IOC Report
KR6CT3hIxT.exe

loading gif

Files

File Path
Type
Category
Malicious
KR6CT3hIxT.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\r.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\rdegje.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\winrar-x64-701.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2BA3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BB4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BC5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BC6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BD6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BD7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2BE8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2BF9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2C09.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2CB2.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2CB3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2CC3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2CC4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3890.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp38A1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp38B1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp38D1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp38E2.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3AF.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3BF.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3D0.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3E1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3F1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp411.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp624D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp625D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp626E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp626F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6280.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6290.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp62A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp62B2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9897.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp98A8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp98C8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE50.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE61.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE72.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE82.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpCEB2.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpCEC3.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF502.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KR6CT3hIxT.exe
"C:\Users\user\Desktop\KR6CT3hIxT.exe"
malicious
C:\Users\user\AppData\Local\Temp\4.exe
"C:\Users\user\AppData\Local\Temp\4.exe"
malicious
C:\Users\user\AppData\Local\Temp\3.exe
"C:\Users\user\AppData\Local\Temp\3.exe"
malicious
C:\Users\user\AppData\Local\Temp\rdegje.exe
"C:\Users\user\AppData\Local\Temp\rdegje.exe"
malicious
C:\Users\user\AppData\Local\Temp\r.exe
"C:\Users\user\AppData\Local\Temp\r.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
195.2.75.12
malicious
195.2.75.12:54762
malicious
http://195.2.75.12:54762/
195.2.75.12
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://api.ipify.orgcookies//setti
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://195.2.75.12:54762
unknown
http://ns.adp/1.0/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ns.microsofo/1.2/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
195.2.75.12
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\ndfapi.dll,-40001
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\r_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F12000
unkown
page execute and read and write
malicious
E12000
unkown
page execute and read and write
malicious
3381000
trusted library allocation
page read and write
malicious
BC4000
unkown
page read and write
10A5000
unkown
page execute and read and write
338A000
heap
page read and write
4F62000
heap
page read and write
25838B93000
heap
page read and write
33E2000
heap
page read and write
E10000
unkown
page readonly
D5E000
stack
page read and write
5690000
heap
page read and write
32F2000
stack
page read and write
DF0000
trusted library allocation
page read and write
3AE4000
trusted library allocation
page read and write
5699000
heap
page read and write
72AD000
trusted library allocation
page read and write
EB0000
heap
page read and write
4593000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
25838B93000
heap
page read and write
6BAE000
heap
page read and write
25838CD5000
heap
page read and write
33CB000
heap
page read and write
25834180000
heap
page read and write
7170000
trusted library allocation
page read and write
3450000
heap
page read and write
37FB000
heap
page read and write
338A000
heap
page read and write
