Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PhwUGyok2i.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PhwUGyok2i.exe_e53411d3c21cb7ec1c44614921a458411af88053_8f197f82_ef1a3412-a482-4ccc-8fd7-cee110a5bed4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8305.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:25 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER876B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B15.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PhwUGyok2i.exe
|
"C:\Users\user\Desktop\PhwUGyok2i.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1988,i,12239918215258673824,2474268141507560200,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 1148
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actionsh
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://anglebug.com/3965B
|
unknown
|
||
http://anglebug.com/48362
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/3832F
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://anglebug.com/6048-
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7369$
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/8229H
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
http://anglebug.com/5371?
|
unknown
|
||
http://anglebug.com/4551:
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
http://anglebug.com/64394
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/4836&
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/5421M
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/4836)
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/5881.
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2ageHandler
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/5430J
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.68
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
ProgramId
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
FileId
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
LowerCaseLongPath
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
LongPathHash
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
Name
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
OriginalFileName
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
Publisher
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
Version
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
BinFileVersion
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
BinaryType
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
ProductName
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
ProductVersion
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
LinkDate
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
BinProductVersion
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
AppxPackageFullName
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
Size
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
Language
|
||
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29ACA4B3000
|
heap
|
page read and write
|
||
F9237FD000
|
stack
|
page read and write
|
||
5C1800760000
|
trusted library allocation
|
page read and write
|
||
5E100075E000
|
trusted library allocation
|
page read and write
|
||
180F000
|
stack
|
page read and write
|
||
5C1800640000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002FE9000
|
trusted library allocation
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7326000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E1000A7E000
|
trusted library allocation
|
page read and write
|
||
183F000
|
stack
|
page read and write
|
||
5E1002A74000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002E38000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
unkown
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002EC0000
|
trusted library allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5E1002510000
|
trusted library allocation
|
page read and write
|
||
5E1002960000
|
trusted library allocation
|
page read and write
|
||
5E100260C000
|
trusted library allocation
|
page read and write
|
||
5E1002925000
|
trusted library allocation
|
page read and write
|
||
5E100349C000
|
trusted library allocation
|
page read and write
|
||
5E1003034000
|
trusted library allocation
|
page read and write
|
||
5E1002510000
|
trusted library allocation
|
page read and write
|
||
29ACD983000
|
heap
|
page read and write
|
||
29AD47EE000
|
trusted library section
|
page read and write
|
||
5C1800601000
|
trusted library allocation
|
page read and write
|
||
5E1003194000
|
trusted library allocation
|
page read and write
|
||
F9297FE000
|
stack
|
page read and write
|
||
5E10030E0000
|
trusted library allocation
|
page read and write
|
||
5E1003144000
|
trusted library allocation
|
page read and write
|
||
5E1002201000
|
trusted library allocation
|
page read and write
|
||
5E10023AC000
|
trusted library allocation
|
page read and write
|
||
5E1002FD4000
|
trusted library allocation
|
page read and write
|
||
F90EFFE000
|
unkown
|
page readonly
|
||
72B0000
|
heap
|
page read and write
|
||
5C1800758000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
6C709000
|
unkown
|
page read and write
|
||
5E1002868000
|
trusted library allocation
|
page read and write
|
||
5C18006C8000
|
trusted library allocation
|
page read and write
|
||
29ACFEC0000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
29AD4A70000
|
trusted library section
|
page read and write
|
||
5E1002A54000
|
trusted library allocation
|
page read and write
|
||
5E10030E4000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
5E10023F0000
|
trusted library allocation
|
page read and write
|
||
153A000
|
unkown
|
page write copy
|
||
54C0020C000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD43B0000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F9137FB000
|
stack
|
page read and write
|
||
5E1000C01000
|
trusted library allocation
|
page read and write
|
||
F91CFFE000
|
unkown
|
page readonly
|
||
5C1800320000
|
trusted library allocation
|
page read and write
|
||
73B3000
|
heap
|
page read and write
|
||
5E10024A4000
|
trusted library allocation
|
page read and write
|
||
5E1002580000
|
trusted library allocation
|
page read and write
|
||
5E1002944000
|
trusted library allocation
|
page read and write
|
||
79C2000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD47A0000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD3D20000
|
trusted library section
|
page read and write
|
||
79CD000
|
heap
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E1003080000
|
trusted library allocation
|
page read and write
|
||
F906FFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
F909FFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
F910FFE000
|
unkown
|
page readonly
|
||
29ACDF60000
|
trusted library section
|
page read and write
|
||
5E10024A4000
|
trusted library allocation
|
page read and write
|
||
5C18007C8000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
direct allocation
|
page execute and read and write
|
||
5E1002B00000
|
trusted library allocation
|
page read and write
|
||
5E10031BC000
|
trusted library allocation
|
page read and write
|
||
5C180035C000
|
trusted library allocation
|
page read and write
|
||
5E1002C4C000
|
trusted library allocation
|
page read and write
|
||
5C1800714000
|
trusted library allocation
|
page read and write
|
||
5C1800418000
|
trusted library allocation
|
page read and write
|
||
5E1002C84000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
