Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Asana for L&D.mp4
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
initial sample
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\INetCache\UF7M9YIR\configuration[1].xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\Cache\msprcore.bla
|
RAGE Package Format (RPF),
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\mspr.hds
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
|
Extensible storage user DataBase, version 0x620, checksum 0x2dc7a131, page size 8192, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
|
Extensible storage user DataBase, version 0x620, checksum 0x80870812, page size 8192, JustCreated, Windows version 0.0
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
|
"C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe" -ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://login.windows.local
|
unknown
|
||
https://login.windows.net
|
unknown
|
||
https://login.windows.net/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/http
|
unknown
|
||
http://dmd-ca-beta2/CertEnroll/dmd-ca-beta2_Microsoft%20Digital%20Media%20Authority%202005.crt0d
|
unknown
|
||
https://xsts.auth.xboxlive.com
|
unknown
|
||
http://www.videolan.org/x264.html
|
unknown
|
||
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml
|
unknown
|
||
http://json-schema.org/draft-04/schema
|
unknown
|
||
https://login.windows.local/
|
unknown
|
||
https://musicimage.xboxlive.comtBeforeRS2ent/v10_video/configuration.xml
|
unknown
|
||
http://dmd-ca-beta2/CertEnroll/Microsoft%20Digital%20Media%20Authority%202005.crl
|
unknown
|
||
https://xsts.auth.xboxlive.com/
|
unknown
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
settings-ssl.xboxlive.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
|
LegacyConfigSettingsUserId
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\MediaStore
|
LastOpenedDatabaseUserId
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
|
EnabledFeatures
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
|
HasLaunched
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Marketplace
|
MarketplaceCulture
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\PlayReady
|
SoftwareOverride
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\PlayReady
|
HardwareOverride
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Playback
|
EnableHardwareDrm
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
|
RateAndReviewLastUsedRuleset
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
|
RateAndReviewPromptShown
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CacheLimit
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CacheLimit
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CacheLimit
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
|
LastVersionOfBackgroundTaskRegistered
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserId
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignInAccountRegion
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserExplicitPrivilege
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserCid
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserSignInName
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserFirstName
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserLastName
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserBrowseAge
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
LastSignedInUserUseAge
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
|
ConfigLastDownload
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
|
ImageCleanupLastRun
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
|
LastVideoLibraryGatherTime
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
|
LastGrovelVideoCountWithIndexer
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
|
IsFirstTimeGrovel
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
|
FullGrovelCompleted
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\MDLC
|
HasForcedFullGrovelForVideosOnRs2
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\MDLC
|
LastTimeCollectionCharacteristicsCalculated
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\DismissedSoftLanding
|
VideoEditingTeachingMoment
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
|
CollectionBuildingTotalLocalItems
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
|
CollectionBuildingTotalCloudItems
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Marketplace
|
MarketplaceCulture
|
||
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
|
EnabledFeatures
|
There are 32 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1BDDD730000
|
trusted library allocation
|
page read and write
|
||
1BDE50F8000
|
heap
|
page read and write
|
||
1BDD8256000
|
heap
|
page read and write
|
||
1BDE5150000
|
heap
|
page read and write
|
||
1BDE846D000
|
heap
|
page read and write
|
||
1BDDDC60000
|
trusted library allocation
|
page read and write
|
||
1BDDEFCD000
|
heap
|
page read and write
|
||
1BDDEB80000
|
remote allocation
|
page read and write
|
||
1BDE83A1000
|
heap
|
page read and write
|
||
1BDDD874000
|
heap
|
page read and write
|
||
1BDDDB60000
|
trusted library allocation
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDDF02000
|
heap
|
page read and write
|
||
1BDE5378000
|
heap
|
page read and write
|
||
53EABFB000
|
stack
|
page read and write
|
||
1BDD81C0000
|
trusted library section
|
page readonly
|
||
1BDD4110000
|
heap
|
page read and write
|
||
1BDD1C9A000
|
heap
|
page read and write
|
||
1BDDD4B0000
|
trusted library allocation
|
