Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
WzyLDvldFI.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WzyLDvldFI.exe_a54aa1fee38d284768e03e1ada8872cdd998cc94_beb75ad8_2b4793ab-b5f8-4bbb-8ce5-a01edd85ccb3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59D4.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:39:58 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B5C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B8C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\WzyLDvldFI.exe
|
"C:\Users\user\Desktop\WzyLDvldFI.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2256,i,8855744801463954800,14578922760294507823,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6540 -s 1304
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/5055W
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://drive.google.com/e.MainFrame
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://anglebug.com/7488Q
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/3832c
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certsIx
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/3965_
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://www.google.com/Char:i3
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://chrome.google.com/webstore?hl=enB
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
http://anglebug.com/8229a
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/4836%
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/4551X
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://chrome.google.com/webstore?hl=enng
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://drive.google.com/ribute-policy
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://docs.google.com/spreadsheets/?usp=installed_webappxI
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
172.217.21.36
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.21.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
ProgramId
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
FileId
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
LowerCaseLongPath
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
LongPathHash
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
Name
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
OriginalFileName
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
Publisher
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
Version
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
BinFileVersion
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
BinaryType
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
ProductName
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
ProductVersion
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
LinkDate
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
BinProductVersion
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
AppxPackageFullName
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
Size
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
Language
|
||
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
47A000
|
unkown
|
page readonly
|
||
6C758000
|
unkown
|
page readonly
|
||
D669FFC000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00801000
|
trusted library allocation
|
page read and write
|
||
D6107FE000
|
unkown
|
page readonly
|
||
7B98000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00980000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA42C3000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D6697FE000
|
unkown
|
page readonly
|
||
1A70000
|
heap
|
page read and write
|
||
D665FFE000
|
stack
|
page read and write
|
||
497800DEC000
|
trusted library allocation
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800C80000
|
trusted library allocation
|
page read and write
|
||
20EAA92E000
|
trusted library section
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
497800118000
|
trusted library allocation
|
page read and write
|
||
F81000
|
unkown
|
page execute and write copy
|
||
6A41000
|
heap
|
page read and write
|
||
20EA2FB0000
|
unkown
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978000A8000
|
trusted library allocation
|
page read and write
|
||
49780032C000
|
trusted library allocation
|
page read and write
|
||
1A2C000
|
unkown
|
page execute and write copy
|
||
AC3000
|
heap
|
page read and write
|
||
497800BBC000
|
trusted library allocation
|
page read and write
|
||
7B3A000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978011C8000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
762C002F0000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
497800DB4000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
762C0039C000
|
trusted library allocation
|
page read and write
|
||
D6127FE000
|
unkown
|
page readonly
|
||
D60CFFA000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7B58000
|
heap
|
page read and write
|
||
4978002B4000
|
trusted library allocation
|
page read and write
|
||
5DE000303000
|
direct allocation
|
page read and write
|
||
20EA82B0000
|
heap
|
page read and write
|
||
497800DC0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
5DE0002EC000
|
direct allocation
|
page read and write
|
||
4978010A4000
|
trusted library allocation
|
page read and write
|
||
497800D90000
|
trusted library allocation
|
page read and write
|
||
497800E4C000
|
trusted library allocation
|
page read and write
|
||
D601FFE000
|
unkown
|
page readonly
|
||
D60C7FE000
|
unkown
|
page readonly
|
||
497800F78000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978007A4000
|
trusted library allocation
|
page read and write
|
||
7CA4000
|
heap
|
page read and write
|
||
4978012A4000
|
trusted library allocation
|
page read and write
|
||
D67FFFE000
|
unkown
|
page readonly
|
||
20EA42B7000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C008E4000
|
trusted library allocation
|
page read and write
|
||
68C000
|
stack
|
page read and write
|
||
20EA427E000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
582C002C0000
|
trusted library allocation
|
page read and write
|
||
497800499000
|
trusted library allocation
|
page read and write
|
||
4978006D8000
|
trusted library allocation
|
page read and write
|
||
5DE000250000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800454000
|
trusted library allocation
|
page read and write
|
||
7AF7000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
762C00864000
|
trusted library allocation
|
page read and write
|
||
D66F7FE000
|
unkown
|
page readonly
|
||
582C00278000
|
trusted library allocation
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D610FFE000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001C8000
|
trusted library allocation
|
page read and write
|
||
49780017C000
|
trusted library allocation
|
page read and write
|
||
497800E01000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
762C0095C000
|
trusted library allocation
|
page read and write
|
||
7A5F000
|
heap
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
7B94000
|
heap
|
page read and write
|
||
497800294000
|
trusted library allocation
|
page read and write
|
||
497800958000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
6A41000
|
heap
|
page read and write
|
||
497800AD4000
