IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C65.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Nov 21 18:56:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9DDD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E0D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=2056,i,18354460473252266083,11797604949665790059,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1028

URLs

Name
IP
Malicious
https://docs.google.com/document/M
unknown
http://anglebug.com/6048V
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/5371_
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/6439X
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/4836U
unknown
http://anglebug.com/8162x
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/4836S
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/3832e
unknown
http://anglebug.com/3965f
unknown
http://anglebug.com/5055d
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
http://anglebug.com/8229W
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html0
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/5881P
unknown
http://anglebug.com/6860~
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/5881R
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://anglebug.com/7308t
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://anglebug.com/7369w
unknown
https://docs.google.com/presentation/:
unknown
https://anglebug.com/7369v
unknown
https://anglebug.com/7847Y
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/5430g
unknown
http://anglebug.com/3970
unknown
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7BEC005B8000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC00E40000
trusted library allocation
page read and write
7BEC00B50000
trusted library allocation
page read and write
7BEC006F9000
trusted library allocation
page read and write
68F1000
heap
page read and write
7419000
heap
page read and write
737C000
heap
page read and write
7BEC009E8000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00020000
trusted library allocation
page read and write
7BEC01134000
trusted library allocation
page read and write
167800230000
trusted library allocation
page read and write
72AB000
heap
page read and write
7BEC000C8000
trusted library allocation
page read and write
7BEC00BA4000
trusted library allocation
page read and write
7BEC00D18000
trusted library allocation
page read and write
7BEC003F0000
trusted library allocation
page read and write
72AF000
heap
page read and write
7BEC00F38000
trusted library allocation
page read and write
1DBC00424000
trusted library allocation
page read and write
657F3FE000
stack
page read and write
7BEC001D0000
trusted library allocation
page read and write
7BEC00170000
trusted library allocation
page read and write
1DBC00840000
trusted library allocation
page read and write
73CC000
heap
page read and write
711400234000
direct allocation
page read and write
184529B8000
heap
page read and write
7BEC002C0000
trusted library allocation
page read and write
7BEC009D4000
trusted library allocation
page read and write
711400280000
direct allocation
page read and write
7BEC001D0000
trusted library allocation
page read and write
7BEC00180000
trusted library allocation
page read and write
657ABFE000
unkown
page readonly
7BEC00D58000
trusted library allocation
page read and write
1DBC00848000
trusted library allocation
page read and write
7BEC00DBC000
trusted library allocation
page read and write
72A1000
heap
page read and write
184591A0000
trusted library section
page read and write
7BEC012E0000
trusted library allocation
page read and write
68F1000
heap
page read and write
656DBFE000
unkown
page readonly
7BEC00128000
trusted library allocation
page read and write
1267000
heap
page read and write
1DBC008C4000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00364000
trusted library allocation
page read and write
6C268000
unkown
page readonly
7BEC00214000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
68F1000
heap
page read and write
6FE0000
direct allocation
page execute and read and write
68F1000
heap
page read and write
7BEC002BC000
trusted library allocation
page read and write
72A2000
heap
page read and write
7BEC00984000
trusted library allocation
page read and write
133F000
stack
page read and write
6C269000
unkown
page read and write
72AA000
heap
page read and write
7433000
heap
page read and write
1844EFAE000
heap
page read and write
65067FE000
stack
page read and write
7BEC0061C000
trusted library allocation
page read and write
7BEC00EA8000
trusted library allocation
page read and write
7BEC0048C000
trusted library allocation
page read and write
68F1000
heap
page read and write
74DF000
heap
page read and write
1DBC00844000
trusted library allocation
page read and write
7BEC00C38000
trusted library allocation
page read and write
1DBC007E4000
trusted library allocation
page read and write
1DBC006E8000
trusted library allocation
page read and write
7BEC00580000
trusted library allocation
page read and write
72A7000
heap
page read and write
18458D00000
trusted library section
page read and write
7BEC0021C000
trusted library allocation
page read and write
1DBC00918000
trusted library allocation
page read and write
7BEC00B30000
trusted library allocation
page read and write
18452403000
heap
page read and write
7BEC006CC000
trusted library allocation
page read and write
655F3FE000
stack
page read and write
7BEC0034C000
trusted library allocation
page read and write
840000
heap
page read and write
7BEC00190000
trusted library allocation
page read and write
1845850E000
trusted library section
page read and write
7BEC00244000
trusted library allocation
page read and write
18458E6D000
trusted library section
page read and write
7BEC00210000
trusted library allocation
page read and write
7BEC00498000
trusted library allocation
page read and write
65693FE000
stack
page read and write
18452411000
heap
page read and write
7BEC01070000
trusted library allocation
page read and write
7BEC01058000
trusted library allocation
page read and write
711400303000
direct allocation
page read and write
7BEC00651000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00318000
trusted library allocation
page read and write
7BEC00EA4000
trusted library allocation
page read and write
1DBC00238000
trusted library allocation
page read and write
68F1000
heap
page read and write
75A5000
heap
page read and write
7BEC003A8000
trusted library allocation
page read and write
1361000
unkown
