IOC Report
7.exe

loading gif

Files

File Path
Type
Category
Malicious
7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WindowsUpdate.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\bhv4267.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x8b6baa0f, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7.exe
"C:\Users\user\Desktop\7.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
malicious

URLs

Name
IP
Malicious
https://www.google.com/chrome/static/css/main.v2.min.css
unknown
https://www.msn.com//searchp/LinkId=255141
unknown
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8k7G9rJDsAhWNTxUIHZZGDCQQ
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B83C84637
unknown
http://www.msn.com
unknown
http://www.fontbureau.com/designers
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://contextual.media.net/__media__/js/util/nrrV9140.js
unknown
https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js
unknown
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z
unknown
https://s.yimg.com/lo/api/res/1.2/BXjlWewXmZ47HeV5NPvUYA--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
unknown
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
unknown
http://whatismyipaddress.com/-
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.jiyu-kobo.co.jp/)
unknown
http://www.site.com/logs.php
unknown
http://whatismyipaddress.com/
104.16.154.36
http://www.zhongyicts.com.cn
unknown
http://www.carterandcone.como.
unknown
https://whatismyipaddress.comx&Qq
unknown
https://logincdn.msauth.net/16.000/Converged_v21033_-0mnSwu67knBd7qR7YN9GQ2.css
unknown
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&ps
unknown
https://logincdn.msauth.net/16.000.28666.10/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc1937
unknown
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_white_5ac590ee72bfe06a7cecfd75b5
unknown
http://www.sandoll.co.kru
unknown
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&pq
unknown
http://www.jiyu-kobo.co.jp/R
unknown
https://www.google.com/search?source=hp&ei=djJ0X6TKCL6IjLsPqriogAY&q=chrome&oq=chrome&gs_lcp=CgZwc3k
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
unknown
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_grey_2b5d393db04a5e6e1f739cb266e
unknown
https://cvision.media.net/new/300x300/2/41/100/83/b5cbfa68-1c93-41c9-8797-4f9b532bc0b6.jpg?v=9
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
unknown
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
unknown
http://www.jiyu-kobo.co.jp/D
unknown
https://pki.goog/repository/0
unknown
https://www.msn.com/
unknown
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
unknown
http://www.carterandcone.comcoc
unknown
https://www.google.com/xjs/_/js/k=xjs.s.en_GB.u8fwEfmm86E.O/ck=xjs.s.hyRG9kR79v8.L.I11.O/m=IvlUe
unknown
https://www.google.com/favicon.ico
unknown
http://www.carterandcone.coml
unknown
http://www.msn.com/
unknown
http://www.founder.com.cn/cnlYM
unknown
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
unknown
https://172.217.23.78/
unknown
https://www.google.com/images/nav_logo299.png
unknown
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
unknown
http://www.founder.com.cn/cnicr
unknown
https://www.google.com/complete/search?q=c&cp=1&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&
unknown
https://www.google.com/accounts/servicelogin
unknown
http://www.carterandcone.comnte
unknown
https://consent.google.com/set?pc=s&uxe=4421591
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6ImYxODk5OTBhOWZjYjFmZjNjNmMxNDhmYjkzM2M3NzY1Mzk3Z
unknown
https://www.google.com/images/hpp/Chrome_Owned_96x96.png
unknown
http://crl.pki.goog/gsr2/gsr2.crl0?
unknown
http://www.founder.com.cn/cnate
unknown
http://www.jiyu-kobo.co.jp/a
unknown
http://pki.goog/gsr2/GTSGIAG3.crt0)
unknown
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNQP1yCl9r5iywZTFTjpazv-DURVxDidzMfrF
unknown
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNSrZsXAj6n_sYvivJecwrpYgMhb9ihVGAlz2
unknown
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.9Ky5Gf3gP0o.O/m=gapi_iframes
unknown
https://adservice.google.com/adsid/google/si?gadsid=AORoGNSvKHbjRugN8Bruw1IrFif72u8bwsJvZ4BRSrMAhil_
unknown
http://www.carterandcone.com$
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://ogs.google.com/widget/callout?prid=19020392&pgid=19020380&puid=93eb0881ae9ec1db&origin=https
unknown
https://www.google.com/complete/search?q=chrome&cp=6&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authus
unknown
https://www.google.com/images/phd/px.gif
unknown
https://www.google.com/chrome/static/images/homepage/google-canary.png
unknown
https://adservice.google.co.uk/adsid/google/ui?gadsid=AORoGNQXg7AHkvg6J6S0TqGFa_0HynGV3_XxYfs4fLINJG
unknown
https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png
unknown
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
unknown
https://www.google.com/chrome/static/js/main.v2.min.js
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
unknown
https://cvision.media.net/new/100x75/2/89/162/29/8ee7a9a3-dec9-4d15-94e1-5c73b17d2de1.jpg?v=9
unknown
http://www.founder.com.cn/cnn-u~
unknown
http://www.typography.netD
unknown
http://www.carterandcone.comyo
unknown
http://www.zhongyicts.com.cnte
unknown
http://fontfabrik.com
unknown
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNTXuGHPo1zFjYPXt7mTG-4GALGGk8bjqjvBm
unknown
http://www.monotype.EN~
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
unknown
https://www.google.com/intl/en_uk/chrome/
unknown
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
unknown
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNQXwBwQrE_SUsnWzwpadcOOdc8yOg6JxthQN
unknown
https://www.google.com/intl/en_uk/chrome/application/x-msdownloadC:
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6IjJkYTFhZDAwNDEyNzQ2M2E3MGUyMWVkZmIxNmUyZjQ2MjBkM
unknown
http://www.founder.com.cn/cnn-u
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.carterandcone.comT
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094
unknown
https://www.google.com/chrome/static/js/installer.min.js
unknown
https://www.google.com/search
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
unknown
http://whatismyipaddress.com
unknown
http://www.jiyu-kobo.co.jp/jp/
unknown
https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_5QoHC_ilFOmb96M0pIeJ
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whatismyipaddress.com
104.16.154.36
us-east-1.route-1000.000webhost.awex.io
145.14.144.149
files.000webhost.com
unknown
49.124.12.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
104.16.154.36
whatismyipaddress.com
United States
145.14.144.149
us-east-1.route-1000.000webhost.awex.io
Netherlands
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Windows Update
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C92000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
2771000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4A2000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
142000
unkown
page readonly
malicious
3771000
trusted library allocation
page read and write
malicious
4A2000
unkown
page readonly
malicious