45C4000
trusted library allocation
page read and write
32EB000
stack
page read and write
4EA2000
trusted library allocation
page read and write
628B000
trusted library allocation
page read and write
16ED000
trusted library allocation
page execute and read and write
258343A0000
heap
page read and write
2583435C000
heap
page read and write
913000
heap
page read and write
25838D15000
heap
page read and write
6F9C000
heap
page read and write
25838C93000
heap
page read and write
33EB000
heap
page read and write
8289000
heap
page read and write
2583430E000
heap
page read and write
6EB0000
heap
page read and write
D60000
trusted library allocation
page read and write
7FF7E1E0B000
unkown
page write copy
5753000
heap
page read and write
6FAB000
heap
page read and write
BC6000
unkown
page readonly
966000
heap
page read and write
71EC000
stack
page read and write
337D000
heap
page read and write
8C6000
heap
page read and write
F10000
unkown
page read and write
4DDC000
heap
page read and write
258342EA000
heap
page read and write
799E000
stack
page read and write
62DD000
stack
page read and write
4B8C000
trusted library allocation
page read and write
81E000
stack
page read and write
32DA000
stack
page read and write
46D2000
trusted library allocation
page read and write
B94000
unkown
page readonly
4E6D000
trusted library allocation
page read and write
3E14000
trusted library allocation
page read and write
4E00000
heap
page read and write
5691000
heap
page read and write
7904000
heap
page read and write
F04000
unkown
page readonly
258342D6000
heap
page read and write
8190000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
890000
heap
page read and write
7E0000
heap
page readonly
4B7F000
trusted library allocation
page read and write
72A8000
trusted library allocation
page read and write
3AD3000
trusted library allocation
page read and write
2583437F000
heap
page read and write
7164000
trusted library allocation
page read and write
1B0000
heap
page read and write
6B02000
heap
page read and write
25834344000
heap
page read and write
E43000
unkown
page execute and read and write
258379CD000
heap
page read and write
8490000
trusted library allocation
page execute and read and write
81C6000
heap
page read and write
16D0000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
1B50000
trusted library allocation
page execute and read and write
2583432C000
heap
page read and write
679D000
stack
page read and write
4F00000
heap
page read and write
5550000
heap
page read and write
8E7000
heap
page read and write
3D02000
trusted library allocation
page read and write
964000
heap
page read and write
4E51000
trusted library allocation
page read and write
3465000
heap
page read and write
16C0000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
E07000
heap
page read and write
78FF000
stack
page read and write
258342DC000
heap
page read and write
6FA000
stack
page read and write
7172000
trusted library allocation
page read and write
258381CB000
heap
page read and write
25834344000
heap
page read and write
25838D15000
heap
page read and write
25838AD1000
heap
page read and write
4A75000
trusted library allocation
page read and write
729E000
trusted library allocation
page read and write
4E6A000
trusted library allocation
page read and write
1FE000
stack
page read and write
ED1000
unkown
page execute read
5F7B000
trusted library allocation
page read and write
338A000
heap
page read and write
4B84000
trusted library allocation
page read and write
A8F000
stack
page read and write
3BA1000
trusted library allocation
page read and write
25838AD1000
heap
page read and write
25838B93000
heap
page read and write
25838B11000
heap
page read and write
72B2000
trusted library allocation
page read and write
DE6000
stack
page read and write
5BCE000
stack
page read and write
442A000
trusted library allocation
page read and write
6EB000
stack
page read and write
60D0000
trusted library allocation
page read and write
5520000
heap
page read and write
F10000
unkown
page readonly
33CA000
heap
page read and write
5C9E000
trusted library allocation
page read and write
341C000
heap
page read and write
32DD000
stack
page read and write
7FF7E1E1A000
unkown
page readonly
6CAF000
stack
page read and write
2583435C000
heap
page read and write
4E7A000
trusted library allocation
page read and write
964000
heap
page read and write
FF6000
unkown
page execute and read and write
25834260000
heap
page readonly
25834346000
heap
page read and write
10B000
stack
page read and write
170000
heap
page read and write
6EAE000
stack
page read and write
7020000
trusted library allocation
page execute and read and write
81DA000
heap
page read and write
2583434E000
heap
page read and write
DFC000
stack
page read and write
25838C12000
heap
page read and write
655E000
stack
page read and write
8F4000
heap
page read and write
25834381000
heap
page read and write
3F0000
heap
page read and write
6E1000
stack
page read and write
1B70000
