Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Remcos\logs.dat
|
data
|
dropped
|
||
C:\ProgramData\Remcos\remcos.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Remcos\remcos.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\install.vbs
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\tmp2F88.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\remcos.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tkiYKFegXAQjl.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0lvdpu2m.2nc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ui2ztwr.hrs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avsosc4c.cag.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btxccmx0.x1c.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eexrukca.qyj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ftrmxaoc.s0r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fuhm20jg.3d3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmwfjgpy.o3o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k2pm04w4.o2k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kyijcmah.cvh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nk204d2r.vfw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rvx1ajto.zan.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spgxpask.vh4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vfbn3taw.s2q.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wc3sboll.4wg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmkji1qz.j5k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp3F47.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp6250.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpAE2E.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
Chrome Cache Entry: 122
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 123
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 124
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 125
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 126
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 127
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 128
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 129
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 130
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 131
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 132
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 133
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 134
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 135
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 136
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 137
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 138
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 139
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 140
|
ASCII text, with CRLF line terminators
|
dropped
|
||
Chrome Cache Entry: 141
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 142
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 143
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 144
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 145
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 146
|
ASCII text, with very long lines (32896), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 147
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 148
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 149
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 150
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 151
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 152
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 153
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 154
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 155
|
ASCII text, with very long lines (32896), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 156
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 157
|
ASCII text, with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 158
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 159
|
Web Open Font Format (Version 2), TrueType, length 19360, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 160
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 161
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 162
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 163
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 64 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmp2F88.tmp"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user~1\AppData\Local\Temp\install.vbs"
|
||
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
|
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
|
||
C:\ProgramData\Remcos\remcos.exe
|
C:\ProgramData\Remcos\remcos.exe
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmp3F47.tmp"
|
||
C:\ProgramData\Remcos\remcos.exe
|
"C:\ProgramData\Remcos\remcos.exe"
|
||
C:\ProgramData\Remcos\remcos.exe
|
"C:\ProgramData\Remcos\remcos.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
svchost.exe
|
||
C:\Windows\SysWOW64\svchost.exe
|
svchost.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmp6250.tmp"
|
||
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
|
"C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe"
|
||
C:\ProgramData\Remcos\remcos.exe
|
"C:\ProgramData\Remcos\remcos.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmpAE2E.tmp"
|
||
C:\ProgramData\Remcos\remcos.exe
|
"C:\ProgramData\Remcos\remcos.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2012,i,4708018134901334635,12688570153160529703,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2024,i,15113330487457257710,6273278388839186901,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=2004,i,4967517271708772369,15990879581849907844,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 28 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
l.dynamic-dns.net
|
|||
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
http://tempuri.org/DataSet1.xsd
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.253.72
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://github.com/nschonni
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://geoplugin.net/json.gpJ
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://geoplugin.net/json.gpN
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://aka.ms/aiskillschallenge/T1LearnBanner?wt.mc_id=aisc25_learnpromo1_website_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2017-0
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 36 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cjmancool.dynamic-dns.net
|
154.127.53.209
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
||
s-part-0044.t-0009.fb-t-msedge.net
|
13.107.253.72
|
||
s-part-0016.t-0009.fb-t-msedge.net
|
13.107.253.44
|
||
geoplugin.net
|
178.237.33.50
|
||
s-part-0017.t-0009.fb-t-msedge.net
|
13.107.253.45
|
||
www.google.com
|
142.250.185.132
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
154.127.53.209
|
cjmancool.dynamic-dns.net
|
South Africa
|
||
192.168.2.7
|
unknown
|
unknown
|
||
192.168.2.6
|
unknown
|
unknown
|
||
192.168.2.23
|
unknown
|
unknown
|
||
13.107.253.44
|
s-part-0016.t-0009.fb-t-msedge.net
|
United States
|
||
13.107.253.45
|
s-part-0017.t-0009.fb-t-msedge.net
|
United States
|
||
142.250.185.132
|
www.google.com
|
United States
|
||
13.107.253.72
|
s-part-0044.t-0009.fb-t-msedge.net
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.14
|
unknown
|
unknown
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Remcos
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
Remcos
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
|
WD
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
|
WD
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
|
WD
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
35D43000
|
heap
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
4A46000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3FC7000
|
trusted library allocation
|
page read and write
|
||
E2A000
|
heap
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
13D7000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
4087000
|
trusted library allocation
|
page read and write
|
||
35D2E000
|
heap
|
page read and write
|
||
4968000
|
trusted library allocation
|
page read and write
|
||
7298F000
|
stack
|
page read and write
|
||
3463E000
|
stack
|
page read and write
|
||
45F3E000
|
stack
|
page read and write
|
||
39DFE000
|
stack
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
2DBFE000
|
stack
|
page read and write
|
||
3143E000
|
stack
|
page read and write
|
||
4417F000
|
stack
|
page read and write
|
||
3727F000
|
stack
|
page read and write
|
||
45D6B000
|
unkown
|
page read and write
|
||
5237E000
|
stack
|
page read and write
|
||
B88F000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
46A3F000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
4453F000
|
stack
|
page read and write
|
||
1F63F000
|
stack
|
page read and write
|
||
7901F000
|
stack
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
11B3E000
|
stack
|
page read and write
|
||
25F7E000
|
stack
|
page read and write
|
||
BC8E000
|
stack
|
page read and write
|
||
507FE000
|
stack
|
page read and write
|
||
47F7F000
|
stack
|
page read and write
|
||
4837E000
|
stack
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
632FE000
|
stack
|
page read and write
|
||
248FE000
|
stack
|
page read and write
|
||
1A93F000
|
stack
|
page read and write
|
||
5B30000
|
heap
|
page read and write
|
||
5B10000
|
heap
|
page read and write
|
||
5CA7E000
|
stack
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
74AFF000
|
stack
|
page read and write
|
||
8AC0000
|
heap
|
page read and write
|
||
74F2E000
|
stack
|
page read and write
|
||
1E13E000
|
stack
|
page read and write
|
||
69C2E000
|
stack
|
page read and write
|
||
45D80000
|
unkown
|
page read and write
|
||
6637F000
|
stack
|
page read and write
|
||
22BD0980000
|
heap
|
page read and write
|
||
105FE000
|
stack
|
page read and write
|
||
1457F000
|
stack
|
page read and write
|
||
5B67E000
|
stack
|
page read and write
|
||
2607F000
|
stack
|
page read and write
|
||
2F4FE000
|
stack
|
page read and write
|
||
6E50000
|
heap
|
page read and write
|
||
3563F000
|
stack
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
B04000
|
trusted library allocation
|
page read and write
|
||
6C56E000
|
stack
|
page read and write
|
||
687F000
|
stack
|
page read and write
|
||
78F1E000
|
stack
|
page read and write
|
||
1407F000
|
stack
|
page read and write
|
||
468FF000
|
stack
|
page read and write
|
||
70F4E000
|
stack
|
page read and write
|
||
451FE000
|
stack
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
41D3F000
|
stack
|
page read and write
|
||
608BF000
|
stack
|
page read and write
|
||
2A1BE000
|
stack
|
page read and write
|
||
EFCE000
|
stack
|
page read and write
|
||
73C4F000
|
stack
|
page read and write
|
||
60D7E000
|
stack
|
page read and write
|
||
20B7F000
|
stack
|
page read and write
|
||
1763F000
|
stack
|
page read and write
|
||
46BBE000
|
stack
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
416D000
|
stack
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
15FBF000
|
stack
|
page read and write
|
||
607BE000
|
stack
|
page read and write
|
||
1818000
|
trusted library allocation
|
page read and write
|
||
31A3F000
|
stack
|
page read and write
|
||
650FE000
|
stack
|
page read and write
|
||
673F000
|
stack
|
page read and write
|
||
8CD000
|
trusted library allocation
|
page execute and read and write
|
||
5E7F000
|
stack
|
page read and write
|
||
750AE000
|
stack
|
page read and write
|
||
455BE000
|
stack
|
page read and write
|
||
1D17E000
|
stack
|
page read and write
|
||
1277F000
|
stack
|
page read and write
|
||
2A3FF000
|
stack
|
page read and write
|
||
113BE000
|
stack
|
page read and write
|
||
46CBF000
|
stack
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
51FC000
|
heap
|
page read and write
|
||
A70F000
|
stack
|
page read and write
|
||
9100000
|
trusted library allocation
|
page execute and read and write
|
||
3CC3E000
|
stack
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
1A1FE000
|
stack
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
4C33E000
|
stack
|
page read and write
|
||
F37E000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2A85000
|
trusted library allocation
|
page read and write
|
||
207FE000
|
stack
|
page read and write
|
||
5B4FF000
|
stack
|
page read and write
|
||
6F07F000
|
stack
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
5F8BE000
|
stack
|
page read and write
|
||
3ACFE000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
393BF000
|
stack
|
page read and write
|
||
54FBF000
|
stack
|
page read and write
|
||
742CE000
|
stack
|
page read and write
|
||
4083E000
|
stack
|
page read and write
|
||
1C9BF000
|
stack
|
page read and write
|
||
3713F000
|
stack
|
page read and write
|
||
4973F000
|
stack
|
page read and write
|
||
330BF000
|
stack
|
page read and write
|
||
456BF000
|
stack
|
page read and write
|
||
13C3000
|
heap
|
page read and write
|
||
B24F000
|
stack
|
page read and write
|
||
256BE000
|
stack
|
page read and write
|
||
9D0F000
|
stack
|
page read and write
|
||
1484000
|
trusted library allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
4A17E000
|
stack
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
2ACBF000
|
stack
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
2D1FE000
|
stack
|
page read and write
|
||
1EEBF000
|
stack
|
page read and write
|
||
6F63E000
|
stack
|
page read and write
|
||
5B3BF000
|
stack
|
page read and write
|
||
2620000
|
heap
|
page execute and read and write
|
||
63F3F000
|
stack
|
page read and write
|
||
156FF000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
6EDFF000
|
stack
|
page read and write
|
||
4ED7F000
|
stack
|
page read and write
|
||
11FFF000
|
stack
|
page read and write
|
||
948E000
|
stack
|
page read and write
|
||
7991E000
|
stack
|
page read and write
|
||
56DBF000
|
stack
|
page read and write
|
||
7D3DE000
|
stack
|
page read and write
|
||
1047F000
|
stack
|
page read and write
|
||
192FE000
|
stack
|
page read and write
|
||
7F0F000
|
stack
|
page read and write
|
||
298BF000
|
stack
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
1097F000
|
stack
|
page read and write
|
||
122BE000
|
stack
|
page read and write
|
||
1BC3E000
|
stack
|
page read and write
|
||
627BE000
|
stack
|
page read and write
|
||
2F0FF000
|
stack
|
page read and write
|
||
1F8BF000
|
stack
|
page read and write
|
||
12B7E000
|
stack
|
page read and write
|
||
783F000
|
stack
|
page read and write
|
||
42C0000
|
unclassified section
|
page execute and read and write
|
||
42C3F000
|
stack
|
page read and write
|
||
6D7EF000
|
stack
|
page read and write
|
||
7B95F000
|
stack
|
page read and write
|
||
1F2BE000
|
stack
|
page read and write
|
||
7E65F000
|
stack
|
page read and write
|
||
5830000
|
trusted library allocation
|
page execute and read and write
|
||
497F000
|
stack
|
page read and write
|
||
271FF000
|
stack
|
page read and write
|
||
3A93E000
|
stack
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
22E7F000
|
stack
|
page read and write
|
||
4887E000
|
stack
|
page read and write
|
||
5ED7E000
|
stack
|
page read and write
|
||
2963F000
|
stack
|
page read and write
|
||
37DBF000
|
stack
|
page read and write
|
||
7D39F000
|
stack
|
page read and write
|
||
92A000
|
stack
|
page read and write
|
||
1D27F000
|
stack
|
page read and write
|
||
5640000
|
trusted library allocation
|
page execute and read and write
|
||
1E9FE000
|
stack
|
page read and write
|
||
155BF000
|
stack
|
page read and write
|
||
7694E000
|
stack
|
page read and write
|
||
673FE000
|
stack
|
page read and write
|
||
1F8FE000
|
stack
|
page read and write
|
||
32E7E000
|
stack
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
2813E000
|
stack
|
page read and write
|
||
363BE000
|
stack
|
page read and write
|
||
5A30000
|
heap
|
page execute and read and write
|
||
CF0000
|
heap
|
page read and write
|
||
651FF000
|
stack
|
page read and write
|
||
1163E000
|
stack
|
page read and write
|
||
6EF7E000
|
stack
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
91CF000
|
stack
|
page read and write
|
||
4CBBF000
|
stack
|
page read and write
|
||
3EDFE000
|
stack
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
1E9BF000
|
stack
|
page read and write
|
||
36C7E000
|
stack
|
page read and write
|
||
6177E000
|
stack
|
page read and write
|
||
5D97E000
|
stack
|
page read and write
|
||
1587E000
|
stack
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
6CF6E000
|
stack
|
page read and write
|
||
4A9FF000
|
stack
|
page read and write
|
||
6FCD000
|
stack
|
page read and write
|
||
8CCF000
|
stack
|
page read and write
|
||
4E3BE000
|
stack
|
page read and write
|
||
56C7F000
|
stack
|
page read and write
|
||
1113E000
|
stack
|
page read and write
|
||
7B49E000
|
stack
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
22ABF000
|
stack
|
page read and write
|
||
6DE6E000
|
stack
|
page read and write
|
||
5FAFF000
|
stack
|
page read and write
|
||
46B7F000
|
stack
|
page read and write
|
||
6C7EE000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
6163E000
|
stack
|
page read and write
|
||
7531E000
|
stack
|
page read and write
|
||
206BE000
|
stack
|
page read and write
|
||
3F2FE000
|
stack
|
page read and write
|
||
3283E000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
4DA3000
|
heap
|
page read and write
|
||
289BF000
|
stack
|
page read and write
|
||
2773E000
|
stack
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
172BE000
|
stack
|
page read and write
|
||
2797F000
|
stack
|
page read and write
|
||
2EC7000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
654BE000
|
stack
|
page read and write
|
||
C54E000
|
stack
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
2FC3F000
|
stack
|
page read and write
|
||
7C9DE000
|
stack
|
page read and write
|
||
3F6BE000
|
stack
|
page read and write
|
||
3BBFE000
|
stack
|
page read and write
|
||
4927000
|
trusted library allocation
|
page read and write
|
||
3BA7F000
|
stack
|
page read and write
|
||
5973E000
|
stack
|
page read and write
|
||
555FF000
|
stack
|
page read and write
|
||
28B3E000
|
stack
|
page read and write
|
||
3903E000
|
stack
|
page read and write
|
||
E70E000
|
stack
|
page read and write
|
||
7F17E000
|
unkown
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
6533F000
|
stack
|
page read and write
|
||
B50E000
|
stack
|
page read and write
|
||
6077F000
|
stack
|
page read and write
|
||
41C3E000
|
stack
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
5BDFE000
|
stack
|
page read and write
|
||
7350E000
|
stack
|
page read and write
|
||
398BF000
|
stack
|
page read and write
|
||
433BF000
|
stack
|
page read and write
|
||
124FF000
|
stack
|
page read and write
|
||
18F3E000
|
stack
|
page read and write
|
||
21E7E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
73B4E000
|
stack
|
page read and write
|
||
7AE5E000
|
stack
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
253FF000
|
stack
|
page read and write
|
||
5CA3F000
|
stack
|
page read and write
|
||
5DF7F000
|
stack
|
page read and write
|
||
45D7D000
|
unkown
|
page read and write
|
||
3C73E000
|
stack
|
page read and write
|
||
5423E000
|
stack
|
page read and write
|
||
5B7BE000
|
stack
|
page read and write
|
||
533BE000
|
stack
|
page read and write
|
||
EC0E000
|
stack
|
page read and write
|
||
1C37F000
|
stack
|
page read and write
|
||
579B000
|
stack
|
page read and write
|
||
55C7E000
|
stack
|
page read and write
|
||
524BE000
|
stack
|
page read and write
|
||
2A03F000
|
stack
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
3ECBE000
|
stack
|
page read and write
|
||
2C7BF000
|
stack
|
page read and write
|
||
26BBF000
|
stack
|
page read and write
|
||
6A4EE000
|
stack
|
page read and write
|
||
9120000
|
trusted library allocation
|
page execute and read and write
|
||
25BD000
|
trusted library allocation
|
page read and write
|
||
7FF4F000
|
stack
|
page read and write
|
||
2D2FF000
|
stack
|
page read and write
|
||
6353F000
|
stack
|
page read and write
|
||
381BE000
|
stack
|
page read and write
|
||
2F4BF000
|
stack
|
page read and write
|
||
FC7E000
|
stack
|
page read and write
|
||
5E97F000
|
stack
|
page read and write
|
||
52ABF000
|
stack
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
208FF000
|
stack
|
page read and write
|
||
6C2EE000
|
stack
|
page read and write
|
||
1A97E000
|
stack
|
page read and write
|
||
580BE000
|
stack
|
page read and write
|
||
18EFF000
|
stack
|
page read and write
|
||
BD9E000
|
stack
|
page read and write
|
||
4493E000
|
stack
|
page read and write
|
||
5A9BF000
|
stack
|
page read and write
|
||
2D83E000
|
stack
|
page read and write
|
||
6703E000
|
stack
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
304FF000
|
stack
|
page read and write
|
||
6CCAF000
|
stack
|
page read and write
|
||
13B7F000
|
stack
|
page read and write
|
||
2273E000
|
stack
|
page read and write
|
||
79CDE000
|
stack
|
page read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
5A13E000
|
stack
|
page read and write
|
||
B70D000
|
stack
|
page read and write
|
||
2C53F000
|
stack
|
page read and write
|
||
A60E000
|
stack
|
page read and write
|
||
283BE000
|
stack
|
page read and write
|
||
638FF000
|
stack
|
page read and write
|
||
6253E000
|
stack
|
page read and write
|
||
45D9E000
|
unkown
|
page read and write
|
||
761DF000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
6367F000
|
stack
|
page read and write
|
||
43DBF000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
4FC7F000
|
stack
|
page read and write
|
||
2B3BF000
|
stack
|
page read and write
|
||
79A1F000
|
stack
|
page read and write
|
||
6613E000
|
stack
|
page read and write
|
||
F27E000
|
stack
|
page read and write
|
||
79A5E000
|
stack
|
page read and write
|
||
1307E000
|
stack
|
page read and write
|
||
4FB7E000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