C92000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
142000
unkown
page readonly
malicious
2823000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
6674000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
598D000
stack
page read and write
1C01AC21000
heap
page read and write
20B44800000
heap
page read and write
4EC5000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
3438000
trusted library allocation
page read and write
700000
heap
page read and write
87B747F000
stack
page read and write
24811613000
heap
page read and write
70E0000
remote allocation
page read and write
142B000
trusted library allocation
page execute and read and write
1C016740000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1649B7C000
stack
page read and write
4EC1000
trusted library allocation
page read and write
5B4000
heap
page read and write
4EAD000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
1649F7F000
stack
page read and write
4EC9000
trusted library allocation
page read and write
BF8000
heap
page read and write
1C53CB90000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1C01AF80000
trusted library allocation
page read and write
27D0000
heap
page execute and read and write
4EC1000
trusted library allocation
page read and write
4E9E000
trusted library allocation
page read and write
12C19813000
heap
page read and write
AA0000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
21A5E002000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
5B4000
heap
page read and write
4EC1000
trusted library allocation
page read and write
5B4000
heap
page read and write
AEC000
trusted library allocation
page execute and read and write
4EC5000
trusted library allocation
page read and write
A05000
heap
page read and write
6655000
trusted library allocation
page read and write
8EE000
heap
page read and write
4EC1000
trusted library allocation
page read and write
8BD000
heap
page read and write
AA0000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
BF92FB000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
1C016850000
trusted library section
page readonly
4EA0000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
12C1984C000
heap
page read and write
1C01AC9A000
heap
page read and write
18EFA0A0000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
1C01567A000
heap
page read and write
2B61000
trusted library allocation
page read and write
87B737F000
stack
page read and write
2729000
trusted library allocation
page read and write
4F1E000
stack
page read and write
2728000
trusted library allocation
page read and write
1C0156A5000
heap
page read and write
568E000
stack
page read and write
4EAA000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
21FD000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
1C53CC29000
heap
page read and write
45A000
stack
page read and write
6122000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
24811708000
heap
page read and write
2266CEB4000
heap
page read and write
1BAE5213000
heap
page read and write
5DB1C78000
stack
page read and write
21A5DE70000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
18EF9858000
heap
page read and write
20B4487D000
heap
page read and write
19C000
stack
page read and write
ACE000
heap
page read and write
2266DC02000
heap
page read and write
12F0000
heap
page read and write
4EA6000
trusted library allocation
page read and write
1C016830000
trusted library section
page readonly
24811713000
heap
page read and write
2481163C000
heap
page read and write
1402000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
146E000
stack
page read and write
2205000
trusted library allocation
page read and write
14D0000
heap
page read and write
1FF0444A000
heap
page read and write
220C000
trusted library allocation
page read and write
4E92000
trusted library allocation
page read and write
20B44870000
heap
page read and write
4EAB000
trusted library allocation
page read and write
7958000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
4ED6000
trusted library allocation
page read and write
1BAE5229000
heap
page read and write
4778000
trusted library allocation
page read and write
1C01AC5F000
heap
page read and write
CCC000
heap
page read and write
3000000
heap
page read and write
4EBE000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
5B0000
heap
page read and write
1FF04508000
heap
page read and write
1C53CC6A000
heap
page read and write
2621000
heap
page read and write
6669000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
D40000
heap
page read and write
4EC1000
trusted library allocation
page read and write
ACC000
heap
page read and write
4EB6000
trusted library allocation
page read and write
21A5C42A000
heap
page read and write
1FF04502000
heap
page read and write
21B0000
heap
page read and write
4EC1000
trusted library allocation
page read and write
C68000
heap
page read and write
5B4000
heap
page read and write
74F0000
trusted library allocation
page execute and read and write
2266D5A0000
trusted library allocation
page read and write
494E000
stack
page read and write
1C53CC5B000
heap
page read and write
4EC1000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
4EAE000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
24811600000
heap
page read and write
4E9E000
trusted library allocation
page read and write
20B45002000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
710000
heap
page read and write
6B10000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
9D000
stack
page read and write
4ECA000
trusted library allocation
page read and write
664C000
trusted library allocation
page read and write
ABB0000
trusted library allocation
page read and write
66A6000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
20B44857000
heap
page read and write
6A9D000
stack
page read and write
522000
unkown
page readonly
24811670000
heap
page read and write
4EC5000
trusted library allocation
page read and write
70E0000
remote allocation
page read and write
2728000
trusted library allocation
page read and write
8A9000
heap
page read and write
220A000
trusted library allocation
page read and write
96C000
heap
page read and write
5B4000
heap
page read and write
4EB0000
trusted library allocation
page read and write
220D000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
A4F4178000
stack
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2266D790000
heap
page read and write
4ECE000
trusted library allocation
page read and write
BF91FF000
stack
page read and write
2620000
heap
page read and write
2266D76F000
heap
page read and write
21FD000
trusted library allocation
page read and write
4A6D000
stack
page read and write
4A00000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
668E000
trusted library allocation
page read and write
A9B0000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4A0000
unkown
page readonly
2266CEDA000
heap
page read and write
4EA5000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
4ECF000
trusted library allocation
page read and write
87B6E7C000
stack
page read and write
6A8000
heap
page read and write
6000000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
1C01B0B0000