trusted library allocation
page read and write
32FA000
stack
page read and write
6E2E000
stack
page read and write
25834332000
heap
page read and write
880000
unclassified section
page read and write
25838CD4000
heap
page read and write
1119000
unkown
page execute and read and write
8271000
heap
page read and write
33D4000
heap
page read and write
757E000
stack
page read and write
5F9E000
stack
page read and write
94306FD000
stack
page read and write
119A000
unkown
page execute and read and write
6B1C000
heap
page read and write
966000
heap
page read and write
5C0E000
stack
page read and write
306E000
stack
page read and write
25838B93000
heap
page read and write
6FBA000
heap
page read and write
3F4C000
trusted library allocation
page read and write
2EBB000
heap
page read and write
4D04000
trusted library allocation
page read and write
5F92000
trusted library allocation
page read and write
F36000
unkown
page readonly
118E000
unkown
page execute and read and write
341C000
heap
page read and write
ED1000
unkown
page execute read
3321000
trusted library allocation
page read and write
1196000
unkown
page execute and read and write
1749000
heap
page read and write
258379C0000
trusted library allocation
page read and write
25834383000
heap
page read and write
6DB000
stack
page read and write
7820000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
B61000
unkown
page execute read
D50000
trusted library allocation
page read and write
F35000
unkown
page write copy
3E70000
trusted library allocation
page read and write
5F6F000
stack
page read and write
99B000
stack
page read and write
728F000
trusted library allocation
page read and write
728C000
trusted library allocation
page read and write
E00000
heap
page read and write
341B000
heap
page read and write
6580000
trusted library allocation
page read and write
1A0000
direct allocation
page read and write
6B00000
heap
page read and write
3393000
heap
page read and write
258379C8000
heap
page read and write
5530000
heap
page read and write
7260000
trusted library allocation
page execute and read and write
1753000
heap
page read and write
964000
heap
page read and write
25834350000
heap
page read and write
25838AD2000
heap
page read and write
8B6000
heap
page read and write
4A69000
trusted library allocation
page read and write
61DC000
stack
page read and write
3421000
heap
page read and write
4F31000
heap
page read and write
6EB4000
heap
page read and write
E07000
heap
page read and write
F1A000
unkown
page readonly
4A90000
heap
page read and write
5822000
heap
page read and write
1B80000
heap
page read and write
4BD8000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
5FA000
heap
page read and write
8210000
heap
page read and write
25834331000
heap
page read and write
320C000
stack
page read and write
25838ADF000
heap
page read and write
3387000
heap
page read and write
5D6E000
stack
page read and write
33F3000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
3460000
heap
page read and write
25834344000
heap
page read and write
4A70000
trusted library allocation
page read and write
E0E000
heap
page read and write
964000
heap
page read and write
7FF7E1DB1000
unkown
page execute read
6D2E000
stack
page read and write
5CD0000
heap
page read and write
25838C11000
heap
page read and write
3F24000
trusted library allocation
page read and write
11A0000
unkown
page execute and read and write
3330000
heap
page read and write
25838D15000
heap
page read and write
4BF0000
heap
page read and write
DDE000
stack
page read and write
6F6E000
heap
page read and write
3920000
trusted library allocation
page read and write
71ED000
stack
page read and write
258342B8000
heap
page read and write
E50000
heap
page read and write
6B27000
heap
page read and write
82A9000
heap
page read and write
E2A000
unkown
page readonly
8A7000
heap
page read and write
14FC000
unkown
page execute read
11C8000
unkown
page execute and read and write
16E0000
trusted library allocation
page read and write
9430DFB000
stack
page read and write
5DDE000
stack
page read and write
8BE000
heap
page read and write
258342D6000
heap
page read and write
D77000
trusted library allocation
page execute and read and write
EB4000
unkown
page execute and read and write
25838B93000
heap
page read and write
6E6E000
stack
page read and write
1B60000
trusted library allocation
page read and write
76BE000
stack
page read and write
609C000
stack
page read and write
781E000
stack
page read and write
6B2D000
heap
page read and write
5410000
heap
page read and write
11BA000
unkown
page execute and read and write
7294000
trusted library allocation
page read and write
25838B53000
heap
page read and write
7FF7E1E1E000
unkown
page readonly
4E4E000
trusted library allocation
page read and write
3CA6000
trusted library allocation
page read and write
16F6000
trusted library allocation
page execute and read and write
6020000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
