IOC Report
WzyLDvldFI.exe

loading gif

Files

File Path
Type
Category
Malicious
WzyLDvldFI.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WzyLDvldFI.exe_a54aa1fee38d284768e03e1ada8872cdd998cc94_beb75ad8_2b4793ab-b5f8-4bbb-8ce5-a01edd85ccb3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59D4.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:39:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B5C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B8C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WzyLDvldFI.exe
"C:\Users\user\Desktop\WzyLDvldFI.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2256,i,8855744801463954800,14578922760294507823,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6540 -s 1304
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/5055W
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://drive.google.com/e.MainFrame
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
http://anglebug.com/7488Q
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/3832c
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certsIx
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/3965_
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://www.google.com/Char:i3
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore?hl=enB
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
http://anglebug.com/8229a
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/4836%
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/4551X
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://chrome.google.com/webstore?hl=enng
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://drive.google.com/ribute-policy
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://docs.google.com/spreadsheets/?usp=installed_webappxI
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.21.36
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
ProgramId
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
FileId
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
LowerCaseLongPath
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
LongPathHash
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
Name
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
OriginalFileName
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
Publisher
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
Version
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
BinFileVersion
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
BinaryType
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
ProductName
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
ProductVersion
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
LinkDate
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
BinProductVersion
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
AppxPackageFullName
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
AppxPackageRelativeId
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
Size
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
Language
\REGISTRY\A\{37a7419f-b3a0-d7be-f745-4064284fd57c}\Root\InventoryApplicationFile\wzyldvldfi.exe|b128d05cfa4ce6c8
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
47A000
unkown
page readonly
6C758000
unkown
page readonly
D669FFC000
stack
page read and write
6A41000
heap
page read and write
762C00801000
trusted library allocation
page read and write
D6107FE000
unkown
page readonly
7B98000
heap
page read and write
6A41000
heap
page read and write
762C00980000
trusted library allocation
page read and write
6A41000
heap
page read and write
20EA42C3000
heap
page read and write
6A41000
heap
page read and write
D6697FE000
unkown
page readonly
1A70000
heap
page read and write
D665FFE000
stack
page read and write
497800DEC000
trusted library allocation
page read and write
7751000
heap
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
497800C80000
trusted library allocation
page read and write
20EAA92E000
trusted library section
page read and write
470000
unkown
page readonly
497800118000
trusted library allocation
page read and write
F81000
unkown
page execute and write copy
6A41000
heap
page read and write
20EA2FB0000
unkown
page read and write
6A41000
heap
page read and write
4978000A8000
trusted library allocation
page read and write
49780032C000
trusted library allocation
page read and write
1A2C000
unkown
page execute and write copy
AC3000
heap
page read and write
497800BBC000
trusted library allocation
page read and write
7B3A000
heap
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
4978011C8000
trusted library allocation
page read and write
47A000
unkown
page readonly
762C002F0000
trusted library allocation
page read and write
7DE000
stack
page read and write
497800DB4000
trusted library allocation
page read and write
17A0000
heap
page read and write
47A000
unkown
page readonly
762C0039C000
trusted library allocation
page read and write
D6127FE000
unkown
page readonly
D60CFFA000
stack
page read and write
6A41000
heap
page read and write
7B58000
heap
page read and write
4978002B4000
trusted library allocation
page read and write
5DE000303000
direct allocation
page read and write
20EA82B0000
heap
page read and write
497800DC0000
trusted library allocation
page read and write
6A41000
heap
page read and write
481000
unkown
page readonly
5DE0002EC000
direct allocation
page read and write
4978010A4000
trusted library allocation
page read and write
497800D90000
trusted library allocation
page read and write
497800E4C000
trusted library allocation
page read and write
D601FFE000
unkown
page readonly
D60C7FE000
unkown
page readonly
497800F78000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978007A4000
trusted library allocation
page read and write
7CA4000
heap
page read and write
4978012A4000
trusted library allocation
page read and write
D67FFFE000
unkown
page readonly
20EA42B7000
heap
page read and write
6A41000
heap
page read and write
762C008E4000
trusted library allocation
page read and write
68C000
stack
page read and write
20EA427E000
heap
page read and write
6A41000
heap
page read and write
C5C000
stack
page read and write
582C002C0000
trusted library allocation
page read and write
497800499000
trusted library allocation
page read and write
4978006D8000
trusted library allocation
page read and write
5DE000250000
direct allocation
page read and write
6A41000
heap
page read and write
497800454000
trusted library allocation
page read and write
7AF7000
heap
page read and write
440000
heap
page read and write
460000
heap
page read and write
762C00864000
trusted library allocation
page read and write
D66F7FE000
unkown
page readonly
582C00278000
trusted library allocation
page read and write
7A59000
heap
page read and write
6A41000
heap
page read and write
D610FFE000
stack
page read and write
6A41000
heap
page read and write
4978001C8000
trusted library allocation
page read and write
49780017C000
trusted library allocation
page read and write
497800E01000
trusted library allocation
page read and write
DDE000
stack
page read and write
7140000
direct allocation
page execute and read and write
762C0095C000
trusted library allocation
page read and write
7A5F000
heap
page read and write
497800340000
trusted library allocation
page read and write
7B94000
heap
page read and write
497800294000
trusted library allocation
page read and write
497800958000
trusted library allocation
page read and write
47E000
unkown
page write copy
6A41000
heap
page read and write
497800AD4000
trusted library allocation
page read and write
174F000
stack
page read and write