trusted library allocation
page read and write
18EFA0A0000
remote allocation
page read and write
4EC5000
trusted library allocation
page read and write
2427000
heap
page read and write
7990000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2205000
trusted library allocation
page read and write
18EF9824000
heap
page read and write
1C01AF50000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
18EFA070000
trusted library allocation
page read and write
77CE000
stack
page read and write
2720000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
1C01AC11000
heap
page read and write
8DC000
heap
page read and write
A39937C000
stack
page read and write
1C016840000
trusted library section
page readonly
1C01AD00000
heap
page read and write
4ECE000
trusted library allocation
page read and write
1BAE5302000
heap
page read and write
4EBE000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
4ECC000
trusted library allocation
page read and write
2266D77D000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1C016015000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
1C01568F000
heap
page read and write
2C59000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
6677000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
E4B000
trusted library allocation
page execute and read and write
21E0000
trusted library allocation
page read and write
ADA000
trusted library allocation
page execute and read and write
4EAB000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
1BAE5257000
heap
page read and write
2812000
trusted library allocation
page read and write
E02000
trusted library allocation
page execute and read and write
84093FE000
stack
page read and write
18EFA202000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
6F8D000
stack
page read and write
4EAB000
trusted library allocation
page read and write
6668000
trusted library allocation
page read and write
4B44000
heap
page read and write
2205000
trusted library allocation
page read and write
1C01B0B0000
remote allocation
page read and write
A8B0000
heap
page read and write
12C1988A000
heap
page read and write
12C19660000
heap
page read and write
220A000
trusted library allocation
page read and write
4EA5000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
20B4487E000
heap
page read and write
2266D700000
heap
page read and write
4EC1000
trusted library allocation
page read and write
18EF9829000
heap
page read and write
2728000
trusted library allocation
page read and write
16F0000
trusted library allocation
page execute and read and write
30000
heap
page read and write
220C000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EAF000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
21FC000
trusted library allocation
page read and write
4ECF000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
2266D790000
heap
page read and write
4E9E000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
526E67F000
stack
page read and write
4EBE000
trusted library allocation
page read and write
2266CCA0000
heap
page read and write
4EA3000
trusted library allocation
page read and write
70CE000
stack
page read and write
2266D766000
heap
page read and write
20B44878000
heap
page read and write
4ECA000
trusted library allocation
page read and write
24811648000
heap
page read and write
2266CE00000
heap
page read and write
6676000
trusted library allocation
page read and write
1C53CD02000
heap
page read and write
1422000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
5DB1F7F000
stack
page read and write
4ED9000
trusted library allocation
page read and write
18EF9802000
heap
page read and write
4E93000
trusted library allocation
page read and write
1C01B0B0000
remote allocation
page read and write
2721000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
5B5000
heap
page read and write
4ED3000
trusted library allocation
page read and write
526E3AE000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
6AE000
stack
page read and write
21A5C370000
heap
page read and write
1C01AF94000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
12C19600000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4EA3000
trusted library allocation
page read and write
4ECA000
trusted library allocation
page read and write
50E9C7E000
stack
page read and write
4E9B000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
BF93F7000
stack
page read and write
7F0B000
stack
page read and write
2266DC00000
heap
page read and write
1C01ACEC000
heap
page read and write
E80000
heap
page read and write
1C01B0B0000
remote allocation
page read and write
6669000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1BAE5288000
heap
page read and write
3E043FF000
stack
page read and write
1C53CC8A000
heap
page read and write
24811550000
heap
page read and write
12A0000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
7F3D0000
trusted library allocation
page execute and read and write
3E042FF000
stack
page read and write
4EC1000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
3E03BAB000
stack
page read and write
4EC9000
trusted library allocation
page read and write
6658000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
4ECA000
trusted library allocation
page read and write
1C53CB20000
heap
page read and write
1407000
trusted library allocation
page execute and read and write
4EC1000
trusted library allocation
page read and write
1FF04452000
heap
page read and write
ECE000
stack
page read and write
4EC5000
trusted library allocation
page read and write
1412000
trusted library allocation
page execute and read and write
2266CE29000
heap
page read and write
56E000
stack
page read and write
4EC5000
trusted library allocation
page read and write
7F6D0000
trusted library allocation
page execute and read and write
52B0000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
4ECA000
trusted library allocation
page read and write
220D000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
CCC000
heap
page read and write
5AA0000
remote allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
20B44620000
heap
page read and write
304E000
stack
page read and write
18EF97D0000
heap
page read and write
AD6000
trusted library allocation
page execute and read and write
20B445C0000
heap
page read and write
4EB4000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
1C01AD02000
heap
page read and write
164A07E000
stack
page read and write
C90000
unkown
page readonly
1C016118000
heap
page read and write
4EC5000
trusted library allocation
page read and write
84092FE000
stack
page read and write
4EAB000
trusted library allocation
page read and write
1C53CC60000
heap
page read and write
400000
remote allocation
page execute and read and write
21A5C458000
heap
page read and write
4EAB000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1BAE5040000
heap
page read and write
1FF0444F000
heap
page read and write
4E9E000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
5ADE000
stack
page read and write
21FD000
trusted library allocation
page read and write
522000
unkown
page readonly
21A5DEC0000
trusted library allocation
page read and write
2420000
heap
page read and write