page execute and write copy
7BEC00318000
trusted library allocation
page read and write
1DBC006BC000
trusted library allocation
page read and write
1DBC008C8000
trusted library allocation
page read and write
1DBC006C8000
trusted library allocation
page read and write
78A000
unkown
page readonly
6578BFE000
unkown
page readonly
7BEC00814000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC002F8000
trusted library allocation
page read and write
184588D0000
trusted library section
page read and write
1844ED90000
heap
page read and write
7BEC00480000
trusted library allocation
page read and write
184529DD000
heap
page read and write
7BEC00C40000
trusted library allocation
page read and write
7BEC002AC000
trusted library allocation
page read and write
6C21D000
unkown
page read and write
7BEC008C0000
trusted library allocation
page read and write
7339000
heap
page read and write
781000
unkown
page execute read
167800220000
trusted library allocation
page read and write
7BEC010C4000
trusted library allocation
page read and write
68F1000
heap
page read and write
68F1000
heap
page read and write
72AD000
heap
page read and write
18452995000
heap
page read and write
1E0000
heap
page read and write
65087FE000
stack
page read and write
18458E46000
trusted library section
page read and write
7BEC00DC0000
trusted library allocation
page read and write
791000
unkown
page readonly
7BEC00158000
trusted library allocation
page read and write
711400284000
direct allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC00344000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC005A4000
trusted library allocation
page read and write
7BEC000EC000
trusted library allocation
page read and write
7BEC00967000
trusted library allocation
page read and write
6560BFE000
unkown
page readonly
7BEC00A98000
trusted library allocation
page read and write
167800248000
trusted library allocation
page read and write
7479000
direct allocation
page read and write
7BEC00D70000
trusted library allocation
page read and write
73C6000
heap
page read and write
7BEC002B0000
trusted library allocation
page read and write
7BEC002D8000
trusted library allocation
page read and write
1844EF7D000
heap
page read and write
7BEC01150000
trusted library allocation
page read and write
72A3000
heap
page read and write
7366000
heap
page read and write
72AD000
heap
page read and write
74E000
stack
page read and write
780000
unkown
page readonly
18458543000
trusted library section
page read and write
780000
unkown
page readonly
1DBC002ED000
trusted library allocation
page read and write
6573BFE000
unkown
page readonly
65703FE000
stack
page read and write
7114002E4000
direct allocation
page read and write
167800264000
trusted library allocation
page read and write
7BEC00E28000
trusted library allocation
page read and write
184568B0000
trusted library allocation
page read and write
7BEC00E5C000
trusted library allocation
page read and write
7BEC00AFC000
trusted library allocation
page read and write
656B3FE000
stack
page read and write
7BEC0100C000
trusted library allocation
page read and write
1DBC00601000
trusted library allocation
page read and write
7BEC002AC000
trusted library allocation
page read and write
72A4000
heap
page read and write
65653FB000
stack
page read and write
167800288000
trusted library allocation
page read and write
7BEC00C50000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC001E0000
trusted library allocation
page read and write
74A1000
heap
page read and write
7BEC00F5C000
trusted library allocation
page read and write
6565BFE000
unkown
page readonly
1F0000
heap
page read and write
18458502000
trusted library section
page read and write
1690000
direct allocation
page read and write
184568F7000
unclassified section
page read and write
6509FFE000
unkown
page readonly
68F1000
heap
page read and write
DFC000
stack
page read and write
1850000
heap
page read and write
1845297C000
heap
page read and write
1DBC00700000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00C74000
trusted library allocation
page read and write
7BEC01120000
trusted library allocation
page read and write
1DBC0060C000
trusted library allocation
page read and write
7BEC00F04000
trusted library allocation
page read and write
139E000
stack
page read and write
1678002C0000
trusted library allocation
page read and write
7BEC004A8000
trusted library allocation
page read and write
72A3000
heap
page read and write
1690000
direct allocation
page read and write
7BEC009C8000
trusted library allocation
page read and write
1678002C0000
trusted library allocation
page read and write
1DBC00408000
trusted library allocation
page read and write
18458AD0000
trusted library section
page read and write
7BEC001B8000
trusted library allocation
page read and write
7348000
heap
page read and write
7BEC00A30000
trusted library allocation
page read and write
7BEC00A7C000
trusted library allocation
page read and write
7BEC00E6C000
trusted library allocation
page read and write
7BEC00001000
trusted library allocation
page read and write
68F1000
heap
page read and write
781000
unkown
page execute read
7BEC001F8000
trusted library allocation
page read and write
1844EF9D000
heap
page read and write
6572BFE000
unkown
page readonly
655D3FE000
stack
page read and write
7BEC00E0C000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
1DBC00430000
trusted library allocation
page read and write
1DBC0081C000
trusted library allocation
page read and write
1DBC00974000
trusted library allocation
page read and write
73F6000
heap
page read and write
7BEC0111C000
trusted library allocation
page read and write
1DBC00401000
trusted library allocation
page read and write
1DBC006AC000
trusted library allocation
page read and write
1DBC00898000
trusted library allocation
page read and write
7BEC00344000
trusted library allocation
page read and write
18457270000
heap
page read and write
18458D20000
trusted library section
page read and write
1DBC006C8000
trusted library allocation
page read and write
184523FF000
heap
page read and write
184585CD000
trusted library section
page read and write
1844EEB0000
heap
page read and write
7BEC00E50000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC005CC000
trusted library allocation
page read and write
72A6000
heap
page read and write
711400201000
direct allocation
page read and write
742A000
heap
page read and write
1844EFA9000
heap
page read and write
6506FFE000
unkown
page readonly
68F1000
heap
page read and write
68F1000
heap
page read and write
