Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Asana for L&D.mp4
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
initial sample
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\INetCache\19MFHN9J\configuration[1].xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\Cache\msprcore.bla
|
RAGE Package Format (RPF),
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\mspr.hds
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
|
Extensible storage engine DataBase, version 0x620, checksum 0x7eab7a98, page size 8192, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
|
Extensible storage engine DataBase, version 0x620, checksum 0x7bf63069, page size 8192, JustCreated, Windows version 0.0
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
|
"C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe" -ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://login.windows.local
|
unknown
|
||
https://login.windows.net
|
unknown
|
||
https://login.windows.net/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/http
|
unknown
|
||
http://dmd-ca-beta2/CertEnroll/dmd-ca-beta2_Microsoft%20Digital%20Media%20Authority%202005.crt0d
|
unknown
|
||
https://xsts.auth.xboxlive.com
|
unknown
|
||
http://www.videolan.org/x264.html
|
unknown
|
||
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml
|
unknown
|
||
http://json-schema.org/draft-04/schema
|
unknown
|
||
https://login.windows.local/
|
unknown
|
||
https://musicimage.xboxlive.comtBeforeRS2ent/v10_video/configuration.xml
|
unknown
|
||
http://dmd-ca-beta2/CertEnroll/Microsoft%20Digital%20Media%20Authority%202005.crl
|
unknown
|
||
https://xsts.auth.xboxlive.com/
|
unknown
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
settings-ssl.xboxlive.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
|
LegacyConfigSettingsUserId
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\MediaStore
|
LastOpenedDatabaseUserId
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
|
EnabledFeatures
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
|
HasLaunched
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Marketplace
|
MarketplaceCulture
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\PlayReady
|
SoftwareOverride
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\PlayReady
|
HardwareOverride
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Playback
|
EnableHardwareDrm
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
|
RateAndReviewLastUsedRuleset
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
|
RateAndReviewPromptShown
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Content
|
CacheLimit
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\Cookies
|
CacheLimit
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CachePrefix
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CacheVersion
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet
Settings\Cache\History
|
CacheLimit
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
|
LastVersionOfBackgroundTaskRegistered
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserId
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignInAccountRegion
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserExplicitPrivilege
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserCid
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserSignInName
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserFirstName
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserLastName
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserBrowseAge
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
LastSignedInUserUseAge
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
|
ConfigLastDownload
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
|
ImageCleanupLastRun
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
|
LastVideoLibraryGatherTime
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
|
LastGrovelVideoCountWithIndexer
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
|
IsFirstTimeGrovel
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
|
FullGrovelCompleted
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\MDLC
|
HasForcedFullGrovelForVideosOnRs2
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\MDLC
|
LastTimeCollectionCharacteristicsCalculated
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
|
CollectionBuildingTotalLocalItems
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
|
CollectionBuildingTotalCloudItems
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\DismissedSoftLanding
|
VideoEditingTeachingMoment
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Marketplace
|
MarketplaceCulture
|
||
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
|
EnabledFeatures
|
There are 32 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B0DF0CF000
|
heap
|
page read and write
|
||
1B0D70B0000
|
trusted library allocation
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0E011A000
|
heap
|
page read and write
|
||
1B0CDB1B000
|
heap
|
page read and write
|
||
1B0D8D8B000
|
heap
|
page read and write
|
||
1B0DF08B000
|
heap
|
page read and write
|
||
1B0DB575000
|
heap
|
page read and write
|
||
1B0D7476000
|
heap