1C016002000
heap
page read and write
2266D78E000
heap
page read and write
C2C000
heap
page read and write
50E9EFF000
stack
page read and write
1C53CC3F000
heap
page read and write
4EAD000
trusted library allocation
page read and write
12C19865000
heap
page read and write
21FC000
trusted library allocation
page read and write
1C01AF50000
trusted library allocation
page read and write
1C01AC4D000
heap
page read and write
220A000
trusted library allocation
page read and write
1C01B070000
trusted library allocation
page read and write
AD2000
trusted library allocation
page read and write
501E000
stack
page read and write
122E000
stack
page read and write
20B44863000
heap
page read and write
A4F427A000
stack
page read and write
2266CF13000
heap
page read and write
220A000
trusted library allocation
page read and write
E2A000
trusted library allocation
page execute and read and write
1C016102000
heap
page read and write
400000
remote allocation
page execute and read and write
708000
heap
page read and write
20B4485A000
heap
page read and write
21FD000
trusted library allocation
page read and write
4E97000
trusted library allocation
page read and write
21FC000
trusted library allocation
page read and write
1FF04413000
heap
page read and write
2204000
trusted library allocation
page read and write
24811681000
heap
page read and write
84094FE000
stack
page read and write
2266DBA0000
remote allocation
page read and write
2266CEAA000
heap
page read and write
556000
stack
page read and write
4EAB000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5DB20FF000
stack
page read and write
2D90000
trusted library allocation
page read and write
A4F437B000
stack
page read and write
1C01AC6A000
heap
page read and write
2266D7B9000
heap
page read and write
50E972C000
stack
page read and write
4EC5000
trusted library allocation
page read and write
484D000
stack
page read and write
1C01AC74000
heap
page read and write
4EC5000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
6BF000
stack
page read and write
E32000
trusted library allocation
page execute and read and write
220A000
trusted library allocation
page read and write
E27000
trusted library allocation
page execute and read and write
96D000
heap
page read and write
4EAB000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
87B6F7E000
stack
page read and write
4EB6000
trusted library allocation
page read and write
282A000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
5DB172B000
stack
page read and write
AF0000
heap
page read and write
4EA6000
trusted library allocation
page read and write
A39927F000
stack
page read and write
4EA3000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
8E5000
heap
page read and write
3D21000
trusted library allocation
page read and write
A39947D000
stack
page read and write
220C000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
164A27F000
stack
page read and write
4ECA000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2C6F000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
52E000
stack
page read and write
4EC1000
trusted library allocation
page read and write
21A5C43D000
heap
page read and write
4ED3000
trusted library allocation
page read and write
20B44847000
heap
page read and write
1C01567C000
heap
page read and write
12C1A002000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
12C19902000
heap
page read and write
14A0000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
A4F3D6B000
stack
page read and write
20B44829000
heap
page read and write
6100000
trusted library allocation
page read and write
20B44865000
heap
page read and write
2B55000
trusted library allocation
page read and write
1BAE5140000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
87B717B000
stack
page read and write
5A8E000
stack
page read and write
1FF04500000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
27CD000
stack
page read and write
21A5C360000
heap
page read and write
3420000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
21A5DF80000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
578E000
stack
page read and write
2721000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
4E9E000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
1C01AF80000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
2B69000
trusted library allocation
page read and write
2481164E000
heap
page read and write
52B0000
remote allocation
page read and write
2266CEEB000
heap
page read and write
4E9E000
trusted library allocation
page read and write
2D9C000
trusted library allocation
page read and write
8F6000
stack
page read and write
4EA6000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
B8E000
stack
page read and write
840907B000
stack
page read and write
4EB7000
trusted library allocation
page read and write
4E9B000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
E22000
trusted library allocation
page read and write
4EA7000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
671E000
stack
page read and write
84095FF000
stack
page read and write
4EC1000
trusted library allocation
page read and write
1C01ACF3000
heap
page read and write
4ED3000
trusted library allocation
page read and write
1C016000000
heap
page read and write
140000
unkown
page readonly
1FF04513000
heap
page read and write
4EC1000
trusted library allocation
page read and write
74E0000
trusted library allocation
page execute and read and write
76C0000
trusted library allocation
page read and write
7E0E000
stack
page read and write
4EB6000
trusted library allocation
page read and write
E1A000
trusted library allocation
page execute and read and write
2266CEC7000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1C015600000
heap
page read and write
4EC1000
trusted library allocation
page read and write
18EF9902000
heap
page read and write
4EC5000
trusted library allocation
page read and write
30000
heap
page read and write
A4F46FF000
stack
page read and write
24811700000
heap
page read and write
6ADE000
stack
page read and write
18EF983D000
heap
page read and write
A4F467B000
stack
page read and write
21A5C47F000
heap
page read and write
511E000
stack
page read and write
1BAE5300000
heap
page read and write
4EC1000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
18EF9813000
heap
page read and write
1649E7D000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
6BFE000
stack
page read and write
6665000
trusted library allocation
page read and write
1C016BC0000
trusted library allocation
page read and write
E47000
trusted library allocation
page execute and read and write
7F4D000
stack
page read and write
5B4000
heap
page read and write
3E040FB000
stack
page read and write
4EC9000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
220A000
trusted library allocation
page read and write
1C2000
unkown
page readonly
4EAB000
trusted library allocation
page read and write
343D000
trusted library allocation
page read and write
6E4E000
stack
page read and write
1C0000
remote allocation
page read and write
2266D713000
heap
page read and write
4EB6000
trusted library allocation
page read and write
B4F000
stack
page read and write