B78E000
|
stack
|
page read and write
|
||
2ED3F000
|
stack
|
page read and write
|
||
6B02E000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
56F3000
|
heap
|
page read and write
|
||
71A8E000
|
stack
|
page read and write
|
||
280FF000
|
stack
|
page read and write
|
||
3C33F000
|
stack
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
441BE000
|
stack
|
page read and write
|
||
5D3F000
|
stack
|
page read and write
|
||
6E7FE000
|
stack
|
page read and write
|
||
6727F000
|
stack
|
page read and write
|
||
7BD5E000
|
stack
|
page read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
1392000
|
trusted library allocation
|
page read and write
|
||
322B000
|
trusted library allocation
|
page read and write
|
||
BD8F000
|
stack
|
page read and write
|
||
3CE7F000
|
stack
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
50CFE000
|
stack
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
599BE000
|
stack
|
page read and write
|
||
163BE000
|
stack
|
page read and write
|
||
7F90F000
|
stack
|
page read and write
|
||
164FE000
|
stack
|
page read and write
|
||
6C2AF000
|
stack
|
page read and write
|
||
797DE000
|
stack
|
page read and write
|
||
7F2FE000
|
stack
|
page read and write
|
||
5CBBE000
|
stack
|
page read and write
|
||
62DBF000
|
stack
|
page read and write
|
||
2DA7F000
|
stack
|
page read and write
|
||
8EA000
|
stack
|
page read and write
|
||
7194E000
|
stack
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
5FEBF000
|
stack
|
page read and write
|
||
37EFF000
|
stack
|
page read and write
|
||
148D000
|
trusted library allocation
|
page execute and read and write
|
||
463FF000
|
stack
|
page read and write
|
||
420FF000
|
stack
|
page read and write
|
||
7919E000
|
stack
|
page read and write
|
||
58CFF000
|
stack
|
page read and write
|
||
4173E000
|
stack
|
page read and write
|
||
6497E000
|
stack
|
page read and write
|
||
17DFE000
|
stack
|
page read and write
|
||
340FF000
|
stack
|
page read and write
|
||
5793E000
|
stack
|
page read and write
|
||
890F000
|
stack
|
page read and write
|
||
C8CF000
|
stack
|
page read and write
|
||
8E4D000
|
stack
|
page read and write
|
||
6807E000
|
stack
|
page read and write
|
||
664BF000
|
stack
|
page read and write
|
||
7050F000
|
stack
|
page read and write
|
||
13A3F000
|
stack
|
page read and write
|
||
402FF000
|
stack
|
page read and write
|
||
868F000
|
stack
|
page read and write
|
||
4FCBE000
|
stack
|
page read and write
|
||
7FE4E000
|
stack
|
page read and write
|
||
5EBFF000
|
stack
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
4F2BE000
|
stack
|
page read and write
|
||
3B2FF000
|
stack
|
page read and write
|
||
1CAFF000
|
stack
|
page read and write
|
||
7F6CE000
|
stack
|
page read and write
|
||
6BEEF000
|
stack
|
page read and write
|
||
2133E000
|
stack
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
5888000
|
trusted library section
|
page readonly
|
||
1F77F000
|
stack
|
page read and write
|
||
4B67F000
|
stack
|
page read and write
|
||
D58E000
|
stack
|
page read and write
|
||
3C47F000
|
stack
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
1EB3E000
|
stack
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
45DEC000
|
unkown
|
page read and write
|
||
45D9B000
|
unkown
|
page read and write
|
||
85D1000
|
heap
|
page read and write
|
||
F88E000
|
stack
|
page read and write
|
||
7017E000
|
stack
|
page read and write
|
||
1DEBE000
|
stack
|
page read and write
|
||
E5CE000
|
stack
|
page read and write
|
||
53F7F000
|
stack
|
page read and write
|
||
49AFF000
|
stack
|
page read and write
|
||
45DEF000
|
unkown
|
page read and write
|
||
4E27E000
|
stack
|
page read and write
|
||
2C57E000
|
stack
|
page read and write
|
||
1F27F000
|
stack
|
page read and write
|
||
1803F000
|
stack
|
page read and write
|
||
581BF000
|
stack
|
page read and write
|
||
56EFF000
|
stack
|
page read and write
|
||
68CBF000
|
stack
|
page read and write
|
||
2147E000
|
stack
|
page read and write
|
||
4227E000
|
stack
|
page read and write
|
||
2633E000
|
stack
|
page read and write
|
||
3853F000
|
stack
|
page read and write
|
||
10D3F000
|
stack
|
page read and write
|
||
7234F000
|
stack
|
page read and write
|
||
4EAFF000
|
stack
|
page read and write
|
||
1533F000
|
stack
|
page read and write
|
||
2D57F000
|
stack
|
page read and write
|
||
59FFE000
|
stack
|
page read and write
|
||
31CBF000
|
stack
|
page read and write
|
||
5C43E000
|
stack
|
page read and write
|
||
7B5DE000
|
stack
|
page read and write
|
||
3107E000
|
stack
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
2517F000
|
stack
|
page read and write
|
||
45D8F000
|
unkown
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
EBCF000
|
stack
|
page read and write
|
||
2FBD000
|
stack
|
page read and write
|
||
2C93E000
|
stack
|
page read and write
|
||
CA0F000
|
stack
|
page read and write
|
||
3513F000
|
stack
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
72D8E000
|
stack
|
page read and write
|
||
66FFF000
|
stack
|
page read and write
|
||
590FE000
|
stack
|
page read and write
|
||
748BF000
|
stack
|
page read and write
|
||
5F27E000
|
stack
|
page read and write
|
||
45D65000
|
unkown
|
page read and write
|
||
7F58F000
|
stack
|
page read and write
|
||
1663E000
|
stack
|
page read and write
|
||
252BF000
|
stack
|
page read and write
|
||
701BE000
|
stack
|
page read and write
|
||
1374000
|
trusted library allocation
|
page read and write
|
||
7710E000
|
stack
|
page read and write
|
||
565D000
|
trusted library allocation
|
page read and write
|
||
B208000
|
trusted library allocation
|
page read and write
|
||
79C9F000
|
stack
|
page read and write
|
||
537FF000
|
stack
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
8B0E000
|
stack
|
page read and write
|
||
5F9FE000
|
stack
|
page read and write
|
||
2E37E000
|
stack
|
page read and write
|
||
22BD0C40000
|
heap
|
page read and write
|
||
30DB000
|
heap
|
page read and write
|
||
4A3BF000
|
stack
|
page read and write
|
||
26FBE000
|
stack
|
page read and write
|
||
3D87F000
|
stack
|
page read and write
|
||
327FF000
|
stack
|
page read and write
|
||
674FF000
|
stack
|
page read and write
|
||
28FFF000
|
stack
|
page read and write
|
||
91CF000
|
stack
|
page read and write
|
||
47BFE000
|
stack
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
14AA000
|
trusted library allocation
|
page execute and read and write
|
||
8A0E000
|
stack
|
page read and write
|
||
568FE000
|
stack
|
page read and write
|
||
2EABF000
|
stack
|
page read and write
|
||
771F000
|
stack
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
583F000
|
stack
|
page read and write
|
||
285FF000
|
stack
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
5523F000
|
stack
|
page read and write
|
||
7310F000
|
stack
|
page read and write
|
||
69FAF000
|
stack
|
page read and write
|
||
1443F000
|
stack
|
page read and write
|
||
4F03E000
|
stack
|
page read and write
|
||
1E4FE000
|
stack
|
page read and write
|
||
45D89000
|
unkown
|
page read and write
|
||
3503E000
|
stack
|
page read and write
|
||
3817F000
|
stack
|
page read and write
|
||
5EAFE000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
1343E000
|
stack
|
page read and write
|
||
4D5BF000
|
stack
|
page read and write
|
||
1497E000
|
stack
|
page read and write
|
||
5C07E000
|
stack
|
page read and write
|
||
4CFBE000
|
stack
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
636BE000
|
stack
|
page read and write
|
||
4097E000
|
stack
|
page read and write
|
||
5A87F000
|
stack
|
page read and write
|
||
659BE000
|
stack
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
740CE000
|
stack
|
page read and write
|
||
33C3E000
|
stack
|
page read and write
|
||
3967E000
|
stack
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
6267E000
|
stack
|
page read and write
|
||
170F000
|
stack
|
page read and write
|
||
2737E000
|
stack
|
page read and write
|
||
7D11F000
|
stack
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
11DBE000
|
stack
|
page read and write
|
||
11C3F000
|
stack
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
4783E000
|
stack
|
page read and write
|
||
68F7E000
|
stack
|
page read and write
|
||
86CE000
|
stack
|
page read and write
|
||
E0CE000
|
stack
|
page read and write
|
||
4183F000
|
stack
|
page read and write
|
||
535D000
|
stack
|
page read and write
|
||
495FF000
|
stack
|
page read and write
|
||
4443E000
|
stack
|
page read and write
|
||
7750000
|
trusted library allocation
|
page execute and read and write
|
||
1582000
|
heap
|
page read and write
|
||
15FD000
|
trusted library allocation
|
page execute and read and write
|
||
668BE000
|
stack
|
page read and write
|
||
7CD9E000
|
stack
|
page read and write
|
||
5F3BE000
|
stack
|
page read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
5D57F000
|
stack
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
4007F000
|
stack
|
page read and write
|
||
19A7E000
|
stack
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
7B21E000
|
stack
|
page read and write
|
||
B390000
|
heap
|
page read and write
|
||
5F5FF000
|
stack
|
page read and write
|
||
2B03E000
|
stack
|
page read and write
|
||
85F6000
|
heap
|
page read and write
|
||
2EC3E000
|
stack
|
page read and write
|
||
26E3F000
|
stack
|
page read and write
|
||
31CFE000
|
stack
|
page read and write
|
||
4533E000
|
stack
|
page read and write
|
||
73F4F000
|
stack
|
page read and write
|
||
48BFF000
|
stack
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
7274E000
|
stack
|
page read and write
|
||
2017F000
|
stack
|
page read and write
|
||
6777F000
|
stack
|
page read and write
|
||
5923E000
|
stack
|
page read and write
|
||
54C3E000
|
stack
|
page read and write
|
||
145BE000
|
stack
|
page read and write
|
||
22C3E000
|
stack
|
page read and write
|
||
2FEFE000
|
stack
|
page read and write
|
||
F56E000
|
stack
|
page read and write
|
||
3CD3F000
|
stack
|
page read and write
|
||
27FFE000
|
stack
|
page read and write
|
||
480FE000
|
stack
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
7AF5F000
|
stack
|
page read and write
|
||
6D46E000
|
stack
|
page read and write
|
||
5053F000
|
stack
|
page read and write
|
||
3927F000
|
stack
|
page read and write
|
||
19F7E000
|
stack
|
page read and write
|
||
2283F000
|
stack
|
page read and write
|
||
1A6BF000
|
stack
|
page read and write
|
||
4733E000
|
stack
|
page read and write
|
||
52FFE000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
1A57F000
|
stack
|
page read and write
|
||
5C67F000
|
stack
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
6EBBE000
|
stack
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
3F8FF000
|
stack
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
203FF000
|
stack
|
page read and write
|
||
69BEF000
|
stack
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
720CF000
|
stack
|
page read and write
|
||
161B000
|
trusted library allocation
|
page execute and read and write
|
||
45D56000
|
unkown
|
page read and write
|
||
6DBEE000
|
stack
|
page read and write
|
||
7EDFF000
|
stack
|
page read and write
|
||
3703E000
|
stack
|
page read and write
|
||
43A3E000
|
stack
|
page read and write
|
||
5E9BE000
|
stack
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
738CE000
|
stack
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page execute and read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
40BBF000
|
stack
|
page read and write
|
||
42EBF000
|
stack
|
page read and write
|
||
2237E000
|
stack
|
page read and write
|
||
36DBE000
|
stack
|
page read and write
|
||
1617000
|
trusted library allocation
|
page execute and read and write
|
||
2A3B000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
2C3FF000
|
stack
|
page read and write
|
||
A7ED000
|
stack
|
page read and write
|
||
18F0000
|
trusted library allocation
|
page read and write
|
||
22BD0A40000
|
heap
|
page read and write
|
||
5537F000
|
stack
|
page read and write
|
||
105BF000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
326BF000
|
stack
|
page read and write
|
||
681BE000
|
stack
|
page read and write
|
||
373BF000
|
stack
|
page read and write
|
||
21D3E000
|
stack
|
page read and write
|
||
2D6BF000
|
stack
|
page read and write
|
||
E6DE000
|
stack
|
page read and write
|
||
2193F000
|
stack
|
page read and write
|
||
7BF9F000
|
stack
|
page read and write
|
||
704AD000
|
unkown
|
page read and write
|
||
3279000
|
heap
|
page read and write
|
||
43CBE000
|
stack
|
page read and write
|
||
407FF000
|
stack
|
page read and write
|
||
4F3FE000
|
stack
|
page read and write
|
||
30F3E000
|
stack
|
page read and write
|
||
7BBDF000
|
stack
|
page read and write
|
||
35DF3000
|
heap
|
page read and write
|
||
660FF000
|
stack
|
page read and write
|
||
1217E000
|
stack
|
page read and write
|
||
936F000
|
stack
|
page read and write
|
||
B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
3606000
|
heap
|
page read and write
|
||
16DBE000
|
stack
|
page read and write
|
||
3FDFF000
|
stack
|
page read and write
|
||
4D33F000
|
stack
|
page read and write
|
||
E30F000
|
stack
|
page read and write
|
||
3D77E000
|
stack
|
page read and write
|
||
19DFF000
|
stack
|
page read and write
|
||
5600000
|
heap
|
page read and write
|
||
7270F000
|
stack
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
6343E000
|
stack
|
page read and write
|
||
7C61E000
|
stack
|
page read and write
|
||
1B83F000
|
stack
|
page read and write
|
||
211BF000
|
stack
|
page read and write
|
||
5E23E000
|
stack
|
page read and write
|
||
17EE000
|
trusted library allocation
|
page read and write
|
||
7248F000
|
stack
|
page read and write
|
||
6493F000
|
stack
|
page read and write
|
||
3D13E000
|
stack
|
page read and write
|
||
49B3E000
|
stack
|
page read and write
|
||
3DB3E000
|
stack
|
page read and write
|
||
56B7E000
|
stack
|
page read and write
|
||
69FEE000
|
stack
|
page read and write
|
||
4B1BE000
|
stack
|
page read and write
|
||
2EFFE000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
3F07E000
|
stack
|
page read and write
|
||
68BBE000
|
stack
|
page read and write
|
||
6A62E000
|
stack
|
page read and write
|
||
7C85F000
|
stack
|
page read and write
|
||
16EBF000
|
stack
|
page read and write
|
||
31B7F000
|
stack
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
45DAA000
|
unkown
|
page read and write
|
||
187BE000
|
stack
|
page read and write
|
||
71BD0000
|
heap
|
page read and write
|
||
78D9F000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
15FFE000
|
stack
|
page read and write
|
||
3BFBE000
|
stack
|
page read and write
|
||
382FE000
|
stack
|
page read and write
|
||
40CFF000
|
stack
|
page read and write
|
||
6893E000
|
stack
|
page read and write
|
||
5CF3F000
|
stack
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
2FDBE000
|
stack
|
page read and write
|
||
E48E000
|
stack
|
page read and write
|
||
385FE000
|
stack
|
page read and write
|
||
58FBE000
|
stack
|
page read and write
|
||
AD4F000
|
stack
|
page read and write
|
||
7314E000
|
stack
|
page read and write
|
||
40FBE000
|
stack
|
page read and write
|
||
2427F000
|
stack
|
page read and write
|
||
59D7E000
|
stack
|
page read and write
|
||
7A55F000
|
stack
|
page read and write
|
||
39A3E000
|
stack
|
page read and write
|
||
5767F000
|
stack
|
page read and write
|
||
C2CE000
|
stack
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
71BCE000
|
stack
|
page read and write
|
||
65D7E000
|
stack
|
page read and write
|
||
325F000
|
heap
|
page read and write
|
||
247BE000
|
stack
|
page read and write
|
||
7E15F000
|
stack
|
page read and write
|
||
267FF000
|
stack
|
page read and write
|
||
72E8F000
|
stack
|
page read and write
|
||
1F67E000
|
stack
|
page read and write
|
||
6227F000
|
stack
|
page read and write
|
||
3387E000
|
stack
|
page read and write
|
||
5193F000
|
stack
|
page read and write
|
||
760DF000
|
stack
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
434FF000
|
stack
|
page read and write
|
||
20CFE000
|
stack
|
page read and write
|
||
42DBE000
|
stack
|
page read and write
|
||
6DE2F000
|
stack
|
page read and write
|
||
50A7E000
|
stack
|
page read and write
|
||
5E4BE000
|
stack
|
page read and write
|
||
45DA1000
|
unkown
|
page read and write
|
||
2877E000
|
stack
|
page read and write
|
||
6017E000
|
stack
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
22BD09A0000
|
heap
|
page read and write
|
||
2DABE000
|
stack
|
page read and write
|
||
7698E000
|
stack
|
page read and write
|
||
123FE000
|
stack
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
D94E000
|
stack
|
page read and write
|
||
43F3E000
|
stack
|
page read and write
|
||
559BF000
|
stack
|
page read and write
|
||
7430E000
|
stack
|
page read and write
|
||
1EFFF000
|
stack
|
page read and write
|
||
615FF000
|
stack
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
8BD000
|
trusted library allocation
|
page execute and read and write
|
||
399FF000
|
stack
|
page read and write
|
||
26ABE000
|
stack
|
page read and write
|
||
15F3000
|
trusted library allocation
|
page read and write
|
||
711CE000
|
stack
|
page read and write
|
||
3423F000
|
stack
|
page read and write
|
||
169FE000
|
stack
|
page read and write
|
||
6BC6F000
|
stack
|
page read and write
|
||
713F000
|
stack
|
page read and write
|
||
623F000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
450BE000
|
stack
|
page read and write
|
||
572BF000
|
stack
|
page read and write
|
||
AB0E000
|
stack
|
page read and write
|
||
7030F000
|
stack
|
page read and write
|
||
2723E000
|
stack
|
page read and write
|
||
5F37F000
|
stack
|
page read and write
|
||
C04E000
|
stack
|
page read and write
|
||
3B5BE000
|
stack
|
page read and write
|
||
365FF000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
471BF000
|
stack
|
page read and write
|
||
46E000
|
remote allocation
|
page execute and read and write
|
||
5743E000
|
stack
|
page read and write
|
||
17F3E000
|
stack
|
page read and write
|
||
53B8000
|
heap
|
page read and write
|
||
1E0FF000
|
stack
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
F9CE000
|
stack
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
B64E000
|
stack
|
page read and write
|
||
7B4F000
|
stack
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
5A27E000
|
stack
|
page read and write
|
||
3F1BE000
|
stack
|
page read and write
|
||
98D000
|
heap
|
page read and write
|
||
275FE000
|
stack
|
page read and write
|
||
4A77F000
|
stack
|
page read and write
|
||
183BF000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
4F27F000
|
stack
|
page read and write
|
||
7E8DF000
|
stack
|
page read and write
|
||
7DEDF000
|
stack
|
page read and write
|
||
1ED7F000
|
stack
|
page read and write
|
||
7DC9E000
|
stack
|
page read and write
|
||
3A8FF000
|
stack
|
page read and write
|
||
322E000
|
heap
|
page read and write
|
||
2C1BE000
|
stack
|
page read and write
|
||
1943E000
|
stack
|
page read and write
|
||
47ABE000
|
stack
|
page read and write
|
||
1DFBF000
|
unkown
|
page read and write
|
||
4093F000
|
stack
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
||
5B15000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
5617E000
|
stack
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
632BF000
|
stack
|
page read and write
|
||
2503F000
|
stack
|
page read and write
|
||
40F7F000
|
stack
|
page read and write
|
||
2F37F000
|
stack
|
page read and write
|
||
50F3F000
|
stack
|
page read and write
|
||
2A9C000
|
stack
|
page read and write
|
||
A53E000
|
stack
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
7D8DE000
|
stack
|
page read and write
|
||
30A3E000
|
stack
|
page read and write
|
||
5283F000
|
stack
|
page read and write
|
||
99E000
|
unkown
|
page read and write
|
||
6E67F000
|
stack
|
page read and write
|
||
12DFE000
|
stack
|
page read and write
|
||
3F67F000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
6393E000
|
stack
|
page read and write
|
||
FD8E000
|
stack
|
page read and write
|
||
45D6E000
|
unkown
|
page read and write
|
||
546FF000
|
stack
|
page read and write
|
||
6BB2F000
|
stack
|
page read and write
|
||
7955E000
|
stack
|
page read and write
|
||
7BADE000
|
stack
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
3053E000
|
stack
|
page read and write
|
||
5327E000
|
stack
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
45D86000
|
unkown
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
7C49F000
|
stack
|
page read and write
|
||
39B7E000
|
stack
|
page read and write
|
||
45DE3000
|
unkown
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
141BF000
|
stack
|
page read and write
|
||
423BE000
|
stack
|
page read and write
|
||
13DFF000
|
stack
|
page read and write
|
||
4467F000
|
stack
|
page read and write
|
||
184FF000
|
stack
|
page read and write
|
||
1602000
|
trusted library allocation
|
page read and write
|
||
6C02F000
|
stack
|
page read and write
|
||
609FF000
|
stack
|
page read and write
|
||
5A5FF000
|
stack
|
page read and write
|
||
3212000
|
heap
|
page read and write
|
||
14A6000
|
trusted library allocation
|
page execute and read and write
|
||
173FE000
|
stack
|
page read and write
|
||
7FA8E000
|
stack
|
page read and write
|
||
220BF000
|
stack
|
page read and write
|
||
A3F000
|
heap
|
page read and write
|
||
42EFE000
|
stack
|
page read and write
|
||
4DD7E000
|
stack
|
page read and write
|
||
9DE000
|
unkown
|
page read and write
|
||
9FCE000
|
stack
|
page read and write
|
||
20A3F000
|
stack
|
page read and write
|
||
E45E000
|
stack
|
page read and write
|
||
4107000
|
trusted library allocation
|
page read and write
|
||
22BD0CF5000
|
heap
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
401FE000
|
stack
|
page read and write
|
||
51BFE000
|
stack
|
page read and write
|
||
416FF000
|
stack
|
page read and write
|
||
5BEFF000
|
stack
|
page read and write
|
||
628BF000
|
stack
|
page read and write
|
||
B9CF000
|
stack
|
page read and write
|
||
2CCFE000
|
stack
|
page read and write
|
||
4C57F000
|
stack
|
page read and write