1DBC00201000
trusted library allocation
page read and write
1DBC006D4000
trusted library allocation
page read and write
7BEC009C8000
trusted library allocation
page read and write
6501FFE000
unkown
page readonly
18458D11000
trusted library section
page read and write
1844EF89000
heap
page read and write
65047FA000
stack
page read and write
735F000
heap
page read and write
18452A0D000
heap
page read and write
7BEC00B34000
trusted library allocation
page read and write
72A4000
heap
page read and write
18452A03000
heap
page read and write
18452993000
heap
page read and write
7BEC0004C000
trusted library allocation
page read and write
73FF000
heap
page read and write
7BEC0020C000
trusted library allocation
page read and write
1DBC007D4000
trusted library allocation
page read and write
7BEC012DC000
trusted library allocation
page read and write
7BEC004B4000
trusted library allocation
page read and write
72A9000
heap
page read and write
7BEC00E88000
trusted library allocation
page read and write
7BEC00C61000
trusted library allocation
page read and write
167800270000
trusted library allocation
page read and write
68F1000
heap
page read and write
6FE0000
direct allocation
page execute and read and write
1DBC008EC000
trusted library allocation
page read and write
7114002EC000
direct allocation
page read and write
7BEC00C28000
trusted library allocation
page read and write
1844F053000
heap
page read and write
657C3FE000
stack
page read and write
C9E000
stack
page read and write
7BEC00A2B000
trusted library allocation
page read and write
1DBC002F4000
trusted library allocation
page read and write
7470000
heap
page read and write
7BEC00658000
trusted library allocation
page read and write
1DBC00220000
trusted library allocation
page read and write
71140020C000
direct allocation
page read and write
791000
unkown
page readonly
7BEC003A8000
trusted library allocation
page read and write
7BEC00F74000
trusted library allocation
page read and write
18458E62000
trusted library section
page read and write
1690000
direct allocation
page read and write
7BEC0080C000
trusted library allocation
page read and write
68F1000
heap
page read and write
6FE0000
direct allocation
page execute and read and write
1844EE70000
heap
page readonly
7BEC00F5C000
trusted library allocation
page read and write
7BEC00230000
trusted library allocation
page read and write
18452406000
heap
page read and write
72A2000
heap
page read and write
68F1000
heap
page read and write
184523D0000
heap
page read and write
7469000
heap
page read and write
78A000
unkown
page readonly
7BEC00E50000
trusted library allocation
page read and write
7BEC00308000
trusted library allocation
page read and write
65633FE000
stack
page read and write
7BEC00520000
trusted library allocation
page read and write
7BEC00B1C000
trusted library allocation
page read and write
7BEC00330000
trusted library allocation
page read and write
184529F0000
heap
page read and write
113F000
stack
page read and write
7BEC001E8000
trusted library allocation
page read and write
7BEC002B0000
trusted library allocation
page read and write
184585C2000
trusted library section
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC002B0000
trusted library allocation
page read and write
68F1000
heap
page read and write
72AE000
heap
page read and write
7BEC01048000
trusted library allocation
page read and write
1845299E000
heap
page read and write
167800250000
trusted library allocation
page read and write
8D1000
unkown
page execute and write copy
780000
unkown
page readonly
65783FB000
stack
page read and write
68F1000
heap
page read and write
1260000
heap
page read and write
7BEC005F0000
trusted library allocation
page read and write
1DBC007C0000
trusted library allocation
page read and write
78E000
unkown
page read and write
78A000
unkown
page readonly
68F1000
heap
page read and write
1678002C8000
trusted library allocation
page read and write
167800294000
trusted library allocation
page read and write
7BEC00570000
trusted library allocation
page read and write
65663FC000
stack
page read and write
7BEC00338000
trusted library allocation
page read and write
17C0000
direct allocation
page read and write
1DBC002D4000
trusted library allocation
page read and write
73B8000
heap
page read and write
68F1000
heap
page read and write
7BEC01001000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
7BEC00918000
trusted library allocation
page read and write
A6A000
heap
page read and write
1DBC008F4000
trusted library allocation
page read and write
73E9000
heap
page read and write
73A1000
heap
page read and write
7BEC00508000
trusted library allocation
page read and write
7BEC00838000
trusted library allocation
page read and write
7BEC00C40000
trusted library allocation
page read and write
7BEC0009C000
trusted library allocation
page read and write
71140023C000
direct allocation
page read and write
65723FB000
stack
page read and write
711400260000
direct allocation
page read and write
18456B8F000
heap
page read and write
7BEC00EF8000
trusted library allocation
page read and write
1844EE80000
heap
page read and write
7475000
heap
page read and write
7BEC00118000
trusted library allocation
page read and write
7BEC0109C000
trusted library allocation
page read and write
7BEC00401000
trusted library allocation
page read and write
184587C7000
unclassified section
page read and write
74F4000
heap
page read and write
72A0000
heap
page read and write
18452403000
heap
page read and write
7BEC009B4000
trusted library allocation
page read and write
6563BFE000
unkown
page readonly
7BEC00F00000
trusted library allocation
page read and write
7BEC008FC000
trusted library allocation
page read and write
7BEC008CC000
trusted library allocation
page read and write
1844F010000
trusted library section
page readonly
780000
unkown
page readonly
72AD000
heap
page read and write
7BEC00860000
trusted library allocation
page read and write
7BEC002D3000
trusted library allocation
page read and write
78E000
unkown
page read and write
7BEC00828000
trusted library allocation
page read and write
72AE000
heap
page read and write
6503FFE000
unkown
page readonly
7BEC00730000
trusted library allocation
page read and write
7382000
heap
page read and write
7BEC00F04000
trusted library allocation
page read and write
7BEC00234000
trusted library allocation
page read and write
7BEC00344000
trusted library allocation
page read and write
1844EF49000
heap
page read and write
7BEC00144000
trusted library allocation
page read and write