F87000
heap
page read and write
762C00238000
trusted library allocation
page read and write
20EAA217000
unclassified section
page read and write
497800C50000
trusted library allocation
page read and write
7C01000
heap
page read and write
6C70F000
unkown
page readonly
20EA0AE5000
heap
page read and write
EF0000
heap
page read and write
6A41000
heap
page read and write
D672FFE000
stack
page read and write
6A41000
heap
page read and write
49780049C000
trusted library allocation
page read and write
582C002BC000
trusted library allocation
page read and write
D66BFFB000
stack
page read and write
497800EDC000
trusted library allocation
page read and write
74BC000
heap
page read and write
481000
unkown
page readonly
5DE000230000
direct allocation
page read and write
20EA42DC000
heap
page read and write
4978007E0000
trusted library allocation
page read and write
582C00230000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978000E0000
trusted library allocation
page read and write
4978006D8000
trusted library allocation
page read and write
497800CB4000
trusted library allocation
page read and write
762C00948000
trusted library allocation
page read and write
20EA9F22000
trusted library section
page read and write
7A55000
heap
page read and write
20EA4340000
trusted library section
page read and write
762C008F4000
trusted library allocation
page read and write
762C0039C000
trusted library allocation
page read and write
20EA89D7000
unclassified section
page read and write
762C008B4000
trusted library allocation
page read and write
AB5000
heap
page read and write
7B9B000
heap
page read and write
6A41000
heap
page read and write
20EA9E50000
trusted library section
page read and write
497800001000
trusted library allocation
page read and write
4978006E8000
trusted library allocation
page read and write
762C002FC000
trusted library allocation
page read and write
47E000
unkown
page read and write
6A41000
heap
page read and write
49780090C000
trusted library allocation
page read and write
20EA3D0F000
heap
page read and write
497800334000
trusted library allocation
page read and write
27AE000
unkown
page read and write
497800098000
trusted library allocation
page read and write
4978004A0000
trusted library allocation
page read and write
497800EA4000
trusted library allocation
page read and write
4978005E8000
trusted library allocation
page read and write
497800730000
trusted library allocation
page read and write
4978001AC000
trusted library allocation
page read and write
762C00964000
trusted library allocation
page read and write
4978006C4000
trusted library allocation
page read and write
497800BCC000
trusted library allocation
page read and write
582C002A0000
trusted library allocation
page read and write
D60EFFE000
stack
page read and write
AB1000
heap
page read and write
20EA8BC0000
trusted library section
page read and write
6A41000
heap
page read and write
A5C000
stack
page read and write
6A41000
heap
page read and write
AB5000
heap
page read and write
762C00868000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800F48000
trusted library allocation
page read and write
497800EE8000
trusted library allocation
page read and write
762C00878000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
49780020C000
trusted library allocation
page read and write
7C40000
heap
page read and write
6C631000
unkown
page execute read
6A41000
heap
page read and write
6A41000
heap
page read and write
A00000
direct allocation
page read and write
7B7B000
heap
page read and write
762C007C4000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
7A55000
heap
page read and write
762C0071C000
trusted library allocation
page read and write
497801068000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
6A41000
heap
page read and write
497800CC0000
trusted library allocation
page read and write
762C00201000
trusted library allocation
page read and write
5DE000220000
direct allocation
page read and write
497800C78000
trusted library allocation
page read and write
497801080000
trusted library allocation
page read and write
F17000
heap
page read and write
762C00250000
trusted library allocation
page read and write
5DE0002DC000
direct allocation
page read and write
20EA3D1C000
heap
page read and write
497800CC0000
trusted library allocation
page read and write
497800984000
trusted library allocation
page read and write
D60F7FE000
unkown
page readonly
6A41000
heap
page read and write
4978001B4000
trusted library allocation
page read and write
289F000
stack
page read and write
6A41000
heap
page read and write
6E80000
trusted library allocation
page read and write
471000
unkown
page execute read
7A58000
heap
page read and write
D606FFE000
stack
page read and write
20EA07D0000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800FF0000
trusted library allocation
page read and write
497800184000
trusted library allocation
page read and write
20EA0690000
heap
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
D661FEF000
stack
page read and write
7D29000
heap
page read and write
AA8000
heap
page read and write
762C00778000
trusted library allocation
page read and write
497800B24000
trusted library allocation
page read and write
7B22000
heap
page read and write
4978009AF000
trusted library allocation
page read and write
20EA42D2000
heap
page read and write
481000
unkown
page readonly
4978002F4000
trusted library allocation
page read and write
7A58000
heap
page read and write
497800EBC000
trusted library allocation
page read and write
7130000
direct allocation
page execute and read and write
762C006AC000
trusted library allocation
page read and write
6A41000
heap
page read and write
E0E000
stack
page read and write
7CBB000
heap
page read and write
47A000
unkown
page readonly
497800401000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800EB4000
trusted library allocation
page read and write
582C002BC000
trusted library allocation
page read and write
D67D7FC000
stack
page read and write
F10000
heap
page read and write
497800F20000
trusted library allocation
page read and write
497800B0C000
trusted library allocation
page read and write
20EAA8F7000
unclassified section
page read and write
762C006E0000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C00898000
trusted library allocation
page read and write
497800394000
trusted library allocation
page read and write
7A5D000
heap
page read and write
F80000
heap
page read and write
497800AD4000
trusted library allocation
page read and write
75E4000
direct allocation
page read and write
497800C68000
trusted library allocation
page read and write
497801074000
trusted library allocation
page read and write
7A54000
heap
page read and write
7D48000
heap
page read and write
D600FFE000
unkown
page readonly
6A41000
heap
page read and write
20EA07B0000
heap
page read and write
D662FFE000
unkown
page read and write
5DE00024C000
direct allocation
page read and write
582C00274000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978001D0000
trusted library allocation
page read and write
7A55000
heap
page read and write
497800210000
trusted library allocation
page read and write
497800370000
trusted library allocation
page read and write
4978001A0000
trusted library allocation
page read and write
D66D7FE000
unkown
page readonly
4978004A0000
trusted library allocation
page read and write
497800300000
trusted library allocation
page read and write
6A41000
heap
page read and write
49780087C000
trusted library allocation
page read and write
7BE1000
heap
page read and write
481000
unkown
page readonly