280A000
|
heap
|
page read and write
|
||
5E100318D000
|
trusted library allocation
|
page read and write
|
||
5C18006B0000
|
trusted library allocation
|
page read and write
|
||
5E1002FC8000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
heap
|
page read and write
|
||
5E1002A3A000
|
trusted library allocation
|
page read and write
|
||
F9067FC000
|
stack
|
page read and write
|
||
54C00210000
|
direct allocation
|
page read and write
|
||
6C70C000
|
unkown
|
page readonly
|
||
5E1002544000
|
trusted library allocation
|
page read and write
|
||
5C1800248000
|
trusted library allocation
|
page read and write
|
||
79C3000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
54C00270000
|
direct allocation
|
page read and write
|
||
F919FFE000
|
unkown
|
page readonly
|
||
5C1800770000
|
trusted library allocation
|
page read and write
|
||
29ACDEE7000
|
heap
|
page read and write
|
||
5E10023D4000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E10030F0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACA424000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
29ACA4B0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
5E10028AC000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
16A000
|
unkown
|
page readonly
|
||
16E000
|
unkown
|
page read and write
|
||
5C18006F0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002FF0000
|
trusted library allocation
|
page read and write
|
||
5E100304C000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
F91BFFE000
|
unkown
|
page readonly
|
||
F9277FE000
|
stack
|
page read and write
|
||
5E1002D20000
|
trusted library allocation
|
page read and write
|
||
5C18002F4000
|
trusted library allocation
|
page read and write
|
||
5E10023F8000
|
trusted library allocation
|
page read and write
|
||
5E1002EAC000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
B4C000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
7324000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
29ACDEC5000
|
heap
|
page read and write
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
29AD3C47000
|
unclassified section
|
page read and write
|
||
54C002A8000
|
direct allocation
|
page read and write
|
||
79C9000
|
heap
|
page read and write
|
||
5E10024D0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
direct allocation
|
page execute and read and write
|
||
F80000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
79C2000
|
heap
|
page read and write
|
||
5C1800368000
|
trusted library allocation
|
page read and write
|
||
5E1002504000
|
trusted library allocation
|
page read and write
|
||
5E10024B4000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C180033C000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E1002504000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5C1800644000
|
trusted library allocation
|
page read and write
|
||
73EE000
|
heap
|
page read and write
|
||
5E10027D8000
|
trusted library allocation
|
page read and write
|
||
5E100241C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
79CA000
|
heap
|
page read and write
|
||
5E10027B0000
|
trusted library allocation
|
page read and write
|
||
F9267FE000
|
stack
|
page read and write
|
||
5E10022A8000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002550000
|
trusted library allocation
|
page read and write
|
||
5C1800404000
|
trusted library allocation
|
page read and write
|
||
5E1003228000
|
trusted library allocation
|
page read and write
|
||
5C180035C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD47E0000
|
trusted library section
|
page read and write
|
||
F90B7FA000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800704000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
5E100334C000
|
trusted library allocation
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
29ACC123000
|
heap
|
page read and write
|
||
7323000
|
heap
|
page read and write
|
||
5C18006D0000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
732D000
|
heap
|
page read and write
|
||
5E1002A01000
|
trusted library allocation
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
5E1002C18000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACFEC3000
|
heap
|
page read and write
|
||
5E1003188000
|
trusted library allocation
|
page read and write
|
||
29ACDE50000
|
heap
|
page read and write
|
||
29AD3AA0000
|
trusted library section
|
page read and write
|
||
1BFC002A0000
|
trusted library allocation
|
page read and write
|
||
5E1002D90000
|
trusted library allocation
|
page read and write
|
||
F91C7FD000
|
stack
|
page read and write
|
||
F90FFFE000
|
unkown
|
page readonly
|
||
732D000
|
heap
|
page read and write
|
||
29ACD97A000
|
heap
|
page read and write
|
||
5E100234C000
|
trusted library allocation
|
page read and write
|
||
5C1800788000
|
trusted library allocation
|
page read and write
|
||
5E1002B34000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
5E100251C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
5C1800201000
|
trusted library allocation
|
page read and write
|
||
5C1800630000
|
trusted library allocation
|
page read and write
|
||
5E1002EEC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
5E10022F0000
|
trusted library allocation
|
page read and write
|
||
79C9000
|
heap
|
page read and write
|
||
5E1002B80000
|
trusted library allocation
|
page read and write
|
||
F97FDFE000
|
unkown
|
page readonly
|
||
F921FFE000
|
unkown
|
page readonly
|
||
F912FFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
5E10025EC000
|
trusted library allocation
|
page read and write
|
||
5E10024C4000
|
trusted library allocation
|
page read and write
|
||
F9227FD000
|
stack
|
page read and write
|
||
5E1002B4C000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
171000
|
unkown
|
page readonly
|
||
A80000
|
direct allocation
|
page read and write
|
||
5C18006E4000
|
trusted library allocation
|
page read and write
|
||
5E1002544000
|
trusted library allocation
|
page read and write
|
||
F97A5EF000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800248000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
F9057FB000
|
stack
|
page read and write
|
||
F90C7FE000
|
stack
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
5C1800720000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
1BFC0020C000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
29AD3F20000
|
trusted library section
|
page read and write
|
||
5E10025EE000
|
trusted library allocation
|
page read and write
|
||
F9207FD000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5E1002C70000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACA5A5000
|
heap
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
732D000
|
heap
|
page read and write
|
||
5E1002550000
|
trusted library allocation
|
page read and write
|
||
18AB000
|
unkown
|
page execute and write copy
|
||
5E1002220000
|
trusted library allocation
|
page read and write
|
||
73CB000
|
heap
|
page read and write
|
||
F9017FB000
|
stack
|
page read and write
|
||
5E10034AC000
|
trusted library allocation
|
page read and write
|
||
5E1002E88000
|
trusted library allocation
|
page read and write
|
||
54C00220000
|
direct allocation
|
page read and write
|
||
E9F000
|
stack
|
page read and write
|
||
23CD000
|
stack
|
page read and write
|
||
5C1800698000
|
trusted library allocation
|
page read and write
|
||
79C2000
|
heap
|
page read and write
|
||
5E100340C000