page read and write
|
||
1BDE8290000
|
heap
|
page read and write
|
||
1BDDD4B0000
|
trusted library allocation
|
page read and write
|
||
1BDDDF02000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDE6216000
|
heap
|
page read and write
|
||
1BDE09CB000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDE5290000
|
heap
|
page read and write
|
||
1BDE532D000
|
heap
|
page read and write
|
||
1BDD1DA0000
|
heap
|
page read and write
|
||
1BDDE360000
|
trusted library allocation
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDE5261000
|
heap
|
page read and write
|
||
1BDDDC5C000
|
unkown
|
page readonly
|
||
1BDD1CD6000
|
heap
|
page read and write
|
||
1BDE0984000
|
heap
|
page read and write
|
||
1BDE71ED000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDDDE02000
|
heap
|
page read and write
|
||
1BDDEC34000
|
heap
|
page read and write
|
||
1BDDDC10000
|
trusted library allocation
|
page read and write
|
||
1BDDE7A8000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDC810000
|
trusted library allocation
|
page read and write
|
||
1BDD1DCF000
|
heap
|
page read and write
|
||
1BDDDC8A000
|
unkown
|
page read and write
|
||
1BDE09C9000
|
heap
|
page read and write
|
||
1BDD8387000
|
heap
|
page read and write
|
||
1BDE097C000
|
heap
|
page read and write
|
||
1BDE8496000
|
heap
|
page read and write
|
||
1BDDD580000
|
unkown
|
page readonly
|
||
1BDDDBA0000
|
trusted library allocation
|
page read and write
|
||
1BDDEE75000
|
heap
|
page read and write
|
||
1BDE8150000
|
heap
|
page read and write
|
||
1BDDEDD0000
|
heap
|
page read and write
|
||
1BDDE912000
|
heap
|
page read and write
|
||
1BDE711A000
|
heap
|
page read and write
|
||
1BDD4112000
|
heap
|
page read and write
|
||
1BDE60CF000
|
heap
|
page read and write
|
||
1BDE50C0000
|
heap
|
page read and write
|
||
53EC0FE000
|
stack
|
page read and write
|
||
53EB0FE000
|
stack
|
page read and write
|
||
1BDD4013000
|
heap
|
page read and write
|
||
1BDE09A9000
|
heap
|
page read and write
|
||
1BDDD560000
|
trusted library allocation
|
page read and write
|
||
1BDDD9B0000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDDE926000
|
heap
|
page read and write
|
||
1BDD1C13000
|
heap
|
page read and write
|
||
1BDDEFF6000
|
heap
|
page read and write
|
||
1BDDDC1A000
|
unkown
|
page read and write
|
||
1BDE60A6000
|
heap
|
page read and write
|
||
1BDDD5C0000
|
unkown
|
page readonly
|
||
1BDE6170000
|
heap
|
page read and write
|
||
1BDE5261000
|
heap
|
page read and write
|
||
1BDE9812000
|
heap
|
page read and write
|
||
1BDDC7B4000
|
trusted library allocation
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDD8214000
|
heap
|
page read and write
|
||
1BDE534F000
|
heap
|
page read and write
|
||
1BDDE000000
|
trusted library allocation
|
page read and write
|
||
1BDD1C76000
|
heap
|
page read and write
|
||
1BDDDBF8000
|
unkown
|
page readonly
|
||
1BDDED19000
|
heap
|
page read and write
|
||
1BDE511A000
|
heap
|
page read and write
|
||
1BDDDC82000
|
unkown
|
page readonly
|
||
1BDDE7A2000
|
heap
|
page read and write
|
||
1BDD1CCE000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDEB80000
|
remote allocation
|
page read and write
|
||
1BDDDB20000
|
trusted library allocation
|
page read and write
|
||
1BDDECAC000
|
heap
|
page read and write
|
||
53EB3FF000
|
stack
|
page read and write
|
||
1BDE0A16000
|
heap
|
page read and write
|
||
1BDE7170000
|
heap
|
page read and write
|
||
1BDDE7B4000
|
heap
|
page read and write
|
||
1BDD410E000
|
heap
|
page read and write
|
||
53E95F9000
|
stack
|
page read and write
|
||
53ECFFF000
|
stack
|
page read and write
|
||
1BDDE956000
|
heap
|
page read and write
|
||
1BDDE940000
|
heap
|
page read and write
|
||
1BDE6040000
|
heap
|
page read and write
|
||
1BDDD6A0000
|
trusted library allocation
|
page read and write
|
||
1BDE7356000
|
heap
|
page read and write
|
||
1BDD820B000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDE0A12000
|
heap
|
page read and write
|
||
1BDDE7B2000
|
heap
|
page read and write
|
||
1BDE7179000
|
heap
|
page read and write
|
||
1BDDE77D000
|
heap
|
page read and write
|
||
53EAEFD000
|
stack
|
page read and write
|
||
1BDE70F8000
|
heap
|
page read and write
|
||
1BDDE906000
|
heap
|
page read and write
|
||
1BDDECAC000
|
heap
|
page read and write
|
||
1BDE5150000
|
heap
|
page read and write
|
||
1BDD1DB5000
|
heap
|
page read and write
|
||
1BDDDC8E000
|
unkown
|
page readonly
|
||
1BDE80F8000
|
heap
|
page read and write
|
||
1BDDE9A0000
|
heap
|
page read and write
|
||
1BDDEB80000
|
remote allocation
|
page read and write
|
||
1BDD41DB000
|
heap
|
page read and write
|
||
1BDDDC10000
|
trusted library allocation
|
page read and write
|
||
53EBAEB000
|
stack
|
page read and write
|
||
1BDDD59A000
|
unkown
|
page readonly
|
||
1BDDE773000
|
heap
|
page read and write
|
||
1BDDE8A0000
|
heap
|
page read and write
|
||
1BDDEFE3000
|
heap
|
page read and write
|
||
1BDDD7C8000
|
unkown
|
page readonly
|
||
1BDE727C000
|
heap
|
page read and write
|
||
1BDE8400000
|
heap
|
page read and write
|
||
1BDE723F000
|
heap
|
page read and write
|
||
1BDE09CD000
|
heap
|
page read and write
|
||
1BDDE0C0000
|
trusted library allocation
|
page read and write
|
||
1BDE844B000
|
heap
|
page read and write
|
||
1BDD4133000
|
heap
|
page read and write
|
||
1BDDDFC5000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDE7283000
|
heap
|
page read and write
|
||
1BDD8242000
|
heap
|
page read and write
|
||
1BDE0982000
|
heap
|
page read and write
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDDE91F000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDE814000
