37CA000
unkown
page read and write
4C24000
trusted library allocation
page read and write
3000000
heap
page read and write
40E1000
heap
page read and write
E71000
unkown
page readonly
40E1000
heap
page read and write
40E1000
heap
page read and write
75A1000
heap
page read and write
40E1000
heap
page read and write
79D2000
trusted library allocation
page read and write
40E1000
heap
page read and write
A33D000
stack
page read and write
2713000
heap
page read and write
2980000
heap
page read and write
40E1000
heap
page read and write
A85D000
stack
page read and write
1A1EF840000
system
page execute and read and write
4BFE000
trusted library allocation
page read and write
1C0000
unkown
page readonly
2BFF000
unkown
page read and write
4D20000
trusted library allocation
page execute and read and write
2384000
heap
page read and write
40E1000
heap
page read and write
865F000
stack
page read and write
A10000
unkown
page readonly
40E1000
heap
page read and write
107E000
heap
page read and write
7650000
trusted library section
page read and write
3A5E000
trusted library allocation
page read and write
A80000
unkown
page readonly
AB5E000
stack
page read and write
4A6C000
unclassified section
page read and write
BF0000
unkown
page readonly
A440000
trusted library allocation
page read and write
1C1000
unkown
page execute read
510E000
stack
page read and write
3973000
trusted library allocation
page read and write
127E000
stack
page read and write
940000
unkown
page readonly
53D1000
system
page execute and read and write
AB9E000
stack
page read and write
1047000
heap
page read and write
40E1000
heap
page read and write
3C85000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
E30000
unkown
page readonly
40E1000
heap
page read and write
1603000
direct allocation
page execute and read and write
4852000
unclassified section
page read and write
4203000
heap
page read and write
4BD0000
trusted library allocation
page read and write
2704000
heap
page read and write
EB0000
unkown
page read and write
A07F000
stack
page read and write
5F7000
stack
page read and write
13C0000
system
page execute and read and write
61E0000
heap
page read and write
4C70000
trusted library allocation
page read and write
2CF8000
heap
page read and write
40E1000
heap
page read and write
4D92000
direct allocation
page execute and read and write
40E1000
heap
page read and write
456D000
direct allocation
page execute and read and write
10B2000
heap
page read and write
2BA0000
unkown
page readonly
7660000
trusted library section
page read and write
1791000
direct allocation
page execute and read and write
BA0000
heap
page read and write
2037000
unclassified section
page execute and read and write
56AE000
stack
page read and write
E50000
unkown
page readonly
40E1000
heap
page read and write
1C0000
unkown
page readonly
42A0000
trusted library allocation
page read and write
40E1000
heap
page read and write
2B60000
unkown
page readonly
325F000
unkown
page read and write
40E1000
heap
page read and write
54F0000
heap
page execute and read and write
10B8000
heap
page read and write
4738000
unkown
page execute and read and write
43C4000
heap
page read and write
7640000
trusted library allocation
page execute and read and write
2D0A000
heap
page read and write
4C40000
trusted library allocation
page read and write
1590000
heap
page read and write
4D10000
heap
page read and write
1D7000
unkown
page readonly
2A50000
heap
page read and write
5428000
system
page execute and read and write
26F2000
heap
page read and write
5310000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
26E3000
heap
page read and write
B0E000
stack
page read and write
A60000
unkown
page readonly
4B79000
direct allocation
page execute and read and write
6CF6000
heap
page read and write
40E1000
heap
page read and write
61CE000
stack
page read and write
1D7000
unkown
page readonly
40E1000
heap
page read and write
32FF000
stack
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
E80000
unkown
page read and write
3B52000
trusted library allocation
page read and write
40E0000
heap
page read and write
4CC2000
trusted library allocation
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
7614000
heap
page read and write
181E000
stack
page read and write
40E1000
heap
page read and write
4440000
direct allocation
page execute and read and write
1D7000
unkown
page readonly
40E1000
heap
page read and write
5178000
unclassified section
page read and write
105F000
heap
page read and write
6204000
heap
page read and write
BDF000
heap
page read and write
C3A000
stack