762C00220000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
20EA9F60000
trusted library section
page read and write
497800198000
trusted library allocation
page read and write
D66A7FE000
unkown
page readonly
497800FA8000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
497800508000
trusted library allocation
page read and write
AB1000
heap
page read and write
470000
unkown
page readonly
6A41000
heap
page read and write
49780032C000
trusted library allocation
page read and write
7B72000
heap
page read and write
497800AC8000
trusted library allocation
page read and write
7A5E000
heap
page read and write
6A41000
heap
page read and write
497800220000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800CF0000
trusted library allocation
page read and write
D66AFFE000
stack
page read and write
D67CFFE000
unkown
page readonly
497800454000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800A1C000
trusted library allocation
page read and write
7B32000
heap
page read and write
7B52000
heap
page read and write
4978001B4000
trusted library allocation
page read and write
6A41000
heap
page read and write
D676FFE000
stack
page read and write
7140000
direct allocation
page execute and read and write
20EA8B80000
trusted library section
page read and write
7A59000
heap
page read and write
20EA3CF0000
heap
page read and write
6A41000
heap
page read and write
47E000
unkown
page write copy
7BF6000
heap
page read and write
20EA8BE3000
heap
page read and write
20EAAB27000
unclassified section
page read and write
47A000
unkown
page readonly
6A41000
heap
page read and write
497801001000
trusted library allocation
page read and write
762C00408000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
5DE00020C000
direct allocation
page read and write
49780059C000
trusted library allocation
page read and write
D6067FE000
unkown
page readonly
2A30000
heap
page read and write
6A41000
heap
page read and write
497800370000
trusted library allocation
page read and write
49780029A000
trusted library allocation
page read and write
762C0025C000
trusted library allocation
page read and write
6A41000
heap
page read and write
20EA0790000
heap
page read and write
7B31000
heap
page read and write
7140000
direct allocation
page execute and read and write
6A41000
heap
page read and write
49780008E000
trusted library allocation
page read and write
1250000
heap
page read and write
471000
unkown
page execute read
582C00248000
trusted library allocation
page read and write
6C759000
unkown
page read and write
D60AFFE000
stack
page read and write
6A41000
heap
page read and write
497801120000
trusted library allocation
page read and write
6A41000
heap
page read and write
7140000
direct allocation
page execute and read and write
4978007DB000
trusted library allocation
page read and write
73A0000
heap
page read and write
762C0085C000
trusted library allocation
page read and write
582C002E4000
trusted library allocation
page read and write
D60D7FE000
unkown
page readonly
582C002BC000
trusted library allocation
page read and write
20EA0770000
heap
page readonly
6A41000
heap
page read and write
762C00874000
trusted library allocation
page read and write
762C00788000
trusted library allocation
page read and write
497800E7C000
trusted library allocation
page read and write
6A41000
heap
page read and write
7140000
direct allocation
page execute and read and write
471000
unkown
page execute read
EDC000
stack
page read and write
D666FFE000
stack
page read and write
6A41000
heap
page read and write
20EA3CE0000
heap
page read and write
497800FD0000
trusted library allocation
page read and write
5DE0002AC000
direct allocation
page read and write
D66EFFC000
stack
page read and write
497800CC0000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978009E0000
trusted library allocation
page read and write
F80000
unkown
page readonly
6A41000
heap
page read and write
582C00270000
trusted library allocation
page read and write
762C007D4000
trusted library allocation
page read and write
20EA42B4000
heap
page read and write
108F000
stack
page read and write
497800F04000
trusted library allocation
page read and write
497800D60000
trusted library allocation
page read and write
4978009D0000
trusted library allocation
page read and write
49780091C000
trusted library allocation
page read and write
582C002C0000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
1270000
heap
page read and write
497800FD0000
trusted library allocation
page read and write
7CEF000
heap
page read and write
762C008D8000
trusted library allocation
page read and write
497800B18000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
73E000
stack
page read and write
7BBC000
heap
page read and write
D603FFD000
stack
page read and write
497800546000
trusted library allocation
page read and write
20EA432A000
heap
page read and write
497800394000
trusted library allocation
page read and write
20EAA430000
trusted library section
page read and write
AB5000
heap
page read and write
4978004A0000
trusted library allocation
page read and write
20EAAB50000
trusted library section
page read and write
4978004A0000
trusted library allocation
page read and write
7C53000
heap
page read and write
49780100C000
trusted library allocation
page read and write
998000
heap
page read and write
497800298000
trusted library allocation
page read and write
1597000
heap
page read and write
582C00238000
trusted library allocation
page read and write
7B9D000
heap
page read and write
6A41000
heap
page read and write
2850000
heap
page read and write
582C00260000
trusted library allocation
page read and write
C60000
heap
page read and write
471000
unkown
page execute read
D6007FC000
stack
page read and write
282E000
stack
page read and write
470000
unkown
page readonly
777000
heap
page read and write
6A41000
heap
page read and write
582C002D8000
trusted library allocation
page read and write
470000
unkown
page readonly
6A41000
heap
page read and write
497800EC8000
trusted library allocation
page read and write
D67E7FD000
stack
page read and write
20EA8BA0000
trusted library section
page read and write
20EA42E4000
heap
page read and write
D6787FE000
unkown
page readonly
497800340000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978010A0000
trusted library allocation
page read and write
762C00700000
trusted library allocation
page read and write
20EA4303000
heap
page read and write
5DE000234000
direct allocation
page read and write
20EA42CC000
heap
page read and write
762C00248000
trusted library allocation
page read and write
470000
unkown
page readonly
4978001F0000
trusted library allocation
page read and write
760000
heap
page read and write
D6737FE000
unkown
page readonly
470000
unkown
page readonly
6A41000
heap
page read and write
7D7C000
heap
page read and write
AA7000
heap
page read and write
4978002B4000
trusted library allocation
page read and write
F70000
heap
page read and write
497800EDC000
trusted library allocation
page read and write
7480000
direct allocation
page read and write
F30000
heap
page read and write
497800290000
trusted library allocation
page read and write
497800454000
trusted library allocation
page read and write
497800541000
trusted library allocation
page read and write
762C007E0000
trusted library allocation
page read and write
762C00840000
trusted library allocation
page read and write
7851000
heap
page read and write
D6037FE000
unkown
page readonly
D670FFE000
stack
page read and write
4978001AC000
trusted library allocation
page read and write
762C00848000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
6A41000
heap