|
page read and write
|
||
1B0DF290000
|
heap
|
page read and write
|
||
1B0D7980000
|
trusted library allocation
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D8D78000
|
heap
|
page read and write
|
||
1B0D8FA3000
|
heap
|
page read and write
|
||
1B0D6EC0000
|
trusted library allocation
|
page read and write
|
||
1B0D8187000
|
heap
|
page read and write
|
||
1B0CB640000
|
heap
|
page read and write
|
||
1B0D6230000
|
trusted library allocation
|
page read and write
|
||
1B0D8DE5000
|
heap
|
page read and write
|
||
1B0DF084000
|
heap
|
page read and write
|
||
1B0D61F8000
|
unkown
|
page readonly
|
||
4801EFA000
|
stack
|
page read and write
|
||
1B0D7140000
|
trusted library allocation
|
page read and write
|
||
1B0CB6A7000
|
heap
|
page read and write
|
||
1B0DF378000
|
heap
|
page read and write
|
||
4800DFC000
|
stack
|
page read and write
|
||
1B0E0290000
|
heap
|
page read and write
|
||
1B0D1BE0000
|
trusted library allocation
|
page read and write
|
||
48021F5000
|
stack
|
page read and write
|
||
1B0E00C0000
|
heap
|
page read and write
|
||
1B0D8D00000
|
heap
|
page read and write
|
||
1B0D7340000
|
trusted library allocation
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D8A34000
|
heap
|
page read and write
|
||
1B0DF170000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
48027FC000
|
stack
|
page read and write
|
||
1B0DB61A000
|
heap
|
page read and write
|
||
1B0D8176000
|
heap
|
page read and write
|
||
1B0D70C8000
|
unkown
|
page readonly
|
||
1B0DDE0C000
|
heap
|
page read and write
|
||
1B0D1D77000
|
heap
|
page read and write
|
||
1B0DF2B9000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E0238000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0E01ED000
|
heap
|
page read and write
|
||
1B0DF0D6000
|
heap
|
page read and write
|
||
1B0DB5E5000
|
heap
|
page read and write
|
||
1B0D8800000
|
heap
|
page read and write
|
||
1B0D89FD000
|
heap
|
page read and write
|
||
1B0CB7D0000
|
heap
|
page read and write
|
||
1B0D7FD0000
|
unkown
|
page execute read
|
||
1B0D7587000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D8159000
|
heap
|
page read and write
|
||
1B0D8600000
|
trusted library allocation
|
page read and write
|
||
1B0D21A0000
|
trusted library allocation
|
page read and write
|
||
1B0D75C5000
|
heap
|
page read and write
|
||
1B0D7070000
|
trusted library allocation
|
page read and write
|
||
1B0D78D8000
|
unkown
|
page readonly
|
||
1B0D70D0000
|
trusted library allocation
|
page read and write
|
||
1B0DD4B0000
|
remote allocation
|
page read and write
|
||
1B0DF15E000
|
heap
|
page read and write
|
||
1B0D1BF0000
|
trusted library allocation
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0E023F000
|
heap
|
page read and write
|
||
1B0D7A70000
|
trusted library allocation
|
page read and write
|
||
1B0D7A90000
|
trusted library allocation
|
page read and write
|
||
1B0CB75A000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
1B0D6F60000
|
trusted library allocation
|
page read and write
|
||
1B0D899E000
|
heap
|
page read and write
|
||
1B0D7FF0000
|
trusted library allocation
|
page read and write
|
||
1B0DF179000
|
heap
|
page read and write
|
||
1B0D70F0000
|
trusted library allocation
|
page read and write
|
||
1B0D890E000
|
heap
|
page read and write
|
||
1B0DB605000
|
heap
|
page read and write
|
||
1B0D7840000
|
trusted library allocation
|
page read and write
|
||
1B0D1C2F000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D1E00000
|
trusted library allocation
|
page read and write
|
||
1B0DF1A2000
|
heap
|
page read and write
|
||
1B0DF143000
|
heap
|
page read and write
|
||
4800BFC000
|
stack
|
page read and write
|
||
1B0D88FF000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
4800FF5000
|
stack
|
page read and write
|
||
48022FD000
|
stack
|
page read and write
|
||
1B0DF0AD000
|
heap
|
page read and write
|
||
1B0D8D98000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DF0AD000
|
heap
|
page read and write
|
||
1B0E0216000
|
heap
|
page read and write
|
||
1B0D74FB000
|
heap
|
page read and write
|
||
487FFFE000
|
stack
|
page read and write
|
||
1B0D8C00000
|
heap
|
page read and write
|
||
1B0D895F000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DB5D8000
|
heap
|
page read and write
|
||
1B0D738C000
|
unkown
|
page readonly
|
||
1B0CB713000
|
heap
|
page read and write
|
||
1B0E0283000
|
heap
|
page read and write
|
||
1B0E00CF000
|
heap
|
page read and write
|
||
1B0CD930000
|
trusted library allocation
|
page read and write
|
||
1B0D7CD4000
|
unkown
|
page read and write
|
||
1B0CB530000
|
heap
|
page read and write
|
||
1B0D7446000
|
heap
|
page read and write
|
||
1B0CD940000
|
heap
|
page readonly
|
||
4803AFE000
|
stack
|
page read and write
|
||
1B0D1C16000
|
heap
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
1B0CB6C9000
|
heap
|
page read and write
|
||
1B0D8A22000
|
heap
|
page read and write
|
||
1B0DF34F000
|
heap
|
page read and write
|
||
1B0E0017000
|
heap
|
page read and write
|
||
1B0D8946000
|
heap
|
page read and write
|
||
1B0CB6E5000
|
heap
|
page read and write
|
||
1B0D1E91000
|
trusted library allocation
|
page read and write
|
||
1B0DF216000
|
heap
|
page read and write