|
trusted library allocation
|
page read and write
|
||
5E1002528000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10024A4000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
68C1000
|
heap
|
page read and write
|
||
F9117FC000
|
stack
|
page read and write
|
||
F908FFE000
|
unkown
|
page readonly
|
||
79C9000
|
heap
|
page read and write
|
||
5E1002F04000
|
trusted library allocation
|
page read and write
|
||
5E1002CC3000
|
trusted library allocation
|
page read and write
|
||
5E1002530000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F97B5FD000
|
unkown
|
page read and write
|
||
5E1000B1A000
|
trusted library allocation
|
page read and write
|
||
5E100309C000
|
trusted library allocation
|
page read and write
|
||
5C180078C000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10024A8000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
5E1000801000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
EDC000
|
stack
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
29ACD97E000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1003401000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
E10000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
5E10033BC000
|
trusted library allocation
|
page read and write
|
||
79C4000
|
heap
|
page read and write
|
||
29ACDED0000
|
heap
|
page read and write
|
||
F914FFE000
|
unkown
|
page readonly
|
||
5E10027C4000
|
trusted library allocation
|
page read and write
|
||
5E1002B24000
|
trusted library allocation
|
page read and write
|
||
5E1002930000
|
trusted library allocation
|
page read and write
|
||
79C3000
|
heap
|
page read and write
|
||
73CD000
|
heap
|
page read and write
|
||
7328000
|
heap
|
page read and write
|
||
79C3000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
77C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10003BE000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800320000
|
trusted library allocation
|
page read and write
|
||
5E100238C000
|
trusted library allocation
|
page read and write
|
||
29AD4621000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800688000
|
trusted library allocation
|
page read and write
|
||
5E1003060000
|
trusted library allocation
|
page read and write
|
||
5E10026A8000
|
trusted library allocation
|
page read and write
|
||
29AD45C7000
|
unclassified section
|
page read and write
|
||
5E100267C000
|
trusted library allocation
|
page read and write
|
||
5E1003188000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
F97DDFE000
|
unkown
|
page readonly
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
72BA000
|
heap
|
page read and write
|
||
5E100220C000
|
trusted library allocation
|
page read and write
|
||
5E1000201000
|
trusted library allocation
|
page read and write
|
||
F903FFE000
|
unkown
|
page readonly
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
54C00284000
|
direct allocation
|
page read and write
|
||
7327000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACDF21000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7466000
|
direct allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10030E4000
|
trusted library allocation
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
4AC000
|
stack
|
page read and write
|
||
29AD476D000
|
trusted library section
|
page read and write
|
||
5E10031F0000
|
trusted library allocation
|
page read and write
|
||
B46000
|
heap
|
page read and write
|
||
F97F5FE000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800320000
|
trusted library allocation
|
page read and write
|
||
5E10030B4000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10023EC000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
68C1000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E1002D20000
|
trusted library allocation
|
page read and write
|
||
5E10033B4000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
29ACA4A7000
|
heap
|
page read and write
|
||
5E10023E4000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
B45000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002504000
|
trusted library allocation
|
page read and write
|
||
79C9000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
11D7000
|
heap
|
page read and write
|
||
29ACDEDB000
|
heap
|
page read and write
|
||
5C1800320000
|
trusted library allocation
|
page read and write
|
||
5C1800401000
|
trusted library allocation
|
page read and write
|
||
5E1003147000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002BF0000
|
trusted library allocation
|
page read and write
|
||
29AD4691000
|
trusted library section
|
page read and write
|
||
5E1000601000
|
trusted library allocation
|
page read and write
|
||
5E100306C000
|
trusted library allocation
|
page read and write
|
||
29AD43A0000
|
trusted library section
|
page read and write
|
||
5E1002BAC000
|
trusted library allocation
|
page read and write
|
||
5E10029A4000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10025EC000
|
trusted library allocation
|
page read and write
|
||
5E1002BF0000
|
trusted library allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800744000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7327000
|
heap
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E10023AC000
|
trusted library allocation
|
page read and write
|
||
5E1002BF0000
|
trusted library allocation
|
page read and write
|
||
5E1003144000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
5C1800210000
|
trusted library allocation
|
page read and write
|
||
5C18007D0000
|
trusted library allocation
|
page read and write
|
||
5E1002570000
|
trusted library allocation
|
page read and write
|
||
79C5000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F91E7FE000
|
stack
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
5E1002AC4000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5C1800724000
|
trusted library allocation
|
page read and write
|
||
5C18006D4000
|
trusted library allocation
|
page read and write
|
||
732E000
|
heap
|
page read and write
|
||
5C180025C000
|
trusted library allocation
|
page read and write
|
||
5E1002F20000
|
trusted library allocation
|
page read and write
|
||
79CB000
|
heap
|
page read and write
|
||
F91FFFE000
|
unkown
|
page readonly
|
||
74C1000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
5E1001001000
|
trusted library allocation
|
page read and write
|
||
5E10023A0000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
29ACA46A000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7320000
|
heap
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
F97D5FE000
|
stack
|
page read and write
|
||
5E1002BE0000
|
trusted library allocation
|
page read and write
|
||
5C1800430000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
heap
|
page read and write
|
||
5C1800620000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
EEF000
|
stack
|
page read and write
|
||
29ACD983000
|
heap
|
page read and write
|
||
5E1002B9F000
|
trusted library allocation
|
page read and write
|
||
5E100251C000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E1002905000
|
trusted library allocation
|
page read and write
|
||
54C0024C000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C18007B4000
|
trusted library allocation
|
page read and write
|
||
29AD4610000
|
trusted library section
|
page read and write
|
||
1BFC00288000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACD985000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