|
heap
|
page read and write
|
||
1BDDD5D0000
|
unkown
|
page readonly
|
||
1BDDDF38000
|
heap
|
page read and write
|
||
1BDE5356000
|
heap
|
page read and write
|
||
1BDDE7A6000
|
heap
|
page read and write
|
||
1BDE981A000
|
heap
|
page read and write
|
||
1BDD1D61000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDE09AB000
|
heap
|
page read and write
|
||
1BDE73D0000
|
heap
|
page read and write
|
||
1BDE70C0000
|
heap
|
page read and write
|
||
1BDE8179000
|
heap
|
page read and write
|
||
1BDE0948000
|
heap
|
page read and write
|
||
1BDDEA80000
|
trusted library allocation
|
page read and write
|
||
1BDE60AD000
|
heap
|
page read and write
|
||
1BDE825A000
|
heap
|
page read and write
|
||
1BDE7290000
|
heap
|
page read and write
|
||
1BDDD7F2000
|
unkown
|
page readonly
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDE51C4000
|
heap
|
page read and write
|
||
1BDE0A05000
|
heap
|
page read and write
|
||
1BDDED43000
|
heap
|
page read and write
|
||
53EADFA000
|
stack
|
page read and write
|
||
1BDDD680000
|
trusted library allocation
|
page read and write
|
||
1BDE83D7000
|
heap
|
page read and write
|
||
1BDE0957000
|
heap
|
page read and write
|
||
1BDE8356000
|
heap
|
page read and write
|
||
1BDE7238000
|
heap
|
page read and write
|
||
1BDE723F000
|
heap
|
page read and write
|
||
1BDDE668000
|
heap
|
page read and write
|
||
1BDE70F8000
|
heap
|
page read and write
|
||
1BDE09BC000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE52C0000
|
heap
|
page read and write
|
||
1BDDD982000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDDEE6E000
|
heap
|
page read and write
|
||
53EB6FA000
|
stack
|
page read and write
|
||
1BDD1D13000
|
heap
|
page read and write
|
||
1BDE523F000
|
heap
|
page read and write
|
||
1BDE0917000
|
heap
|
page read and write
|
||
1BDE811A000
|
heap
|
page read and write
|
||
1BDDD5E0000
|
trusted library allocation
|
page read and write
|
||
53E97F9000
|
stack
|
page read and write
|
||
1BDD1CD2000
|
heap
|
page read and write
|
||
1BDDDC90000
|
trusted library allocation
|
page read and write
|
||
1BDD1D5E000
|
heap
|
page read and write
|
||
1BDDE110000
|
trusted library allocation
|
page read and write
|
||
53EA9F9000
|
stack
|
page read and write
|
||
1BDE09CF000
|
heap
|
page read and write
|
||
1BDE09C7000
|
heap
|
page read and write
|
||
1BDD835A000
|
heap
|
page read and write
|
||
1BDE7261000
|
heap
|
page read and write
|
||
1BDDE74D000
|
heap
|
page read and write
|
||
1BDDEA20000
|
unkown
|
page execute read
|
||
1BDDD5FE000
|
unkown
|
page read and write
|
||
1BDDD65C000
|
unkown
|
page readonly
|
||
1BDE09D8000
|
heap
|
page read and write
|
||
1BDDEC22000
|
heap
|
page read and write
|
||
1BDE6017000
|
heap
|
page read and write
|
||
1BDE732D000
|
heap
|
page read and write
|
||
1BDD81B0000
|
trusted library section
|
page readonly
|
||
1BDE7216000
|
heap
|
page read and write
|
||
1BDDE000000
|
trusted library allocation
|
page read and write
|
||
1BDDED41000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDE725A000
|
heap
|
page read and write
|
||
1BDDEA30000
|
trusted library allocation
|
page read and write
|
||
53EBEFF000
|
stack
|
page read and write
|
||
1BDDEC33000
|
heap
|
page read and write
|
||
1BDE61A9000
|
heap
|
page read and write
|
||
1BDDD867000
|
heap
|
page read and write
|
||
1BDE965E000
|
heap
|
page read and write
|
||
53EA6FC000
|
stack
|
page read and write
|
||
1BDDE916000
|
heap
|
page read and write
|
||
1BDE70C0000
|
heap
|
page read and write
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDDDCBA000
|
unkown
|
page readonly
|
||
53EC3FB000
|
stack
|
page read and write
|
||
1BDE511A000
|
heap
|
page read and write
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDE7290000
|
heap
|
page read and write
|
||
1BDD1D0F000
|
heap
|
page read and write
|
||
53ECDF8000
|
stack
|
page read and write
|
||
1BDE8170000
|
heap
|
page read and write
|
||
1BDE73D0000
|
heap
|
page read and write
|
||
1BDDD78E000
|
unkown
|
page readonly
|
||
53EBBFE000
|
stack
|
page read and write
|
||
1BDDDC90000
|
trusted library allocation
|
page read and write
|
||
1BDE8304000
|
heap
|
page read and write
|
||
1BDE60C0000
|
heap
|
page read and write
|
||
1BDDD660000
|
trusted library allocation
|
page read and write
|
||
1BDE548F000
|
heap
|
page read and write
|
||
1BDE711A000
|
heap
|
page read and write
|
||
1BDDDCB0000
|
trusted library allocation
|
page read and write
|
||
53EB7FB000
|
stack
|
page read and write
|
||
1BDDDC30000
|
trusted library allocation
|
page read and write
|
||
1BDE53C3000
|
heap
|
page read and write
|
||
1BDE61ED000
|
heap
|
page read and write
|
||
1BDDE6F5000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
53EB2FF000
|
stack
|
page read and write
|
||
53EB1FB000
|
stack
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDE0A14000
|
heap
|
page read and write
|
||
1BDDDC18000
|
unkown
|
page readonly
|
||
1BDDD5A0000
|
trusted library allocation
|
page read and write
|
||
1BDDD5F0000
|
trusted library allocation
|
page read and write
|
||
1BDE848F000
|
heap
|
page read and write
|
||
1BDD8741000
|
trusted library allocation
|
page read and write
|
||
1BDE6157000
|
heap
|
page read and write
|
||
1BDE7326000
|
heap
|
page read and write
|
||
1BDE615E000
|
heap
|
page read and write
|
||
1BDE08F9000
|
heap
|
page read and write
|
||
1BDDDD50000
|
trusted library allocation
|
page read and write
|
||
1BDE827C000
|
heap
|
page read and write
|
||
1BDDDCC6000
|
unkown
|
page read and write