68F1000
heap
page read and write
184591AE000
trusted library section
page read and write
655A3EF000
stack
page read and write
1DBC0087C000
trusted library allocation
page read and write
746E000
heap
page read and write
7BEC0065C000
trusted library allocation
page read and write
68F1000
heap
page read and write
1DBC0078C000
trusted library allocation
page read and write
7BEC0040C000
trusted library allocation
page read and write
7BEC00EB8000
trusted library allocation
page read and write
7BEC01178000
trusted library allocation
page read and write
7BEC00D80000
trusted library allocation
page read and write
72A8000
heap
page read and write
18456B50000
heap
page read and write
1845298B000
heap
page read and write
7BEC0129C000
trusted library allocation
page read and write
7BEC007C8000
trusted library allocation
page read and write
7BEC00DCC000
trusted library allocation
page read and write
7BEC00AC8000
trusted library allocation
page read and write
7BEC00CD4000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
1690000
direct allocation
page read and write
BFC000
stack
page read and write
18458F00000
trusted library section
page read and write
1844EFAE000
heap
page read and write
1690000
direct allocation
page read and write
1DBC00920000
trusted library allocation
page read and write
7BEC001F4000
trusted library allocation
page read and write
1690000
direct allocation
page read and write
1678002A0000
trusted library allocation
page read and write
68F1000
heap
page read and write
6577BFE000
unkown
page readonly
1844EECE000
heap
page read and write
16CF000
stack
page read and write
7BEC00092000
trusted library allocation
page read and write
960000
heap
page read and write
72A6000
heap
page read and write
7BEC00E50000
trusted library allocation
page read and write
711400220000
direct allocation
page read and write
7BEC002CC000
trusted library allocation
page read and write
1DBC007A0000
trusted library allocation
page read and write
18452949000
heap
page read and write
656CBFE000
unkown
page readonly
1678002A0000
trusted library allocation
page read and write
7BEC00A0C000
trusted library allocation
page read and write
18C000
stack
page read and write
65673FC000
stack
page read and write
7BEC00344000
trusted library allocation
page read and write
6575BFE000
unkown
page readonly
7BEC0077B000
trusted library allocation
page read and write
68F1000
heap
page read and write
6502FFE000
unkown
page readonly
7DC000
stack
page read and write
68F1000
heap
page read and write
657CBFE000
unkown
page readonly
7BEC0000C000
trusted library allocation
page read and write
1DBC00404000
trusted library allocation
page read and write
65097FE000
stack
page read and write
752E000
heap
page read and write
7BEC00A21000
trusted library allocation
page read and write
73AF000
heap
page read and write
7BEC00388000
trusted library allocation
page read and write
7BEC00D30000
trusted library allocation
page read and write
1845294F000
heap
page read and write
1844EEB8000
heap
page read and write
7BEC0020C000
trusted library allocation
page read and write
CE0000
heap
page read and write
1400000
heap
page read and write
657A3FD000
stack
page read and write
7BEC00324000
trusted library allocation
page read and write
1DBC00960000
trusted library allocation
page read and write
7BEC00108000
trusted library allocation
page read and write
1844EF57000
heap
page read and write
68F1000
heap
page read and write
7BEC00E1D000
trusted library allocation
page read and write
747B000
direct allocation
page read and write
1DBC008E8000
trusted library allocation
page read and write
7BEC0036C000
trusted library allocation
page read and write
7BEC00898000
trusted library allocation
page read and write
CA0000
heap
page read and write
711400250000
direct allocation
page read and write
68F1000
heap
page read and write
72A3000
heap
page read and write
711400215000
direct allocation
page read and write
7BEC002AC000
trusted library allocation
page read and write
1DBC0039C000
trusted library allocation
page read and write
18456947000
unclassified section
page read and write
7422000
heap
page read and write
7BEC00358000
trusted library allocation
page read and write
1844F050000
heap
page read and write
1DBC00210000
trusted library allocation
page read and write
1678002F8000
trusted library allocation
page read and write
5FC000
stack
page read and write
7BEC0023C000
trusted library allocation
page read and write
7BEC00CD4000
trusted library allocation
page read and write
1844EF4D000
heap
page read and write
7BEC00248000
trusted library allocation
page read and write
6576BFE000
unkown
page readonly
68F1000
heap
page read and write
1DBC00880000
trusted library allocation
page read and write
18458EA0000
trusted library section
page read and write
18459177000
unclassified section
page read and write
D70000
heap
page read and write
7BEC00C01000
trusted library allocation
page read and write
8D0000
heap
page read and write
7BEC00CB8000
trusted library allocation
page read and write
73CC000
heap
page read and write
7BEC00BB8000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
1DBC00248000
trusted library allocation
page read and write
167800274000
trusted library allocation
page read and write
764E000
heap
page read and write
72AC000
heap
page read and write
655DBFE000
unkown
page readonly
29AA000
heap
page read and write
88E000
unkown
page read and write
1DBC0082C000
trusted library allocation
page read and write
1DBC006F0000
trusted library allocation
page read and write
7BEC001EC000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
68F1000
heap
page read and write
29A0000
heap
page read and write
7BEC012F0000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00BB8000
trusted library allocation
page read and write
7BEC00344000
trusted library allocation
page read and write
18458D91000
trusted library section
page read and write
70E000
stack
page read and write
6FE0000
direct allocation
page execute and read and write
68F1000
heap
page read and write
18456970000
heap
page read and write
711400217000
direct allocation
page read and write
7BEC00D20000
trusted library allocation
page read and write
7BEC00224000
trusted library allocation
page read and write
7BEC0040C000
trusted library allocation
page read and write
7342000
heap
page read and write
65793FD000
stack
page read and write
7BEC00388000
trusted library allocation
page read and write
18456D72000
trusted library allocation
page read and write
1690000
direct allocation
page read and write