|
||
57CBF000
|
stack
|
page read and write
|
||
506BE000
|
stack
|
page read and write
|
||
58BFE000
|
stack
|
page read and write
|
||
E3B187F000
|
stack
|
page read and write
|
||
27E7F000
|
stack
|
page read and write
|
||
41E7F000
|
stack
|
page read and write
|
||
4FDFE000
|
stack
|
page read and write
|
||
45D53000
|
unkown
|
page read and write
|
||
B06000
|
trusted library allocation
|
page read and write
|
||
6B8AF000
|
stack
|
page read and write
|
||
502FE000
|
stack
|
page read and write
|
||
6DF6F000
|
stack
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
5E6FF000
|
stack
|
page read and write
|
||
69AAF000
|
stack
|
page read and write
|
||
23EBF000
|
stack
|
page read and write
|
||
7ABDE000
|
stack
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
358FE000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
77B9F000
|
stack
|
page read and write
|
||
2CF3F000
|
stack
|
page read and write
|
||
6843E000
|
stack
|
page read and write
|
||
7B85E000
|
stack
|
page read and write
|
||
F5CF000
|
stack
|
page read and write
|
||
525BF000
|
stack
|
page read and write
|
||
B60D000
|
stack
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
6CA2F000
|
stack
|
page read and write
|
||
7DB1F000
|
stack
|
page read and write
|
||
8AD000
|
stack
|
page read and write
|
||
3731000
|
trusted library allocation
|
page read and write
|
||
11EFE000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
31BBE000
|
stack
|
page read and write
|
||
C18E000
|
stack
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
3627E000
|
stack
|
page read and write
|
||
3D4FE000
|
stack
|
page read and write
|
||
36B3E000
|
stack
|
page read and write
|
||
4CE3F000
|
stack
|
page read and write
|
||
35D02000
|
heap
|
page read and write
|
||
71C3A000
|
heap
|
page read and write
|
||
623FE000
|
stack
|
page read and write
|
||
2E33F000
|
stack
|
page read and write
|
||
2297F000
|
stack
|
page read and write
|
||
1907000
|
heap
|
page read and write
|
||
6EE3E000
|
stack
|
page read and write
|
||
5E5BF000
|
stack
|
page read and write
|
||
7BFDE000
|
stack
|
page read and write
|
||
1C5FF000
|
stack
|
page read and write
|
||
1303F000
|
stack
|
page read and write
|
||
5FFFF000
|
stack
|
page read and write
|
||
69E6F000
|
stack
|
page read and write
|
||
3012000
|
heap
|
page read and write
|
||
3E53E000
|
stack
|
page read and write
|
||
4059000
|
trusted library allocation
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
655FE000
|
stack
|
page read and write
|
||
7220F000
|
stack
|
page read and write
|
||
6F89F000
|
stack
|
page read and write
|
||
5DBFE000
|
stack
|
page read and write
|
||
343BE000
|
stack
|
page read and write
|
||
559FE000
|
stack
|
page read and write
|
||
1F3BF000
|
stack
|
page read and write
|
||
75EDF000
|
stack
|
page read and write
|
||
6A76E000
|
stack
|
page read and write
|
||
4C93F000
|
stack
|
page read and write
|
||
5EBE000
|
stack
|
page read and write
|
||
2ADFF000
|
stack
|
page read and write
|
||
3CBFF000
|
stack
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
669BF000
|
stack
|
page read and write
|
||
DBCE000
|
stack
|
page read and write
|
||
252FE000
|
stack
|
page read and write
|
||
31E3E000
|
stack
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
50A3F000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
30C7F000
|
stack
|
page read and write
|
||
45D95000
|
unkown
|
page read and write
|
||
6986E000
|
stack
|
page read and write
|
||
774E000
|
stack
|
page read and write
|
||
62A3E000
|
stack
|
page read and write
|
||
64ABE000
|
stack
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
BBA000
|
stack
|
page read and write
|
||
5D5BE000
|
stack
|
page read and write
|
||
545BF000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page execute and read and write
|
||
1B5BF000
|
stack
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
4EC3F000
|
stack
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
45DAD000
|
unkown
|
page read and write
|
||
67B3F000
|
stack
|
page read and write
|
||
529BE000
|
stack
|
page read and write
|
||
3777F000
|
stack
|
page read and write
|
||
5A73F000
|
stack
|
page read and write
|
||
3ABBE000
|
stack
|
page read and write
|
||
C28F000
|
stack
|
page read and write
|
||
7224E000
|
stack
|
page read and write
|
||
6E6BE000
|
stack
|
page read and write
|
||
7915F000
|
stack
|
page read and write
|
||
6B16E000
|
stack
|
page read and write
|
||
4BB7F000
|
stack
|
page read and write
|
||
2EE7F000
|
stack
|
page read and write
|
||
28AFF000
|
stack
|
page read and write
|
||
20E3E000
|
stack
|
page read and write
|
||
876F000
|
stack
|
page read and write
|
||
352BE000
|
stack
|
page read and write
|
||
6677E000
|
stack
|
page read and write
|
||
32A7F000
|
stack
|
page read and write
|
||
7168F000
|
stack
|
page read and write
|
||
12C7F000
|
stack
|
page read and write
|
||
750EE000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
3243000
|
heap
|
page read and write
|
||
119FE000
|
stack
|
page read and write
|
||
7040F000
|
stack
|
page read and write
|
||
265BE000
|
stack
|
page read and write
|
||
1EDBE000
|
stack
|
page read and write
|
||
540FE000
|
stack
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
9074000
|
heap
|
page read and write
|
||
51D3E000
|
stack
|
page read and write
|
||
32BBF000
|
stack
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
5337F000
|
stack
|
page read and write
|
||
C40E000
|
stack
|
page read and write
|
||
623BF000
|
stack
|
page read and write
|
||
31DFF000
|
stack
|
page read and write
|
||
6982F000
|
stack
|
page read and write
|
||
4273F000
|
stack
|
page read and write
|
||
64CFF000
|
stack
|
page read and write
|
||
14F000
|
stack
|
page read and write
|
||
66B3E000
|
stack
|
page read and write
|
||
595BF000
|
stack
|
page read and write
|
||
65ABF000
|
stack
|
page read and write
|
||
188BF000
|
stack
|
page read and write
|
||
22FFE000
|
stack
|
page read and write
|
||
4EFFF000
|
stack
|
page read and write
|
||
64A7F000
|
stack
|
page read and write
|
||
3227000
|
heap
|
page read and write
|
||
7A91F000
|
stack
|
page read and write
|
||
1EC7E000
|
stack
|
page read and write
|
||
2B2E000
|
trusted library allocation
|
page read and write
|
||
6003E000
|
stack
|
page read and write
|
||
71B8F000
|
stack
|
page read and write
|
||
1FF3E000
|
stack
|
page read and write
|
||
3556000
|
trusted library allocation
|
page read and write
|
||
6932F000
|
stack
|
page read and write
|
||
3AA3F000
|
stack
|
page read and write
|
||
3153F000
|
stack
|
page read and write
|
||
13F7E000
|
stack
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
4547E000
|
stack
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
276FF000
|
stack
|
page read and write
|
||
6A36F000
|
stack
|
page read and write
|
||
19BBE000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
1087E000
|
stack
|
page read and write
|
||
17C7F000
|
stack
|
page read and write
|
||
37B3F000
|
stack
|
page read and write
|
||
4137E000
|
stack
|
page read and write
|
||
18F5000
|
trusted library allocation
|
page read and write
|
||
7CADF000
|
stack
|
page read and write
|
||
429FE000
|
stack
|
page read and write
|
||
AA2E000
|
stack
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
311BE000
|
stack
|
page read and write
|
||
67CBE000
|
stack
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
6A9EE000
|
stack
|
page read and write
|
||
633FF000
|
stack
|
page read and write
|
||
1A7FF000
|
stack
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
6DFEE000
|
stack
|
page read and write
|
||
4A07000
|
trusted library allocation
|
page read and write
|
||
6013F000
|
stack
|
page read and write
|
||
62B3F000
|
stack
|
page read and write
|
||
5897E000
|
stack
|
page read and write
|
||
7BC1E000
|
stack
|
page read and write
|
||
5C53F000
|
stack
|
page read and write
|
||
E34E000
|
stack
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
331FF000
|
stack
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
52D7E000
|
stack
|
page read and write
|
||
308FE000
|
stack
|
page read and write
|
||
7D79E000
|
stack
|
page read and write
|
||
2EFBF000
|
stack
|
page read and write
|
||
2647E000
|
stack
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
1317F000
|
stack
|
page read and write
|
||
591FF000
|
stack
|
page read and write
|
||
C00000
|
system
|
page execute and read and write
|
||
5273E000
|
stack
|
page read and write
|
||
E0D000
|
stack
|
page read and write
|
||
4A63F000
|
stack
|
page read and write
|
||
19CFE000
|
stack
|
page read and write
|
||
133FF000
|
stack
|
page read and write
|
||
4B7BF000
|
stack
|
page read and write
|
||
4FF3E000
|
stack
|
page read and write
|
||
5B77F000
|
stack
|
page read and write
|
||
2E87E000
|
stack
|
page read and write
|
||
67DFE000
|
stack
|
page read and write
|
||
34C7E000
|
stack
|
page read and write
|
||
3A17F000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
35FBF000
|
stack
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
10FBF000
|
stack
|
page read and write
|
||
665FF000
|
stack
|
page read and write
|
||
32E3F000
|
stack
|
page read and write
|
||
704AF000
|
unkown
|
page readonly
|
||
2AB7F000
|
stack
|
page read and write
|
||
733CE000
|
stack
|
page read and write
|
||
65EBE000
|
stack
|
page read and write
|
||
74FF000
|
stack
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
1C27E000
|
stack
|
page read and write
|
||
5393F000
|
stack
|
page read and write
|
||
1FC7F000
|
stack
|
page read and write
|
||
3B6FE000
|
stack
|
page read and write
|
||
2233F000
|
stack
|
page read and write
|
||
2F27E000
|
stack
|
page read and write
|
||
1357E000
|
stack
|
page read and write
|
||
2007E000
|
stack
|
page read and write
|
||
38B3E000
|
stack
|
page read and write
|
||
7C0DF000
|
stack
|
page read and write
|
||
6D1AF000
|
stack
|
page read and write
|
||
B4CF000
|
stack
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
64BFE000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4EEFE000
|
stack
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
7ACDF000
|
stack
|
page read and write
|
||
5F23F000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
4B03F000
|
stack
|
page read and write
|
||
1C9FE000
|
stack
|
page read and write
|
||
1E3BE000
|
stack
|
page read and write
|
||
2F23F000
|
stack
|
page read and write
|
||
14BFE000
|
stack
|
page read and write
|
||
4197F000
|
stack
|
page read and write
|
||
262FF000
|
stack
|
page read and write
|
||
3EC7F000
|
stack
|
page read and write
|
||
7C21F000
|
stack
|
page read and write
|
||
4AF3E000
|
stack
|
page read and write
|
||
1767E000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
2ACFE000
|
stack
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
5883E000
|
stack
|
page read and write
|
||
401D000
|
stack
|
page read and write
|
||
52C3E000
|
stack
|
page read and write
|
||
BDCE000
|
stack
|
page read and write
|
||
23C7E000
|
stack
|
page read and write
|
||
6A72F000
|
stack
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
2FEBF000
|
stack
|
page read and write
|
||
7EFFF000
|
stack
|
page read and write
|
||
687FE000
|
stack
|
page read and write
|
||
F74E000
|
stack
|
page read and write
|
||
6433E000
|
stack
|
page read and write
|
||
1867E000
|
stack
|
page read and write
|
||
35CC0000
|
heap
|
page read and write
|
||
428BE000
|
stack
|
page read and write
|
||
6BF2E000
|
stack
|
page read and write
|
||
4C43F000
|
stack
|
page read and write
|
||
7B6DF000
|
stack
|
page read and write
|
||
28C3F000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
8C9000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
2107F000
|
stack
|
page read and write
|
||
11D7F000
|
stack
|
page read and write
|
||
6C52F000
|
stack
|
page read and write
|
||
150BF000
|
stack
|
page read and write
|
||
348E000
|
trusted library allocation
|
page read and write
|
||
394FF000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
3CABF000
|
stack
|
page read and write
|
||
A6AC000
|
stack
|
page read and write
|
||
5214000
|
heap
|
page read and write
|
||
67F3E000
|
stack
|
page read and write
|
||
23D7F000
|
stack
|
page read and write
|
||
63A7E000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
74D7F000
|
stack
|
page read and write
|
||
5D7FF000
|
stack
|
page read and write
|
||
CF4E000
|
stack
|
page read and write
|
||
15DA000
|
heap
|
page read and write
|
||
5D6FE000
|
stack
|
page read and write
|
||
7130E000
|
stack
|
page read and write
|
||
6F47E000
|
stack
|
page read and write
|
||
14BB000
|
trusted library allocation
|
page execute and read and write
|
||
6B2AE000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FB8F000
|
stack
|
page read and write
|
||
3B6BF000
|
stack
|
page read and write
|
||
F4CE000
|
stack
|
page read and write
|
||
7DD9F000
|
stack
|
page read and write
|
||
6F67E000
|
stack
|
page read and write
|
||
3FE3E000
|
stack
|
page read and write
|
||
138D000
|
trusted library allocation
|
page execute and read and write
|
||
5527E000
|
stack
|
page read and write
|
||
7AA5F000
|
stack
|
page read and write
|
||
34C3F000
|
stack
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
6BDAF000
|
stack
|
page read and write
|
||
79E1E000
|
stack
|
page read and write
|
||
3280000
|
unclassified section
|
page execute and read and write
|
||
646FE000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
6F1FE000
|
stack
|
page read and write
|
||
4F8BF000
|
stack
|
page read and write
|
||
4E23F000
|
stack
|
page read and write
|
||
6801000
|
heap
|
page read and write
|
||
7D15E000
|
stack
|
page read and write
|
||
8BCE000
|
stack
|
page read and write
|
||
908F000
|
stack
|
page read and write
|
||
DCCF000
|
stack
|
page read and write
|
||
65FBF000
|
stack
|
page read and write
|
||
2C2BF000
|
stack
|
page read and write
|
||
72FCF000
|
stack
|
page read and write
|
||
74CE000
|
stack
|
page read and write
|
||
2B8FE000
|
stack
|
page read and write
|
||
628FE000
|
stack
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
2873F000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
45DBF000
|
unkown
|
page read and write
|
||
5EABF000
|
stack
|
page read and write
|
||
1D3BF000
|
stack
|
page read and write
|
||
55DBE000
|
stack
|
page read and write
|
||
2FB3E000
|
stack
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
33E7F000
|
stack
|
page read and write
|
||
543B000
|
stack
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
5A0FF000
|
stack
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
604FF000
|
stack
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
631BE000
|
stack
|
page read and write
|
||
45DC2000
|
unkown
|
page read and write
|
||
1607000
|
heap
|
page read and write
|
||
3167F000
|
stack
|
page read and write
|
||
1547F000
|
stack
|
page read and write
|
||
202FE000
|
stack
|
page read and write
|
||
7578F000
|
stack
|
page read and write
|
||
5007E000
|
stack
|
page read and write
|
||
5613F000
|
stack
|
page read and write
|
||
49C7E000
|
stack
|
page read and write
|
||
45D62000
|
unkown
|
page read and write
|
||
2467E000
|
stack
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
2747F000
|
stack
|
page read and write
|
||
683FF000
|
stack
|
page read and write
|
||
182BE000
|
stack
|
page read and write
|
||
36AFF000
|
stack
|
page read and write
|
||
8F43000
|
heap
|
page read and write
|
||
3FBBE000
|
stack
|
page read and write
|
||
1BFBF000
|
stack
|
page read and write
|
||
5FDBE000
|
stack
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4E4FE000
|
stack
|
page read and write
|
||
6857E000
|
stack
|
page read and write
|
||
502BF000
|
stack
|
page read and write
|
||
5857F000
|
stack
|
page read and write
|
||
7B35E000
|
stack
|
page read and write
|
||
16C3F000
|
stack
|
page read and write
|
||
3D23F000
|
stack
|
page read and write
|
||
6A22F000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
EF8F000
|
stack
|
page read and write
|
||
7B59F000
|
stack
|
page read and write
|
||
3BE3F000
|
stack
|
page read and write
|
||
6583F000
|
stack
|
page read and write
|
||
533FE000
|
stack
|
page read and write
|
||
37F3E000
|
stack
|
page read and write
|
||
48A7000
|
trusted library allocation
|
page read and write
|
||
17CB000
|
stack
|
page read and write
|
||
4E000
|
stack
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
1727F000
|
stack
|
page read and write
|
||
14F7F000
|
stack
|
page read and write
|
||
373FE000
|
stack
|
page read and write
|
||
647FF000
|
stack
|
page read and write
|
||
1C4FE000
|
stack
|
page read and write
|
||
3D27E000
|
stack
|
page read and write
|
||
6547F000
|
stack
|
page read and write
|
||
1D53E000
|
stack
|
page read and write
|
||
12CBE000
|
stack
|
page read and write
|
||
177BE000
|
stack
|
page read and write
|
||
1C4BF000
|
stack
|
page read and write
|
||
30E5000
|
trusted library allocation
|
page read and write
|
||
3C4BE000
|
stack
|
page read and write
|
||
64BF000
|
stack
|
page read and write
|
||
46E000
|
remote allocation
|
page execute and read and write
|
||
147FF000
|
stack
|
page read and write
|
||
3225000
|
heap
|
page read and write
|
||
32FBE000
|
stack
|
page read and write
|
||
2BF3E000
|
stack
|
page read and write
|
||
9DF000
|
unkown
|
page read and write
|
||
22FBF000
|
stack
|
page read and write
|
||
45D83000
|
unkown
|
page read and write
|
||
E49E000
|
stack
|
page read and write
|
||
7F68F000
|
stack
|
page read and write
|
||
5800000
|
trusted library section
|
page readonly
|
||
A32000
|
heap
|
page read and write
|
||
B28E000
|
stack
|
page read and write
|
||
34FFF000
|
stack
|
page read and write
|
||
4B7FE000
|
stack
|
page read and write
|
||
704AF000
|
unkown
|
page readonly
|
||
DDE000
|
stack
|
page read and write
|
||
266FE000
|
stack
|
page read and write
|
||
734CF000
|
stack
|
page read and write
|
||
B6CE000
|
stack
|
page read and write
|
||
257BF000
|
stack
|
page read and write
|
||
2863E000
|
stack
|
page read and write
|
||
7969E000
|
stack
|
page read and write
|
||
C50F000
|
stack
|
page read and write
|
||
60FFE000
|
stack
|
page read and write
|
||
6D56F000
|
stack
|
page read and write
|
||
132FE000
|
stack
|
page read and write
|
||
44E3E000
|
stack
|
page read and write
|
||
679000
|
stack
|
page read and write
|
||
1447E000
|
stack
|
page read and write
|
||
448FF000
|
stack
|
page read and write
|
||
F23C000
|
stack
|
page read and write
|
||
1EC3F000
|
stack
|
page read and write
|
||
6263F000
|
stack
|
page read and write
|
||
6627E000
|
stack
|
page read and write
|
||
54FFE000
|
stack
|
page read and write
|
||
45DE0000
|
unkown
|
page read and write
|
||
1A0BE000
|
stack
|
page read and write
|
||
4743F000
|
stack
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1FDBF000
|
stack
|
page read and write
|
||
1FA3E000
|
stack
|
page read and write
|
||
66EBF000
|
stack
|
page read and write
|
||
9110000
|
trusted library allocation
|
page read and write
|
||
15C3E000
|
stack
|
page read and write
|
||
132BF000
|
stack
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
15E3000
|
trusted library allocation
|
page execute and read and write
|
||
50FF000
|
stack
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
F83B000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
490FF000
|
stack
|
page read and write
|
||
7690E000
|
stack
|
page read and write
|
||
587B000
|
stack
|
page read and write
|
||
4C83E000
|
stack
|
page read and write
|
||
438FE000
|
stack
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
576BE000
|
stack
|
page read and write
|
||
160FF000
|
stack
|
page read and write
|
||
6B3EE000
|
stack
|
page read and write
|
||
D92000
|
unkown
|
page readonly
|
||
110FF000
|
stack
|
page read and write
|
||
A10E000
|
stack
|
page read and write
|
||
4147F000
|
stack
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
5057E000
|
stack
|
page read and write
|
||
45D4D000
|
unkown
|
page read and write
|
||
1FB3F000
|
stack
|
page read and write
|
||
25DFF000
|
stack
|
page read and write
|
||
7929F000
|
stack
|
page read and write
|
||
3157E000
|
stack
|
page read and write
|
||
758CE000
|
stack
|
page read and write
|
||
229BE000
|
stack
|
page read and write
|
||
4833F000
|
stack
|
page read and write
|
||
75FDF000
|
stack
|
page read and write
|
||
2643F000
|
stack
|
page read and write
|
||
4FEFF000
|
stack
|
page read and write
|
||
58D3E000
|
stack
|
page read and write
|
||
3006000
|
heap
|
page read and write
|
||
51FBE000
|
stack
|
page read and write
|
||
67A3E000
|
stack
|
page read and write
|
||
788DE000
|
stack
|
page read and write
|
||
304D000
|
stack
|
page read and write
|
||
378FE000
|
stack
|
page read and write
|
||
5577E000
|
stack
|
page read and write
|
||
41D7E000
|
stack
|
page read and write
|
||
BBED000
|
stack
|
page read and write
|
||
29C7F000
|
stack
|
page read and write
|
||
472FF000
|
stack
|
page read and write
|
||
4847F000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
5987E000
|
stack
|
page read and write
|
||
197BF000
|
stack
|
page read and write
|
||
47E7E000
|
stack
|
page read and write
|
||
3977F000
|
stack
|
page read and write
|
||
13FD000
|
heap
|
page read and write
|
||
A40E000
|
stack
|
page read and write
|
||
3B57F000
|
stack
|
page read and write
|
||
2E4BE000
|
stack
|
page read and write
|
||
5BF3E000
|
stack
|
page read and write
|
||
7DC5F000
|
stack
|
page read and write
|
||
6213F000
|
stack
|
page read and write
|
||
5F63E000
|
stack
|
page read and write
|
||
59ABF000
|
stack
|
page read and write
|
||
4FA3E000
|
stack
|
page read and write
|
||
383FF000
|
stack
|
page read and write
|
||
4237F000
|
stack
|
page read and write
|
||
45D92000
|
unkown
|
page read and write
|
||
45DA4000
|
unkown
|
page read and write
|
||
33BFF000
|
stack
|
page read and write
|
||
45DCE000
|
unkown
|
page read and write
|
||
224BE000
|
stack
|
page read and write
|
||
637FE000
|
stack
|
page read and write
|
||
348BE000
|
stack
|
page read and write
|
||
7E3DF000
|
stack
|
page read and write
|
||
40D9000
|
trusted library allocation
|
page read and write
|
||
762DF000
|
stack
|