|
||
1BDDE0D0000
|
trusted library allocation
|
page read and write
|
||
1BDE728A000
|
heap
|
page read and write
|
||
1BDDDB30000
|
trusted library allocation
|
page read and write
|
||
1BDE73A1000
|
heap
|
page read and write
|
||
1BDE965B000
|
heap
|
page read and write
|
||
1BDD8200000
|
heap
|
page read and write
|
||
1BDDECB3000
|
heap
|
page read and write
|
||
1BDD81A0000
|
trusted library section
|
page readonly
|
||
1BDDD660000
|
trusted library allocation
|
page read and write
|
||
1BDDDF38000
|
heap
|
page read and write
|
||
1BDD837A000
|
heap
|
page read and write
|
||
1BDDEDF7000
|
heap
|
page read and write
|
||
1BDE82B9000
|
heap
|
page read and write
|
||
1BDD1D88000
|
heap
|
page read and write
|
||
1BDE60F8000
|
heap
|
page read and write
|
||
1BDE6121000
|
heap
|
page read and write
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDDE83B000
|
heap
|
page read and write
|
||
1BDD1CF5000
|
heap
|
page read and write
|
||
1BDDE7B6000
|
heap
|
page read and write
|
||
1BDE608B000
|
heap
|
page read and write
|
||
1BDDD620000
|
unkown
|
page readonly
|
||
53E9FFF000
|
stack
|
page read and write
|
||
53EA0FD000
|
stack
|
page read and write
|
||
1BDDDFC3000
|
heap
|
page read and write
|
||
1BDDDBFC000
|
unkown
|
page readonly
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDDD4A0000
|
trusted library allocation
|
page read and write
|
||
1BDDEFE5000
|
heap
|
page read and write
|
||
53EA8FD000
|
stack
|
page read and write
|
||
1BDE60CF000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDE09BE000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDDD582000
|
unkown
|
page readonly
|
||
1BDDDB10000
|
trusted library allocation
|
page read and write
|
||
1BDD8396000
|
heap
|
page read and write
|
||
1BDE527C000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDD600000
|
trusted library allocation
|
page read and write
|
||
1BDE5400000
|
heap
|
page read and write
|
||
53EC8FB000
|
stack
|
page read and write
|
||
1BDDEC00000
|
heap
|
page read and write
|
||
1BDE72B9000
|
heap
|
page read and write
|
||
1BDDDF59000
|
heap
|
page read and write
|
||
1BDE739A000
|
heap
|
page read and write
|
||
1BDE5422000
|
heap
|
page read and write
|
||
1BDDD800000
|
heap
|
page read and write
|
||
1BDDE79A000
|
heap
|
page read and write
|
||
1BDE5429000
|
heap
|
page read and write
|
||
1BDE830B000
|
heap
|
page read and write
|
||
1BDE50C0000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDDDBF2000
|
unkown
|
page readonly
|
||
1BDE611A000
|
heap
|
page read and write
|
||
1BDDD788000
|
unkown
|
page readonly
|
||
1BDE80C0000
|
heap
|
page read and write
|
||
1BDE0939000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDDEDBD000
|
heap
|
page read and write
|
||
53EB4FF000
|
stack
|
page read and write
|
||
1BDE0933000
|
heap
|
page read and write
|
||
1BDE611A000
|
heap
|
page read and write
|
||
1BDDE000000
|
trusted library allocation
|
page read and write
|
||
1BDD413D000
|
heap
|
page read and write
|
||
1BDE5170000
|
heap
|
page read and write
|
||
1BDDEECE000
|
heap
|
page read and write
|
||
1BDDC820000
|
trusted library allocation
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
53EA3FC000
|
stack
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDDD630000
|
trusted library allocation
|
page read and write
|
||
1BDE096F000
|
heap
|
page read and write
|
||
1BDE09B1000
|
heap
|
page read and write
|
||
1BDE525A000
|
heap
|
page read and write
|
||
1BDE61C4000
|
heap
|
page read and write
|
||
1BDD1D45000
|
heap
|
page read and write
|
||
1BDDD5F8000
|
unkown
|
page readonly
|
||
1BDE823F000
|
heap
|
page read and write
|
||
1BDE5150000
|
heap
|
page read and write
|
||
53EA1FE000
|
stack
|
page read and write
|
||
1BDE51F4000
|
heap
|
page read and write
|
||
1BDE549D000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE70FF000
|
heap
|
page read and write
|
||
1BDE8452000
|
heap
|
page read and write
|
||
1BDE725A000
|
heap
|
page read and write
|
||
1BDDDB86000
|
unkown
|
page readonly
|
||
1BDD1D0A000
|
heap
|
page read and write
|
||
1BDE6069000
|
heap
|
page read and write
|
||
1BDE5496000
|
heap
|
page read and write
|
||
1BDD1CA0000
|
heap
|
page read and write
|
||
1BDDD78C000
|
unkown
|
page readonly
|
||
1BDDE98D000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDDBC0000
|
trusted library allocation
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDDD9C4000
|
heap
|
page read and write
|
||
1BDE6220000
|
heap
|
page read and write
|
||
1BDE811A000
|
heap
|
page read and write
|
||
1BDDDC88000
|
unkown
|
page readonly
|
||
53ECBFB000
|
stack
|
page read and write
|
||
1BDE50C0000
|
heap
|
page read and write
|
||
1BDE52E2000
|
heap
|
page read and write
|
||
1BDE0A18000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDD610000
|
trusted library allocation
|
page read and write
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDE832D000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDDB60000
|
trusted library allocation
|
page read and write
|
||
1BDDD7C2000
|
unkown
|
page readonly
|
||
1BDE6017000
|
heap
|
page read and write
|
||
1BDD1C51000
|
heap
|
page read and write
|
||
1BDE80F8000
|
heap
|
page read and write
|
||
1BDDE1E0000
|
trusted library allocation
|
page read and write
|
||
1BDE0A03000
|
heap
|
page read and write
|
||
1BDD83F9000
|
heap
|
page read and write
|
||
1BDDEA40000
|
trusted library allocation
|
page read and write
|
||
53E8F4B000
|
stack
|
page read and write
|
||
1BDE8238000
|
heap
|
page read and write
|
||
53EA5FC000
|
stack
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDDEDE5000