|
||
1B0D6CA8000
|
trusted library allocation
|
page read and write
|
||
1B0D8810000
|
heap
|
page read and write
|
||
1B0DB5CF000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0D9010000
|
heap
|
page read and write
|
||
1B0E00C0000
|
heap
|
page read and write
|
||
1B0CB77F000
|
heap
|
page read and write
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
48039FD000
|
stack
|
page read and write
|
||
1B0DDE5A000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0DB618000
|
heap
|
page read and write
|
||
48015F7000
|
stack
|
page read and write
|
||
1B0D7810000
|
heap
|
page read and write
|
||
1B0D8F40000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0CB689000
|
heap
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
1B0D8926000
|
heap
|
page read and write
|
||
1B0D8B43000
|
heap
|
page read and write
|
||
1B0DF1A9000
|
heap
|
page read and write
|
||
1B0DB623000
|
heap
|
page read and write
|
||
1B0CDB71000
|
heap
|
page read and write
|
||
1B0D7450000
|
heap
|
page read and write
|
||
1B0DF21D000
|
heap
|
page read and write
|
||
1B0D8FE3000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0CB62E000
|
heap
|
page read and write
|
||
1B0D6FB0000
|
unkown
|
page readonly
|
||
1B0D8F00000
|
heap
|
page read and write
|
||
1B0D8D6F000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0CB5D0000
|
heap
|
page read and write
|
||
1B0D817D000
|
heap
|
page read and write
|
||
1B0DF017000
|
heap
|
page read and write
|
||
1B0D80D7000
|
heap
|
page read and write
|
||
1B0D8F82000
|
heap
|
page read and write
|
||
1B0DDB13000
|
heap
|
page read and write
|
||
1B0CDB00000
|
heap
|
page read and write
|
||
1B0D88FF000
|
heap
|
page read and write
|
||
1B0CB7B5000
|
heap
|
page read and write
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
1B0E0290000
|
heap
|
page read and write
|
||
1B0D70F0000
|
trusted library allocation
|
page read and write
|
||
1B0D895F000
|
heap
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
1B0DF0AD000
|
heap
|
page read and write
|
||
1B0D8AA5000
|
heap
|
page read and write
|
||
1B0DF1ED000
|
heap
|
page read and write
|
||
1B0D87D0000
|
trusted library allocation
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D8AA9000
|
heap
|
page read and write
|
||
1B0D8E00000
|
heap
|
page read and write
|
||
1B0DDE08000
|
heap
|
page read and write
|
||
1B0D8944000
|
heap
|
page read and write
|
||
4800AFD000
|
stack
|
page read and write
|
||
1B0D8FC4000
|
heap
|
page read and write
|
||
1B0CDB21000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
48010FC000
|
stack
|
page read and write
|
||
1B0D8136000
|
heap
|
page read and write
|
||
1B0D8600000
|
trusted library allocation
|
page read and write
|
||
1B0D77DC000
|
heap
|
page read and write
|
||
1B0D8906000
|
heap
|
page read and write
|
||
1B0DDE5A000
|
heap
|
page read and write
|
||
1B0D8956000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D6F70000
|
trusted library allocation
|
page read and write
|
||
1B0D8E41000
|
heap
|
page read and write
|
||
1B0D8EE4000
|
heap
|
page read and write
|
||
1B0DB5AF000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
4803AFB000
|
stack
|
page read and write
|
||
1B0DF039000
|
heap
|
page read and write
|
||
1B0D8E21000
|
heap
|
page read and write
|
||
1B0D61C0000
|
trusted library allocation
|
page read and write
|
||
1B0DF20F000
|
heap
|
page read and write
|
||
1B0D6FB2000
|
unkown
|
page readonly
|
||
1B0D88EE000
|
heap
|
page read and write
|
||
1B0D8FE5000
|
heap
|
page read and write
|
||
1B0D6F9A000
|
unkown
|
page read and write
|
||
48020F5000
|
stack
|
page read and write
|
||
1B0D7030000
|
unkown
|
page readonly
|
||
1B0CDB39000
|
heap
|
page read and write
|
||
487FEF9000
|
stack
|
page read and write
|
||
1B0D8816000
|
heap
|
page read and write
|
||
1B0CB600000
|
heap
|
page read and write
|
||
1B0CB6CE000
|
heap
|
page read and write
|
||
1B0D71D0000
|
trusted library allocation
|
page read and write
|
||
1B0D7250000
|
trusted library allocation
|
page read and write
|
||
1B0E0261000
|
heap
|
page read and write
|
||
1B0D75B3000
|
heap
|
page read and write
|
||
1B0DF290000
|
heap
|
page read and write
|
||
1B0E0238000
|
heap
|
page read and write
|
||
1B0D1C32000
|
heap
|
page read and write
|
||
1B0E025A000
|
heap
|
page read and write
|
||
1B0D78B8000
|
unkown
|
page readonly
|
||
1B0DB4FB000
|
heap
|
page read and write
|
||
1B0DDA20000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0E023F000
|
heap
|
page read and write
|
||
1B0DF2E2000
|
heap
|
page read and write
|
||
1B0DB616000
|
heap
|
page read and write
|
||
1B0D78A0000
|
trusted library allocation
|
page read and write
|
||
1B0D6220000
|
trusted library allocation
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
1B0E025A000
|
heap
|
page read and write
|
||
1B0DF21D000
|
heap
|
page read and write
|
||
1B0E00D6000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0CD070000
|
trusted library allocation
|
page read and write
|
||
1B0D8956000
|
heap
|
page read and write
|
||
1B0D7940000
|
unkown
|
page readonly
|
||
1B0DF157000
|
heap
|
page read and write
|
||
1B0D1C45000
|
heap
|
page read and write
|
||
1B0D7102000
|
unkown
|
page readonly
|
||