page read and write
|
||
261BF000
|
stack
|
page read and write
|
||
3077F000
|
stack
|
page read and write
|
||
CF0F000
|
stack
|
page read and write
|
||
6053E000
|
stack
|
page read and write
|
||
406FE000
|
stack
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
293BF000
|
stack
|
page read and write
|
||
3C0FE000
|
stack
|
page read and write
|
||
1AF7F000
|
stack
|
page read and write
|
||
8FF0000
|
heap
|
page read and write
|
||
3017E000
|
stack
|
page read and write
|
||
4EB3E000
|
stack
|
page read and write
|
||
4A4FF000
|
stack
|
page read and write
|
||
52E7F000
|
stack
|
page read and write
|
||
26D3E000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
498BE000
|
stack
|
page read and write
|
||
62DFE000
|
stack
|
page read and write
|
||
4897F000
|
stack
|
page read and write
|
||
1353F000
|
stack
|
page read and write
|
||
45ABE000
|
stack
|
page read and write
|
||
4E37E000
|
stack
|
page read and write
|
||
3B83E000
|
stack
|
page read and write
|
||
5A4FE000
|
stack
|
page read and write
|
||
7013F000
|
stack
|
page read and write
|
||
571BE000
|
stack
|
page read and write
|
||
20F7E000
|
stack
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
3101000
|
heap
|
page read and write
|
||
32CFF000
|
stack
|
page read and write
|
||
F3BD000
|
stack
|
page read and write
|
||
60D3F000
|
stack
|
page read and write
|
||
7932000
|
trusted library allocation
|
page read and write
|
||
521C000
|
heap
|
page read and write
|
||
6D96E000
|
stack
|
page read and write
|
||
3C37E000
|
stack
|
page read and write
|
||
5ADBE000
|
stack
|
page read and write
|
||
50BBE000
|
stack
|
page read and write
|
||
258FF000
|
stack
|
page read and write
|
||
2403E000
|
stack
|
page read and write
|
||
5677F000
|
stack
|
page read and write
|
||
18C7F000
|
stack
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
6803F000
|
stack
|
page read and write
|
||
F20F000
|
stack
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
619FE000
|
stack
|
page read and write
|
||
1C8BE000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
7F2BE000
|
stack
|
page read and write
|
||
48D3F000
|
stack
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
5A4BF000
|
stack
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2AA7E000
|
stack
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
6CBAE000
|
stack
|
page read and write
|
||
7D25F000
|
stack
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
4E4BF000
|
stack
|
page read and write
|
||
1B6FF000
|
stack
|
page read and write
|
||
10E7F000
|
stack
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
7E79F000
|
stack
|
page read and write
|
||
27EBE000
|
stack
|
page read and write
|
||
14FBE000
|
stack
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
A20F000
|
stack
|
page read and write
|
||
60E7F000
|
stack
|
page read and write
|
||
2417E000
|
stack
|
page read and write
|
||
78B1F000
|
stack
|
page read and write
|
||
18C0000
|
heap
|
page execute and read and write
|
||
7535E000
|
stack
|
page read and write
|
||
63CFE000
|
stack
|
page read and write
|
||
5487E000
|
stack
|
page read and write
|
||
5A77E000
|
stack
|
page read and write
|
||
7A59E000
|
stack
|
page read and write
|
||
317BF000
|
stack
|
page read and write
|
||
25B7F000
|
stack
|
page read and write
|
||
51CFF000
|
stack
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
5933F000
|
stack
|
page read and write
|
||
567BE000
|
stack
|
page read and write
|
||
42AFF000
|
stack
|
page read and write
|
||
A98F000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
293FE000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
1993E000
|
stack
|
page read and write
|
||
5880000
|
trusted library section
|
page readonly
|
||
38C7E000
|
stack
|
page read and write
|
||
9A8F000
|
stack
|
page read and write
|
||
4D23E000
|
stack
|
page read and write
|
||
1AABE000
|
stack
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
29F3E000
|
stack
|
page read and write
|
||
25A3F000
|
stack
|
page read and write
|
||
3DEFE000
|
stack
|
page read and write
|
||
45D47000
|
unkown
|
page read and write
|
||
663BE000
|
stack
|
page read and write
|
||
2A6BE000
|
stack
|
page read and write
|
||
516FE000
|
stack
|
page read and write
|
||
3917E000
|
stack
|
page read and write
|
||
467FE000
|
stack
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
789DF000
|
stack
|
page read and write
|
||
4EDBE000
|
stack
|
page read and write
|
||
2E9BE000
|
stack
|
page read and write
|
||
71A4F000
|
stack
|
page read and write
|
||
747BF000
|
stack
|
page read and write
|
||
42FFF000
|
stack
|
page read and write
|
||
562BE000
|
stack
|
page read and write
|
||
773C000
|
stack
|
page read and write
|
||
6C42E000
|
stack
|
page read and write
|
||
1033F000
|
stack
|
page read and write
|
||
5EFBF000
|
stack
|
page read and write
|
||
302BE000
|
stack
|
page read and write
|
||
3A53F000
|
stack
|
page read and write
|
||
494BF000
|
stack
|
page read and write
|
||
7B31F000
|
stack
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
5C8FF000
|
stack
|
page read and write
|
||
29A3E000
|
stack
|
page read and write
|
||
4D4BE000
|
stack
|
page read and write
|
||
5940000
|
trusted library section
|
page readonly
|
||
2BCBE000
|
stack
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
54BFF000
|
stack
|
page read and write
|
||
317FE000
|
stack
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
3BABE000
|
stack
|
page read and write
|
||
717CF000
|
stack
|
page read and write
|
||
4133F000
|
stack
|
page read and write
|
||
9E8E000
|
stack
|
page read and write
|
||
210BE000
|
stack
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
ED3D000
|
stack
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
275BF000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
5147E000
|
stack
|
page read and write
|
||
485FE000
|
stack
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
4313F000
|
stack
|
page read and write
|
||
4BA7E000
|
stack
|
page read and write
|
||
695AF000
|
stack
|
page read and write
|
||
1CFFF000
|
stack
|
page read and write
|
||
499FE000
|
stack
|
page read and write
|
||
CE0E000
|
stack
|
page read and write
|
||
357BE000
|
stack
|
page read and write
|
||
1FEFF000
|
stack
|
page read and write
|
||
84D000
|
stack
|
page read and write
|
||
741CF000
|
stack
|
page read and write
|
||
2BB3F000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
4883F000
|
stack
|
page read and write
|
||
64BBF000
|
stack
|
page read and write
|
||
511B000
|
stack
|
page read and write
|
||
3857E000
|
stack
|
page read and write
|
||
541B000
|
stack
|
page read and write
|
||
2F13E000
|
stack
|
page read and write
|
||
7108E000
|
stack
|
page read and write
|
||
2B07000
|
heap
|
page read and write
|
||
41AFE000
|
stack
|
page read and write
|
||
3EDBF000
|
stack
|
page read and write
|
||
2A67F000
|
stack
|
page read and write
|
||
438BF000
|
stack
|
page read and write
|
||
7765E000
|
stack
|
page read and write
|
||
2C8FF000
|
stack
|
page read and write
|
||
8B3000
|
trusted library allocation
|
page execute and read and write
|
||
257FE000
|
stack
|
page read and write
|
||
B7D000
|
stack
|
page read and write
|
||
5893F000
|
stack
|
page read and write
|
||
61EBF000
|
stack
|
page read and write
|
||
3A43E000
|
stack
|
page read and write
|
||
55EBF000
|
stack
|
page read and write
|
||
37C7F000
|
stack
|
page read and write
|
||
4BCFE000
|
stack
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page execute and read and write
|
||
1BE7F000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
3687F000
|
stack
|
page read and write
|
||
4EEBF000
|
stack
|
page read and write
|
||
A5CF000
|
stack
|
page read and write
|
||
22BD0CF0000
|
heap
|
page read and write
|
||
1FCBE000
|
stack
|
page read and write
|
||
288BE000
|
stack
|
page read and write
|
||
70E0E000
|
stack
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
197FE000
|
stack
|
page read and write
|
||
45DFB000
|
unkown
|
page read and write
|
||
6AFF000
|
stack
|
page read and write
|
||
486FF000
|
stack
|
page read and write
|
||
8AF2000
|
heap
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
CEE000
|
system
|
page execute and read and write
|
||
2B17E000
|
stack
|
page read and write
|
||
261FE000
|
stack
|
page read and write
|
||
F6FE000
|
stack
|
page read and write
|
||
2553F000
|
stack
|
page read and write
|
||
15E7F000
|
stack
|
page read and write
|
||
1203E000
|
stack
|
page read and write
|
||
68E3E000
|
stack
|
page read and write
|
||
2683E000
|
stack
|
page read and write
|
||
1A83E000
|
stack
|
page read and write
|
||
1DC3E000
|
stack
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
3E3FE000
|
stack
|
page read and write
|
||
2827E000
|
stack
|
page read and write
|
||
3413E000
|
stack
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
32D3E000
|
stack
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
439FF000
|
stack
|
page read and write
|
||
4DAFE000
|
stack
|
page read and write
|
||
284BF000
|
stack
|
page read and write
|
||
7D65E000
|
stack
|
page read and write
|
||
6767E000
|
stack
|
page read and write
|
||
8A4F000
|
stack
|
page read and write
|
||
42C7E000
|
stack
|
page read and write
|
||
2F9BF000
|
stack
|
page read and write
|
||
28F000
|
stack
|
page read and write
|
||
25E3E000
|
stack
|
page read and write
|
||
93E000
|
unkown
|
page read and write
|
||
763DF000
|
stack
|
page read and write
|
||
10DF000
|
stack
|
page read and write
|
||
22AFE000
|
stack
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
7FD0E000
|
stack
|
page read and write
|
||
22BD0970000
|
heap
|
page read and write
|
||
2DD3E000
|
stack
|
page read and write
|
||
5F13E000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
5223E000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
4557F000
|
stack
|
page read and write
|
||
55AFF000
|
stack
|
page read and write
|
||
13BBE000
|
stack
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
470BE000
|
stack
|
page read and write
|
||
3323E000
|
stack
|
page read and write
|
||
AB7000
|
trusted library allocation
|
page execute and read and write
|
||
1356000
|
heap
|
page read and write
|
||
7D4DF000
|
stack
|
page read and write
|
||
57FC000
|
stack
|
page read and write
|
||
C64F000
|
stack
|
page read and write
|
||
25CFE000
|
stack
|
page read and write
|
||
63BBE000
|
stack
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page execute and read and write
|
||
7B99E000
|
stack
|
page read and write
|
||
297BE000
|
stack
|
page read and write
|
||
72C0F000
|
stack
|
page read and write
|
||
68CFE000
|
stack
|
page read and write
|
||
7B45F000
|
stack
|
page read and write
|
||
17F6000
|
trusted library allocation
|
page read and write
|
||
480BF000
|
stack
|
page read and write
|
||
216FE000
|
stack
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
6AB2E000
|
stack
|
page read and write
|
||
1483000
|
trusted library allocation
|
page execute and read and write
|
||
4A13F000
|
stack
|
page read and write
|
||
641FE000
|
stack
|
page read and write
|
||
3397F000
|
stack
|
page read and write
|
||
173BF000
|
stack
|
page read and write
|
||
7C99F000
|
stack
|
page read and write
|
||
136BE000
|
stack
|
page read and write
|
||
B5CD000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page execute and read and write
|
||
364FE000
|
stack
|
page read and write
|
||
3677E000
|
stack
|
page read and write
|
||
737000
|
stack
|
page read and write
|
||
13A2000
|
trusted library allocation
|
page read and write
|
||
13AB000
|
trusted library allocation
|
page execute and read and write
|
||
1AA7F000
|
stack
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
3293F000
|
stack
|
page read and write
|
||
A34F000
|
stack
|
page read and write
|
||
21BFE000
|
stack
|
page read and write
|
||
3333F000
|
stack
|
page read and write
|
||
2D5BE000
|
stack
|
page read and write
|
||
70F0F000
|
stack
|
page read and write
|
||
10FFE000
|
stack
|
page read and write
|
||
6717E000
|
stack
|
page read and write
|
||
5F0FF000
|
stack
|
page read and write
|
||
27AFE000
|
stack
|
page read and write
|
||
E20E000
|
stack
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
5003F000
|
stack
|
page read and write
|
||
23DBE000
|
stack
|
page read and write
|
||
6623F000
|
stack
|
page read and write
|
||
3577F000
|
stack
|
page read and write
|
||
1123F000
|
stack
|
page read and write
|
||
BB4E000
|
stack
|
page read and write
|
||
6A3AE000
|
stack
|
page read and write
|
||
2CBBE000
|
stack
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
154BE000
|
stack
|
page read and write
|
||
56CBE000
|
stack
|
page read and write
|
||
67EFF000
|
stack
|
page read and write
|
||
90F0000
|
trusted library allocation
|
page read and write
|
||
E31D000
|
stack
|
page read and write
|
||
7E69E000
|
stack
|
page read and write
|
||
85B2000
|
heap
|
page read and write
|
||
40BFE000
|
stack
|
page read and write
|
||
BAAD000
|
stack
|
page read and write
|
||
2593E000
|
stack
|
page read and write
|
||
3DDBE000
|
stack
|
page read and write
|
||
1059000
|
stack
|
page read and write
|
||
7A7DF000
|
stack
|
page read and write
|
||
3EB3F000
|
stack
|
page read and write
|
||
4DBFF000
|
stack
|
page read and write
|
||
549BE000
|
stack
|
page read and write
|
||
4B2BF000
|
stack
|
page read and write
|
||
335BF000
|
stack
|
page read and write
|
||
432BE000
|
stack
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
3767E000
|
stack
|
page read and write
|
||
4B3FF000
|
stack
|
page read and write
|
||
517FF000
|
stack
|
page read and write
|
||
1BAFE000
|
stack
|
page read and write
|
||
1573E000
|
stack
|
page read and write
|
||
52BFF000
|
stack
|
page read and write
|
||
708C000
|
stack
|
page read and write
|
||
5CCBF000
|
stack
|
page read and write
|
||
1A5BE000
|
stack
|
page read and write
|
||
57E3E000
|
stack
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
8AC8000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
7388F000
|
stack
|
page read and write
|
||
1A43F000
|
stack
|
page read and write
|
||
14ABE000
|
stack
|
page read and write
|
||
7310000
|
heap
|
page read and write
|
||
11EBF000
|
stack
|
page read and write
|
||
A2CD000
|
stack
|
page read and write
|
||
1B1FF000
|
stack
|
page read and write
|
||
5F9BF000
|
stack
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
6DCEF000
|
stack
|
page read and write
|
||
699AE000
|
stack
|
page read and write
|
||
451BF000
|
stack
|
page read and write
|
||
7F330000
|
trusted library allocation
|
page execute and read and write
|
||
7839F000
|
stack
|
page read and write
|
||
5627F000
|
stack
|
page read and write
|
||
292BE000
|
stack
|
page read and write
|
||
61DBE000
|
stack
|
page read and write
|
||
980F000
|
stack
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
3E17E000
|
stack
|
page read and write
|
||
266BF000
|
stack
|
page read and write
|
||
2CCBF000
|
stack
|
page read and write
|
||
4F7BE000
|
stack
|
page read and write
|
||
D30E000
|
stack
|
page read and write
|
||
77A9F000
|
stack
|
page read and write
|
||
193FF000
|
stack
|
page read and write
|
||
4667F000
|
unkown
|
page read and write
|
||
4747E000
|
stack
|
page read and write
|
||
321BF000
|
stack
|
page read and write
|
||
BC4F000
|
stack
|
page read and write
|
||
7889F000
|
stack
|
page read and write
|
||
4BDFF000
|
stack
|
page read and write
|
||
31F3F000
|
stack
|
page read and write
|
||
1C87F000
|
stack
|
page read and write
|
||
550FF000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
475BE000
|
stack
|
page read and write
|
||
520BF000
|
stack
|
page read and write
|
||
4F17E000
|
stack
|
page read and write
|
||
EA8F000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
47BBF000
|
stack
|
page read and write
|
||
23FFF000
|
stack
|
page read and write
|
||
1F3FE000
|
stack
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
3ADFF000
|
stack
|
page read and write
|
||
1DFFE000
|
stack
|
page read and write
|
||
45DD1000
|
unkown
|
page read and write
|
||
476BF000
|
stack
|
page read and write
|
||
7FE0F000
|
stack
|
page read and write
|
||
31A7E000
|
stack
|
page read and write
|
||
508FF000
|
stack
|
page read and write
|
||
46E000
|
remote allocation
|
page execute and read and write
|
||
2E5FE000
|
stack
|
page read and write
|
||
3AE3E000
|
stack
|
page read and write
|
||
3D63E000
|
stack
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
7A95E000
|
stack
|
page read and write
|
||
13A7000
|
trusted library allocation
|
page execute and read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
512FF000
|
stack
|
page read and write
|
||
EE4F000
|
stack
|
page read and write
|
||
57F3F000
|
stack
|
page read and write
|
||
6EBF000
|
stack
|
page read and write
|
||
793DF000
|
stack
|
page read and write
|
||
AACF000
|
stack
|
page read and write
|
||
1AE7E000
|
stack
|
page read and write
|
||
5ED3F000
|
stack
|
page read and write
|
||
3D9FE000
|
stack
|
page read and write
|
||
34B3E000
|
stack
|
page read and write
|
||
3B97E000
|
stack
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
5F4BF000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page execute and read and write
|
||
696EF000
|
stack
|
page read and write
|
||
6F1BF000
|
stack
|
page read and write
|
||
729CE000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
23AFF000
|
stack
|
page read and write
|
||
6A0EF000
|
stack
|
page read and write
|
||
35B7E000
|
stack
|
page read and write
|
||
31F7E000
|
stack
|
page read and write
|
||
DF8E000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1253E000
|
stack
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
5717F000
|
stack
|
page read and write
|
||
59D3F000
|
stack
|
page read and write
|
||
DB8F000
|
stack
|
page read and write
|
||
2E0FE000
|
stack
|
page read and write
|
||
59FBF000
|
stack
|
page read and write
|
||
5B63F000
|
stack
|
page read and write
|
||
106FF000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
33FBF000
|
stack
|
page read and write
|
||
4E77E000
|
stack
|
page read and write
|
||
6597F000
|
stack
|
page read and write
|
||
39B3F000
|
stack
|
page read and write
|
||
1E87F000
|
stack
|
page read and write
|
||
5F4FE000
|
stack
|
page read and write
|
||
7DA1E000
|
stack
|
page read and write
|
||
2657F000
|
stack
|
page read and write
|
||
14E7E000
|
stack
|
page read and write
|
||
4DABF000
|
stack
|
page read and write
|
||
35DA8000
|
heap
|
page read and write
|
||
3612000
|
heap
|
page read and write
|
||
7A81E000
|
stack
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
C02000
|
system
|
page execute and read and write
|
||
5F87F000
|
stack
|
page read and write
|
||
72C4E000
|
stack
|
page read and write
|
||
1B0BF000
|
stack
|
page read and write
|
||
34EBF000
|
stack
|
page read and write
|
||
5CCFE000
|
stack
|
page read and write
|
||
35CBE000
|
stack
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
251BE000
|
stack
|
page read and write
|
||
39CBE000
|
stack
|
page read and write
|
||
49EBF000
|
stack
|
page read and write
|
||
5C17F000
|
stack
|
page read and write
|
||
7F7CF000
|
stack
|
page read and write
|
||
64E7E000
|
stack
|
page read and write
|
||
1703E000
|
stack
|
page read and write
|
||
1E77E000
|
stack
|
page read and write
|
||
336FF000
|
stack
|
page read and write
|
||
44CFE000
|
stack
|
page read and write
|
||
2B3FE000
|
stack
|
page read and write
|
||
48E7F000
|
stack
|
page read and write
|
||
4A7BE000
|
stack
|
page read and write
|
||
127BE000
|
stack
|
page read and write
|
||
8FE000
|
unkown
|
page read and write
|
||
353BF000
|
stack
|
page read and write
|
||
1EAFF000
|
stack
|
page read and write
|
||
3673F000
|
stack
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
2B9FF000
|
stack
|
page read and write
|
||
123BF000
|
stack
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3527F000
|
stack
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
38C3F000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
33D3F000
|
stack
|
page read and write
|
||
158D000
|
heap
|
page read and write
|
||
52FBF000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
5C7FE000
|
stack
|
page read and write
|
||
5C93E000
|
stack
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
429BF000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
29B7E000
|
stack
|
page read and write
|
||
4317E000
|
stack
|
page read and write
|
||
F1A000
|
stack
|
page read and write
|
||
52EBE000
|
stack
|
page read and write
|
||
188FE000
|
stack
|
page read and write
|
||
54D3F000
|
stack
|
page read and write
|
||
2413F000
|
stack
|
page read and write
|
||
25B1000
|
trusted library allocation
|
page read and write
|
||
49DBE000
|
stack
|
page read and write
|
||
374FF000
|
stack
|
page read and write
|
||
169BF000
|
stack
|
page read and write
|
||
6D92F000
|
stack
|
page read and write
|
||
7E19E000
|
stack
|
page read and write
|
||
15D7E000
|
stack
|
page read and write
|
||
7C25E000
|
stack
|
page read and write
|
||
6BDEE000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
45D44000
|
unkown
|
page read and write
|
||
D18F000
|
stack
|
page read and write
|
||
4707F000
|
stack
|
page read and write
|
||
37DC000
|
stack
|
page read and write
|
||
1187F000
|
stack
|
page read and write
|
||
4797E000
|
stack
|
page read and write
|
||
4F9FF000
|
stack
|
page read and write
|
||
30DBF000
|
stack
|
page read and write
|
||
3E63F000
|
stack
|
page read and write
|
||
87CF000
|
stack
|
page read and write
|
||
202BF000
|
stack
|
page read and write
|
||
49D7F000
|
stack
|
page read and write
|
||
804F000
|
stack
|
page read and write
|
||
1606000
|
trusted library allocation
|
page execute and read and write
|
||
7F840000
|
trusted library allocation
|
page execute and read and write
|
||
3067E000
|
stack
|
page read and write
|
||
B14E000
|
stack
|
page read and write
|
||
7104F000
|
stack
|
page read and write
|
||
DF4F000
|
stack
|
page read and write
|
||
3E27F000
|
stack
|
page read and write
|
||
16D7F000
|
stack
|
page read and write
|
||
484BE000
|
stack
|
page read and write
|
||
7ECFF000
|
stack
|