page read and write
34A0000
direct allocation
page read and write
497800201000
trusted library allocation
page read and write
762C006C8000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C0087C000
trusted library allocation
page read and write
4978007F0000
trusted library allocation
page read and write
762C006BC000
trusted library allocation
page read and write
D675FFE000
stack
page read and write
7BFA000
heap
page read and write
6A41000
heap
page read and write
582C00220000
trusted library allocation
page read and write
762C0081C000
trusted library allocation
page read and write
6A41000
heap
page read and write
582C002A0000
trusted library allocation
page read and write
20EA3D0F000
heap
page read and write
497800974000
trusted library allocation
page read and write
47E000
unkown
page read and write
147F000
stack
page read and write
78FC000
heap
page read and write
5DE000284000
direct allocation
page read and write
4978002F4000
trusted library allocation
page read and write
497800E4C000
trusted library allocation
page read and write
49780001C000
trusted library allocation
page read and write
762C002E4000
trusted library allocation
page read and write
6A41000
heap
page read and write
20EA08A6000
heap
page read and write
20EA3D0F000
heap
page read and write
6A41000
heap
page read and write
13FC000
stack
page read and write
C3C000
stack
page read and write
582C00250000
trusted library allocation
page read and write
497800670000
trusted library allocation
page read and write
49780034C000
trusted library allocation
page read and write
497800854000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800354000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978001E4000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978000D0000
trusted library allocation
page read and write
7B60000
heap
page read and write
762C0091C000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800A88000
trusted library allocation
page read and write
6A41000
heap
page read and write
5E0000
heap
page read and write
47A000
unkown
page readonly
AB5000
heap
page read and write
762C007E4000
trusted library allocation
page read and write
20EAA673000
trusted library section
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
7140000
direct allocation
page execute and read and write
4978001C4000
trusted library allocation
page read and write
7A5D000
heap
page read and write
4978007D7000
trusted library allocation
page read and write
6A41000
heap
page read and write
582C002F4000
trusted library allocation
page read and write
471000
unkown
page execute read
D668FFB000
stack
page read and write
762C002B0000
trusted library allocation
page read and write
20EA3D20000
heap
page read and write
762C0080C000
trusted library allocation
page read and write
497800218000
trusted library allocation
page read and write
4978012B4000
trusted library allocation
page read and write
4978001E8000
trusted library allocation
page read and write
20EA07E0000
trusted library allocation
page read and write
6A41000
heap
page read and write
5DE000217000
direct allocation
page read and write
20EA8B50000
heap
page read and write
20EA3D1C000
heap
page read and write
28C0000
heap
page read and write
AC9000
heap
page read and write
497800CE0000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800FA0000
trusted library allocation
page read and write
D67BFFE000
unkown
page readonly
4978010D0000
trusted library allocation
page read and write
6A41000
heap
page read and write
A00000
direct allocation
page read and write
C8F000
stack
page read and write
4978008BC000
trusted library allocation
page read and write
471000
unkown
page execute read
D66B7FE000
unkown
page readonly
49780027C000
trusted library allocation
page read and write
49780074C000
trusted library allocation
page read and write
5DE000294000
direct allocation
page read and write
6A41000
heap
page read and write
D6047FE000
unkown
page readonly
6A41000
heap
page read and write
6A41000
heap
page read and write
D67F7FB000
stack
page read and write
7A5B000
heap
page read and write
20EA42B1000
heap
page read and write
762C00890000
trusted library allocation
page read and write
20EAAB5E000
trusted library section
page read and write
471000
unkown
page execute read
497800334000
trusted library allocation
page read and write
497800340000
trusted library allocation
page read and write
6A41000
heap
page read and write
AC1000
heap
page read and write
20EA4272000
heap
page read and write
497801030000
trusted library allocation
page read and write
6A41000
heap
page read and write
7140000
direct allocation
page execute and read and write
7DAB000
heap
page read and write
1EC000
stack
page read and write
497801094000
trusted library allocation
page read and write
762C006F4000
trusted library allocation
page read and write
4978005C0000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
470000
unkown
page readonly
582C002B0000
trusted library allocation
page read and write
497800D08000
trusted library allocation
page read and write
6A41000
heap
page read and write
7C17000
heap
page read and write
AB1000
heap
page read and write
20EA3D13000
heap
page read and write
DC0000
heap
page read and write
D607FFE000
stack
page read and write
20EA3F50000
heap
page read and write
497800F58000
trusted library allocation
page read and write
4978004A8000
trusted library allocation
page read and write
762C00418000
trusted library allocation
page read and write
497800F10000
trusted library allocation
page read and write
497800FD0000
trusted library allocation
page read and write
740000
heap
page read and write
497800230000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
B3F000
stack
page read and write
20EA0AE0000
heap
page read and write
7D06000
heap
page read and write
7A5E000
heap
page read and write
6A41000
heap
page read and write
4978001D8000
trusted library allocation
page read and write
497800EBC000
trusted library allocation
page read and write
20EAA732000
trusted library section
page read and write
762C00858000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
6A41000
heap
page read and write
497800D50000
trusted library allocation
page read and write
7A5F000
heap
page read and write
D60B7FE000
unkown
page readonly
D673FFA000
stack
page read and write
4978008F8000
trusted library allocation
page read and write
D602FFE000
stack
page read and write
762C0040C000
trusted library allocation
page read and write
6A41000
heap
page read and write
5DE00023C000
direct allocation
page read and write
ACD000
heap
page read and write
27EF000
unkown
page read and write
20EAA230000
trusted library section
page read and write
582C0020C000
trusted library allocation
page read and write
7B80000
heap
page read and write
4978011F8000
trusted library allocation
page read and write
762C00404000
trusted library allocation
page read and write
497800E34000
trusted library allocation
page read and write
D3F000
stack
page read and write
7140000
direct allocation
page execute and read and write
497801198000
trusted library allocation
page read and write
497800D3C000
trusted library allocation
page read and write
4978006F0000
trusted library allocation
page read and write
D67AFFE000
unkown
page readonly
D67EFFE000
unkown
page readonly
497800B90000
trusted library allocation
page read and write
497800518000
trusted library allocation
page read and write
49780020C000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C006AC000
trusted library allocation
page read and write
497800900000
trusted library allocation
page read and write
497800EDC000
trusted library allocation
