Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TsLvuUO.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempXMDGGl
|
ASCII text, with very long lines (1743), with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempjgCdeX
|
ASCII text, with very long lines (1743), with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempnShBdn
|
ASCII text, with very long lines (1743), with CRLF, CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempnwhObf
|
ASCII text, with very long lines (1743), with CRLF, CR line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\TsLvuUO.dll,#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\TsLvuUO.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\TsLvuUO.dll",#1
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "WYKSCfYVrwsdWpT"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "WYKSCfYVrwsdWpT2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "nfblQVJFwWHDFj"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "nfblQVJFwWHDFj"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "YGYYnsbMowvpr"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "YGYYnsbMowvpr"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "YGYYnsbMowvpr2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "YGYYnsbMowvpr2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "SfQlcfTRPgaddFhgU"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "SfQlcfTRPgaddFhgU2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "MBOKUVJttHMBWpgjMbJ"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "MBOKUVJttHMBWpgjMbJ2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "WYKSCfYVrwsdWpT"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "WYKSCfYVrwsdWpT2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "nfblQVJFwWHDFj"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "nfblQVJFwWHDFj"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "YGYYnsbMowvpr"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "YGYYnsbMowvpr"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "YGYYnsbMowvpr2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "YGYYnsbMowvpr2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "SfQlcfTRPgaddFhgU"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "SfQlcfTRPgaddFhgU2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU2"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /DELETE /F /TN "MBOKUVJttHMBWpgjMbJ"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ2"
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\TsLvuUO.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TsLvuUO.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 66 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://api2.check-data.xyz
|
unknown
|
||
http://api4.check-data.xyz/api/uninstall/17511/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr_ytab_b_1/8E53D89817ED4B0291FBFA7D0F319D53/97D99714-22C7-D2AF-3668-2A796B33DC65
|
44.232.42.242
|
||
http://api4.check-data.xyz/api/uninstall/59078/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr
|
unknown
|
||
http://api4.check-data.xyz/api/uninstall/59078/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr_ytab_b_1/8E53D89817ED4B0291FBFA7D0F319D53/1D5E65EB-947C-7A0A-9CCF-076D85CAD35E
|
44.232.42.242
|
||
http://api4.check-data.xyz
|
unknown
|
||
http://api4.check-data.xyz/api/uninstall/17511/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://smartblock.firefox.etp/play.svg
|
unknown
|
||
https://payments.google.com/
|
unknown
|
||
https://sandbox.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://www.google.com/s/
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://drive-staging.corp.google.com/
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://hg.mozilla.org/releases/mozilla-release
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
http://api5.check-data.xyz
|
unknown
|
||
http://api.check-data.xyz
|
unknown
|
||
https://github.com/mozilla/webcompat-reporter
|
unknown
|
||
https://crash-reports.mozilla.com/submit?id=
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://payments.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://drive-daily-4.corp.google.com/
|
unknown
|
||
https://docs.google.co
|
unknown
|
||
http://api3.check-data.xyz
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://www.google.com/m/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-pixeli
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://drive-daily-6.corp.google.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-pixel
|
unknown
|
||
https://drive-daily-0.corp.google.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://drive-daily-2.c
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://sandbox.google.com/
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://drive-daily-3.corp.google.com/
|
unknown
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkdata-1114476139.us-west-2.elb.amazonaws.com
|
44.232.42.242
|
||
api4.check-data.xyz
|
unknown
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
44.232.42.242
|
checkdata-1114476139.us-west-2.elb.amazonaws.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node
|
global UID
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3340000
|
heap
|
page read and write
|
||
E0C000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
9CF000
|
unkown
|
page read and write
|
||
1CD000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
4D07000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
57B000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
5BD000
|
stack
|
page read and write
|
||
C0E000
|
unkown
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4FA4000
|
heap
|
page read and write
|
||
80F0000
|
remote allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
37C000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4D6E000
|
heap
|
page read and write
|
||
4ED4000
|
heap
|
page read and write
|
||
4ED8000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
33D000
|
stack
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
31C6000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
361E000
|
heap
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
88D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4EF3000
|
heap
|
page read and write
|
||
4EDD000
|
stack
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
83E000
|
unkown
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
31B6000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4CB2000
|
heap
|
page read and write
|
||
4CDA000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
59EF000
|
direct allocation
|
page execute and read and write
|
||
7FFF000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
4ED4000
|
heap
|
page read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
4D33000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3632000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
55D000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
311C000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
570D000
|
direct allocation
|
page readonly
|
||
3370000
|
heap
|
page read and write
|
||
52C000
|
stack
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4F04000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
33C1000
|
direct allocation
|
page execute read
|
||
4D4B000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
31CF000
|
heap
|
page read and write
|
||
2F29000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
361E000
|
heap
|
page read and write
|
||
A8E000
|
unkown
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
3079000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
7DE000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2E39000
|
stack
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
80F0000
|
remote allocation
|
page read and write
|
||
31B6000
|
heap
|
page read and write
|
||
B8F000
|
unkown
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4EE4000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
3161000
|
heap
|
page read and write
|
||
2E79000
|
stack
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
90F000
|
unkown
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
D5E000
|
unkown
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
311F000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
5CC000
|
stack
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
832C000
|
stack
|
page read and write
|
||
328F000
|
unkown
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
2E8D000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
C4F000
|