page read and write
|
||
E5DD000
|
stack
|
page read and write
|
||
3B33E000
|
stack
|
page read and write
|
||
563FE000
|
stack
|
page read and write
|
||
85C7000
|
heap
|
page read and write
|
||
2E5BF000
|
stack
|
page read and write
|
||
3953E000
|
stack
|
page read and write
|
||
1373000
|
trusted library allocation
|
page execute and read and write
|
||
97D000
|
heap
|
page read and write
|
||
1493F000
|
stack
|
page read and write
|
||
7C4DE000
|
stack
|
page read and write
|
||
CC8F000
|
stack
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
60EBE000
|
stack
|
page read and write
|
||
A92E000
|
stack
|
page read and write
|
||
67C7F000
|
stack
|
page read and write
|
||
4BF7E000
|
stack
|
page read and write
|
||
2A07E000
|
stack
|
page read and write
|
||
133C000
|
stack
|
page read and write
|
||
F38E000
|
stack
|
page read and write
|
||
1DBFF000
|
stack
|
page read and write
|
||
4ACBE000
|
stack
|
page read and write
|
||
119BF000
|
stack
|
page read and write
|
||
3FA3F000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page execute and read and write
|
||
AFCF000
|
stack
|
page read and write
|
||
2FAE000
|
unkown
|
page read and write
|
||
6C1AE000
|
stack
|
page read and write
|
||
5843F000
|
stack
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
1D63F000
|
unkown
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4C7FF000
|
stack
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
325BE000
|
stack
|
page read and write
|
||
3D5FF000
|
stack
|
page read and write
|
||
2C07E000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
C7CE000
|
stack
|
page read and write
|
||
499BF000
|
stack
|
page read and write
|
||
686BE000
|
stack
|
page read and write
|
||
572FE000
|
stack
|
page read and write
|
||
424FE000
|
stack
|
page read and write
|
||
4D47F000
|
stack
|
page read and write
|
||
3767000
|
trusted library allocation
|
page read and write
|
||
1E37F000
|
stack
|
page read and write
|
||
349BF000
|
stack
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
573FF000
|
stack
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
452FF000
|
stack
|
page read and write
|
||
48ABF000
|
stack
|
page read and write
|
||
3DEBF000
|
stack
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
27FBF000
|
stack
|
page read and write
|
||
7270000
|
trusted library allocation
|
page execute and read and write
|
||
3177000
|
heap
|
page read and write
|
||
731E000
|
heap
|
page read and write
|
||
1612000
|
trusted library allocation
|
page read and write
|
||
3E3BF000
|
stack
|
page read and write
|
||
5663F000
|
stack
|
page read and write
|
||
225BF000
|
stack
|
page read and write
|
||
53FBE000
|
stack
|
page read and write
|
||
8ED000
|
stack
|
page read and write
|
||
393FE000
|
stack
|
page read and write
|
||
44A7E000
|
stack
|
page read and write
|
||
74EEF000
|
stack
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
62EFF000
|
stack
|
page read and write
|
||
8B3C000
|
heap
|
page read and write
|
||
6C7AF000
|
stack
|
page read and write
|
||
226FF000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
563BF000
|
stack
|
page read and write
|
||
7E7DE000
|
stack
|
page read and write
|
||
47A7F000
|
stack
|
page read and write
|
||
A0CF000
|
stack
|
page read and write
|
||
6AC6E000
|
stack
|
page read and write
|
||
32ABE000
|
stack
|
page read and write
|
||
39EFF000
|
stack
|
page read and write
|
||
234FE000
|
stack
|
page read and write
|
||
24DBF000
|
stack
|
page read and write
|
||
45DE6000
|
unkown
|
page read and write
|
||
7B71E000
|
stack
|
page read and write
|
||
4B53F000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
27D7E000
|
stack
|
page read and write
|
||
26A7F000
|
stack
|
page read and write
|
||
6763F000
|
stack
|
page read and write
|
||
2DCFF000
|
stack
|
page read and write
|
||
5A23F000
|
stack
|
page read and write
|
||
5447F000
|
stack
|
page read and write
|
||
515BE000
|
stack
|
page read and write
|
||
5656000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
2CF7E000
|
stack
|
page read and write
|
||
7D9DF000
|
stack
|
page read and write
|
||
12A3E000
|
stack
|
page read and write
|
||
1623F000
|
stack
|
page read and write
|
||
4277E000
|
stack
|
page read and write
|
||
7D61F000
|
stack
|
page read and write
|
||
1827000
|
heap
|
page read and write
|
||
2B4FF000
|
stack
|
page read and write
|
||
4E0FF000
|
stack
|
page read and write
|
||
998E000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
155FE000
|
stack
|
page read and write
|
||
5A37F000
|
stack
|
page read and write
|
||
7AD1E000
|
stack
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
E80F000
|
stack
|
page read and write
|
||
40F0000
|
trusted library allocation
|
page read and write
|
||
18A3E000
|
stack
|
page read and write
|
||
5233F000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
35C7F000
|
stack
|
page read and write
|
||
230FF000
|
stack
|
page read and write
|
||
27D3F000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
520FE000
|
stack
|
page read and write
|
||
354FF000
|
stack
|
page read and write
|
||
D54F000
|
stack
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
4738000
|
trusted library allocation
|
page read and write
|
||
14E3F000
|
stack
|
page read and write
|
||
65BFF000
|
stack
|
page read and write
|
||
3E67E000
|
stack
|
page read and write
|
||
6B4EF000
|
stack
|
page read and write
|
||
15ABF000
|
stack
|
page read and write
|
||
74C7E000
|
stack
|
page read and write
|
||
235FF000
|
stack
|
page read and write
|
||
45BBF000
|
stack
|
page read and write
|
||
3003E000
|
stack
|
page read and write
|
||
6B12F000
|
stack
|
page read and write
|
||
37CBE000
|
stack
|
page read and write
|
||
586FE000
|
stack
|
page read and write
|
||
6317F000
|
stack
|
page read and write
|
||
7AA9E000
|
stack
|
page read and write
|
||
4C0BE000
|
stack
|
page read and write
|
||
1483E000
|
stack
|
page read and write
|
||
554BF000
|
stack
|
page read and write
|
||
4DFFE000
|
stack
|
page read and write
|
||
45D77000
|
unkown
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
E9BE000
|
stack
|
page read and write
|
||
40E3F000
|
stack
|
page read and write
|
||
5B53E000
|
stack
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
1157000
|
stack
|
page read and write
|
||
4C2FF000
|
stack
|
page read and write
|
||
4C90000
|
trusted library section
|
page readonly
|
||
44A3F000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
4403F000
|
stack
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
909000
|
stack
|
page read and write
|
||
58F7F000
|
stack
|
page read and write
|
||
FD4F000
|
stack
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
7238E000
|
stack
|
page read and write
|
||
25CBF000
|
stack
|
page read and write
|
||
4E5FF000
|
stack
|
page read and write
|
||
83A000
|
stack
|
page read and write
|
||
5AEFE000
|
stack
|
page read and write
|
||
78DDE000
|
stack
|
page read and write
|
||
77DA0000
|
heap
|
page read and write
|
||
3CF000
|
stack
|
page read and write
|
||
7140F000
|
stack
|
page read and write
|
||
7FCCF000
|
stack
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
359FF000
|
stack
|
page read and write
|
||
78A1E000
|
stack
|
page read and write
|
||
E84E000
|
stack
|
page read and write
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
3266000
|
heap
|
page read and write
|
||
70DCF000
|
stack
|
page read and write
|
||
1F53E000
|
stack
|
page read and write
|
||
5985000
|
heap
|
page read and write
|
||
5B13F000
|
stack
|
page read and write
|
||
279BE000
|
stack
|
page read and write
|
||
4C5BE000
|
stack
|
page read and write
|
||
6CDEF000
|
stack
|
page read and write
|
||
5653E000
|
stack
|
page read and write
|
||
59AFE000
|
stack
|
page read and write
|
||
4FDBF000
|
stack
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
3AF3F000
|
stack
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page execute and read and write
|
||
3200000
|
heap
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
4CE7E000
|
stack
|
page read and write
|
||
679FF000
|
stack
|
page read and write
|
||
54ABF000
|
stack
|
page read and write
|
||
2F9FE000
|
stack
|
page read and write
|
||
3FF3F000
|
stack
|
page read and write
|
||
5D33E000
|
stack
|
page read and write
|
||
41FFE000
|
stack
|
page read and write
|
||
7A05F000
|
stack
|
page read and write
|
||
A63E000
|
stack
|
page read and write
|
||
6853F000
|
stack
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
2F73F000
|
stack
|
page read and write
|
||
6C66F000
|
stack
|
page read and write
|
||
66C3F000
|
stack
|
page read and write
|
||
655BF000
|
stack
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
6A26E000
|
stack
|
page read and write
|
||
18080000
|
heap
|
page read and write
|
||
52AFE000
|
stack
|
page read and write
|
||
3963F000
|
stack
|
page read and write
|
||
7769000
|
trusted library allocation
|
page read and write
|
||
5847E000
|
stack
|
page read and write
|
||
7338F000
|
stack
|
page read and write
|
||
45DBC000
|
unkown
|
page read and write
|
||
45D74000
|
unkown
|
page read and write
|
||
233BE000
|
stack
|
page read and write
|
||
6D32E000
|
stack
|
page read and write
|
||
7502F000
|
stack
|
page read and write
|
||
3FCFE000
|
stack
|
page read and write
|
||
2977F000
|
stack
|
page read and write
|
||
4CB000
|
stack
|
page read and write
|
||
67B7E000
|
stack
|
page read and write
|
||
D7CF000
|
stack
|
page read and write
|
||
3257F000
|
stack
|
page read and write
|
||
1F7BE000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page execute and read and write
|
||
419BE000
|
stack
|
page read and write
|
||
3BF7F000
|
stack
|
page read and write
|
||
353FE000
|
stack
|
page read and write
|
||
3C23E000
|
stack
|
page read and write
|
||
4327F000
|
stack
|
page read and write
|
||
554FE000
|
stack
|
page read and write
|
||
1C13E000
|
stack
|
page read and write
|
||
1E4BF000
|
stack
|
page read and write
|
||
364BF000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
74B3E000
|
stack
|
page read and write
|
||
6753E000
|
stack
|
page read and write
|
||
5397E000
|
stack
|
page read and write
|
||
24F3E000
|
stack
|
page read and write
|
||
695EE000
|
stack
|
page read and write
|
||
3D73F000
|
stack
|
page read and write
|
||
840F000
|
stack
|
page read and write
|
||
27BFF000
|
stack
|
page read and write
|
||
55E0000
|
heap
|
page execute and read and write
|
||
5BA3E000
|
stack
|
page read and write
|
||
25F3F000
|
stack
|
page read and write
|
||
3103F000
|
stack
|
page read and write
|
||
63DFF000
|
stack
|
page read and write
|
||
2067F000
|
stack
|
page read and write
|
||
2F8BE000
|
stack
|
page read and write
|
||
1A6FE000
|
stack
|
page read and write
|
||
614BF000
|
unkown
|
page read and write
|
||
30CBE000
|
stack
|
page read and write
|
||
57CFE000
|
stack
|
page read and write
|
||
2C67F000
|
stack
|
page read and write
|
||
3C87E000
|
stack
|
page read and write
|
||
5DE3F000
|
stack
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
5B27F000
|
stack
|
page read and write
|
||
3D8BE000
|
stack
|
page read and write
|
||
1367F000
|
stack
|
page read and write
|
||
F0CF000
|
stack
|
page read and write
|
||
9086000
|
heap
|
page read and write
|
||
2C03F000
|
stack
|
page read and write
|
||
3B1FE000
|
stack
|
page read and write
|
||
43AC000
|
unclassified section
|
page execute and read and write
|
||
3D9BF000
|
stack
|
page read and write
|
||
274BE000
|
stack
|
page read and write
|
||
309FF000
|
stack
|
page read and write
|
||
35DCC000
|
heap
|
page read and write
|
||
2837F000
|
stack
|
page read and write
|
||
4F3BF000
|
stack
|
page read and write
|
||
6483E000
|
stack
|
page read and write
|
||
45DDD000
|
unkown
|
page read and write
|
||
1863F000
|
stack
|
page read and write
|
||
2057E000
|
stack
|
page read and write
|
||
1613E000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
3027F000
|
stack
|
page read and write
|
||
586BF000
|
stack
|
page read and write
|
||
4B8FF000
|
stack
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
3BCFF000
|
stack
|
page read and write
|
||
179FF000
|
stack
|
page read and write
|
||
6663E000
|
stack
|
page read and write
|
||
38FFF000
|
unkown
|
page read and write
|
||
477FF000
|
stack
|
page read and write
|
||
EE7E000
|
stack
|
page read and write
|
||
25A7E000
|
stack
|
page read and write
|
||
4603F000
|
stack
|
page read and write
|
||
392BE000
|
stack
|
page read and write
|
||
B74F000
|
stack
|
page read and write
|
||
569FF000
|
stack
|
page read and write
|
||
2917E000
|
stack
|
page read and write
|
||
6ADAE000
|
stack
|
page read and write
|
||
3C9BE000
|
stack
|
page read and write
|
||
149D000
|
trusted library allocation
|
page execute and read and write
|
||
F42F000
|
stack
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
215BE000
|
stack
|
page read and write
|
||
321FE000
|
stack
|
page read and write
|
||
3EF3E000
|
stack
|
page read and write
|
||
5D07F000
|
stack
|
page read and write
|
||
6AD6F000
|
stack
|
page read and write
|
||
3553E000
|
stack
|
page read and write
|
||
1F9FF000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
344BF000
|
stack
|
page read and write
|
||
42B3E000
|
stack
|
page read and write
|
||
B3CE000
|
stack
|
page read and write
|
||
7260E000
|
stack
|
page read and write
|
||
1493000
|
trusted library allocation
|
page read and write
|
||
249FF000
|
stack
|
page read and write
|
||
5B8BF000
|
stack
|
page read and write
|
||
5C6BE000
|
stack
|
page read and write
|
||
38AFF000
|
stack
|
page read and write
|
||
146BF000
|
stack
|
page read and write
|
||
38D7F000
|
stack
|
page read and write
|
||
CDCF000
|
stack
|
page read and write
|
||
5C7BF000
|
stack
|
page read and write
|
||
1393E000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
45D98000
|
unkown
|
page read and write
|
||
69BF000
|
stack
|
page read and write
|
||
5753F000
|
stack
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
6C3F000
|
stack
|
page read and write
|
||
313FF000
|
stack
|
page read and write
|
||
6F5BE000
|
stack
|
page read and write
|
||
79B9E000
|
stack
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
4F63F000
|
stack
|
page read and write
|
||
1AFBE000
|
stack
|
page read and write
|
||
F70F000
|
stack
|
page read and write
|
||
66AFF000
|
stack
|
page read and write
|
||
1637F000
|
stack
|
page read and write
|
||
4D8C000
|
stack
|
page read and write
|
||
131BE000
|
stack
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2A4D000
|
heap
|
page read and write
|
||
3807E000
|
stack
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
2D0BE000
|
stack
|
page read and write
|
||
3243F000
|
stack
|
page read and write
|
||
1827F000
|
stack
|
page read and write
|
||
3D0FF000
|
stack
|
page read and write
|
||
57F7E000
|
stack
|
page read and write
|
||
6D5AE000
|
stack
|
page read and write
|
||
5D93F000
|
stack
|
page read and write
|
||
118BE000
|
stack
|
page read and write
|
||
90CE000
|
stack
|
page read and write
|
||
1BABF000
|
stack
|
page read and write
|
||
D40F000
|
stack
|
page read and write
|
||
759EE000
|
stack
|
page read and write
|
||
62B7E000
|
stack
|
page read and write
|
||
5D43F000
|
stack
|
page read and write
|
||
437BE000
|
stack
|
page read and write
|
||
178FE000
|
stack
|
page read and write
|
||
3F43E000
|
stack
|
page read and write
|
||
3637F000
|
stack
|
page read and write
|
||
3B07F000
|
stack
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4AEFF000
|
stack
|
page read and write
|
||
E1CF000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
3DAFF000
|
stack
|
page read and write
|
||
382BF000
|
stack
|
page read and write
|
||
3C5BF000
|
stack
|
page read and write
|
||
749BF000
|
stack
|
page read and write
|
||
59BFF000
|
stack
|
page read and write
|
||
17A3E000
|
stack
|
page read and write
|
||
1ACFF000
|
stack
|
page read and write
|
||
4F67E000
|
stack
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
503FF000
|
stack
|
page read and write
|
||
4AA3E000
|
stack
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
2AA3F000
|
stack
|
page read and write
|
||
F940000
|
heap
|
page read and write
|
||
6307E000
|
stack
|
page read and write
|
||
2A43E000
|
stack
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
2DBBF000
|
stack
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
45DFE000
|
unkown
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
44B7F000
|
stack
|
page read and write
|
||
7408F000
|
stack
|
page read and write
|
||
704AD000
|
unkown
|
page read and write
|
||
798DF000
|
stack
|
page read and write
|
||
26F7F000
|
stack
|
page read and write
|
||
4CF7F000
|
stack
|
page read and write
|
||
13F3F000
|
stack
|
page read and write
|
||
45BFE000
|
stack
|
page read and write
|
||
7DDDE000
|
stack
|
page read and write
|
||
4D37E000
|
stack
|
page read and write
|
||
516BF000
|
stack
|
page read and write
|
||
39F3E000
|
stack
|
page read and write
|
||
7DCF000
|
stack
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
4FB3F000
|
stack
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
716CE000
|
stack
|
page read and write
|
||
3C97F000
|
stack
|
page read and write
|
||
DA8E000
|
stack
|
page read and write
|
||
E08F000
|
stack
|
page read and write
|
||
8FF000
|
heap
|
page read and write
|
||
6C8EF000
|
stack
|
page read and write
|
||
4F53E000
|
stack
|
page read and write
|
||
4963E000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
57B7F000
|
stack
|
page read and write
|
||
5F77E000
|
stack
|
page read and write
|
||
2967E000
|
stack
|
page read and write
|
||
326FE000
|
stack
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
2FFFF000
|
stack
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
6FE1F000
|
stack
|
page read and write
|
||
309D000
|
stack
|
page read and write
|
||
16EFE000
|
stack
|
page read and write
|
||
2387F000
|
stack
|
page read and write
|
||
6CF2F000
|
stack
|
page read and write
|
||
45D5F000
|
unkown
|
page read and write
|
||
327F000
|
heap
|
page read and write
|
||
5297F000
|
stack
|
page read and write
|
||
61AFF000
|
stack
|
page read and write
|
||
398FE000
|
stack
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
4C6FE000
|
stack
|
page read and write
|
||
4263E000
|
stack
|
page read and write
|
||
4D73E000
|
stack
|
page read and write
|
||
1D7FE000
|
unkown
|
page read and write
|
||
514C000
|
stack
|
page read and write
|
||
129FF000
|
stack
|
page read and write
|
||
4B6BE000
|
stack
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
345FF000
|
stack
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
24EFF000
|
stack
|
page read and write
|
||
7900000
|
trusted library allocation
|
page execute and read and write
|
||
3247E000
|
stack
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
7E99E000
|
stack
|
page read and write
|
||
360FF000
|
stack
|
page read and write
|
||
259B000
|
trusted library allocation
|
page read and write
|
||
6D7F000
|
stack
|
page read and write
|
||
138FF000
|
stack
|
page read and write
|
||
24CBE000
|
stack
|
page read and write
|
||
18B0000
|
trusted library allocation
|
page read and write
|
||
59E7F000
|
stack
|
page read and write
|
||
792DE000
|
stack
|
page read and write
|
||
70490000
|
unkown
|
page readonly
|
||
37DFE000
|
stack
|
page read and write
|
||
7144E000
|
stack
|
page read and write
|
||
1C3BE000
|
stack
|
page read and write
|
||
6817F000
|
stack
|
page read and write
|
||
3477E000
|
stack
|
page read and write
|
||
7A69F000
|
stack
|
page read and write
|
||
F84F000
|
stack
|
page read and write
|
||
2157F000
|
stack
|
page read and write
|
||
2783F000
|
stack
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
553BE000
|
stack
|
page read and write
|
||
1B37E000
|
stack
|
page read and write
|
||
5433F000
|
stack
|
page read and write
|
||
16FFF000
|
stack
|
page read and write
|
||
7BE5F000
|
stack
|
page read and write
|
||
56A3E000
|
stack
|
page read and write
|
||
4070000
|
trusted library allocation
|
page read and write
|
||
4607E000
|
stack
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
545FE000
|
stack
|
page read and write
|
||
7941E000
|
stack
|
page read and write
|
||
53E3F000
|
stack
|
page read and write
|
||
1811D000
|
heap
|
page read and write
|
||
6BA2E000
|
stack
|
page read and write
|
||
6AAEF000
|
stack
|
page read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
24B3F000
|
stack
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
51A7F000
|
stack
|
page read and write
|
||
5C2FE000
|
stack
|
page read and write
|
||
6713F000
|
stack
|
page read and write
|
||
1CDBE000
|
stack
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
45DD7000
|
unkown
|
page read and write
|
||
3517E000
|
stack
|
page read and write
|
||
78C5F000
|
stack
|
page read and write
|
||
6F33E000
|
stack
|
page read and write
|
||
7DB5E000
|
stack
|
page read and write
|
||
2337F000
|
stack
|
page read and write
|
||
46F7E000
|
stack
|
page read and write
|
||
410FE000
|
stack
|
page read and write
|
||
A30D000
|
stack
|
page read and write
|
||
61B3E000
|
stack
|
page read and write
|
||
3B7FF000
|
stack
|
page read and write
|
||
4507F000
|
stack
|
page read and write
|
||
3F7FE000
|
stack
|
page read and write
|
||
6ECFE000
|
stack
|
page read and write
|
||
7D75F000
|
stack
|
page read and write
|
||
970E000
|
stack
|
page read and write
|
||
5B20000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
5043E000
|
stack
|
page read and write
|
||
63CBF000
|
stack
|
page read and write
|
||
5587F000
|
stack
|
page read and write
|
||
457FF000
|
stack
|
page read and write
|
||
521B000
|
stack
|
page read and write
|
||
4A2BE000
|
stack
|
page read and write
|
||
29EFF000
|
stack
|
page read and write
|
||
2EBFF000
|
stack
|
page read and write
|
||
EB90000
|
trusted library allocation
|
page read and write
|
||
614FE000
|
stack
|
page read and write
|
||
73C8E000
|
stack
|
page read and write
|
||
656FF000
|
stack
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
16B3E000
|
stack
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
7A09E000
|
stack
|
page read and write