4EC1000
trusted library allocation
page read and write
2266D77B000
heap
page read and write
2205000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
21A5C448000
heap
page read and write
3E041F7000
stack
page read and write
4ECA000
trusted library allocation
page read and write
4E10000
heap
page read and write
830000
heap
page read and write
4EC5000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
4EAA000
trusted library allocation
page read and write
72C000
heap
page read and write
4EA4000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
5AA0000
remote allocation
page read and write
5920000
trusted library allocation
page execute and read and write
4ECA000
trusted library allocation
page read and write
57CE000
stack
page read and write
CC0000
heap
page read and write
220A000
trusted library allocation
page read and write
21D0000
heap
page read and write
1C01B060000
trusted library allocation
page read and write
1C53CC00000
heap
page read and write
2205000
trusted library allocation
page read and write
90F000
stack
page read and write
4ECF000
trusted library allocation
page read and write
21A5DF80000
remote allocation
page read and write
5B4000
heap
page read and write
666C000
trusted library allocation
page read and write
20B4485F000
heap
page read and write
20B44902000
heap
page read and write
4D50000
trusted library allocation
page read and write
20B44839000
heap
page read and write
241F000
stack
page read and write
1C016159000
heap
page read and write
4EC1000
trusted library allocation
page read and write
AEA000
trusted library allocation
page execute and read and write
4EC5000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
1C2000
unkown
page readonly
1F0000
heap
page read and write
4EC1000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1C0000
remote allocation
page read and write
1FF0443C000
heap
page read and write
16498FB000
stack
page read and write
66A3000
trusted library allocation
page read and write
5B5000
heap
page read and write
4EC5000
trusted library allocation
page read and write
1502000
heap
page read and write
20B4487C000
heap
page read and write
21A5C447000
heap
page read and write
2266CEEE000
heap
page read and write
1C01563F000
heap
page read and write
6B40000
trusted library allocation
page read and write
4980000
trusted library allocation
page execute and read and write
1C53CC02000
heap
page read and write
2266CEC0000
heap
page read and write
4EB7000
trusted library allocation
page read and write
CCC000
heap
page read and write
1649C7E000
stack
page read and write
1C0000
remote allocation
page read and write
5B4000
heap
page read and write
4EBE000
trusted library allocation
page read and write
1BAE5251000
heap
page read and write
9F0000
trusted library allocation
page read and write
87B707B000
stack
page read and write
126E000
stack
page read and write
4EC5000
trusted library allocation
page read and write
2621000
heap
page read and write
4E9B000
trusted library allocation
page read and write
ACC000
heap
page read and write
4EC5000
trusted library allocation
page read and write
164A37F000
stack
page read and write
3E03FFB000
stack
page read and write
71B000
heap
page read and write
1C0000
remote allocation
page read and write
E1C000
trusted library allocation
page execute and read and write
ABA000
trusted library allocation
page execute and read and write
4EAE000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
452000
remote allocation
page execute and read and write
1C015672000
heap
page read and write
2266DBA0000
remote allocation
page read and write
21A5DF00000
trusted library allocation
page read and write
963000
heap
page read and write
70E0000
remote allocation
page read and write
24812002000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
21A5C3D0000
heap
page read and write
2721000
trusted library allocation
page read and write
29C0000
trusted library allocation
page execute and read and write
220A000
trusted library allocation
page read and write
4EAC000
trusted library allocation
page read and write
1FF04400000
heap
page read and write
8FA000
stack
page read and write
A50000
heap
page read and write
4E97000
trusted library allocation
page read and write
2266D790000
heap
page read and write
ACC000
heap
page read and write
2266D75E000
heap
page read and write
18EF9770000
heap
page read and write
560000
heap
page read and write
667B000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
12C195F0000
heap
page read and write
4EAA000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2204000
trusted library allocation
page read and write
2990000
trusted library allocation
page execute and read and write
50E9E7D000
stack
page read and write
4EC1000
trusted library allocation
page read and write
2221000
trusted library allocation
page read and write
2266D768000
heap
page read and write
220C000
trusted library allocation
page read and write
A4F487F000
stack
page read and write
1C01B080000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
1700000
heap
page read and write
4EC0000
trusted library allocation
page read and write
526E77B000
stack
page read and write
BF95FC000
stack
page read and write
4EB7000
trusted library allocation
page read and write
1C01B090000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
1C016860000
trusted library section
page readonly
7960000
trusted library allocation
page read and write
4EA5000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
8C5000
heap
page read and write
5B4000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
1C0155E0000
trusted library allocation
page read and write
726D000
stack
page read and write
16CE000
stack
page read and write
A39907F000
stack
page read and write
4EC8000
trusted library allocation
page read and write
12C19913000
heap
page read and write
84090FE000
stack
page read and write
2266DBA0000
remote allocation
page read and write
20B4487A000
heap
page read and write
721F000
stack
page read and write
1C015FE0000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
A8C8000
heap
page read and write
4EAD000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1C53CC60000
heap
page read and write
4ECE000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
83A000
heap
page read and write
E10000
trusted library allocation
page read and write
8D7000
heap
page read and write
4EC5000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
4E9B000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
1C01AE30000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC8000
trusted library allocation
page read and write
526E32C000
stack
page read and write
2266D7B1000
heap
page read and write
5BDF000
stack
page read and write
A4E000
stack
page read and write
4EC0000
trusted library allocation
page read and write
20B4484E000
heap
page read and write
248115B0000
heap
page read and write
3050000
trusted library allocation
page read and write
12C19865000
heap
page read and write
2205000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
10F6000
stack
page read and write
4EC0000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
20B44830000
heap
page read and write
16E0000