|
trusted library allocation
|
page read and write
|
||
174F000
|
stack
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
762C00238000
|
trusted library allocation
|
page read and write
|
||
20EAA217000
|
unclassified section
|
page read and write
|
||
497800C50000
|
trusted library allocation
|
page read and write
|
||
7C01000
|
heap
|
page read and write
|
||
6C70F000
|
unkown
|
page readonly
|
||
20EA0AE5000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D672FFE000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780049C000
|
trusted library allocation
|
page read and write
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
D66BFFB000
|
stack
|
page read and write
|
||
497800EDC000
|
trusted library allocation
|
page read and write
|
||
74BC000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
5DE000230000
|
direct allocation
|
page read and write
|
||
20EA42DC000
|
heap
|
page read and write
|
||
4978007E0000
|
trusted library allocation
|
page read and write
|
||
582C00230000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978000E0000
|
trusted library allocation
|
page read and write
|
||
4978006D8000
|
trusted library allocation
|
page read and write
|
||
497800CB4000
|
trusted library allocation
|
page read and write
|
||
762C00948000
|
trusted library allocation
|
page read and write
|
||
20EA9F22000
|
trusted library section
|
page read and write
|
||
7A55000
|
heap
|
page read and write
|
||
20EA4340000
|
trusted library section
|
page read and write
|
||
762C008F4000
|
trusted library allocation
|
page read and write
|
||
762C0039C000
|
trusted library allocation
|
page read and write
|
||
20EA89D7000
|
unclassified section
|
page read and write
|
||
762C008B4000
|
trusted library allocation
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
7B9B000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA9E50000
|
trusted library section
|
page read and write
|
||
497800001000
|
trusted library allocation
|
page read and write
|
||
4978006E8000
|
trusted library allocation
|
page read and write
|
||
762C002FC000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780090C000
|
trusted library allocation
|
page read and write
|
||
20EA3D0F000
|
heap
|
page read and write
|
||
497800334000
|
trusted library allocation
|
page read and write
|
||
27AE000
|
unkown
|
page read and write
|
||
497800098000
|
trusted library allocation
|
page read and write
|
||
4978004A0000
|
trusted library allocation
|
page read and write
|
||
497800EA4000
|
trusted library allocation
|
page read and write
|
||
4978005E8000
|
trusted library allocation
|
page read and write
|
||
497800730000
|
trusted library allocation
|
page read and write
|
||
4978001AC000
|
trusted library allocation
|
page read and write
|
||
762C00964000
|
trusted library allocation
|
page read and write
|
||
4978006C4000
|
trusted library allocation
|
page read and write
|
||
497800BCC000
|
trusted library allocation
|
page read and write
|
||
582C002A0000
|
trusted library allocation
|
page read and write
|
||
D60EFFE000
|
stack
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
20EA8BC0000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
762C00868000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800F48000
|
trusted library allocation
|
page read and write
|
||
497800EE8000
|
trusted library allocation
|
page read and write
|
||
762C00878000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780020C000
|
trusted library allocation
|
page read and write
|
||
7C40000
|
heap
|
page read and write
|
||
6C631000
|
unkown
|
page execute read
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
7B7B000
|
heap
|
page read and write
|
||
762C007C4000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
7A55000
|
heap
|
page read and write
|
||
762C0071C000
|
trusted library allocation
|
page read and write
|
||
497801068000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
762C00201000
|
trusted library allocation
|
page read and write
|
||
5DE000220000
|
direct allocation
|
page read and write
|
||
497800C78000
|
trusted library allocation
|
page read and write
|
||
497801080000
|
trusted library allocation
|
page read and write
|
||
F17000
|
heap
|
page read and write
|
||
762C00250000
|
trusted library allocation
|
page read and write
|
||
5DE0002DC000
|
direct allocation
|
page read and write
|
||
20EA3D1C000
|
heap
|
page read and write
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
497800984000
|
trusted library allocation
|
page read and write
|
||
D60F7FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
4978001B4000
|
trusted library allocation
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
7A58000
|
heap
|
page read and write
|
||
D606FFE000
|
stack
|
page read and write
|
||
20EA07D0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800FF0000
|
trusted library allocation
|
page read and write
|
||
497800184000
|
trusted library allocation
|
page read and write
|
||
20EA0690000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D661FEF000
|
stack
|
page read and write
|
||
7D29000
|
heap
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
762C00778000
|
trusted library allocation
|
page read and write
|
||
497800B24000
|
trusted library allocation
|
page read and write
|
||
7B22000
|
heap
|
page read and write
|
||
4978009AF000
|
trusted library allocation
|
page read and write
|
||
20EA42D2000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
7A58000
|
heap
|
page read and write
|
||
497800EBC000
|
trusted library allocation
|
page read and write
|
||
7130000
|
direct allocation
|
page execute and read and write
|
||
762C006AC000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
7CBB000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
497800401000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800EB4000
|
trusted library allocation
|
page read and write
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
D67D7FC000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
497800F20000
|
trusted library allocation
|
page read and write
|
||
497800B0C000
|
trusted library allocation
|
page read and write
|
||
20EAA8F7000
|
unclassified section
|
page read and write
|
||
762C006E0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00898000
|
trusted library allocation
|
page read and write
|
||
497800394000
|
trusted library allocation
|
page read and write
|
||
7A5D000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
497800AD4000
|
trusted library allocation
|
page read and write
|
||
75E4000
|
direct allocation
|
page read and write
|
||
497800C68000
|
trusted library allocation
|
page read and write
|
||
497801074000
|
trusted library allocation
|
page read and write
|
||
7A54000
|
heap
|
page read and write
|
||
7D48000
|
heap
|
page read and write
|
||
D600FFE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
20EA07B0000
|
heap
|
page read and write
|
||
D662FFE000
|
unkown
|
page read and write
|
||
5DE00024C000
|
direct allocation
|
page read and write
|
||
582C00274000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001D0000
|
trusted library allocation
|
page read and write
|
||
7A55000
|
heap
|
page read and write
|
||
497800210000
|
trusted library allocation