25834380000
heap
page read and write
7286000
trusted library allocation
page read and write
8F4000
heap
page read and write
6F35000
heap
page read and write
964000
heap
page read and write
BA7000
unkown
page read and write
E10000
heap
page read and write
562D000
stack
page read and write
11BF000
unkown
page execute and read and write
258344D0000
heap
page read and write
848E000
stack
page read and write
2583436C000
heap
page read and write
25834380000
heap
page read and write
8CE000
heap
page read and write
25834331000
heap
page read and write
25834381000
heap
page read and write
7630000
trusted library allocation
page read and write
341C000
heap
page read and write
17DA000
heap
page read and write
32D7000
stack
page read and write
8B8E000
stack
page read and write
8A0000
heap
page read and write
8216000
heap
page read and write
569B000
heap
page read and write
D7B000
trusted library allocation
page execute and read and write
4F62000
heap
page read and write
33DD000
heap
page read and write
25838BD1000
heap
page read and write
31C6000
trusted library allocation
page read and write
3370000
heap
page execute and read and write
25838BD2000
heap
page read and write
9AE000
stack
page read and write
8C9000
heap
page read and write
79A0000
trusted library allocation
page execute and read and write
3B97000
trusted library allocation
page read and write
714F000
trusted library allocation
page read and write
258342A0000
heap
page read and write
341B000
heap
page read and write
3230000
trusted library allocation
page read and write
3421000
heap
page read and write
258342DE000
heap
page read and write
3940000
heap
page read and write
25838D1A000
heap
page read and write
4AB0000
heap
page read and write
7D5000
heap
page read and write
81B0000
trusted library allocation
page execute and read and write
4F32000
heap
page read and write
75C000
stack
page read and write
25834333000
heap
page read and write
60BD000
trusted library allocation
page read and write
25834344000
heap
page read and write
EA2000
unkown
page execute and read and write
7284000
trusted library allocation
page read and write
25838AD5000
heap
page read and write
6F91000
heap
page read and write
4CEE000
trusted library allocation
page read and write
37F0000
heap
page read and write
5790000
heap
page read and write
8CB000
heap
page read and write
8256000
heap
page read and write
3B93000
trusted library allocation
page read and write
549000
heap
page read and write
25838B12000
heap
page read and write
33AC000
heap
page read and write
7D0000
heap
page read and write
3C52000
trusted library allocation
page read and write
D44000
trusted library allocation
page read and write
386000
stack
page read and write
E10000
unkown
page readonly
1710000
heap
page read and write
6FAE000
stack
page read and write
890000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
25838C94000
heap
page read and write
F34000
unkown
page read and write
D10000
heap
page read and write
33F0000
heap
page read and write
1167000
unkown
page execute and read and write
56F1000
heap
page read and write
6FC2000
trusted library allocation
page read and write
337C000
heap
page read and write
63AC000
heap
page read and write
1755000
heap
page read and write
1198000
unkown
page execute and read and write
1165000
unkown
page execute and read and write
4DEC000
heap
page read and write
76C0000
heap
page read and write
32E7000
stack
page read and write
25838AD5000
heap
page read and write
BA73000
trusted library allocation
page read and write
54FE000
stack
page read and write
83E0000
trusted library allocation
page read and write
1B4E000
stack
page read and write
63A2000
heap
page read and write
25834384000
heap
page read and write
7180000
trusted library allocation
page read and write
2EB0000
heap
page read and write
71E000
stack
page read and write
4BE0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
8B3000
heap
page read and write
5A8C000
stack
page read and write
363E000
stack
page read and write
4A62000
trusted library allocation
page read and write
4E57000
trusted library allocation
page read and write
5FA1000
trusted library allocation
page read and write
25834387000
heap
page read and write
6CF3000
heap
page read and write
4ED1000
heap
page read and write
4E96000
trusted library allocation
page read and write
8040000
trusted library allocation
page read and write
8209000
heap
page read and write
E60000
heap
page readonly
4E94000
heap
page read and write
616D000
stack
page read and write
25838ADC000
heap
page read and write
180000
heap
page read and write
1080000
unkown
page execute and read and write
3FF4000
trusted library allocation
page read and write
58DF000
stack
page read and write
DBE000
stack
page read and write
8E6000
heap
page read and write
1186000
unkown
page execute and read and write
32ED000
stack
page read and write
701E000
stack
page read and write
DE0000
trusted library allocation
page execute and read and write
77DD000
stack