trusted library allocation
page read and write
4ECD000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
526EAFE000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
6645000
trusted library allocation
page read and write
21FD000
trusted library allocation
page read and write
12C19900000
heap
page read and write
2B6B000
trusted library allocation
page read and write
140000
unkown
page readonly
E0A000
trusted library allocation
page execute and read and write
17E000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
C9B000
trusted library allocation
page execute and read and write
3060000
heap
page execute and read and write
ABAD000
stack
page read and write
6A9000
heap
page read and write
4EB5000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
A39917F000
stack
page read and write
1FF0448F000
heap
page read and write
21A5C489000
heap
page read and write
681F000
stack
page read and write
6B20000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
E12000
trusted library allocation
page execute and read and write
20B445B0000
heap
page read and write
1C01AC2F000
heap
page read and write
5DB1A7E000
stack
page read and write
20B44879000
heap
page read and write
2FAE000
stack
page read and write
12C19849000
heap
page read and write
A90000
heap
page execute and read and write
BF907E000
stack
page read and write
220A000
trusted library allocation
page read and write
1FF04370000
trusted library allocation
page read and write
4E9F000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1FF04210000
heap
page read and write
4A0000
unkown
page readonly
1BAE527E000
heap
page read and write
8CF000
heap
page read and write
2266CEEE000
heap
page read and write
4EC1000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
A4F497F000
stack
page read and write
1649D7E000
stack
page read and write
12C19824000
heap
page read and write
2813000
trusted library allocation
page read and write
1C01AF58000
trusted library allocation
page read and write
2266CF02000
heap
page read and write
52B0000
remote allocation
page read and write
2266D75B000
heap
page read and write
4EC1000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
ACB000
heap
page read and write
4EA6000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
16494BC000
stack
page read and write
4ED3000
trusted library allocation
page read and write
4E7E000
stack
page read and write
1C53CC6B000
heap
page read and write
3E03EFE000
stack
page read and write
4EAB000
trusted library allocation
page read and write
220A000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
1C015540000
heap
page read and write
24811702000
heap
page read and write
282A000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
4E9F000
trusted library allocation
page read and write
6FCE000
stack
page read and write
12C1984B000
heap
page read and write
21FC000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
7B8D000
stack
page read and write
4EBE000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
1C01AF5E000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
1C016100000
heap
page read and write
CC7000
heap
page read and write
4EAD000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
20B44885000
heap
page read and write
AC0000
heap
page read and write
4EAB000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
24811540000
heap
page read and write
21A5C500000
heap
page read and write
1C015629000
heap
page read and write
685E000
stack
page read and write
1C0000
remote allocation
page read and write
2823000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
1C01B020000
trusted library allocation
page read and write
2204000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2266CEAA000
heap
page read and write
4ECB000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
8C5000
heap
page read and write
4ECB000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4ECB000
trusted library allocation
page read and write
87B7277000
stack
page read and write
21A5DF80000
remote allocation
page read and write
4ECD000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
21A5C413000
heap
page read and write
1BAE523C000
heap
page read and write
4EBE000
trusted library allocation
page read and write
2266D602000
heap
page read and write
668A000
trusted library allocation
page read and write
C97000
trusted library allocation
page execute and read and write
AB2000
trusted library allocation
page execute and read and write
4991000
trusted library allocation
page read and write
1C01ABC0000
trusted library allocation
page read and write
20B4486A000
heap
page read and write
4EC1000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
4EBE000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
24811654000
heap
page read and write
BF0000
heap
page read and write
A00000
heap
page read and write
699D000
stack
page read and write
2FF1000
trusted library allocation
page read and write
AF7000
heap
page read and write
4EC1000
trusted library allocation
page read and write
12C1984A000
heap
page read and write
5B4000
heap
page read and write
1BAE5200000
heap
page read and write
4B40000
heap
page read and write
140A000
trusted library allocation
page execute and read and write
4EA6000
trusted library allocation
page read and write
BB0000
heap
page read and write
12C19802000
heap
page read and write
2266D715000
heap
page read and write
5AA0000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
2FED000
stack
page read and write
4EAB000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
21A5C513000
heap
page read and write
12DA000
trusted library allocation
page execute and read and write
164A17E000
stack
page read and write
526E7FF000
stack
page read and write
6E8E000
stack
page read and write
21A5C402000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1FF0444B000
heap
page read and write
220A000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
220A000
trusted library allocation
page read and write
BF8D5B000
stack
page read and write
4ECE000
trusted library allocation
page read and write
1FF04481000
heap
page read and write
43B1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
52EE000
stack
page read and write
6D4E000
stack
page read and write
21A5C518000
heap
page read and write
4EAB000
trusted library allocation
page read and write
DEF000
stack
page read and write
711E000
stack
page read and write
7650000
trusted library section
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1C53CB30000
heap
page read and write
E60000
trusted library allocation
page read and write
1BAE527C000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2266CEF7000
heap
page read and write
400000
remote allocation
page execute and read and write
4D9E000
stack
page read and write
281E000
trusted library allocation
page read and write
2204000
trusted library allocation
page read and write
736B000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EB6000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
13FF000
stack
page read and write
1FF04C02000
trusted library allocation
page read and write
12F5000
heap
page read and write
1C01ACC8000
heap
page read and write
663C000
trusted library allocation