|
page read and write
|
||
497800370000
|
trusted library allocation
|
page read and write
|
||
4978001A0000
|
trusted library allocation
|
page read and write
|
||
D66D7FE000
|
unkown
|
page readonly
|
||
4978004A0000
|
trusted library allocation
|
page read and write
|
||
497800300000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780087C000
|
trusted library allocation
|
page read and write
|
||
7BE1000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
762C00220000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA9F60000
|
trusted library section
|
page read and write
|
||
497800198000
|
trusted library allocation
|
page read and write
|
||
D66A7FE000
|
unkown
|
page readonly
|
||
497800FA8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800508000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
49780032C000
|
trusted library allocation
|
page read and write
|
||
7B72000
|
heap
|
page read and write
|
||
497800AC8000
|
trusted library allocation
|
page read and write
|
||
7A5E000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800220000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800CF0000
|
trusted library allocation
|
page read and write
|
||
D66AFFE000
|
stack
|
page read and write
|
||
D67CFFE000
|
unkown
|
page readonly
|
||
497800454000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800A1C000
|
trusted library allocation
|
page read and write
|
||
7B32000
|
heap
|
page read and write
|
||
7B52000
|
heap
|
page read and write
|
||
4978001B4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D676FFE000
|
stack
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
20EA8B80000
|
trusted library section
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
20EA3CF0000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
7BF6000
|
heap
|
page read and write
|
||
20EA8BE3000
|
heap
|
page read and write
|
||
20EAAB27000
|
unclassified section
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
497801001000
|
trusted library allocation
|
page read and write
|
||
762C00408000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
5DE00020C000
|
direct allocation
|
page read and write
|
||
49780059C000
|
trusted library allocation
|
page read and write
|
||
D6067FE000
|
unkown
|
page readonly
|
||
2A30000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800370000
|
trusted library allocation
|
page read and write
|
||
49780029A000
|
trusted library allocation
|
page read and write
|
||
762C0025C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA0790000
|
heap
|
page read and write
|
||
7B31000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780008E000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
582C00248000
|
trusted library allocation
|
page read and write
|
||
6C759000
|
unkown
|
page read and write
|
||
D60AFFE000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497801120000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
4978007DB000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
heap
|
page read and write
|
||
762C0085C000
|
trusted library allocation
|
page read and write
|
||
582C002E4000
|
trusted library allocation
|
page read and write
|
||
D60D7FE000
|
unkown
|
page readonly
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
20EA0770000
|
heap
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
762C00874000
|
trusted library allocation
|
page read and write
|
||
762C00788000
|
trusted library allocation
|
page read and write
|
||
497800E7C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
471000
|
unkown
|
page execute read
|
||
EDC000
|
stack
|
page read and write
|
||
D666FFE000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA3CE0000
|
heap
|
page read and write
|
||
497800FD0000
|
trusted library allocation
|
page read and write
|
||
5DE0002AC000
|
direct allocation
|
page read and write
|
||
D66EFFC000
|
stack
|
page read and write
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978009E0000
|
trusted library allocation
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
582C00270000
|
trusted library allocation
|
page read and write
|
||
762C007D4000
|
trusted library allocation
|
page read and write
|
||
20EA42B4000
|
heap
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
497800F04000
|
trusted library allocation
|
page read and write
|
||
497800D60000
|
trusted library allocation
|
page read and write
|
||
4978009D0000
|
trusted library allocation
|
page read and write
|
||
49780091C000
|
trusted library allocation
|
page read and write
|
||
582C002C0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
497800FD0000
|
trusted library allocation
|
page read and write
|
||
7CEF000
|
heap
|
page read and write
|
||
762C008D8000
|
trusted library allocation
|
page read and write
|
||
497800B18000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
73E000
|
stack
|
page read and write
|
||
7BBC000
|
heap
|
page read and write
|
||
D603FFD000
|
stack
|
page read and write
|
||
497800546000
|
trusted library allocation
|
page read and write
|
||
20EA432A000
|
heap
|
page read and write
|
||
497800394000
|
trusted library allocation
|
page read and write
|
||
20EAA430000
|
trusted library section
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
4978004A0000
|
trusted library allocation
|
page read and write
|
||
20EAAB50000
|
trusted library section
|
page read and write
|
||
4978004A0000
|
trusted library allocation
|
page read and write
|
||
7C53000
|
heap
|
page read and write
|
||
49780100C000
|
trusted library allocation
|
page read and write
|
||
998000
|
heap
|
page read and write
|
||
497800298000
|
trusted library allocation
|
page read and write
|
||
1597000
|
heap
|
page read and write
|
||
582C00238000
|
trusted library allocation
|
page read and write
|
||
7B9D000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
582C00260000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
D6007FC000
|
stack
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
777000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
582C002D8000
|
trusted library allocation
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
497800EC8000
|
trusted library allocation
|
page read and write
|
||
D67E7FD000
|
stack
|
page read and write
|
||
20EA8BA0000
|
trusted library section
|
page read and write
|
||
20EA42E4000
|
heap
|
page read and write
|
||
D6787FE000
|
unkown
|
page readonly
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978010A0000
|
trusted library allocation
|
page read and write
|
||
762C00700000
|
trusted library allocation
|
page read and write
|
||
20EA4303000
|
heap
|
page read and write
|
||
5DE000234000
|
direct allocation
|
page read and write
|
||
20EA42CC000
|
heap
|
page read and write
|
||
762C00248000
|
trusted library allocation
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
4978001F0000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
D6737FE000
|
unkown
|
page readonly
|
||
470000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
7D7C000
|
heap
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
4978002B4000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
497800EDC000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
497800290000
|