|
heap
|
page read and write
|
||
1BDD41DF000
|
heap
|
page read and write
|
||
1BDDDC00000
|
trusted library allocation
|
page read and write
|
||
1BDDEAA0000
|
trusted library allocation
|
page read and write
|
||
1BDDECAC000
|
heap
|
page read and write
|
||
1BDE9532000
|
heap
|
page read and write
|
||
1BDD8401000
|
trusted library allocation
|
page read and write
|
||
1BDE5238000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDDA00000
|
trusted library allocation
|
page read and write
|
||
1BDE0966000
|
heap
|
page read and write
|
||
1BDE70F8000
|
heap
|
page read and write
|
||
1BDD8490000
|
trusted library allocation
|
page read and write
|
||
1BDDEA50000
|
trusted library allocation
|
page read and write
|
||
1BDDEA10000
|
unkown
|
page execute read
|
||
1BDE09AF000
|
heap
|
page read and write
|
||
53EA2FB000
|
stack
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDD5C2000
|
unkown
|
page readonly
|
||
1BDDD87D000
|
heap
|
page read and write
|
||
1BDD8349000
|
heap
|
page read and write
|
||
1BDD1B00000
|
heap
|
page read and write
|
||
1BDE7290000
|
heap
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDD5D6000
|
unkown
|
page readonly
|
||
1BDDD6C0000
|
trusted library allocation
|
page read and write
|
||
1BDE0964000
|
heap
|
page read and write
|
||
1BDDE0F0000
|
trusted library allocation
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDDEC23000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDE9413000
|
heap
|
page read and write
|
||
1BDDED25000
|
heap
|
page read and write
|
||
1BDE53A1000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDE50F8000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDD8235000
|
heap
|
page read and write
|
||
1BDE80F8000
|
heap
|
page read and write
|
||
53EACFE000
|
stack
|
page read and write
|
||
53E96FE000
|
stack
|
page read and write
|
||
1BDE730B000
|
heap
|
page read and write
|
||
1BDE5452000
|
heap
|
page read and write
|
||
1BDD1C8B000
|
heap
|
page read and write
|
||
1BDE0A21000
|
heap
|
page read and write
|
||
1BDD8650000
|
trusted library allocation
|
page read and write
|
||
1BDD1DC6000
|
heap
|
page read and write
|
||
1BDE82C0000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDDDD0000
|
heap
|
page read and write
|
||
1BDE6040000
|
heap
|
page read and write
|
||
1BDE5170000
|
heap
|
page read and write
|
||
1BDE80C0000
|
heap
|
page read and write
|
||
1BDE0942000
|
heap
|
page read and write
|
||
1BDE511A000
|
heap
|
page read and write
|
||
1BDDF010000
|
heap
|
page read and write
|
||
1BDE980A000
|
heap
|
page read and write
|
||
53E9AFF000
|
stack
|
page read and write
|
||
1BDD7EF0000
|
trusted library allocation
|
page read and write
|
||
1BDDE800000
|
heap
|
page read and write
|
||
1BDDE0D0000
|
trusted library allocation
|
page read and write
|
||
1BDDDC60000
|
trusted library allocation
|
page read and write
|
||
1BDDE779000
|
heap
|
page read and write
|
||
1BDE09DC000
|
heap
|
page read and write
|
||
1BDD4100000
|
heap
|
page read and write
|
||
1BDE3ED9000
|
heap
|
page read and write
|
||
1BDE0980000
|
heap
|
page read and write
|
||
1BDDEC9F000
|
heap
|
page read and write
|
||
1BDE6150000
|
heap
|
page read and write
|
||
1BDDEDCD000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDD1C53000
|
heap
|
page read and write
|
||
1BDDE717000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDDD7FA000
|
unkown
|
page readonly
|
||
53E98F3000
|
stack
|
page read and write
|
||
1BDDE7A0000
|
heap
|
page read and write
|
||
1BDDD298000
|
trusted library allocation
|
page read and write
|
||
1BDDEC9F000
|
heap
|
page read and write
|
||
1BDE53D7000
|
heap
|
page read and write
|
||
1BDE734F000
|
heap
|
page read and write
|
||
1BDD4123000
|
heap
|
page read and write
|
||
1BDE0904000
|
heap
|
page read and write
|
||
1BDE0971000
|
heap
|
page read and write
|
||
1BDDDA20000
|
trusted library allocation
|
page read and write
|
||
1BDDE751000
|
heap
|
page read and write
|
||
1BDE08FB000
|
heap
|
page read and write
|
||
1BDDDBFE000
|
unkown
|
page readonly
|
||
1BDDE794000
|
heap
|
page read and write
|
||
1BDE60C0000
|
heap
|
page read and write
|
||
53EAFFA000
|
stack
|
page read and write
|
||
1BDDDF00000
|
heap
|
page read and write
|
||
1BDE7283000
|
heap
|
page read and write
|
||
1BDDC780000
|
trusted library allocation
|
page read and write
|
||
1BDE53D0000
|
heap
|
page read and write
|
||
1BDE9520000
|
heap
|
page read and write
|
||
1BDE8378000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDE0D0000
|
trusted library allocation
|
page read and write
|
||
1BDDEDDA000
|
heap
|
page read and write
|
||
1BDDEAA0000
|
trusted library allocation
|
page read and write
|
||
1BDDDB8C000
|
unkown
|
page readonly
|
||
1BDDE984000
|
heap
|
page read and write
|
||
1BDDE7AC000
|
heap
|
page read and write
|
||
1BDE0931000
|
heap
|
page read and write
|
||
1BDE5150000
|
heap
|
page read and write
|
||
53EA4FC000
|
stack
|
page read and write
|
||
1BDD1D23000
|
heap
|
page read and write
|
||
1BDE6062000
|
heap
|
page read and write
|
||
1BDD41CC000
|
heap
|
page read and write
|
||
1BDDDFBD000
|
heap
|
page read and write
|
||
1BDDE818000
|
heap
|
page read and write
|
||
1BDE097E000
|
heap
|
page read and write
|
||
1BDDE1E0000
|
trusted library allocation
|
page read and write
|
||
1BDDD5F2000
|
unkown
|
page readonly
|
||
1BDDE93C000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE61A2000
|
heap
|
page read and write
|
||
1BDE0973000
|
heap
|
page read and write
|
||
1BDDDCB8000
|
unkown
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDE60D6000