5E10032EC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5E100285C000
|
trusted library allocation
|
page read and write
|
||
5E100221C000
|
trusted library allocation
|
page read and write
|
||
5E10025EC000
|
trusted library allocation
|
page read and write
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7B7F000
|
heap
|
page read and write
|
||
5E100255C000
|
trusted library allocation
|
page read and write
|
||
54C00230000
|
direct allocation
|
page read and write
|
||
1BFC00248000
|
trusted library allocation
|
page read and write
|
||
5E10029DC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E10023D0000
|
trusted library allocation
|
page read and write
|
||
5E100240C000
|
trusted library allocation
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
70D1000
|
heap
|
page read and write
|
||
5E100267C000
|
trusted library allocation
|
page read and write
|
||
5E10030A4000
|
trusted library allocation
|
page read and write
|
||
714B000
|
heap
|
page read and write
|
||
5E1002E94000
|
trusted library allocation
|
page read and write
|
||
7323000
|
heap
|
page read and write
|
||
5E10032C4000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E1002704000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002778000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
5E100267C000
|
trusted library allocation
|
page read and write
|
||
5C1800330000
|
trusted library allocation
|
page read and write
|
||
5C1800288000
|
trusted library allocation
|
page read and write
|
||
5E100242C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E100332C000
|
trusted library allocation
|
page read and write
|
||
5C1800230000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
29ACD97E000
|
heap
|
page read and write
|
||
5C1800700000
|
trusted library allocation
|
page read and write
|
||
5E1002AA8000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD46A3000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7327000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7D5F000
|
heap
|
page read and write
|
||
5E1002A44000
|
trusted library allocation
|
page read and write
|
||
F91A7FE000
|
stack
|
page read and write
|
||
5C18002D4000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
79CB000
|
heap
|
page read and write
|
||
29AD1F90000
|
trusted library allocation
|
page read and write
|
||
5C18006EC000
|
trusted library allocation
|
page read and write
|
||
5E1003018000
|
trusted library allocation
|
page read and write
|
||
7323000
|
heap
|
page read and write
|
||
5C18007CC000
|
trusted library allocation
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
73CF000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
79C5000
|
heap
|
page read and write
|
||
5C180060C000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
7325000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
8E4000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
732F000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
F9047FB000
|
stack
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
79CF000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACD97E000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
5E1002FB8000
|
trusted library allocation
|
page read and write
|
||
5E10030C4000
|
trusted library allocation
|
page read and write
|
||
29AD396E000
|
trusted library section
|
page read and write
|
||
7320000
|
heap
|
page read and write
|
||
5C18007E0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
79CF000
|
heap
|
page read and write
|
||
5E1002830000
|
trusted library allocation
|
page read and write
|
||
29ACA4C2000
|
heap
|
page read and write
|
||
1BFC002B0000
|
trusted library allocation
|
page read and write
|
||
5E1003118000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
70EF000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002428000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
73EB000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
1BFC00230000
|
trusted library allocation
|
page read and write
|
||
79CE000
|
heap
|
page read and write
|
||
1BFC002C0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002DA8000
|
trusted library allocation
|
page read and write
|
||
54C00290000
|
direct allocation
|
page read and write
|
||
5E1002394000
|
trusted library allocation
|
page read and write
|
||
29AD39C3000
|
trusted library section
|
page read and write
|
||
5E10025EE000
|
trusted library allocation
|
page read and write
|
||
5E1002500000
|
trusted library allocation
|
page read and write
|
||
29ACA493000
|
heap
|
page read and write
|
||
5E10025EE000
|
trusted library allocation
|
page read and write
|
||
5C1800694000
|
trusted library allocation
|
page read and write
|
||
732C000
|
heap
|
page read and write
|
||
7320000
|
heap
|
page read and write
|
||
5E1002530000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B4F000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
1BFC00294000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
B4F000
|
heap
|
page read and write
|
||
6C6BF000
|
unkown
|
page readonly
|
||
5E1003024000
|
trusted library allocation
|
page read and write
|
||
79C2000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
E5C000
|
stack
|
page read and write
|
||
F91AFFE000
|
unkown
|
page readonly
|
||
A80000
|
direct allocation
|
page read and write
|
||
1BFC002A0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACDED3000
|
heap
|
page read and write
|
||
79CF000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10024A8000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E100349C000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
5E1002EB8000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
1BFC00260000
|
trusted library allocation
|
page read and write
|
||
F905FFE000
|
unkown
|
page readonly
|
||
54C00201000
|
direct allocation
|
page read and write
|
||
1BFC002C8000
|
trusted library allocation
|
page read and write
|
||
5E1002E2C000
|
trusted library allocation
|
page read and write
|
||
29ACD991000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F924FFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
29AD418D000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
AF2000
|
heap
|
page read and write
|
||
5E1002274000
|
trusted library allocation
|
page read and write
|
||
5E10030F0000
|
trusted library allocation
|
page read and write
|
||
F91DFFE000
|
unkown
|
page readonly
|
||
5C1800750000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
160000
|
unkown
|
page readonly
|
||
29ACDEE1000
|
heap
|
page read and write
|
||
79C3000
|
heap
|
page read and write
|
||
F902FFE000
|
unkown
|
page readonly
|
||
5E10032CC000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
1BFC00250000
|
trusted library allocation
|
page read and write
|
||
CBC000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7292000
|
heap
|
page read and write
|
||
7142000
|
heap
|
page read and write
|
||
5C1800374000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800310000
|
trusted library allocation
|
page read and write
|
||
5E10031B8000
|
trusted library allocation
|
page read and write
|
||
5E100281C000
|
trusted library allocation
|
page read and write
|
||
54C00294000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E1003354000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E100300C000
|
trusted library allocation
|
page read and write
|
||