page read and write
4978002F4000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978010B4000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800DA8000
trusted library allocation
page read and write
6A41000
heap
page read and write
20EA42A7000
heap
page read and write
497800801000
trusted library allocation
page read and write
4978000F0000
trusted library allocation
page read and write
20EA9E6E000
trusted library section
page read and write
6A41000
heap
page read and write
D6797FB000
stack
page read and write
497800B54000
trusted library allocation
page read and write
20EA9F2D000
trusted library section
page read and write
497800E0C000
trusted library allocation
page read and write
4978002F4000
trusted library allocation
page read and write
47E000
unkown
page read and write
6A41000
heap
page read and write
D674FFE000
stack
page read and write
497801214000
trusted library allocation
page read and write
582C002BC000
trusted library allocation
page read and write
20EA82E6000
heap
page read and write
497800828000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800A0C000
trusted library allocation
page read and write
4978002A8000
trusted library allocation
page read and write
D664FFE000
stack
page read and write
49780040C000
trusted library allocation
page read and write
5DE000215000
direct allocation
page read and write
4978002E0000
trusted library allocation
page read and write
497800CC0000
trusted library allocation
page read and write
7A50000
heap
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
470000
unkown
page readonly
6A41000
heap
page read and write
481000
unkown
page readonly
497800454000
trusted library allocation
page read and write
497800D48000
trusted library allocation
page read and write
6A41000
heap
page read and write
6C630000
unkown
page readonly
762C008EC000
trusted library allocation
page read and write
762C007A0000
trusted library allocation
page read and write
4978004E4000
trusted library allocation
page read and write
5B0000
heap
page read and write
20EA80A0000
trusted library allocation
page read and write
497800ED4000
trusted library allocation
page read and write
497801058000
trusted library allocation
page read and write
497800CE0000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800DE4000
trusted library allocation
page read and write
762C0082C000
trusted library allocation
page read and write
497800D20000
trusted library allocation
page read and write
5DE000270000
direct allocation
page read and write
D6027FE000
unkown
page readonly
6A41000
heap
page read and write
6A41000
heap
page read and write
AB5000
heap
page read and write
49780080C000
trusted library allocation
page read and write
762C00830000
trusted library allocation
page read and write
D6097FE000
unkown
page readonly
497800E94000
trusted library allocation
page read and write
6A41000
heap
page read and write
497801201000
trusted library allocation
page read and write
AC3000
heap
page read and write
497800A94000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
762C00894000
trusted library allocation
page read and write
7B61000
heap
page read and write
497800D32000
trusted library allocation
page read and write
20EAA016000
trusted library section
page read and write
20EAA73D000
trusted library section
page read and write
5DE0002A8000
direct allocation
page read and write
6A41000
heap
page read and write
20EA8BE0000
heap
page read and write
6A41000
heap
page read and write
4978001B4000
trusted library allocation
page read and write
7851000
heap
page read and write
49780022C000
trusted library allocation
page read and write
D6717FE000
unkown
page readonly
B90000
heap
page read and write
7A51000
heap
page read and write
4978011D0000
trusted library allocation
page read and write
497800F30000
trusted library allocation
page read and write
497800224000
trusted library allocation
page read and write
20EA0889000
heap
page read and write
471000
unkown
page execute read
497800725000
trusted library allocation
page read and write
4978002E3000
trusted library allocation
page read and write
7A52000
heap
page read and write
762C00401000
trusted library allocation
page read and write
AC3000
heap
page read and write
47E000
unkown
page write copy
762C008C8000
trusted library allocation
page read and write
6A41000
heap
page read and write
D66DFFB000
stack
page read and write
840000
heap
page read and write
6A41000
heap
page read and write
6B40000
trusted library allocation
page read and write
F40000
heap
page read and write
497800D00000
trusted library allocation
page read and write
E8F000
stack
page read and write
6A41000
heap
page read and write
497800320000
trusted library allocation
page read and write
497800298000
trusted library allocation
page read and write
20EA42AA000
heap
page read and write
20EA07F8000
heap
page read and write
582C002C8000
trusted library allocation
page read and write
1590000
heap
page read and write
120F000
stack
page read and write
6A41000
heap
page read and write
762C0060C000
trusted library allocation
page read and write
582C002A0000
trusted library allocation
page read and write
D6117FE000
unkown
page readonly
7A51000
heap
page read and write
68D000
stack
page read and write
E4E000
stack
page read and write
47A000
unkown
page readonly
47E000
unkown
page read and write
49780100C000
trusted library allocation
page read and write
6A41000
heap
page read and write
49780032C000
trusted library allocation
page read and write
497800EBC000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978011AC000
trusted library allocation
page read and write
762C002B8000
trusted library allocation
page read and write
49780073C000
trusted library allocation
page read and write
20EA8BD1000
trusted library section
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
20EA8BB0000
trusted library section
page read and write
D6057FE000
unkown
page readonly
497800294000
trusted library allocation
page read and write
497800340000
trusted library allocation
page read and write
20EA42A5000
heap
page read and write
20EA4490000
trusted library section
page read and write
125A000
heap
page read and write
497800CFA000
trusted library allocation
page read and write
7A5C000
heap
page read and write
6A41000
heap
page read and write
4978002F4000
trusted library allocation
page read and write
4978012A4000
trusted library allocation
page read and write
4978006FC000
trusted library allocation
page read and write
497800894000
trusted library allocation
page read and write
6A41000
heap
page read and write
72DE000
heap
page read and write
4978002E7000
trusted library allocation
page read and write
A3E000
stack
page read and write
4978002F4000
trusted library allocation
page read and write
7AFC000
heap
page read and write
20EAA770000
trusted library section
page read and write
4978002A8000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978001E0000
trusted library allocation
page read and write
D6707FE000
unkown
page readonly
4978004C0000
trusted library allocation
page read and write
49780075C000
trusted library allocation
page read and write
74B1000
heap
page read and write
497800454000
trusted library allocation
page read and write
762C00884000
trusted library allocation
page read and write
497800494000
trusted library allocation
page read and write
20EA0AA0000
trusted library section
page readonly
497800E64000
trusted library allocation
page read and write
D70000
heap
page read and write
497800454000
trusted library allocation
page read and write
20EAA63E000
trusted library section
page read and write
6A41000
heap
page read and write