1DBC00894000
trusted library allocation
page read and write
1690000
direct allocation
page read and write
167800260000
trusted library allocation
page read and write
7BEC00DD8000
trusted library allocation
page read and write
7BEC01174000
trusted library allocation
page read and write
1DBC00884000
trusted library allocation
page read and write
7114002A8000
direct allocation
page read and write
7BEC002AC000
trusted library allocation
page read and write
1DBC00801000
trusted library allocation
page read and write
711400270000
direct allocation
page read and write
7BEC00420000
trusted library allocation
page read and write
7BEC004FC000
trusted library allocation
page read and write
18458D3E000
trusted library section
page read and write
D5F000
stack
page read and write
7BEC00590000
trusted library allocation
page read and write
1DBC00860000
trusted library allocation
page read and write
167800235000
trusted library allocation
page read and write
655B3FE000
unkown
page read and write
1844EF9D000
heap
page read and write
1678002F4000
trusted library allocation
page read and write
2BAF000
stack
page read and write
7BEC00B14000
trusted library allocation
page read and write
7BEC00AA4000
trusted library allocation
page read and write
7BEC0075C000
trusted library allocation
page read and write
1DBC008B8000
trusted library allocation
page read and write
6C140000
unkown
page readonly
7BEC00CC4000
trusted library allocation
page read and write
7BEC00338000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00144000
trusted library allocation
page read and write
780000
unkown
page readonly
18452997000
heap
page read and write
7322000
direct allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC012A8000
trusted library allocation
page read and write
7444000
heap
page read and write
7BEC008D4000
trusted library allocation
page read and write
7BEC00FAC000
trusted library allocation
page read and write
7BEC002C0000
trusted library allocation
page read and write
1DBC002FC000
trusted library allocation
page read and write
78A000
unkown
page readonly
7BEC00344000
trusted library allocation
page read and write
7BEC0120C000
trusted library allocation
page read and write
6FD0000
direct allocation
page execute and read and write
1DBC00904000
trusted library allocation
page read and write
1DBC0039C000
trusted library allocation
page read and write
65027FE000
stack
page read and write
1690000
direct allocation
page read and write
7BEC009DC000
trusted library allocation
page read and write
7BEC00EC4000
trusted library allocation
page read and write
18452A38000
heap
page read and write
7BEC00710000
trusted library allocation
page read and write
711400294000
direct allocation
page read and write
781000
unkown
page execute read
72A9000
heap
page read and write
18452410000
heap
page read and write
18458D70000
trusted library section
page read and write
167800201000
trusted library allocation
page read and write
1DBC008AC000
trusted library allocation
page read and write
68F1000
heap
page read and write
1DBC008E4000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC00F00000
trusted library allocation
page read and write
7BEC00994000
trusted library allocation
page read and write
6570BFE000
unkown
page readonly
6FB0000
direct allocation
page execute and read and write
1DBC0070C000
trusted library allocation
page read and write
656C3FA000
stack
page read and write
1DBC00890000
trusted library allocation
page read and write
C10000
heap
page read and write
7454000
heap
page read and write
69F0000
trusted library allocation
page read and write
781000
unkown
page execute read
7BEC00E5C000
trusted library allocation
page read and write
18452403000
heap
page read and write
7BEC002D1000
trusted library allocation
page read and write
7BEC00D48000
trusted library allocation
page read and write
18456BA2000
heap
page read and write
8F0000
heap
page read and write
68F1000
heap
page read and write
650BFFE000
unkown
page readonly
184584F0000
trusted library section
page read and write
7BEC00B28000
trusted library allocation
page read and write
17C0000
direct allocation
page read and write
657DBFE000
unkown
page readonly
65077FE000
stack
page read and write
7BEC006E0000
trusted library allocation
page read and write
1678002C0000
trusted library allocation
page read and write
7BEC00630000
trusted library allocation
page read and write
7BEC00E38000
trusted library allocation
page read and write
7BEC00DE4000
trusted library allocation
page read and write
18458676000
trusted library section
page read and write
7BEC00A8C000
trusted library allocation
page read and write
1DBC0084C000
trusted library allocation
page read and write
7BEC00F60000
trusted library allocation
page read and write
18452A16000
heap
page read and write
184523FA000
heap
page read and write
6508FFE000
unkown
page readonly
7BEC002CC000
trusted library allocation
page read and write
741B000
heap
page read and write
656E3FE000
stack
page read and write
13EE000
stack
page read and write
656ABFE000
unkown
page readonly
1DBC00728000
trusted library allocation
page read and write
75FC000
heap
page read and write
6507FFE000
unkown
page readonly
7BEC002AC000
trusted library allocation
page read and write
65773FD000
stack
page read and write
656D3FE000
stack
page read and write
7BEC00788000
trusted library allocation
page read and write
1DBC00778000
trusted library allocation
page read and write
7BEC00F00000
trusted library allocation
page read and write
18452993000
heap
page read and write
72A6000
heap
page read and write
7BEC00E5C000
trusted library allocation
page read and write
78E000
unkown
page write copy
184528D0000
trusted library section
page read and write
7BEC003F0000
trusted library allocation
page read and write
18456973000
heap
page read and write
65683FE000
stack
page read and write
781000
unkown
page execute read
18452640000
heap
page read and write
6504FFE000
unkown
page readonly
1DBC002F0000
trusted library allocation
page read and write
6567BFE000
unkown
page readonly
72A0000
heap
page read and write
7BEC00801000
trusted library allocation
page read and write
1DBC0040C000
trusted library allocation
page read and write
655E3FE000
stack
page read and write
184529E9000
heap
page read and write
18458D80000
trusted library section
page read and write
1DBC00818000
trusted library allocation
page read and write
1DBC007D0000
trusted library allocation
page read and write
1DBC00878000
trusted library allocation
page read and write
1DBC007E0000