|
||
3C6FF000
|
stack
|
page read and write
|
||
15D3F000
|
stack
|
page read and write
|
||
1BBFF000
|
stack
|
page read and write
|
||
7951F000
|
stack
|
page read and write
|
||
61FFF000
|
stack
|
page read and write
|
||
14A2000
|
trusted library allocation
|
page read and write
|
||
2D5B000
|
heap
|
page read and write
|
||
564FF000
|
stack
|
page read and write
|
||
E87B000
|
stack
|
page read and write
|
||
4C07F000
|
stack
|
page read and write
|
||
610FF000
|
stack
|
page read and write
|
||
5B2BE000
|
stack
|
page read and write
|
||
F10E000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
69AEE000
|
stack
|
page read and write
|
||
3E8FE000
|
stack
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
6277F000
|
stack
|
page read and write
|
||
6EB7F000
|
stack
|
page read and write
|
||
82CF000
|
stack
|
page read and write
|
||
A5F000
|
heap
|
page read and write
|
||
42D7F000
|
stack
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4597E000
|
stack
|
page read and write
|
||
3753E000
|
stack
|
page read and write
|
||
EE3E000
|
stack
|
page read and write
|
||
48EBE000
|
stack
|
page read and write
|
||
5A63E000
|
stack
|
page read and write
|
||
7C71F000
|
stack
|
page read and write
|
||
4E9FE000
|
stack
|
page read and write
|
||
4187E000
|
stack
|
page read and write
|
||
312FE000
|
stack
|
page read and write
|
||
45D59000
|
unkown
|
page read and write
|
||
5EFFE000
|
stack
|
page read and write
|
||
1523E000
|
stack
|
page read and write
|
||
E3B15DF000
|
stack
|
page read and write
|
||
5323F000
|
stack
|
page read and write
|
||
50D8000
|
trusted library allocation
|
page read and write
|
||
7E51F000
|
stack
|
page read and write
|
||
5473E000
|
stack
|
page read and write
|
||
72ACF000
|
stack
|
page read and write
|
||
46E3E000
|
stack
|
page read and write
|
||
2247F000
|
stack
|
page read and write
|
||
6936E000
|
stack
|
page read and write
|
||
51BBF000
|
stack
|
page read and write
|
||
7512E000
|
stack
|
page read and write
|
||
2927F000
|
stack
|
page read and write
|
||
6063F000
|
stack
|
page read and write
|
||
7B81F000
|
stack
|
page read and write
|
||
6C6AE000
|
stack
|
page read and write
|
||
44F3F000
|
stack
|
page read and write
|
||
A4CE000
|
stack
|
page read and write
|
||
4543F000
|
stack
|
page read and write
|
||
433FE000
|
stack
|
page read and write
|
||
5980000
|
heap
|
page read and write
|
||
1907E000
|
stack
|
page read and write
|
||
339BE000
|
stack
|
page read and write
|
||
704AD000
|
unkown
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
1263F000
|
stack
|
page read and write
|
||
3701000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
6B2000
|
system
|
page execute and read and write
|
||
3C83F000
|
stack
|
page read and write
|
||
4D6FF000
|
stack
|
page read and write
|
||
6D0AE000
|
stack
|
page read and write
|
||
1E73F000
|
stack
|
page read and write
|
||
21ABE000
|
stack
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
66DBE000
|
stack
|
page read and write
|
||
6D1EE000
|
stack
|
page read and write
|
||
F4BE000
|
stack
|
page read and write
|
||
585BE000
|
stack
|
page read and write
|
||
12B3F000
|
stack
|
page read and write
|
||
8E0F000
|
stack
|
page read and write
|
||
618BE000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
540BF000
|
stack
|
page read and write
|
||
2043E000
|
stack
|
page read and write
|
||
47CFF000
|
stack
|
page read and write
|
||
29DFE000
|
stack
|
page read and write
|
||
5F73F000
|
stack
|
page read and write
|
||
578FF000
|
stack
|
page read and write
|
||
568BF000
|
stack
|
page read and write
|
||
45DF2000
|
unkown
|
page read and write
|
||
6B66E000
|
stack
|
page read and write
|
||
B4CD000
|
stack
|
page read and write
|
||
1AE3F000
|
stack
|
page read and write
|
||
2327E000
|
stack
|
page read and write
|
||
627E000
|
stack
|
page read and write
|
||
DE4E000
|
stack
|
page read and write
|
||
238BE000
|
stack
|
page read and write
|
||
1F4FF000
|
stack
|
page read and write
|
||
B60F000
|
stack
|
page read and write
|
||
244FF000
|
stack
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
C00F000
|
stack
|
page read and write
|
||
3193E000
|
stack
|
page read and write
|
||
349FE000
|
stack
|
page read and write
|
||
8D6000
|
trusted library allocation
|
page execute and read and write
|
||
5183E000
|
stack
|
page read and write
|
||
3BE7E000
|
stack
|
page read and write
|
||
724CE000
|
stack
|
page read and write
|
||
33AFE000
|
stack
|
page read and write
|
||
5B03E000
|
stack
|
page read and write
|
||
637F000
|
stack
|
page read and write
|
||
4F8FE000
|
stack
|
page read and write
|
||
5757E000
|
stack
|
page read and write
|
||
24DFE000
|
stack
|
page read and write
|
||
45DD4000
|
unkown
|
page read and write
|
||
73CCE000
|
stack
|
page read and write
|
||
79F1F000
|
stack
|
page read and write
|
||
57BBE000
|
stack
|
page read and write
|
||
2BDFE000
|
stack
|
page read and write
|
||
5EE7F000
|
stack
|
page read and write
|
||
4B17F000
|
stack
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
4223F000
|
stack
|
page read and write
|
||
D08E000
|
stack
|
page read and write
|
||
D1CE000
|
stack
|
page read and write
|
||
5E47F000
|
stack
|
page read and write
|
||
128D000
|
heap
|
page read and write
|
||
D80E000
|
stack
|
page read and write
|
||
926E000
|
stack
|
page read and write
|
||
3301000
|
heap
|
page read and write
|
||
63F7E000
|
stack
|
page read and write
|
||
4927E000
|
stack
|
page read and write
|
||
196BE000
|
stack
|
page read and write
|
||
6CE2E000
|
stack
|
page read and write
|
||
2D1BF000
|
stack
|
page read and write
|
||
55EFE000
|
stack
|
page read and write
|
||
1B47F000
|
stack
|
page read and write
|
||
A8EF000
|
stack
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
5D1FE000
|
stack
|
page read and write
|
||
54E7F000
|
stack
|
page read and write
|
||
43DFE000
|
stack
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
57DFF000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
3E77F000
|
stack
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
856E000
|
stack
|
page read and write
|
||
7E9DE000
|
stack
|
page read and write
|
||
5FEFE000
|
stack
|
page read and write
|
||
4BF3F000
|
stack
|
page read and write
|
||
33D7E000
|
stack
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
20CBF000
|
stack
|
page read and write
|
||
6FF5E000
|
stack
|
page read and write
|
||
4F13F000
|
stack
|
page read and write
|
||
6FFF000
|
stack
|
page read and write
|
||
137D000
|
trusted library allocation
|
page execute and read and write
|
||
3CEBE000
|
stack
|
page read and write
|
||
5CDFF000
|
stack
|
page read and write
|
||
7641E000
|
stack
|
page read and write
|
||
9E4F000
|
stack
|
page read and write
|
||
5B3FE000
|
stack
|
page read and write
|
||
6C06E000
|
stack
|
page read and write
|
||
2ED7E000
|
stack
|
page read and write
|
||
4E9BF000
|
stack
|
page read and write
|
||
61C7E000
|
stack
|
page read and write
|
||
7378E000
|
stack
|
page read and write
|
||
9ACE000
|
stack
|
page read and write
|
||
1CB3E000
|
stack
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
5806000
|
trusted library section
|
page readonly
|
||
29FD000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page execute and read and write
|
||
5157F000
|
stack
|
page read and write
|
||
405BE000
|
stack
|
page read and write
|
||
7849F000
|
stack
|
page read and write
|
||
316BE000
|
stack
|
page read and write
|
||
29CBE000
|
stack
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
5B17E000
|
stack
|
page read and write
|
||
597F000
|
stack
|
page read and write
|
||
2BDA000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page execute and read and write
|
||
4CA7F000
|
stack
|
page read and write
|
||
7EEFF000
|
stack
|
page read and write
|
||
2D47E000
|
stack
|
page read and write
|
||
243FE000
|
stack
|
page read and write
|
||
48FFE000
|
stack
|
page read and write
|
||
50CBF000
|
stack
|
page read and write
|
||
E58F000
|
stack
|
page read and write
|
||
1E23F000
|
stack
|
page read and write
|
||
582FF000
|
stack
|
page read and write
|
||
225FE000
|
stack
|
page read and write
|
||
5093E000
|
stack
|
page read and write
|
||
EF7E000
|
stack
|
page read and write
|
||
544BE000
|
stack
|
page read and write
|
||
9CD000
|
heap
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
5437E000
|
stack
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
FC0F000
|
stack
|
page read and write
|
||
26CFF000
|
stack
|
page read and write
|
||
5E5FE000
|
stack
|
page read and write
|
||
5340000
|
trusted library allocation
|
page execute and read and write
|
||
2C2FE000
|
stack
|
page read and write
|
||
41BFF000
|
stack
|
page read and write
|
||
E7E000
|
unkown
|
page readonly
|
||
45DC8000
|
unkown
|
page read and write
|
||
78BF000
|
stack
|
page read and write
|
||
14D3E000
|
stack
|
page read and write
|
||
211FE000
|
stack
|
page read and write
|
||
40A7F000
|
stack
|
page read and write
|
||
596FF000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
59EBE000
|
stack
|
page read and write
|
||
4B07E000
|
stack
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
5AC3F000
|
stack
|
page read and write
|
||
312BF000
|
stack
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
65D3F000
|
stack
|
page read and write
|
||
4E87F000
|
stack
|
page read and write
|
||
687BF000
|
stack
|
page read and write
|
||
66EFE000
|
stack
|
page read and write
|
||
1724000
|
trusted library allocation
|
page read and write
|
||
1CC3F000
|
stack
|
page read and write
|
||
4E8BE000
|
stack
|
page read and write
|
||
66C7E000
|
stack
|
page read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
1E8BE000
|
stack
|
page read and write
|
||
45D68000
|
unkown
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
14B7000
|
trusted library allocation
|
page execute and read and write
|
||
159BE000
|
stack
|
page read and write
|
||
536FF000
|
stack
|
page read and write
|
||
47E3F000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page readonly
|
||
4873E000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
501BE000
|
stack
|
page read and write
|
||
1177E000
|
stack
|
page read and write
|
||
1C23F000
|
stack
|
page read and write
|
||
AECE000
|
stack
|
page read and write
|
||
2E6FF000
|
stack
|
page read and write
|
||
58F0000
|
heap
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
1726000
|
trusted library allocation
|
page read and write
|
||
1A33E000
|
stack
|
page read and write
|
||
3BD3E000
|
stack
|
page read and write
|
||
2C8C000
|
stack
|
page read and write
|
||
678BF000
|
stack
|
page read and write
|
||
41ABF000
|
stack
|
page read and write
|
||
6357E000
|
stack
|
page read and write
|
||
372BE000
|
stack
|
page read and write
|
||
704AD000
|
unkown
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
6303F000
|
stack
|
page read and write
|
||
4AB7E000
|
stack
|
page read and write
|
||
45DC5000
|
unkown
|
page read and write
|
||
5CE3E000
|
stack
|
page read and write
|
||
63A000
|
stack
|
page read and write
|
||
7C39E000
|
stack
|
page read and write
|
||
61D7F000
|
stack
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
7A2DF000
|
stack
|
page read and write
|
||
7D29E000
|
stack
|
page read and write
|
||
4CCFF000
|
stack
|
page read and write
|
||
6027F000
|
stack
|
page read and write
|
||
1903F000
|
stack
|
page read and write
|
||
2BDBF000
|
stack
|
page read and write
|
||
13CBF000
|
stack
|
page read and write
|
||
303FE000
|
stack
|
page read and write
|
||
21FBE000
|
stack
|
page read and write
|
||
9D3000
|
heap
|
page read and write
|
||
2B3A000
|
trusted library allocation
|
page read and write
|
||
2F5FF000
|
stack
|
page read and write
|
||
7769E000
|
stack
|
page read and write
|
||
4617F000
|
stack
|
page read and write
|
||
216BF000
|
stack
|
page read and write
|
||
677BE000
|
stack
|
page read and write
|
||
D6F000
|
unkown
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
30E7000
|
trusted library allocation
|
page read and write
|
||
5CF7E000
|
stack
|
page read and write
|
||
4823E000
|
stack
|
page read and write
|
||
7BA9F000
|
stack
|
page read and write
|
||
2223E000
|
stack
|
page read and write
|
||
150FE000
|
stack
|
page read and write
|
||
14CFF000
|
stack
|
page read and write
|
||
ED4E000
|
stack
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
5E0FE000
|
stack
|
page read and write
|
||
481FF000
|
stack
|
page read and write
|
||
2D33E000
|
stack
|
page read and write
|
||
299FF000
|
stack
|
page read and write
|
||
F98F000
|
stack
|
page read and write
|
||
577BF000
|
stack
|
page read and write
|
||
4977E000
|
stack
|
page read and write
|
||
E6CF000
|
stack
|
page read and write
|
||
4B57E000
|
stack
|
page read and write
|
||
2197E000
|
stack
|
page read and write
|
||
5DABE000
|
stack
|
page read and write
|
||
594BE000
|
stack
|
page read and write
|
||
5CB000
|
stack
|
page read and write
|
||
6F2FF000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2463F000
|
stack
|
page read and write
|
||
537F000
|
stack
|
page read and write
|
||
629FF000
|
stack
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
45DB0000
|
unkown
|
page read and write
|
||
1F17E000
|
stack
|
page read and write
|
||
36C3F000
|
stack
|
page read and write
|
||
63A3F000
|
stack
|
page read and write
|
||
34AFF000
|
stack
|
page read and write
|
||
5D6BF000
|
stack
|
page read and write
|
||
1B97F000
|
stack
|
page read and write
|
||
5603000
|
heap
|
page read and write
|
||
2693F000
|
stack
|
page read and write
|
||
25AE000
|
trusted library allocation
|
page read and write
|
||
B10F000
|
stack
|
page read and write
|
||
5383E000
|
stack
|
page read and write
|
||
2287E000
|
stack
|
page read and write
|
||
C14F000
|
stack
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page execute and read and write
|
||
6E7BF000
|
stack
|
page read and write
|
||
D68F000
|
stack
|
page read and write
|
||
44CBF000
|
stack
|
page read and write
|
||
6D06F000
|
stack
|
page read and write
|
||
45D38000
|
unkown
|
page read and write
|
||
6D6AF000
|
stack
|
page read and write
|
||
5540000
|
heap
|
page execute and read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
56E2000
|
trusted library allocation
|
page read and write
|
||
5D1BF000
|
stack
|
page read and write
|
||
8B8F000
|
stack
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
3F53F000
|
stack
|
page read and write
|
||
33A2000
|
trusted library allocation
|
page read and write
|
||
4051000
|
trusted library allocation
|
page read and write
|
||
7B1DF000
|
stack
|
page read and write
|
||
22D7E000
|
stack
|
page read and write
|
||
5E1FF000
|
stack
|
page read and write
|
||
5B8FE000
|
stack
|
page read and write
|
||
2E23E000
|
stack
|
page read and write
|
||
7FBCE000
|
stack
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
19A3F000
|
stack
|
page read and write
|
||
5983F000
|
stack
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
2FD7F000
|
stack
|
page read and write
|
||
34D7F000
|
stack
|
page read and write
|
||
64E3F000
|
stack
|
page read and write
|
||
2A47000
|
heap
|
page read and write
|
||
1FDFE000
|
stack
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
128FE000
|
stack
|
page read and write
|
||
62F3E000
|
stack
|
page read and write
|
||
96CF000
|
stack
|
page read and write
|
||
577FE000
|
stack
|
page read and write
|
||
11C7E000
|
stack
|
page read and write
|
||
2B27F000
|
stack
|
page read and write
|
||
64D3E000
|
stack
|
page read and write
|
||
30DFE000
|
stack
|
page read and write
|
||
40E7E000
|
stack
|
page read and write
|
||
4AC7F000
|
stack
|
page read and write
|
||
6B9EF000
|
stack
|
page read and write
|
||
168BE000
|
stack
|
page read and write
|
||
41EBE000
|
stack
|
page read and write
|
||
2A2FE000
|
stack
|
page read and write
|
||
920E000
|
stack
|
page read and write
|
||
137BF000
|
stack
|
page read and write
|
||
1D03E000
|
stack
|
page read and write
|
||
1073E000
|
stack
|
page read and write
|
||
128BF000
|
stack
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page execute and read and write
|
||
335FE000
|
stack
|
page read and write
|
||
16AFF000
|
stack
|
page read and write
|
||
3F57E000
|
stack
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
68B7F000
|
stack
|
page read and write
|
||
9C0E000
|
stack
|
page read and write
|
||
62C7F000
|
stack
|
page read and write
|
||
A84F000
|
stack
|
page read and write
|
||
4C97E000
|
stack
|
page read and write
|
||
79F5E000
|
stack
|
page read and write
|
||
5FB3E000
|
stack
|
page read and write
|
||
2903E000
|
stack
|
page read and write
|
||
5A3BE000
|
stack
|
page read and write
|
||
6C3EF000
|
stack
|
page read and write
|
||
4A8BF000
|
stack
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
5C57E000
|
stack
|
page read and write
|
||
34EFE000
|
stack
|
page read and write
|
||
2787E000
|
stack
|
page read and write
|
||
28EFE000
|
stack
|
page read and write
|
||
26BFE000
|
stack
|
page read and write
|
||
77C9F000
|
stack
|
page read and write
|
||
142FF000
|
stack
|
page read and write
|
||
6B7AE000
|
stack
|
page read and write
|
||
63A000
|
stack
|
page read and write
|
||
2CA3F000
|
stack
|
page read and write
|
||
220FE000
|
stack
|
page read and write
|
||
4F4FF000
|
stack
|
page read and write
|
||
3DD7F000
|
stack
|
page read and write
|
||
7F94E000
|
stack
|
page read and write
|
||
5FC7E000
|
stack
|
page read and write
|
||
5E33F000
|
stack
|
page read and write
|
||
45DF5000
|
unkown
|
page read and write
|
||
5BB7E000
|
stack
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
289FE000
|
stack
|
page read and write
|
||
EABE000
|
stack
|
page read and write
|
||
6D6EE000
|
stack
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page read and write
|
||
6BB6E000
|
stack
|
page read and write
|
||
4793F000
|
stack
|
page read and write
|
||
1BD3F000
|
stack
|
page read and write
|
||
1AD3E000
|
stack
|
page read and write
|
||
4987F000
|
stack
|
page read and write
|
||
2003F000
|
stack
|
page read and write
|
||
284FE000
|
stack
|
page read and write
|
||
622BE000
|
stack
|
page read and write
|
||
6ECBF000
|
stack
|
page read and write
|
||
F48F000
|
stack
|
page read and write
|
||
46DFF000
|
stack
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
5997F000
|
stack
|
page read and write
|
||
5D47E000
|
stack
|
page read and write
|
||
C68E000
|
stack
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
564E000
|
trusted library allocation
|
page read and write
|
||
51E6000
|
heap
|
page read and write
|
||
4457E000
|
stack
|
page read and write
|
||
CB8E000
|
stack
|
page read and write
|
||
E21D000
|
stack
|
page read and write
|
||
7F80E000
|
stack
|
page read and write
|
||
4BBBE000
|
stack
|
page read and write
|
||
3373E000
|
stack
|
page read and write
|
||
613E000
|
stack
|
page read and write
|
||
7118F000
|
stack
|
page read and write
|
||
3A67F000
|
stack
|
page read and write
|
||
664FE000
|
stack
|
page read and write
|
||
749FE000
|
stack
|
page read and write
|
||
45D8C000
|
unkown
|
page read and write
|
||
17EFF000
|
stack
|
page read and write
|
||
1A07F000
|
stack
|
page read and write
|
||
415FE000
|
stack
|
page read and write
|
||
17CBE000
|
stack
|
page read and write
|
||
7328E000
|
stack
|
page read and write
|
||
318FF000
|
stack
|
page read and write
|
||
A12000
|
heap
|
page read and write
|
||
65AFE000
|
stack
|
page read and write
|
||
2D97E000
|
stack
|
page read and write
|
||
462BF000
|
stack
|
page read and write
|
||
8D2000
|
trusted library allocation
|
page read and write
|
||
BA0E000
|
stack
|
page read and write
|
||
52D3F000
|
stack
|
page read and write
|
||
49EFE000
|
stack
|
page read and write
|
||
2747000
|
trusted library allocation
|
page read and write
|
||
10AFE000
|
stack
|
page read and write
|
||
6201000
|
heap
|
page read and write
|
||
5FD7F000
|
stack
|
page read and write
|
||
54D7E000
|
stack
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
2F4B000
|
stack
|
page read and write
|
||
78B0000
|
trusted library section
|
page read and write
|
||
6573E000
|
stack
|
page read and write
|
||
64F7F000
|
stack
|
page read and write
|
||
78C9E000
|
stack
|
page read and write
|
||
4213E000
|
stack
|
page read and write
|
||
4ADFE000
|
stack
|
page read and write
|
||
1CEFE000
|
stack
|
page read and write
|
||
5DA7F000
|
stack
|
page read and write
|
||
B9C000
|
stack
|
page read and write
|
||
40ABE000
|
stack
|
page read and write
|
||
BBAE000
|
stack
|
page read and write
|
||
3D37F000
|
stack
|
page read and write
|
||
6A9AF000
|
stack
|
page read and write
|
||
2323F000
|
stack
|
page read and write
|
||
6203E000
|
stack
|
page read and write
|
||
511BF000
|
stack
|
page read and write
|
||
3DFFF000
|
stack
|
page read and write
|
||
3F93E000
|
stack
|
page read and write
|
||
2CB7F000
|
stack
|
page read and write
|
||
39DBF000
|
stack
|
page read and write
|
||
1B4BE000
|
stack
|
page read and write
|
||
385BE000
|
stack
|
page read and write
|
||
174FF000
|
stack
|
page read and write
|
||
AE8F000
|
stack
|
page read and write
|
||
21E3F000
|
stack
|
page read and write
|
||
11BD000
|
heap
|
page read and write
|
||
22BFF000
|
stack
|
page read and write
|
||
C170000
|
trusted library section
|
page read and write
|
||
5D0BE000
|
stack
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
7284F000
|
stack
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
77D9F000
|
stack
|
page read and write
|
||
7428E000
|
stack
|
page read and write
|
||
2507E000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
4937F000
|
stack
|
page read and write
|
||
1127E000
|
stack
|
page read and write
|
||
3AF7E000
|
stack
|
page read and write
|
||
308BF000
|
stack
|
page read and write
|
||
3763F000
|
stack
|
page read and write
|
||
4057F000
|
stack
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
4A53E000
|
stack
|
page read and write
|
||
104BE000
|
stack
|
page read and write
|
||
2913F000
|
stack
|
page read and write
|
||
590BF000
|
stack
|
page read and write
|
||
50DFF000
|
stack
|
page read and write
|
||
51EC000
|
stack
|