unkown
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
4CB000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
32AB000
|
heap
|
page read and write
|
||
3457000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
78F000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
53B1000
|
direct allocation
|
page execute read
|
||
2F6E000
|
stack
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
6BE000
|
unkown
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4C98000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
4F9F000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4F9D000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
4EE4000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2FEF000
|
unkown
|
page read and write
|
||
809C000
|
stack
|
page read and write
|
||
98D000
|
stack
|
page read and write
|
||
4C94000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
4C84000
|
heap
|
page read and write
|
||
343A000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2F1D000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
51FD000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
351A000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
311B000
|
heap
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
5710000
|
direct allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
4E24000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
9ED000
|
stack
|
page read and write
|
||
351C000
|
heap
|
page read and write
|
||
5421000
|
direct allocation
|
page execute read
|
||
3110000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4CE6000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
4D62000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
31B2000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3641000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
7F7F000
|
stack
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
B1E000
|
unkown
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
7D00000
|
remote allocation
|
page read and write
|
||
4CC3000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
327F000
|
unkown
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
4FA6000
|
heap
|
page read and write
|
||
3076000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
74C5000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
345F000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4ED8000
|
heap
|
page read and write
|
||
30BA000
|
heap
|
page read and write
|
||
9BB000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
99E000
|
unkown
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
3334000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
BBE000
|
unkown
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
AEC000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
2EB8000
|
heap
|
page read and write
|
||
319C000
|
heap
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
4C99000
|
heap
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
7D00000
|
remote allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
31CB000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
4C8D000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4CF6000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
91E000
|
unkown
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
56E000
|
unkown
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
314C000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
816F000
|
stack
|
page read and write
|
||
3454000
|
heap
|
page read and write
|
||
4C94000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
4D6E000
|
heap
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
361F000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
D9F000
|
unkown
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
4D6A000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4D71000
|
direct allocation
|
page execute read
|
||
34C0000
|
heap
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
536F000
|
stack
|
page read and write
|
||
59ED000
|
direct allocation
|
page readonly
|
||
9F0000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
361E000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
D1C000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
4C96000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
3111000
|
heap
|
page read and write
|
||
812E000
|
stack
|
page read and write
|
||
A5D000
|
stack
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
4DCA000
|
direct allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
34CB000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7D00000
|
remote allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
312B000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
597D000
|
direct allocation
|
page readonly
|
||
2E50000
|
heap
|
page read and write
|
||
46E000
|
unkown
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
71C000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
31B6000
|
heap
|
page read and write
|
||
3624000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
34AB000
|
heap
|
page read and write
|
||
35C2000
|
heap
|
page read and write
|
||
34DF000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
324E000
|
unkown
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
60F000
|
stack
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
4C99000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
337A000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4FA6000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
334E000
|
unkown
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4D69000
|
heap
|
page read and write
|
||
361E000
|
heap
|
page read and write
|
||
D6D000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3039000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
4D22000
|
heap
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
4C94000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
3161000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
4CB3000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
C7E000
|
unkown
|
page read and write
|
||
34F2000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
31CB000
|
heap
|
page read and write
|
||
35DD000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
32ED000
|
stack
|
page read and write
|
||
3631000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
35CC000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
87F000
|
unkown
|
page read and write
|
||
3161000
|
heap
|
page read and write
|
||
DBF000
|
unkown
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
340E000
|
direct allocation
|
page readonly
|
||
316A000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4D08000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
323F000
|
unkown
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
4C94000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
37C000
|
stack
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
4EE4000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
19E000
|
unkown
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
31B9000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
2FAE000
|
unkown
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
heap
|
page read and write
|
||
4F99000
|
heap
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
34F3000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4CDE000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
4ED8000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
63F000
|
stack
|
page read and write
|
||
58D000
|
stack
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
72C000
|
stack
|
page read and write
|
||
35AA000
|
heap
|
page read and write
|
||
4FA1000
|
heap
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
4CDD000
|
heap
|
page read and write
|
||
34D5000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
4C8B000
|
heap
|
page read and write
|
||
34B2000
|
heap
|
page read and write
|
||
557A000
|
direct allocation
|
page read and write
|
||
AAD000
|
stack
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
51E000
|
unkown
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
9CC000
|
stack
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
DCE000
|
unkown
|
page read and write
|
||
79C000
|
stack
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
4DC5000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
3161000
|
heap
|
page read and write
|
||
69E000
|
unkown
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
17D000
|
stack
|
page read and write
|
||