1B0DF0CF000
|
heap
|
page read and write
|
||
1B0DB5F8000
|
heap
|
page read and write
|
||
1B0DB537000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D7950000
|
trusted library allocation
|
page read and write
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0D816F000
|
heap
|
page read and write
|
||
1B0E00FF000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0E0062000
|
heap
|
page read and write
|
||
1B0D893C000
|
heap
|
page read and write
|
||
1B0DF0A6000
|
heap
|
page read and write
|
||
1B0D8600000
|
trusted library allocation
|
page read and write
|
||
1B0E0069000
|
heap
|
page read and write
|
||
48038F9000
|
stack
|
page read and write
|
||
1B0D8BF1000
|
heap
|
page read and write
|
||
1B0E011A000
|
heap
|
page read and write
|
||
487FCFE000
|
stack
|
page read and write
|
||
1B0DB571000
|
heap
|
page read and write
|
||
1B0D7050000
|
trusted library allocation
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0E011A000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0CB510000
|
heap
|
page read and write
|
||
1B0D70A0000
|
trusted library allocation
|
page read and write
|
||
1B0D8189000
|
heap
|
page read and write
|
||
1B0DB539000
|
heap
|
page read and write
|
||
1B0D6FD0000
|
trusted library allocation
|
page read and write
|
||
1B0D8BF8000
|
heap
|
page read and write
|
||
1B0D1C42000
|
heap
|
page read and write
|
||
1B0DB564000
|
heap
|
page read and write
|
||
1B0D77E2000
|
heap
|
page read and write
|
||
1B0D818F000
|
heap
|
page read and write
|
||
1B0D6CEE000
|
trusted library allocation
|
page read and write
|
||
48021FE000
|
stack
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
48013FA000
|
stack
|
page read and write
|
||
1B0DDE24000
|
heap
|
page read and write
|
||
1B0DB5BC000
|
heap
|
page read and write
|
||
1B0D77DE000
|
heap
|
page read and write
|
||
1B0D8F3C000
|
heap
|
page read and write
|
||
1B0DB533000
|
heap
|
page read and write
|
||
4802EFC000
|
stack
|
page read and write
|
||
1B0D7830000
|
heap
|
page read and write
|
||
1B0DF1ED000
|
heap
|
page read and write
|
||
1B0D8BD1000
|
heap
|
page read and write
|
||
48026FE000
|
stack
|
page read and write
|
||
1B0DF040000
|
heap
|
page read and write
|
||
1B0DF040000
|
heap
|
page read and write
|
||
1B0DF1F4000
|
heap
|
page read and write
|
||
1B0DF1ED000
|
heap
|
page read and write
|
||
1B0D8912000
|
heap
|
page read and write
|
||
1B0D8FAF000
|
heap
|
page read and write
|
||
1B0DF0D6000
|
heap
|
page read and write
|
||
1B0E03D0000
|
heap
|
page read and write
|
||
48000F9000
|
stack
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E001E000
|
heap
|
page read and write
|
||
1B0D8CAC000
|
heap
|
page read and write
|
||
1B0DDC5E000
|
heap
|
page read and write
|
||
48004FC000
|
stack
|
page read and write
|
||
1B0D6FEA000
|
unkown
|
page readonly
|
||
1B0DB566000
|
heap
|
page read and write
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
1B0D7030000
|
trusted library allocation
|
page read and write
|
||
1B0D8BC6000
|
heap
|
page read and write
|
||
1B0D73D0000
|
trusted library allocation
|
page read and write
|
||
1B0DB5B1000
|
heap
|
page read and write
|
||
1B0D6EC0000
|
trusted library allocation
|
page read and write
|
||
1B0CB745000
|
heap
|
page read and write
|
||
1B0D6CCC000
|
trusted library allocation
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D8BDC000
|
heap
|
page read and write
|
||
1B0D8FBF000
|
heap
|
page read and write
|
||
1B0D7413000
|
heap
|
page read and write
|
||
1B0D8A33000
|
heap
|
page read and write
|
||
1B0DB56F000
|
heap
|
page read and write
|
||
1B0D78C0000
|
trusted library allocation
|
page read and write
|
||
1B0D7589000
|
heap
|
page read and write
|
||
4801AFE000
|
stack
|
page read and write
|
||
1B0D9000000
|
heap
|
page read and write
|
||
1B0DB5E7000
|
heap
|
page read and write
|
||
1B0D6CA0000
|
trusted library allocation
|
page read and write
|
||
48020E2000
|
stack
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
4801DFB000
|
stack
|
page read and write
|
||
1B0DB5C9000
|
heap
|
page read and write
|
||
1B0D1C9A000
|
heap
|
page read and write
|
||
1B0D7960000
|
trusted library allocation
|
page read and write
|
||
48008FB000
|
stack
|
page read and write
|
||
1B0D8FC1000
|
heap
|
page read and write
|
||
1B0D78FA000
|
unkown
|
page readonly
|
||
1B0D6F80000
|
trusted library allocation
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0DB546000
|
heap
|
page read and write
|
||
1B0D7050000
|
trusted library allocation
|
page read and write
|
||
48034FB000
|
stack
|
page read and write
|
||
1B0D6CF0000
|
trusted library allocation
|
page read and write
|
||
1B0E00C0000
|
heap
|
page read and write
|
||
1B0DDE1C000
|
heap
|
page read and write
|
||
1B0CB70F000
|
heap
|
page read and write
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0D7400000
|
heap
|
page read and write
|
||
4803DFF000
|
stack
|
page read and write
|
||
1B0D7920000
|
trusted library allocation
|
page read and write
|
||
1B0DDE0C000
|
heap
|
page read and write
|
||
1B0D8954000
|
heap
|
page read and write
|
||
48015F9000
|
stack
|
page read and write
|
||
1B0D61D0000
|
trusted library allocation
|
page read and write
|
||
1B0D1D5E000
|