page read and write
11CA000
unkown
page execute and read and write
612D000
stack
page read and write
964000
heap
page read and write
3930000
trusted library allocation
page read and write
5F9E000
trusted library allocation
page read and write
9430375000
stack
page read and write
6AF0000
heap
page read and write
5E6E000
stack
page read and write
6F8A000
heap
page read and write
8277000
heap
page read and write
6CF1000
heap
page read and write
338A000
heap
page read and write
16D4000
trusted library allocation
page read and write
3F52000
trusted library allocation
page read and write
1670000
direct allocation
page read and write
4653000
trusted library allocation
page read and write
3B95000
trusted library allocation
page read and write
2583430E000
heap
page read and write
7FF7E1DB1000
unkown
page execute read
79E0000
trusted library allocation
page execute and read and write
25836164000
heap
page read and write
25834358000
heap
page read and write
4BE0000
heap
page read and write
25838D15000
heap
page read and write
177E000
heap
page read and write
6EF2000
heap
page read and write
2583434D000
heap
page read and write
AC4000
heap
page read and write
1705000
trusted library allocation
page execute and read and write
43F5000
trusted library allocation
page read and write
B60000
unkown
page readonly
70EC000
stack
page read and write
341C000
heap
page read and write
490E000
stack
page read and write
3C7A000
trusted library allocation
page read and write
8D6000
heap
page read and write
1124000
unkown
page execute and read and write
594000
heap
page read and write
8081000
heap
page read and write
7282000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
4C07000
trusted library allocation
page read and write
FFA000
unkown
page execute and read and write
3360000
trusted library allocation
page read and write
56F1000
heap
page read and write
72B5000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
8D6000
heap
page read and write
D00000
heap
page read and write
8C9000
heap
page read and write
81F1000
heap
page read and write
D90000
trusted library allocation
page read and write
94309FE000
stack
page read and write
56D0000
heap
page execute and read and write
25834333000
heap
page read and write
7298000
trusted library allocation
page read and write
2583432D000
heap
page read and write
E96000
unkown
page execute and read and write
8D6000
heap
page read and write
4E31000
heap
page read and write
115F000
unkown
page execute and read and write
EB0000
unkown
page execute and read and write
BC5000
unkown
page readonly
33CF000
heap
page read and write
4C43000
trusted library allocation
page read and write
7148000
trusted library allocation
page read and write
1182000
unkown
page execute and read and write
335D000
stack
page read and write
D75000
heap
page read and write
2583432C000
heap
page read and write
4A86000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
B61000
unkown
page execute read
5E5D000
stack
page read and write
4E8F000
trusted library allocation
page read and write
338F000
heap
page read and write
25834380000
heap
page read and write
25834380000
heap
page read and write
5414000
heap
page read and write
4D48000
trusted library allocation
page read and write
25838ADB000
heap
page read and write
316F000
stack
page read and write
72A1000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
2F8E000
stack
page read and write
386E000
stack
page read and write
25838AE2000
heap
page read and write
33AB000
heap
page read and write
258382CA000
heap
page read and write
F12000
unkown
page execute read
7FF7E1E1F000
unkown
page readonly
D40000
trusted library allocation
page read and write
E46000
unkown
page execute and read and write
6170000
trusted library allocation
page execute and read and write
25838D15000
heap
page read and write
7130000
trusted library allocation
page read and write
822B000
heap
page read and write
76BE000
stack
page read and write
31B0000
heap
page read and write
556000
heap
page read and write
25834374000
heap
page read and write
25838AD3000
heap
page read and write
4E31000
heap
page read and write
60E0000
trusted library allocation
page execute and read and write
1190000
unkown
page execute and read and write
898000
heap
page read and write
25838AD5000
heap
page read and write
6040000
trusted library allocation
page execute and read and write
81D3000
heap
page read and write
25838B95000
heap
page read and write
9430BFE000
stack
page read and write
FF8000
unkown
page execute and read and write
25838AE1000
heap
page read and write
5523000
heap
page read and write
2583435D000
heap
page read and write
44C8000
trusted library allocation
page read and write
EAE000
unkown
page execute and read and write
7175000
trusted library allocation
page read and write
32D2000
stack
page read and write
1702000
trusted library allocation
page read and write
258342B8000
heap
page read and write
1680000
heap
page read and write
3EF5000
trusted library allocation