trusted library allocation
page read and write
7BEC00740000
trusted library allocation
page read and write
7BEC009C8000
trusted library allocation
page read and write
184523FA000
heap
page read and write
7114002DC000
direct allocation
page read and write
7BEC00A5C000
trusted library allocation
page read and write
711400290000
direct allocation
page read and write
18451590000
unkown
page read and write
68F1000
heap
page read and write
7BEC0030C000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
7BEC00201000
trusted library allocation
page read and write
1DBC006E8000
trusted library allocation
page read and write
72A3000
heap
page read and write
6579BFE000
unkown
page readonly
1DBC0091C000
trusted library allocation
page read and write
657B3FB000
stack
page read and write
1690000
direct allocation
page read and write
7BEC002CE000
trusted library allocation
page read and write
756E000
heap
page read and write
7BEC00678000
trusted library allocation
page read and write
1845294D000
heap
page read and write
711400210000
direct allocation
page read and write
1678002F0000
trusted library allocation
page read and write
7BEC01068000
trusted library allocation
page read and write
7BEC00E6C000
trusted library allocation
page read and write
72A6000
heap
page read and write
1678002B0000
trusted library allocation
page read and write
1678002B0000
trusted library allocation
page read and write
18452411000
heap
page read and write
7386000
heap
page read and write
78A000
unkown
page readonly
65763FC000
stack
page read and write
6FE0000
direct allocation
page execute and read and write
1678002C0000
trusted library allocation
page read and write
1DBC006AC000
trusted library allocation
page read and write
68F1000
heap
page read and write
650B7FE000
stack
page read and write
D78000
heap
page read and write
65623FB000
stack
page read and write
1DBC0025C000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
657BBFE000
unkown
page readonly
7BEC00890000
trusted library allocation
page read and write
167800278000
trusted library allocation
page read and write
2D30000
heap
page read and write
184529D3000
heap
page read and write
7BEC000BC000
trusted library allocation
page read and write
1844EF6B000
heap
page read and write
5DA000
stack
page read and write
72AA000
heap
page read and write
72A2000
heap
page read and write
1DBC002B8000
trusted library allocation
page read and write
6FE0000
direct allocation
page execute and read and write
73EC000
heap
page read and write
7BEC00744000
trusted library allocation
page read and write
739C000
heap
page read and write
657EBFE000
unkown
page readonly
78E000
unkown
page write copy
7BEC009C8000
trusted library allocation
page read and write
6561BFE000
unkown
page readonly
68F1000
heap
page read and write
7BEC00E0C000
trusted library allocation
page read and write
1DBC0071C000
trusted library allocation
page read and write
73FB000
heap
page read and write
6568BFE000
unkown
page readonly
1678002BC000
trusted library allocation
page read and write
1DBC00288000
trusted library allocation
page read and write
7BEC00398000
trusted library allocation
page read and write
7BEC01160000
trusted library allocation
page read and write
1DBC006F4000
trusted library allocation
page read and write
7BEC00694000
trusted library allocation
page read and write
7BEC00E7C000
trusted library allocation
page read and write
68F1000
heap
page read and write
18458600000
trusted library section
page read and write
7BEC00BF8000
trusted library allocation
page read and write
6562BFE000
unkown
page readonly
18452BD0000
trusted library section
page read and write
746E000
heap
page read and write
7BEC00D98000
trusted library allocation
page read and write
7BEC00F5C000
trusted library allocation
page read and write
1DBC00850000
trusted library allocation
page read and write
7BEC00C0C000
trusted library allocation
page read and write
781000
unkown
page execute read
7BEC00D88000
trusted library allocation
page read and write
18452943000
heap
page read and write
7BEC012C0000
trusted library allocation
page read and write
6500FFE000
unkown
page readonly
758D000
heap
page read and write
6574BFE000
unkown
page readonly
7BEC002CC000
trusted library allocation
page read and write
7BEC009C8000
trusted library allocation
page read and write
7BEC0129C000
trusted library allocation
page read and write
7495000
heap
page read and write
72AA000
heap
page read and write
1DBC008D8000
trusted library allocation
page read and write
7BEC00C98000
trusted library allocation
page read and write
1DBC002B0000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC0003D000
trusted library allocation
page read and write
11FC000
stack
page read and write
7BEC0024C000
trusted library allocation
page read and write
7BEC00ED4000
trusted library allocation
page read and write
1678002D8000
trusted library allocation
page read and write
18458D32000
trusted library section
page read and write
72A4000
heap
page read and write
18458690000
trusted library section
page read and write
65733FB000
stack
page read and write
1678002A0000
trusted library allocation
page read and write
7BEC0096C000
trusted library allocation
page read and write
7BEC004D8000
trusted library allocation
page read and write
656EBFE000
unkown
page readonly
7BEC00601000
trusted library allocation
page read and write
7BEC004A8000
trusted library allocation
page read and write
1DBC008A8000
trusted library allocation
page read and write
7BEC0034C000
trusted library allocation
page read and write
7BEC00378000
trusted library allocation
page read and write
655EBFE000
unkown
page readonly
970000
heap
page read and write
7BEC00D58000
trusted library allocation
page read and write
7BEC0107C000
trusted library allocation
page read and write
7441000
heap
page read and write
7BEC001C4000
trusted library allocation
page read and write
18452940000
heap
page read and write
7BEC002AC000
trusted library allocation
page read and write
7BEC0063C000
trusted library allocation
page read and write
1678002A0000
trusted library allocation
page read and write
78A000
unkown
page readonly
7BEC003F0000
trusted library allocation
page read and write
6FC0000
direct allocation
page execute and read and write
791000
unkown
page readonly
1844EF80000
heap
page read and write
763F000
heap
page read and write
1DBC002CC000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
7BEC00E50000
trusted library allocation
page read and write
7BEC006F0000
trusted library allocation
page read and write
72AD000
heap