heap
|
page read and write
|
||
1B0D8813000
|
heap
|
page read and write
|
||
1B0D1C1E000
|
heap
|
page read and write
|
||
1B0D8CC4000
|
heap
|
page read and write
|
||
1B0D8CD0000
|
heap
|
page read and write
|
||
48037FF000
|
stack
|
page read and write
|
||
1B0D7FC0000
|
trusted library allocation
|
page read and write
|
||
1B0DDE24000
|
heap
|
page read and write
|
||
1B0D70D0000
|
trusted library allocation
|
page read and write
|
||
1B0DF297000
|
heap
|
page read and write
|
||
1B0DB609000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
1B0DB573000
|
heap
|
page read and write
|
||
1B0D1C20000
|
heap
|
page read and write
|
||
1B0DB531000
|
heap
|
page read and write
|
||
1B0DF062000
|
heap
|
page read and write
|
||
1B0D1C87000
|
heap
|
page read and write
|
||
48001F2000
|
stack
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0D7000000
|
trusted library allocation
|
page read and write
|
||
1B0DF3D0000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D8820000
|
heap
|
page read and write
|
||
1B0DDC8B000
|
heap
|
page read and write
|
||
1B0D2160000
|
trusted library section
|
page readonly
|
||
1B0DDE0C000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0CDBC7000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D8CB8000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D7600000
|
trusted library allocation
|
page read and write
|
||
1B0D6FBA000
|
unkown
|
page read and write
|
||
4802DFB000
|
stack
|
page read and write
|
||
1B0DB557000
|
heap
|
page read and write
|
||
1B0D78B2000
|
unkown
|
page readonly
|
||
1B0D8922000
|
heap
|
page read and write
|
||
1B0CDA02000
|
heap
|
page read and write
|
||
1B0DDC95000
|
heap
|
page read and write
|
||
1B0D87D0000
|
trusted library allocation
|
page read and write
|
||
1B0CB734000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
48002FF000
|
stack
|
page read and write
|
||
1B0E0283000
|
heap
|
page read and write
|
||
1B0D8DD2000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0D7453000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0D8FD0000
|
heap
|
page read and write
|
||
1B0DDE02000
|
heap
|
page read and write
|
||
1B0E00C0000
|
heap
|
page read and write
|
||
1B0D88EE000
|
heap
|
page read and write
|
||
1B0E00C0000
|
heap
|
page read and write
|
||
1B0DF30B000
|
heap
|
page read and write
|
||
48029FE000
|
stack
|
page read and write
|
||
1B0D891F000
|
heap
|
page read and write
|
||
1B0D890A000
|
heap
|
page read and write
|
||
1B0CB676000
|
heap
|
page read and write
|
||
1B0DB5AB000
|
heap
|
page read and write
|
||
1B0D8100000
|
heap
|
page read and write
|
||
1B0DF170000
|
heap
|
page read and write
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0DF1A2000
|
heap
|
page read and write
|
||
1B0DF15E000
|
heap
|
page read and write
|
||
1B0CDB0B000
|
heap
|
page read and write
|
||
1B0D2180000
|
trusted library section
|
page readonly
|
||
1B0D8983000
|
heap
|
page read and write
|
||
1B0D61F2000
|
unkown
|
page readonly
|
||
1B0D1C1A000
|
heap
|
page read and write
|
||
1B0D6FE2000
|
unkown
|
page readonly
|
||
1B0CDBDC000
|
heap
|
page read and write
|
||
1B0E028A000
|
heap
|
page read and write
|
||
1B0D8DE3000
|
heap
|
page read and write
|
||
1B0D61CB000
|
trusted library allocation
|
page read and write
|
||
1B0CB630000
|
heap
|
page read and write
|
||
1B0D7950000
|
trusted library allocation
|
page read and write
|
||
1B0CDBD9000
|
heap
|
page read and write
|
||
1B0DF32D000
|
heap
|
page read and write
|
||
1B0DD550000
|
trusted library allocation
|
page read and write
|
||
1B0DF216000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D8AA8000
|
heap
|
page read and write
|
||
1B0DF062000
|
heap
|
page read and write
|
||
1B0D81A6000
|
heap
|
page read and write
|
||
1B0CB761000
|
heap
|
page read and write
|
||
4801CFF000
|
stack
|
page read and write
|
||
1B0D8610000
|
trusted library allocation
|
page read and write
|
||
1B0D818D000
|
heap
|
page read and write
|
||
1B0CB723000
|
heap
|
page read and write
|
||
1B0DB542000
|
heap
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0D71B0000
|
trusted library allocation
|
page read and write
|
||
1B0D1D7A000
|
heap
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
1B0D7358000
|
unkown
|
page readonly
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0DD4B0000
|
remote allocation
|
page read and write
|
||
1B0DB506000
|
heap
|
page read and write
|
||
1B0D1C23000
|
heap
|
page read and write
|
||
1B0D8EA0000
|
heap
|
page read and write
|
||
1B0DB517000
|
heap
|
page read and write
|
||
1B0D8F8E000
|
heap
|
page read and write
|
||
1B0DF356000
|
heap
|
page read and write
|
||
1B0D75F1000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D8222000
|
trusted library allocation
|
page read and write
|
||
1B0D6FD0000
|
trusted library allocation
|
page read and write
|
||
1B0DDC5E000
|
heap
|
page read and write
|
||
1B0DF261000
|
heap
|
page read and write
|
||
1B0CB6A1000
|
heap
|
page read and write
|
||
1B0D8603000
|
unkown
|
page execute read
|
||
1B0D819B000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D6EB0000
|
trusted library allocation
|
page read and write
|
||
1B0DF20F000
|
heap
|
page read and write
|
||
48036FE000