trusted library allocation
|
page read and write
|
||
497800454000
|
trusted library allocation
|
page read and write
|
||
497800541000
|
trusted library allocation
|
page read and write
|
||
762C007E0000
|
trusted library allocation
|
page read and write
|
||
762C00840000
|
trusted library allocation
|
page read and write
|
||
7851000
|
heap
|
page read and write
|
||
D6037FE000
|
unkown
|
page readonly
|
||
D670FFE000
|
stack
|
page read and write
|
||
4978001AC000
|
trusted library allocation
|
page read and write
|
||
762C00848000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
6A41000
|
heap
|
page read and write
|
||
34A0000
|
direct allocation
|
page read and write
|
||
497800201000
|
trusted library allocation
|
page read and write
|
||
762C006C8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C0087C000
|
trusted library allocation
|
page read and write
|
||
4978007F0000
|
trusted library allocation
|
page read and write
|
||
762C006BC000
|
trusted library allocation
|
page read and write
|
||
D675FFE000
|
stack
|
page read and write
|
||
7BFA000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
582C00220000
|
trusted library allocation
|
page read and write
|
||
762C0081C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
582C002A0000
|
trusted library allocation
|
page read and write
|
||
20EA3D0F000
|
heap
|
page read and write
|
||
497800974000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
78FC000
|
heap
|
page read and write
|
||
5DE000284000
|
direct allocation
|
page read and write
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
497800E4C000
|
trusted library allocation
|
page read and write
|
||
49780001C000
|
trusted library allocation
|
page read and write
|
||
762C002E4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA08A6000
|
heap
|
page read and write
|
||
20EA3D0F000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
582C00250000
|
trusted library allocation
|
page read and write
|
||
497800670000
|
trusted library allocation
|
page read and write
|
||
49780034C000
|
trusted library allocation
|
page read and write
|
||
497800854000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800354000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001E4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978000D0000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
762C0091C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800A88000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
AB5000
|
heap
|
page read and write
|
||
762C007E4000
|
trusted library allocation
|
page read and write
|
||
20EAA673000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
4978001C4000
|
trusted library allocation
|
page read and write
|
||
7A5D000
|
heap
|
page read and write
|
||
4978007D7000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
582C002F4000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
D668FFB000
|
stack
|
page read and write
|
||
762C002B0000
|
trusted library allocation
|
page read and write
|
||
20EA3D20000
|
heap
|
page read and write
|
||
762C0080C000
|
trusted library allocation
|
page read and write
|
||
497800218000
|
trusted library allocation
|
page read and write
|
||
4978012B4000
|
trusted library allocation
|
page read and write
|
||
4978001E8000
|
trusted library allocation
|
page read and write
|
||
20EA07E0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
5DE000217000
|
direct allocation
|
page read and write
|
||
20EA8B50000
|
heap
|
page read and write
|
||
20EA3D1C000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
497800CE0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800FA0000
|
trusted library allocation
|
page read and write
|
||
D67BFFE000
|
unkown
|
page readonly
|
||
4978010D0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
4978008BC000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
D66B7FE000
|
unkown
|
page readonly
|
||
49780027C000
|
trusted library allocation
|
page read and write
|
||
49780074C000
|
trusted library allocation
|
page read and write
|
||
5DE000294000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D6047FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D67F7FB000
|
stack
|
page read and write
|
||
7A5B000
|
heap
|
page read and write
|
||
20EA42B1000
|
heap
|
page read and write
|
||
762C00890000
|
trusted library allocation
|
page read and write
|
||
20EAAB5E000
|
trusted library section
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
497800334000
|
trusted library allocation
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
AC1000
|
heap
|
page read and write
|
||
20EA4272000
|
heap
|
page read and write
|
||
497801030000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
7DAB000
|
heap
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
497801094000
|
trusted library allocation
|
page read and write
|
||
762C006F4000
|
trusted library allocation
|
page read and write
|
||
4978005C0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
582C002B0000
|
trusted library allocation
|
page read and write
|
||
497800D08000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7C17000
|
heap
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
20EA3D13000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
D607FFE000
|
stack
|
page read and write
|
||
20EA3F50000
|
heap
|
page read and write
|
||
497800F58000
|
trusted library allocation
|
page read and write
|
||
4978004A8000
|
trusted library allocation
|
page read and write
|
||
762C00418000
|
trusted library allocation
|
page read and write
|
||
497800F10000
|
trusted library allocation
|
page read and write
|
||
497800FD0000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
497800230000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
B3F000
|
stack
|
page read and write
|
||
20EA0AE0000
|
heap
|
page read and write
|
||
7D06000
|
heap
|
page read and write
|
||
7A5E000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001D8000
|
trusted library allocation
|
page read and write
|
||
497800EBC000
|
trusted library allocation
|
page read and write
|
||
20EAA732000
|
trusted library section
|
page read and write
|
||
762C00858000
|
trusted library allocation
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800D50000
|
trusted library allocation
|
page read and write
|
||
7A5F000
|
heap
|
page read and write
|
||
D60B7FE000
|
unkown
|
page readonly
|
||
D673FFA000
|
stack
|
page read and write
|
||
4978008F8000
|
trusted library allocation
|
page read and write
|
||
D602FFE000
|
stack
|
page read and write
|
||
762C0040C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
5DE00023C000
|
direct allocation
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
27EF000
|
unkown
|
page read and write
|
||
20EAA230000
|
trusted library section
|
page read and write
|
||
582C0020C000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
4978011F8000
|
trusted library allocation
|
page read and write
|
||
762C00404000
|
trusted library allocation
|
page read and write
|
||
497800E34000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
497801198000
|
trusted library allocation
|
page read and write
|
||
497800D3C000
|
trusted library allocation
|
page read and write
|
||
4978006F0000
|
trusted library allocation