1BFC00278000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E100320C000
|
trusted library allocation
|
page read and write
|
||
5E100290A000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
F97EDFE000
|
unkown
|
page readonly
|
||
A3E000
|
stack
|
page read and write
|
||
29ACC100000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C18006C4000
|
trusted library allocation
|
page read and write
|
||
5C1800220000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E1002F0C000
|
trusted library allocation
|
page read and write
|
||
29ACDEE5000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD4762000
|
trusted library section
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
5E1002264000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7B8F000
|
heap
|
page read and write
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
5C18006E0000
|
trusted library allocation
|
page read and write
|
||
79CE000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C180020C000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
F90DFFE000
|
unkown
|
page readonly
|
||
11D0000
|
heap
|
page read and write
|
||
5C1800310000
|
trusted library allocation
|
page read and write
|
||
5E10024A4000
|
trusted library allocation
|
page read and write
|
||
5E1002E68000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
A80000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACD984000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
29ACC120000
|
heap
|
page read and write
|
||
5C180039C000
|
trusted library allocation
|
page read and write
|
||
F90F7FC000
|
stack
|
page read and write
|
||
54C00250000
|
direct allocation
|
page read and write
|
||
5E100229F000
|
trusted library allocation
|
page read and write
|
||
F91B7FE000
|
stack
|
page read and write
|
||
5E1002590000
|
trusted library allocation
|
page read and write
|
||
29AD4670000
|
trusted library section
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD3A06000
|
trusted library section
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F90BFFE000
|
unkown
|
page readonly
|
||
F90AFFE000
|
unkown
|
page readonly
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACA4F0000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E1002244000
|
trusted library allocation
|
page read and write
|
||
5E1002568000
|
trusted library allocation
|
page read and write
|
||
5E1003188000
|
trusted library allocation
|
page read and write
|
||
5E1003054000
|
trusted library allocation
|
page read and write
|
||
5E100279C000
|
trusted library allocation
|
page read and write
|
||
5E10031B8000
|
trusted library allocation
|
page read and write
|
||
5E100267C000
|
trusted library allocation
|
page read and write
|
||
5C18003EC000
|
trusted library allocation
|
page read and write
|
||
5E1002DC8000
|
trusted library allocation
|
page read and write
|
||
5C1800354000
|
trusted library allocation
|
page read and write
|
||
5E100228C000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
5E1002BF0000
|
trusted library allocation
|
page read and write
|
||
5E10034BC000
|
trusted library allocation
|
page read and write
|
||
5E10022D0000
|
trusted library allocation
|
page read and write
|
||
F904FFE000
|
unkown
|
page readonly
|
||
5E10023C4000
|
trusted library allocation
|
page read and write
|
||
29ACA3DB000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10033AC000
|
trusted library allocation
|
page read and write
|
||
5E1003334000
|
trusted library allocation
|
page read and write
|
||
7328000
|
heap
|
page read and write
|
||
29ACDEEE000
|
heap
|
page read and write
|
||
5E1002898000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1BFC002F8000
|
trusted library allocation
|
page read and write
|
||
1BFC002C0000
|
trusted library allocation
|
page read and write
|
||
5E1002B90000
|
trusted library allocation
|
page read and write
|
||
5E1002F44000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
29ACA540000
|
trusted library allocation
|
page read and write
|
||
5E1002F2C000
|
trusted library allocation
|
page read and write
|
||
279E000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
732E000
|
heap
|
page read and write
|
||
29ACD98F000
|
heap
|
page read and write
|
||
5C18006CC000
|
trusted library allocation
|
page read and write
|
||
54C00217000
|
direct allocation
|
page read and write
|
||
5E10031B8000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
161000
|
unkown
|
page execute read
|
||
B10000
|
heap
|
page read and write
|
||
7D3E000
|
heap
|
page read and write
|
||
79C8000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
F920FFE000
|
unkown
|
page readonly
|
||
5E1002F90000
|
trusted library allocation
|
page read and write
|
||
54C00280000
|
direct allocation
|
page read and write
|
||
5E10029A1000
|
trusted library allocation
|
page read and write
|
||
5E10026AC000
|
trusted library allocation
|
page read and write
|
||
5C1800614000
|
trusted library allocation
|
page read and write
|
||
5E1002590000
|
trusted library allocation
|
page read and write
|
||
F928FFE000
|
unkown
|
page readonly
|
||
79CA000
|
heap
|
page read and write
|
||
5E1002328000
|
trusted library allocation
|
page read and write
|
||
5E10028E0000
|
trusted library allocation
|
page read and write
|
||
5E1002C0C000
|
trusted library allocation
|
page read and write
|
||
5E1002601000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
5C1800364000
|
trusted library allocation
|
page read and write
|
||
54C002E4000
|
direct allocation
|
page read and write
|
||
5C180075C000
|
trusted library allocation
|
page read and write
|
||
5C18002B0000
|
trusted library allocation
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
5E1002D44000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
F90D7FE000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10024A4000
|
trusted library allocation
|
page read and write
|
||
5E10028ED000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800734000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
54C002AC000
|
direct allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
F9177FB000
|
stack
|
page read and write
|
||
5E1002A2C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10026DC000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
5E10032DC000
|
trusted library allocation
|
page read and write
|
||
5E1002FE4000
|
trusted library allocation
|
page read and write
|
||
5E10032A8000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
79C7000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
68C1000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
29ACA5A0000
|
heap
|
page read and write
|
||
5E1003024000
|
trusted library allocation
|
page read and write
|
||
F9147FC000
|
stack
|
page read and write
|
||
29ACD960000
|
heap
|
page read and write
|
||
5E1002710000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C180027C000
|
trusted library allocation
|
page read and write
|
||
5E1002550000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E10023B4000
|
trusted library allocation
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10033C8000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
10EF000
|
stack
|
page read and write
|
||
29ACD97A000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1BFC002F0000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
500000
|
heap
|
page read and write
|
||
F929FFE000
|
unkown
|
page readonly
|
||
54C002D0000
|
direct allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