762C00601000
trusted library allocation
page read and write
497800CC0000
trusted library allocation
page read and write
7B4B000
heap
page read and write
6A41000
heap
page read and write
4978007BC000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
6A41000
heap
page read and write
762C007AC000
trusted library allocation
page read and write
497800524000
trusted library allocation
page read and write
7BBD000
heap
page read and write
73B1000
heap
page read and write
6A41000
heap
page read and write
497801198000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
497800AF8000
trusted library allocation
page read and write
6A41000
heap
page read and write
6E80000
trusted library allocation
page read and write
37D000
stack
page read and write
762C008B8000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800CC0000
trusted library allocation
page read and write
990000
heap
page read and write
497800F3C000
trusted library allocation
page read and write
762C00880000
trusted library allocation
page read and write
582C002A0000
trusted library allocation
page read and write
20EA3D16000
heap
page read and write
497800F68000
trusted library allocation
page read and write
49780076C000
trusted library allocation
page read and write
762C00920000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
4978012C4000
trusted library allocation
page read and write
470000
unkown
page readonly
20EA08EE000
heap
page read and write
AD8000
heap
page read and write
D604FFD000
stack
page read and write
497800054000
trusted library allocation
page read and write
7C19000
heap
page read and write
20EA4240000
heap
page read and write
AA7000
heap
page read and write
20EA2560000
heap
page read and write
D663FFE000
stack
page read and write
4978005B0000
trusted library allocation
page read and write
6A41000
heap
page read and write
7120000
direct allocation
page execute and read and write
D60000
heap
page read and write
20EAA43C000
trusted library section
page read and write
4978009E0000
trusted library allocation
page read and write
471000
unkown
page execute read
762C0027C000
trusted library allocation
page read and write
20EA42BA000
heap
page read and write
D7E000
stack
page read and write
47A000
unkown
page readonly
5DE000210000
direct allocation
page read and write
D60A7FE000
unkown
page readonly
7A51000
heap
page read and write
6E80000
trusted library allocation
page read and write
582C00288000
trusted library allocation
page read and write
7C75000
heap
page read and write
7110000
direct allocation
page execute and read and write
4978001B4000
trusted library allocation
page read and write
582C002B0000
trusted library allocation
page read and write
770000
heap
page read and write
D6757FE000
unkown
page readonly
762C008C4000
trusted library allocation
page read and write
497800C98000
trusted library allocation
page read and write
762C0084C000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C006F0000
trusted library allocation
page read and write
D609FFD000
stack
page read and write
582C00201000
trusted library allocation
page read and write
497800228000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
A00000
direct allocation
page read and write
7140000
direct allocation
page execute and read and write
43C000
stack
page read and write
7B1D000
heap
page read and write
470000
unkown
page readonly
7BDA000
heap
page read and write
5DE000201000
direct allocation
page read and write
762C007C0000
trusted library allocation
page read and write
6A41000
heap
page read and write
497801048000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800CD0000
trusted library allocation
page read and write
497800658000
trusted library allocation
page read and write
20EA4285000
heap
page read and write
6A41000
heap
page read and write
7A50000
heap
page read and write
762C00904000
trusted library allocation
page read and write
762C00288000
trusted library allocation
page read and write
13E0000
heap
page read and write
7A58000
heap
page read and write
6A41000
heap
page read and write
7B06000
heap
page read and write
4978001D4000
trusted library allocation
page read and write
49780015C000
trusted library allocation
page read and write
D6657FE000
unkown
page readonly
6A41000
heap
page read and write
6A41000
heap
page read and write
D90000
heap
page read and write
497800C2C000
trusted library allocation
page read and write
20EA08AC000
heap
page read and write
4978003A4000
trusted library allocation
page read and write
47E000
unkown
page write copy
4978008A0000
trusted library allocation
page read and write
6A41000
heap
page read and write
582C002C0000
trusted library allocation
page read and write
7A56000
heap
page read and write
D6017FC000
stack
page read and write
497800868000
trusted library allocation
page read and write
20EA3D0A000
heap
page read and write
ABD000
heap
page read and write
582C002BC000
trusted library allocation
page read and write
6C70D000
unkown
page read and write
481000
unkown
page readonly
6A41000
heap
page read and write
497800BA8000
trusted library allocation
page read and write
5DE000290000
direct allocation
page read and write
D60FFFE000
stack
page read and write
497800370000
trusted library allocation
page read and write
497800294000
trusted library allocation
page read and write
762C006E8000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C00424000
trusted library allocation
page read and write
49780014C000
trusted library allocation
page read and write
582C002C0000
trusted library allocation
page read and write
762C00860000
trusted library allocation
page read and write
582C00264000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800CD0000
trusted library allocation
page read and write
481000
unkown
page readonly
6A41000
heap
page read and write
6A41000
heap
page read and write
497800E70000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978011E0000
trusted library allocation
page read and write
6FE000
stack
page read and write
7A5E000
heap
page read and write
497800634000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
20EA3D13000
heap
page read and write
762C00230000
trusted library allocation
page read and write
4978009E0000
trusted library allocation
page read and write
D80000
heap
page read and write
D678FFD000
stack
page read and write
4978001DC000
trusted library allocation
page read and write
5DE0002D0000
direct allocation
page read and write
471000
unkown
page execute read
D6767FE000
unkown
page readonly
20EA3D13000
heap
page read and write
6A41000
heap
page read and write
20EA3D14000
heap
page read and write
6A41000
heap
page read and write
762C00818000
trusted library allocation
page read and write
497800EDC000
trusted library allocation
page read and write
7A56000
heap
page read and write
9FC000
stack
page read and write
6A41000
heap
page read and write
481000
unkown
page readonly
20EA07F0000
heap
page read and write
497800FA8000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978001F4000
trusted library allocation
page read and write
7B56000
heap
page read and write
6A41000
heap
page read and write
497800C1C000
trusted library allocation
page read and write
D6077FE000
unkown
page readonly
762C002F4000
trusted library allocation
page read and write
4D0000
heap
page read and write
762C00210000
trusted library allocation
page read and write
497800340000
trusted library allocation
page read and write
497800A48000
trusted library allocation
page read and write
7BA5000
heap
page read and write
125E000
heap
page read and write
D6687FE000
unkown
page readonly
497800D68000
trusted library allocation