|
page read and write
|
||
D67AFFE000
|
unkown
|
page readonly
|
||
D67EFFE000
|
unkown
|
page readonly
|
||
497800B90000
|
trusted library allocation
|
page read and write
|
||
497800518000
|
trusted library allocation
|
page read and write
|
||
49780020C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C006AC000
|
trusted library allocation
|
page read and write
|
||
497800900000
|
trusted library allocation
|
page read and write
|
||
497800EDC000
|
trusted library allocation
|
page read and write
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978010B4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800DA8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA42A7000
|
heap
|
page read and write
|
||
497800801000
|
trusted library allocation
|
page read and write
|
||
4978000F0000
|
trusted library allocation
|
page read and write
|
||
20EA9E6E000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D6797FB000
|
stack
|
page read and write
|
||
497800B54000
|
trusted library allocation
|
page read and write
|
||
20EA9F2D000
|
trusted library section
|
page read and write
|
||
497800E0C000
|
trusted library allocation
|
page read and write
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D674FFE000
|
stack
|
page read and write
|
||
497801214000
|
trusted library allocation
|
page read and write
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
20EA82E6000
|
heap
|
page read and write
|
||
497800828000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800A0C000
|
trusted library allocation
|
page read and write
|
||
4978002A8000
|
trusted library allocation
|
page read and write
|
||
D664FFE000
|
stack
|
page read and write
|
||
49780040C000
|
trusted library allocation
|
page read and write
|
||
5DE000215000
|
direct allocation
|
page read and write
|
||
4978002E0000
|
trusted library allocation
|
page read and write
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
497800454000
|
trusted library allocation
|
page read and write
|
||
497800D48000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6C630000
|
unkown
|
page readonly
|
||
762C008EC000
|
trusted library allocation
|
page read and write
|
||
762C007A0000
|
trusted library allocation
|
page read and write
|
||
4978004E4000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
20EA80A0000
|
trusted library allocation
|
page read and write
|
||
497800ED4000
|
trusted library allocation
|
page read and write
|
||
497801058000
|
trusted library allocation
|
page read and write
|
||
497800CE0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800DE4000
|
trusted library allocation
|
page read and write
|
||
762C0082C000
|
trusted library allocation
|
page read and write
|
||
497800D20000
|
trusted library allocation
|
page read and write
|
||
5DE000270000
|
direct allocation
|
page read and write
|
||
D6027FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
49780080C000
|
trusted library allocation
|
page read and write
|
||
762C00830000
|
trusted library allocation
|
page read and write
|
||
D6097FE000
|
unkown
|
page readonly
|
||
497800E94000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497801201000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
497800A94000
|
trusted library allocation
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
762C00894000
|
trusted library allocation
|
page read and write
|
||
7B61000
|
heap
|
page read and write
|
||
497800D32000
|
trusted library allocation
|
page read and write
|
||
20EAA016000
|
trusted library section
|
page read and write
|
||
20EAA73D000
|
trusted library section
|
page read and write
|
||
5DE0002A8000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA8BE0000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001B4000
|
trusted library allocation
|
page read and write
|
||
7851000
|
heap
|
page read and write
|
||
49780022C000
|
trusted library allocation
|
page read and write
|
||
D6717FE000
|
unkown
|
page readonly
|
||
B90000
|
heap
|
page read and write
|
||
7A51000
|
heap
|
page read and write
|
||
4978011D0000
|
trusted library allocation
|
page read and write
|
||
497800F30000
|
trusted library allocation
|
page read and write
|
||
497800224000
|
trusted library allocation
|
page read and write
|
||
20EA0889000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
497800725000
|
trusted library allocation
|
page read and write
|
||
4978002E3000
|
trusted library allocation
|
page read and write
|
||
7A52000
|
heap
|
page read and write
|
||
762C00401000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
762C008C8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D66DFFB000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
497800D00000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800320000
|
trusted library allocation
|
page read and write
|
||
497800298000
|
trusted library allocation
|
page read and write
|
||
20EA42AA000
|
heap
|
page read and write
|
||
20EA07F8000
|
heap
|
page read and write
|
||
582C002C8000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C0060C000
|
trusted library allocation
|
page read and write
|
||
582C002A0000
|
trusted library allocation
|
page read and write
|
||
D6117FE000
|
unkown
|
page readonly
|
||
7A51000
|
heap
|
page read and write
|
||
68D000
|
stack
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
47E000
|
unkown
|
page read and write
|
||
49780100C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780032C000
|
trusted library allocation
|
page read and write
|
||
497800EBC000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978011AC000
|
trusted library allocation
|
page read and write
|
||
762C002B8000
|
trusted library allocation
|
page read and write
|
||
49780073C000
|
trusted library allocation
|
page read and write
|
||
20EA8BD1000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA8BB0000
|
trusted library section
|
page read and write
|
||
D6057FE000
|
unkown
|
page readonly
|
||
497800294000
|
trusted library allocation
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
20EA42A5000
|
heap
|
page read and write
|
||
20EA4490000
|
trusted library section
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
497800CFA000
|
trusted library allocation
|
page read and write
|
||
7A5C000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
4978012A4000
|
trusted library allocation
|
page read and write
|
||
4978006FC000
|
trusted library allocation
|
page read and write
|
||
497800894000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
72DE000
|
heap
|
page read and write
|
||
4978002E7000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
7AFC000
|
heap
|
page read and write
|
||
20EAA770000
|
trusted library section
|
page read and write
|
||
4978002A8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001E0000
|
trusted library allocation
|
page read and write
|
||
D6707FE000
|
unkown
|
page readonly
|
||
4978004C0000
|
trusted library allocation
|
page read and write
|
||
49780075C000
|
trusted library allocation
|
page read and write
|
||
74B1000
|
heap
|
page read and write
|
||
497800454000
|
trusted library allocation
|
page read and write
|
||
762C00884000
|
trusted library allocation
|
page read and write
|
||
497800494000
|