|
stack
|
page read and write
|
||
1B0D7000000
|
trusted library allocation
|
page read and write
|
||
1B0CDBF7000
|
heap
|
page read and write
|
||
1B0DDA20000
|
heap
|
page read and write
|
||
1B0D815D000
|
heap
|
page read and write
|
||
1B0DB5E9000
|
heap
|
page read and write
|
||
1B0D75A7000
|
heap
|
page read and write
|
||
1B0D7702000
|
heap
|
page read and write
|
||
1B0D8CE3000
|
heap
|
page read and write
|
||
1B0CDB24000
|
heap
|
page read and write
|
||
1B0D61C4000
|
trusted library allocation
|
page read and write
|
||
1B0E00C0000
|
heap
|
page read and write
|
||
1B0DDE1C000
|
heap
|
page read and write
|
||
1B0DB57C000
|
heap
|
page read and write
|
||
1B0E0039000
|
heap
|
page read and write
|
||
1B0DB5C0000
|
heap
|
page read and write
|
||
48032FD000
|
stack
|
page read and write
|
||
1B0D7080000
|
trusted library allocation
|
page read and write
|
||
1B0D8BEB000
|
heap
|
page read and write
|
||
1B0CD9E1000
|
trusted library allocation
|
page read and write
|
||
48007FF000
|
stack
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D2140000
|
trusted library section
|
page readonly
|
||
1B0D8DCE000
|
heap
|
page read and write
|
||
1B0D8B3C000
|
heap
|
page read and write
|
||
1B0D8150000
|
heap
|
page read and write
|
||
1B0D8A23000
|
heap
|
page read and write
|
||
1B0DB5BE000
|
heap
|
page read and write
|
||
1B0D77A4000
|
heap
|
page read and write
|
||
1B0DF20F000
|
heap
|
page read and write
|
||
1B0D7738000
|
heap
|
page read and write
|
||
1B0D77E0000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D89D2000
|
heap
|
page read and write
|
||
1B0DF1CB000
|
heap
|
page read and write
|
||
1B0D2170000
|
trusted library section
|
page readonly
|
||
1B0E0040000
|
heap
|
page read and write
|
||
1B0D61FA000
|
unkown
|
page write copy
|
||
1B0D7016000
|
unkown
|
page readonly
|
||
487F91B000
|
stack
|
page read and write
|
||
1B0D61FC000
|
unkown
|
page readonly
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0E0290000
|
heap
|
page read and write
|
||
1B0D701C000
|
unkown
|
page readonly
|
||
1B0D889F000
|
heap
|
page read and write
|
||
1B0DF039000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D8E83000
|
heap
|
page read and write
|
||
1B0DDE1C000
|
heap
|
page read and write
|
||
48019FE000
|
stack
|
page read and write
|
||
1B0DF1A9000
|
heap
|
page read and write
|
||
1B0D7370000
|
trusted library allocation
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0D2040000
|
trusted library allocation
|
page read and write
|
||
1B0D8D63000
|
heap
|
page read and write
|
||
1B0D8197000
|
heap
|
page read and write
|
||
1B0DDC5B000
|
heap
|
page read and write
|
||
1B0D7150000
|
trusted library allocation
|
page read and write
|
||
1B0CB7C7000
|
heap
|
page read and write
|
||
1B0DB582000
|
heap
|
page read and write
|
||
1B0D8946000
|
heap
|
page read and write
|
||
1B0CB747000
|
heap
|
page read and write
|
||
1B0D8064000
|
heap
|
page read and write
|
||
1B0D8AA5000
|
heap
|
page read and write
|
||
1B0D1D9D000
|
heap
|
page read and write
|
||
1B0D747C000
|
heap
|
page read and write
|
||
48030FB000
|
stack
|
page read and write
|
||
1B0D813A000
|
heap
|
page read and write
|
||
1B0D8954000
|
heap
|
page read and write
|
||
1B0D6F60000
|
trusted library allocation
|
page read and write
|
||
1B0DB508000
|
heap
|
page read and write
|
||
1B0CB6C6000
|
heap
|
page read and write
|
||
1B0CB6EB000
|
heap
|
page read and write
|
||
1B0E0290000
|
heap
|
page read and write
|
||
1B0DB5DC000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0CDBC3000
|
heap
|
page read and write
|
||
48021E1000
|
stack
|
page read and write
|
||
1B0CB788000
|
heap
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0CB6D2000
|
heap
|
page read and write
|
||
1B0DB526000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0DDE24000
|
heap
|
page read and write
|
||
1B0D7950000
|
trusted library allocation
|
page read and write
|
||
1B0CB6E7000
|
heap
|
page read and write
|
||
1B0D78D2000
|
unkown
|
page readonly
|
||
1B0DF017000
|
heap
|
page read and write
|
||
1B0DF216000
|
heap
|
page read and write
|
||
48016FB000
|
stack
|
page read and write
|
||
1B0E03D0000
|
heap
|
page read and write
|
||
1B0E01ED000
|
heap
|
page read and write
|
||
1B0D8823000
|
heap
|
page read and write
|
||
1B0D8600000
|
trusted library allocation
|
page read and write
|
||
1B0D2150000
|
trusted library section
|
page readonly
|
||
1B0D8927000
|
heap
|
page read and write
|
||
1B0DF3C3000
|
heap
|
page read and write
|
||
1B0DB548000
|
heap
|
page read and write
|
||
1B0D898B000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E011A000
|
heap
|
page read and write
|
||
1B0D8802000
|
heap
|
page read and write
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0E0180000
|
heap
|
page read and write
|
||
1B0CB7A9000
|
heap
|
page read and write
|
||
1B0D7A90000
|
trusted library allocation
|
page read and write
|
||
1B0CB500000
|
heap
|
page read and write
|
||
1B0D801B000
|
heap
|
page read and write
|
||
1B0DB400000
|
heap
|
page read and write
|
||
1B0D8CFE000
|
heap
|
page read and write
|
||
1B0DF3A1000
|
heap
|
page read and write
|
||
1B0D89F5000
|
heap
|
page read and write
|
||
1B0D81E4000
|