page read and write
582C002F8000
trusted library allocation
page read and write
582C002F0000
trusted library allocation
page read and write
D6777FE000
unkown
page readonly
6A41000
heap
page read and write
47A000
unkown
page readonly
6A41000
heap
page read and write
481000
unkown
page readonly
7DBA000
heap
page read and write
4978008D0000
trusted library allocation
page read and write
6A41000
heap
page read and write
497801104000
trusted library allocation
page read and write
7A50000
heap
page read and write
4978002BA000
trusted library allocation
page read and write
762C00728000
trusted library allocation
page read and write
497800690000
trusted library allocation
page read and write
582C002C0000
trusted library allocation
page read and write
7A54000
heap
page read and write
EF0000
heap
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
470000
unkown
page readonly
4978005D4000
trusted library allocation
page read and write
6B0000
heap
page read and write
497800C0C000
trusted library allocation
page read and write
6A41000
heap
page read and write
47E000
unkown
page write copy
762C00844000
trusted library allocation
page read and write
582C00235000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978002F0000
trusted library allocation
page read and write
582C002B0000
trusted library allocation
page read and write
20EA8B91000
trusted library section
page read and write
497800370000
trusted library allocation
page read and write
20EA427A000
heap
page read and write
6A41000
heap
page read and write
4978011F4000
trusted library allocation
page read and write
497801130000
trusted library allocation
page read and write
49780072A000
trusted library allocation
page read and write
7D04000
heap
page read and write
470000
unkown
page readonly
497800E4C000
trusted library allocation
page read and write
20EA2563000
heap
page read and write
762C00918000
trusted library allocation
page read and write
16AA000
unkown
page write copy
497800C88000
trusted library allocation
page read and write
630000
heap
page read and write
762C00248000
trusted library allocation
page read and write
D671FFE000
stack
page read and write
6A41000
heap
page read and write
471000
unkown
page execute read
4978009E0000
trusted library allocation
page read and write
497800C54000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C002ED000
trusted library allocation
page read and write
49780006C000
trusted library allocation
page read and write
497800A60000
trusted library allocation
page read and write
D611FFE000
stack
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
7A51000
heap
page read and write
A00000
direct allocation
page read and write
497800078000
trusted library allocation
page read and write
DA0000
heap
page read and write
4978006A4000
trusted library allocation
page read and write
497800214000
trusted library allocation
page read and write
7BCC000
heap
page read and write
497800334000
trusted library allocation
page read and write
6A41000
heap
page read and write
4978001AC000
trusted library allocation
page read and write
20EA4275000
heap
page read and write
6C75C000
unkown
page readonly
7A50000
heap
page read and write
497800A01000
trusted library allocation
page read and write
5DE000260000
direct allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
497800060000
trusted library allocation
page read and write
D90000
heap
page read and write
497800601000
trusted library allocation
page read and write
497800D70000
trusted library allocation
page read and write
450000
heap
page read and write
20EAA920000
trusted library section
page read and write
6A41000
heap
page read and write
5DE000274000
direct allocation
page read and write
7A51000
heap
page read and write
762C0020C000
trusted library allocation
page read and write
6A41000
heap
page read and write
D67B7FC000
stack
page read and write
762C006AC000
trusted library allocation
page read and write
6A41000
heap
page read and write
7BFE000
heap
page read and write
481000
unkown
page readonly
D67DFFE000
unkown
page readonly
47E000
unkown
page read and write
4978009E0000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
49780040C000
trusted library allocation
page read and write
D667FFD000
stack
page read and write
D66FFFE000
stack
page read and write
497800360000
trusted library allocation
page read and write
497800294000
trusted library allocation
page read and write
497800A80000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
7A56000
heap
page read and write
6EC0000
direct allocation
page read and write
762C008F0000
trusted library allocation
page read and write
D67C7FB000
stack
page read and write
7AF7000
heap
page read and write
D679FFE000
unkown
page readonly
6A41000
heap
page read and write
6A41000
heap
page read and write
20EA3D0A000
heap
page read and write
6A41000
heap
page read and write
497800BC4000
trusted library allocation
page read and write
7B2D000
heap
page read and write
D677FFE000
stack
page read and write
20EA3D21000
heap
page read and write
34A0000
direct allocation
page read and write
497800128000
trusted library allocation
page read and write
7C6F000
heap
page read and write
7D53000
heap
page read and write
49780120C000
trusted library allocation
page read and write
47A000
unkown
page readonly
7A5F000
heap
page read and write
49780030C000
trusted library allocation
page read and write
497800FE0000
trusted library allocation
page read and write
47E000
unkown
page read and write
497800AE8000
trusted library allocation
page read and write
6A41000
heap
page read and write
20EA430A000
heap
page read and write
7A51000
heap
page read and write
6A41000
heap
page read and write
2A3A000
heap
page read and write
470000
unkown
page readonly
A00000
direct allocation
page read and write
582C00294000
trusted library allocation
page read and write
4978009E0000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C008E8000
trusted library allocation
page read and write
49780054C000
trusted library allocation
page read and write
7BBA000
heap
page read and write
497800CD0000
trusted library allocation
page read and write
20EA82FE000
heap
page read and write
762C002D4000
trusted library allocation
page read and write
B98000
heap
page read and write
6A41000
heap
page read and write
497801140000
trusted library allocation
page read and write
7A5A000
heap
page read and write
4978002A4000
trusted library allocation
page read and write
D6727FE000
unkown
page readonly
6A41000
heap
page read and write
497800B90000
trusted library allocation
page read and write
7B11000
heap
page read and write
45C000
stack
page read and write
79E000
stack
page read and write
6A41000
heap
page read and write
47A000
unkown
page readonly
7140000
direct allocation
page execute and read and write
762C006E8000
trusted library allocation
page read and write
497800938000
trusted library allocation
page read and write
4978009B8000
trusted library allocation
page read and write
D6677FE000
unkown
page readonly
7A53000
heap
page read and write
497800320000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800742000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
620000
heap
page read and write
20EA84D2000
trusted library allocation
page read and write
6A41000
heap
page read and write
D60BFFE000
stack
page read and write
A00000
direct allocation
page read and write
6A41000
heap
page read and write
20EA088D000
heap
page read and write
7BD0000
heap
page read and write
4978004A0000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
7140000
direct allocation
page execute and read and write
7A50000
heap
page read and write