page read and write
1C015550000
heap
page read and write
1C01AF70000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4E93000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
4E9E000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
ACE000
heap
page read and write
1C01ACF1000
heap
page read and write
4EC1000
trusted library allocation
page read and write
20B4486B000
heap
page read and write
1C0000
remote allocation
page read and write
2266D76E000
heap
page read and write
DF0000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
D12000
unkown
page readonly
4D70000
heap
page read and write
4EC8000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
1FF04429000
heap
page read and write
2211000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
1C016870000
trusted library section
page readonly
20B44862000
heap
page read and write
6650000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
A4F4B7C000
stack
page read and write
50E9AFF000
stack
page read and write
6666000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
4E92000
trusted library allocation
page read and write
21FD000
trusted library allocation
page read and write
20B44876000
heap
page read and write
1BAE4FE0000
heap
page read and write
220D000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
5DB1B7D000
stack
page read and write
21A5DE90000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1C01AC40000
heap
page read and write
4EC5000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
21A5C458000
heap
page read and write
1BAE5308000
heap
page read and write
21A5C457000
heap
page read and write
1C53CC70000
heap
page read and write
7950000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
4D75000
heap
page read and write
4EB7000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
1C01AF71000
trusted library allocation
page read and write
297E000
stack
page read and write
ACE000
heap
page read and write
24811677000
heap
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
12C1986D000
heap
page read and write
1C015FE3000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
50E9D7E000
stack
page read and write
4EC0000
trusted library allocation
page read and write
5B4000
heap
page read and write
1BAE5A02000
trusted library allocation
page read and write
1C015FF0000
trusted library allocation
page read and write
1C015613000
heap
page read and write
4D60000
trusted library allocation
page read and write
12C19760000
trusted library allocation
page read and write
6A0000
heap
page read and write
554E000
stack
page read and write
21A5C462000
heap
page read and write
A4F48FF000
stack
page read and write
4ECF000
trusted library allocation
page read and write
1C0155B0000
heap
page read and write
840917E000
stack
page read and write
4EC5000
trusted library allocation
page read and write
4E99000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
530000
trusted library allocation
page read and write
8B7000
heap
page read and write
6A5000
heap
page read and write
5DB1E7B000
stack
page read and write
C92000
trusted library allocation
page read and write
695E000
stack
page read and write
4EAB000
trusted library allocation
page read and write
526E8FB000
stack
page read and write
418000
remote allocation
page execute and read and write
20B4486C000
heap
page read and write
A94000
heap
page execute and read and write
8C2000
heap
page read and write
526E9F7000
stack
page read and write
4EB9000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
24811629000
heap
page read and write
4D1C000
stack
page read and write
1C01565A000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
1C015FC1000
trusted library allocation
page read and write
2266CD00000
heap
page read and write
7F440000
trusted library allocation
page execute and read and write
1FF04270000
heap
page read and write
660F000
trusted library allocation
page read and write
20B44861000
heap
page read and write
BF917B000
stack
page read and write
4EC1000
trusted library allocation
page read and write
2481168B000
heap
page read and write
2481168E000
heap
page read and write
5B5000
heap
page read and write
4EC1000
trusted library allocation
page read and write
526EBFE000
stack
page read and write
4EC2000
trusted library allocation
page read and write
4EB5000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
198000
stack
page read and write
1BAE5270000
heap
page read and write
550000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
18EFA0A0000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
2266CEE2000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
6682000
trusted library allocation
page read and write
50E9BFE000
stack
page read and write
2266D78C000
heap
page read and write
667F000
trusted library allocation
page read and write
BF8DDE000
stack
page read and write
7660000
trusted library section
page read and write
8C5000
heap
page read and write
4ECE000
trusted library allocation
page read and write
6658000
trusted library allocation
page read and write
20B44720000
trusted library allocation
page read and write
18EF9760000
heap
page read and write
4ECE000
trusted library allocation
page read and write
52AF000
stack
page read and write
1C01B0A0000
trusted library allocation
page read and write
4D5E000
stack
page read and write
4EBF000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EBF000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
A39957F000
stack
page read and write
AC0000
trusted library allocation
page read and write
8D2000
heap
page read and write
4E92000
trusted library allocation
page read and write
1BAE5313000
heap
page read and write
51AE000
stack
page read and write
4ECE000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
1C016113000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1C53CC13000
heap
page read and write
1427000
trusted library allocation
page execute and read and write
1C01ACEA000
heap
page read and write
12D2000
trusted library allocation
page execute and read and write
248115E0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
1C016118000
heap
page read and write
2204000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1C015696000
heap
page read and write
A4F477F000
stack
page read and write
7700000
trusted library allocation
page read and write
3807000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
D12000
unkown
page readonly
6686000
trusted library allocation
page read and write
1C53D602000
trusted library allocation
page read and write
1C015677000
heap
page read and write
29D0000
heap
page read and write
21A5C400000
heap
page read and write
4EC1000
trusted library allocation
page read and write
2481164B000
heap
page read and write
2726000
trusted library allocation
page read and write
4D20000
trusted library section
page readonly
4ED1000
trusted library allocation
page read and write
5B4000
heap
page read and write
4ECB000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
1480000
heap
page read and write
2266CC90000
heap
page read and write
2266CE70000
heap
page read and write
10FA000
stack
page read and write
12E2000
trusted library allocation
page execute and read and write