page read and write
|
||
55FFF000
|
stack
|
page read and write
|
||
7260000
|
heap
|
page read and write
|
||
485BF000
|
stack
|
page read and write
|
||
29DBF000
|
stack
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
3437F000
|
stack
|
page read and write
|
||
7A45E000
|
stack
|
page read and write
|
||
539E000
|
heap
|
page read and write
|
||
17DB000
|
trusted library allocation
|
page read and write
|
||
1CD7F000
|
stack
|
page read and write
|
||
68A7E000
|
stack
|
page read and write
|
||
1383000
|
trusted library allocation
|
page read and write
|
||
51E3F000
|
stack
|
page read and write
|
||
3BBBF000
|
stack
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
5313E000
|
stack
|
page read and write
|
||
4D97F000
|
stack
|
page read and write
|
||
AC4E000
|
stack
|
page read and write
|
||
5E73E000
|
stack
|
page read and write
|
||
33ABF000
|
stack
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
164BF000
|
stack
|
page read and write
|
||
D3B000
|
stack
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
3EB7E000
|
stack
|
page read and write
|
||
8F68000
|
heap
|
page read and write
|
||
2A8FF000
|
stack
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
3E8BF000
|
stack
|
page read and write
|
||
6F8C000
|
stack
|
page read and write
|
||
725CF000
|
stack
|
page read and write
|
||
45DCB000
|
unkown
|
page read and write
|
||
3CAFE000
|
stack
|
page read and write
|
||
EBDD000
|
stack
|
page read and write
|
||
1677E000
|
stack
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
7E41E000
|
stack
|
page read and write
|
||
4DFBF000
|
stack
|
page read and write
|
||
922E000
|
stack
|
page read and write
|
||
5833E000
|
stack
|
page read and write
|
||
FB7E000
|
stack
|
page read and write
|
||
22EBE000
|
stack
|
page read and write
|
||
52EC000
|
stack
|
page read and write
|
||
198FF000
|
stack
|
page read and write
|
||
858E000
|
stack
|
page read and write
|
||
45DB3000
|
unkown
|
page read and write
|
||
234BF000
|
stack
|
page read and write
|
||
6C92E000
|
stack
|
page read and write
|
||
D04F000
|
stack
|
page read and write
|
||
369FE000
|
stack
|
page read and write
|
||
1627E000
|
stack
|
page read and write
|
||
45D3B000
|
unkown
|
page read and write
|
||
38DBE000
|
stack
|
page read and write
|
||
49FFF000
|
stack
|
page read and write
|
||
6173F000
|
stack
|
page read and write
|
||
43B7E000
|
stack
|
page read and write
|
||
A74E000
|
stack
|
page read and write
|
||
466BE000
|
stack
|
page read and write
|
||
5E0BF000
|
stack
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
1023E000
|
stack
|
page read and write
|
||
7D51E000
|
stack
|
page read and write
|
||
C3CF000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
C90E000
|
stack
|
page read and write
|
||
1687F000
|
stack
|
page read and write
|
||
7190F000
|
stack
|
page read and write
|
||
90CD000
|
stack
|
page read and write
|
||
958F000
|
stack
|
page read and write
|
||
23EFE000
|
stack
|
page read and write
|
||
37B7E000
|
stack
|
page read and write
|
||
3B0BE000
|
stack
|
page read and write
|
||
2823F000
|
stack
|
page read and write
|
||
3CD7E000
|
stack
|
page read and write
|
||
35A3E000
|
stack
|
page read and write
|
||
12EFF000
|
stack
|
page read and write
|
||
3DC3F000
|
stack
|
page read and write
|
||
51F7F000
|
stack
|
page read and write
|
||
6DFAE000
|
stack
|
page read and write
|
||
1597F000
|
stack
|
page read and write
|
||
6867F000
|
stack
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
2F77E000
|
stack
|
page read and write
|
||
7BE9E000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
243BF000
|
stack
|
page read and write
|
||
6EA3F000
|
unkown
|
page read and write
|
||
640BE000
|
stack
|
page read and write
|
||
7F010000
|
trusted library allocation
|
page execute and read and write
|
||
7C11E000
|
stack
|
page read and write
|
||
2A7BF000
|
stack
|
page read and write
|
||
2A53F000
|
stack
|
page read and write
|
||
16C7E000
|
stack
|
page read and write
|
||
6AFEF000
|
stack
|
page read and write
|
||
BCED000
|
stack
|
page read and write
|
||
4A67E000
|
stack
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
5BB3F000
|
stack
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
239BF000
|
stack
|
page read and write
|
||
1A1BF000
|
stack
|
page read and write
|
||
6BCAE000
|
stack
|
page read and write
|
||
7A19F000
|
stack
|
page read and write
|
||
15ED000
|
trusted library allocation
|
page execute and read and write
|
||
2A57E000
|
stack
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
20A7E000
|
stack
|
page read and write
|
||
3E9FF000
|
stack
|
page read and write
|
||
2EAFE000
|
stack
|
page read and write
|
||
74DBE000
|
stack
|
page read and write
|
||
5143F000
|
stack
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
CB4F000
|
stack
|
page read and write
|
||
5197E000
|
stack
|
page read and write
|
||
1C77E000
|
stack
|
page read and write
|
||
1810000
|
trusted library allocation
|
page read and write
|
||
336C000
|
unclassified section
|
page execute and read and write
|
||
60FBF000
|
stack
|
page read and write
|
||
53CFF000
|
stack
|
page read and write
|
||
7CFDF000
|
stack
|
page read and write
|
||
35FFE000
|
stack
|
page read and write
|
||
DA9000
|
stack
|
page read and write
|
||
1917F000
|
stack
|
page read and write
|
||
44BBE000
|
stack
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
18B3F000
|
stack
|
page read and write
|
||
6B3AF000
|
stack
|
page read and write
|
||
3487F000
|
stack
|
page read and write
|
||
1877F000
|
stack
|
page read and write
|
||
4923F000
|
stack
|
page read and write
|
||
3002000
|
heap
|
page read and write
|
||
2F87F000
|
stack
|
page read and write
|
||
6B8EE000
|
stack
|
page read and write
|
||
4033E000
|
stack
|
page read and write
|
||
603FE000
|
stack
|
page read and write
|
||
7A6DE000
|
stack
|
page read and write
|
||
E44F000
|
stack
|
page read and write
|
||
6447E000
|
stack
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
115FF000
|
stack
|
page read and write
|
||
320BE000
|
stack
|
page read and write
|
||
70490000
|
unkown
|
page readonly
|
||
19E3E000
|
stack
|
page read and write
|
||
189FF000
|
stack
|
page read and write
|
||
7210E000
|
stack
|
page read and write
|
||
1967F000
|
stack
|
page read and write
|
||
739CF000
|
stack
|
page read and write
|
||
47FBE000
|
stack
|
page read and write
|
||
74C3F000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
461BE000
|
stack
|
page read and write
|
||
587FF000
|
stack
|
page read and write
|
||
2DE7E000
|
stack
|
page read and write
|
||
7CD5F000
|
stack
|
page read and write
|
||
45D3E000
|
unkown
|
page read and write
|
||
4CABE000
|
stack
|
page read and write
|
||
68A3F000
|
stack
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
5DE7E000
|
stack
|
page read and write
|
||
6407F000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
1DD7E000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
4E73F000
|
stack
|
page read and write
|
||
401BF000
|
stack
|
page read and write
|
||
4AB3F000
|
stack
|
page read and write
|
||
A9CE000
|
stack
|
page read and write
|
||
2B2BE000
|
stack
|
page read and write
|
||
B8CE000
|
stack
|
page read and write
|
||
73F8E000
|
stack
|
page read and write
|
||
21CFF000
|
stack
|
page read and write
|
||
8D10000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
6922E000
|
stack
|
page read and write
|
||
5A9FE000
|
stack
|
page read and write
|
||
36D7F000
|
stack
|
page read and write
|
||
6443F000
|
stack
|
page read and write
|
||
678FE000
|
stack
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
2B8BF000
|
unkown
|
page read and write
|
||
60C3E000
|
stack
|
page read and write
|
||
3E2BE000
|
stack
|
page read and write
|
||
79DDF000
|
stack
|
page read and write
|
||
57A3000
|
heap
|
page read and write
|
||
7B09F000
|
stack
|
page read and write
|
||
642FF000
|
stack
|
page read and write
|
||
F93C000
|
stack
|
page read and write
|
||
4CD3E000
|
stack
|
page read and write
|
||
8EF0000
|
heap
|
page read and write
|
||
21BBF000
|
stack
|
page read and write
|
||
109BE000
|
stack
|
page read and write
|
||
7A41F000
|
stack
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
7809F000
|
stack
|
page read and write
|
||
6523E000
|
stack
|
page read and write
|
||
4DC3E000
|
stack
|
page read and write
|
||
4DD3F000
|
stack
|
page read and write
|
||
2A93E000
|
stack
|
page read and write
|
||
3ACBF000
|
stack
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
59C3E000
|
stack
|
page read and write
|
||
3F03F000
|
stack
|
page read and write
|
||
3383F000
|
stack
|
page read and write
|
||
2E1FF000
|
stack
|
page read and write
|
||
5287E000
|
stack
|
page read and write
|
||
1B73E000
|
stack
|
page read and write
|
||
36FFF000
|
stack
|
page read and write
|
||
1583F000
|
stack
|
page read and write
|
||
58E7E000
|
stack
|
page read and write
|
||
4593F000
|
stack
|
page read and write
|
||
48AFE000
|
stack
|
page read and write
|
||
5DFBE000
|
stack
|
page read and write
|
||
35B3F000
|
stack
|
page read and write
|
||
4EC7E000
|
stack
|
page read and write
|
||
5667E000
|
stack
|
page read and write
|
||
45DE9000
|
unkown
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
51E7E000
|
stack
|
page read and write
|
||
3A3FF000
|
stack
|
page read and write
|
||
8DBE000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
6A86F000
|
stack
|
page read and write
|
||
4407E000
|
stack
|
page read and write
|
||
BD5D000
|
stack
|
page read and write
|
||
425FF000
|
stack
|
page read and write
|
||
ED0F000
|
stack
|
page read and write
|
||
BECF000
|
stack
|
page read and write
|
||
6CB6F000
|
stack
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
4BA3F000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
2BA3E000
|
stack
|
page read and write
|
||
50B7F000
|
stack
|
page read and write
|
||
EACE000
|
stack
|
page read and write
|
||
3207F000
|
stack
|
page read and write
|
||
1C0FF000
|
stack
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
4B2FE000
|
stack
|
page read and write
|
||
298FE000
|
stack
|
page read and write
|
||
8E8D000
|
stack
|
page read and write
|
||
7C35F000
|
stack
|
page read and write
|
||
95CE000
|
stack
|
page read and write
|
||
5C03F000
|
stack
|
page read and write
|
||
5AAFF000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
B970000
|
heap
|
page read and write
|
||
5C2BF000
|
stack
|
page read and write
|
||
6F0BE000
|
stack
|
page read and write
|
||
377BE000
|
stack
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
1F03E000
|
stack
|
page read and write
|
||
E98E000
|
stack
|
page read and write
|
||
1CEBF000
|
stack
|
page read and write
|
||
6187F000
|
stack
|
page read and write
|
||
5017F000
|
stack
|
page read and write
|
||
45D41000
|
unkown
|
page read and write
|
||
79B5F000
|
stack
|
page read and write
|
||
511FE000
|
stack
|
page read and write
|
||
20F3F000
|
stack
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
19F3F000
|
stack
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
727F000
|
stack
|
page read and write
|
||
2143F000
|
stack
|
page read and write
|
||
551D000
|
stack
|
page read and write
|
||
14BBF000
|
stack
|
page read and write
|
||
1A2FF000
|
stack
|
page read and write
|
||
57A7E000
|
stack
|
page read and write
|
||
17DBF000
|
stack
|
page read and write
|
||
6D82E000
|
stack
|
page read and write
|
||
854F000
|
stack
|
page read and write
|
||
3913F000
|
stack
|
page read and write
|
||
1E5FF000
|
stack
|
page read and write
|
||
62CBE000
|
stack
|
page read and write
|
||
FECE000
|
unkown
|
page read and write
|
||
2E83F000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
2D07F000
|
stack
|
page read and write
|
||
45D5C000
|
unkown
|
page read and write
|
||
1717E000
|
stack
|
page read and write
|
||
6B76F000
|
stack
|
page read and write
|
||
5ABF000
|
stack
|
page read and write
|
||
3A03F000
|
stack
|
page read and write
|
||
984E000
|
stack
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
B00E000
|
stack
|
page read and write
|
||
1FB7E000
|
stack
|
page read and write
|
||
682BF000
|
stack
|
page read and write
|
||
160A000
|
trusted library allocation
|
page execute and read and write
|
||
3FA7E000
|
stack
|
page read and write
|
||
1267E000
|
stack
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
7374F000
|
stack
|
page read and write
|
||
1753E000
|
stack
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
7553F000
|
stack
|
page read and write
|
||
45EFF000
|
stack
|
page read and write
|
||
7590E000
|
stack
|
page read and write
|
||
7CB1E000
|
stack
|
page read and write
|
||
7CE9F000
|
stack
|
page read and write
|
||
61EFE000
|
stack
|
page read and write
|
||
7288E000
|
stack
|
page read and write
|
||
3A6BE000
|
stack
|
page read and write
|
||
49C3F000
|
stack
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
45DF8000
|
unkown
|
page read and write
|
||
2953E000
|
stack
|
page read and write
|
||
2697E000
|
stack
|
page read and write
|
||
1815000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
1213F000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
6B62F000
|
stack
|
page read and write
|
||
A24E000
|
stack
|
page read and write
|
||
78EDF000
|
stack
|
page read and write
|
||
4DEBE000
|
stack
|
page read and write
|
||
846E000
|
stack
|
page read and write
|
||
7940000
|
heap
|
page read and write
|
||
2E97F000
|
stack
|
page read and write
|
||
4303E000
|
stack
|
page read and write
|
||
67DBF000
|
stack
|
page read and write
|
||
137FE000
|
stack
|
page read and write
|
||
6537E000
|
stack
|
page read and write
|
||
8AC6000
|
heap
|
page read and write
|
||
3297E000
|
stack
|
page read and write
|
||
9F8F000
|
stack
|
page read and write
|
||
5B9FF000
|
stack
|
page read and write
|
||
5C3FF000
|
stack
|
page read and write
|
||
4C1FE000
|
stack
|
page read and write
|
||
33FFE000
|
stack
|
page read and write
|
||
3843E000
|
stack
|
page read and write
|
||
5D83E000
|
stack
|
page read and write
|
||
1ABBF000
|
stack
|
page read and write
|
||
5E83F000
|
stack
|
page read and write
|
||
43B3F000
|
stack
|
page read and write
|
||
323F000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page execute and read and write
|
||
18B7E000
|
stack
|
page read and write
|
||
72B0E000
|
stack
|
page read and write
|
||
ABB000
|
trusted library allocation
|
page execute and read and write
|
||
69D2F000
|
stack
|
page read and write
|
||
39C7F000
|
stack
|
page read and write
|
||
5960000
|
heap
|
page read and write
|
||
3C1FF000
|
stack
|
page read and write
|
||
5707E000
|
stack
|
page read and write
|
||
85DD000
|
heap
|
page read and write
|
||
1137F000
|
stack
|
page read and write
|
||
397BE000
|
stack
|
page read and write
|
||
650BF000
|
stack
|
page read and write
|
||
1CC7E000
|
stack
|
page read and write
|
||
2543E000
|
stack
|
page read and write
|
||
4BCBF000
|
stack
|
page read and write
|
||
1433E000
|
stack
|
page read and write
|
||
81CE000
|
stack
|
page read and write
|
||
7CC1F000
|
stack
|
page read and write
|
||
3567E000
|
stack
|
page read and write
|
||
45DDA000
|
unkown
|
page read and write
|
||
7F13F000
|
stack
|
page read and write
|
||
7E2DE000
|
stack
|
page read and write
|
||
48D7E000
|
stack
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
1ABFE000
|
stack
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
442FE000
|
stack
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
48CC000
|
stack
|
page read and write
|
||
75BEE000
|
stack
|
page read and write
|
||
5483F000
|
stack
|
page read and write
|
||
7E29F000
|
stack
|
page read and write
|
||
4A3FE000
|
stack
|
page read and write
|
||
3D3BE000
|
stack
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
32F7F000
|
stack
|
page read and write
|
||
212FF000
|
stack
|
page read and write
|
||
411FF000
|
stack
|
page read and write
|
||
5AB3E000
|
stack
|
page read and write
|
||
24A3E000
|
stack
|
page read and write
|
||
494FE000
|
stack
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
40D3E000
|
stack
|
page read and write
|
||
5CB7F000
|
stack
|
page read and write
|
||
3337E000
|
stack
|
page read and write
|
||
462FE000
|
stack
|
page read and write
|
||
4DE7F000
|
stack
|
page read and write
|
||
73BF000
|
stack
|
page read and write
|
||
5703F000
|
stack
|
page read and write
|
||
4C1BF000
|
stack
|
page read and write
|
||
2F63E000
|
stack
|
page read and write
|
||
595FE000
|
stack
|
page read and write
|
||
6F57F000
|
stack
|
page read and write
|
||
3A2BF000
|
stack
|
page read and write
|
||
151FF000
|
stack
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
526FF000
|
stack
|
page read and write
|
||
646BF000
|
stack
|
page read and write
|
||
4A27F000
|
stack
|
page read and write
|
||
126F000
|
heap
|
page read and write
|
||
191BE000
|
stack
|
page read and write
|
||
6067E000
|
stack
|
page read and write
|
||
6217E000
|
stack
|
page read and write
|
||
3CFBF000
|
stack
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
1B33F000
|
stack
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
6673F000
|
stack
|
page read and write
|
||
2C17F000
|
stack
|
page read and write
|
||
334BE000
|
stack
|
page read and write
|
||
4B93E000
|
stack
|
page read and write
|
||
6AEAF000
|
stack
|
page read and write
|
||
1DAFF000
|
stack
|
page read and write
|
||
F46D000
|
stack
|
page read and write
|
||
7979F000
|
stack
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
930F000
|
stack
|
page read and write
|
||
8570000
|
heap
|
page read and write
|
||
3FB7F000
|
stack
|
page read and write
|
||
8B4000
|
trusted library allocation
|
page read and write
|
||
3063F000
|
stack
|
page read and write
|
||
3347F000
|
stack
|
page read and write
|
||
3A57E000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
56DFE000
|
stack
|
page read and write
|
||
5AFFF000
|
stack
|
page read and write
|
||
5EC3E000
|
stack
|
page read and write
|
||
25B6000
|
trusted library allocation
|
page read and write
|
||
76AF000
|
stack
|
page read and write
|
||
DA4F000
|
stack
|
page read and write
|
||
7324F000
|
stack
|
page read and write
|
||
3A7BF000
|
stack
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
71BF0000
|
heap
|
page read and write
|
||
239FE000
|
stack
|
page read and write
|
||
3E4FF000
|
stack
|
page read and write
|
||
510BE000
|
stack
|
page read and write
|
||
5513E000
|
stack
|
page read and write
|
||
53D3E000
|
stack
|
page read and write
|
||
260BE000
|
stack
|
page read and write
|
||
7C89E000
|
stack
|
page read and write
|
||
12DBF000
|
stack
|
page read and write
|
||
475000
|
remote allocation
|
page execute and read and write
|
||
30B0000
|
heap
|
page read and write
|
||
73B0F000
|
stack
|
page read and write
|
||
2BB7E000
|
stack
|
page read and write
|
||
25BBE000
|
stack
|
page read and write
|
||
45A7F000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
73A0E000
|
stack
|
page read and write
|
||
6B52E000
|
stack
|
page read and write
|
||
322FF000
|
stack
|
page read and write
|
||
6C16F000
|
stack
|
page read and write
|
||
7C8F000
|
stack
|
page read and write
|
||
20DFF000
|
stack
|
page read and write
|
||
6DBAF000
|
stack
|
page read and write
|
||
28C7E000
|
stack
|
page read and write
|
||
7E91E000
|
stack
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
A48F000
|
stack
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
30B3F000
|
stack
|
page read and write
|
||
76F9000
|
trusted library allocation
|
page read and write
|
||
22D3F000
|
stack
|
page read and write
|
||
FACF000
|
stack
|
page read and write
|
||
30EFF000
|
stack
|
page read and write
|
||
3E03E000
|
stack
|
page read and write
|
||
A7AC000
|
stack
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
6E43E000
|
stack
|
page read and write
|
||
E94F000
|
stack
|
page read and write
|
||
45D7A000
|
unkown
|
page read and write
|
||
68F3F000
|
stack
|
page read and write
|
||
37A3E000
|
stack
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
2E47F000
|
stack
|
page read and write
|
||
443FF000
|
stack
|
page read and write
|
||
50F7E000
|
stack
|
page read and write
|
||
66D7F000
|
stack
|
page read and write
|
||
7879F000
|
stack
|
page read and write
|
||
5BCBE000
|
stack
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
672BE000
|
stack
|
page read and write
|
||
777F000
|
stack
|
page read and write
|
||
27ABF000
|
stack
|
page read and write
|
||
3B93F000
|
stack
|
page read and write
|
||
6996F000
|
stack
|
page read and write
|
||
608FE000
|
stack
|
page read and write
|
||
2D6FE000
|
stack
|
page read and write
|
||
18DFE000
|
stack
|
page read and write
|
||
18CBE000
|
stack
|
page read and write
|
||
7F27F000
|
stack
|
page read and write
|
||
5573F000
|
stack
|
page read and write
|
||
17FD000
|
trusted library allocation
|
page read and write
|
||
3FCBF000
|
stack
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page execute and read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
447BF000
|
stack
|
page read and write
|
||
F34F000
|
stack
|
page read and write
|
||
17B7E000
|
stack
|
page read and write
|
||
2FEF000
|
unkown
|
page read and write
|
||
47D3E000
|
stack
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
41FBF000
|
stack
|
page read and write
|
||
3425000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
3AB7F000
|
stack
|
page read and write
|
||
2DE3F000
|
stack
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
322E000
|
heap
|
page read and write
|
||
43C7F000
|
stack
|
page read and write
|
||
619BF000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
5A8BE000
|
stack
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
2377E000
|
stack
|
page read and write
|
||
2D7FF000
|
stack
|
page read and write
|
||
46A7E000
|
stack
|
page read and write
|
||
C78F000
|
stack
|
page read and write
|
||
165FF000
|
stack
|
page read and write
|
||
4377F000
|
stack
|
page read and write
|
||
221FF000
|
stack
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
6DD2E000
|
stack
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
7539E000
|
stack
|
page read and write
|