heap
|
page read and write
|
||
1B0D8A00000
|
heap
|
page read and write
|
||
1B0DB535000
|
heap
|
page read and write
|
||
1B0E027C000
|
heap
|
page read and write
|
||
1B0D805C000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D7040000
|
trusted library allocation
|
page read and write
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
1B0DF2C0000
|
heap
|
page read and write
|
||
1B0DB5C7000
|
heap
|
page read and write
|
||
1B0DB5CD000
|
heap
|
page read and write
|
||
1B0E0179000
|
heap
|
page read and write
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0CB75E000
|
heap
|
page read and write
|
||
1B0DB5A9000
|
heap
|
page read and write
|
||
48011FB000
|
stack
|
page read and write
|
||
1B0D7602000
|
heap
|
page read and write
|
||
1B0D8916000
|
heap
|
page read and write
|
||
1B0D88F0000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
48009FE000
|
stack
|
page read and write
|
||
1B0DF150000
|
heap
|
page read and write
|
||
1B0D7060000
|
trusted library allocation
|
page read and write
|
||
4802FFA000
|
stack
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E0216000
|
heap
|
page read and write
|
||
1B0D8A21000
|
heap
|
page read and write
|
||
1B0DB5CB000
|
heap
|
page read and write
|
||
1B0DB614000
|
heap
|
page read and write
|
||
1B0DD4B0000
|
remote allocation
|
page read and write
|
||
4801FFE000
|
stack
|
page read and write
|
||
1B0D7100000
|
unkown
|
page readonly
|
||
1B0DF08B000
|
heap
|
page read and write
|
||
1B0D8165000
|
heap
|
page read and write
|
||
1B0D1D4B000
|
heap
|
page read and write
|
||
1B0E00DD000
|
heap
|
page read and write
|
||
1B0D7020000
|
trusted library allocation
|
page read and write
|
||
1B0D81DF000
|
heap
|
page read and write
|
||
1B0D758D000
|
heap
|
page read and write
|
||
1B0CB653000
|
heap
|
page read and write
|
||
1B0D8620000
|
trusted library allocation
|
page read and write
|
||
1B0DF179000
|
heap
|
page read and write
|
||
1B0DB607000
|
heap
|
page read and write
|
||
1B0D8B21000
|
heap
|
page read and write
|
||
1B0D89D0000
|
heap
|
page read and write
|
||
1B0D883B000
|
heap
|
page read and write
|
||
1B0D6FE0000
|
unkown
|
page readonly
|
||
1B0D81FE000
|
heap
|
page read and write
|
||
1B0D7050000
|
heap
|
page read and write
|
||
1B0D8CBF000
|
heap
|
page read and write
|
||
1B0D8F9C000
|
heap
|
page read and write
|
||
1B0D8670000
|
heap
|
page read and write
|
||
1B0DB5DA000
|
heap
|
page read and write
|
||
48003FF000
|
stack
|
page read and write
|
||
1B0D7BE0000
|
trusted library allocation
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
1B0D7738000
|
heap
|
page read and write
|
||
1B0DF290000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0CB6E0000
|
heap
|
page read and write
|
||
1B0D744C000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E011A000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0DDE1C000
|
heap
|
page read and write
|
||
1B0CB613000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D7463000
|
heap
|
page read and write
|
||
1B0DF25A000
|
heap
|
page read and write
|
||
1B0D7160000
|
trusted library allocation
|
page read and write
|
||
1B0DF1C4000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0DDE1C000
|
heap
|
page read and write
|
||
1B0D61E0000
|
trusted library allocation
|
page read and write
|
||
1B0D61A0000
|
trusted library allocation
|
page read and write
|
||
1B0DF1CB000
|
heap
|
page read and write
|
||
1B0D8191000
|
heap
|
page read and write
|
||
1B0DF39A000
|
heap
|
page read and write
|
||
1B0D8600000
|
trusted library allocation
|
page read and write
|
||
1B0DF238000
|
heap
|
page read and write
|
||
1B0DF0C0000
|
heap
|
page read and write
|
||
48014FD000
|
stack
|
page read and write
|
||
1B0D7700000
|
heap
|
page read and write
|
||
1B0D7980000
|
trusted library allocation
|
page read and write
|
||
1B0D735E000
|
unkown
|
page write copy
|
||
1B0CB6A5000
|
heap
|
page read and write
|
||
4800EFC000
|
stack
|
page read and write
|
||
1B0D8BE8000
|
heap
|
page read and write
|
||
1B0CDB41000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0DB621000
|
heap
|
page read and write
|
||
1B0D7352000
|
unkown
|
page readonly
|
||
1B0CB7A0000
|
heap
|
page read and write
|
||
1B0CDB7F000
|
heap
|
page read and write
|
||
1B0D8E8F000
|
heap
|
page read and write
|
||
1B0D80B8000
|
heap
|
page read and write
|
||
1B0DF326000
|
heap
|
page read and write
|
||
1B0DDE08000
|
heap
|
page read and write
|
||
1B0D7942000
|
unkown
|
page readonly
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
1B0DB5F6000
|
heap
|
page read and write
|
||
1B0D8061000
|
heap
|
page read and write
|
||
1B0DF084000
|
heap
|
page read and write
|
||
1B0DF157000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0E00F8000
|
heap
|
page read and write
|
||
48012FB000
|
stack
|
page read and write
|
||
1B0D8000000
|
heap
|
page read and write
|
||
1B0DF21D000
|
heap
|
page read and write
|
||
1B0DF0F8000
|
heap
|
page read and write
|
||
1B0DF0A6000
|
heap
|
page read and write
|
||
4800CFC000
|
stack
|
page read and write
|
||
1B0D1D8F000
|
heap
|
page read and write
|
||
1B0DB584000
|
heap
|
page read and write
|
||
1B0D7CD6000
|
unkown
|
page readonly
|
||
1B0DF11A000
|
heap
|