stack
|
page read and write
|
||
5E10023E0000
|
trusted library allocation
|
page read and write
|
||
5E1002E01000
|
trusted library allocation
|
page read and write
|
||
29AD3A6D000
|
trusted library section
|
page read and write
|
||
54C002EC000
|
direct allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1BFC00238000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
5E1002A0C000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
5E10025A4000
|
trusted library allocation
|
page read and write
|
||
29ACDEE3000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
5E1000001000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
29ACA530000
|
trusted library allocation
|
page read and write
|
||
5E10033AC000
|
trusted library allocation
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
5E1002550000
|
trusted library allocation
|
page read and write
|
||
5E1002318000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002F34000
|
trusted library allocation
|
page read and write
|
||
F9087FE000
|
stack
|
page read and write
|
||
54C0025C000
|
direct allocation
|
page read and write
|
||
5E1002858000
|
trusted library allocation
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
5E10029C8000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
29ACDEDF000
|
heap
|
page read and write
|
||
5E10031D8000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
5E1002CFC000
|
trusted library allocation
|
page read and write
|
||
1BFC002E4000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
7324000
|
heap
|
page read and write
|
||
1BFC002C0000
|
trusted library allocation
|
page read and write
|
||
79CF000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F913FFE000
|
unkown
|
page readonly
|
||
F90E7FA000
|
stack
|
page read and write
|
||
5E10023B4000
|
trusted library allocation
|
page read and write
|
||
7143000
|
heap
|
page read and write
|
||
5E1002E28000
|
trusted library allocation
|
page read and write
|
||
7146000
|
heap
|
page read and write
|
||
5E1002CC0000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
5E1002418000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800354000
|
trusted library allocation
|
page read and write
|
||
5E1003090000
|
trusted library allocation
|
page read and write
|
||
5E1000401000
|
trusted library allocation
|
page read and write
|
||
1BFC002A0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1003024000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E1002D9C000
|
trusted library allocation
|
page read and write
|
||
29ACD991000
|
heap
|
page read and write
|
||
5C1800330000
|
trusted library allocation
|
page read and write
|
||
29AD3A62000
|
trusted library section
|
page read and write
|
||
5E100237C000
|
trusted library allocation
|
page read and write
|
||
29C000
|
stack
|
page read and write
|
||
732D000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E100240C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29AD4632000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
1270000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002984000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E100247C000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
5E1002FDB000
|
trusted library allocation
|
page read and write
|
||
5E1000E01000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
5E100268C000
|
trusted library allocation
|
page read and write
|
||
7324000
|
heap
|
page read and write
|
||
5E1002E58000
|
trusted library allocation
|
page read and write
|
||
5E10030E4000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10023E8000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
heap
|
page read and write
|
||
29ACDDC0000
|
trusted library section
|
page read and write
|
||
F923FFE000
|
unkown
|
page readonly
|
||
5E1002590000
|
trusted library allocation
|
page read and write
|
||
F900FFE000
|
unkown
|
page readonly
|
||
FEE000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
5E10025EC000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
5E1003140000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7326000
|
heap
|
page read and write
|
||
5E10023C8000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5C1800368000
|
trusted library allocation
|
page read and write
|
||
5E10024A4000
|
trusted library allocation
|
page read and write
|
||
5E1003240000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
F918FFE000
|
unkown
|
page readonly
|
||
5C1800730000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F9037FE000
|
stack
|
page read and write
|
||
5E1003218000
|
trusted library allocation
|
page read and write
|
||
7300000
|
direct allocation
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
F91D7FD000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E100225A000
|
trusted library allocation
|
page read and write
|
||
5E1003001000
|
trusted library allocation
|
page read and write
|
||
5E10025A4000
|
trusted library allocation
|
page read and write
|
||
29AD3950000
|
trusted library section
|
page read and write
|
||
5E1002EFC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
AAC000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C18002FC000
|
trusted library allocation
|
page read and write
|
||
79C7000
|
heap
|
page read and write
|
||
5E10023F4000
|
trusted library allocation
|
page read and write
|
||
5C18006FC000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
5E1002504000
|
trusted library allocation
|
page read and write
|
||
29ACDEC2000
|
heap
|
page read and write
|
||
6C708000
|
unkown
|
page readonly
|
||
510000
|
heap
|
page read and write
|
||
78AA000
|
heap
|
page read and write
|
||
5C18006AC000
|
trusted library allocation
|
page read and write
|
||
29ACCB70000
|
unkown
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
29ACA510000
|
heap
|
page read and write
|
||
79CB000
|
heap
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
5E10031C4000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
29ACD983000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
F9077FE000
|
stack
|
page read and write
|
||
29AD26C0000
|
heap
|
page read and write
|
||
5E1002E9C000
|
trusted library allocation
|
page read and write
|
||
5E10024F0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
7329000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
1BFC002C0000
|
trusted library allocation
|
page read and write
|
||
29ACD976000
|
heap
|
page read and write
|
||
29ACDEF4000
|
heap
|
page read and write
|
||
5E1002CE2000
|
trusted library allocation
|
page read and write
|
||
5C180040C000
|
trusted library allocation
|
page read and write
|
||
5E10025EE000
|
trusted library allocation
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
5E1002BF0000
|
trusted library allocation
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
5E10024AC000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
29ACD950000
|
heap
|
page read and write
|
||
732B000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
5E1002B68000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
161000
|
unkown
|
page execute read
|
||
F9007FD000
|
stack
|
page read and write
|
||
29ACA46E000
|
heap
|
page read and write
|
||
5E10030B4000
|
trusted library allocation
|
page read and write
|
||
5E1002334000
|
trusted library allocation
|
page read and write
|
||
29ACA3D0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
29ACFF17000
|