page read and write
7BEC0014C000
trusted library allocation
page read and write
7BEC00144000
trusted library allocation
page read and write
71140024C000
direct allocation
page read and write
7BEC00CF0000
trusted library allocation
page read and write
791000
unkown
page readonly
68F1000
heap
page read and write
7363000
heap
page read and write
7BEC004AC000
trusted library allocation
page read and write
68F1000
heap
page read and write
18452404000
heap
page read and write
68F1000
heap
page read and write
1678002E4000
trusted library allocation
page read and write
7BEC007A4000
trusted library allocation
page read and write
7BEC010C0000
trusted library allocation
page read and write
65037FE000
stack
page read and write
68F1000
heap
page read and write
8CF000
unkown
page read and write
72A4000
heap
page read and write
7440000
heap
page read and write
1690000
direct allocation
page read and write
7BEC00C40000
trusted library allocation
page read and write
184523E0000
heap
page read and write
7BEC00CD4000
trusted library allocation
page read and write
68F1000
heap
page read and write
7BEC00B90000
trusted library allocation
page read and write
1837000
heap
page read and write
1DBC00868000
trusted library allocation
page read and write
7114002D0000
direct allocation
page read and write
7BEC00303000
trusted library allocation
page read and write
7393000
heap
page read and write
1DBC00864000
trusted library allocation
page read and write
7BEC00344000
trusted library allocation
page read and write
7418000
heap
page read and write
78E000
unkown
page write copy
73CC000
heap
page read and write
7BEC00924000
trusted library allocation
page read and write
1844EF98000
heap
page read and write
7BEC001D0000
trusted library allocation
page read and write
18458CF7000
unclassified section
page read and write
16780020C000
trusted library allocation
page read and write
C5E000
stack
page read and write
7BEC00EA8000
trusted library allocation
page read and write
78E000
unkown
page read and write
791000
unkown
page readonly
1678002B0000
trusted library allocation
page read and write
7BEC001E4000
trusted library allocation
page read and write
7BEC00C28000
trusted library allocation
page read and write
7BEC00C1C000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
7BEC00720000
trusted library allocation
page read and write
72AD000
heap
page read and write
1845240C000
heap
page read and write
7BEC00C84000
trusted library allocation
page read and write
7BEC00FA8000
trusted library allocation
page read and write
6505FFE000
unkown
page readonly
6FE0000
direct allocation
page execute and read and write
65017FD000
stack
page read and write
298E000
stack
page read and write
18456B60000
heap
page read and write
1690000
direct allocation
page read and write
7BEC00388000
trusted library allocation
page read and write
7BEC00963000
trusted library allocation
page read and write
655C3FE000
stack
page read and write
7BEC002AC000
trusted library allocation
page read and write
72A3000
heap
page read and write
72A0000
heap
page read and write
657D3FE000
stack
page read and write
18452A40000
trusted library section
page read and write
1845299A000
heap
page read and write
7BEC003A8000
trusted library allocation
page read and write
7BEC01148000
trusted library allocation
page read and write
1844EFA9000
heap
page read and write
1690000
direct allocation
page read and write
167800238000
trusted library allocation
page read and write
656FBFE000
unkown
page readonly
184529C6000
heap
page read and write
7BEC00C6C000
trusted library allocation
page read and write
7BEC000B0000
trusted library allocation
page read and write
7BEC010B8000
trusted library allocation
page read and write
656F3FE000
stack
page read and write
1844EF6D000
heap
page read and write
7BEC00D64000
trusted library allocation
page read and write
1DBC0020C000
trusted library allocation
page read and write
7BEC012EC000
trusted library allocation
page read and write
72AD000
heap
page read and write
18452980000
heap
page read and write
7BEC001B0000
trusted library allocation
page read and write
1DBC007AC000
trusted library allocation
page read and write
655FBFE000
unkown
page readonly
1844EFE0000
trusted library allocation
page read and write
184529CC000
heap
page read and write
6569BFE000
unkown
page readonly
7BEC00B8C000
trusted library allocation
page read and write
7BEC00324000
trusted library allocation
page read and write
8D0000
unkown
page readonly
7BEC00F9C000
trusted library allocation
page read and write
7BEC00C38000
trusted library allocation
page read and write
68F1000
heap
page read and write
657FBFE000
unkown
page readonly
7BEC00AF4000
trusted library allocation
page read and write
655BBFE000
unkown
page readonly
18456BA0000
heap
page read and write
184529AF000
heap
page read and write
6571BFE000
unkown
page readonly
1DBC00250000
trusted library allocation
page read and write
7BEC00220000
trusted library allocation
page read and write
6C26C000
unkown
page readonly
1DBC00230000
trusted library allocation
page read and write
68F1000
heap
page read and write
1845240C000
heap
page read and write
7BEC002B2000
trusted library allocation
page read and write
1DBC00418000
trusted library allocation
page read and write
7BEC012B4000
trusted library allocation
page read and write
711400274000
direct allocation
page read and write
7BEC00240000
trusted library allocation
page read and write
7BEC00C7C000
trusted library allocation
page read and write
7BEC00218000
trusted library allocation
page read and write
73EF000
heap
page read and write
7BEC00E98000
trusted library allocation
page read and write
1844F060000
heap
page read and write
7BEC007EC000
trusted library allocation
page read and write
184529FF000
heap
page read and write
742C000
heap
page read and write
65643FA000
stack
page read and write
7BEC00948000
trusted library allocation
page read and write
1DBC0085C000
trusted library allocation
page read and write
1DBC00874000
trusted library allocation
page read and write
1844EF98000
heap
page read and write
7BEC00E50000
trusted library allocation
page read and write
7BEC00F9C000
trusted library allocation
page read and write
7BEC00F10000
trusted library allocation
page read and write
7545000
heap
page read and write
7BEC00A40000
trusted library allocation
page read and write
1DBC00788000
trusted library allocation
page read and write
1DBC007BC000
trusted library allocation
page read and write
7BEC00238000
trusted library allocation
page read and write
7395000
heap