page read and write
2A30000
heap
page read and write
A70000
unkown
page readonly
2C8000
stack
page read and write
2C90000
unkown
page execute and read and write
1380000
direct allocation
page read and write
5125000
heap
page read and write
40E1000
heap
page read and write
E90000
heap
page read and write
E95000
heap
page read and write
40E1000
heap
page read and write
10AE000
stack
page read and write
43E0000
trusted library allocation
page read and write
6EEE000
stack
page read and write
33BA000
heap
page read and write
40E1000
heap
page read and write
1BA1000
direct allocation
page execute and read and write
762C000
heap
page read and write
43E0000
trusted library allocation
page read and write
612C000
unclassified section
page read and write
53C5000
system
page execute and read and write
26ED000
heap
page read and write
2F1E000
stack
page read and write
11F0000
unkown
page readonly
6DEE000
stack
page read and write
40E1000
heap
page read and write
9BDD000
stack
page read and write
10B0000
unkown
page readonly
52F1000
trusted library allocation
page read and write
4C45000
trusted library allocation
page read and write
D60000
unkown
page readonly
2694000
heap
page read and write
10B0000
unkown
page readonly
4DEE000
stack
page read and write
3DB9000
trusted library allocation
page read and write
4F60000
heap
page read and write
40E1000
heap
page read and write
A30000
unkown
page readonly
40E1000
heap
page read and write
29C0000
heap
page read and write
289C000
stack
page read and write
53A0000
trusted library allocation
page read and write
62BE000
unclassified section
page read and write
F31000
unkown
page readonly
2BA0000
unkown
page readonly
9EDF000
stack
page read and write
40E1000
heap
page read and write
75C4000
heap
page read and write
3120000
heap
page read and write
2E7E000
trusted library allocation
page read and write
2715000
trusted library allocation
page read and write
A30000
unkown
page readonly
5460000
heap
page read and write
9E0000
heap
page read and write
1580000
unkown
page readonly
4BEE000
direct allocation
page execute and read and write
2A90000
heap
page read and write
470D000
direct allocation
page execute and read and write
9A3E000
stack
page read and write
1D5000
unkown
page read and write
2D6C000
unkown
page read and write
E40000
unkown
page readonly
2ACF000
stack
page read and write
74E0000
trusted library allocation
page read and write
1CE000
unkown
page readonly
40E1000
heap
page read and write
ADDC000
stack
page read and write
2F40000
heap
page read and write
1C1000
unkown
page execute read
4CD0000
trusted library allocation
page execute and read and write
1047000
heap
page read and write
54DB000
stack
page read and write
F70000
heap
page read and write
40E1000
heap
page read and write
40E1000
heap
page read and write
A860000
heap
page read and write
12F0000
trusted library allocation
page read and write
9DDE000
stack
page read and write
3210000
heap
page read and write
FDF000
stack
page read and write
40E1000
heap
page read and write
1D5000
unkown
page read and write
C7A000
stack
page read and write
40E1000
heap
page read and write
9A0000
unkown
page readonly
1A19000
direct allocation
page execute and read and write
40E1000
heap
page read and write
7607000
heap
page read and write
40E1000
heap
page read and write
F60000
heap
page read and write
76D0000
trusted library allocation
page execute and read and write
12E3000
trusted library allocation
page execute and read and write
A9C000
stack
page read and write
53A5000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
4E8C000
stack
page read and write
B66000
trusted library allocation
page execute and read and write
2870000
heap
page execute and read and write
1560000
direct allocation
page execute and read and write
AA5E000
stack
page read and write
40E1000
heap
page read and write
AEA000
stack
page read and write
40E1000
heap
page read and write
1540000
unkown
page readonly
40E1000
heap
page read and write
6F20000
trusted library allocation
page read and write
2C4E000
stack
page read and write
3EA6000
unclassified section
page execute and read and write
40E1000
heap
page read and write
7621000
heap
page read and write
2ED0000
heap
page read and write
75E8000
heap
page read and write
5390000
heap
page read and write
B6A000
trusted library allocation
page execute and read and write
40E1000
heap
page read and write
7626000
heap
page read and write
2727000
heap
page read and write
40E1000
heap
page read and write
A20000
unkown
page readonly
There are 970 hidden memdumps, click here to show them.