page read and write
4EA5000
trusted library allocation
page read and write
81C0000
heap
page read and write
3AE0000
trusted library allocation
page read and write
46AF000
trusted library allocation
page read and write
4DD1000
heap
page read and write
2583432F000
heap
page read and write
715A000
trusted library allocation
page read and write
F04000
unkown
page readonly
3350000
heap
page read and write
5FE0000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
8266000
heap
page read and write
79E000
stack
page read and write
25834333000
heap
page read and write
510000
heap
page read and write
4381000
trusted library allocation
page read and write
6E6000
stack
page read and write
3BB6000
trusted library allocation
page read and write
3C75000
trusted library allocation
page read and write
7135000
trusted library allocation
page read and write
4A7C000
trusted library allocation
page read and write
4F62000
heap
page read and write
5F81000
trusted library allocation
page read and write
7FF7E1E14000
unkown
page read and write
4BEA000
trusted library allocation
page read and write
3393000
heap
page read and write
5822000
heap
page read and write
619D000
stack
page read and write
B0E000
stack
page read and write
D70000
heap
page read and write
3F1E000
trusted library allocation
page read and write
ED0000
unkown
page readonly
D43000
trusted library allocation
page execute and read and write
6DAE000
stack
page read and write
5590000
heap
page read and write
57C1000
heap
page read and write
57D9000
stack
page read and write
F10000
unkown
page readonly
7FF7E1E1A000
unkown
page readonly
D53000
trusted library allocation
page read and write
4A51000
trusted library allocation
page read and write
56B9000
heap
page read and write
25838ADF000
heap
page read and write
25838AD0000
heap
page read and write
5FD0000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
25834389000
heap
page read and write
7F2E0000
trusted library allocation
page execute and read and write
258342F4000
heap
page read and write
E9C000
unkown
page execute and read and write
5ADE000
stack
page read and write
3341000
heap
page read and write
6010000
trusted library allocation
page execute and read and write
81C9000
heap
page read and write
8F4000
heap
page read and write
333A000
trusted library allocation
page read and write
25834374000
heap
page read and write
BC5000
unkown
page write copy
7850000
heap
page read and write
566E000
stack
page read and write
25834346000
heap
page read and write
91C000
heap
page read and write
258382C3000
heap
page read and write
7DE000
stack
page read and write
170B000
trusted library allocation
page execute and read and write
1700000
trusted library allocation
page read and write
964000
heap
page read and write
844E000
stack
page read and write
3374000
heap
page read and write
4B91000
trusted library allocation
page read and write
9430AFE000
stack
page read and write
5C51000
trusted library allocation
page read and write
51A000
heap
page read and write
81E7000
heap
page read and write
4624000
trusted library allocation
page read and write
2583437F000
heap
page read and write
7160000
trusted library allocation
page read and write
4E63000
heap
page read and write
500000
unclassified section
page read and write
452F000
trusted library allocation
page read and write
11AC000
unkown
page execute and read and write
33F1000
heap
page read and write
8D0000
heap
page read and write
627E000
stack
page read and write
79B0000
trusted library allocation
page execute and read and write
60BA000
trusted library allocation
page read and write
2583435D000
heap
page read and write
1169000
unkown
page execute and read and write
2583626D000
heap
page read and write
25834383000
heap
page read and write
258342F4000
heap
page read and write
7139000
trusted library allocation
page read and write
4E5E000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
E12000
unkown
page execute read
5CA0000
heap
page read and write
5C4E000
stack
page read and write
11AA000
unkown
page execute and read and write
D6A000
trusted library allocation
page execute and read and write
43BF000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
8D0000
heap
page read and write
337C000
heap
page read and write
F10000
unkown
page write copy
4460000
trusted library allocation
page read and write
E00000
heap
page read and write
86E000
stack
page read and write
E9E000
unkown
page execute and read and write
B94000
unkown
page readonly
EAE000
stack
page read and write
2CDE000
stack
page read and write
6B05000
heap
page read and write
4387000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
8085000
heap
page read and write
3378000
heap
page read and write
7A3C000
stack
page read and write
5BE000
heap
page read and write
25836160000
heap
page read and write
8D1000
heap
page read and write
16DD000
trusted library allocation
page execute and read and write
651D000
stack
page read and write
870000
heap
page read and write