unclassified section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1003154000
|
trusted library allocation
|
page read and write
|
||
F917FFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
5E10024F7000
|
trusted library allocation
|
page read and write
|
||
5E10024F3000
|
trusted library allocation
|
page read and write
|
||
79C8000
|
heap
|
page read and write
|
||
F9127FB000
|
stack
|
page read and write
|
||
77C1000
|
heap
|
page read and write
|
||
C5F000
|
stack
|
page read and write
|
||
F90A7FD000
|
stack
|
page read and write
|
||
54C0023C000
|
direct allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
F97BDFE000
|
unkown
|
page readonly
|
||
5E10028CC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
5E1003234000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
F9027FB000
|
stack
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
F9217FD000
|
stack
|
page read and write
|
||
5E1003130000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
5E10023DC000
|
trusted library allocation
|
page read and write
|
||
5E1002E28000
|
trusted library allocation
|
page read and write
|
||
7329000
|
heap
|
page read and write
|
||
29ACFEE7000
|
unclassified section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002FAC000
|
trusted library allocation
|
page read and write
|
||
5C1800754000
|
trusted library allocation
|
page read and write
|
||
5E1002E78000
|
trusted library allocation
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1BFC002C0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800684000
|
trusted library allocation
|
page read and write
|
||
1BFC00274000
|
trusted library allocation
|
page read and write
|
||
7464000
|
direct allocation
|
page read and write
|
||
5E1002DBC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800250000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
73D8000
|
heap
|
page read and write
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
5E1003074000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E1002280000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
732A000
|
heap
|
page read and write
|
||
5E10034B0000
|
trusted library allocation
|
page read and write
|
||
5E10023D8000
|
trusted library allocation
|
page read and write
|
||
5E100236C000
|
trusted library allocation
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10023AC000
|
trusted library allocation
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
5E1002801000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10031F0000
|
trusted library allocation
|
page read and write
|
||
F9287FE000
|
stack
|
page read and write
|
||
5E10029B8000
|
trusted library allocation
|
page read and write
|
||
5E10023B4000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E10026C0000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C18002E4000
|
trusted library allocation
|
page read and write
|
||
5E10023AC000
|
trusted library allocation
|
page read and write
|
||
29ACA2F0000
|
heap
|
page read and write
|
||
5E1002BC8000
|
trusted library allocation
|
page read and write
|
||
5C18006B8000
|
trusted library allocation
|
page read and write
|
||
7324000
|
heap
|
page read and write
|
||
1297000
|
heap
|
page read and write
|
||
F922FFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002DD0000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
16A000
|
unkown
|
page readonly
|
||
5C1800390000
|
trusted library allocation
|
page read and write
|
||
F925FFE000
|
unkown
|
page readonly
|
||
29AD4170000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
79CB000
|
heap
|
page read and write
|
||
5E10028F4000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
171000
|
unkown
|
page readonly
|
||
5E10026A8000
|
trusted library allocation
|
page read and write
|
||
7321000
|
heap
|
page read and write
|
||
6C5E1000
|
unkown
|
page execute read
|
||
5E1002C40000
|
trusted library allocation
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
F91F7FD000
|
stack
|
page read and write
|
||
1BFC002D8000
|
trusted library allocation
|
page read and write
|
||
54C00234000
|
direct allocation
|
page read and write
|
||
5E1002A68000
|
trusted library allocation
|
page read and write
|
||
29AD4377000
|
unclassified section
|
page read and write
|
||
F926FFE000
|
unkown
|
page readonly
|
||
1BFC00220000
|
trusted library allocation
|
page read and write
|
||
1BFC002B0000
|
trusted library allocation
|
page read and write
|
||
5E100235C000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
29ACD98B000
|
heap
|
page read and write
|
||
5C1800784000
|
trusted library allocation
|
page read and write
|
||
5C180069C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F9187FB000
|
stack
|
page read and write
|
||
5E1002CCC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
29ACDF10000
|
heap
|
page read and write
|
||
54C00303000
|
direct allocation
|
page read and write
|
||
5E1002590000
|
trusted library allocation
|
page read and write
|
||
5E1000A01000
|
trusted library allocation
|
page read and write
|
||
5E1002B14000
|
trusted library allocation
|
page read and write
|
||
5E100278C000
|
trusted library allocation
|
page read and write
|
||
F907FFE000
|
unkown
|
page readonly
|
||
5E1002E48000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
54C0026C000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800664000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
5E100266C000
|
trusted library allocation
|
page read and write
|
||
F90CFFE000
|
unkown
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
F901FFE000
|
unkown
|
page readonly
|
||
29ACA4D0000
|
heap
|
page readonly
|
||
68C1000
|
heap
|
page read and write
|
||
7325000
|
heap
|
page read and write
|
||
F916FFE000
|
unkown
|
page readonly
|
||
5E100326C000
|
trusted library allocation
|
page read and write
|
||
5E10024C0000
|
trusted library allocation
|
page read and write
|
||
5E1003310000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
5E1002410000
|
trusted library allocation
|
page read and write
|
||
5E10025EC000
|
trusted library allocation
|
page read and write
|
||
29AD417C000
|
heap
|
page read and write
|
||
79CA000
|
heap
|
page read and write
|
||
1BFC002F4000
|
trusted library allocation
|
page read and write
|
||
5E10031B8000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
54C002DC000
|
direct allocation
|
page read and write
|
||
29ACA570000
|
trusted library section
|
page readonly
|
||
5E10030D0000
|
trusted library allocation
|
page read and write
|
||
29AD43BE000
|
trusted library section
|
page read and write
|
||
7322000
|
heap
|
page read and write
|
||
5E1002544000
|
trusted library allocation
|
page read and write
|
||
732B000
|
heap
|
page read and write
|
||
5E1003040000
|
trusted library allocation
|
page read and write
|
||
5E10024B4000
|
trusted library allocation
|
page read and write
|
||
7B9B000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
E11000
|
unkown
|
page execute and write copy
|
||
1BFC00201000
|
trusted library allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
F9097FE000
|
stack
|
page read and write
|
||
5E1002CD8000
|
trusted library allocation
|
page read and write
|
||
5E1003201000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
29AD4746000
|
trusted library section
|
page read and write
|
||
5E1002CB0000
|
trusted library allocation
|
page read and write
|
||
F915FFE000
|
unkown
|
page readonly
|
||