|
heap
|
page read and write
|
||
1BDE80C0000
|
heap
|
page read and write
|
||
1BDDED12000
|
heap
|
page read and write
|
||
1BDE620F000
|
heap
|
page read and write
|
||
1BDDDF38000
|
heap
|
page read and write
|
||
1BDDE781000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE0946000
|
heap
|
page read and write
|
||
1BDDDC5E000
|
unkown
|
page readonly
|
||
1BDE70FF000
|
heap
|
page read and write
|
||
1BDDEE00000
|
heap
|
page read and write
|
||
1BDD837F000
|
heap
|
page read and write
|
||
1BDDEF63000
|
heap
|
page read and write
|
||
1BDDE94D000
|
heap
|
page read and write
|
||
1BDE839A000
|
heap
|
page read and write
|
||
1BDE6084000
|
heap
|
page read and write
|
||
1BDD8640000
|
trusted library allocation
|
page read and write
|
||
1BDE8220000
|
heap
|
page read and write
|
||
53EC9FB000
|
stack
|
page read and write
|
||
1BDE70C0000
|
heap
|
page read and write
|
||
1BDDED48000
|
heap
|
page read and write
|
||
1BDDE6CF000
|
heap
|
page read and write
|
||
53EBBF5000
|
stack
|
page read and write
|
||
1BDDEDD8000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDE965E000
|
heap
|
page read and write
|
||
1BDDD5FC000
|
unkown
|
page readonly
|
||
1BDD8229000
|
heap
|
page read and write
|
||
1BDE8290000
|
heap
|
page read and write
|
||
1BDDDFBB000
|
heap
|
page read and write
|
||
1BDDE90A000
|
heap
|
page read and write
|
||
1BDD1D34000
|
heap
|
page read and write
|
||
1BDE811A000
|
heap
|
page read and write
|
||
1BDDEE8E000
|
heap
|
page read and write
|
||
1BDE09DA000
|
heap
|
page read and write
|
||
1BDDD865000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDE360000
|
trusted library allocation
|
page read and write
|
||
1BDDDC58000
|
unkown
|
page readonly
|
||
1BDE72C0000
|
heap
|
page read and write
|
||
1BDE0935000
|
heap
|
page read and write
|
||
1BDE09F8000
|
heap
|
page read and write
|
||
1BDE5283000
|
heap
|
page read and write
|
||
1BDDE7AE000
|
heap
|
page read and write
|
||
1BDDD58A000
|
unkown
|
page readonly
|
||
1BDDE0D0000
|
trusted library allocation
|
page read and write
|
||
1BDE81ED000
|
heap
|
page read and write
|
||
1BDD1CD9000
|
heap
|
page read and write
|
||
1BDE83DE000
|
heap
|
page read and write
|
||
1BDDDDF0000
|
heap
|
page read and write
|
||
1BDE8422000
|
heap
|
page read and write
|
||
1BDE5290000
|
heap
|
page read and write
|
||
1BDE8261000
|
heap
|
page read and write
|
||
1BDDDBA0000
|
trusted library allocation
|
page read and write
|
||
1BDDD880000
|
heap
|
page read and write
|
||
1BDE50FF000
|
heap
|
page read and write
|
||
1BDD1C30000
|
heap
|
page read and write
|
||
1BDE727C000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
1BDE9812000
|
heap
|
page read and write
|
||
1BDDEAB0000
|
heap
|
page read and write
|
||
1BDDDB20000
|
trusted library allocation
|
page read and write
|
||
1BDDE821000
|
heap
|
page read and write
|
||
1BDE83D0000
|
heap
|
page read and write
|
||
1BDDD770000
|
trusted library allocation
|
page read and write
|
||
1BDE6092000
|
heap
|
page read and write
|
||
1BDDD76A000
|
unkown
|
page readonly
|
||
1BDE525A000
|
heap
|
page read and write
|
||
1BDDE90E000
|
heap
|
page read and write
|
||
1BDE60AD000
|
heap
|
page read and write
|
||
1BDDE7C5000
|
heap
|
page read and write
|
||
1BDE5444000
|
heap
|
page read and write
|
||
1BDE528A000
|
heap
|
page read and write
|
||
1BDE7297000
|
heap
|
page read and write
|
||
1BDDEE58000
|
heap
|
page read and write
|
||
1BDDEE5F000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDE0A1A000
|
heap
|
page read and write
|
||
53EA7F8000
|
stack
|
page read and write
|
||
53EC3FE000
|
stack
|
page read and write
|
||
1BDE0975000
|
heap
|
page read and write
|
||
1BDE80C0000
|
heap
|
page read and write
|
||
1BDE73C3000
|
heap
|
page read and write
|
||
53EC2FE000
|
stack
|
page read and write
|
||
53EA9F7000
|
stack
|
page read and write
|
||
53EBAFE000
|
stack
|
page read and write
|
||
1BDE60C0000
|
heap
|
page read and write
|
||
1BDD1DE8000
|
heap
|
page read and write
|
||
1BDD413B000
|
heap
|
page read and write
|
||
1BDDF000000
|
heap
|
page read and write
|
||
1BDE7378000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE9812000
|
heap
|
page read and write
|
||
1BDDDD80000
|
trusted library allocation
|
page read and write
|
||
1BDE6179000
|
heap
|
page read and write
|
||
1BDE7238000
|
heap
|
page read and write
|
||
1BDDEF00000
|
heap
|
page read and write
|
||
1BDD8217000
|
heap
|
page read and write
|
||
1BDE0926000
|
heap
|
page read and write
|
||
1BDDEA00000
|
trusted library allocation
|
page read and write
|
||
1BDE82E2000
|
heap
|
page read and write
|
||
1BDE08F5000
|
heap
|
page read and write
|
||
1BDDD7C0000
|
trusted library allocation
|
page read and write
|
||
1BDE5326000
|
heap
|
page read and write
|
||
1BDDED54000
|
heap
|
page read and write
|
||
1BDDD871000
|
heap
|
page read and write
|
||
1BDDDB80000
|
unkown
|
page readonly
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDDEDE2000
|
heap
|
page read and write
|
||
53EBBE1000
|
stack
|
page read and write
|
||
1BDDDC70000
|
heap
|
page read and write
|
||
1BDE511A000
|
heap
|
page read and write
|
||
1BDDD670000
|
trusted library allocation
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDDC770000
|
trusted library allocation
|
page read and write
|
||
1BDDDCC4000
|
unkown
|
page readonly
|
||
1BDDD9CE000
|
heap
|
page read and write
|
||
1BDE8150000
|
heap
|
page read and write
|
||
1BDDE99B000
|
heap
|
page read and write
|
||
1BDD81E0000
|
trusted library section
|
page readonly
|
||
1BDD4173000
|
heap
|