4EA3000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
1C53CD13000
heap
page read and write
6FE000
stack
page read and write
2266CE13000
heap
page read and write
4ED3000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
1BAE4FD0000
heap
page read and write
2266D710000
heap
page read and write
29B0000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
12EC000
trusted library allocation
page execute and read and write
20B4486E000
heap
page read and write
4EA3000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
66F000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
24811651000
heap
page read and write
2266CE89000
heap
page read and write
231E000
stack
page read and write
4EC0000
trusted library allocation
page read and write
AC2000
trusted library allocation
page execute and read and write
4EC1000
trusted library allocation
page read and write
EE0000
heap
page read and write
20B4483C000
heap
page read and write
21A5C448000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1C01AF90000
trusted library allocation
page read and write
BF94FF000
stack
page read and write
4ECF000
trusted library allocation
page read and write
1C01AC97000
heap
page read and write
4EAE000
trusted library allocation
page read and write
E3A000
trusted library allocation
page execute and read and write
5BB000
stack
page read and write
278E000
stack
page read and write
A398AEB000
stack
page read and write
4EA7000
trusted library allocation
page read and write
2204000
trusted library allocation
page read and write
1C01ACEE000
heap
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
50E9FFD000
stack
page read and write
20B44873000
heap
page read and write
4EC1000
trusted library allocation
page read and write
5DB1D77000
stack
page read and write
4ED0000
trusted library allocation
page read and write
20B4487F000
heap
page read and write
4EA7000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
4E92000
trusted library allocation
page read and write
220A000
trusted library allocation
page read and write
1BAE5202000
heap
page read and write
4ECA000
trusted library allocation
page read and write
A8C9000
heap
page read and write
690000
trusted library allocation
page read and write
342C000
trusted library allocation
page read and write
1C01AE40000
trusted library allocation
page read and write
4ECD000
trusted library allocation
page read and write
1531000
heap
page read and write
A4F457A000
stack
page read and write
78CE000
stack
page read and write
2209000
trusted library allocation
page read and write
5B5000
heap
page read and write
2266D74C000
heap
page read and write
1649A7F000
stack
page read and write
4EC1000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
A4F4D7F000
stack
page read and write
4EC0000
trusted library allocation
page read and write
ACE000
heap
page read and write
4ECB000
trusted library allocation
page read and write
12C1984E000
heap
page read and write
4EBF000
trusted library allocation
page read and write
A4F447F000
stack
page read and write
ACD000
heap
page read and write
5B4000
heap
page read and write
4EC1000
trusted library allocation
page read and write
2221000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1C01ACDE000
heap
page read and write
4C4E000
stack
page read and write
1FF04470000
heap
page read and write
4EC5000
trusted library allocation
page read and write
50EA0FD000
stack
page read and write
1C0000
remote allocation
page read and write
4EAB000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
1BAE524B000
heap
page read and write
7680000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
1C01ACE4000
heap
page read and write
1BAE522C000
heap
page read and write
B560000
heap
page execute and read and write
4EC1000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
DAB000
stack
page read and write
1C01AF74000
trusted library allocation
page read and write
2266CE3C000
heap
page read and write
20B44813000
heap
page read and write
4EB6000
trusted library allocation
page read and write
21FC000
trusted library allocation
page read and write
12C19908000
heap
page read and write
960000
heap
page read and write
2826000
trusted library allocation
page read and write
2204000
trusted library allocation
page read and write
4EAA000
trusted library allocation
page read and write
21A5C502000
heap
page read and write
29A1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
5DB17AE000
stack
page read and write
4EC5000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
1FF04445000
heap
page read and write
718000
heap
page read and write
1FF04200000
heap
page read and write
564E000
stack
page read and write
21A5C481000
heap
page read and write
4E9E000
trusted library allocation
page read and write
12C19800000
heap
page read and write
4EC5000
trusted library allocation
page read and write
1C53CBC0000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
1C015702000
heap
page read and write
666A000
trusted library allocation
page read and write
8E2000
heap
page read and write
CCC000
heap
page read and write
2728000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
4EB4000
trusted library allocation
page read and write
4EAD000
trusted library allocation
page read and write
14DA000
heap
page read and write
9D000
stack
page read and write
53EF000
stack
page read and write
4EBE000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
87B6EFE000
stack
page read and write
18EF9800000
heap
page read and write
8FF000
stack
page read and write
58CE000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
1C015700000
heap
page read and write
20B44868000
heap
page read and write
1420000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
12C1983C000
heap
page read and write
AE2000
trusted library allocation
page execute and read and write
2266CE82000
heap
page read and write
5DB207A000
stack
page read and write
220C000
trusted library allocation
page read and write
1C016820000
trusted library section
page readonly
4EC9000
trusted library allocation
page read and write
24811647000
heap
page read and write
A39967C000
stack
page read and write
4EBE000
trusted library allocation
page read and write
4DDE000
stack
page read and write
3E03E7E000
stack
page read and write
1C016159000
heap
page read and write
5B5000
heap
page read and write
4EA6000
trusted library allocation
page read and write
C90000
unkown
page readonly
6627000
trusted library allocation
page read and write
2205000
trusted library allocation
page read and write
4E97000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
A4F4A7E000
stack
page read and write
4EC5000
trusted library allocation
page read and write
790E000
stack
page read and write
4EC1000
trusted library allocation
page read and write
87B757F000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
1C01AC00000
heap
page read and write
1C015713000
heap
page read and write
1C0155F0000
trusted library section
page read and write
1C0000
remote allocation
page read and write
4EC1000
trusted library allocation
page read and write
2266D770000
heap
page read and write
A4F47FF000
stack
page read and write
There are 1410 hidden memdumps, click here to show them.