732A000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
29ACE120000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F91EFFE000
|
unkown
|
page readonly
|
||
5C1800348000
|
trusted library allocation
|
page read and write
|
||
5E10026B4000
|
trusted library allocation
|
page read and write
|
||
5E100253C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
6C5E0000
|
unkown
|
page readonly
|
||
5C18006E8000
|
trusted library allocation
|
page read and write
|
||
5E1002ABC000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
1BFC00235000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
29AD463E000
|
trusted library section
|
page read and write
|
||
F9157FC000
|
stack
|
page read and write
|
||
5C1800624000
|
trusted library allocation
|
page read and write
|
||
29AD3962000
|
trusted library section
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800678000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E1002544000
|
trusted library allocation
|
page read and write
|
||
5E1002910000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800668000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5E1002550000
|
trusted library allocation
|
page read and write
|
||
5E1002E0C000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F97E5FE000
|
stack
|
page read and write
|
||
F911FFE000
|
unkown
|
page readonly
|
||
F30000
|
heap
|
page read and write
|
||
5E1002430000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
5E1003160000
|
trusted library allocation
|
page read and write
|
||
5C1800648000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
160000
|
unkown
|
page readonly
|
||
79CB000
|
heap
|
page read and write
|
||
5C1800610000
|
trusted library allocation
|
page read and write
|
||
5E1002E2C000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
5E10025EF000
|
trusted library allocation
|
page read and write
|
||
B46000
|
heap
|
page read and write
|
||
5E10032B4000
|
trusted library allocation
|
page read and write
|
||
F9257FC000
|
stack
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
29AD4680000
|
trusted library section
|
page read and write
|
||
5C18002ED000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
5E1002A3D000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
5C1800330000
|
trusted library allocation
|
page read and write
|
||
5E1002F7C000
|
trusted library allocation
|
page read and write
|
||
1BFC002BD000
|
trusted library allocation
|
page read and write
|
||
5E1003160000
|
trusted library allocation
|
page read and write
|
||
5E1003100000
|
trusted library allocation
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002728000
|
trusted library allocation
|
page read and write
|
||
5E10029AC000
|
trusted library allocation
|
page read and write
|
||
54C00215000
|
direct allocation
|
page read and write
|
||
5E1003304000
|
trusted library allocation
|
page read and write
|
||
5E10025EC000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
79C8000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
DF0000
|
direct allocation
|
page read and write
|
||
29AD21C2000
|
trusted library allocation
|
page read and write
|
||
5E1002420000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1003250000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
F9197FE000
|
stack
|
page read and write
|
||
79CE000
|
heap
|
page read and write
|
||
5E1003194000
|
trusted library allocation
|
page read and write
|
||
5C1800238000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7324000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7324000
|
heap
|
page read and write
|
||
7325000
|
heap
|
page read and write
|
||
79C0000
|
heap
|
page read and write
|
||
5C180080C000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F97C5FF000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
F9107FC000
|
stack
|
page read and write
|
||
5C18002B8000
|
trusted library allocation
|
page read and write
|
||
1BFC00264000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
5E100267C000
|
trusted library allocation
|
page read and write
|
||
5E1002D20000
|
trusted library allocation
|
page read and write
|
||
5C18002CC000
|
trusted library allocation
|
page read and write
|
||
5C1800658000
|
trusted library allocation
|
page read and write
|
||
5E1002414000
|
trusted library allocation
|
page read and write
|
||
5E1002401000
|
trusted library allocation
|
page read and write
|
||
5E1002888000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
F927FFE000
|
unkown
|
page readonly
|
||
5E1002A84000
|
trusted library allocation
|
page read and write
|
||
5E1002490000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
68C1000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
5E1002D50000
|
trusted library allocation
|
page read and write
|
||
5C18006B4000
|
trusted library allocation
|
page read and write
|
||
1BFC002A0000
|
trusted library allocation
|
page read and write
|
||
F9247FA000
|
stack
|
page read and write
|
||
5E100267C000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
5E10022E0000
|
trusted library allocation
|
page read and write
|
||
79C4000
|
heap
|
page read and write
|
||
5E10032A0000
|
trusted library allocation
|
page read and write
|
||
79CE000
|
heap
|
page read and write
|
||
7B95000
|
heap
|
page read and write
|
||
5E1002550000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5E1002C60000
|
trusted library allocation
|
page read and write
|
||
5E100280C000
|
trusted library allocation
|
page read and write
|
||
5E1002F70000
|
trusted library allocation
|
page read and write
|
||
79CE000
|
heap
|
page read and write
|
||
5C1800408000
|
trusted library allocation
|
page read and write
|
||
5E1002C01000
|
trusted library allocation
|
page read and write
|
||
5E1002F5C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
5C1800424000
|
trusted library allocation
|
page read and write
|
||
5E1002D90000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
5C180033C000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
1FFF000
|
stack
|
page read and write
|
||
29AD3C10000
|
trusted library section
|
page read and write
|
||
5E1002AD0000
|
trusted library allocation
|
page read and write
|
||
6C6BD000
|
unkown
|
page read and write
|
||
7329000
|
heap
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
732B000
|
heap
|
page read and write
|
||
F9167FD000
|
stack
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
79C5000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
5E10025EE000
|
trusted library allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
5C1800380000
|
trusted library allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
732B000
|
heap
|
page read and write
|
||
5E1002424000
|
trusted library allocation
|
page read and write
|
||
73E9000
|
heap
|
page read and write
|
||
5E1000E0A000
|
trusted library allocation
|
page read and write
|
||
5E1002D34000
|
trusted library allocation
|
page read and write
|
||
1BFC00270000
|
trusted library allocation
|
page read and write
|
||
5E1002EDC000
|
trusted library allocation
|
page read and write
|
||
263A000
|
stack
|
page read and write
|
||
29ACD98B000
|
heap
|
page read and write
|
||
5E10028F0000
|
trusted library allocation
|
page read and write
|
||
1BFC002BC000
|
trusted library allocation
|
page read and write
|
||
73ED000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
68C1000
|
heap
|
page read and write
|
There are 1362 hidden memdumps, click here to show them.