trusted library allocation
|
page read and write
|
||
20EA0AA0000
|
trusted library section
|
page readonly
|
||
497800E64000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
497800454000
|
trusted library allocation
|
page read and write
|
||
20EAA63E000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00601000
|
trusted library allocation
|
page read and write
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
7B4B000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978007BC000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C007AC000
|
trusted library allocation
|
page read and write
|
||
497800524000
|
trusted library allocation
|
page read and write
|
||
7BBD000
|
heap
|
page read and write
|
||
73B1000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497801198000
|
trusted library allocation
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
497800AF8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
37D000
|
stack
|
page read and write
|
||
762C008B8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
497800F3C000
|
trusted library allocation
|
page read and write
|
||
762C00880000
|
trusted library allocation
|
page read and write
|
||
582C002A0000
|
trusted library allocation
|
page read and write
|
||
20EA3D16000
|
heap
|
page read and write
|
||
497800F68000
|
trusted library allocation
|
page read and write
|
||
49780076C000
|
trusted library allocation
|
page read and write
|
||
762C00920000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978012C4000
|
trusted library allocation
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
20EA08EE000
|
heap
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
D604FFD000
|
stack
|
page read and write
|
||
497800054000
|
trusted library allocation
|
page read and write
|
||
7C19000
|
heap
|
page read and write
|
||
20EA4240000
|
heap
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
20EA2560000
|
heap
|
page read and write
|
||
D663FFE000
|
stack
|
page read and write
|
||
4978005B0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7120000
|
direct allocation
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
20EAA43C000
|
trusted library section
|
page read and write
|
||
4978009E0000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
762C0027C000
|
trusted library allocation
|
page read and write
|
||
20EA42BA000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
5DE000210000
|
direct allocation
|
page read and write
|
||
D60A7FE000
|
unkown
|
page readonly
|
||
7A51000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
582C00288000
|
trusted library allocation
|
page read and write
|
||
7C75000
|
heap
|
page read and write
|
||
7110000
|
direct allocation
|
page execute and read and write
|
||
4978001B4000
|
trusted library allocation
|
page read and write
|
||
582C002B0000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
D6757FE000
|
unkown
|
page readonly
|
||
762C008C4000
|
trusted library allocation
|
page read and write
|
||
497800C98000
|
trusted library allocation
|
page read and write
|
||
762C0084C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C006F0000
|
trusted library allocation
|
page read and write
|
||
D609FFD000
|
stack
|
page read and write
|
||
582C00201000
|
trusted library allocation
|
page read and write
|
||
497800228000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
43C000
|
stack
|
page read and write
|
||
7B1D000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
7BDA000
|
heap
|
page read and write
|
||
5DE000201000
|
direct allocation
|
page read and write
|
||
762C007C0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497801048000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800CD0000
|
trusted library allocation
|
page read and write
|
||
497800658000
|
trusted library allocation
|
page read and write
|
||
20EA4285000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
762C00904000
|
trusted library allocation
|
page read and write
|
||
762C00288000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7A58000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7B06000
|
heap
|
page read and write
|
||
4978001D4000
|
trusted library allocation
|
page read and write
|
||
49780015C000
|
trusted library allocation
|
page read and write
|
||
D6657FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
497800C2C000
|
trusted library allocation
|
page read and write
|
||
20EA08AC000
|
heap
|
page read and write
|
||
4978003A4000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
4978008A0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
582C002C0000
|
trusted library allocation
|
page read and write
|
||
7A56000
|
heap
|
page read and write
|
||
D6017FC000
|
stack
|
page read and write
|
||
497800868000
|
trusted library allocation
|
page read and write
|
||
20EA3D0A000
|
heap
|
page read and write
|
||
ABD000
|
heap
|
page read and write
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
6C70D000
|
unkown
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
497800BA8000
|
trusted library allocation
|
page read and write
|
||
5DE000290000
|
direct allocation
|
page read and write
|
||
D60FFFE000
|
stack
|
page read and write
|
||
497800370000
|
trusted library allocation
|
page read and write
|
||
497800294000
|
trusted library allocation
|
page read and write
|
||
762C006E8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00424000
|
trusted library allocation
|
page read and write
|
||
49780014C000
|
trusted library allocation
|
page read and write
|
||
582C002C0000
|
trusted library allocation
|
page read and write
|
||
762C00860000
|
trusted library allocation
|
page read and write
|
||
582C00264000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800CD0000
|
trusted library allocation
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800E70000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978011E0000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
7A5E000
|
heap
|
page read and write
|
||
497800634000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
20EA3D13000
|
heap
|
page read and write
|
||
762C00230000
|
trusted library allocation
|
page read and write
|
||
4978009E0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
D678FFD000
|
stack
|
page read and write
|
||
4978001DC000
|
trusted library allocation
|
page read and write
|
||
5DE0002D0000
|
direct allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
D6767FE000
|
unkown
|
page readonly
|
||
20EA3D13000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA3D14000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00818000
|
trusted library allocation
|
page read and write
|
||
497800EDC000
|
trusted library allocation
|
page read and write
|
||
7A56000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
20EA07F0000
|
heap
|
page read and write
|
||
497800FA8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001F4000
|
trusted library allocation
|
page read and write
|
||
7B56000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800C1C000
|
trusted library allocation
|
page read and write
|
||
D6077FE000
|
unkown
|
page readonly
|
||
762C002F4000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
762C00210000
|
trusted library allocation