C8D000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4C8D000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
3466000
|
heap
|
page read and write
|
||
9CF000
|
unkown
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
4D44000
|
heap
|
page read and write
|
||
4ED8000
|
heap
|
page read and write
|
||
4AE000
|
unkown
|
page read and write
|
||
34A7000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
341A000
|
direct allocation
|
page read and write
|
||
2F4C000
|
stack
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
31CF000
|
heap
|
page read and write
|
||
523F000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
315E000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4DD0000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2FDF000
|
unkown
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
335F000
|
unkown
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
98E000
|
unkown
|
page read and write
|
||
4CB3000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
351B000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
4CB3000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
5231000
|
heap
|
page read and write
|
||
7D7F000
|
stack
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
C6D000
|
stack
|
page read and write
|
||
55F000
|
unkown
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
98E000
|
unkown
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
95F000
|
unkown
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
2F5F000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4F9F000
|
heap
|
page read and write
|
||
4CDE000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
DFE000
|
unkown
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
324E000
|
unkown
|
page read and write
|
||
2ECF000
|
unkown
|
page read and write
|
||
2F78000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
2E76000
|
stack
|
page read and write
|
||
6DF000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
93E000
|
unkown
|
page read and write
|
||
35CC000
|
heap
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4D6E000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
4F2B000
|
heap
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
DCD000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
2E8E000
|
unkown
|
page read and write
|
||
5BF000
|
unkown
|
page read and write
|
||
B0F000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
836C000
|
stack
|
page read and write
|
||
4DBE000
|
direct allocation
|
page readonly
|
||
3380000
|
heap
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
550A000
|
direct allocation
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
805B000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
99F000
|
unkown
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
33DA000
|
heap
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5AD000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
4D6E000
|
heap
|
page read and write
|
||
1BC000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
4CFF000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3FE000
|
unkown
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
3619000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4D6A000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
35C3000
|
heap
|
page read and write
|
||
58F000
|
unkown
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4F17000
|
heap
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
4C96000
|
heap
|
page read and write
|
||
4D62000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
33BA000
|
heap
|
page read and write
|
||
63F000
|
unkown
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
3161000
|
heap
|
page read and write
|
||
9C7000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4FEC000
|
heap
|
page read and write
|
||
4EE9000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5980000
|
direct allocation
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
529A000
|
direct allocation
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
31CB000
|
heap
|
page read and write
|
||
4CEC000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
6ED000
|
stack
|
page read and write
|
||
35C7000
|
heap
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
4ED000
|
stack
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
4D69000
|
heap
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
330E000
|
unkown
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
35C9000
|
heap
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
35D7000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
1DF000
|
unkown
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
31CB000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4EE7000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
3641000
|
heap
|
page read and write
|
||
3641000
|
heap
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
34D7000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
CDD000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
31C7000
|
heap
|
page read and write
|
||
4EDE000
|
heap
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
312E000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
343F000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4D22000
|
heap
|
page read and write
|
||
33CB000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F6C000
|
stack
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
2FFD000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
31B6000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
570F000
|
direct allocation
|
page execute and read and write
|
||
33B7000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
34F5000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4CE6000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
E0F000
|
unkown
|
page read and write
|
||
CCC000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
33D000
|
stack
|
page read and write
|
||
2E9E000
|
unkown
|
page read and write
|
||
2FFE000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
85D000
|
stack
|
page read and write
|
||
59F0000
|
direct allocation
|
page read and write
|
||
597F000
|
direct allocation
|
page execute and read and write
|
||
3116000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
30D000
|
stack
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
4EC4000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
4C99000
|
heap
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
4C99000
|
heap
|
page read and write
|
||
95E000
|
unkown
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4D6E000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
33C0000
|
direct allocation
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
3455000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
361E000
|
heap
|
page read and write
|
||
4C99000
|
heap
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
323E000
|
unkown
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5141000
|
direct allocation
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
32EE000
|
unkown
|
page read and write
|
||
505D000
|
stack
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
4ED4000
|
heap
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
47F000
|
stack
|
page read and write
|
||
ACE000
|
unkown
|
page read and write
|
||
4CE6000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
4BC000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
80F0000
|
remote allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
31CB000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4C8D000
|
heap
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
511C000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
5231000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
312E000
|
heap
|
page read and write
|
||
328F000
|
unkown
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
CAC000
|
stack
|
page read and write
|
||
8CC000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
5EC000
|
stack
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
BFE000
|
unkown
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
345C000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
4F98000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
4D22000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
35E1000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
52BC000
|
stack
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
3171000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
There are 1124 hidden memdumps, click here to show them.