6A41000
heap
page read and write
481000
unkown
page readonly
6A41000
heap
page read and write
497800624000
trusted library allocation
page read and write
5DE000280000
direct allocation
page read and write
6A41000
heap
page read and write
497800AD4000
trusted library allocation
page read and write
497800C80000
trusted library allocation
page read and write
A7E000
stack
page read and write
6A41000
heap
page read and write
7140000
direct allocation
page execute and read and write
A3C000
stack
page read and write
582C002BC000
trusted library allocation
page read and write
7A57000
heap
page read and write
11FC000
stack
page read and write
497800340000
trusted library allocation
page read and write
47A000
unkown
page readonly
497800CC0000
trusted library allocation
page read and write
497800E58000
trusted library allocation
page read and write
762C006C8000
trusted library allocation
page read and write
762C007BC000
trusted library allocation
page read and write
AB5000
heap
page read and write
497800EE8000
trusted library allocation
page read and write
497800588000
trusted library allocation
page read and write
762C00828000
trusted library allocation
page read and write
3BA000
stack
page read and write
497800E40000
trusted library allocation
page read and write
497800EB8000
trusted library allocation
page read and write
49780021C000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
CB0000
heap
page read and write
AC3000
heap
page read and write
6A41000
heap
page read and write
4978002B4000
trusted library allocation
page read and write
20EA42C0000
heap
page read and write
A00000
direct allocation
page read and write
6A41000
heap
page read and write
A00000
direct allocation
page read and write
7B59000
heap
page read and write
7140000
direct allocation
page execute and read and write
6A41000
heap
page read and write
49780000C000
trusted library allocation
page read and write
49780009E000
trusted library allocation
page read and write
481000
unkown
page readonly
49780032C000
trusted library allocation
page read and write
762C00430000
trusted library allocation
page read and write
4978001B4000
trusted library allocation
page read and write
6A41000
heap
page read and write
D608FFE000
stack
page read and write
497800340000
trusted library allocation
page read and write
497800E28000
trusted library allocation
page read and write
D66E7FE000
unkown
page readonly
6A41000
heap
page read and write
497800784000
trusted library allocation
page read and write
49780060C000
trusted library allocation
page read and write
49780110C000
trusted library allocation
page read and write
7BD5000
heap
page read and write
49780032C000
trusted library allocation
page read and write
D60E7FE000
unkown
page readonly
497800E88000
trusted library allocation
page read and write
471000
unkown
page execute read
4978011C0000
trusted library allocation
page read and write
471000
unkown
page execute read
A00000
direct allocation
page read and write
497800E4C000
trusted library allocation
page read and write
6A41000
heap
page read and write
47A000
unkown
page readonly
497800384000
trusted library allocation
page read and write
A9E000
heap
page read and write
7B19000
heap
page read and write
A00000
direct allocation
page read and write
497800300000
trusted library allocation
page read and write
497800CA4000
trusted library allocation
page read and write
6A41000
heap
page read and write
20EAA716000
trusted library section
page read and write
762C006D4000
trusted library allocation
page read and write
6A41000
heap
page read and write
47E000
unkown
page read and write
D605FFD000
stack
page read and write
20EA9E62000
trusted library section
page read and write
6A41000
heap
page read and write
4978002C0000
trusted library allocation
page read and write
7A51000
heap
page read and write
6A41000
heap
page read and write
4978002F4000
trusted library allocation
page read and write
497800CD0000
trusted library allocation
page read and write
20EA3D21000
heap
page read and write
127E000
stack
page read and write
4978001EC000
trusted library allocation
page read and write
762C002CC000
trusted library allocation
page read and write
4978012A8000
trusted library allocation
page read and write
47E000
unkown
page write copy
497800D98000
trusted library allocation
page read and write
E8F000
stack
page read and write
6A41000
heap
page read and write
47A000
unkown
page readonly
D6087FE000
unkown
page readonly
497800708000
trusted library allocation
page read and write
4978001F8000
trusted library allocation
page read and write
D66C7FE000
unkown
page readonly
20EAA632000
trusted library section
page read and write
7B90000
heap
page read and write
49780030C000
trusted library allocation
page read and write
7140000
direct allocation
page execute and read and write
762C00960000
trusted library allocation
page read and write
D60DFFC000
stack
page read and write
20EA8AE7000
unclassified section
page read and write
20EA41F0000
trusted library section
page read and write
D67A7FB000
stack
page read and write
5DE0002E4000
direct allocation
page read and write
49780050B000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
73AA000
heap
page read and write
6A41000
heap
page read and write
20EAA040000
trusted library section
page read and write
481000
unkown
page readonly
D66CFFA000
stack
page read and write
762C0078C000
trusted library allocation
page read and write
49780016C000
trusted library allocation
page read and write
582C002BC000
trusted library allocation
page read and write
471000
unkown
page execute read
D6747FE000
unkown
page readonly
497800EF8000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C00790000
trusted library allocation
page read and write
6A41000
heap
page read and write
762C0070C000
trusted library allocation
page read and write
481000
unkown
page readonly
497800F68000
trusted library allocation
page read and write
7BFE000
heap
page read and write
762C0079C000
trusted library allocation
page read and write
762C00974000
trusted library allocation
page read and write
497801068000
trusted library allocation
page read and write
6A41000
heap
page read and write
497800D84000
trusted library allocation
page read and write
6A41000
heap
page read and write
6A41000
heap
page read and write
470000
unkown
page readonly
497801048000
trusted library allocation
page read and write
6A41000
heap
page read and write
ADD000
heap
page read and write
497800A3C000
trusted library allocation
page read and write
497800EE8000
trusted library allocation
page read and write
497800340000
trusted library allocation
page read and write
497800BA0000
trusted library allocation
page read and write
4978000A0000
trusted library allocation
page read and write
497800134000
trusted library allocation
page read and write
497800C01000
trusted library allocation
page read and write
75E6000
direct allocation
page read and write
47E000
unkown
page write copy
AB1000
heap
page read and write
77B3000
heap
page read and write
497800E4C000
trusted library allocation
page read and write
497800318000
trusted library allocation
page read and write
4978009EC000
trusted library allocation
page read and write
7BAE000
heap
page read and write
7A52000
heap
page read and write
762C008A8000
trusted library allocation
page read and write
20EA9EA3000
trusted library section
page read and write
6A41000
heap
page read and write
D0C000
stack
page read and write
6A41000
heap
page read and write
20EAAD50000
trusted library section
page read and write
D6667FE000
unkown
page readonly
There are 1306 hidden memdumps, click here to show them.