page read and write
|
||
1BDE7304000
|
heap
|
page read and write
|
||
1BDDE9F5000
|
heap
|
page read and write
|
||
1BDE8180000
|
heap
|
page read and write
|
||
1BDE968B000
|
heap
|
page read and write
|
||
1BDDE61B000
|
heap
|
page read and write
|
||
1BDD81F0000
|
trusted library section
|
page readonly
|
||
1BDDD9EC000
|
heap
|
page read and write
|
||
53E92FE000
|
stack
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDC7C0000
|
trusted library allocation
|
page read and write
|
||
1BDDDB20000
|
trusted library allocation
|
page read and write
|
||
1BDE9850000
|
heap
|
page read and write
|
||
1BDE60C0000
|
heap
|
page read and write
|
||
1BDDE700000
|
heap
|
page read and write
|
||
1BDE51ED000
|
heap
|
page read and write
|
||
1BDDE810000
|
heap
|
page read and write
|
||
1BDE09E7000
|
heap
|
page read and write
|
||
1BDDE81D000
|
heap
|
page read and write
|
||
1BDD829A000
|
heap
|
page read and write
|
||
53ECAFB000
|
stack
|
page read and write
|
||
1BDDDD30000
|
trusted library allocation
|
page read and write
|
||
1BDE5238000
|
heap
|
page read and write
|
||
1BDD4121000
|
heap
|
page read and write
|
||
1BDE71ED000
|
heap
|
page read and write
|
||
1BDE6039000
|
heap
|
page read and write
|
||
1BDD1D5A000
|
heap
|
page read and write
|
||
1BDE60F8000
|
heap
|
page read and write
|
||
1BDE83D0000
|
heap
|
page read and write
|
||
1BDDD5D0000
|
trusted library allocation
|
page read and write
|
||
53E99FF000
|
stack
|
page read and write
|
||
1BDE6143000
|
heap
|
page read and write
|
||
1BDE09E9000
|
heap
|
page read and write
|
||
1BDE61CB000
|
heap
|
page read and write
|
||
1BDE8150000
|
heap
|
page read and write
|
||
1BDE5150000
|
heap
|
page read and write
|
||
1BDD1D80000
|
heap
|
page read and write
|
||
1BDE8290000
|
heap
|
page read and write
|
||
53ECEFD000
|
stack
|
page read and write
|
||
1BDDC7E0000
|
trusted library allocation
|
page read and write
|
||
1BDDC7B0000
|
trusted library allocation
|
page read and write
|
||
1BDDE823000
|
heap
|
page read and write
|
||
1BDE520F000
|
heap
|
page read and write
|
||
1BDDD570000
|
trusted library allocation
|
page read and write
|
||
1BDDDB40000
|
trusted library allocation
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDDD2BC000
|
trusted library allocation
|
page read and write
|
||
1BDE09AD000
|
heap
|
page read and write
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDE9695000
|
heap
|
page read and write
|
||
1BDE0908000
|
heap
|
page read and write
|
||
1BDDEC9F000
|
heap
|
page read and write
|
||
1BDDD656000
|
unkown
|
page read and write
|
||
1BDDED4F000
|
heap
|
page read and write
|
||
1BDE9520000
|
heap
|
page read and write
|
||
1BDE523F000
|
heap
|
page read and write
|
||
1BDE83F9000
|
heap
|
page read and write
|
||
1BDE981A000
|
heap
|
page read and write
|
||
1BDD1CFA000
|
heap
|
page read and write
|
||
1BDE5010000
|
heap
|
page read and write
|
||
1BDE09E5000
|
heap
|
page read and write
|
||
1BDE7180000
|
heap
|
page read and write
|
||
1BDE8429000
|
heap
|
page read and write
|
||
1BDD41FD000
|
heap
|
page read and write
|
||
1BDE7216000
|
heap
|
page read and write
|
||
1BDE5220000
|
heap
|
page read and write
|
||
1BDD8219000
|
heap
|
page read and write
|
||
1BDD835C000
|
heap
|
page read and write
|
||
1BDDECB4000
|
heap
|
page read and write
|
||
1BDDD782000
|
unkown
|
page read and write
|
||
53EBFFD000
|
stack
|
page read and write
|
||
1BDDE9D0000
|
heap
|
page read and write
|
||
53ED0FB000
|
stack
|
page read and write
|
||
1BDDE82C000
|
heap
|
page read and write
|
||
1BDDDC8C000
|
unkown
|
page readonly
|
||
1BDE72E2000
|
heap
|
page read and write
|
||
1BDE50F8000
|
heap
|
page read and write
|
||
1BDDE802000
|
heap
|
page read and write
|
||
1BDD410B000
|
heap
|
page read and write
|
||
1BDE9802000
|
heap
|
page read and write
|
||
1BDD1C40000
|
heap
|
page read and write
|
||
1BDDE600000
|
heap
|
page read and write
|
||
1BDD8393000
|
heap
|
page read and write
|
||
1BDE09F6000
|
heap
|
page read and write
|
||
1BDE8326000
|
heap
|
page read and write
|
||
1BDDEEDA000
|
heap
|
page read and write
|
||
1BDDD5B6000
|
unkown
|
page readonly
|
||
1BDE5220000
|
heap
|
page read and write
|
||
1BDDE100000
|
trusted library allocation
|
page read and write
|
||
1BDE5216000
|
heap
|
page read and write
|
||
1BDDEDFC000
|
heap
|
page read and write
|
||
53EAAFA000
|
stack
|
page read and write
|
||
1BDDED0E000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDDFBF000
|
heap
|
page read and write
|
||
53EBAE1000
|
stack
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDD1B20000
|
heap
|
page read and write
|
||
1BDE6039000
|
heap
|
page read and write
|
||
53EB8FD000
|
stack
|
page read and write
|
||
1BDDC790000
|
trusted library allocation
|
page read and write
|
||
1BDE50AD000
|
heap
|
page read and write
|
||
1BDDDFCA000
|
heap
|
page read and write
|
||
1BDDD5BC000
|
unkown
|
page readonly
|
||
1BDE601E000
|
heap
|
page read and write
|
||
1BDE6062000
|
heap
|
page read and write
|
||
1BDE52B9000
|
heap
|
page read and write
|
||
1BDDD986000
|
heap
|
page read and write
|
||
1BDDE8EE000
|
heap
|
page read and write
|
||
1BDDD5DC000
|
unkown
|
page readonly
|
||
1BDDD5CA000
|
unkown
|
page read and write
|
||
1BDDED51000
|
heap
|
page read and write
|
||
1BDDE91A000
|
heap
|
page read and write
|
||
1BDDDC00000
|
trusted library allocation
|
page read and write
|
||
1BDDE8FF000
|
heap
|
page read and write
|
||
1BDE8297000
|
heap
|
page read and write
|
||
1BDE834F000
|
heap
|
page read and write
|
||
1BDDD9AC000
|
heap
|
page read and write
|
||