page read and write
|
||
1B0DB4F7000
|
heap
|
page read and write
|
||
1B0D8650000
|
trusted library allocation
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D6EC0000
|
trusted library allocation
|
page read and write
|
||
1B0DF304000
|
heap
|
page read and write
|
||
1B0D7370000
|
trusted library allocation
|
page read and write
|
||
1B0D8F18000
|
heap
|
page read and write
|
||
1B0D78F0000
|
trusted library allocation
|
page read and write
|
||
1B0D1C90000
|
heap
|
page read and write
|
||
1B0D899C000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0E027C000
|
heap
|
page read and write
|
||
1B0CB70A000
|
heap
|
page read and write
|
||
1B0DB544000
|
heap
|
page read and write
|
||
1B0D814C000
|
heap
|
page read and write
|
||
1B0DB4F9000
|
heap
|
page read and write
|
||
1B0D881B000
|
heap
|
page read and write
|
||
1B0D7036000
|
unkown
|
page read and write
|
||
1B0CB651000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0D7110000
|
trusted library allocation
|
page read and write
|
||
1B0D8F20000
|
heap
|
page read and write
|
||
1B0D703C000
|
unkown
|
page readonly
|
||
1B0D7380000
|
unkown
|
page readonly
|
||
1B0DF180000
|
heap
|
page read and write
|
||
1B0CDB44000
|
heap
|
page read and write
|
||
1B0E00FF000
|
heap
|
page read and write
|
||
1B0D8B9D000
|
heap
|
page read and write
|
||
1B0CB5C0000
|
trusted library allocation
|
page read and write
|
||
1B0D8944000
|
heap
|
page read and write
|
||
1B0DF1C4000
|
heap
|
page read and write
|
||
1B0D8CE5000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0CDB18000
|
heap
|
page read and write
|
||
1B0DB603000
|
heap
|
page read and write
|
||
1B0D77E7000
|
heap
|
page read and write
|
||
1B0DF180000
|
heap
|
page read and write
|
||
1B0D893C000
|
heap
|
page read and write
|
||
1B0E0010000
|
heap
|
page read and write
|
||
1B0D70F0000
|
trusted library allocation
|
page read and write
|
||
1B0D810B000
|
heap
|
page read and write
|
||
1B0CB6D8000
|
heap
|
page read and write
|
||
1B0D8178000
|
heap
|
page read and write
|
||
1B0D7210000
|
trusted library allocation
|
page read and write
|
||
1B0D2190000
|
trusted library section
|
page readonly
|
||
1B0D7320000
|
trusted library allocation
|
page read and write
|
||
1B0E0290000
|
heap
|
page read and write
|
||
1B0DDE24000
|
heap
|
page read and write
|
||
1B0DB580000
|
heap
|
page read and write
|
||
48017FF000
|
stack
|
page read and write
|
||
1B0D70C2000
|
unkown
|
page read and write
|
||
48020FF000
|
stack
|
page read and write
|
||
1B0DF121000
|
heap
|
page read and write
|
||
1B0CB6E3000
|
heap
|
page read and write
|
||
1B0D7010000
|
unkown
|
page read and write
|
||
1B0D1C00000
|
heap
|
page read and write
|
||
1B0D6F60000
|
trusted library allocation
|
page read and write
|
||
1B0D78C0000
|
trusted library allocation
|
page read and write
|
||
1B0DB4F5000
|
heap
|
page read and write
|
||
1B0D7090000
|
trusted library allocation
|
page read and write
|
||
1B0D1CA8000
|
heap
|
page read and write
|
||
4802CFD000
|
stack
|
page read and write
|
||
1B0E011A000
|
heap
|
page read and write
|
||
1B0E00AD000
|
heap
|
page read and write
|
||
1B0DB57E000
|
heap
|
page read and write
|
||
48035FE000
|
stack
|
page read and write
|
||
1B0D7230000
|
trusted library allocation
|
page read and write
|
||
1B0DDE5A000
|
heap
|
page read and write
|
||
1B0DB612000
|
heap
|
page read and write
|
||
1B0E00FF000
|
heap
|
page read and write
|
||
1B0D7386000
|
unkown
|
page readonly
|
||
1B0D891A000
|
heap
|
page read and write
|
||
1B0D61E0000
|
trusted library allocation
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0DB5AD000
|
heap
|
page read and write
|
||
1B0DB504000
|
heap
|
page read and write
|
||
1B0DDA20000
|
heap
|
page read and write
|
||
1B0DDE24000
|
heap
|
page read and write
|
||
4802BFB000
|
stack
|
page read and write
|
||
1B0D6FF0000
|
trusted library allocation
|
page read and write
|
||
4801BFB000
|
stack
|
page read and write
|
||
1B0D75CE000
|
heap
|
page read and write
|
||
1B0D817A000
|
heap
|
page read and write
|
||
1B0D8B41000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D882B000
|
heap
|
page read and write
|
||
1B0E008B000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0D7FE0000
|
unkown
|
page execute read
|
||
1B0D8F2F000
|
heap
|
page read and write
|
||
1B0DF121000
|
heap
|
page read and write
|
||
1B0E0084000
|
heap
|
page read and write
|
||
1B0DDE5A000
|
heap
|
page read and write
|
||
48021EB000
|
stack
|
page read and write
|
||
48031FA000
|
stack
|
page read and write
|
||
1B0E0150000
|
heap
|
page read and write
|
||
1B0D7060000
|
trusted library allocation
|
page read and write
|
||
1B0DF1C4000
|
heap
|
page read and write
|
||
1B0DF010000
|
heap
|
page read and write
|
||
1B0D710A000
|
unkown
|
page readonly
|
||
1B0D794A000
|
unkown
|
page readonly
|
||
1B0CDA13000
|
heap
|
page read and write
|
||
1B0E0170000
|
heap
|
page read and write
|
||
48033FA000
|
stack
|
page read and write
|
||
1B0E0180000
|
heap
|
page read and write
|
||
1B0D8961000
|
heap
|
page read and write
|
||
1B0CB7E9000
|
heap
|
page read and write
|
||
1B0DF143000
|
heap
|
page read and write
|
There are 802 hidden memdumps, click here to show them.