page read and write
6C21F000
unkown
page readonly
7BEC00C40000
trusted library allocation
page read and write
A6E000
heap
page read and write
65753FC000
stack
page read and write
184529BC000
heap
page read and write
A60000
heap
page read and write
7BEC0108C000
trusted library allocation
page read and write
6D70000
direct allocation
page read and write
6564BFE000
unkown
page readonly
68F1000
heap
page read and write
65603FD000
stack
page read and write
1DBC0095C000
trusted library allocation
page read and write
1A5F000
stack
page read and write
1678002C0000
trusted library allocation
page read and write
F5F000
stack
page read and write
1DBC0080C000
trusted library allocation
page read and write
18458DA3000
trusted library section
page read and write
7BEC0022C000
trusted library allocation
page read and write
7346000
heap
page read and write
6FE0000
direct allocation
page execute and read and write
1DBC008F0000
trusted library allocation
page read and write
18452995000
heap
page read and write
7BEC00E50000
trusted library allocation
page read and write
7BEC0060C000
trusted library allocation
page read and write
13A0000
heap
page read and write
1DBC00948000
trusted library allocation
page read and write
7BEC00DC6000
trusted library allocation
page read and write
7BEC00705000
trusted library allocation
page read and write
7BEC00CE8000
trusted library allocation
page read and write
740D000
heap
page read and write
184529FD000
heap
page read and write
65713FD000
stack
page read and write
18452A01000
heap
page read and write
1250000
heap
page read and write
1844EF70000
heap
page read and write
7BEC01201000
trusted library allocation
page read and write
7377000
heap
page read and write
184523FF000
heap
page read and write
7BEC00F84000
trusted library allocation
page read and write
72A3000
heap
page read and write
7114002AC000
direct allocation
page read and write
184529A2000
heap
page read and write
1DBC006AC000
trusted library allocation
page read and write
7BEC00BCC000
trusted library allocation
page read and write
7BEC00768000
trusted library allocation
page read and write
7BEC001A0000
trusted library allocation
page read and write
656A3FE000
stack
page read and write
6C141000
unkown
page execute read
7BEC009C8000
trusted library allocation
page read and write
65743FC000
stack
page read and write
7BEC00DF0000
trusted library allocation
page read and write
184529AF000
heap
page read and write
1844EFD0000
trusted library allocation
page read and write
73F2000
heap
page read and write
68F1000
heap
page read and write
7BEC00739000
trusted library allocation
page read and write
7BEC00DB0000
trusted library allocation
page read and write
7BEC00F38000
trusted library allocation
page read and write
1844EFB0000
heap
page read and write
7BEC00DA0000
trusted library allocation
page read and write
18452997000
heap
page read and write
7BEC0034C000
trusted library allocation
page read and write
7BEC00060000
trusted library allocation
page read and write
65057FC000
stack
page read and write
734A000
heap
page read and write
7BEC00484000
trusted library allocation
page read and write
7BEC00228000
trusted library allocation
page read and write
1DBC00830000
trusted library allocation
page read and write
7BEC00298000
trusted library allocation
page read and write
68F1000
heap
page read and write
75C8000
heap
page read and write
711400230000
direct allocation
page read and write
7371000
heap
page read and write
68F1000
heap
page read and write
7BEC00F04000
trusted library allocation
page read and write
7BEC00F00000
trusted library allocation
page read and write
72A8000
heap
page read and write
7BEC00CA8000
trusted library allocation
page read and write
7BEC00CF8000
trusted library allocation
page read and write
7BEC00F10000
trusted library allocation
page read and write
7BEC00AB8000
trusted library allocation
page read and write
7BEC00E50000
trusted library allocation
page read and write
780000
unkown
page readonly
7BEC00FBC000
trusted library allocation
page read and write
7BEC006D0000
trusted library allocation
page read and write
18452952000
heap
page read and write
7BEC00E01000
trusted library allocation
page read and write
7BEC0087C000
trusted library allocation
page read and write
6566BFE000
unkown
page readonly
65007FC000
stack
page read and write
7BEC00A48000
trusted library allocation
page read and write
7BEC00E18000
trusted library allocation
page read and write
1DBC00964000
trusted library allocation
page read and write
18452A05000
heap
page read and write
184529D0000
heap
page read and write
68F1000
heap
page read and write
68F1000
heap
page read and write
7BEC00CE8000
trusted library allocation
page read and write
18458ADC000
trusted library section
page read and write
791000
unkown
page readonly
59D000
stack
page read and write
13F0000
heap
page read and write
1DBC006E0000
trusted library allocation
page read and write
65613FA000
stack
page read and write
7BEC003F0000
trusted library allocation
page read and write
184523FF000
heap
page read and write
1DBC0027C000
trusted library allocation
page read and write
18456B8B000
heap
page read and write
7BEC003F0000
trusted library allocation
page read and write
1DBC002E4000
trusted library allocation
page read and write
1844F065000
heap
page read and write
7BEC000D4000
trusted library allocation
page read and write
7BEC0034C000
trusted library allocation
page read and write
1DBC0079C000
trusted library allocation
page read and write
1DBC00248000
trusted library allocation
page read and write
7BEC012D0000
trusted library allocation
page read and write
7BEC00D58000
trusted library allocation
page read and write
7BEC002F8000
trusted library allocation
page read and write
1DBC00828000
trusted library allocation
page read and write
1DBC00790000
trusted library allocation
page read and write
7BEC01040000
trusted library allocation
page read and write
657E3FD000
stack
page read and write
7BEC006A4000
trusted library allocation
page read and write
656BBFE000
unkown
page readonly
7BEC0040C000
trusted library allocation
page read and write
18458F0E000
trusted library section
page read and write
1678002BC000
trusted library allocation
page read and write
7BEC0115C000
trusted library allocation
page read and write
72A2000
heap
page read and write
7BEC00A01000
trusted library allocation
page read and write
1690000
direct allocation
page read and write
7BEC001D0000
trusted library allocation
page read and write
There are 1050 hidden memdumps, click here to show them.