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
497800A48000
|
trusted library allocation
|
page read and write
|
||
7BA5000
|
heap
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
D6687FE000
|
unkown
|
page readonly
|
||
497800D68000
|
trusted library allocation
|
page read and write
|
||
582C002F8000
|
trusted library allocation
|
page read and write
|
||
582C002F0000
|
trusted library allocation
|
page read and write
|
||
D6777FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
7DBA000
|
heap
|
page read and write
|
||
4978008D0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497801104000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
4978002BA000
|
trusted library allocation
|
page read and write
|
||
762C00728000
|
trusted library allocation
|
page read and write
|
||
497800690000
|
trusted library allocation
|
page read and write
|
||
582C002C0000
|
trusted library allocation
|
page read and write
|
||
7A54000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
4978005D4000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
497800C0C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
762C00844000
|
trusted library allocation
|
page read and write
|
||
582C00235000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978002F0000
|
trusted library allocation
|
page read and write
|
||
582C002B0000
|
trusted library allocation
|
page read and write
|
||
20EA8B91000
|
trusted library section
|
page read and write
|
||
497800370000
|
trusted library allocation
|
page read and write
|
||
20EA427A000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978011F4000
|
trusted library allocation
|
page read and write
|
||
497801130000
|
trusted library allocation
|
page read and write
|
||
49780072A000
|
trusted library allocation
|
page read and write
|
||
7D04000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
497800E4C000
|
trusted library allocation
|
page read and write
|
||
20EA2563000
|
heap
|
page read and write
|
||
762C00918000
|
trusted library allocation
|
page read and write
|
||
16AA000
|
unkown
|
page write copy
|
||
497800C88000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
762C00248000
|
trusted library allocation
|
page read and write
|
||
D671FFE000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
4978009E0000
|
trusted library allocation
|
page read and write
|
||
497800C54000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C002ED000
|
trusted library allocation
|
page read and write
|
||
49780006C000
|
trusted library allocation
|
page read and write
|
||
497800A60000
|
trusted library allocation
|
page read and write
|
||
D611FFE000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7A51000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
497800078000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
4978006A4000
|
trusted library allocation
|
page read and write
|
||
497800214000
|
trusted library allocation
|
page read and write
|
||
7BCC000
|
heap
|
page read and write
|
||
497800334000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978001AC000
|
trusted library allocation
|
page read and write
|
||
20EA4275000
|
heap
|
page read and write
|
||
6C75C000
|
unkown
|
page readonly
|
||
7A50000
|
heap
|
page read and write
|
||
497800A01000
|
trusted library allocation
|
page read and write
|
||
5DE000260000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800060000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
497800601000
|
trusted library allocation
|
page read and write
|
||
497800D70000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
20EAA920000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
5DE000274000
|
direct allocation
|
page read and write
|
||
7A51000
|
heap
|
page read and write
|
||
762C0020C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D67B7FC000
|
stack
|
page read and write
|
||
762C006AC000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7BFE000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
D67DFFE000
|
unkown
|
page readonly
|
||
47E000
|
unkown
|
page read and write
|
||
4978009E0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780040C000
|
trusted library allocation
|
page read and write
|
||
D667FFD000
|
stack
|
page read and write
|
||
D66FFFE000
|
stack
|
page read and write
|
||
497800360000
|
trusted library allocation
|
page read and write
|
||
497800294000
|
trusted library allocation
|
page read and write
|
||
497800A80000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7A56000
|
heap
|
page read and write
|
||
6EC0000
|
direct allocation
|
page read and write
|
||
762C008F0000
|
trusted library allocation
|
page read and write
|
||
D67C7FB000
|
stack
|
page read and write
|
||
7AF7000
|
heap
|
page read and write
|
||
D679FFE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA3D0A000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800BC4000
|
trusted library allocation
|
page read and write
|
||
7B2D000
|
heap
|
page read and write
|
||
D677FFE000
|
stack
|
page read and write
|
||
20EA3D21000
|
heap
|
page read and write
|
||
34A0000
|
direct allocation
|
page read and write
|
||
497800128000
|
trusted library allocation
|
page read and write
|
||
7C6F000
|
heap
|
page read and write
|
||
7D53000
|
heap
|
page read and write
|
||
49780120C000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
7A5F000
|
heap
|
page read and write
|
||
49780030C000
|
trusted library allocation
|
page read and write
|
||
497800FE0000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
497800AE8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA430A000
|
heap
|
page read and write
|
||
7A51000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
A00000
|
direct allocation
|
page read and write
|
||
582C00294000
|
trusted library allocation
|
page read and write
|
||
4978009E0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C008E8000
|
trusted library allocation
|
page read and write
|
||
49780054C000
|
trusted library allocation
|
page read and write
|
||
7BBA000
|
heap
|
page read and write
|
||
497800CD0000
|
trusted library allocation
|
page read and write
|
||
20EA82FE000
|
heap
|
page read and write
|
||
762C002D4000
|
trusted library allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497801140000
|
trusted library allocation
|
page read and write
|
||
7A5A000
|
heap
|
page read and write
|
||
4978002A4000
|
trusted library allocation
|
page read and write
|
||
D6727FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
497800B90000
|
trusted library allocation
|
page read and write
|
||
7B11000
|
heap
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
762C006E8000
|
trusted library allocation
|
page read and write
|
||
497800938000
|
trusted library allocation
|
page read and write
|
||
4978009B8000
|
trusted library allocation
|
page read and write
|
||
D6677FE000
|
unkown
|
page readonly
|
||
7A53000
|
heap
|
page read and write
|
||
497800320000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800742000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
620000
|
heap
|
page read and write
|
||
20EA84D2000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D60BFFE000
|
stack
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EA088D000
|
heap
|
page read and write