802F000
stack
page read and write
4E89000
trusted library allocation
page read and write
4F01000
heap
page read and write
3224000
trusted library allocation
page read and write
341C000
heap
page read and write
32CD000
stack
page read and write
53CE000
stack
page read and write
51E000
heap
page read and write
966000
heap
page read and write
60A0000
trusted library allocation
page read and write
2583430E000
heap
page read and write
6F94000
heap
page read and write
5754000
heap
page read and write
57F2000
heap
page read and write
25838B52000
heap
page read and write
5822000
heap
page read and write
8C9000
heap
page read and write
4E73000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
584000
heap
page read and write
5580000
heap
page read and write
2583432F000
heap
page read and write
6030000
trusted library allocation
page read and write
3358000
heap
page read and write
5E9E000
stack
page read and write
74F6000
heap
page read and write
6280000
trusted library allocation
page read and write
1200000
unkown
page execute and read and write
1AF0000
trusted library allocation
page read and write
19DF000
stack
page read and write
8050000
trusted library allocation
page execute and read and write
860000
heap
page read and write
715F000
trusted library allocation
page read and write
107A000
unkown
page execute and read and write
4E62000
heap
page read and write
8CA000
heap
page read and write
60C0000
trusted library allocation
page read and write
1ADE000
stack
page read and write
2583432C000
heap
page read and write
25834388000
heap
page read and write
72D0000
trusted library allocation
page read and write
118C000
unkown
page execute and read and write
4A5E000
trusted library allocation
page read and write
E30000
unkown
page execute and read and write
714A000
trusted library allocation
page read and write
793B000
stack
page read and write
6F6F000
stack
page read and write
4F62000
heap
page read and write
3D5D000
trusted library allocation
page read and write
3878000
trusted library allocation
page read and write
4E32000
heap
page read and write
32C0000
stack
page read and write
25834313000
heap
page read and write
722F000
stack
page read and write
7FF7E1DF8000
unkown
page readonly
4E31000
heap
page read and write
258342EA000
heap
page read and write
32E5000
stack
page read and write
258342F4000
heap
page read and write
25834270000
heap
page read and write
1184000
unkown
page execute and read and write
ED0000
unkown
page readonly
25834470000
heap
page read and write
8C9000
heap
page read and write
33F1000
heap
page read and write
7822000
trusted library allocation
page read and write
25838B93000
heap
page read and write
4561000
trusted library allocation
page read and write
11AE000
unkown
page execute and read and write
4ED0000
heap
page read and write
57C0000
heap
page read and write
5BD0000
heap
page read and write
4E7F000
trusted library allocation
page read and write
8F5000
heap
page read and write
25838AF4000
heap
page read and write
6F33000
heap
page read and write
8C9000
heap
page read and write
821A000
heap
page read and write
6F4B000
heap
page read and write
5B8D000
stack
page read and write
D4D000
trusted library allocation
page execute and read and write
4BDE000
trusted library allocation
page read and write
82E000
stack
page read and write
3A4F000
stack
page read and write
56C0000
heap
page read and write
F17000
unkown
page read and write
72A6000
trusted library allocation
page read and write
8C7000
heap
page read and write
1078000
unkown
page execute and read and write
258342D3000
heap
page read and write
4DDF000
heap
page read and write
4E9B000
trusted library allocation
page read and write
25834411000
trusted library allocation
page read and write
762C000
stack
page read and write
1344000
unkown
page execute read
45F4000
trusted library allocation
page read and write
4E86000
trusted library allocation
page read and write
1B87000
heap
page read and write
1194000
unkown
page execute and read and write
258344D5000
heap
page read and write
6FA0000
heap
page read and write
53C000
heap
page read and write
31AC000
stack
page read and write
7246000
trusted library allocation
page read and write
77BF000
stack
page read and write
5120000
heap
page read and write
2583432A000
heap
page read and write
938000
heap
page read and write
258360C0000
heap
page read and write
829B000
heap
page read and write
1029000
unkown
page execute and read and write
4A97000
trusted library allocation
page read and write
57F1000
heap
page read and write
11B0000
unkown
page execute and read and write
5C60000
heap
page execute and read and write
7FF7E1E1E000
unkown
page write copy
25838C53000
heap
page read and write
3ACA000
trusted library allocation
page read and write
25838ADF000
heap
page read and write
6F5D000
heap
page read and write
44FC000
trusted library allocation
page read and write
33F1000
heap
page read and write
5791000
heap
page read and write
8D0000
heap
page read and write