1BDDD2DF000
|
trusted library allocation
|
page read and write
|
||
1BDDD98D000
|
heap
|
page read and write
|
||
53EB9FE000
|
stack
|
page read and write
|
||
1BDDD560000
|
trusted library allocation
|
page read and write
|
||
1BDDD290000
|
trusted library allocation
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDDD560000
|
trusted library allocation
|
page read and write
|
||
1BDE546D000
|
heap
|
page read and write
|
||
1BDDD690000
|
trusted library allocation
|
page read and write
|
||
1BDE5297000
|
heap
|
page read and write
|
||
1BDE849D000
|
heap
|
page read and write
|
||
1BDD1DA9000
|
heap
|
page read and write
|
||
53ECCF8000
|
stack
|
page read and write
|
||
1BDDD7CC000
|
unkown
|
page read and write
|
||
1BDE5304000
|
heap
|
page read and write
|
||
1BDD1DE5000
|
heap
|
page read and write
|
||
1BDDE000000
|
trusted library allocation
|
page read and write
|
||
1BDDD630000
|
trusted library allocation
|
page read and write
|
||
1BDDE922000
|
heap
|
page read and write
|
||
1BDD4180000
|
heap
|
page read and write
|
||
1BDE51ED000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDDE78A000
|
heap
|
page read and write
|
||
1BDDD8FB000
|
heap
|
page read and write
|
||
1BDDD650000
|
unkown
|
page readonly
|
||
1BDE50F8000
|
heap
|
page read and write
|
||
53EBAF5000
|
stack
|
page read and write
|
||
1BDDE5C0000
|
trusted library allocation
|
page read and write
|
||
1BDD1CC9000
|
heap
|
page read and write
|
||
1BDE608B000
|
heap
|
page read and write
|
||
1BDE711A000
|
heap
|
page read and write
|
||
1BDD1D47000
|
heap
|
page read and write
|
||
1BDDE0F0000
|
trusted library allocation
|
page read and write
|
||
1BDE83C3000
|
heap
|
page read and write
|
||
1BDE08F7000
|
heap
|
page read and write
|
||
1BDE8216000
|
heap
|
page read and write
|
||
1BDE5290000
|
heap
|
page read and write
|
||
1BDD41C9000
|
heap
|
page read and write
|
||
1BDD8212000
|
heap
|
page read and write
|
||
1BDDD4B0000
|
trusted library allocation
|
page read and write
|
||
53EBDFE000
|
stack
|
page read and write
|
||
1BDD7F00000
|
heap
|
page readonly
|
||
1BDE80FF000
|
heap
|
page read and write
|
||
1BDDEE7D000
|
heap
|
page read and write
|
||
1BDE0A09000
|
heap
|
page read and write
|
||
1BDE60D6000
|
heap
|
page read and write
|
||
1BDDDB5A000
|
unkown
|
page read and write
|
||
1BDDD7CE000
|
unkown
|
page readonly
|
||
1BDD3620000
|
trusted library allocation
|
page read and write
|
||
1BDE5290000
|
heap
|
page read and write
|
||
1BDDD5B0000
|
unkown
|
page read and write
|
||
1BDD8770000
|
trusted library allocation
|
page read and write
|
||
1BDE6150000
|
heap
|
page read and write
|
||
53E9BFC000
|
stack
|
page read and write
|
||
1BDD3E30000
|
heap
|
page read and write
|
||
1BDD81D0000
|
trusted library section
|
page readonly
|
||
1BDD4106000
|
heap
|
page read and write
|
||
1BDDD62A000
|
unkown
|
page readonly
|
||
1BDD3630000
|
trusted library allocation
|
page read and write
|
||
1BDE5150000
|
heap
|
page read and write
|
||
1BDE544B000
|
heap
|
page read and write
|
||
1BDD1CDF000
|
heap
|
page read and write
|
||
1BDE521D000
|
heap
|
page read and write
|
||
1BDD1AF0000
|
heap
|
page read and write
|
||
1BDDD7F0000
|
unkown
|
page readonly
|
||
1BDE7150000
|
heap
|
page read and write
|
||
1BDE8283000
|
heap
|
page read and write
|
||
1BDE7261000
|
heap
|
page read and write
|
||
1BDE7170000
|
heap
|
page read and write
|
||
1BDE0937000
|
heap
|
page read and write
|
||
1BDE61D2000
|
heap
|
page read and write
|
||
1BDE8444000
|
heap
|
page read and write
|
||
1BDE530B000
|
heap
|
page read and write
|
||
1BDE53D0000
|
heap
|
page read and write
|
||
1BDE9850000
|
heap
|
page read and write
|
||
1BDE5216000
|
heap
|
page read and write
|
||
1BDE7010000
|
heap
|
page read and write
|
||
53ECCF5000
|
stack
|
page read and write
|
||
1BDE53DE000
|
heap
|
page read and write
|
||
1BDE53D0000
|
heap
|
page read and write
|
||
1BDE0800000
|
heap
|
page read and write
|
||
1BDDD6B0000
|
trusted library allocation
|
page read and write
|
||
1BDE6010000
|
heap
|
page read and write
|
||
1BDDD740000
|
trusted library allocation
|
page read and write
|
||
1BDD1C00000
|
heap
|
page read and write
|
||
1BDDEEE3000
|
heap
|
page read and write
|
||
1BDE9858000
|
heap
|
page read and write
|
||
1BDE7290000
|
heap
|
page read and write
|
||
1BDE980A000
|
heap
|
page read and write
|
||
1BDE53F9000
|
heap
|
page read and write
|
||
1BDE0A23000
|
heap
|
page read and write
|
||
1BDE09C0000
|
heap
|
page read and write
|
||
1BDE621D000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDDD622000
|
unkown
|
page readonly
|
||
1BDD1C2C000
|
heap
|
page read and write
|
||
1BDE60DD000
|
heap
|
page read and write
|
||
1BDDDC52000
|
unkown
|
page readonly
|
||
1BDDE74A000
|
heap
|
page read and write
|
||
1BDE539A000
|
heap
|
page read and write
|
||
1BDE0A07000
|
heap
|
page read and write
|
||
1BDE0906000
|
heap
|
page read and write
|
||
1BDDDFA8000
|
heap
|
page read and write
|
||
1BDDEE45000
|
heap
|
page read and write
|
||
1BDE8150000
|
heap
|
page read and write
|
||
1BDDE961000
|
heap
|
page read and write
|
||
1BDE6084000
|
heap
|
page read and write
|
||
1BDDD6E0000
|
trusted library allocation
|
page read and write
|
||
1BDDD5A0000
|
trusted library allocation
|
page read and write
|
||
1BDDE78C000
|
heap
|
page read and write
|
||
1BDDE7D0000
|
heap
|
page read and write
|
||
1BDD4002000
|
heap
|
page read and write
|
||
1BDE8010000
|
heap
|
page read and write
|
||
1BDE6180000
|
heap
|
page read and write
|
There are 848 hidden memdumps, click here to show them.