|
||
7BD0000
|
heap
|
page read and write
|
||
4978004A0000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
7A50000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
497800624000
|
trusted library allocation
|
page read and write
|
||
5DE000280000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800AD4000
|
trusted library allocation
|
page read and write
|
||
497800C80000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
A3C000
|
stack
|
page read and write
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
7A57000
|
heap
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
497800CC0000
|
trusted library allocation
|
page read and write
|
||
497800E58000
|
trusted library allocation
|
page read and write
|
||
762C006C8000
|
trusted library allocation
|
page read and write
|
||
762C007BC000
|
trusted library allocation
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
497800EE8000
|
trusted library allocation
|
page read and write
|
||
497800588000
|
trusted library allocation
|
page read and write
|
||
762C00828000
|
trusted library allocation
|
page read and write
|
||
3BA000
|
stack
|
page read and write
|
||
497800E40000
|
trusted library allocation
|
page read and write
|
||
497800EB8000
|
trusted library allocation
|
page read and write
|
||
49780021C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978002B4000
|
trusted library allocation
|
page read and write
|
||
20EA42C0000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
7B59000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
6A41000
|
heap
|
page read and write
|
||
49780000C000
|
trusted library allocation
|
page read and write
|
||
49780009E000
|
trusted library allocation
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
49780032C000
|
trusted library allocation
|
page read and write
|
||
762C00430000
|
trusted library allocation
|
page read and write
|
||
4978001B4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D608FFE000
|
stack
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
497800E28000
|
trusted library allocation
|
page read and write
|
||
D66E7FE000
|
unkown
|
page readonly
|
||
6A41000
|
heap
|
page read and write
|
||
497800784000
|
trusted library allocation
|
page read and write
|
||
49780060C000
|
trusted library allocation
|
page read and write
|
||
49780110C000
|
trusted library allocation
|
page read and write
|
||
7BD5000
|
heap
|
page read and write
|
||
49780032C000
|
trusted library allocation
|
page read and write
|
||
D60E7FE000
|
unkown
|
page readonly
|
||
497800E88000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
4978011C0000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
A00000
|
direct allocation
|
page read and write
|
||
497800E4C000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
497800384000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
7B19000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page read and write
|
||
497800300000
|
trusted library allocation
|
page read and write
|
||
497800CA4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EAA716000
|
trusted library section
|
page read and write
|
||
762C006D4000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
D605FFD000
|
stack
|
page read and write
|
||
20EA9E62000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978002C0000
|
trusted library allocation
|
page read and write
|
||
7A51000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
4978002F4000
|
trusted library allocation
|
page read and write
|
||
497800CD0000
|
trusted library allocation
|
page read and write
|
||
20EA3D21000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
4978001EC000
|
trusted library allocation
|
page read and write
|
||
762C002CC000
|
trusted library allocation
|
page read and write
|
||
4978012A8000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
497800D98000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
D6087FE000
|
unkown
|
page readonly
|
||
497800708000
|
trusted library allocation
|
page read and write
|
||
4978001F8000
|
trusted library allocation
|
page read and write
|
||
D66C7FE000
|
unkown
|
page readonly
|
||
20EAA632000
|
trusted library section
|
page read and write
|
||
7B90000
|
heap
|
page read and write
|
||
49780030C000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page execute and read and write
|
||
762C00960000
|
trusted library allocation
|
page read and write
|
||
D60DFFC000
|
stack
|
page read and write
|
||
20EA8AE7000
|
unclassified section
|
page read and write
|
||
20EA41F0000
|
trusted library section
|
page read and write
|
||
D67A7FB000
|
stack
|
page read and write
|
||
5DE0002E4000
|
direct allocation
|
page read and write
|
||
49780050B000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
73AA000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EAA040000
|
trusted library section
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
D66CFFA000
|
stack
|
page read and write
|
||
762C0078C000
|
trusted library allocation
|
page read and write
|
||
49780016C000
|
trusted library allocation
|
page read and write
|
||
582C002BC000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
D6747FE000
|
unkown
|
page readonly
|
||
497800EF8000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C00790000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
762C0070C000
|
trusted library allocation
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
497800F68000
|
trusted library allocation
|
page read and write
|
||
7BFE000
|
heap
|
page read and write
|
||
762C0079C000
|
trusted library allocation
|
page read and write
|
||
762C00974000
|
trusted library allocation
|
page read and write
|
||
497801068000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
497800D84000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
497801048000
|
trusted library allocation
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
497800A3C000
|
trusted library allocation
|
page read and write
|
||
497800EE8000
|
trusted library allocation
|
page read and write
|
||
497800340000
|
trusted library allocation
|
page read and write
|
||
497800BA0000
|
trusted library allocation
|
page read and write
|
||
4978000A0000
|
trusted library allocation
|
page read and write
|
||
497800134000
|
trusted library allocation
|
page read and write
|
||
497800C01000
|
trusted library allocation
|
page read and write
|
||
75E6000
|
direct allocation
|
page read and write
|
||
47E000
|
unkown
|
page write copy
|
||
AB1000
|
heap
|
page read and write
|
||
77B3000
|
heap
|
page read and write
|
||
497800E4C000
|
trusted library allocation
|
page read and write
|
||
497800318000
|
trusted library allocation
|
page read and write
|
||
4978009EC000
|
trusted library allocation
|
page read and write
|
||
7BAE000
|
heap
|
page read and write
|
||
7A52000
|
heap
|
page read and write
|
||
762C008A8000
|
trusted library allocation
|
page read and write
|
||
20EA9EA3000
|
trusted library section
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
D0C000
|
stack
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
20EAAD50000
|
trusted library section
|
page read and write
|
||
D6667FE000
|
unkown
|
page readonly
|
There are 1306 hidden memdumps, click here to show them.