||
4693E000
|
stack
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
5AC7E000
|
stack
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
7645E000
|
stack
|
page read and write
|
||
7CEDE000
|
stack
|
page read and write
|
||
1537E000
|
stack
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
4D1FF000
|
stack
|
page read and write
|
||
1953F000
|
stack
|
page read and write
|
||
24B7E000
|
stack
|
page read and write
|
||
7FA4F000
|
stack
|
page read and write
|
||
207BF000
|
stack
|
page read and write
|
||
45DB9000
|
unkown
|
page read and write
|
||
7AE1F000
|
stack
|
page read and write
|
||
2A17F000
|
stack
|
page read and write
|
||
3A7FE000
|
stack
|
page read and write
|
||
F32D000
|
stack
|
page read and write
|
||
2CE3E000
|
stack
|
page read and write
|
||
6A4AF000
|
stack
|
page read and write
|
||
2373F000
|
stack
|
page read and write
|
||
14A7F000
|
stack
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
5107F000
|
stack
|
page read and write
|
||
10C3E000
|
stack
|
page read and write
|
||
447FE000
|
stack
|
page read and write
|
||
5740000
|
trusted library allocation
|
page execute and read and write
|
||
DD0E000
|
stack
|
page read and write
|
||
2ABBE000
|
stack
|
page read and write
|
||
10EBE000
|
stack
|
page read and write
|
||
3393000
|
trusted library allocation
|
page read and write
|
||
2453E000
|
stack
|
page read and write
|
||
2CE000
|
stack
|
page read and write
|
||
BF0E000
|
stack
|
page read and write
|
||
691EF000
|
stack
|
page read and write
|
||
24C7F000
|
stack
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
6587E000
|
stack
|
page read and write
|
||
2DFBE000
|
stack
|
page read and write
|
||
45D4A000
|
unkown
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
1957E000
|
stack
|
page read and write
|
||
526C000
|
stack
|
page read and write
|
||
65FF000
|
stack
|
page read and write
|
||
146FE000
|
stack
|
page read and write
|
||
5947F000
|
stack
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
4043F000
|
stack
|
page read and write
|
||
44DFF000
|
stack
|
page read and write
|
||
9BCF000
|
stack
|
page read and write
|
||
5BF000
|
stack
|
page read and write
|
||
5133E000
|
stack
|
page read and write
|
||
10ABF000
|
stack
|
page read and write
|
||
6D42F000
|
stack
|
page read and write
|
||
3B47E000
|
stack
|
page read and write
|
||
51ABE000
|
stack
|
page read and write
|
||
3C5FE000
|
stack
|
page read and write
|
||
6B26F000
|
stack
|
page read and write
|
||
581FE000
|
stack
|
page read and write
|
||
411B000
|
stack
|
page read and write
|
||
71CF000
|
stack
|
page read and write
|
||
AC0F000
|
stack
|
page read and write
|
||
18DBF000
|
stack
|
page read and write
|
||
D44E000
|
stack
|
page read and write
|
||
6457F000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
6A12E000
|
stack
|
page read and write
|
||
7F4E000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
6972E000
|
stack
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
270BF000
|
stack
|
page read and write
|
||
45DB6000
|
unkown
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
3C0BF000
|
stack
|
page read and write
|
||
1DD3F000
|
stack
|
page read and write
|
||
19B7F000
|
stack
|
page read and write
|
||
7D89F000
|
stack
|
page read and write
|
||
48FBF000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
1A47E000
|
stack
|
page read and write
|
||
4C47E000
|
stack
|
page read and write
|
||
63E3E000
|
stack
|
page read and write
|
||
541FF000
|
stack
|
page read and write
|
||
60FF000
|
stack
|
page read and write
|
||
270FE000
|
stack
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
4BE3E000
|
stack
|
page read and write
|
||
4A8FE000
|
stack
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
21A7F000
|
stack
|
page read and write
|
||
7DF1E000
|
stack
|
page read and write
|
||
A38E000
|
stack
|
page read and write
|
||
3EA3E000
|
stack
|
page read and write
|
||
29B3F000
|
stack
|
page read and write
|
||
414BE000
|
stack
|
page read and write
|
||
1037E000
|
stack
|
page read and write
|
||
3F7BF000
|
stack
|
page read and write
|
||
3505000
|
trusted library allocation
|
page read and write
|
||
6687F000
|
stack
|
page read and write
|
||
7300E000
|
stack
|
page read and write
|
||
6EF3F000
|
stack
|
page read and write
|
||
836F000
|
stack
|
page read and write
|
||
68DFF000
|
stack
|
page read and write
|
||
641BF000
|
stack
|
page read and write
|
||
36DB000
|
stack
|
page read and write
|
||
7CC5E000
|
stack
|
page read and write
|
||
6E2FF000
|
stack
|
page read and write
|
||
5A85000
|
heap
|
page read and write
|
||
3A1BE000
|
stack
|
page read and write
|
||
1227F000
|
stack
|
page read and write
|
||
2E0BF000
|
stack
|
page read and write
|
||
23B3E000
|
stack
|
page read and write
|
||
1083F000
|
stack
|
page read and write
|
||
8C3000
|
trusted library allocation
|
page read and write
|
||
4D0FE000
|
stack
|
page read and write
|
||
8F8E000
|
stack
|
page read and write
|
||
4123E000
|
stack
|
page read and write
|
||
2313E000
|
stack
|
page read and write
|
||
406BF000
|
stack
|
page read and write
|
||
248BF000
|
stack
|
page read and write
|
||
307BE000
|
stack
|
page read and write
|
||
55C3F000
|
stack
|
page read and write
|
||
4583E000
|
stack
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
5E37E000
|
stack
|
page read and write
|
||
294FF000
|
stack
|
page read and write
|
||
E97C000
|
stack
|
page read and write
|
||
994F000
|
stack
|
page read and write
|
||
36EBF000
|
stack
|
page read and write
|
||
3E13F000
|
stack
|
page read and write
|
||
2EEBE000
|
stack
|
page read and write
|
||
2D43F000
|
stack
|
page read and write
|
||
13CFE000
|
stack
|
page read and write
|
||
3A2FE000
|
stack
|
page read and write
|
||
5EEBE000
|
stack
|
page read and write
|
||
934E000
|
stack
|
page read and write
|
||
3013F000
|
stack
|
page read and write
|
||
4E63E000
|
stack
|
page read and write
|
||
5497F000
|
stack
|
page read and write
|
||
378BF000
|
stack
|
page read and write
|
||
7A1DE000
|
stack
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
73E4F000
|
stack
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
2CA7E000
|
stack
|
page read and write
|
||
2183E000
|
stack
|
page read and write
|
||
1E63E000
|
stack
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
2B13F000
|
stack
|
page read and write
|
||
192BF000
|
stack
|
page read and write
|
||
10D7E000
|
stack
|
page read and write
|
||
7799F000
|
stack
|
page read and write
|
||
3233E000
|
stack
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
28D7F000
|
stack
|
page read and write
|
||
7869F000
|
stack
|
page read and write
|
||
E59E000
|
stack
|
page read and write
|
||
40D1000
|
trusted library allocation
|
page read and write
|
||
7364E000
|
stack
|
page read and write
|
||
141FE000
|
stack
|
page read and write
|
||
17F1000
|
trusted library allocation
|
page read and write
|
||
56F3E000
|
stack
|
page read and write
|
||
704AD000
|
unkown
|
page read and write
|
||
3F2BF000
|
stack
|
page read and write
|
||
46F3F000
|
stack
|
page read and write
|
||
F60E000
|
stack
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
28EBF000
|
stack
|
page read and write
|
||
7C5DF000
|
stack
|
page read and write
|
||
7D01E000
|
stack
|
page read and write
|
||
5FBF000
|
stack
|
page read and write
|
||
CCCE000
|
stack
|
page read and write
|
||
7859F000
|
stack
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
7B0DE000
|
stack
|
page read and write
|
||
139A000
|
trusted library allocation
|
page execute and read and write
|
||
3FF7E000
|
stack
|
page read and write
|
||
2093E000
|
stack
|
page read and write
|
||
4D5FE000
|
stack
|
page read and write
|
||
63B7F000
|
stack
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
3A07E000
|
stack
|
page read and write
|
||
5A9D000
|
stack
|
page read and write
|
||
3717E000
|
stack
|
page read and write
|
||
5DD3E000
|
stack
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
1C73F000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page readonly
|
||
7829F000
|
stack
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
5FC3F000
|
stack
|
page read and write
|
||
F7FE000
|
stack
|
page read and write
|
||
2BEFF000
|
stack
|
page read and write
|
||
3B1BF000
|
stack
|
page read and write
|
||
69D6E000
|
stack
|
page read and write
|
||
5D2FF000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
7054E000
|
stack
|
page read and write
|
||
27C3E000
|
stack
|
page read and write
|
||
379FF000
|
stack
|
page read and write
|
||
369BF000
|
stack
|
page read and write
|
||
7AF9E000
|
stack
|
page read and write
|
||
2557E000
|
stack
|
page read and write
|
||
7A31E000
|
stack
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
50E3E000
|
stack
|
page read and write
|
||
2477F000
|
stack
|
page read and write
|
||
770CE000
|
stack
|
page read and write
|
||
763F000
|
stack
|
page read and write
|
||
603BF000
|
stack
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
54AFE000
|
stack
|
page read and write
|
||
10BFF000
|
stack
|
page read and write
|
||
690EF000
|
stack
|
page read and write
|
||
4287F000
|
stack
|
page read and write
|
||
CA4E000
|
stack
|
page read and write
|
||
7AB9F000
|
stack
|
page read and write
|
||
3803F000
|
stack
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
6E3FF000
|
stack
|
page read and write
|
||
4D9BE000
|
stack
|
page read and write
|
||
7158E000
|
stack
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
602BE000
|
stack
|
page read and write
|
||
4913E000
|
stack
|
page read and write
|
||
7C75E000
|
stack
|
page read and write
|
||
624FF000
|
stack
|
page read and write
|
||
8F4F000
|
stack
|
page read and write
|
||
467BF000
|
stack
|
page read and write
|
||
7F03E000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
507BF000
|
stack
|
page read and write
|
||
ECDD000
|
stack
|
page read and write
|
||
44F7E000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
901F000
|
heap
|
page read and write
|
||
1D2BE000
|
stack
|
page read and write
|
||
4C6BF000
|
stack
|
page read and write
|
||
4D0BF000
|
stack
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
55B3E000
|
stack
|
page read and write
|
||
19CBF000
|
stack
|
page read and write
|
||
4047E000
|
stack
|
page read and write
|
||
2A7FE000
|
stack
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
201BE000
|
stack
|
page read and write
|
||
424BF000
|
stack
|
page read and write
|
||
344FE000
|
stack
|
page read and write
|
||
114FE000
|
stack
|
page read and write
|
||
5937E000
|
stack
|
page read and write
|
||
5603E000
|
stack
|
page read and write
|
||
9C3000
|
heap
|
page read and write
|
||
669FE000
|
stack
|
page read and write
|
||
4F77F000
|
stack
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
45DA7000
|
unkown
|
page read and write
|
||
2D93F000
|
stack
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
36EFE000
|
stack
|
page read and write
|
||
55D7F000
|
stack
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
1552000
|
heap
|
page read and write
|
||
4ADBF000
|
stack
|
page read and write
|
||
6F5FE000
|
stack
|
page read and write
|
||
471FE000
|
stack
|
page read and write
|
||
AC6E000
|
stack
|
page read and write
|
||
1C63E000
|
stack
|
page read and write
|
||
3117F000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
BB0F000
|
stack
|
page read and write
|
||
3E7BE000
|
stack
|
page read and write
|
||
7154F000
|
stack
|
page read and write
|
||
70491000
|
unkown
|
page execute read
|
||
58A7F000
|
stack
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
5DBBF000
|
stack
|
page read and write
|
||
178BF000
|
stack
|
page read and write
|
||
6113E000
|
stack
|
page read and write
|
||
3F17F000
|
stack
|
page read and write
|
||
5E87E000
|
stack
|
page read and write
|
||
476FE000
|
stack
|
page read and write
|
||
57A3F000
|
stack
|
page read and write
|
||
330FE000
|
stack
|
page read and write
|
||
6CCEE000
|
stack
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
1777F000
|
stack
|
page read and write
|
||
79E000
|
system
|
page execute and read and write
|
||
2887F000
|
stack
|
page read and write
|
||
15E4000
|
trusted library allocation
|
page read and write
|
||
764BE000
|
stack
|
page read and write
|
||
E3B155C000
|
stack
|
page read and write
|
||
32BFE000
|
stack
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
34DBE000
|
stack
|
page read and write
|
||
64FBE000
|
stack
|
page read and write
|
||
673BF000
|
stack
|
page read and write
|
||
15AFE000
|
stack
|
page read and write
|
||
944F000
|
stack
|
page read and write
|
||
EF80000
|
heap
|
page read and write
|
||
7E55E000
|
stack
|
page read and write
|
||
217FF000
|
stack
|
page read and write
|
||
F13C000
|
stack
|
page read and write
|
||
61C3F000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
7F870000
|
trusted library allocation
|
page execute and read and write
|
||
6946F000
|
stack
|
page read and write
|
||
6EA7E000
|
stack
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
7180E000
|
stack
|
page read and write
|
||
5C1BE000
|
stack
|
page read and write
|
||
6CA6E000
|
stack
|
page read and write
|
||
53E7E000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2A2BF000
|
stack
|
page read and write
|
||
33EBE000
|
stack
|
page read and write
|
||
114BF000
|
stack
|
page read and write
|
||
7360F000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
645BE000
|
stack
|
page read and write
|
||
1F13F000
|
stack
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
5330000
|
trusted library allocation
|
page execute and read and write
|
||
4353E000
|
stack
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
7506E000
|
stack
|
page read and write
|
||
6D2EF000
|
stack
|
page read and write
|
||
242BE000
|
stack
|
page read and write
|
||
2B53E000
|
stack
|
page read and write
|
||
78B5E000
|
stack
|
page read and write
|
||
308D000
|
trusted library allocation
|
page read and write
|
||
78F0000
|
trusted library allocation
|
page read and write
|
||
5AD7F000
|
stack
|
page read and write
|
||
521FF000
|
stack
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
B38F000
|
stack
|
page read and write
|
||
DC5000
|
trusted library allocation
|
page read and write
|
||
489BE000
|
stack
|
page read and write
|
||
A88E000
|
stack
|
page read and write
|
||
7422E000
|
stack
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
11AFF000
|
stack
|
page read and write
|
||
2BC7F000
|
stack
|
page read and write
|
||
5BDD000
|
stack
|
page read and write
|
||
D6CE000
|
stack
|
page read and write
|
||
72D4F000
|
stack
|
page read and write
|
||
525FE000
|
stack
|
page read and write
|
||
3B43F000
|
stack
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
15EBE000
|
stack
|
page read and write
|
||
6FF1F000
|
stack
|
page read and write
|
||
1EEFE000
|
stack
|
page read and write
|
||
4757F000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
6AEEE000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
65C3E000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
43EFF000
|
stack
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
5807F000
|
stack
|
page read and write
|
||
46CFE000
|
stack
|
page read and write
|
||
6A8AE000
|
stack
|
page read and write
|
||
704A6000
|
unkown
|
page readonly
|
||
1D4FF000
|
unkown
|
page read and write
|
||
6A5EF000
|
stack
|
page read and write
|
||
746BF000
|
stack
|
page read and write
|
||
7819F000
|
stack
|
page read and write
|
||
6F43F000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page execute and read and write
|
||
A62000
|
heap
|
page read and write
|
||
58ABE000
|
stack
|
page read and write
|
||
12F3E000
|
stack
|
page read and write
|
||
2E73E000
|
stack
|
page read and write
|
||
688FF000
|
stack
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
DE0F000
|
stack
|
page read and write
|
||
8D0E000
|
stack
|
page read and write
|
||
58E3F000
|
stack
|
page read and write
|
||
5247F000
|
stack
|
page read and write
|
||
7905E000
|
stack
|
page read and write
|
||
69EAE000
|
stack
|
page read and write
|
||
20BBE000
|
stack
|
page read and write
|
||
7E05E000
|
stack
|
page read and write
|
||
1740000
|
heap
|
page execute and read and write
|
||
1E27E000
|
stack
|
page read and write
|
||
1853E000
|
stack
|
page read and write
|
||
2C6BE000
|
stack
|
page read and write
|
||
3EEFF000
|
stack
|
page read and write
|
||
3473F000
|
stack
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
65FFE000
|
stack
|
page read and write
|
||
3AA7E000
|
stack
|
page read and write
|
||
68FBE000
|
stack
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
818F000
|
stack
|
page read and write
|
||
5067F000
|
stack
|
page read and write
|
||
368BE000
|
stack
|
page read and write
|
||
712CF000
|
stack
|
page read and write
|
||
5DCFF000
|
stack
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
4E13E000
|
stack
|
page read and write
|
||
637BF000
|
stack
|
page read and write
|
||
6FF000
|
stack
|
page read and write
|
||
13E3E000
|
stack
|
page read and write
|
||
1807E000
|
stack
|
page read and write
|
||
EE8E000
|
stack
|
page read and write
|
||
E35E000
|
stack
|
page read and write
|
||
1673F000
|
stack
|
page read and write
|
||
4A03E000
|
stack
|
page read and write
|
||
4B43E000
|
stack
|
page read and write
|
||
3DC7E000
|
stack
|
page read and write
|
||
5BC7F000
|
stack
|
page read and write
|
||
45D71000
|
unkown
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
358BF000
|
stack
|
page read and write
|
||
6E57E000
|
stack
|
page read and write
|
||
48EA000
|
trusted library allocation
|
page read and write
|
||
140BE000
|
stack
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
2053F000
|
stack
|
page read and write
|
||
21F7F000
|
stack
|
page read and write
|
||
AD6E000
|
stack
|
page read and write
|
||
13A7E000
|
stack
|
page read and write
|
||
F24E000
|
stack
|
page read and write
|
||
530FF000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
1D13F000
|
stack
|
page read and write
|
||
2F3BE000
|
stack
|
page read and write
|
||
755DE000
|
stack
|
page read and write
|
||
D90F000
|
stack
|
page read and write
|
||
2FC7E000
|
stack
|
page read and write
|
||
6DA6F000
|
stack
|
page read and write
|
||
400BE000
|
stack
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
7E95E000
|
stack
|
page read and write
|
||
3CFFE000
|
stack
|
page read and write
|
||
56B3F000
|
stack
|
page read and write
|
||
2CDFF000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
30BB000
|
heap
|
page read and write
|
||
1173F000
|
stack
|
page read and write
|
||
72ECE000
|
stack
|
page read and write
|
||
17B3F000
|
stack
|
page read and write
|
||
58BBF000
|
stack
|
page read and write
|
||
410BF000
|
stack
|
page read and write
|
||
65E7F000
|
stack
|
page read and write
|
||
446BE000
|
stack
|
page read and write
|
||
2C43E000
|
stack
|
page read and write
|
||
1396000
|
trusted library allocation
|
page execute and read and write
|
||
7BD1F000
|
stack
|
page read and write
|
||
45D50000
|
unkown
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
303BF000
|
stack
|
page read and write
|
||
5BDBF000
|
stack
|
page read and write
|
||
6DAAE000
|
stack
|
page read and write
|
||
844E000
|
stack
|
page read and write
|
||
6740000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
682FE000
|
stack
|
page read and write
|
||
4363F000
|
stack
|
page read and write
|
||
6AC2F000
|
stack
|
page read and write
|
||
22BD0A48000
|
heap
|
page read and write
|
||
9D4E000
|
stack
|
page read and write
|
||
48C3E000
|
stack
|
page read and write
|
||
7965F000
|
stack
|
page read and write
|
||
54EBE000
|
stack
|
page read and write
|
||
3F3FF000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1713F000
|
stack
|
page read and write
|
||
389FF000
|
stack
|
page read and write
|
||
6E53F000
|
stack
|
page read and write
|
||
2567F000
|
stack
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
15BFF000
|
stack
|
page read and write
|
||
2DF7F000
|
stack
|
page read and write
|
||
23C3F000
|
stack
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
4CBFE000
|
stack
|
page read and write
|
||
5563E000
|
stack
|
page read and write
|
||
FB0E000
|
stack
|
page read and write
|
||
456FE000
|
stack
|
page read and write
|
||
183FE000
|
stack
|
page read and write
|
||
D2CF000
|
stack
|
page read and write
|
||
2363E000
|
stack
|
page read and write
|
||
7E01F000
|
stack
|
page read and write
|
||
388FF000
|
stack
|
page read and write
|
||
6B0000
|
system
|
page execute and read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
28DBE000
|
stack
|
page read and write
|
||
3663E000
|
stack
|
page read and write
|
||
2733F000
|
stack
|
page read and write
|
||
2C7FE000
|
stack
|
page read and write
|
||
4D87E000
|
stack
|
page read and write
|
||
558BE000
|
stack
|
page read and write
|
||
442BF000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
704A6000
|
unkown
|
page readonly
|
||
3613E000
|
stack
|
page read and write
|
||
AD8E000
|
stack
|
page read and write
|
||
3D4BF000
|
stack
|
page read and write
|
||
694AE000
|
stack
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
26E7E000
|
stack
|
page read and write
|
||
7A4F000
|
stack
|
page read and write
|
||
3623F000
|
stack
|
page read and write
|
||
415BF000
|
stack
|
page read and write
|
||
2FAFF000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
4367E000
|
stack
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
30B7E000
|
stack
|
page read and write
|
||
8DA000
|
trusted library allocation
|
page execute and read and write
|
||
3427E000
|
stack
|
page read and write
|
||
493BE000
|
stack
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page execute and read and write
|
||
FC4E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
5AEBF000
|
stack
|
page read and write
|
||
8CBE000
|
stack
|
page read and write
|
||
4D83F000
|
stack
|
page read and write
|
||
70491000
|
unkown
|
page execute read
|
||
76E0000
|
trusted library allocation
|
page read and write
|
There are 4054 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
|