823E000
heap
page read and write
5722000
heap
page read and write
25838C52000
heap
page read and write
70AF000
stack
page read and write
F35000
unkown
page readonly
7FF7E1DF8000
unkown
page readonly
2EB8000
heap
page read and write
11B2000
unkown
page execute and read and write
72C0000
trusted library allocation
page read and write
4E63000
trusted library allocation
page read and write
258342EA000
heap
page read and write
16F2000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
37F7000
heap
page read and write
D66000
trusted library allocation
page execute and read and write
EA0000
unkown
page execute and read and write
31C0000
trusted library allocation
page read and write
B60000
unkown
page readonly
25834307000
heap
page read and write
112D000
unkown
page execute and read and write
341C000
heap
page read and write
67F0000
trusted library allocation
page execute and read and write
7FF7E1DB0000
unkown
page readonly
76D0000
heap
page read and write
4B77000
trusted library allocation
page read and write
92A000
heap
page read and write
117C000
unkown
page execute and read and write
25834382000
heap
page read and write
4494000
trusted library allocation
page read and write
258344DE000
heap
page read and write
CF8000
stack
page read and write
767E000
stack
page read and write
56F2000
heap
page read and write
4E93000
heap
page read and write
8C8E000
stack
page read and write
258342EA000
heap
page read and write
E79000
unkown
page execute and read and write
9430CFE000
stack
page read and write
25834364000
heap
page read and write
25834344000
heap
page read and write
59DD000
stack
page read and write
FFD000
unkown
page execute and read and write
1B5000
heap
page read and write
E9A000
unkown
page execute and read and write
943036E000
stack
page read and write
3393000
heap
page read and write
16D3000
trusted library allocation
page execute and read and write
5CB0000
heap
page read and write
E36000
unkown
page execute and read and write
25834345000
heap
page read and write
4BD2000
trusted library allocation
page read and write
6CF000
stack
page read and write
1B00000
heap
page execute and read and write
5723000
heap
page read and write
554000
heap
page read and write
31C9000
trusted library allocation
page read and write
25838D17000
heap
page read and write
964000
heap
page read and write
337E000
heap
page read and write
25834385000
heap
page read and write
173C000
heap
page read and write
81D6000
heap
page read and write
4D01000
trusted library allocation
page read and write
35D6000
trusted library allocation
page read and write
25834354000
heap
page read and write
25834381000
heap
page read and write
5FC0000
trusted library allocation
page read and write
258381C0000
heap
page read and write
258382CB000
heap
page read and write
25838AE5000
heap
page read and write
4CF5000
trusted library allocation
page read and write
540C000
stack
page read and write
7FD70000
trusted library allocation
page execute and read and write
8070000
heap
page read and write
5822000
heap
page read and write
25838AEA000
heap
page read and write
3AA1000
trusted library allocation
page read and write
1707000
trusted library allocation
page execute and read and write
3914000
trusted library allocation
page read and write
391A000
trusted library allocation
page read and write
917000
heap
page read and write
4BE5000
trusted library allocation
page read and write
4DD0000
heap
page read and write
83D0000
heap
page read and write
712F000
stack
page read and write
D62000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
77FE000
stack
page read and write
25836260000
trusted library allocation
page read and write
6EC8000
heap
page read and write
94307FD000
stack
page read and write
5F70000
trusted library allocation
page read and write
3DB8000
trusted library allocation
page read and write
8BD000
heap
page read and write
F20000
unkown
page execute and read and write
7FF7E1E0B000
unkown
page read and write
25838ADD000
heap
page read and write
85B000
stack
page read and write
8030000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
4681000
trusted library allocation
page read and write
2583442A000
trusted library allocation
page read and write
338E000
heap
page read and write
BA0000
unkown
page write copy
25834383000
heap
page read and write
25834345000
heap
page read and write
AC0000
heap
page read and write
3EF0000
trusted library allocation
page read and write
171E000
heap
page read and write
81FC000
heap
page read and write
7132000
trusted library allocation
page read and write
7155000
trusted library allocation
page read and write
373F000
stack
page read and write
25838B93000
heap
page read and write
7FF7E1DB0000
unkown
page readonly
56F1000
heap
page read and write
E98000
unkown
page execute and read and write
4CFA000
trusted library allocation
page read and write
BA0000
unkown
page read and write
4F8000
stack
page read and write
There are 893 hidden memdumps, click here to show them.